메뉴 건너뛰기




Volumn 61, Issue 10, 2013, Pages 2536-2550

Secure communication via an untrusted non-regenerative relay in fading channels

Author keywords

Cooperative jamming; outage probability; physical layer security; relay networks; wiretap channel

Indexed keywords

COOPERATIVE JAMMING; OUTAGE PROBABILITY; PHYSICAL LAYER SECURITY; RELAY NETWORK; WIRE-TAP CHANNELS;

EID: 84877718412     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2013.2247600     Document Type: Article
Times cited : (134)

References (23)
  • 3
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct
    • I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 4
    • 77957340850 scopus 로고    scopus 로고
    • Opportunistic relay selection for cooperative networks with secrecy constraints
    • Oct.
    • I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010.
    • (2010) IET Commun , vol.4 , Issue.15 , pp. 1787-1791
    • Krikidis, I.1
  • 5
    • 85027929481 scopus 로고    scopus 로고
    • Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
    • Jun.
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.6 , pp. 1725-1729
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 6
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Sep
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2001, pp. 87-89.
    • (2001) Proc. IEEE Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 7
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-13, 2009.
    • (2009) EURASIP J. Wireless Commun. Netw , vol.2009 , pp. 1-13
    • He, X.1    Yener, A.2
  • 8
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Jul.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 9
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system
    • Jan.
    • C. Jeong, I.-M.Kim, andD. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 11
    • 77955712103 scopus 로고    scopus 로고
    • Near-optimal joint antenna selection for amplify-and-forward relay networks
    • Aug.
    • Y. Zhang, G. Zheng, C. Ji, K.-K. Wong, D. J. Edwards, and T. Cui, "Near-optimal joint antenna selection for amplify-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2401-2407, Aug. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.8 , pp. 2401-2407
    • Zhang, Y.1    Zheng, G.2    Ji, C.3    Wong, K.-K.4    Edwards, D.J.5    Cui, T.6
  • 12
    • 47049099974 scopus 로고    scopus 로고
    • End-to-end BER performance of cooperative MIMO transmission with antenna selection in Rayleigh fading
    • Oct
    • J.-B. Kim and D. Kim, "End-to-end BER performance of cooperative MIMO transmission with antenna selection in Rayleigh fading," in Proc. 40th Asilomar Conf. Signals, Syst. Comput., Oct. 2006, pp. 1654-1657.
    • (2006) Proc. 40th Asilomar Conf. Signals, Syst. Comput , pp. 1654-1657
    • Kim, J.-B.1    Kim, D.2
  • 13
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 14
    • 45249101530 scopus 로고    scopus 로고
    • The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 15
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 16
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 17
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr.
    • J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.4 , pp. 1696-1707
    • Huang, J.1    Swindlehurst, A.L.2
  • 18
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjørungnes, A.4
  • 20
    • 4344559690 scopus 로고    scopus 로고
    • Fading relay channels: Performance limits and space-time signal design
    • Aug
    • R. Nabar, H. Bolcskei, and F. Kneubuhler, "Fading relay channels: Performance limits and space-time signal design," IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099-1109, Aug. 2004.
    • (2004) IEEE J. Sel. Areas Commun , vol.22 , Issue.6 , pp. 1099-1109
    • Nabar, R.1    Bolcskei, H.2    Kneubuhler, F.3
  • 22
    • 78649287920 scopus 로고    scopus 로고
    • Training sequence design for discriminatory channel estimation in wirelessMIMO systems
    • Dec.
    • T.-H. Chang,W.-C. Chiang, Y.-W. Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wirelessMIMO systems," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.12 , pp. 6223-6237
    • Chang, T.-H.1    Chiang, W.-C.2    Hong, Y.-W.3    Chi, C.-Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.