메뉴 건너뛰기




Volumn 16, Issue 3, 2014, Pages 1550-1573

Principles of physical layer security in multiuser wireless networks: A survey

Author keywords

artificial noise; cooperative jamming; Information theoretic security; Physical layer security; secrecy; secret key agreement; wiretap channel

Indexed keywords

ACCESS CONTROL; INFORMATION THEORY; NETWORK LAYERS; SURVEYS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84906698210     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2014.012314.00178     Document Type: Article
Times cited : (1276)

References (303)
  • 1
    • 0023978629 scopus 로고
    • On the capacity of channels with block memory
    • Mar.
    • W. E. Stark and R. J. McEliece, "On the capacity of channels with block memory," IEEE Trans. Inf. Theory, vol. 34, no. 3, pp. 322-324, Mar. 1988.
    • (1988) IEEE Trans. Inf. Theory , vol.34 , Issue.3 , pp. 322-324
    • Stark, W.E.1    McEliece, R.J.2
  • 2
    • 4143137728 scopus 로고    scopus 로고
    • Capacity of correlated jamming channels
    • M. Medard, "Capacity of correlated jamming channels," in Proc. 35th Allerton Conf., pp. 1043-1052, 1997.
    • (1997) Proc. 35th Allerton Conf. , pp. 1043-1052
    • Medard, M.1
  • 3
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO gaussian fading channels
    • Sep.
    • A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO gaussian fading channels," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.9 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3
  • 4
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • May
    • J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 5
    • 0032164539 scopus 로고    scopus 로고
    • Cryptographic design vulnerabilities
    • Sep.
    • B. Schneier, "Cryptographic design vulnerabilities," IEEE Computer, vol. 31, no. 9, pp. 26-33, Sep. 1998.
    • (1998) IEEE Computer , vol.31 , Issue.9 , pp. 26-33
    • Schneier, B.1
  • 6
    • 77949415170 scopus 로고    scopus 로고
    • Vulnerabilities in some recently proposed RFID ownership transfer protocols
    • Mar.
    • G. Kapoor and S. Piramithu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Commun. Lett., vol. 14, no. 3, pp. 260-262, Mar. 2010.
    • (2010) IEEE Commun. Lett. , vol.14 , Issue.3 , pp. 260-262
    • Kapoor, G.1    Piramithu, S.2
  • 7
    • 84867877630 scopus 로고    scopus 로고
    • Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
    • Nov.
    • A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures," Proc. IEEE, vol. 100, no. 11, pp. 3056-3076, Nov. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.11 , pp. 3056-3076
    • Barenghi, A.1    Breveglieri, L.2    Koren, I.3    Naccache, D.4
  • 13
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," Trans. American Institute Electrical Engineers, vol. XLV, pp. 295-301, 1926.
    • (1926) Trans. American Institute Electrical Engineers , vol.45 , pp. 295-301
    • Vernam, G.S.1
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 15
    • 84875486428 scopus 로고
    • Secrecy systems approximating perfect and ideal secrecy
    • P. R. Geffe, "Secrecy systems approximating perfect and ideal secrecy," Proc. IEEE, vol. 53, no. 9, pp. 1229-1230, 1965.
    • (1965) Proc. IEEE , vol.53 , Issue.9 , pp. 1229-1230
    • Geffe, P.R.1
  • 16
    • 0017495002 scopus 로고
    • An extension of the Shannon theory approach to cryptography
    • Mar.
    • M. E. Hellman, "An extension of the Shannon theory approach to cryptography," IEEE Trans. Inf. Theory, vol. IT-23, no. 2, pp. 289294, Mar. 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.2 , pp. 289294
    • Hellman, M.E.1
  • 17
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Sys. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 18
    • 84873885571 scopus 로고    scopus 로고
    • New results on multipleinput multiple-output broadcast channels with confidential messages
    • Mar.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "New results on multipleinput multiple-output broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1346-1359, Mar. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.3 , pp. 1346-1359
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 19
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • Seattle, July
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Seattle, July 2006.
    • (2006) Proc. IEEE ISIT
    • Barros, J.1    Rodrigues, M.R.D.2
  • 20
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Jan.-Mar.
    • I. Csisz̀ar, "Almost independence and secrecy capacity," Prob. Inf. Trans., vol. 32, no. 1, pp. 40-47, Jan.-Mar. 1996.
    • (1996) Prob. Inf. Trans. , vol.32 , Issue.1 , pp. 40-47
    • Csisz̀ar, I.1
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 22
    • 84906653369 scopus 로고
    • Nonasymptotic estimates for efficiency of code jamming in a wire-tap channel
    • V. I. Korzhik and V. A. Yakovlev, "Nonasymptotic estimates for efficiency of code jamming in a wire-tap channel," Problemy Peredachi Informatsii (USSR), vol. 17, no. 4, pp. 11-18, 1981.
    • (1981) Problemy Peredachi Informatsii (USSR) , vol.17 , Issue.4 , pp. 11-18
    • Korzhik, V.I.1    Yakovlev, V.A.2
  • 23
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. B. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. 23, no. 5, pp. 625-627, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.23 , Issue.5 , pp. 625-627
    • Carleial, A.B.1    Hellman, M.2
  • 24
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • July
    • S. L. Y. Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Cheong, S.L.Y.1    Hellman, M.2
  • 25
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csisz̀ar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csisz̀ar, I.1    K̈orner, J.2
  • 26
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. J. Vinck,and L. Yuan, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinckand, A.J.2    Yuan, L.3
  • 28
    • 84940653858 scopus 로고    scopus 로고
    • An opportunistic physical-layer approach to secure wireless communications
    • Monticello Sep.
    • M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An opportunistic physical-layer approach to secure wireless communications," Proc. Allerton Conf., Monticello, Sep. 2006.
    • (2006) Proc. Allerton Conf.
    • Bloch, M.1    Barros, J.2    Rodrigues, M.R.D.3    McLaughlin, S.W.4
  • 29
    • 45249085230 scopus 로고    scopus 로고
    • Secret communication with a fading eavesdropper channel
    • Nice, July
    • Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE ISIT, Nice, July 2007.
    • (2007) Proc. IEEE ISIT
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 30
    • 84873166675 scopus 로고    scopus 로고
    • Gaussian wiretap channel with a batteryless energy harvesting transmitter
    • Lausanne, Switzerland, Sep.
    • O. Ozel, E. Ekrem and S. Ulukus, "Gaussian wiretap channel with a batteryless energy harvesting transmitter," in Proc. IEEE Inf. Theory Workshop, Lausanne, Switzerland, Sep. 2012.
    • (2012) Proc. IEEE Inf. Theory Workshop
    • Ozel, O.1    Ekrem, E.2    Ulukus, S.3
  • 31
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.1    Lai, L.2    El Gamal, H.3
  • 33
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.1
  • 34
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE ISIT, Adelaide, 2005.
    • (2005) Proc. IEEE ISIT
    • Parada, P.1    Blahut, R.2
  • 35
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multiantenna transmission
    • Mar.
    • Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. CISS, Mar. 2007.
    • (2007) Proc. CISS
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 36
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Nice, France, June
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE ISIT, Nice, France, June 2007.
    • (2007) Proc. IEEE ISIT
    • Shafiee, S.1    Ulukus, S.2
  • 37
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sep.
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 39
  • 40
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas Sept.
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Veh. Tech. Conf., vol. 3, pp. 1906-1910, Dallas, Sept. 2005.
    • (2005) Proc. IEEE Veh. Tech. Conf. , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 41
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 42
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • July
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 43
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.2
  • 44
    • 70449597938 scopus 로고    scopus 로고
    • Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
    • Perugia June
    • A. Mukherjee and A. L. Swindlehurst, "Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels," in Proc. IEEE SPAWC, pp. 344-348, Perugia, June 2009.
    • (2009) Proc. IEEE SPAWC , pp. 344-348
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 45
    • 84883395475 scopus 로고    scopus 로고
    • Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization
    • May
    • Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
    • (2013) IEEE Trans. Signal Process , vol.61 , Issue.10 , pp. 2704-2717
    • Li, Q.1    Ma, W.-K.2
  • 46
    • 84883698532 scopus 로고    scopus 로고
    • On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
    • Sep.
