메뉴 건너뛰기




Volumn 8, Issue 11, 2013, Pages 1802-1814

Enhancing secrecywith multi-antenna transmission in wireless ad hoc networks

Author keywords

Ad hoc networks; Artificial noise; Multi antenna transmission; Outage probability; Physical layer security; Power allocation; Throughput optimization

Indexed keywords

ARTIFICIAL NOISE; MULTI-ANTENNA TRANSMISSION; OUTAGE PROBABILITY; PHYSICAL-LAYER SECURITIES; POWER ALLOCATIONS; THROUGHPUT OPTIMIZATION;

EID: 84887058800     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2279842     Document Type: Conference Paper
Times cited : (118)

References (42)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 52349090496 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Toronto, Canada, Jul.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008, pp. 524-528.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 524-528
    • Oggier, F.1    Hassibi, B.2
  • 5
    • 77953712316 scopus 로고    scopus 로고
    • On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
    • Princeton, NU, USA, Mar.
    • H.Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. Annu. Conf. Inf. Sci. Syst., Princeton, NU, USA, Mar. 2010, pp. 1-6.
    • (2010) Proc. Annu. Conf. Inf. Sci. Syst. , pp. 1-6
    • Wang, H.1    Lightfoot, L.2    Li, T.3
  • 6
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 7
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 8
    • 84897584002 scopus 로고    scopus 로고
    • Jamming games in the MIMO wiretap channel with an active eavesdropper
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pp. 82-91, Jan. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.1 , pp. 82-91
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 9
    • 84878400311 scopus 로고    scopus 로고
    • Uncoordinated cooperative jamming for secret communications
    • Jul.
    • S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications," IEEE Trans. Inf. Forenics Security, vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forenics Security , vol.8 , Issue.7 , pp. 1081-1090
    • Luo, S.1    Li, J.2    Petropulu, A.P.3
  • 10
    • 70449514137 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs with malicious nodes
    • Seoul, Korea, Jun.
    • Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 1189-1193.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 1189-1193
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 11
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb.
    • X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3
  • 12
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-Part I: Connectivity
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forenics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forenics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 13
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans.Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans.Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjørungnes, A.4
  • 14
    • 84871945106 scopus 로고    scopus 로고
    • Secure node packing of large-scale wireless networks
    • Ottawa, Canada, Jun.
    • J. Lee, H. Shin, and M. Z. Win, "Secure node packing of large-scale wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012, pp. 815-819.
    • (2012) Proc. IEEE Int. Conf. Commun. , pp. 815-819
    • Lee, J.1    Shin, H.2    Win, M.Z.3
  • 17
    • 84871984718 scopus 로고    scopus 로고
    • Cooperative jamming for secrecy in decentralized wireless networks
    • Ottawa, Canada, Jun.
    • X. Zhou, M. Tao, and R. A. Kennedy, "Cooperative jamming for secrecy in decentralized wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012.
    • (2012) Proc. IEEE Int. Conf. Commun.
    • Zhou, X.1    Tao, M.2    Kennedy, R.A.3
  • 18
    • 84876278704 scopus 로고    scopus 로고
    • Distributed jamming for secure communication in Poisson fields of legitimate nodes and eavesdroppers
    • Pacific Grove, CA, USA, Nov.
    • W. Shi and J. A. Ritcey, "Distributed jamming for secure communication in Poisson fields of legitimate nodes and eavesdroppers," in Proc. Asilomar Conf. Signals, Syst., Comput., Pacific Grove, CA, USA, Nov. 2012, pp. 1881-1885.
    • (2012) Proc. Asilomar Conf. Signals, Syst., Comput. , pp. 1881-1885
    • Shi, W.1    Ritcey, J.A.2
  • 19
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 21
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 22
    • 78751535549 scopus 로고    scopus 로고
    • Cooperative jamming: The tale of friendly interference for secrecy
    • New York, NY, USA: Springer
    • X. He and A. Yener, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer. New York, NY, USA: Springer, 2010, pp. 65-88.
    • (2010) Securing Wireless Communications at the Physical Layer , pp. 65-88
    • He, X.1    Yener, A.2
  • 23
