메뉴 건너뛰기




Volumn , Issue , 2013, Pages 4180-4185

Secure beamforming for MIMO two-way transmission with an untrusted relay

Author keywords

[No Author keywords available]

Indexed keywords

AMPLIFY-AND-FORWARD; BI-DIRECTIONAL LINKS; CONFIDENTIAL MESSAGE; ITERATIVE ALGORITHM; OPTIMAL STRUCTURES; SECRECY SUM RATES; TWO WAY COMMUNICATIONS; TWO-WAY TRANSMISSION;

EID: 84881572098     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2013.6555248     Document Type: Conference Paper
Times cited : (14)

References (20)
  • 2
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 3
    • 80054058314 scopus 로고    scopus 로고
    • Optimal power allocation for secure multicarrier relay systems
    • Nov
    • C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.11 , pp. 5428-5442
    • Jeong, C.1    Kim, I.-M.2
  • 4
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for ofdma decode-and-forward relay networks
    • Oct
    • D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.1    Lo, E.2    Schober, R.3
  • 5
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in mimo relay networks
    • Oct
    • J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in mimo relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.2
  • 6
    • 84862571591 scopus 로고    scopus 로고
    • Relay placement for physical layer security: A secure connection perspective
    • Jun
    • J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
    • (2012) IEEE Commun. Lett , vol.16 , Issue.6 , pp. 878-881
    • Mo, J.1    Tao, M.2    Liu, Y.3
  • 7
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 8
    • 84863956395 scopus 로고    scopus 로고
    • Improving wireless security for bidirectional communication scenarios
    • Jul
    • Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.6 , pp. 2842-2848
    • Ding, Z.1    Xu, M.2    Lu, J.3    Liu, F.4
  • 10
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 11
    • 80051752373 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in IEEE Global Telecommunications Conference, 2008, pp. 1-5.
    • (2008) IEEE Global Telecommunications Conference , pp. 1-5
    • He, X.1    Yener, A.2
  • 12
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Oct
    • L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, H.4
  • 13
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 14
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 15
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. PP, no. 99, p. 1, 2012.
    • (2012) IEEE Trans. Veh. Technol , Issue.99 , pp. 1
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 16
    • 77953745487 scopus 로고    scopus 로고
    • Degrees of freedom of the mimo y channel: Signal space alignment for network coding
    • Jul
    • N. Lee, J.-B. Lim, and J. Chun, "Degrees of freedom of the mimo y channel: Signal space alignment for network coding," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3332-3342, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3332-3342
    • Lee, N.1    Lim, J.-B.2    Chun, J.3
  • 17
    • 45249101530 scopus 로고    scopus 로고
    • The general gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 18
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas i: The misome wiretap channel
    • Jul
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 19
    • 79957663476 scopus 로고    scopus 로고
    • Optimal design of spatial source-and-relay matrices for a non-regenerative two-way mimo relay system
    • May
    • S. Xu and Y. Hua, "Optimal design of spatial source-and-relay matrices for a non-regenerative two-way mimo relay system," IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1645-1655, May 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.5 , pp. 1645-1655
    • Xu, S.1    Hua, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.