    • P.-H. Lin S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1728-1740
    • Lin, S.-H.1    Lai, P.-H.2    Lin, S.-C.3    Su, H.-J.4
  • 47
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 48
    • 77953222550 scopus 로고    scopus 로고
    • On the relationship between the multi-antenna secrecy communications and cognitive radio communications
    • June
    • L. Zhang, R. Zhang, Y. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun. vol. 58, no. 6, pp. 1877-1886, June 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.6 , pp. 1877-1886
    • Zhang, L.1    Zhang, R.2    Liang, Y.3    Xin, Y.4    Cui, S.5
  • 49
    • 79951762516 scopus 로고    scopus 로고
    • Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels
    • [Online]. Available
    • J. Li and A. Petropulu, "Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels," submitted to IEEE Trans. Inf. Theory, 2010[Online]. Available: http://arxiv.org/abs/0909.2622v1.
    • (2010) IEEE Trans. Inf. Theory
    • Li, J.1    Petropulu, A.2
  • 51
    • 77955721830 scopus 로고    scopus 로고
    • Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
    • Sep.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4215-4227
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 53
    • 84877752784 scopus 로고    scopus 로고
    • Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
    • May
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2620-2631
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 54
    • 84867524245 scopus 로고    scopus 로고
    • On optimal signaling over secure MIMO channels
    • Boston
    • S. Loyka and C. D. Charalambous, "On optimal signaling over secure MIMO channels," in Proc. IEEE ISIT, Boston, 2012.
    • (2012) Proc. IEEE ISIT
    • Loyka, S.1    Charalambous, C.D.2
  • 55
    • 70349223815 scopus 로고    scopus 로고
    • Fixed SINR solutions for the MIMO wiretap channel
    • Taipei Apr.
    • A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE ICASSP, pp. 2437-2440, Taipei, Apr. 2009.
    • (2009) Proc. IEEE ICASSP , pp. 2437-2440
    • Swindlehurst, A.L.1
  • 56
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W .P. Hong, L. Pang-Chang, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, P.Y.-W.1    Pang-Chang, L.2    Kuo, C.-C.J.3
  • 57
    • 70649102349 scopus 로고    scopus 로고
    • Physical layer security with artificial noise: Secrecy capacity and optimal power allocation
    • Omaha, NE Sept.
    • X. Zhou and M. R. McKay, "Physical layer security with artificial noise: Secrecy capacity and optimal power allocation", in Proc. Int. Conf. on Sig. Proc. and Commun. Syst., Omaha, NE, Sept. 2009.
    • (2009) Proc. Int. Conf. on Sig. Proc. and Commun. Syst.
    • Zhou, X.1    McKay, M.R.2
  • 58
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 59
    • 84875740929 scopus 로고    scopus 로고
    • PHY layer security based on protected zone and artificial noise
    • May
    • N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, "PHY layer security based on protected zone and artificial noise," IEEE Signal Process. Lett., vol. 20, no. 5, pp. 487-490, May 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.5 , pp. 487-490
    • Romero-Zurita, N.1    McLernon, D.2    Ghogho, M.3    Swami, A.4
  • 60
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr.
    • S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.3
  • 61
    • 84867563712 scopus 로고    scopus 로고
    • Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel
    • Boston, MA
    • S. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel," in Proc. IEEE ISIT, pp. 2321-2325, Boston, MA, 2012.
    • (2012) Proc. IEEE ISIT , pp. 2321-2325
    • Fakoorian, S.A.1    Swindlehurst, A.L.2
  • 62
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 63
    • 70449517090 scopus 로고    scopus 로고
    • On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise
    • Seoul
    • Y.-L. Liang, Y. Wang, T. Chang, Y.-W. P. Hong, and C. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise ," in Proc. IEEE ISIT, pp. 2351-2355, Seoul, 2009.
    • (2009) Proc. IEEE ISIT , pp. 2351-2355
    • Liang, Y.-L.1    Wang, Y.2    Chang, T.3    Hong, Y.-W.P.4    Chi, C.5
  • 64
    • 84861324114 scopus 로고    scopus 로고
    • On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation
    • Pacific Grove, CA, Nov.
    • Z. Rezki, A. Khisti, and M.-S. Alouini, "On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation," in Proc. 45th Asilomar Conf., pp. 952-957, Pacific Grove, CA, Nov. 2011.
    • (2011) Proc. 45th Asilomar Conf. , pp. 952-957
    • Rezki, Z.1    Khisti, A.2    Alouini, M.-S.3
  • 65
    • 84867536137 scopus 로고    scopus 로고
    • On the ergodic secret message capacity of the wiretap channel with finite rate feedback
    • Boston
    • -, "On the ergodic secret message capacity of the wiretap channel with finite rate feedback," in Proc. IEEE ISIT, Boston, 2012.
    • (2012) Proc. IEEE ISIT
    • Rezki, Z.1    Khisti, A.2    Alouini, M.-S.3
  • 66
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper to appear
    • Available: Early Access
    • K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," to appear, IEEE Trans. Veh. Technol., 2014. Available: Early Access.
    • (2014) IEEE Trans. Veh. Technol.
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.Y.4    Leung, K.K.5
  • 67
    • 84883175353 scopus 로고    scopus 로고
    • Twoway training for discriminatory channel estimation in wireless MIMO systems
    • May
    • C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. Peter Hong, "Twoway training for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2724-2738, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2724-2738
    • Huang, C.-W.1    Chang, T.-H.2    Zhou, X.3    Peter Hong, Y.-W.4
  • 68
    • 84880560795 scopus 로고    scopus 로고
    • Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
    • Aug.
    • H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.15 , pp. 3799-3814
    • Reboredo, H.1    Xavier, J.2    Rodrigues, M.R.D.3
  • 69
    • 84881111045 scopus 로고    scopus 로고
    • Practical secrecy using artificial noise
    • July
    • S. Liu, Y. Hong, and E. Viterbo, "Practical secrecy using artificial noise," IEEE Commun. Lett., vol. 17, no. 7, pp. 1483-1486, July 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.7 , pp. 1483-1486
    • Liu, S.1    Hong, Y.2    Viterbo, E.3
  • 71
    • 69949115171 scopus 로고    scopus 로고
    • On the secrecy capacity of frequencyselective fading channels: A practical Vandermonde precoding
    • M Kobayashi and M. Debbah, "On the secrecy capacity of frequencyselective fading channels: A practical Vandermonde precoding," in Proc. IEEE 19th PIMRC, 2008.
    • (2008) Proc. IEEE 19th PIMRC
    • Kobayashi, M.1    Debbah, M.2
  • 72
    • 84863913546 scopus 로고    scopus 로고
    • Physical-layer secrecy for OFDM Transmissions over fading channels
    • Aug.
    • F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM Transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1354-1367
    • Renna, F.1    Laurenti, N.2    Poor, H.V.3
  • 73
    • 80051720840 scopus 로고    scopus 로고
    • Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading
    • Sep.
    • J. Li and A. Petropulu, "Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading,"IEEE Trans. Inf Forensics Security, vol. 6, no. 3, Part 1, pp. 861-867, Sep. 2011.
    • (2011) IEEE Trans. Inf Forensics Security , vol.6 , Issue.3 PART 1 , pp. 861-867
    • Li, J.1    Petropulu, A.2
  • 75
    • 79956205910 scopus 로고    scopus 로고
    • Maximal ratio diversity combining enhanced security
    • May
    • F. He, H. Man, and W. Wang, "Maximal ratio diversity combining enhanced security," IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.5 , pp. 509-511
    • He, F.1    Man, H.2    Wang, W.3
  • 76
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • Jan.
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 77
    • 84860863805 scopus 로고    scopus 로고
    • Performance of transmit antenna selection physical layer security schemes
    • June
    • H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, June 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.6 , pp. 372-375
    • Alves, H.1    Souza, R.D.2    Debbah, M.3    Bennis, M.4
  • 78
    • 84878730663 scopus 로고    scopus 로고
    • Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection
    • May
    • N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Commun. Lett., vol. 17, no. 5, pp. 864-867, May 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.5 , pp. 864-867
    • Ferdinand, N.S.1    Da Costa, D.B.2    Latva-Aho, M.3
  • 79
    • 84867619190 scopus 로고    scopus 로고
    • Detecting passive eavesdroppers in the MIMO wiretap channel
    • Kyoto, Japan, Mar.
    • A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel," in Proc. IEEE ICASSP, pp. 2809-2812, Kyoto, Japan, Mar. 2012.
    • (2012) Proc. IEEE ICASSP , pp. 2809-2812
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 80
    • 84861327707 scopus 로고    scopus 로고
    • A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures
    • Pacific Grove, CA
    • A. Mukherjee and A. L. Swindlehurst, "A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures," in Proc. 45th Asilomar Conf., Pacific Grove, CA, 2011.
    • (2011) Proc. 45th Asilomar Conf.