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct.
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 24
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
    • Mar.
    • W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.C.1    Chang, T.H.2    Ma, W.K.3    Chi, C.Y.4
  • 25
    • 84861304874 scopus 로고    scopus 로고
    • Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint
    • Pacific Grove, CA, USA, Nov.
    • X. Zhang, X. Zhou, and M. R. McKay, "Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint," in Proc. Asilomar Conf. Signals, Syst., Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 212-216.
    • (2011) Proc. Asilomar Conf. Signals, Syst., Comput. , pp. 212-216
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 26
    • 79952985755 scopus 로고    scopus 로고
    • On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
    • Mar.
    • S. C. Lin, T. H. Chang, Y. L. Liang, Y. W. P. Hong, and C. Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans.Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
    • (2011) IEEE Trans.Wireless Commun. , vol.10 , Issue.3 , pp. 901-915
    • Lin, S.C.1    Chang, T.H.2    Liang, Y.L.3    Hong, Y.W.P.4    Chi, C.Y.5
  • 27
    • 84861311185 scopus 로고    scopus 로고
    • Safe convex approximation to outage-basedMISO secrecy rate optimization under imperfect CSI and with artificial noise
    • Pacific Grove, CA, USA, Nov.
    • Q. Li, W. K. Ma, and A. M. C. So, "Safe convex approximation to outage-basedMISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 207-211.
    • (2011) Proc. Asilomar Conf. Signals Syst. Comput. , pp. 207-211
    • Li, Q.1    Ma, W.K.2    So, A.M.C.3
  • 28
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita,M. Ghogho, and D.McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, M.1    Ghogho, N.2    McLernon, D.3
  • 29
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr.
    • S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.A.3
  • 30
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
    • Jun.
    • X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 31
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • Sep.
    • M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Andrews, J.G.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5
  • 32
    • 77953303267 scopus 로고    scopus 로고
    • Stochastic analysis of non-slotted Aloha in wireless ad-hoc networks
    • San Diego, CA, USA, Mar.
    • B. B?aszczyszyn and P. Mühlethaler, "Stochastic analysis of non-slotted Aloha in wireless ad-hoc networks," in Proc. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE Int. Conf. Comput. Commun. , pp. 1-9
    • Baszczyszyn, B.1    Mühlethaler, P.2
  • 35
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjørungnes, A.4
  • 37
    • 84941385097 scopus 로고
    • Beweis der unmöglichkeit, algebraische gleichungen von höheren graden als dem vierten allgemein aufzulösen
    • N. H. Abel, "Beweis der unmöglichkeit, algebraische gleichungen von höheren graden als dem vierten allgemein aufzulösen," J. für die reine und angewandte Mathematik, vol. 1, pp. 65-84, 1826.
    • (1826) J. Für Die Reine und Angewandte Mathematik , vol.1 , pp. 65-84
    • Abel, N.H.1
  • 38
    • 84867511032 scopus 로고    scopus 로고
    • The topological proof of Abel-Ruffini theorem
    • H. odek, "The topological proof of Abel-Ruffini theorem," J. Juliusz Schauder Center, vol. 16, pp. 253-265, 2000.
    • (2000) J. Juliusz Schauder Center , vol.16 , pp. 253-265
    • Odek, H.1
  • 39
    • 51649110165 scopus 로고    scopus 로고
    • Single-hop connectivity in interference-limited hybrid wireless networks
    • Nice, France, Jun.
    • R. K. Ganti and M. Haenggi, "Single-hop connectivity in interference-limited hybrid wireless networks," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 366-370.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 366-370
    • Ganti, R.K.1    Haenggi, M.2
  • 40
    • 26844501347 scopus 로고    scopus 로고
    • On distances in uniformly random networks
    • DOI 10.1109/TIT.2005.855610
    • M. Haenggi, "On distances in uniformly random networks," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3584-3586, Oct. 2005. (Pubitemid 41448597)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.10 , pp. 3584-3586
    • Haenggi, M.1
  • 41
    • 58149119334 scopus 로고    scopus 로고
    • Transmission capacity of ad hoc networks with spatial diversity
    • Dec.
    • A. M. Hunter, J. Andrews, and S.Weber, "Transmission capacity of ad hoc networks with spatial diversity," IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5058-5071, Dec. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.12 , pp. 5058-5071
    • Hunter, A.M.1    Andrews, J.2    Weber, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.