메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1072-1078

Secure communications with untrusted secondary users in cognitive radio networks

Author keywords

Amply and forward relaying; cognitive radio; eavesdropping; untrusted relay; wiretap channel coding

Indexed keywords

CHANNEL CODING; CODES (SYMBOLS); RADIO TRANSMISSION; SECURITY SYSTEMS; TRANSMISSIONS;

EID: 84877667488     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2012.6503255     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 1
    • 42649092608 scopus 로고    scopus 로고
    • A survey on spectrum management in cognitive radio networks
    • Apr.
    • I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.4 , pp. 40-48
    • Akyildiz, I.F.1    Lee, W.2    Vuran, M.C.3    Mohanty, S.4
  • 2
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • Feb.
    • S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner,"Broadcast channels with confidential messages," IEEE Trans. inf. Theory, vol. IT-24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • Jul.
    • S. K. Leung-Yan-Cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.4 , pp. 451-456
    • Leung, S.K.1    Cheong, Y.2    Hellman, M.3
  • 7
    • 80052139032 scopus 로고    scopus 로고
    • Spectrum leasing via cooperation for enhanced physical-layer secrecy
    • Kyoto, Japan, Jun.
    • K. Lee, O. Simeone, C. Chae, and J. Kang, "Spectrum leasing via cooperation for enhanced physical-layer secrecy," in Proc. IEEE ICC 2011, Kyoto, Japan, Jun. 2010.
    • (2010) Proc. IEEE ICC 2011
    • Lee, K.1    Simeone, O.2    Chae, C.3    Kang, J.4
  • 8
    • 80051757604 scopus 로고    scopus 로고
    • An information secrecy game in cognitive radio networks
    • Sept.
    • Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 831-842
    • Wu, Y.1    Liu, K.J.R.2
  • 9
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Comm., vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Trans. Wireless Comm. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 10
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • Sept.
    • X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. inf. Theory, vol. 57, no. 5, pp. 3153- 3167, Sept. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojević, P.3    Poor, H.V.4
  • 11
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y. Liang, L. Zhang, K. Teh, and K. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.2    Zhang, L.3    Teh, K.4    Li, K.5
  • 12
    • 0018523303 scopus 로고
    • Capacity theorems for the relay channels
    • Sep.
    • T. M. Cover and A. A. El Gamal, "Capacity theorems for the relay channels," IEEE Trans. inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.5 , pp. 572-584
    • Cover, T.M.1    El Gamal, A.A.2
  • 13
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec.
    • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 14
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: a secrecy perspective," IEEE Trans. inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 15
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.2    Kim, D.3
  • 16
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.