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 81
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 82
    • 77958520866 scopus 로고    scopus 로고
    • Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
    • Nov.
    • H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477-5487, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5477-5487
    • Ly, H.D.1    Liu, T.2    Liang, Y.3
  • 83
    • 33748578624 scopus 로고    scopus 로고
    • The capacity region of the Gaussian multiple-input multiple-output broadcast channel
    • DOI 10.1109/TIT.2006.880064
    • H. Weingarten, Y. Steinberg, and S. Shamai, "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936-3964, Sep. 2006. (Pubitemid 44363826)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.9 , pp. 3936-3964
    • Weingarten, H.1    Steinberg, Y.2    Shamai, S.3
  • 84
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • June
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2512, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2512
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 85
    • 62749109096 scopus 로고    scopus 로고
    • Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
    • Mar.
    • R. Liu and H. V. Poor, "Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.3 , pp. 1235-1249
    • Liu, R.1    Poor, H.V.2
  • 86
    • 77955683763 scopus 로고    scopus 로고
    • MIMO Gaussian broadcast channels with confidential and common messages
    • Texas, U.S.A., June
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "MIMO Gaussian broadcast channels with confidential and common messages," in Proc. IEEE Int. Symp. Information Theory, Texas, U.S.A., June 2010, pp. 2578-2582.
    • (2010) Proc. IEEE Int. Symp. Information Theory , pp. 2578-2582
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 87
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • June
    • A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.3
  • 88
    • 84876775276 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO broadcast channel
    • May
    • G. Bagherikaram, A. S. Motahari and A. K. Khandani, "The secrecy capacity region of the Gaussian MIMO broadcast channel," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2673-2682, May 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.5 , pp. 2673-2682
    • Bagherikaram, G.1    Motahari, A.S.2    Khandani, A.K.3
  • 89
    • 79952846257 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
    • Apr.
    • E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 2083-2114
    • Ekrem, E.1    Ulukus, S.2
  • 90
    • 77950269477 scopus 로고    scopus 로고
    • A vector generalization of Costa's entropy-power inequality with applications
    • Apr.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "A vector generalization of Costa's entropy-power inequality with applications," IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865-1879, Apr. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.4 , pp. 1865-1879
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 91
    • 84860234449 scopus 로고    scopus 로고
    • Three-receiver broadcast channels with common and confidential messages
    • May
    • Y. K. Chia and A. El Gamal, Three-receiver broadcast channels with common and confidential messages, IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2748-2765, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 2748-2765
    • Chia, Y.K.1    El Gamal, A.2
  • 92
    • 84879973839 scopus 로고    scopus 로고
    • One-receiver twoeavesdropper broadcast channel with degraded message sets
    • July
    • S. Salehkalaibar, M. Mirmohseni, and M. R. Aref, "One-receiver twoeavesdropper broadcast channel with degraded message sets," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1162-1172, July 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.7 , pp. 1162-1172
    • Salehkalaibar, S.1    Mirmohseni, M.2    Aref, M.R.3
  • 93
    • 77949575243 scopus 로고    scopus 로고
    • Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
    • Oct.
    • A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. of 47th Allerton Conf., Oct. 2009.
    • (2009) Proc. of 47th Allerton Conf.
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 94
    • 78049413969 scopus 로고    scopus 로고
    • Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink
    • Dallas, TX, Mar.
    • W. Liao, T. Chang, W. Ma, and C. Chi, "Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink," in Proc. IEEE ICASSP, pp. 256-2565, Dallas, TX, Mar. 2010.
    • (2010) Proc. IEEE ICASSP , pp. 256-2565
    • Liao, W.1    Chang, T.2    Ma, W.3    Chi, C.4
  • 95
    • 84863941590 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for secure OFDMA systems
    • July
    • D. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2584, July 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2572-2584
    • Ng, D.1    Lo, E.S.2    Schober, R.3
  • 96
    • 84883393923 scopus 로고    scopus 로고
    • On the optimality of linear precoding for secrecy in the MIMO broadcast channel
    • Sep.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of linear precoding for secrecy in the MIMO broadcast channel," IEEE J. Selected Areas Commun., vol. 31, no. 9, pp. 1701-1713, Sep. 2013.
    • (2013) IEEE J. Selected Areas Commun. , vol.31 , Issue.9 , pp. 1701-1713
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 97
    • 84857202295 scopus 로고    scopus 로고
    • Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages," in Proc. IEEE GLOBECOM, 2011.
    • (2011) Proc. IEEE GLOBECOM
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 98
    • 84870563576 scopus 로고    scopus 로고
    • Secrecy sumrates for multi-user MIMO regularized channel inversion precoding
    • Nov.
    • G. Geraci, M. Egan, J. Yuan, A. Razi, and I. B. Collings, "Secrecy sumrates for multi-user MIMO regularized channel inversion precoding," IEEE Trans. Commun., vol. 60, no. 11, pp. 3472-3482, Nov. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.11 , pp. 3472-3482
    • Geraci, G.1    Egan, M.2    Yuan, J.3    Razi, A.4    Collings, I.B.5
  • 100
    • 84880139479 scopus 로고    scopus 로고
    • Linear precoding for broadcast channels with confidential messages under transmit-side channel correlation
    • June
    • G. Geraci, A. Y. Al-nahari, J. Yuan, and I. B. Collings, "Linear precoding for broadcast channels with confidential messages under transmit-side channel correlation," IEEE Commun. Lett., vol. 17, no. 6, pp. 1164-1167, June 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.6 , pp. 1164-1167
    • Geraci, G.1    Al-Nahari, A.Y.2    Yuan, J.3    Collings, I.B.4
  • 102
    • 77953867654 scopus 로고    scopus 로고
    • User selection in multiuser MIMO systems with secrecy considerations
    • Pacific Grove, CA Nov.
    • A. Mukherjee and A. L. Swindlehurst, "User selection in multiuser MIMO systems with secrecy considerations," in Proc. Asilomar Conf., Pacific Grove, CA, Nov. 2009.
    • (2009) Proc. Asilomar Conf.
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 104
    • 78649600738 scopus 로고    scopus 로고
    • User selection scheme with secrecy capacity between other users in MIMO downlink systems
    • Honolulu, USA, Aug.-Sep.
    • M. Yanase and T. Ohtsuki, "User selection scheme with secrecy capacity between other users in MIMO downlink systems," in Proc. IEEE Int. Conf. Wireless Information Technol.and Syst., Honolulu, USA, Aug.-Sep. 2010.
    • (2010) Proc. IEEE Int. Conf. Wireless Information Technol.And Syst.
    • Yanase, M.1    Ohtsuki, T.2
  • 105
    • 77954973670 scopus 로고    scopus 로고
    • User selection scheme with secrecy capacity in MIMO downlink systems
    • Elsevier
    • M. Yanase and T. Ohtsuki, "User selection scheme with secrecy capacity in MIMO downlink systems," Procedia Social and Behavioral Sciences, Elsevier, vol. 2, issue 1, pp. 161-170, 2010.
    • (2010) Procedia Social and Behavioral Sciences , vol.2 , Issue.1 , pp. 161-170
    • Yanase, M.1    Ohtsuki, T.2
  • 106
    • 84872279928 scopus 로고    scopus 로고
    • Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling
    • Feb.
    • I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Process. Lett., vol. 20, no. 2, pp. 141-144, Feb. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.2 , pp. 141-144
    • Krikidis, I.1    Ottersten, B.2
  • 107
    • 84893766010 scopus 로고    scopus 로고
    • On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling to appear
    • [Online].Available: Early Access
    • M. Pei, A. L. Swindlehurst, D. Ma, and J.Wei, "On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling," to appear, IEEE Commmun. Lett., 2014[Online]. Available: Early Access.
    • (2014) IEEE Commmun. Lett.
    • Pei, M.1    Swindlehurst, A.L.2    Ma, D.3    Wei, J.4
  • 108
    • 39049089566 scopus 로고    scopus 로고
    • The discrete memoryless multiple access channel with confidential messages
    • Seattle, WA, Jul. 9-14
    • R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory
    • Liu, R.1    Maric, I.2    Yates, R.D.3    Spasojevic, P.4
  • 109
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • DOI 10.1109/TIT.2007.915978
    • Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 110
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • Dec.
    • E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.12 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 111
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
    • June
    • E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 112
    • 77955729519 scopus 로고    scopus 로고
    • Correction to: The Gaussian multiple access wire-tap channel and "the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • Sep.
    • -, "Correction to: The Gaussian multiple access wire-tap channel and "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming"," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4762-4763
    • Tekin, E.1    Yener, A.2
  • 113
    • 79961002510 scopus 로고    scopus 로고
    • Fading cognitive multiple-access channels with confidential messages
    • Aug.
