메뉴 건너뛰기




Volumn 12, Issue 6, 2013, Pages 2840-2852

Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers

Author keywords

Cooperative jamming; multiuser broadcast channel; physical layer security

Indexed keywords

BROADCAST CHANNELS; COOPERATIVE JAMMING; MULTIPLE ANTENNA; MULTIUSER MULTIPLE INPUT MULTIPLE OUTPUT (MIMO); PHYSICAL LAYER SECURITY; PRECODING SCHEME; RECEIVE BEAMFORMING; SIGNAL TO INTERFERENCE PLUS NOISE RATIO;

EID: 84880157215     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2013.040413.120972     Document Type: Article
Times cited : (78)

References (54)
  • 1
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 4
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 5
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr
    • J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1869-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.4 , pp. 1869-1707
    • Huang, J.1    Swindlehurst, A.L.2
  • 6
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 7
    • 78649287920 scopus 로고    scopus 로고
    • Training sequence design for discriminatory channel estimation in wireless MIMO systems
    • Dec
    • T.-H. Chang, W.-C. Chiang, Y.-W. P. Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.12 , pp. 6223-6237
    • Chang, T.-H.1    Chiang, W.-C.2    Hong, Y.-W.P.3    Chi, C.-Y.4
  • 8
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach
    • Mar
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise- aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 9
    • 79957977565 scopus 로고    scopus 로고
    • Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity
    • W. Shi and J. Ritcey, "Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity," in Proc. 2010 Asilomar Conf. Signals, Syst. Comput., pp. 300-304.
    • Proc. 2010 Asilomar Conf. Signals, Syst. Comput , pp. 300-304
    • Shi, W.1    Ritcey, J.2
  • 10
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 11
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, 2011.
    • IEEE J. Sel. Areas Commun , vol.29 , Issue.10 , pp. 2067-2076
    • Goeckel, D.1    Vasudevan, S.2    Towsley, D.3    Adams, S.4    Ding, Z.5    Leung, K.6
  • 12
    • 85027929481 scopus 로고    scopus 로고
    • Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
    • June
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725- 1729, June 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.6 , pp. 1725-1729
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 13
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355- 1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 14
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • July
    • S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Leung-Yan-Cheong, S.1    Hellman, M.2
  • 15
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 16
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec
    • A. O. Hero, III, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero Iii, A.O.1
  • 19
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. 2007 IEEE Int. Symp. Inf. Theory, pp. 2466-2470.
    • Proc 2007 IEEE Int. Symp. Inf. Theory , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 20
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sept
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sept. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 21
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 24
  • 25
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • July
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 26
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
    • IEEE Nov
    • "Secure transmission with multiple antennas - part II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 27
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 28
    • 78049382115 scopus 로고    scopus 로고
    • Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels
    • J. Li and A. Petropulu, "Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels," in Proc. 2010 IEEE Int. Acoustics Speech Signal Process., pp. 3362-3365.
    • Proc 2010 IEEE Int. Acoustics Speech Signal Process , pp. 3362-3365
    • Li, J.1    Petropulu, A.2
  • 29
    • 69249208566 scopus 로고    scopus 로고
    • An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
    • 8, Mar
    • R. Bustin, R. Liu, H. V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 3:1-3:8, Mar. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw 2009 , vol.3 , pp. 1-3
    • Bustin, R.1    Liu, R.2    Poor, H.V.3    Shamai, S.4
  • 30
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • June
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 31
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • June
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 32
    • 7244245854 scopus 로고    scopus 로고
    • An introduction to the multi-user MIMO downlink
    • Oct
    • Q. H. Spencer, C. B. Peel, A. L. Swindlehurst, and M. Haardt, "An introduction to the multi-user MIMO downlink," IEEE Commun. Mag., vol. 42, no. 10, pp. 60-67, Oct. 2004.
    • (2004) IEEE Commun. Mag , vol.42 , Issue.10 , pp. 60-67
    • Spencer, Q.H.1    Peel, C.B.2    Swindlehurst, A.L.3    Haardt, M.4
  • 33
    • 80052913251 scopus 로고    scopus 로고
    • Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
    • Oct
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 5013-5022
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 34
    • 77955721830 scopus 로고    scopus 로고
    • Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
    • Sept
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sept. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4215-4227
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 37
    • 84857366666 scopus 로고    scopus 로고
    • Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
    • Feb
    • M. Pei, J. Wei, K.-K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
    • (2012) IEEE Trans. Wireless Commun , vol.11 , Issue.2 , pp. 544-549
    • Pei, M.1    Wei, J.2    Wong, K.-K.3    Wang, X.4
  • 38
    • 84866730731 scopus 로고    scopus 로고
    • Energy efficiency of cooperative jamming strategies in secure wireless networks
    • Sept
    • M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sept. 2012.
    • (2012) IEEE Trans. Wireless Commun , vol.11 , Issue.9 , pp. 3025-3029
    • Dehghan, M.1    Goeckel, D.L.2    Ghaderi, M.3    Ding, Z.4
  • 39
  • 40
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb
    • X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3
  • 41
    • 84855911932 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
    • Feb
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks - part II: maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 139-147
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 43
    • 80051775150 scopus 로고    scopus 로고
    • Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
    • Sep
    • X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 693-702, Sept. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 693-702
    • Wang, X.1    Tao, M.2    Mo, J.3    Xu, Y.4
  • 44
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 46
    • 67650239840 scopus 로고    scopus 로고
    • Resource allocation for the wire-tap multi-carrier broadcast channel
    • E. A. Jorswieck and A. Wolf, "Resource allocation for the wire-tap multi-carrier broadcast channel," in Proc. 2008 Int. Conf. Telecommun., pp. 1-6.
    • Proc. 2008 Int. Conf. Telecommun , pp. 1-6
    • Jorswieck, E.A.1    Wolf, A.2
  • 48
    • 70749108038 scopus 로고    scopus 로고
    • On error analysis and distributed phase steering for wireless network coding over fading channels
    • Nov
    • A. Y.-C. Peng, S. Yousefi, and I.-M. Kim, "On error analysis and distributed phase steering for wireless network coding over fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5639- 5649, Nov. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.11 , pp. 5639-5649
    • Peng, A.Y.-C.1    Yousefi, S.2    Kim, I.-M.3
  • 50
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel (corresp.)
    • A. Carleial and M. Hellman, "A note on Wyner's wiretap channel (corresp.)," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.23 , Issue.3 , pp. 387-390
    • Carleial, A.1    Hellman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.