메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2160-2164

The eavesdropping and Jamming Dilemma in multi-channel communications

Author keywords

[No Author keywords available]

Indexed keywords

BEAMFORMING; JAMMING;

EID: 84891361828     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2013.6654847     Document Type: Conference Paper
Times cited : (30)

References (35)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. J., 28, pp. 656-715, 1949.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A.D., The wire-tap channel. Bell Sys. Tech. J., 54, pp. 1355- 1387, 1975.
    • (1975) Bell Sys. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Csiszár, I., and Körner, J., Broadcast channels with confidential messages, IEEE Trans. Inform. Theory, 24, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 45249119255 scopus 로고    scopus 로고
    • Secure communications over fading channels
    • Liang, Y., Poor, H.V., and Shamai, S., Secure communications over fading channels, IEEE Trans. Inform. Theory, 54, pp.2470-2492, 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 12
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multi-antenna transmission
    • Li, Z., Trappe, W., and Yates, R., Secret Communication via Multi-antenna Transmission, CISS2007, pp. 905-910, 2007.
    • (2007) CISS2007 , pp. 905-910
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 13
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas i: The misome wiretap channel
    • Khisti, A., and Wornell, G., Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel, IEEE Trans. Inform. Theory, 56, pp. 3088-3104, 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 14
    • 45249085230 scopus 로고    scopus 로고
    • Secure communication with a fading eavesdropper channel
    • Li, Z., Yates, R., and Trappe, W., Secure Communication with a Fading Eavesdropper Channel, IEEE ISIT 2007, pp. 1296-1300.
    • (2007) IEEE ISIT , pp. 1296-1300
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 23
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO gaussian fading channels
    • Kashyap, A., Basar, T., and Srikant, R. Correlated Jamming on MIMO Gaussian Fading Channels, IEEE Trans. Inform. Theory, 50, pp. 2119- 2123, 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 25
  • 26
    • 63749110244 scopus 로고    scopus 로고
    • A game-theoretic analysis of denial of service attacks in wireless random access
    • Sagduyu, Y.E., and Ephremides, A., A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access, Journal of Wireless Networks, 15, pp. 651-666, 2009.
    • (2009) Journal of Wireless Networks , vol.15 , pp. 651-666
    • Sagduyu, Y.E.1    Ephremides, A.2
  • 28
    • 84890820289 scopus 로고    scopus 로고
    • Combined power control and transmission selection in cellular networks
    • Kim, S.L., Rosberg, Z., and Zander, J., Combined power control and transmission selection in cellular networks. IEEE VTC 1999.
    • (1999) IEEE VTC
    • Kim, S.L.1    Rosberg, Z.2    Zander, J.3
  • 29
    • 0032658512 scopus 로고    scopus 로고
    • Analysis of erlang capacity for the multimedia DS-CDMA systems
    • Koo, I., Ahn, J., Lee, H.A., and Kim, K., Analysis of Erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals, E82- A(5), pp.849-855, 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82- A , Issue.5 , pp. 849-855
    • Koo, I.1    Ahn, J.2    Lee, H.A.3    Kim, K.4
  • 31
    • 85184305615 scopus 로고    scopus 로고
    • Dependence of optimal monitoring strategy on the application to be protected
    • Garnaev, A., Trappe, W., Kung, C.-T., Dependence of Optimal Monitoring Strategy on the Application to be Protected. IEEE Globecom 2012, pp. 1072-1077.
    • (2012) IEEE Globecom , pp. 1072-1077
    • Garnaev, A.1    Trappe, W.2    Kung, C.-T.3
  • 33
    • 77349115760 scopus 로고    scopus 로고
    • Fair resource allocation in wireless networks in the presence of a jammer
    • Altman E., Avrachenkov K., Garnaev A., Fair Resource Allocation in Wireless Networks in the Presence of a Jammer. Performance Evaluation, 67, pp.338-349, 2010.
    • (2010) Performance Evaluation , vol.67 , pp. 338-349
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.