메뉴 건너뛰기




Volumn 8, Issue 5, 2013, Pages 717-732

Physical-layer security in distributed wireless networks using matching theory

Author keywords

equilibrium; matching; Physical layer security; secrecy rate; stability

Indexed keywords

DISTRIBUTED WIRELESS NETWORKS; MATCHING; NUMBER OF ITERATIONS; PHYSICAL-LAYER SECURITIES; SECRECY RATE; SOURCE-DESTINATION NODES; SOURCE-DESTINATION PAIRS; WIRELESS COMMUNICATION SYSTEM;

EID: 84876054344     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2251335     Document Type: Article
Times cited : (55)

References (47)
  • 1
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr.
    • J. Huang and A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.4 , pp. 1696-1707
    • Huang, J.1    Swindlehurst, A.2
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.2
  • 7
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 9
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 10
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L. C. Choo, and K. K.Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.C.2    Wong, K.K.3
  • 14
    • 80051727482 scopus 로고    scopus 로고
    • Strongly secure communications over the two-way wiretap channel
    • Sep.
    • A. Pierrot and M. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 595-605
    • Pierrot, A.1    Bloch, M.2
  • 15
    • 84866730731 scopus 로고    scopus 로고
    • Energy efficiency of cooperative jamming strategies in secure wireless networks
    • Sep.
    • M. Dehghan, D. Goeckel,M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
    • (2012) IEEE Trans. Wireless Commun , vol.11 , Issue.9 , pp. 3025-3029
    • Dehghan, M.1    Goeckel, D.2    Ghaderi, M.3    Ding, Z.4
  • 16
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • Jan.
    • H.-M.Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 17
    • 84857722105 scopus 로고    scopus 로고
    • Ergodic secret alignment
    • Mar.
    • R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1594-1611
    • Bassily, R.1    Ulukus, S.2
  • 18
    • 80051779980 scopus 로고    scopus 로고
    • Secure communications over wireless broadcast networks: Stability and utility maximization
    • Sep.
    • Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 682-692
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 19
    • 80051757223 scopus 로고    scopus 로고
    • Position-based jamming for enhanced wireless secrecy
    • Sep.
    • J.Vilela, P. Pinto, and J. Barros, "Position-based jamming for enhanced wireless secrecy," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 616-627, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 616-627
    • Vilela, J.1    Pinto, P.2    Barros, J.3
  • 20
    • 84978483855 scopus 로고    scopus 로고
    • Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games
    • Berlin, Germany Feb
    • E. A. Jorswieck and R. Mochaourab, "Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games," in Proc. Int. ITG Wkshp on Smart Antennas (WSA), Berlin, Germany, Feb. 2009.
    • (2009) Proc. Int. ITG Wkshp on Smart Antennas (WSA)
    • Jorswieck, E.A.1    Mochaourab, R.2
  • 21
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: TheMISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: TheMISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 22
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Nice, France, Jun
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," inProc. IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE Int. Symp. Inform. Theory (ISIT) , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 24
    • 79960596603 scopus 로고    scopus 로고
    • Improve physical layer security in cooperative wireless network using distributed auction games
    • Shanghai, China, Apr
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Improve physical layer security in cooperative wireless network using distributed auction games," in Proc. IEEE Conf. Comput. Commun. Wkshps (INFOCOM WORKSHOPS), Shanghai, China, Apr. 2011, pp. 18-23.
    • (2011) Proc. IEEE Conf. Comput. Commun. Wkshps (INFOCOM WORKSHOPS) , pp. 18-23
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 25
    • 70349991516 scopus 로고    scopus 로고
    • Physical layer security game: How to date a girl with her boyfriend on the same table
    • Istanbul, Turkey May
    • Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," in Proc. Int. Conf. Game Theory for Networks, Istanbul, Turkey, May 2009, pp. 287-294.
    • (2009) Proc. Int. Conf. Game Theory for Networks , pp. 287-294
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjorungnes, A.4
  • 26
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper and friendly jammer
    • Article ID 452907
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Commun. Netw., vol. 54, no. 8, pp. 1355-1387, 2009, Article ID 452907.
    • (2009) EURASIP J. Wireless Commun. Netw , vol.54 , Issue.8 , pp. 1355-1387
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 27
