메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1555-1559

Joint transmit design and node selection for one-way and two-way untrusted relay channels

Author keywords

[No Author keywords available]

Indexed keywords

JAMMING; RELAY CONTROL SYSTEMS;

EID: 84901257838     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2013.6810558     Document Type: Conference Paper
Times cited : (24)

References (14)
  • 1
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 2
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 3
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 4
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Oct
    • J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 5
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 6
    • 78751521977 scopus 로고    scopus 로고
    • Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers
    • Jun.
    • A. Mukherjee and A. Swindlehurst, "Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers," in Proc. 11th IEEE SPAWC, Jun. 2010, pp. 1-5.
    • (2010) Proc. 11th IEEE SPAWC , pp. 1-5
    • Mukherjee, A.1    Swindlehurst, A.2
  • 7
    • 84863956395 scopus 로고    scopus 로고
    • Improving wireless security for bidirectional communication scenarios
    • Jul
    • Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2842-2848
    • Ding, Z.1    Xu, M.2    Lu, J.3    Liu, F.4
  • 8
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Jul
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 9
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.2    Kim, D.3
  • 10
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 11
    • 79551634548 scopus 로고    scopus 로고
    • Physical layer security for two way relay communications with friendly jammers
    • Dec.
    • R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-6
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4    Debbah, M.5
  • 13
    • 0001560954 scopus 로고
    • Information geometry and alternating minimization procedures
    • I. Csisźar and G. Tusńady, "Information geometry and alternating minimization procedures," Statistics and decisions, no. 1, pp. 205-237, 1984.
    • (1984) Statistics and Decisions , Issue.1 , pp. 205-237
    • Csisźar, I.1    Tusńady, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.