메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1672-1686

Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel

Author keywords

Amplify and forward relay; colluding eavesdroppers; frequency selective; Full duplex relay; Interference neutralization; Interference relay channel; multi antenna systems; Non potent relay; secrecy rate; worst case secrecy rate

Indexed keywords

AMPLIFY-AND-FORWARD RELAYS; COLLUDING EAVESDROPPERS; FREQUENCY-SELECTIVE; FULL-DUPLEX RELAYS; INTERFERENCE NEUTRALIZATIONS; INTERFERENCE RELAY CHANNELS; MULTI-ANTENNA SYSTEMS; NON-POTENT RELAY;

EID: 84883365784     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130903     Document Type: Article
Times cited : (22)

References (38)
  • 1
    • 84890471050 scopus 로고    scopus 로고
    • Efficient Information Leakage Neutralization on a Relay-assisted Multi-carrier Interference Channel
    • Z. K.-M. Ho, E. Jorswieck, and S. Gerbracht, "Efficient Information Leakage Neutralization on a Relay-assisted Multi-carrier Interference Channel," in Proc. ICASSP, 2013.
    • (2013) Proc. ICASSP
    • Ho, Z.K.-M.1    Jorswieck, E.2    Gerbracht, S.3
  • 2
    • 54149102613 scopus 로고    scopus 로고
    • Wireless future: Ubiquitous computing
    • F. Mattern, "Wireless Future : Ubiquitous Computing," in Proc. Wireless Congress, 2004, pp. 1-10.
    • (2004) Proc. Wireless Congress
    • Mattern, F.1
  • 6
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. D. Wyner, "The Wiretap Channel," Bell Systems Technology J., vol. 54, pp. 1355- 1387, 1975.
    • (1975) Bell Systems Technology J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 8
    • 84858162419 scopus 로고    scopus 로고
    • Information and inference in the wireless physical layer
    • Feb
    • H. V. Poor, "Information and Inference in the Wireless Physical Layer," IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 40-47, Feb. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.19 , Issue.1 , pp. 40-47
    • Poor, H.V.1
  • 9
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar
    • G. Zheng, L. C. Choo, and K. K. Wong, "Optimal Cooperative Jamming To Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.C.2    Wong, K.K.3
  • 11
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct
    • J. Huang and A. L. Swindlehurst, "Cooperative Jamming for Secure Communications in MIMO Relay Networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 12
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept
    • L. Lai and H. El Gamal, "The Relay-Eavesdropper Channel: Cooperation for Secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 13
    • 84870266491 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy with multiple antennas at the helper
    • Dec
    • R. Bassily and S. Ulukus, "Deaf Cooperation for Secrecy with Multiple Antennas at the Helper," IEEE Trans. Inf. Forens. Security, vol. 7, no. 6, pp. 1855- 1864, Dec. 2012.
    • (2012) IEEE Trans. Inf. Forens. Security , vol.7 , Issue.6 , pp. 1855-1864
    • Bassily, R.1    Ulukus, S.2
  • 14
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 15
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct
    • D. W.-K. Ng, E. S. Lo, and R. Schober, "Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.W.-K.1    Lo, E.S.2    Schober, R.3
  • 16
    • 85008537206 scopus 로고    scopus 로고
    • Secure communication in multiple relay networks through decode-and-forward strategies
    • Aug.
    • R. Bassily and S. Ulukus, "Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies," J. Communications and Networks, vol. 14, no. 4, pp. 352-363, Aug. 2012.
    • (2012) J. Communications and Networks , vol.14 , Issue.4 , pp. 352-363
    • Bassily, R.1    Ulukus, S.2
  • 17
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation With an Untrusted Relay: A Secrecy Perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 18
    • 79960924789 scopus 로고    scopus 로고
    • Link adaptation for fixed relaying with untrusted relays: Transmission strategy design and performance analysis
    • H. Khodakarami and F. Lahouti, "Link Adaptation for Fixed Relaying with Untrusted Relays: Transmission Strategy Design and Performance Analysis," in Proc. International Conference on Telecommunications, 2011, pp. 309-314.
    • (2011) Proc. International Conference on Telecommunications , pp. 309-314
