메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1850-1863

On the resilience of wireless multiuser networks to passive and active eavesdroppers

Author keywords

multiple eavesdroppers; multiuser diversity; outage probability; physical layer security; Secrecy capacity; secrecy rate; slow fading and side information

Indexed keywords

MULTIPLE EAVESDROPPERS; MULTIUSER DIVERSITY; OUTAGE PROBABILITY; PHYSICAL LAYER SECURITY; SECRECY CAPACITY; SIDE INFORMATION;

EID: 84883342472     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130917     Document Type: Article
Times cited : (68)

References (41)
  • 1
    • 84890522850 scopus 로고
    • A mathematical theory of cryptography
    • Oct
    • C. Shannon, "A mathematical theory of cryptography," Bell System Technical J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell System Technical J. , vol.28 , pp. 656-715
    • Shannon, C.1
  • 6
    • 84858162419 scopus 로고    scopus 로고
    • Information and inference in the wireless physical layer
    • Feb
    • H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Commun., vol. 1, no. 19, pp. 40-47, Feb. 2012.
    • (2012) IEEE Wireless Commun. , vol.1 , Issue.19 , pp. 40-47
    • Poor, H.V.1
  • 7
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1385-1357, Oct. 1975.
    • (1975) Bell Syst. Techn. J. , vol.54 , Issue.8 , pp. 1385-1357
    • Wyner, A.D.1
  • 8
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. K?orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 11
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 6, no. 54, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.6 , Issue.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 12
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 5403, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-5403
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 13
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sep
    • S. Shafiee and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Ulukus, S.2
  • 14
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- part I: The MISOME wiretap channel
    • Jul
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- part I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088- 3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 15
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- part II: The MIMOME wiretap channel
    • Nov
    • - , "Secure transmission with multiple antennas- part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515- 5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 17
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug
    • F. E. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961- 4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.E.1    Hassibi, B.2
  • 18
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr
    • S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forens. Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.3
  • 19
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • D. Lun, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, part 2, pp. 1845-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 PART 2 , pp. 1845-1888
    • Lun, D.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 22
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H.V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 24
    • 84868536644 scopus 로고    scopus 로고
    • Helping interferer physical layer security strategies for M-QAM and M-PSK systems
    • Princeton, NJ Mar.
    • A. Chorti, "Helping interferer physical layer security strategies for M-QAM and M-PSK systems," in Proc. 46th Annual Conference on Information Sciences and Systems, Princeton, NJ, Mar. 2012, pp. 1-6.
    • (2012) Proc. 46th Annual Conference on Information Sciences and Systems , pp. 1-6
    • Chorti, A.1
  • 25
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forens. Security, vol. 7, no. 1, pp. 388-396, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forens. Security , vol.7 , Issue.1 , pp. 388-396
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 28
    • 77955394210 scopus 로고    scopus 로고
    • Secure communications through Rayleigh fading SIMO channel with multiple eavesdroppers
    • Cape Town, South Africa, May
    • M. Z. I. Sarkar and T. Ratnarajah, "Secure communications through Rayleigh fading SIMO channel with multiple eavesdroppers," in Proc. IEEE Int. Conference on Communications (ICC), Cape Town, South Africa, May 2010.
    • (2010) Proc. IEEE Int. Conference on Communications (ICC)
    • Sarkar, M.Z.I.1    Ratnarajah, T.2
  • 29
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper and friendly jammer
    • Jun., special issue on Wireless Physical Layer Security
    • Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Communications and Networking, Jun. 2009, special issue on Wireless Physical Layer Security.
    • (2009) EURASIP J. Wireless Communications and Networking
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjorungnes, A.4
  • 31
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug
    • Q. Li and W. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.2
  • 36
    • 0029214373 scopus 로고
    • Information capacity and power control in single-cell multiuser communications
    • Seattle, WA Jun.
    • R. Knopp and P. A. Humblet, "Information capacity and power control in single-cell multiuser communications," in IEEE Int. Conference on Communications (ICC), vol. 1, Seattle, WA, Jun. 1995, pp. 331-335.
    • (1995) IEEE Int. Conference on Communications (ICC) , vol.1 , pp. 331-335
    • Knopp, R.1    Humblet, P.A.2
  • 38
    • 58649109373 scopus 로고    scopus 로고
    • Distributed detection in the presence of Byzantine attack
    • Jan
    • S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attack," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.1 , pp. 16-29
    • Marano, S.1    Matta, V.2    Tong, L.3
  • 39
    • 34547488337 scopus 로고    scopus 로고
    • Robust detection of selfish misbehavior in wireless networks
    • DOI 10.1109/JSAC.2007.070807
    • A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007. (Pubitemid 47171203)
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , Issue.6 , pp. 1124-1134
    • Toledo, A.L.1    Wang, X.2
  • 40
    • 0036530960 scopus 로고    scopus 로고
    • Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading
    • DOI 10.1109/49.995511, PII S0733871602032948
    • A. Algans, K. I. Pedersen, and P. E. Mogensen, "Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading," IEEE J. Sel. Areas Commun., vol. 20, no. 3, pp. 523- 531, Apr. 2002. (Pubitemid 34554892)
    • (2002) IEEE Journal on Selected Areas in Communications , vol.20 , Issue.3 , pp. 523-531
    • Algans, A.1    Pedersen, K.I.2    Mogensen, P.E.3
  • 41
    • 84877673847 scopus 로고    scopus 로고
    • A new neighbor discovery scheme based on spatial correlation of wireless channel
    • Barcelona, Spain Apr.
    • L. Woongsup and C. Dong-Ho, "A new neighbor discovery scheme based on spatial correlation of wireless channel," in Proc. IEEE Vehicular Technology Conference (VTC-Spring), Barcelona, Spain, Apr. 2009.
    • (2009) Proc. IEEE Vehicular Technology Conference (VTC-Spring)
    • Woongsup, L.1    Dong-Ho, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.