메뉴 건너뛰기




Volumn 7, Issue 6, 2012, Pages 1855-1864

Deaf cooperation for secrecy with multiple antennas at the helper

Author keywords

Channel decomposition; cooperative jamming; information theoretic secrecy; multiple antennas; noise forwarding; relay eavesdropper channel; reversely degraded channel; secrecy rates

Indexed keywords

CHANNEL DECOMPOSITION; DEGRADED CHANNEL; INFORMATION THEORETIC SECRECY; MULTIPLE ANTENNA; NOISE FORWARDING; RELAY-EAVESDROPPER CHANNEL; SECRECY RATES;

EID: 84870266491     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2215325     Document Type: Article
Times cited : (10)

References (18)
  • 2
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple accesswiretap channelwith collective secrecy
    • Monticello IL Sep
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple accesswiretap channelwith collective secrecy," in Proc. 44th Ann. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006.
    • (2006) Proc. 44th Ann. Allerton Conf. Communication, Control and Computing
    • Tekin, E.1    Yener, A.2
  • 3
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • Dec
    • E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.12 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 4
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 6
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. E. Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    Gamal, H.E.2    Poor, H.V.3
  • 7
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct
    • I. Krikidis, J. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 8
    • 80052165426 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Kyoto, Japan, Jun
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," in Proc. IEEE ICC 2011, Kyoto, Japan, Jun. 2011.
    • (2011) Proc IEEE ICC 2011
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 9
    • 84871056299 scopus 로고    scopus 로고
    • Secrecy in wireless relay channels through cooperative jamming
    • Sep Online
    • S. Vasudevan, S. Adams, D. Goeckel, Z. Ding, D. Towsley, and K. K. Leung, "Secrecy in wireless relay channels through cooperative jamming," in Proc. ACITA 2010, Sep. 2010 [Online]. Available: http://www.eecs.berkeley.edu/ ~shadams/docs/SecrecyInWirelessRelayChannels. pdf.
    • (2010) Proc. ACITA 2010
    • Vasudevan, S.1    Adams, S.2    Goeckel, D.3    Ding, Z.4    Towsley, D.5    Leung, K.K.6
  • 11
    • 80051986656 scopus 로고    scopus 로고
    • Jammer selection policies for secure wireless networks
    • Kyoto, Japan, Jun
    • J. P. Vilela, P. C. Pinto, and J. Barros, "Jammer selection policies for secure wireless networks," in Proc. IEEE ICC 2011, Kyoto, Japan, Jun. 2011.
    • (2011) Proc IEEE ICC 2011
    • Vilela, J.P.1    Pinto, P.C.2    Barros, J.3
  • 13
    • 80051619768 scopus 로고    scopus 로고
    • Cooperation strategies for secrecy in mimo relay networks with unknown eavesdropper csi
    • Prague, Czech Republic, May
    • J. Huang and A. L. Swindlehurst, "Cooperation strategies for secrecy in mimo relay networks with unknown eavesdropper csi," in Proc. ICASSP 2011, Prague, Czech Republic, May 2011, pp. 3424-3427.
    • (2011) Proc. ICASSP 2011 , pp. 3424-3427
    • Huang, J.1    Swindlehurst, A.L.2
  • 14
    • 79551619462 scopus 로고    scopus 로고
    • Secure communications via cooperative jamming in two-hop relay systems
    • Miami, FL, Dec
    • J. Huang and A. L. Swindlehurst, "Secure communications via cooperative jamming in two-hop relay systems," in Proc. IEEE GLOBECOM 2010, Miami, FL, Dec. 2010.
    • (2010) Proc IEEE GLOBECOM 2010
    • Huang, J.1    Swindlehurst, A.L.2
  • 15
    • 51349109773 scopus 로고    scopus 로고
    • Cooperation for secrecy: The relay-eavesdropper channel
    • Sep
    • L. Lai and H. E. Gamal, "Cooperation for secrecy: The relay-eavesdropper channel," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 17
    • 84858389800 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy in mutiplerelay networks
    • Houston, TX, Dec
    • R. Bassily and S. Ulukus, "Deaf cooperation for secrecy in mutiplerelay networks," in Proc. IEEE Globecom, Houston, TX, Dec. 2011.
    • (2011) Proc IEEE Globecom
    • Bassily, R.1    Ulukus, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.