    • R. Liu, Y. Liang and H. V. Poor, "Fading cognitive multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4992-5005, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4992-5005
    • Liu, R.1    Liang, Y.2    Poor, H.V.3
  • 114
    • 61349186445 scopus 로고    scopus 로고
    • Capacity of cognitive interference channels with and without secrecy
    • Feb.
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 604-619
    • Liang, Y.1    Somekh-Baruch, A.2    Poor, H.V.3    Shamai, S.4    Verdu, S.5
  • 115
    • 77249094590 scopus 로고    scopus 로고
    • On the location of an eavesdropper in multiterminal networks
    • Mar.
    • S. Anand and R. Chandramouli, "On the location of an eavesdropper in multiterminal networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 148-157, Mar. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.1 , pp. 148-157
    • Anand, S.1    Chandramouli, R.2
  • 116
    • 48849113556 scopus 로고    scopus 로고
    • Interference alignment and degrees of freedom of the K-User interference channel
    • Aug.
    • V. R. Cadambe and S. A. Jafar, "Interference alignment and degrees of freedom of the K-User interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.8 , pp. 3425-3441
    • Cadambe, V.R.1    Jafar, S.A.2
  • 117
    • 52349105722 scopus 로고    scopus 로고
    • On the secure degrees of freedom in the K-user Gaussian interference channel
    • July
    • O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "On the secure degrees of freedom in the K-user Gaussian interference channel," in Proc. IEEE ISIT, pp. 384-388, July 2008.
    • (2008) Proc. IEEE ISIT , pp. 384-388
    • Koyluoglu, O.1    El Gamal, H.2    Lai, L.3    Poor, H.V.4
  • 119
    • 77950684549 scopus 로고    scopus 로고
    • K-user interference channels: Achievable secrecy rate and degrees of freedom
    • Greece June
    • X. He and A. Yener, "K-user interference channels: Achievable secrecy rate and degrees of freedom," in Proc. ITW, Greece, June 2009.
    • (2009) Proc. ITW
    • He, X.1    Yener, A.2
  • 120
    • 84890353615 scopus 로고    scopus 로고
    • Secure degrees of freedom of the Gaussian multiple access wiretap channel
    • Istanbul, Turkey
    • J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian multiple access wiretap channel," in Proc. IEEE ISIT, pp. 1337-1341, Istanbul, Turkey, 2013.
    • (2013) Proc. IEEE ISIT , pp. 1337-1341
    • Xie, J.1    Ulukus, S.2
  • 121
    • 84881483763 scopus 로고    scopus 로고
    • Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
    • Baltimore MD
    • J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. 47th CISS, Baltimore, MD, 2013.
    • (2013) Proc. 47th CISS
    • Xie, J.1    Ulukus, S.2
  • 122
    • 64549088012 scopus 로고    scopus 로고
    • On the secure degrees of freedom of wireless X networks
    • Monticello IL
    • T. Gou and S. A. Jafar, "On the secure degrees of freedom of wireless X networks," in Proc. Allerton Conf., Monticello, IL, 2008.
    • (2008) Proc. Allerton Conf.
    • Gou, T.1    Jafar, S.A.2
  • 123
    • 84978483855 scopus 로고    scopus 로고
    • Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games
    • E. A. Jorswieck and R. Mochaourab, "Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games," in Proc. WSA, 2009.
    • (2009) Proc. WSA
    • Jorswieck, E.A.1    Mochaourab, R.2
  • 125
    • 80051719720 scopus 로고    scopus 로고
    • MIMO interference channel with confidential messages: Achievable secrecy rates and beamforming design
    • Sep.
    • -, "MIMO interference channel with confidential messages: achievable secrecy rates and beamforming design," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 640-649
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 128
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Jun.
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE ISIT, pp. 926-930, Jun. 2007.
    • (2007) Proc. IEEE ISIT , pp. 926-930
    • Oohama, Y.1
  • 129
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 130
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • Nov.
    • -, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. and Netw., vol. 2009, pp. 1-13, Nov. 2009.
    • (2009) EURASIP J. Wireless Commun. and Netw. , vol.2009 , pp. 1-13
    • He, X.1    Yener, A.2
  • 131
    • 52349100899 scopus 로고    scopus 로고
    • The role of an untrusted relay in secret communication
    • Jul.
    • -, "The role of an untrusted relay in secret communication," in Proc. IEEE ISIT, pp. 2212-2216, Jul. 2008.
    • (2008) Proc. IEEE ISIT , pp. 2212-2216
    • He, X.1    Yener, A.2
  • 132
    • 52349113391 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jul.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE ISIT, pp. 2217-2221, Jul. 2008.
    • (2008) Proc. IEEE ISIT , pp. 2217-2221
    • Ekrem, E.1    Ulukus, S.2
  • 133
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 134
    • 84881572098 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way transmission with an untrusted relay
    • Shanghai, China, Apr.
    • J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE WCNC, Shanghai, China, Apr. 2013.
    • (2013) Proc. IEEE WCNC
    • Mo, J.1    Tao, M.2    Liu, Y.3    Xia, B.4    Ma, X.5
  • 135
    • 84901257838 scopus 로고    scopus 로고
    • Joint transmit design and node selection for one-way and two-way untrusted relay channels
    • Pacific Grove, CA, Nov.
    • J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. 47th Asilomar Conf., Pacific Grove, CA, Nov. 2013.
    • (2013) Proc. 47th Asilomar Conf.
    • Huang, J.1    Swindlehurst, A.L.2
  • 136
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 137
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of twohop amplify-and-forward systems with untrustworthy relay nodes
    • Oct.
    • L. Sun, T. Zhang, Y. Li and H. Niu, "Performance study of twohop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, H.4
  • 138
    • 84881089174 scopus 로고    scopus 로고
    • Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay
    • July
    • A. Mukherjee, "Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay," IEEE Commun. Lett., vol. 17, no. 7, pp. 1309-1312, July 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.7 , pp. 1309-1312
    • Mukherjee, A.1
  • 139
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 140
    • 84874906565 scopus 로고    scopus 로고
    • Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
    • Mar.
    • R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.6 , pp. 1544-1554
    • Bassily, R.1    Ulukus, S.2
  • 141
    • 84870266491 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy with multiple antennas at the helper
    • Dec.
    • R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1855-1863, Dec. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.6 , pp. 1855-1863
    • Bassily, R.1    Ulukus, S.2
  • 143
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 144
    • 80052870842 scopus 로고    scopus 로고
    • Optimal cooperative relaying schemes for improving wireless physical layer security
    • Oct.
    • J. Li, A. P. Petropulu, and S. Weber, "Optimal cooperative relaying schemes for improving wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 145
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • Dec.
    • D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Selected Areas Commun., vol. 29, no. 10, pp. 2067-2078, Dec. 2011.
    • (2011) IEEE J. Selected Areas Commun. , vol.29 , Issue.10 , pp. 2067-2078
    • Goeckel, D.1    Vasudevan, S.2    Towsley, D.3    Adams, S.4    Ding, Z.5    Leung, K.6
  • 146
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan.
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 35-38
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 147
    • 84862571591 scopus 로고    scopus 로고
    • Relay placement for physical layer security: A secure connection perspective
    • June
    • J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, June 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.6 , pp. 878-881
    • Mo, J.1    Tao, M.2    Liu, Y.3
  • 148
    • 84870499401 scopus 로고    scopus 로고
    • A general relaying transmission protocol for MIMO secrecy communications
    • Nov.
    • Z. Ding, M. Peng and H. H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.11 , pp. 3461-3471
    • Ding, Z.1    Peng, M.2    Chen, H.H.3
  • 149
    • 84879149313 scopus 로고    scopus 로고
    • Secure relay beamforming with imperfect channel side information
    • June
    • X. Wang, K. Wang, and X. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, June 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2140-2155
    • Wang, X.1    Wang, K.2    Zhang, X.3
  • 150
    • 84905228698 scopus 로고    scopus 로고
    • Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel
    • M. Jilani and T. Ohtsuki, "Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel," EURASIP Journ. Wireless Commun. Networking, 2012, 2012:361.
    • (2012) EURASIP Journ. Wireless Commun. Networking , pp. 361
    • Jilani, M.1    Ohtsuki, T.2
  • 151
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • K. Ng and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, K.1    Schober, R.2
  • 152
    • 84858392930 scopus 로고    scopus 로고
    • Secure communication over parallel relay channel
    • Apr.
