메뉴 건너뛰기




Volumn 13, Issue 4, 2014, Pages 1790-1805

Secure communications with untrusted secondary nodes in cognitive radio networks

Author keywords

Amplify and forward relay protocol; cognitive radio; eavesdropping; information theoretic secrecy; untrusted secondary users; wiretap channel

Indexed keywords

INFORMATION THEORY;

EID: 84899917172     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2013.021214.130089     Document Type: Article
Times cited : (36)

References (47)
  • 1
    • 42649092608 scopus 로고    scopus 로고
    • A survey on spectrum management in cognitive radio networks
    • Apr.
    • I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.4 , pp. 40-48
    • Akyildiz, I.F.1    Lee, W.2    Vuran, M.C.3    Mohanty, S.4
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csisźar and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csisźar, I.1    Körner, J.2
  • 5
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 6
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 7
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-part II: The MISOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part II: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 9
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple-antenna wiretap channel
    • June
    • T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 10
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 11
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • June
    • R. Liu, I. Maric, P. Spasojevíc, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevíc, P.3    Yates, R.D.4
  • 16
    • 80051775152 scopus 로고    scopus 로고
    • Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
    • Sept.
    • A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 585-594, Sept. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 585-594
    • Subramanian, A.1    Thangaraj, A.2    Bloch, M.3    McLaughlin, S.W.4
  • 18
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 24
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," in Proc. 2000 EUROCRYPT, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, pp. 351-368.
    • Proc. 2000 EUROCRYPT, Lecture Notes in Computer Science , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 27
    • 80051757604 scopus 로고    scopus 로고
    • An information secrecy game in cognitive radio networks
    • Sept.
    • Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 831-842
    • Wu, Y.1    Liu, K.J.R.2
  • 28
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • Jan.
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134-145
    • Stanojev, I.1    Yener, A.2
  • 29
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y. Liang, L. Zhang, K. Teh, and K. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.2    Zhang, L.3    Teh, K.4    Li, K.5
  • 30
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 31
    • 61349186445 scopus 로고    scopus 로고
    • Capacity of cognitive interference channels with and without secrecy
    • Feb.
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verd́u, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 604-619
    • Liang, Y.1    Somekh-Baruch, A.2    Poor, H.V.3    Shamai, S.4    Verd́u, S.5
  • 32
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. 2001 IEEE Inf. Theory Workshop, pp. 87-89.
    • Proc. 2001 IEEE Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 33
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: a secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 34
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.3
  • 35
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec.
    • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 36
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • Sept.
    • X. Tang, R. Liu, P. Spasojevíc, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevíc, P.3    Poor, H.V.4
  • 39
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 40
    • 84866621680 scopus 로고    scopus 로고
    • A closed-form power allocation for minimizing secrecy outage probability for miso wiretap channels via masked beamforming
    • Sept.
    • J. Xiong, K.-K. Wong, D. Ma, and J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for miso wiretap channels via masked beamforming," IEEE Commun. Lett., vol. 16, no. 9, pp. 1496-1499, Sept. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.9 , pp. 1496-1499
    • Xiong, J.1    Wong, K.-K.2    Ma, D.3    Wei, J.4
  • 41
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 42
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part I: Connectivity
    • Feb.
    • P. Pinto, J. Barros, and M. Win, "Secure communication in stochastic wireless networks-part I: connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 43
    • 84855911932 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
    • Feb.
    • -, "Secure communication in stochastic wireless networks-part II: maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 139-147
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 44
    • 84860255627 scopus 로고    scopus 로고
    • On the secrecy capacity scaling in wireless networks
    • May
    • O. Koyluoglu, C. Koksal, and H. El Gamal, "On the secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.1    Koksal, C.2    El Gamal, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.