메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1875-1888

Intrinsic information of wideband channels

Author keywords

non Bayesian inference; physical layer security; Secret key generation; wideband channels

Indexed keywords

INFORMATION MEASURES; MATHEMATICAL FRAMEWORKS; MOBILE WIRELESS NETWORK; NON-BAYESIAN INFERENCE; PHYSICAL-LAYER SECURITIES; SECRET-KEY GENERATION; WIDEBAND CHANNEL; WIDEBAND PROPAGATION;

EID: 84883325225     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130919     Document Type: Article
Times cited : (13)

References (47)
  • 1
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-652, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-652
    • Diffie, W.1    Hellman, M.E.2
  • 2
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • Mar
    • W. Diffie and M. E. Hellman, "Privacy and authentication: An introduction to cryptography," Proc. IEEE, vol. 67, no. 3, pp. 397-427, Mar. 1979.
    • (1979) Proc. IEEE , vol.67 , Issue.3 , pp. 397-427
    • Diffie, W.1    Hellman, M.E.2
  • 3
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • May
    • J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 4
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 5
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 8
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography- Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography- Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 9
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733- 742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 10
    • 84857724638 scopus 로고    scopus 로고
    • Percolation and connectivity in the intrinsically secure communications graph
    • Mar
    • P. C. Pinto and M. Z. Win, "Percolation and connectivity in the intrinsically secure communications graph," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1716-1730, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1716-1730
    • Pinto, P.C.1    Win, M.Z.2
  • 11
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Toronto, ON Jul.
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, Jul. 2008, pp. 539-543.
    • (2008) Proc. IEEE Int. Symp. on Inf. Theory , pp. 539-543
    • Haenggi, M.1
  • 12
    • 84860255627 scopus 로고    scopus 로고
    • On secrecy capacity scaling in wireless networks
    • May
    • O. O. Koyluoglu, C. E. Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.O.1    Koksal, C.E.2    El Gamal, H.3
  • 14
    • 84871964981 scopus 로고    scopus 로고
    • The role of aggregate interference on intrinsic network secrecy
    • Ottawa, ON, Jun.
    • A. Rabbachin, A. Conti, and M. Z. Win, "The role of aggregate interference on intrinsic network secrecy," in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Jun. 2012, pp. 3548-3553.
    • (2012) Proc. IEEE Int. Conf. Commun. , pp. 3548-3553
    • Rabbachin, A.1    Conti, A.2    Win, M.Z.3
  • 15
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic conditional information
    • Mar
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology- EUROCRYPT 2000, vol. 1807. Springer-Verlag, 2000, pp. 351-368.
    • (2000) Advances in Cryptology- EUROCRYPT 2000 , vol.1807 , pp. 351-368
    • Maurer, U.M.1    Wolf, S.2
  • 17
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec
    • I. Csiszar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszar, I.1    Narayan, P.2
  • 18
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun
    • "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
  • 20
    • 84858388451 scopus 로고    scopus 로고
    • A unified framework for key agreement over wireless fading channels
    • Apr
    • L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forens. Security , vol.7 , Issue.2 , pp. 480-490
    • Lai, L.1    Liang, Y.2    Poor, H.V.3
  • 21
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec
    • A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.O.1
  • 22
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 23
    • 52349113391 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Toronto, ON Jul.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, Jul. 2008, pp. 2217-2221.
    • (2008) Proc. IEEE Int. Symp. on Inf. Theory , pp. 2217-2221
    • Ekrem, E.1    Ulukus, S.2
  • 24
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 25
    • 61349186445 scopus 로고    scopus 로고
    • Capacity of cognitive interference channels with and without secrecy
    • Feb
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 604-619
    • Liang, Y.1    Somekh-Baruch, A.2    Poor, H.V.3    Shamai, S.4    Verdu, S.5
  • 26
    • 70350706020 scopus 로고    scopus 로고
    • The capacity region of the degraded multiple-input multiple-output compound broadcast channel
    • Nov
    • H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.11 , pp. 5011-5023