    • Z. Awan, A. Zaidi, and L. Vandendorpe, "Secure communication over parallel relay channel," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 359-371, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 359-371
    • Awan, Z.1    Zaidi, A.2    Vandendorpe, L.3
  • 153
    • 84891354137 scopus 로고    scopus 로고
    • Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
    • Budapest, Hungary
    • S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE ICC, Budapest, Hungary, 2013.
    • (2013) Proc. IEEE ICC
    • Vishwakarma, S.1    Chockalingam, A.2
  • 154
    • 84891356286 scopus 로고    scopus 로고
    • Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
    • Budapest, Hungary
    • Y. Zou, X. Wang, and W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE ICC, Budapest, Hungary, 2013.
    • (2013) Proc. IEEE ICC
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 155
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying to appear
    • [Online].Available: Early Access
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," to appear, IEEE Trans. Veh. Technol., 2014[Online]. Available: Early Access.
    • (2014) IEEE Trans. Veh. Technol.
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 156
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physicallayer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Selected Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Selected Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 157
    • 84901255051 scopus 로고    scopus 로고
    • Wireless physical layer security enhancement with buffer-aided relaying
    • Pacific Grove, CA, Nov.
    • J. Huang and A. L. Swindlehurst, "Wireless physical layer security enhancement with buffer-aided relaying," in Proc. 47th Asilomar Conf., Pacific Grove, CA, Nov. 2013.
    • (2013) Proc. 47th Asilomar Conf.
    • Huang, J.1    Swindlehurst, A.L.2
  • 158
    • 51849144195 scopus 로고    scopus 로고
    • Interference-assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference- assisted secret communication," in Proc. IEEE ITW, pp. 164-168, May 2008.
    • (2008) Proc. IEEE ITW , pp. 164-168
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 159
    • 84891354153 scopus 로고    scopus 로고
    • Power allocation strategies for OFDM gaussian wiretap channels with a friendly jammer: The degraded case
    • Budapest, Hungary
    • M. Ara, H. Reboredo, F. Renna, and M. Rodrigues, "Power allocation strategies for OFDM gaussian wiretap channels with a friendly jammer: The degraded case," in Proc. IEEE ICC, Budapest, Hungary, 2013.
    • (2013) Proc. IEEE ICC
    • Ara, M.1    Reboredo, H.2    Renna, F.3    Rodrigues, M.4
  • 161
    • 84883300441 scopus 로고    scopus 로고
    • Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
    • Aug.
    • N. Wu and H. Li, "Effect of feedback delay on secure cooperative networks with joint relay and jammer selection," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.4 , pp. 415-418
    • Wu, N.1    Li, H.2
  • 162
    • 84893431203 scopus 로고    scopus 로고
    • Adaptive limited feedback for MISO wiretap channels with cooperative jamming to appear
    • [Online].Available: Early Access
    • M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," to appear, IEEE Trans. Signal Process., 2014[Online]. Available: Early Access.
    • (2014) IEEE Trans. Signal Process.
    • Pei, M.1    Swindlehurst, A.L.2    Ma, D.3    Wei, J.4
  • 163
    • 80052913251 scopus 로고    scopus 로고
    • Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
    • Oct.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 5013-5022
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 164
    • 84906679485 scopus 로고    scopus 로고
    • Deploying energy-harvesting cooperative jammers for security in the MIMO wiretap channel
    • Pacific Grove, CA, Nov.
    • A. Mukherjee and J. Huang, "Deploying energy-harvesting cooperative jammers for security in the MIMO wiretap channel," in Proc. ASILOMAR Conf., Pacific Grove, CA, Nov. 2012.
    • (2012) Proc. ASILOMAR Conf.
    • Mukherjee, A.1    Huang, J.2
  • 165
    • 77953826156 scopus 로고    scopus 로고
    • Cooperative jamming in MIMO adhoc networks
    • Nov.
    • J. Wang and A. L. Swindlehurst, "Cooperative jamming in MIMO adhoc networks," in Proc. 43rd Asilomar Conf., pp. 1719-1723, Nov. 2009.
    • (2009) Proc. 43rd Asilomar Conf. , pp. 1719-1723
    • Wang, J.1    Swindlehurst, A.L.2
  • 166
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr.
    • J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1696-1707
    • Huang, J.1    Swindlehurst, A.L.2
  • 167
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. Lee Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Lee Swindlehurst, A.2
  • 168
    • 84876796391 scopus 로고    scopus 로고
    • Destination assisted cooperative jamming for wireless physical-layer security
    • Apr.
    • Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 682-694
    • Liu, Y.1    Li, J.2    Petropulu, A.P.3
  • 169
    • 84867873837 scopus 로고    scopus 로고
    • Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
    • Oct.
    • W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.10 , pp. 1628-1631
    • Li, W.1    Ghogho, M.2    Chen, B.3    Xiong, C.4
  • 172
    • 78751521977 scopus 로고    scopus 로고
    • Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers
    • Jun.
    • A. Mukherjee and A. L. Swindlehurst, "Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers," in Proc. 11th IEEE SPAWC, Jun. 2010.
    • (2010) Proc. 11th IEEE SPAWC
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 173
    • 80052177936 scopus 로고    scopus 로고
    • Anti-eavesdropping spacetime network coding for cooperative communications
    • Nov.
    • Z. Z. Gao, Y. H. Yang, and K. J. R. Liu, "Anti-eavesdropping spacetime network coding for cooperative communications," IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3898-3908, Nov. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.11 , pp. 3898-3908
    • Gao, Z.Z.1    Yang, Y.H.2    Liu, K.J.R.3
  • 174
    • 79957975387 scopus 로고    scopus 로고
    • Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies
    • Pacific Grove, CA, Nov.
    • S. Al-Sayed and A. Sezgin, "Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies," in Proc. 44th Asilomar Conf., Pacific Grove, CA, Nov. 2010.
    • (2010) Proc. 44th Asilomar Conf.
    • Al-Sayed, S.1    Sezgin, A.2
  • 175
    • 79551634548 scopus 로고    scopus 로고
    • Physical layer security for two way relay communications with friendly jammers
    • Miami, FL
    • R. Zhang, L. Song, Z. Han, B. Jiaa, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBE COM, Miami, FL, 2010.
    • (2010) Proc. IEEE GLOBE COM
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiaa, B.4    Debbah, M.5
  • 176
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part I: Secret sharing
    • July
    • R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csisźar, I.2
  • 177
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csisźar and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 178
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csisźar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csisźar, I.1    Narayan, P.2
  • 179
    • 0037396695 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 180
    • 0037399113 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 181
    • 0037396951 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 182
    • 45249100625 scopus 로고    scopus 로고
    • Key distribution protocols based on noisy channels in presence of an active adversary: Conventional and new versions with parameter optimization
    • June
    • V. Yakovlev, V. Korzhik, and G. Morales-Luna, "Key distribution protocols based on noisy channels in presence of an active adversary: Conventional and new versions with parameter optimization," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2535-2549, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2535-2549
    • Yakovlev, V.1    Korzhik, V.2    Morales-Luna, G.3
  • 183
    • 84906663259 scopus 로고    scopus 로고
    • Secret key agreement over an interference channel using noiseless feedback
    • S. Salimi, E. Jorswieck, and M. Skoglund, "Secret key agreement over an interference channel using noiseless feedback," in Proc. IEEE ISIT, 2013.
    • (2013) Proc. IEEE ISIT
    • Salimi, S.1    Jorswieck, E.2    Skoglund, M.3
  • 185
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • DOI 10.1109/4234.824754
    • H. Koorapaty, A. A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, pp. 52-55, Feb. 2000. (Pubitemid 30564390)
    • (2000) IEEE Communications Letters , vol.4 , Issue.2 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.A.2    Chennakeshu, S.3
  • 187
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • Las Vegas Apr.
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE ICASSP, Las Vegas, pp. 3013-3016, Apr. 2008.
    • (2008) Proc. IEEE ICASSP , pp. 3013-3016
    • Sayeed, A.1    Perrig, A.2
  • 188
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. IEEE ISIT, pp. 2593-2597, Seattle, July 2006. (Pubitemid 351244572)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 191
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • DOI 10.1109/TAP.2005.858853
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag. vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 192
    • 77955038275 scopus 로고    scopus 로고
    • Reliability-based sliced error correction in secret key agreement from fading channel
    • T. Shimizu, H. Iwai, and H. Sasaoka, "Reliability-based sliced error correction in secret key agreement from fading channel," in Proc. IEEE WCNC, 2010.
    • (2010) Proc. IEEE WCNC
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 194
    • 84883325225 scopus 로고    scopus 로고
    • Intrinsic information of wideband channels
    • Sep.
