메뉴 건너뛰기




Volumn 29, Issue 1, 2015, Pages 42-48

Improving physical-layer security in wireless communications using diversity techniques

Author keywords

[No Author keywords available]

Indexed keywords

BEAMFORMING; COMMUNICATION CHANNELS (INFORMATION THEORY); FADING (RADIO); LOCAL AREA NETWORKS; MIMO SYSTEMS; NETWORK LAYERS; RADIO TRANSMISSION; RADIO WAVES; RAYLEIGH FADING; SECURITY SYSTEMS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84921832973     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2015.7018202     Document Type: Article
Times cited : (272)

References (15)
  • 1
    • 15344350656 scopus 로고    scopus 로고
    • An overview of public key cryptography
    • May
    • M. E. Hellman, "An Overview of Public Key Cryptography," IEEE Commun. Mag., vol. 16, no. 6, May 2002, pp. 42-49.
    • (2002) IEEE Commun. Mag. , vol.16 , Issue.6 , pp. 42-49
    • Hellman, M.E.1
  • 2
    • 33646932650 scopus 로고    scopus 로고
    • A primer on cryptography in communications
    • Apr.
    • S. V. Kartalopoulos, "A Primer on Cryptography In Communications," IEEE Commun. Mag., vol. 20, no. 4, Apr. 2006, pp. 146-51.
    • (2006) IEEE Commun. Mag. , vol.20 , Issue.4 , pp. 146-151
    • Kartalopoulos, S.V.1
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Aug.
    • A. D. Wyner, "The Wire-Tap Channel," Bell Sys. Tech. J., vol. 54, no. 8, Aug. 1975, pp. 1355-87.
    • (1975) Bell Sys. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0032022195 scopus 로고    scopus 로고
    • On limits of wireless communications in a fading environment when using multiple antennas
    • Mar.
    • G. J. Foschini and M. J. Gans, "On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas," Wireless Personal Commun., vol. 6, no. 3, Mar. 1998, pp. 311-35.
    • (1998) Wireless Personal Commun. , vol.6 , Issue.3 , pp. 311-335
    • Foschini, G.J.1    Gans, M.J.2
  • 6
    • 84858300925 scopus 로고    scopus 로고
    • Opportunistic distributed space-time coding for decode-and-forward cooperation systems
    • Apr.
    • Y. Zou, Y.-D. Yao, and B. Zheng, "Opportunistic Distributed Space-Time Coding For Decode-And-Forward Cooperation Systems," IEEE Trans. Signal Processing, vol. 60, no. 4, Apr. 2012, pp. 1766-81.
    • (2012) IEEE Trans. Signal Processing , vol.60 , Issue.4 , pp. 1766-1781
    • Zou, Y.1    Yao, Y.-D.2    Zheng, B.3
  • 7
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Info. Theory, vol. 57, no. 8, Aug. 2011, pp. 4961-72.
    • (2011) IEEE Trans. Info. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 8
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Processing, vol. 58, no. 3, Mar. 2010, pp. 1875-88.
    • (2010) IEEE Trans. Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1
  • 9
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang et al., "Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Info. Forensics Sec., vol. 8, no. 12, Dec. 2013, pp. 2007-20.
    • (2013) IEEE Trans. Info. Forensics Sec. , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1
  • 10
    • 84896912180 scopus 로고    scopus 로고
    • Joint physical-application layer security for wireless multimedia delivery
    • Mar.
    • L. Zhou et al., "Joint Physical-Application Layer Security for Wireless Multimedia Delivery," IEEE Commun. Mag., vol. 52, no. 3, Mar. 2014, pp. 66-72.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.3 , pp. 66-72
    • Zhou, L.1
  • 11
    • 85032751057 scopus 로고    scopus 로고
    • Coding for secrecy: An overview of error-control coding techniques for physical-layer security
    • Sept.
    • W. Harrison et al., "Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security," IEEE Signal Processing Mag., vol. 30, no. 5, Sept. 2013, pp. 41-50.
    • (2013) IEEE Signal Processing Mag. , vol.30 , Issue.5 , pp. 41-50
    • Harrison, W.1
  • 12
    • 84879072350 scopus 로고    scopus 로고
    • On physical layer security for cognitive radio networks
    • June
    • Z. Shu, Y. Qian, and S. Ci, "On Physical Layer Security for Cognitive Radio Networks," IEEE Network, vol. 27, no. 3, June 2013, pp. 28-33.
    • (2013) IEEE Network , vol.27 , Issue.3 , pp. 28-33
    • Shu, Z.1    Qian, Y.2    Ci, S.3
  • 13
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, and W. Shen, "Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks," IEEE Trans. Commun., vol. 61, no. 12, Dec. 2013, pp. 5103-13.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 14
    • 45249104850 scopus 로고    scopus 로고
    • Wireless information-theoretic security
    • June
    • M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Theory, vol. 54, no. 6, June 2008, pp. 2515-34.
    • (2008) IEEE Trans. Info. Theory , vol.54 , Issue.6 , pp. 2515-2534
    • Bloch, M.1
  • 15
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical-layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, and W. Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE JSAC, vol. 31, no. 10, Oct. 2013, pp. 2099-2111.
    • (2013) IEEE JSAC , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.