메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1828-1839

Everlasting secrecy by exploiting non-idealities of the eavesdropper's receiver

Author keywords

Everlasting secrecy; non idealities of receiver; random power modulation; Secure wireless communication

Indexed keywords

ACHIEVABLE SECRECY RATES; EVERLASTING SECRECY; INFORMATION-THEORETIC SECURITY; NON-IDEALITIES; PASSIVE EAVESDROPPERS; POWER MODULATION; SECURE COMMUNICATIONS; SECURE WIRELESS COMMUNICATION;

EID: 84883322841     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130915     Document Type: Article
Times cited : (23)

References (32)
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell System Technical J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 7
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography i secret sharing
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 9
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • R. Negi and S. Goel, "Secret communication using artificial noise," in IEEE Vehicular Technology Conference, 2005, vol. 62, p. 1906.
    • (2005) IEEE Vehicular Technology Conference , vol.62 , pp. 1906
    • Negi, R.1    Goel, S.2
  • 10
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in IEEE Military Communications Conference, 2005, pp. 1501-1506.
    • (2005) IEEE Military Communications Conference , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 11
    • 80051752373 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in IEEE GLOBECOM 2008, pp. 1-5, 2008.
    • (2008) IEEE GLOBECOM , vol.2008 , pp. 1-5
    • He, X.1    Yener, A.2
  • 13
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.1    Lai, L.2    El Gamal, H.3
  • 14
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, pp. 2067-2076, 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , pp. 2067-2076
    • Goeckel, D.1    Vasudevan, S.2    Towsley, D.3    Adams, S.4    Ding, Z.5    Leung, K.6
  • 15
    • 84861601537 scopus 로고    scopus 로고
    • Physical layer security from inter-session interference in large wireless networks
    • A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, and D. Towsley, "Physical layer security from inter-session interference in large wireless networks," in IEEE INFOCOM Proceedings, pp. 1179-1187, 2012.
    • (2012) IEEE INFOCOM Proceedings , pp. 1179-1187
    • Sheikholeslami, A.1    Goeckel, D.2    Pishro-Nik, H.3    Towsley, D.4
  • 16
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional Security Against Memory-Bounded Adversaries
    • Advances in Cryptology - CRYPTO '97
    • C. Cachin and U. Maurer, "Unconditional security against memorybounded adversaries," Advances in Cryptology, pp. 292-306, 1997. (Pubitemid 127112560)
    • (1997) Lecture Notes In Computer Science , Issue.1294 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 17
    • 84883329227 scopus 로고    scopus 로고
    • Imft 25-nm mlc nand: Technology scaling barriers broken
    • R. Kuchibhatla, "Imft 25-nm mlc nand: technology scaling barriers broken," EE Times News and Analysis, 2010.
    • (2010) EE Times News and Analysis
    • Kuchibhatla, R.1
  • 19
    • 78149250982 scopus 로고    scopus 로고
    • A fundamental physical limit to data transmission and processing
    • S. Krone and G. Fettweis, "A fundamental physical limit to data transmission and processing," IEEE Signal Process. Lett., vol. 17, no. 3, pp. 305-307, 2010.
    • (2010) IEEE Signal Process. Lett. , vol.17 , Issue.3 , pp. 305-307
    • Krone, S.1    Fettweis, G.2
  • 20
    • 84875757535 scopus 로고    scopus 로고
    • Systems and circuits for sensing, co-existence, and interference mitigation in sdr and cognitive radios
    • R. Harjani, B. Sadler, H. Hashemi, and J. Rudell (Organizers), "Systems and circuits for sensing, co-existence, and interference mitigation in sdr and cognitive radios," in IEEE RFIC Symposium, 2011.
    • (2011) IEEE RFIC Symposium
    • Harjani, R.1    Sadler, B.2    Hashemi, H.3    Rudell, J.4
  • 21
    • 0000898978 scopus 로고
    • Single-sideband transmission by envelope elimination and restoration
    • L. Kahn, "Single-sideband transmission by envelope elimination and restoration," Proc. IRE, vol. 40, no. 7, pp. 803-806, 1952.
    • (1952) Proc. IRE , vol.40 , Issue.7 , pp. 803-806
    • Kahn, L.1
  • 23
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 27
    • 64549110900 scopus 로고    scopus 로고
    • On the secrecy capacity of arbitrary wiretap channels
    • M. Bloch and J. Laneman, "On the secrecy capacity of arbitrary wiretap channels," in 46th Annual Allerton Conference, pp. 818-825, 2008.
    • (2008) 46th Annual Allerton Conference , pp. 818-825
    • Bloch, M.1    Laneman, J.2
  • 29
    • 0025462466 scopus 로고
    • Non-equiprobable signaling on the gaussian channel
    • A. Calderbank and L. Ozarow, "Non-equiprobable signaling on the gaussian channel," IEEE Trans. Inf. Theory, vol. 36, pp. 726-740, 1990.
    • (1990) IEEE Trans. Inf. Theory , vol.36 , pp. 726-740
    • Calderbank, A.1    Ozarow, L.2
  • 30
    • 0029195849 scopus 로고
    • Spread spectrum access methods for wireless communications
    • R. Kohno, R. Meidan, and L. Milstein, "Spread spectrum access methods for wireless communications," IEEE Commun. Mag., vol. 33, no. 1, pp. 58-67, 1995.
    • (1995) IEEE Commun. Mag. , vol.33 , Issue.1 , pp. 58-67
    • Kohno, R.1    Meidan, R.2    Milstein, L.3
  • 32
    • 84883419094 scopus 로고    scopus 로고
    • Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
    • A. Sheikholeslami, D. Goeckel, and Pishro-Nik, "Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy," to apear in 2013 IEEE International Symposium on Information Theory Proceedings, (available online: www.ecs.umass.edu/∼goeckel/Artificial Intersymbol Interference.pdf) .
    • (2013) IEEE International Symposium on Information Theory Proceedings
    • Sheikholeslami, A.1    Goeckel, D.2    Pishro-Nik3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.