메뉴 건너뛰기




Volumn 14, Issue 9, 2015, Pages 5135-5146

Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?

Author keywords

AF; DF; LS MIMO; performance analysis; Physical layer security

Indexed keywords

ANTENNA ARRAYS; COMMUNICATION CHANNELS (INFORMATION THEORY); LOCAL AREA NETWORKS; MIMO SYSTEMS; NETWORK LAYERS;

EID: 84946607375     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2433291     Document Type: Article
Times cited : (152)

References (38)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 79955372872 scopus 로고    scopus 로고
    • Physical layer security in wireless networks: A tutorial
    • Apr.
    • Y. Shui, S. Chang, H. Wu, S. Huang, and H. Chen, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
    • (2011) IEEE Wireless Commun. , vol.18 , Issue.2 , pp. 66-74
    • Shui, Y.1    Chang, S.2    Wu, H.3    Huang, S.4    Chen, H.5
  • 3
    • 84863941590 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for secure OFDMA systems
    • Jul.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2572-2585
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 4
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap
    • Feb.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Feb. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 5
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 6
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 7
    • 84890121948 scopus 로고    scopus 로고
    • Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
    • Oct.
    • X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.5 , pp. 503-506
    • Chen, X.1    Yin, R.2
  • 8
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.3    Poor, H.4
  • 9
    • 84961839468 scopus 로고    scopus 로고
    • Multi-antenna relay aided wireless physical layer security
    • Jun.
    • X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security," IEEE Commun. Mag., vol. 53, no. 6, pp. 1-17, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 1-17
    • Chen, X.1    Zhong, C.2    Yuen, C.3    Chen, H.-H.4
  • 10
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 11
    • 84879149313 scopus 로고    scopus 로고
    • Secure relay beamforming with imperfect channel side information
    • Jun.
    • X. Wang, K. Wang, and X. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2140-2155
    • Wang, X.1    Wang, K.2    Zhang, X.3
  • 12
    • 84878739878 scopus 로고    scopus 로고
    • Decode-and-foreard relay beamforming for secrecy with finite-alphabet input
    • May
    • S. Vishwakarma and A. Chockalingam, "Decode-and-foreard relay beamforming for secrecy with finite-alphabet input," IEEE Commun. Lett., vol. 17, no. 5, pp. 912-915, May 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.5 , pp. 912-915
    • Vishwakarma, S.1    Chockalingam, A.2
  • 13
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Oct.
    • J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 14
    • 84883380753 scopus 로고    scopus 로고
    • On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
    • Sep.
    • K. Park, T. Wang, and M. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1741-1750
    • Park, K.1    Wang, T.2    Alouini, M.3
  • 15
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.1    Lo, E.2    Schober, R.3
  • 16
    • 84862571591 scopus 로고    scopus 로고
    • Relay placement for physical layer security: A secure connection perspective
    • Jun.
    • J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.6 , pp. 878-881
    • Mo, J.1    Tao, M.2    Liu, Y.3
  • 17
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical-layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 18
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zhang, L. Choo, and K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zhang, G.1    Choo, L.2    Wong, K.3
  • 19
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • Jan.
    • H. Wang, M. Luo, X. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.1    Luo, M.2    Xia, X.3    Yin, Q.4
  • 20
    • 84872099887 scopus 로고    scopus 로고
    • Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
    • Jan.
    • H. Long, W. Xiang, Y. Zhang, Y. Liu, and W. Wang, "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 229-238, Jan. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.1 , pp. 229-238
    • Long, H.1    Xiang, W.2    Zhang, Y.3    Liu, Y.4    Wang, W.5
  • 21
    • 84870499401 scopus 로고    scopus 로고
    • A general relaying transmission protocol for MIMO secrecy communications
    • Nov.
    • Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.11 , pp. 3461-3471
    • Ding, Z.1    Peng, M.2    Chen, H.-H.3
  • 22
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.2    Kim, D.3
  • 23
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 24
    • 84883365784 scopus 로고    scopus 로고
    • Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel
    • Sep.
    • Z. Ho, E. Jorswieck, and S. Engelmann, "Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1672-1686, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1672-1686
    • Ho, Z.1    Jorswieck, E.2    Engelmann, S.3
  • 25
    • 84877584209 scopus 로고    scopus 로고
    • Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee
