메뉴 건너뛰기




Volumn 7, Issue 1 PART 2, 2012, Pages 310-320

Joint relay and jammer selection for secure two-way relay networks

Author keywords

Cooperative jamming; friendly jammer selection; physical layer security; relay selection; two way relay

Indexed keywords

AMPLIFY-AND-FORWARD PROTOCOL; COMMUNICATION PHASIS; COOPERATIVE NETWORKS; FRIENDLY JAMMER SELECTION; HYBRID SCHEME; HYBRID-SWITCHING; INTERMEDIATE NODE; JAMMERS; PHYSICAL-LAYER SECURITY; RELAY SELECTION; TRANSMITTED POWER; TWO SOURCES; TWO-WAY RELAY;

EID: 84862963131     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2166386     Document Type: Article
Times cited : (268)

References (35)
  • 1
    • 54849430727 scopus 로고    scopus 로고
    • Identitybased key management in mobile ad hoc networks: Techniques and applications
    • Oct.
    • E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identitybased key management in mobile ad hoc networks: Techniques and applications," IEEE Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
    • (2008) IEEE Wireless Commun. , vol.15 , Issue.5 , pp. 46-52
    • Silva, E.D.1    Santos, A.L.D.2    Albini, L.C.P.3    Lima, M.4
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide, Australia, Sep.
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory, Adelaide, Australia, Sep. 2005.
    • (2005) Proc. IEEE Int. Symp. Information Theory
    • Parada, P.1    Blahut, R.2
  • 7
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 8
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 9
    • 39049130758 scopus 로고    scopus 로고
    • Generalized multiple access channels with confidential messages
    • Seattle, WA, Jul.
    • Y. Liang and H. V. Poor, "Generalized multiple access channels with confidential messages," in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006.
    • (2006) Proc. IEEE Int. Symp. Information Theory
    • Liang, Y.1    Poor, H.V.2
  • 10
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • DOI 10.1109/TIT.2007.915978
    • Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 11
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 12
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 15
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
    • Monticello, IL, Sep.
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. 44th Ann. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2006.
    • (2006) Proc. 44th Ann. Allerton Conf. Communication, Control, and Computing
    • Tekin, E.1    Yener, A.2
  • 16
    • 48049102969 scopus 로고    scopus 로고
    • Themultiple access wire-tap channel:Wireless secrecy and cooperative jamming
    • San Diego, CA, Jan.
    • E. Tekin and A. Yener, "Themultiple access wire-tap channel:Wireless secrecy and cooperative jamming," in Proc. Information Theory and Applications Workshop, San Diego, CA, Jan. 2007.
    • (2007) Proc. Information Theory and Applications Workshop
    • Tekin, E.1    Yener, A.2
  • 18
    • 77955410655 scopus 로고    scopus 로고
    • Cooperative secrecy in wireless communications
    • W. Trappe and R. Liu, Eds. New York: Springer-Verlag
    • E. Ekrem and S. Ulukus, "Cooperative secrecy in wireless communications," in Securing Wireless Communications at the Physical Layer, W. Trappe and R. Liu, Eds. New York: Springer-Verlag, 2009.
    • (2009) Securing Wireless Communications at the Physical Layer
    • Ekrem, E.1    Ulukus, S.2
  • 19
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 21
    • 52349100899 scopus 로고    scopus 로고
    • The role of an untrusted relay in secret communication
    • Toronto, Canada, Jul.
    • X. He and A. Yener, "The role of an untrusted relay in secret communication," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, Jul. 2008.
    • (2008) Proc. IEEE Int. Symp. Information Theory
    • He, X.1    Yener, A.2
  • 22
    • 70349687277 scopus 로고    scopus 로고
    • End-to-end secure multi-hop communication with untrusted relays is possible
    • Pacific Grove, CA, Nov.
    • X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays is possible," in Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2008.
    • (2008) Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers
    • He, X.1    Yener, A.2
  • 23
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, Australia, Sep.
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, Cairns, Australia, Sep. 2001.
    • (2001) Proc. IEEE Information Theory Workshop
    • Oohama, Y.1
  • 24
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Nice, France, Jun.
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007.
    • (2007) Proc. IEEE Int. Symp. Information Theory
    • Oohama, Y.1
  • 26
    • 33847736358 scopus 로고    scopus 로고
    • Spectral efficient protocols for half-duplex fading relay channels
    • DOI 10.1109/JSAC.2007.070213
    • B. Rankov and A. Wittneben, "Spectral efficient protocols for halfduplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , Issue.2 , pp. 379-389
    • Rankov, B.1    Wittneben, A.2
  • 27
    • 42549091703 scopus 로고    scopus 로고
    • Iterative network and channel decoding for the two-way relay channel
    • Istanbul, Turkey, Jun.
    • C. Hausl and J. Hagenauer, "Iterative network and channel decoding for the two-way relay channel," in Proc. IEEE Int. Conf. Communications, Istanbul, Turkey, Jun. 2006.
    • (2006) Proc. IEEE Int. Conf. Communications
    • Hausl, C.1    Hagenauer, J.2
  • 28
    • 70350584562 scopus 로고    scopus 로고
    • Memoryless relay strategies for two-way relay channels
    • Oct.
    • T. Cui, T. Ho, and J. Kliewer, "Memoryless relay strategies for two-way relay channels," IEEE Trans. Commun., vol. 57, no. 10, pp. 3132-3143, Oct. 2009.
    • (2009) IEEE Trans. Commun. , vol.57 , Issue.10 , pp. 3132-3143
    • Cui, T.1    Ho, T.2    Kliewer, J.3
  • 30
    • 77749321176 scopus 로고    scopus 로고
    • A relay selection scheme for two-way amplify-and-forward relay networks
    • Nanjing, China, Nov.
    • Y. Jing, "A relay selection scheme for two-way amplify-and-forward relay networks," in Proc. Int. Conf. Wireless Communications Signal Processing, Nanjing, China, Nov. 2009.
    • (2009) Proc. Int. Conf. Wireless Communications Signal Processing
    • Jing, Y.1
  • 31
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    Mclaughlin, S.3
  • 33
    • 35448931484 scopus 로고    scopus 로고
    • Cooperative communications with outage-optimal opportunistic relaying
    • DOI 10.1109/TWC.2007.06020050
    • A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007. (Pubitemid 47625224)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3450-3460
    • Bletsas, A.1    Shin, H.2    Win, M.Z.3
  • 35
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.