메뉴 건너뛰기




Volumn , Issue , 2013, Pages 505-513

Efficient wireless security through jamming, coding and routing

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMMUNICATION; COMPLEX NETWORKS; CONSTRAINED OPTIMIZATION; ENERGY UTILIZATION; JAMMING; NETWORK LAYERS; POLYNOMIAL APPROXIMATION; WIRELESS NETWORKS;

EID: 84890887487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2013.6645022     Document Type: Conference Paper
Times cited : (15)

References (34)
  • 1
    • 0002503713 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, Communication theory of secrecy systems. AT&T, 1949
    • (1949) AT&T
    • Shannon, C.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, vol. 24, no. 3, 1978
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3
    • Csiszár, I.1    Korner, J.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory, vol. 39, no. 3, 1993
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3
    • Maurer, U.M.1
  • 6
    • 45249104850 scopus 로고    scopus 로고
    • Wireless information-Theoretic security
    • M. Bloch et al. Wireless information-Theoretic security. IEEE Trans. Inf. Theory, vol. 54, no. 6, 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6
    • Bloch, M.1
  • 7
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun., vol. 7, no. 6, 2008
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6
    • Goel, S.1    Negi, R.2
  • 8
    • 45249101530 scopus 로고    scopus 로고
    • The general gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming
    • E. Tekin and A. Yener. The general Gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory, vol. 54, no. 6, 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6
    • Tekin, E.1    Yener, A.2
  • 9
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • L. Dong et al. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process., vol. 58, no. 3, 2010
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3
    • Dong, L.1
  • 10
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory, vol. 54, no. 9, 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9
    • Lai, L.1    El Gamal, H.2
  • 11
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • D. Goeckel et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J. Sel. Areas Commun., vol. 29, no. 10, 2011
    • (2011) IEEE J. Sel. Areas Commun , vol.29 , Issue.10
    • Goeckel, D.1
  • 12
    • 84863157582 scopus 로고    scopus 로고
    • Robust secure transmission in miso channels with imperfect ecsi
    • Dec
    • J. Huang and A. L. Swindlehurst. Robust secure transmission in MISO channels with imperfect ECSI. in IEEE Globecom, Dec. 2011
    • (2011) IEEE Globecom
    • Huang, J.1    Swindlehurst, A.L.2
  • 13
    • 78649286561 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Jun
    • M. Haenggi. The secrecy graph and some of its properties. in IEEE ISIT, Jun. 2008
    • (2008) IEEE ISIT
    • Haenggi, M.1
  • 14
    • 84890880878 scopus 로고    scopus 로고
    • Physical-layer security in stochastic wireless networks
    • Nov
    • P. Pinto, J. Barros, and M. Win. Physical-layer security in stochastic wireless networks. in IEEE ICCS, Nov. 2008
    • (2008) IEEE ICCS
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 15
    • 84890867325 scopus 로고    scopus 로고
    • Wireless physical-layer security: The case of colluding eavesdroppers
    • Jun
    • P. Pinto, J. Barros, and M. Win. Wireless physical-layer security: The case of colluding eavesdroppers. in IEEE ISIT, Jun. 2009
    • (2009) IEEE ISIT
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 16
    • 84890883378 scopus 로고    scopus 로고
    • Secrecy throughput of manets with malicious nodes
    • Jun
    • Y. Liang, H. Poor, and L. Ying. Secrecy throughput of MANETs with malicious nodes. in IEEE ISIT, Jun. 2009
    • (2009) IEEE ISIT
    • Liang, Y.1    Poor, H.2    Ying, L.3
  • 17
    • 84890873998 scopus 로고    scopus 로고
    • On secrecy capacity scaling in wireless networks
    • Feb
    • O. Koyluoglu, E. Koksal, and H. El Gamal. On secrecy capacity scaling in wireless networks. in IEEE ITA, Feb. 2010
    • (2010) IEEE ITA
    • Koyluoglu, O.1    Koksal, E.2    El Gamal, H.3
  • 18
    • 85053985067 scopus 로고    scopus 로고
    • Security-capacity trade-off in large wireless networks using keyless secrecy
    • Sep