    • Apr.
    • X. Chen and L. Lei, "Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee," IEEE Commun. Lett., vol. 17, no. 4, pp. 637-640, Apr. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.4 , pp. 637-640
    • Chen, X.1    Lei, L.2
  • 26
    • 84872184553 scopus 로고    scopus 로고
    • Physical layer security of TAS/MRC with antenna correlation
    • Jan.
    • N. Yang, H. Suraweera, I. Collings, and C. Yuen, "Physical layer security of TAS/MRC with antenna correlation," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 254-259, Jan. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.1 , pp. 254-259
    • Yang, N.1    Suraweera, H.2    Collings, I.3    Yuen, C.4
  • 27
    • 78449301600 scopus 로고    scopus 로고
    • Noncooperative cellular wireless with unlimited number of base station antennas
    • Nov.
    • T. L. Marzetta, "Noncooperative cellular wireless with unlimited number of base station antennas," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590-3600, Nov. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.11 , pp. 3590-3600
    • Marzetta, T.L.1
  • 28
    • 85032752174 scopus 로고    scopus 로고
    • Scaling to MIMO: Opportunities and challenges with very large arrays
    • Jan.
    • F. Ruseket al., "Scaling to MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 20, no. 1, pp. 40-60, Jan. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.20 , Issue.1 , pp. 40-60
    • Rusek, F.1
  • 29
    • 84907220339 scopus 로고    scopus 로고
    • Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis
    • Jul.
    • J. Zhang, C. Yuen, C.-K. Wen, S. Jin, and X. Gao, "Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis," IEEE Commun. Lett., vol. 18, no. 9, pp. 1627-1630, Jul. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.9 , pp. 1627-1630
    • Zhang, J.1    Yuen, C.2    Wen, C.-K.3    Jin, S.4    Gao, X.5
  • 30
    • 84963567995 scopus 로고    scopus 로고
    • Linear precoding of data and artificial noise in secure massive MIMO systems
    • J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," submitted to IEEE Trans. Wireless Commun., 2015. [Online]. Available: http://arxiv.org/pdf/1505.00330.pdf
    • (2015) IEEE Trans. Wireless Commun.
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 31
    • 84943372153 scopus 로고    scopus 로고
    • Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI
    • Dec.
    • X. Chen, C. Yuen, and Z. Zhang, "Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 1648-1635.
    • (2014) Proc. IEEE GLOBECOM , pp. 1635-1648
    • Chen, X.1    Yuen, C.2    Zhang, Z.3
  • 32
    • 84880150823 scopus 로고    scopus 로고
    • Large system analysis of linear precoding in MISO broadcast channels with confidential message
    • Sep.
    • G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential message," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1660-1671
    • Geraci, G.1    Couillet, R.2    Yuan, J.3    Debbah, M.4    Collings, I.B.5
  • 33
    • 84907195591 scopus 로고    scopus 로고
    • Secure transmission in multicell massive MIMO systems
    • Sep.
    • J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.9 , pp. 4766-4781
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 34
    • 84860389999 scopus 로고    scopus 로고
    • Pilot contamination and precoding in multi-cell TDD systems
    • Aug.
    • J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, "Pilot contamination and precoding in multi-cell TDD systems," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2640-2651, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2640-2651
    • Jose, J.1    Ashikhmin, A.2    Marzetta, T.L.3    Vishwanath, S.4
  • 35
    • 84907003935 scopus 로고    scopus 로고
    • On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI
    • Jun.
    • X. Chen, L. Lei, H. Zhang, and C. Yuen, "On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI," in Proc. IEEE ICC, Jun. 2014, pp. 2052-2057.
    • (2014) Proc. IEEE ICC , pp. 2052-2057
    • Chen, X.1    Lei, L.2    Zhang, H.3    Yuen, C.4
  • 36
    • 84903595688 scopus 로고    scopus 로고
    • Robust beamforming for secure communication in systems with wireless information and power transfer
    • Aug.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.8 , pp. 4599-4615
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 37
    • 73049107143 scopus 로고    scopus 로고
    • Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT
    • Jul.
    • D. S. W. Hui and V. K. N. Lau, "Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3484-3491, Jul. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.7 , pp. 3484-3491
    • Hui, D.S.W.1    Lau, V.K.N.2
  • 38
    • 4544234593 scopus 로고    scopus 로고
    • Multiple-antenna channel hardening and its implications for rate-feedback and scheduling
    • Sep.
    • B. M. Hochwald, T. L. Marzetta, and V. Tarokh, "Multiple-antenna channel hardening and its implications for rate-feedback and scheduling," IEEE Tran. Inf. Theory, vol. 50, no. 9, pp. 1893-1909, Sep. 2004.
    • (2004) IEEE Tran. Inf. Theory , vol.50 , Issue.9 , pp. 1893-1909
    • Hochwald, B.M.1    Marzetta, T.L.2    Tarokh, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.