    • Y. Shen and M. Z. Win, "Intrinsic information of wideband channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1875-1888, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1875-1888
    • Shen, Y.1    Win, M.Z.2
  • 195
    • 84874952710 scopus 로고    scopus 로고
    • Semi blind key agreement over MIMO fading channels
    • Feb.
    • F. Renna, M. R. Bloch, and N. Laurenti, "Semi blind key agreement over MIMO fading channels," IEEE Trans. Commun., vol. 61, no. 2, pp. 620-627, Feb. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.2 , pp. 620-627
    • Renna, F.1    Bloch, M.R.2    Laurenti, N.3
  • 196
    • 33847366177 scopus 로고    scopus 로고
    • MIMO transmissions with informationtheoretic secrecy for secret-key agreement in wireless networks
    • Atlantic City, NJ
    • X. Li and E. P. Ratazzi, "MIMO transmissions with informationtheoretic secrecy for secret-key agreement in wireless networks," in Proc. IEEE MILCOM, Atlantic City, NJ, 2005.
    • (2005) Proc. IEEE MILCOM
    • Li, X.1    Ratazzi, E.P.2
  • 197
    • 84878738900 scopus 로고    scopus 로고
    • Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels
    • May
    • Q. Li, H. Song, and K. Huang, "Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels," IEEE Commun. Lett., vol. 17, no. 5, pp. 892-895, May 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.5 , pp. 892-895
    • Li, Q.1    Song, H.2    Huang, K.3
  • 198
    • 77951552840 scopus 로고    scopus 로고
    • Secrecy extraction from increased randomness in a time-varying MIMO channel
    • Honolulu, Dec.
    • C. Chen and M. A. Jensen, "Secrecy extraction from increased randomness in a time-varying MIMO channel," in Proc. IEEE GLOBECOM, Honolulu, Dec. 2009.
    • (2009) Proc. IEEE GLOBECOM
    • Chen, C.1    Jensen, M.A.2
  • 199
    • 84860686731 scopus 로고    scopus 로고
    • Secret key establishment using temporally and spatially correlated wireless channel coefficients
    • Feb.
    • C. Chen and M. A. Jensen, "Secret key establishment using temporally and spatially correlated wireless channel coefficients," IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 205-215, Feb. 2011.
    • (2011) IEEE Trans. Mobile Comput. , vol.10 , Issue.2 , pp. 205-215
    • Chen, C.1    Jensen, M.A.2
  • 200
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Comput. , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4
  • 201
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
    • Sep.
    • J. W. Wallace and R. K. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.W.1    Sharma, R.K.2
  • 202
    • 80051727482 scopus 로고    scopus 로고
    • Strongly secure communications over the two-way wiretap channel
    • Sep.
    • A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 595-605
    • Pierrot, A.J.1    Bloch, M.R.2
  • 203
    • 80051749392 scopus 로고    scopus 로고
    • Physical-layer secret key agreement in two-way wireless relaying systems
    • Sep.
    • T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security vol. 6, no. 3, pp. 650-660, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 650-660
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 204
    • 84906696248 scopus 로고    scopus 로고
    • Key generation under active attacks
    • Pacific Grove, CA
    • H. Zhou, L. Hui, and L. Lai, "Key generation under active attacks," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
    • (2013) Proc. 47th Asilomar Conf.
    • Zhou, H.1    Hui, L.2    Lai, L.3
  • 205
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov.
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 207
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • R. J. McEliece, "A public-key cryptosystem based on algebraic coding theory," DSN Progress Report, pp. 114-116, 1978.
    • (1978) DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 209
    • 85032751057 scopus 로고    scopus 로고
    • Coding for secrecy: An overview of error-control coding techniques for physical-layer security
    • Sep.
    • W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 41-50
    • Harrison, W.K.1    Almeida, J.2    Bloch, M.R.3    McLaughlin, S.W.4    Barros, J.5
  • 212
    • 33644994972 scopus 로고    scopus 로고
    • Adaptive secure channel coding based on punctured turbo codes
    • Apr.
    • A. Payandeh, M. Ahmadian, and M. Reza Aref, "Adaptive secure channel coding based on punctured turbo codes," IEE Proc.-Commun., vol. 153, no. 2, pp. 313-316, Apr. 2006.
    • (2006) IEE Proc.-Commun. , vol.153 , Issue.2 , pp. 313-316
    • Payandeh, A.1    Ahmadian, M.2    Reza Aref, M.3
  • 214
    • 79951955741 scopus 로고    scopus 로고
    • Providing secrecy with structured codes: Tools and applications to Gaussian two-user channels
    • [Online].Available
    • X. He and A. Yener, "Providing secrecy with structured codes: Tools and applications to Gaussian two-user channels," submitted to IEEE Trans. Inf. Theory, 2009[Online]. Available: http://arxiv.org/abs/0907.5388.
    • (2009) IEEE Trans. Inf. Theory
    • He, X.1    Yener, A.2
  • 216
    • 70549101452 scopus 로고    scopus 로고
    • Dialog codes for secure wireless communications
    • A. Arora and L. Sang, "Dialog codes for secure wireless communications," in Proc. IPSN, 2009.
    • (2009) Proc. IPSN
    • Arora, A.1    Sang, L.2
  • 217
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 218
    • 84901260362 scopus 로고    scopus 로고
    • On the optimality of polar codes for the deterministic wiretap channel
    • Pacific Grove, CA
    • S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of polar codes for the deterministic wiretap channel," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
    • (2013) Proc. 47th Asilomar Conf.
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 222
    • 80053951920 scopus 로고    scopus 로고
    • Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
    • Oct.
    • S. Pawar, S. El Rouayheb, and K. Ramchandran, "Securing dynamic distributed storage systems against eavesdropping and adversarial attacks," IEEE Tran. Inf. Theory, vol. 57, no. 10, pp. 6734-6753, Oct. 2011.
    • (2011) IEEE Tran. Inf. Theory , vol.57 , Issue.10 , pp. 6734-6753
    • Pawar, S.1    El Rouayheb, S.2    Ramchandran, K.3
  • 223
    • 84857198054 scopus 로고    scopus 로고
    • Information-theoretically secure regenerating codes for distributed storage
    • Houston, TX, Dec.
    • N. B. Shah, K. V. Rashmi, and P. V. Kumar, "Information- theoretically secure regenerating codes for distributed storage," in Proc. IEEE GLOBECOM, Houston, TX, Dec. 2011.
    • (2011) Proc. IEEE GLOBECOM
    • Shah, N.B.1    Rashmi, K.V.2    Kumar, P.V.3
  • 224
    • 77955682500 scopus 로고    scopus 로고
    • Security in distributed storage systems by communicating a logarithmic number of bits
    • Austin, TX
    • T. K. Dikaliotis, A. G. Dimakis, and T. Ho, "Security in distributed storage systems by communicating a logarithmic number of bits," in Proc. IEEE ISIT, Austin, TX, 2010.
    • (2010) Proc. IEEE ISIT
    • Dikaliotis, T.K.1    Dimakis, A.G.2    Ho, T.3
  • 225
    • 84883442288 scopus 로고    scopus 로고
    • Data secrecy in distributed storage systems under exact repair
    • Calgary, Canada, Jun.
    • S. Goparaju, S. E. Rouayheb, R. Calderbank, and H. V. Poor, "Data secrecy in distributed storage systems under exact repair," in Proc. IEEE NETCOD, Calgary, Canada, Jun. 2013.
    • (2013) Proc. IEEE NETCOD
    • Goparaju, S.1    Rouayheb, S.E.2    Calderbank, R.3    Poor, H.V.4
  • 227
    • 84890407484 scopus 로고    scopus 로고
    • Capacity and security of heterogeneous distributed storage systems
    • Istanbul, Turkey
    • T. Ernvall, S. E. Rouayheb, C. Hollanti, and H. V. Poor, "Capacity and security of heterogeneous distributed storage systems," in Proc. IEEE ISIT, pp. 1247-1251, Istanbul, Turkey, 2013.
    • (2013) Proc. IEEE ISIT , pp. 1247-1251
    • Ernvall, T.1    Rouayheb, S.E.2    Hollanti, C.3    Poor, H.V.4
  • 229
    • 78650893906 scopus 로고    scopus 로고
    • Secure network coding on a wiretap network
    • Jan.
    • N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 424-435
    • Cai, N.1    Yeung, R.W.2
  • 231
    • 52349119694 scopus 로고    scopus 로고
    • Security for wiretap networks via rank-metric codes
    • Toronto
    • D. Silva and F. R. Kschischang, "Security for wiretap networks via rank-metric codes," in Proc. IEEE ISIT, Toronto, 2008.