    • S. Vasudevan et al. Security-capacity trade-off in large wireless networks using keyless secrecy. in ACM Mobihoc, Sep. 2010
    • (2010) ACM Mobihoc
    • Vasudevan, S.1
  • 19
    • 62149087803 scopus 로고    scopus 로고
    • Distributed transmit beamforming: Challenges and recent progress
    • R. Mudumbai et al. Distributed transmit beamforming: Challenges and recent progress. IEEE Commun. Mag., vol. 47, no. 2, 2009
    • (2009) IEEE Commun. Mag , vol.47 , Issue.2
    • Mudumbai, R.1
  • 20
    • 84890880116 scopus 로고    scopus 로고
    • Fully wireless implementation of distributed beamforming on a software-defined radio platform
    • M. Rahman et al. Fully wireless implementation of distributed beamforming on a software-defined radio platform. in IEEE IPSN, 2012
    • (2012) IEEE IPSN
    • Rahman, M.1
  • 21
    • 84863174459 scopus 로고    scopus 로고
    • Coordinated multipoint transmission and reception in lte-Advanced: Deployment scenarios and operational challenges
    • D. Lee et al. Coordinated multipoint transmission and reception in LTE-Advanced: Deployment scenarios and operational challenges. IEEE Commun. Mag., vol. 50, no. 2, 2012
    • (2012) IEEE Commun. Mag , vol.50 , Issue.2
    • Lee, D.1
  • 22
    • 84877658480 scopus 로고    scopus 로고
    • Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback
    • Dec
    • F. Quitin et al. Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback. in IEEE Glebecom, Dec. 2012
    • (2012) IEEE Glebecom
    • Quitin, F.1
  • 23
    • 84890883636 scopus 로고    scopus 로고
    • A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept
    • submitted to
    • F. Quitin et al. A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept. submitted to IEEE Trans. Wireless Commun., 2012
    • (2012) IEEE Trans. Wireless Commun
    • Quitin, F.1
  • 24
    • 70450164574 scopus 로고    scopus 로고
    • A survey of secure mobile ad hoc routing protocols
    • L. Abusalah et al. A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surveys Tuts., vol. 10, no. 4, 2008
    • (2008) IEEE Commun. Surveys Tuts , vol.10 , Issue.4
    • Abusalah, L.1
  • 25
    • 60049091288 scopus 로고    scopus 로고
    • Spread: Improving network security by multipath routing in mobile ad hoc networks
    • W. Lou et al. SPREAD: Improving network security by multipath routing in mobile ad hoc networks. ACM Wireless Nets., 2009
    • (2009) ACM Wireless Nets
    • Lou, W.1
  • 26
    • 77952986444 scopus 로고    scopus 로고
    • Secure data collection in wireless sensor networks using randomized dispersive routes
    • T. Shu, M. Krunz, and S. Liu. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput., vol. 9, no. 7, 2010
    • (2010) IEEE Trans. Mobile Comput , vol.9 , Issue.7
    • Shu, T.1    Krunz, M.2    Liu, S.3
  • 27
    • 84890866044 scopus 로고    scopus 로고
    • Efficient wireless security through jamming, coding and routing
    • Online Available
    • M. Ghaderi, D. Goeckel, A. Orda, and M. Dehghan. Efficient wireless security through jamming, coding and routing. Tech. Rep. [Online]. Available: Http://arxiv.org/abs/1304.2688
    • Tech. Rep
    • Ghaderi, M.1    Goeckel, D.2    Orda, A.3    Dehghan, M.4
  • 30
    • 84866730731 scopus 로고    scopus 로고
    • Energy efficiency of cooperative jamming strategies in secure wireless networks
    • M. Dehghan et al. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wireless Commun., 2012
    • (2012) IEEE Trans. Wireless Commun
    • Dehghan, M.1
  • 31
    • 84868585200 scopus 로고    scopus 로고
    • Receiver-coordinated distributed transmit nullforming with channel state uncertainty
    • Mar
    • D. R. Brown et al. Receiver-coordinated distributed transmit nullforming with channel state uncertainty. in CISS, Mar. 2012
    • (2012) CISS
    • Brown, D.R.1
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 1979
    • (1979) Commun. ACM
    • Shamir, A.1
  • 34
    • 0035364530 scopus 로고    scopus 로고
    • A simple efficient approximation scheme for the restricted shortest path problem
    • D. H. Lorenz and D. Raz. A simple efficient approximation scheme for the restricted shortest path problem. Oper. Res. Lett., vol. 28, 1999
    • (1999) Oper. Res. Lett , vol.28
    • Lorenz, D.H.1    Raz, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.