메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3548-3553

The role of aggregate interference on intrinsic network secrecy

Author keywords

aggregate interference; fading channels; Network secrecy; performance evaluation; random geometry

Indexed keywords

AGGREGATE INTERFERENCE; DISTRIBUTED NODES; INTRINSIC PROPERTY; LEGITIMATE USERS; PERFORMANCE EVALUATION; PHYSICAL LAYERS; RANDOM GEOMETRY; UPPER LAYER; WIRELESS CHANNEL; WIRELESS SECURITY;

EID: 84871964981     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6364388     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 29, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.29 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 4
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide, Australia, Sep.
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. on Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155.
    • (2005) Proc. IEEE Int. Symp. on Inf. Theory , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 5
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 6
    • 0038377118 scopus 로고    scopus 로고
    • Probability distributions for the number of radio transceivers which can communicate with one another
    • Apr.
    • J. Orriss and S. K. Barton, "Probability distributions for the number of radio transceivers which can communicate with one another," IEEE Trans. Commun., vol. 51, no. 4, pp. 676-681, Apr. 2003.
    • (2003) IEEE Trans. Commun. , vol.51 , Issue.4 , pp. 676-681
    • Orriss, J.1    Barton, S.K.2
  • 7
    • 34249704132 scopus 로고    scopus 로고
    • Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks
    • Jul.
    • D. Dardari, A. Conti, C. Buratti, and R. Verdone, "Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 790-802, Jul. 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.7 , pp. 790-802
    • Dardari, D.1    Conti, A.2    Buratti, C.3    Verdone, R.4
  • 8
  • 9
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjorungnes, A.4
  • 10
    • 84857231073 scopus 로고    scopus 로고
    • Intentional network interference for denial of wireless eavesdropping
    • Houston, TX, Dec.
    • A. Rabbachin, A. Conti, and M. Z. Win, "Intentional network interference for denial of wireless eavesdropping," in Proc. IEEE Global Telecomm. Conf., Houston, TX, Dec. 2011, pp. 1-6.
    • (2011) Proc. IEEE Global Telecomm. Conf. , pp. 1-6
    • Rabbachin, A.1    Conti, A.2    Win, M.Z.3
  • 12
    • 79251641071 scopus 로고    scopus 로고
    • A mathematical model for network interference
    • Sedona, AZ, May
    • M. Z. Win, "A mathematical model for network interference," IEEE Communication Theory Workshop, Sedona, AZ, May 2007.
    • (2007) IEEE Communication Theory Workshop
    • Win, M.Z.1
  • 13
    • 62949241345 scopus 로고    scopus 로고
    • A mathematical theory of network interference and its applications
    • Feb., special issue on Ultra-Wide Bandwidth (UWB) Technology & Emerging Applications
    • M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009, special issue on Ultra-Wide Bandwidth (UWB) Technology & Emerging Applications.
    • (2009) Proc. IEEE , vol.97 , Issue.2 , pp. 205-230
    • Win, M.Z.1    Pinto, P.C.2    Shepp, L.A.3
  • 14
    • 77954705153 scopus 로고    scopus 로고
    • Communication in a Poisson field of interferers - Part II: Channel capacity and interference spectrum
    • Jul.
    • P. C. Pinto and M. Z. Win, "Communication in a Poisson field of interferers - Part II: Channel capacity and interference spectrum," IEEE Trans. Wireless Commun., vol. 9, no. 7, pp. 2187-2195, Jul. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.7 , pp. 2187-2195
    • Pinto, P.C.1    Win, M.Z.2
  • 15
    • 17144362797 scopus 로고    scopus 로고
    • Influence of fading on the Gaussian approximation for BPSK and QPSK with asynchronous cochannel interference
    • A. Giorgetti and M. Chiani, "Influence of fading on the Gaussian approximation for BPSK and QPSK with asynchronous cochannel interference," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 384-389, 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 384-389
    • Giorgetti, A.1    Chiani, M.2
  • 16
    • 0033280495 scopus 로고    scopus 로고
    • Outage evaluation for slow frequency-hopping mobile radio systems
    • Dec.
    • M. Chiani, A. Conti, and O. Andrisano, "Outage evaluation for slow frequency-hopping mobile radio systems," IEEE Trans. Commun., vol. 47, no. 12, pp. 1865-1874, Dec. 1999.
    • (1999) IEEE Trans. Commun. , vol.47 , Issue.12 , pp. 1865-1874
    • Chiani, M.1    Conti, A.2    Andrisano, O.3
  • 18
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjorungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjorungnes, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.