    • Weingarten, H.1    Liu, T.2    Shamai, S.3    Steinberg, Y.4    Viswanath, P.5
  • 28
    • 0040801465 scopus 로고
    • Reciprocity theorems for electromagnetic fields whose time dependence is arbitrary
    • Jan
    • W. J. Welch, "Reciprocity theorems for electromagnetic fields whose time dependence is arbitrary," IRE Trans. Antennas Propagat., vol. 8, no. 1, pp. 68-73, Jan. 1960.
    • (1960) IRE Trans. Antennas Propagat. , vol.8 , Issue.1 , pp. 68-73
    • Welch, W.J.1
  • 30
    • 2942715331 scopus 로고    scopus 로고
    • A direct derivation of a single-antenna reciprocity relation for the time-domain
    • Jun
    • G. S. Smith, "A direct derivation of a single-antenna reciprocity relation for the time-domain," IEEE Trans. Antennas Propag., vol. 52, no. 6, pp. 1568-1577, Jun. 2004.
    • (2004) IEEE Trans. Antennas Propag. , vol.52 , Issue.6 , pp. 1568-1577
    • Smith, G.S.1
  • 31
    • 33750086918 scopus 로고    scopus 로고
    • Time reversal with MISO for ultrawideband communications: Experimental results
    • Dec
    • R. C. Qiu, C. Zhou, N. Guo, and J. Q. Zhang, "Time reversal with MISO for ultrawideband communications: Experimental results," IEEE Antennas Wireless Propag. Lett., vol. 5, no. 1, pp. 269-273, Dec. 2006.
    • (2006) IEEE Antennas Wireless Propag. Lett. , vol.5 , Issue.1 , pp. 269-273
    • Qiu, R.C.1    Zhou, C.2    Guo, N.3    Zhang, J.Q.4
  • 33
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan
    • J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 35
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 37
    • 70449499345 scopus 로고    scopus 로고
    • Verification of secret key generation from UWB channel observations
    • Dresden, Germany, Jun.
    • M. G. Madiseh, S. He, M. L. McGuire, S. W. Neville, and X. Dong, "Verification of secret key generation from UWB channel observations," in Proc. IEEE Int. Conf. Commun., Dresden, Germany, Jun. 2009, pp. 1-5.
    • (2009) Proc. IEEE Int. Conf. Commun. , pp. 1-5
    • Madiseh, M.G.1    He, S.2    McGuire, M.L.3    Neville, S.W.4    Dong, X.5
  • 38
    • 0036906341 scopus 로고    scopus 로고
    • Characterization of ultra-wide bandwidth wireless indoor communications channel: A communication-theoretic view
    • Dec
    • M. Z. Win and R. A. Scholtz, "Characterization of ultra-wide bandwidth wireless indoor communications channel: A communication-theoretic view," IEEE J. Sel. Areas Commun., vol. 20, no. 9, pp. 1613-1627, Dec. 2002.
    • (2002) IEEE J. Sel. Areas Commun. , vol.20 , Issue.9 , pp. 1613-1627
    • Win, M.Z.1    Scholtz, R.A.2
  • 39
    • 29044434567 scopus 로고    scopus 로고
    • Ultrawideband propagation channels-theory, measurement, and modeling
    • DOI 10.1109/TVT.2005.856194
    • A. F. Molisch, "Ultrawideband propagation channels-theory, measurement, and modeling," IEEE Trans. Veh. Technol., vol. 54, no. 5, pp. 1528-1545, Sep. 2005. (Pubitemid 41787119)
    • (2005) IEEE Transactions on Vehicular Technology , vol.54 , Issue.5 , pp. 1528-1545
    • Molisch, A.F.1
  • 41
    • 0036686437 scopus 로고    scopus 로고
    • The ultra-wide bandwidth indoor channel: From statistical model to simulations
    • DOI 10.1109/JSAC.2002.801228, PII 1011092002801228, Channel and Propagation Models for Wireless System Design II
    • D. Cassioli, M. Z. Win, and A. F. Molisch, "The ultra-wide bandwidth indoor channel: From statistical model to simulations," IEEE J. Sel. Areas Commun., vol. 20, no. 6, pp. 1247-1257, Aug. 2002. (Pubitemid 34950013)
    • (2002) IEEE Journal on Selected Areas in Communications , vol.20 , Issue.6 , pp. 1247-1257
    • Cassioli, D.1    Win, M.Z.2    Molisch, A.F.3
  • 42
    • 62949180288 scopus 로고    scopus 로고
    • Ultra-wide-band propagation channels
    • Feb
    • A. F. Molisch, "Ultra-wide-band propagation channels," Proc. IEEE, vol. 97, no. 2, pp. 353-371, Feb. 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.2 , pp. 353-371
    • Molisch, A.F.1
  • 46
    • 77956060110 scopus 로고    scopus 로고
    • Fundamental limits of wideband localization- Part I: A general framework
    • Oct
    • Y. Shen and M. Z. Win, "Fundamental limits of wideband localization- Part I: A general framework," IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 4956-4980, Oct. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.10 , pp. 4956-4980
    • Shen, Y.1    Win, M.Z.2
  • 47
    • 77956062602 scopus 로고    scopus 로고
    • Fundamental limits of wideband localization- Part II: Cooperative networks
    • Oct
    • Y. Shen, H. Wymeersch, and M. Z. Win, "Fundamental limits of wideband localization- Part II: Cooperative networks," IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 4981-5000, Oct. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.10 , pp. 4981-5000
    • Shen, Y.1    Wymeersch, H.2    Win, M.Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.