    • (2008) Proc. IEEE ISIT
    • Silva, D.1    Kschischang, F.R.2
  • 232
    • 70449516333 scopus 로고    scopus 로고
    • On the security performance of physical-layer network coding
    • Dresden, Germany, June
    • K. Lu, S. Fu, Y. Qian, Y., and T. Zhang, "On the security performance of physical-layer network coding," in Proc. IEEE ICC, Dresden, Germany, June 2009.
    • (2009) Proc. IEEE ICC
    • Lu, K.1    Fu, S.2    Qian, Y.Y.3    Zhang, T.4
  • 233
    • 84885890147 scopus 로고    scopus 로고
    • An eavesdropping game with SINR as an objective function
    • A. Garnaev and W. Trappe, "An eavesdropping game with SINR as an objective function," in Proc. SECURE COMM, pp.142-162, 2009.
    • (2009) Proc. SECURE COMM , pp. 142-162
    • Garnaev, A.1    Trappe, W.2
  • 234
    • 80051713767 scopus 로고    scopus 로고
    • A secure communication game with a relay helping the eavesdropper
    • Sep.
    • M. Yuksel, X. Liu, and E. Erkip, "A secure communication game with a relay helping the eavesdropper," in IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 818-830, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 818-830
    • Yuksel, M.1    Liu, X.2    Erkip, E.3
  • 235
    • 77955364512 scopus 로고    scopus 로고
    • Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers
    • Cape Town, South Africa, May
    • A. Mukherjee and A. L. Swindlehurst, "Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers," in Proc. IEEE ICC, Cape Town, South Africa, May 2010.
    • (2010) Proc. IEEE ICC
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 236
    • 84897584002 scopus 로고    scopus 로고
    • Jamming games in the MIMO wiretap channel with an active eavesdropper
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pg. 82-91, Jan. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.1 , pp. 82-91
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 237
    • 80054826542 scopus 로고    scopus 로고
    • Secrecy games on the one-sided interference channel
    • July
    • J. Xie and S. Ulukus, "Secrecy games on the one-sided interference channel," in Proc. IEEE ISIT, July 2011.
    • (2011) Proc. IEEE ISIT
    • Xie, J.1    Ulukus, S.2
  • 238
    • 84873546762 scopus 로고    scopus 로고
    • A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer
    • Singapore, Nov.
    • M. Ara, H. Reboredo, S. Ghanem and M. R. D. Rodrigues, "A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer," in Proc. IEEE ICCS, Singapore, Nov. 2012.
    • (2012) Proc. IEEE ICCS
    • Ara, M.1    Reboredo, H.2    Ghanem, S.3    Rodrigues, M.R.D.4
  • 240
    • 84870524343 scopus 로고    scopus 로고
    • Tree formation with physical layer security considerations in wireless multihop networks
    • Nov.
    • W. Saad, X. Zhou, B. Maham, T. Basa̧r, and H. V. Poor, "Tree formation with physical layer security considerations in wireless multihop networks," IEEE Trans. Wireless Commun., vol. 11, no. 11, pp. 3980-3991, Nov. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.11 , pp. 3980-3991
    • Saad, W.1    Zhou, X.2    Maham, B.3    Basa̧r, T.4    Poor, H.V.5
  • 242
    • 84906663256 scopus 로고    scopus 로고
    • Improved wireless secrecy capacity using distributed auction theory
    • China
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Improved wireless secrecy capacity using distributed auction theory", in Proc. 5th ICMAS, China, 2009.
    • (2009) Proc. 5th ICMAS
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 244
    • 80051625959 scopus 로고    scopus 로고
    • A game theoretic approach to eavesdropper cooperation in MISO wireless networks
    • J. Cho, Y.-W. P. Hong, and C.-C. J. Kuo, "A game theoretic approach to eavesdropper cooperation in MISO wireless networks," in Proc. IEEE ICASSP, 2011.
    • (2011) Proc. IEEE ICASSP
    • Cho, J.1    Hong, Y.-W.P.2    Kuo, C.-C.J.3
  • 245
    • 0002406496 scopus 로고    scopus 로고
    • Cognitive radio for flexible mobile multimedia communications
    • Nov.
    • J. Mitola, "Cognitive radio for flexible mobile multimedia communications," in Proc. IEEE Int Mobile Multimedia Commun. Work., pp. 3-10, Nov. 1999.
    • (1999) Proc. IEEE Int Mobile Multimedia Commun. Work. , pp. 3-10
    • Mitola, J.1
  • 246
    • 77950149514 scopus 로고    scopus 로고
    • Security in cognitive radio networks: Threats and mitigation
    • May
    • T. C. Clancy and N. Goergen, "Security in cognitive radio networks: Threats and mitigation," in Proc. Crown Com, pp. 1-8, May 2008.
    • (2008) Proc. Crown Com , pp. 1-8
    • Clancy, T.C.1    Goergen, N.2
  • 247
    • 84873711287 scopus 로고    scopus 로고
    • A survey on security threats and detection techniques in cognitive radio networks
    • A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tutorials, vol. 15, no. 1, pp. 428-445, 2013.
    • (2013) IEEE Commun. Surveys Tutorials , vol.15 , Issue.1 , pp. 428-445
    • Fragkiadakis, A.1    Tragos, E.2    Askoxylakis, I.3
  • 248
    • 51349141382 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment
    • Aug.
    • T. X. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: a multi-dimensional analysis and assessment," in Proc. IEEE Crown Com, pp. 456-464, Aug. 2007.
    • (2007) Proc. IEEE Crown Com , pp. 456-464
    • Brown, T.X.1    Sethi, A.2
  • 249
    • 84906696247 scopus 로고    scopus 로고
    • On the secrecy capacity of fading cognitive wireless networks
    • May
    • S. Anand and R. Chandramouli, "On the secrecy capacity of fading cognitive wireless networks," in Proc. IEEE Crown Com, May 2008.
    • (2008) Proc. IEEE Crown Com
    • Anand, S.1    Chandramouli, R.2
  • 250
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1592 , Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1592
    • Pei, Y.1    Liang, Y.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 251
    • 80051757604 scopus 로고    scopus 로고
    • An information secrecy game in cognitive radio networks
    • Sep.
    • Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forens. Security , vol.6 , Issue.3 , pp. 831-842
    • Wu, Y.1    Liu, K.2
  • 252
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • Jan.
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134-145
    • Stanojev, I.1    Yener, A.2
  • 253
    • 84891365081 scopus 로고    scopus 로고
    • A game-theoretic view on the physical layer security of cognitive radio networks
    • Budapest, Hungary, June
    • A. Hojeij, W. Saad, and T. Basa̧r, "A game-theoretic view on the physical layer security of cognitive radio networks," in Proc. IEEE ICC, Budapest, Hungary, June 2013.
    • (2013) Proc. IEEE ICC
    • Hojeij, A.1    Saad, W.2    Basa̧r, T.3
  • 254
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.H.3
  • 255
    • 77953712316 scopus 로고    scopus 로고
    • On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
    • Mar.
    • H. Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. CISS, pp. 1-6, Mar. 2010.
    • (2010) Proc. CISS , pp. 1-6
    • Wang, H.1    Lightfoot, L.2    Li, T.3
  • 258
    • 84863928823 scopus 로고    scopus 로고
    • Scalable PHY-layer security for distributed detection in wireless sensor networks
    • Aug.
    • R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1118-1126
    • Soosahabi, R.1    Naraghi-Pour, M.2
  • 259
    • 65649139984 scopus 로고    scopus 로고
    • Distributed detection with censoring sensors under physical layer secrecy
    • S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.5 , pp. 1976-1986
    • Marano, S.1    Matta, V.2    Willett, P.K.3
  • 260
    • 64549108398 scopus 로고    scopus 로고
    • Security and privacy for distributed multimedia sensor networks
    • Jan.
    • D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. of the IEEE, vol. 96, no. 1, pp. 112-130, Jan. 2008.
    • (2008) Proc. of the IEEE , vol.96 , Issue.1 , pp. 112-130
    • Kundur, D.1    Luh, W.2    Okorafor, U.N.3    Zourntos, T.4
  • 261
    • 0032120966 scopus 로고    scopus 로고
    • Eavesdropper performance in cellular CDMA
    • July-Aug.
    • A. McKellips and S. Verd́u, "Eavesdropper performance in cellular CDMA," European Trans. Telecommun., vol. 9, no. 4, pp. 379-390, July-Aug. 1998.
