메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1275-1279

Impersonation attack identification for secure communication

Author keywords

Impersonation attack; physical layer security; power delay profile; probability of detection; probability of false alarm

Indexed keywords

ERRORS; NETWORK LAYERS; SIGNAL RECEIVERS; TRANSMITTERS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84902972008     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOMW.2013.6825169     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Systems Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 5
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2010.
    • (2010) IEEE Transactions on Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.3    Poor, H.4
  • 6
    • 65949122325 scopus 로고    scopus 로고
    • Message-driven frequency hopping: Design and analysis
    • Q. Ling and T. Li, "Message-driven frequency hopping: Design and analysis," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1773-1782, 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1773-1782
    • Ling, Q.1    Li, T.2
  • 7
    • 80052337836 scopus 로고    scopus 로고
    • Secret key generation exploiting channel characteristics in wireless communications
    • K. Ren, H. Su, and Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Communications, vol. 18, no. 4, pp. 6-12, 2011.
    • (2011) IEEE Wireless Communications , vol.18 , Issue.4 , pp. 6-12
    • Ren, K.1    Su, H.2    Wang, Q.3
  • 10
    • 0031145907 scopus 로고    scopus 로고
    • A new path-gain/delay-spread propagation model for digital cellular channels
    • L. Greenstein, V. Erceg, Y. Yeh, and M. Clark, "A new path-gain/delay-spread propagation model for digital cellular channels," Vehicular Technology, IEEE Transactions on, vol. 46, no. 2, pp. 477-485, 1997.
    • (1997) Vehicular Technology, IEEE Transactions on , vol.46 , Issue.2 , pp. 477-485
    • Greenstein, L.1    Erceg, V.2    Yeh, Y.3    Clark, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.