    • Khodakarami, H.1    Lahouti, F.2
  • 19
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I. M. Kim, and D. I. Kim, "Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310- 325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.M.2    Kim, D.I.3
  • 21
    • 80051775150 scopus 로고    scopus 로고
    • Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
    • Set
    • X.-W. Wang, M.-X. Tao, J.-H. Mo, and Y.-Y. Xu, "Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 693-702, Sept. 2011.
    • (2011) IEEE Trans. Inf. Forens. Security , vol.6 , Issue.3 , pp. 693-702
    • Wang, X.-W.1    Tao, M.-X.2    Mo, J.-H.3    Xu, Y.-Y.4
  • 22
    • 84863913546 scopus 로고    scopus 로고
    • Physical-layer secrecy for OFDM transmissions over fading channels
    • Aug
    • F. Renna, N. Laurenti, and H. V. Poor, "Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forens. Security , vol.7 , Issue.4 , pp. 1354-1367
    • Renna, F.1    Laurenti, N.2    Poor, H.V.3
  • 23
    • 80054058314 scopus 로고    scopus 로고
    • Optimal power allocation for secure multicarrier relay systems
    • Nov
    • C. Jeong and I.-M. Kim, "Optimal Power Allocation for Secure Multicarrier Relay Systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.11 , pp. 5428-5442
    • Jeong, C.1    Kim, I.-M.2
  • 24
    • 68949180348 scopus 로고    scopus 로고
    • Recent advances in amplifyand- forward two-hop relaying
    • July
    • S. Berger, M. Kuhn, and A. Wittneben, "Recent Advances in Amplifyand- Forward Two-Hop Relaying," IEEE Commun. Mag., vol. 47, no. 7, pp. 50-56, July 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.7 , pp. 50-56
    • Berger, S.1    Kuhn, M.2    Wittneben, A.3
  • 26
    • 35148881115 scopus 로고    scopus 로고
    • Relay networks with delays
    • DOI 10.1109/TIT.2007.904838, Special issue on Models, Theory, and Codes for Relaying and Cooperation in Communication Network
    • A. El Gamal, N. Hassanpour, and J. Mammen, "Relay Networks With Delays," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3413-3431, Oct. 2007. (Pubitemid 47541879)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.10 , pp. 3413-3431
    • El Gamal, A.1    Hassanpour, N.2    Mammen, J.3
  • 27
    • 65749120701 scopus 로고    scopus 로고
    • Degrees of freedom of wireless networks with relays, feedback, co-operation and full duplex operation
    • May
    • V. R. Cadambe and S. A. Jafar, "Degrees of Freedom of Wireless Networks with Relays, Feedback, Co-operation and Full Duplex Operation," IEEE Trans. Inf. Theory, vol. 55, no. 5, pp. 2334-2344, May 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.5 , pp. 2334-2344
    • Cadambe, V.R.1    Jafar, S.A.2
  • 33
    • 33847627548 scopus 로고    scopus 로고
    • Cooperative distributed multiuser MSE relaying in wireless ad-hoc networks
    • 1599923, Conference Record of The Thirty-Ninth Asilomar Conference on Signals, Systems and Computers
    • S. Berger and A. Wittneben, "Cooperative Distributed Multiuser MMSE Relaying in Wireless Ad-Hoc Networks," in Proc. Asilomar Conference on Signals, Systems and Computers, 2005, pp. 1072-1076. (Pubitemid 46350478)
    • (2005) Conference Record - Asilomar Conference on Signals, Systems and Computers , vol.2005 , pp. 1072-1076
    • Berger, S.1    Wittneben, A.2
  • 34
    • 33847736358 scopus 로고    scopus 로고
    • Spectral efficient protocols for half-duplex fading relay channels
    • DOI 10.1109/JSAC.2007.070213
    • B. Rankov and A. Wittneben, "Spectral Efficient Protocols for Halfduplex Fading Relay Channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , Issue.2 , pp. 379-389
    • Rankov, B.1    Wittneben, A.2
  • 35
    • 84870449931 scopus 로고    scopus 로고
    • Instantaneous relaying: Optimal strategies and interference neutralization
    • Dec
    • Z. K.-M. Ho and E. Jorswieck, "Instantaneous Relaying: Optimal Strategies and Interference Neutralization," IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6655- 6668, Dec. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.12 , pp. 6655-6668
    • Ho, Z.K.-M.1    Jorswieck, E.2
  • 38
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
    • Nov
    • A. Khisti and G. Wornell, "Secure Transmission with Multiple Antennas- Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515- 5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.