    • (1998) European Trans. Telecommun. , vol.9 , Issue.4 , pp. 379-390
    • McKellips, A.1    Verd́u, S.2
  • 262
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Toronto, Canada July
    • M. Haenggi, "The secrecy graph and some of its properties, in Proc. IEEE ISIT, Toronto, Canada, July 2008, pp. 539-543.
    • (2008) Proc. IEEE ISIT , pp. 539-543
    • Haenggi, M.1
  • 264
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks Part I: Connectivity
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 265
    • 77955697302 scopus 로고    scopus 로고
    • Modeling location uncertainty for eavesdroppers: A secrecy graph approach
    • Austin, USA, June
    • S. Goel, V. Aggarwal, A. Yener, and A. R. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in Proc. IEEE ISIT, Austin, USA, June 2010, pp. 2627-2631.
    • (2010) Proc. IEEE ISIT , pp. 2627-2631
    • Goel, S.1    Aggarwal, V.2    Yener, A.3    Calderbank, A.R.4
  • 266
    • 84855911932 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 139-147
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 267
    • 84860255627 scopus 로고    scopus 로고
    • On secrecy capacity scaling in wireless networks
    • May
    • O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.O.1    Koksal, C.E.2    Gamal, H.E.3
  • 268
    • 70449514137 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs with malicious nodes
    • Seoul, Korea June
    • Y. Liang, H. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE ISIT, pp. 1189-1193, Seoul, Korea, June 2009.
    • (2009) Proc. IEEE ISIT , pp. 1189-1193
    • Liang, Y.1    Poor, H.2    Ying, L.3
  • 269
    • 84861618493 scopus 로고    scopus 로고
    • Secret communication in large wireless networks without eavesdropper location information
    • Orlando, USA, Mar.
    • C. Capar, D. Goeckel, B. Liu, and D. Towsley, "Secret communication in large wireless networks without eavesdropper location information," in Proc. IEEE INFOCOM, Orlando, USA, Mar. 2012, pp. 1152-1160.
    • (2012) Proc. IEEE INFOCOM , pp. 1152-1160
    • Capar, C.1    Goeckel, D.2    Liu, B.3    Towsley, D.4
  • 270
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjørungnes, A.4
  • 271
    • 84880159277 scopus 로고    scopus 로고
    • Physical layer security in cellular networks: A stochastic geometry approach
    • June
    • H. Wang, X. Zhou, and M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, June 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2776-2787
    • Wang, H.1    Zhou, X.2    Reed, M.C.3
  • 272
    • 84901273276 scopus 로고    scopus 로고
    • Secrecy transmission capacity of random networks
    • Pacific Grove, CA
    • S. Vuppala and G. Abreu, "Secrecy transmission capacity of random networks," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
    • (2013) Proc. 47th Asilomar Conf.
    • Vuppala, S.1    Abreu, G.2
  • 273
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb.
    • X. Zhou, R. Ganti, and J. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.2    Andrews, J.3
  • 274
    • 84881086388 scopus 로고    scopus 로고
    • Secure connectivity using randomize-and-forward strategy in cooperative wireless networks
    • July
    • C. Cai, Y. Cai, W. Yang, and W. Yang, "Secure connectivity using randomize-and-forward strategy in cooperative wireless networks," IEEE Commun. Lett., vol. 17, no. 7, pp. 1340-1343, July 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.7 , pp. 1340-1343
    • Cai, C.1    Cai, Y.2    Yang, W.3    Yang, W.4
  • 276
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • July
    • U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 277
    • 23744510451 scopus 로고    scopus 로고
    • Authentication with distortion criteria
    • DOI 10.1109/TIT.2005.850123
    • E. Martinian, G. W. Wornell, and B. Chen, "Authentication with distortion criteria," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2523-2542, July 2005. (Pubitemid 41136406)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.7 , pp. 2523-2542
    • Martinian, E.1    Wornell, G.W.2    Chen, B.3
  • 278
    • 61349140043 scopus 로고    scopus 로고
    • Authentication over noisy channels
    • Feb.
    • L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 906-916
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 280
    • 67650676864 scopus 로고    scopus 로고
    • Power allocation tradeoffs in multicarrier authentication systems
    • P. L. Yu, J. Baras, and B. Sadler, "Power allocation tradeoffs in multicarrier authentication systems, in Proc. IEEE Sarnoff Symp., 2009.
    • (2009) Proc. IEEE Sarnoff Symp.
    • Yu, P.L.1    Baras, J.2    Sadler, B.3
  • 282
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, pp. 43-52, 2006. (Pubitemid 46634301)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 285
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE ICC, 2007.
    • (2007) Proc. IEEE ICC
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 286
    • 51249120889 scopus 로고    scopus 로고
    • A physical layer technique to enhance authentication for mobile terminals
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "A physical layer technique to enhance authentication for mobile terminals," in Proc. IEEE ICC, 2008.
    • (2008) Proc. IEEE ICC
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 287
    • 73049092718 scopus 로고    scopus 로고
    • Channelbased spoofing detection in frequency-selective Rayleigh channels
    • Dec.
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.12 , pp. 5948-5956
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 289
    • 84883373500 scopus 로고    scopus 로고
    • Wireless user authentication via comparison of power spectral densities
    • Sep.
    • J. K. Tugnait, "Wireless user authentication via comparison of power spectral densities," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1791-1802, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1791-1802
    • Tugnait, J.K.1
  • 290
    • 77958096949 scopus 로고    scopus 로고
    • Non-cryptographic authentication and identification in wireless networks
    • Oct.
    • K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks," IEEE Wireless Commun., vol. 17, no. 5, pp. 56-62, Oct. 2010.
    • (2010) IEEE Wireless Commun , vol.17 , Issue.5 , pp. 56-62
    • Zeng, K.1    Govindan, K.2    Mohapatra, P.3
  • 291
    • 84864117726 scopus 로고    scopus 로고
    • Physical layer authentication over MIMO fading wiretap channels
    • July
    • P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, July 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.7 , pp. 2564-2573
    • Baracca, P.1    Laurenti, N.2    Tomasin, S.3
  • 292
    • 84883369844 scopus 로고    scopus 로고
    • Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices
    • Sep.
    • C.-Y. Wu, P.-C. Lan, P.-C. Yeh, C.-H. Lee, and C.-M. Cheng, "Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1687-1700, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1687-1700
    • Wu, C.-Y.1    Lan, P.-C.2    Yeh, P.-C.3    Lee, C.-H.4    Cheng, C.-M.5
  • 293
  • 294
    • 84864883415 scopus 로고    scopus 로고
    • Physical layer security in wireless smart grid
    • Aug.
    • L. Eun-Kyu, M. Gerla, and S. Y. Oh, "Physical layer security in wireless smart grid," IEEE Commun. Mag., vol. 50, no. 8, pp. 46-52, Aug. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.8 , pp. 46-52
    • Eun-Kyu, L.1    Gerla, M.2    Oh, S.Y.3
  • 296
    • 84891357173 scopus 로고    scopus 로고
    • Secrecy capacity optimization in coordinated multi-point processing
    • Budapest, Hungary
    • M. Zhang, R. Xue, H. Yu, H. Luo, and W. Chen, "Secrecy capacity optimization in coordinated multi-point processing," in Proc. IEEE ICC, Budapest, Hungary, 2013.
    • (2013) Proc. IEEE ICC
    • Zhang, M.1    Xue, R.2    Yu, H.3    Luo, H.4    Chen, W.5
  • 297
    • 84861906601 scopus 로고    scopus 로고
    • Spatial data encryption using phase conjugating lenses
    • June
    • O. Malyuskin and V. Fusco, "Spatial data encryption using phase conjugating lenses," IEEE Trans. Antennas Propag., vol. 60, no. 6, pp. 2913-2920, June 2012.
    • (2012) IEEE Trans. Antennas Propag. , vol.60 , Issue.6 , pp. 2913-2920
    • Malyuskin, O.1    Fusco, V.2
  • 298
    • 80051779980 scopus 로고    scopus 로고
    • Secure communications over wireless broadcast networks: Stability and utility maximization
    • Sep.
    • Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-782, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 682-782
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 299
    • 84883421953 scopus 로고    scopus 로고
    • Achieving full secrecy rate with low packet delays: An optimal control approach
    • Sep.
    • Z. Mao, C. E. Koksal, and N. B. Shroff, "Achieving full secrecy rate with low packet delays: An optimal control approach," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1944-1956, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1944-1956
    • Mao, Z.1    Koksal, C.E.2    Shroff, N.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.