메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Joint relay and jammer selection for secure decode-and-forward two-way relay communications

Author keywords

and two way network; Cooperative communications; decode and forward; physical layer security; relay selection

Indexed keywords

COOPERATIVE COMMUNICATION; DECODE AND FORWARD; DECODE-AND-FORWARD PROTOCOLS; INTERMEDIATE NODE; JAMMERS; PHYSICAL LAYER SECURITY; RELAY SELECTION; SOURCE NODES; THREE PHASIS; TWO SOURCES; TWO-WAY RELAY;

EID: 84863152970     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2011.6133875     Document Type: Conference Paper
Times cited : (29)

References (13)
  • 1
    • 54849430727 scopus 로고    scopus 로고
    • Identity-based key management in mobile ad hoc networks: Techniques and applications
    • Oct.
    • E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identity-based key management in mobile ad hoc networks: techniques and applications,"IEEE Wireless Communication, vol. 15, pp. 46-52, Oct. 2008.
    • (2008) IEEE Wireless Communication , vol.15 , pp. 46-52
    • Silva, E.D.1    Santos, A.L.D.2    Albini, L.C.P.3    Lima, M.4
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages,"IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Shitz Jun.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 6
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 11
    • 33947617858 scopus 로고    scopus 로고
    • Wireless network coding by amplify-and-forward for bi-directional traffic flows
    • DOI 10.1109/LCOMM.2007.061436
    • P. Popovski and H. Yomo, "Wireless network coding by amplify-and-forward for bi-directional traffic flows," IEEE Communications Letters, vol. 11, no. 1, pp. 16-18, Jan. 2007. (Pubitemid 46501839)
    • (2007) IEEE Communications Letters , vol.11 , Issue.1 , pp. 16-18
    • Popovski, P.1    Yomo, H.2
  • 13
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Transactions on Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.