    • 84864360310 scopus 로고    scopus 로고
    • Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes
    • Paris, France, Apr
    • S. Bayat, R. Y. H. Louie, Z. Han, Y. Li, and B. Vucetic, "Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes," in Proc. IEEE Wireless Commun. and Network. Conf. (WCNC), Paris, France, Apr. 2012, pp. 2466-2470.
    • (2012) Proc. IEEE Wireless Commun. and Network. Conf. (WCNC) , pp. 2466-2470
    • Bayat, S.1    Louie, R.Y.H.2    Han, Z.3    Li, Y.4    Vucetic, B.5
  • 29
    • 84902634329 scopus 로고    scopus 로고
    • 2nd ed. Amsterdam The Netherlands: Elsevier
    • V. Krishna, Auction Theory, 2nd ed. Amsterdam, The Netherlands: Elsevier, 2010.
    • (2010) Auction Theory
    • Krishna, V.1
  • 30
    • 61349158726 scopus 로고    scopus 로고
    • Connectivity-aware network maintenance and repair via relays deployment
    • Jan
    • A. Ibrahim, K. Seddik, and K. Liu, "Connectivity-aware network maintenance and repair via relays deployment," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 356-366, Jan. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.1 , pp. 356-366
    • Ibrahim, A.1    Seddik, K.2    Liu, K.3
  • 31
    • 61349120242 scopus 로고    scopus 로고
    • Performance bounds for two-way amplify-and-forward relaying
    • Jan
    • Y. Han, S. H. Ting, C. K. Ho, and W. H. Chin, "Performance bounds for two-way amplify-and-forward relaying," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 432-439, Jan. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.1 , pp. 432-439
    • Han, Y.1    Ting, S.H.2    Ho, C.K.3    Chin, W.H.4
  • 33
    • 33746888250 scopus 로고    scopus 로고
    • A fluid analysis of a utility-based wireless scheduling policy
    • DOI 10.1109/TIT.2006.876246
    • P. Liu, R. Berry, and M. Honig, "A fluid analysis of a utility-based wireless scheduling policy," IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 2872-2889, Jul. 2006. (Pubitemid 44192958)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.7 , pp. 2872-2889
    • Liu, P.1    Berry, R.A.2    Honig, M.L.3
  • 34
    • 17144419393 scopus 로고    scopus 로고
    • Max-utility wireless resource management for best-effort traffic
    • DOI 10.1109/TWC.2004.840210
    • Z. Jiang, Y. Ge, and Y. Li, "Max-utility wireless resource management for best-effort traffic," IEEE Trans.Wireless Commun., vol. 4, no. 1, pp. 100-111, Jan. 2005. (Pubitemid 40748812)
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.1 , pp. 100-111
    • Jiang, Z.1    Ge, Y.2    Li, Y.3
  • 35
    • 33646400005 scopus 로고    scopus 로고
    • Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization
    • May
    • J. W. Lee, M. Chiang, and A. Calderbank, "Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization," IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 962-976, May 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.5 , pp. 962-976
    • Lee, J.W.1    Chiang, M.2    Calderbank, A.3
  • 38
    • 0031996910 scopus 로고    scopus 로고
    • Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels
    • Feb
    • H. Meng-Han and W. Che-Ho, "Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels," IEEE Trans. Consumer Electron., vol. 44, no. 1, pp. 217-225, Feb. 1998.
    • (1998) IEEE Trans. Consumer Electron , vol.44 , Issue.1 , pp. 217-225
    • Meng-Han, H.1    Che-Ho, W.2
  • 39
    • 0036685434 scopus 로고    scopus 로고
    • Pilot-based estimation of time-varying multipath channels for coherent CDMA receivers
    • Aug
    • M. A. R. Baissas and A. M. Sayeed, "Pilot-based estimation of time-varying multipath channels for coherent CDMA receivers," IEEE Trans. Signal Process., vol. 50, no. 8, pp. 2037-2049, Aug. 2002.
    • (2002) IEEE Trans. Signal Process , vol.50 , Issue.8 , pp. 2037-2049
    • Baissas, M.A.R.1    Sayeed, A.M.2
  • 44
    • 80054054586 scopus 로고
    • M.Sc., Texas Tech. Univ., Math. Dept., Lubbock, TX
    • R. J. Pavur, "Quadratic Forms Involving the Complex Gaussian," M.Sc., Texas Tech. Univ., Math. Dept., Lubbock, TX, 1980 [Online]. Available: http://esr.lib.ttu.edu/bitstream/handle/2346/15078/31295002439585.pdf
    • (1980) Quadratic Forms Involving the Complex Gaussian
    • Pavur, R.J.1
  • 45
    • 77949704990 scopus 로고    scopus 로고
    • Maximum sumrate ofMIMO multiuser scheduling with linear receivers
    • Nov
    • R. H. Y. Louie, M. R. McKay, and I. B. Collings, "Maximum sumrate ofMIMO multiuser scheduling with linear receivers," IEEE Trans. Commun., vol. 57, no. 11, pp. 3500-3510, Nov. 2009.
    • (2009) IEEE Trans. Commun , vol.57 , Issue.11 , pp. 3500-3510
    • Louie, R.H.Y.1    McKay, M.R.2    Collings, I.B.3
  • 47
    • 84890459573 scopus 로고
    • The complexity of linear programming
    • A. Kan and J. Telgen, "The complexity of linear programming," J. Statistica Neerlandica, no. 2, pp. 91-107, 1981.
    • (1981) J. Statistica Neerlandica , Issue.2 , pp. 91-107
    • Kan, A.1    Telgen, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.