메뉴 건너뛰기




Volumn 62, Issue 9, 2014, Pages 2185-2199

Secure beamforming for MIMO two-way communications with an untrusted relay

Author keywords

Physical layer security; signal alignment; two way relaying; untrusted relay.

Indexed keywords

ALGORITHMS; ASYMPTOTIC ANALYSIS; NETWORK LAYERS; STRUCTURAL OPTIMIZATION;

EID: 84898039745     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2014.2307276     Document Type: Article
Times cited : (124)

References (38)
  • 2
    • 67650587787 scopus 로고    scopus 로고
    • Optimal beamforming for two-way multi-antenna relay channel with analogue network coding
    • R. Zhang, Y.-C. Liang, C. C. Chai, and S. Cui, "Optimal beamforming for two-way multi-antenna relay channel with analogue network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 699-712, 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.5 , pp. 699-712
    • Zhang, R.1    Liang, Y.-C.2    Chai, C.C.3    Cui, S.4
  • 3
    • 79957663476 scopus 로고    scopus 로고
    • Optimal design of spatial source-and-relaymatrices for a non-regenerative two-way MIMO relay system
    • May
    • S.Xu and Y. Hua, "Optimal design of spatial source-and-relaymatrices for a non-regenerative two-way MIMO relay system," IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1645-1655, May 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.5 , pp. 1645-1655
    • Xu, S.1    Hua, Y.2
  • 4
    • 84863182638 scopus 로고    scopus 로고
    • Joint source and relay precoding designs for MIMO two-way relaying based on MSE criterion
    • Mar.
    • R. Wang and M. Tao, "Joint source and relay precoding designs for MIMO two-way relaying based on MSE criterion," IEEE Trans. Signal Process., vol. 60, no. 3, pp. 1352-1365, Mar. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.3 , pp. 1352-1365
    • Wang, R.1    Tao, M.2
  • 5
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 6
    • 80054058314 scopus 로고    scopus 로고
    • Optimal power allocation for secure multicarrier relay systems
    • Nov.
    • C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.11 , pp. 5428-5442
    • Jeong, C.1    Kim, I.-M.2
  • 7
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.3    Poor, H.4
  • 8
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 9
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.1    Lo, E.2    Schober, R.3
  • 10
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.2
  • 11
    • 84862571591 scopus 로고    scopus 로고
    • Relay placement for physical layer security: A secure connection perspective
    • Jun.
    • J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.6 , pp. 878-881
    • Mo, J.1    Tao, M.2    Liu, Y.3
  • 12
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb.
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 13
    • 84863956395 scopus 로고    scopus 로고
    • Improving wireless security for bidirectional communication scenarios
    • Jul.
    • Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2842-2848
    • Ding, Z.1    Xu, M.2    Lu, J.3    Liu, F.4
  • 15
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 16
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • H.-M. W. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.W.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 17
    • 80051749392 scopus 로고    scopus 로고
    • Physical-layer secret key agreement in two-way wireless relaying systems
    • Sep.
    • T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 650-660
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 18
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 19
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. Inf. Theory Workshop, 2001, pp. 87-89.
    • (2001) Proc. Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 20
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • Dec. 4
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Dec. 4, 2008, pp. 1-5.
    • (2008) Proc. IEEE Global Telecommun. Conf. , pp. 1-5
    • He, X.1    Yener, A.2
  • 21
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • 10, May
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wirel. Commun. Netw., vol. 2009, pp. 9:1-9:10, May 2009.
    • (2009) EURASIP J. Wirel. Commun. Netw. , vol.2009 , Issue.9 , pp. 1-9
    • He, X.1    Yener, A.2
  • 22
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, H.4
  • 23
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 24
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 25
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 26
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • J. Huang, A. Mukherjee, and A. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.3
  • 27
    • 33847736358 scopus 로고    scopus 로고
    • Spectral efficient protocols for half-duplex fading relay channels
    • DOI 10.1109/JSAC.2007.070213
    • B. Rankov and A. Wittneben, "Spectral efficient protocols for halfduplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , Issue.2 , pp. 379-389
    • Rankov, B.1    Wittneben, A.2
  • 28
    • 55349107839 scopus 로고    scopus 로고
    • Performance bounds for bidirectional coded cooperation protocols
    • Aug.
    • S. J. Kim, P. Mitran, and V. Tarokh, "Performance bounds for bidirectional coded cooperation protocols," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5253-5241, Aug. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5253-5241
    • Kim, S.J.1    Mitran, P.2    Tarokh, V.3
  • 29
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 30
    • 85032752455 scopus 로고    scopus 로고
    • Semidefinite relaxation of quadratic optimization problems
    • Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, 2010.
    • (2010) IEEE Signal Process. Mag. , vol.27 , Issue.3 , pp. 20-34
    • Luo, Z.-Q.1    Ma, W.-K.2    So, A.-C.3    Ye, Y.4    Zhang, S.5
  • 31
    • 77953745487 scopus 로고    scopus 로고
    • Degrees of freedom of the MIMO y channel: Signal space alignment for network coding
    • Jul.
    • N. Lee, J.-B. Lim, and J. Chun, "Degrees of freedom of the MIMO y channel: Signal space alignment for network coding," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3332-3342, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3332-3342
    • Lee, N.1    Lim, J.-B.2    Chun, J.3
  • 34
    • 84966204312 scopus 로고
    • Numerical methods for computing angles between linear subspaces
    • A. Bjorck and G. H. Golub, "Numerical methods for computing angles between linear subspaces," Math. Comput., vol. 27, no. 123, pp. 579-594, 1973.
    • (1973) Math. Comput. , vol.27 , Issue.123 , pp. 579-594
    • Bjorck, A.1    Golub, G.H.2
  • 35
    • 76949097504 scopus 로고    scopus 로고
    • Power allocation for F/TDMA multiuser two-way relay networks
    • M. Chen and A. Yener, "Power allocation for F/TDMA multiuser two-way relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 546-551, 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.2 , pp. 546-551
    • Chen, M.1    Yener, A.2
  • 36
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Jun.
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 37
    • 80455134900 scopus 로고    scopus 로고
    • Fractional QCQP with applications in ML steering direction estimation for radar detection
    • A. De Maio, Y. Huang, D. Palomar, S. Zhang, and A. Farina, "Fractional QCQP with applications in ML steering direction estimation for radar detection," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 172-185, 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 172-185
    • De Maio, A.1    Huang, Y.2    Palomar, D.3    Zhang, S.4    Farina, A.5
  • 38
    • 79957939502 scopus 로고    scopus 로고
    • New results on hermitian matrix rank-one decomposition
    • W. Ai, Y. Huang, and S. Zhang, "New results on hermitian matrix rank-one decomposition," Math. Programm., vol. 128, no. 1-2, pp. 253-283, 2011.
    • (2011) Math. Programm. , vol.128 , Issue.1-2 , pp. 253-283
    • Ai, W.1    Huang, Y.2    Zhang, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.