메뉴 건너뛰기




Volumn 2015-September, Issue , 2015, Pages 4877-4882

On the security of large scale spectrum sharing networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84953729290     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2015.7249095     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 1
    • 80052406591 scopus 로고    scopus 로고
    • Survey of security issues in cognitive radio networks
    • W. El-Hajj, H. Safa, and M. Guizani, "Survey of security issues in cognitive radio networks," J. Internet Tech., Vol. 12, no. 2, pp. 181-198, 2011.
    • (2011) J. Internet Tech. , vol.12 , Issue.2 , pp. 181-198
    • El-Hajj, W.1    Safa, H.2    Guizani, M.3
  • 2
    • 67349259569 scopus 로고    scopus 로고
    • Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
    • May
    • A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proc. IEEE, Vol. 97, no. 5, pp. 894-914, May. 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.5 , pp. 894-914
    • Goldsmith, A.1    Jafar, S.A.2    Maric, I.3    Srinivasa, S.4
  • 3
    • 84898685324 scopus 로고    scopus 로고
    • Opportunistic user association for multi-service hetnets using nash bargaining solution
    • Mar.
    • D. Liu, Y. Chen, K. K. Chai, T. Zhang, and M. Elkashlan, "Opportunistic user association for multi-service hetnets using nash bargaining solution," IEEE Commun. Lett., Vol. 18, no. 3, pp. 463-466, Mar. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.3 , pp. 463-466
    • Liu, D.1    Chen, Y.2    Chai, K.K.3    Zhang, T.4    Elkashlan, M.5
  • 4
    • 84879072350 scopus 로고    scopus 로고
    • On physical layer security for cognitive radio networks
    • Jun.
    • Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., Vol. 27, no. 3, pp. 28-33, Jun. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.3 , pp. 28-33
    • Shu, Z.1    Qian, Y.2    Ci, S.3
  • 5
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Nice, France, Jun
    • S. Shafiee and S. Ulukus, "Achievable rates in gaussian MISO channels with secrecy constraints," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE ISIT , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 6
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., Vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 7
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks - Part I: Connectivity
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks - part I: Connectivity," IEEE Trans. Inf. Forensics Security, Vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 8
    • 84903148893 scopus 로고    scopus 로고
    • Physical layer security in downlink multi-antenna cellular networks
    • Jun.
    • G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., Vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.6 , pp. 2006-2021
    • Geraci, G.1    Dhillon, H.S.2    Andrews, J.G.3    Yuan, J.4    Collings, I.B.5
  • 9
    • 78650414067 scopus 로고    scopus 로고
    • An overview of the transmission capacity of wireless networks
    • Dec.
    • S. Weber, J. G. Andrews, and N. Jindal, "An overview of the transmission capacity of wireless networks," IEEE Trans. Commun., Vol. 58, no. 12, pp. 3593-3604, Dec. 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.12 , pp. 3593-3604
    • Weber, S.1    Andrews, J.G.2    Jindal, N.3
  • 10
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • Sep.
    • M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., Vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Andrews, J.G.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5
  • 11
    • 84919662237 scopus 로고    scopus 로고
    • Breaking the area spectral efficiency wall in cognitive underlay networks
    • Feb.
    • S. A. R. Zaidi, D. C. McLernon, and M. Ghogho, "Breaking the area spectral efficiency wall in cognitive underlay networks," IEEE J. Sel. Areas Commun., Vol. 32, no. 11, pp. 1-17, Feb. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.11 , pp. 1-17
    • Zaidi, S.A.R.1    McLernon, D.C.2    Ghogho, M.3
  • 12
    • 85028099494 scopus 로고    scopus 로고
    • Interference and outage in poisson cognitive networks
    • Apr.
    • C. han Lee and M. Haenggi, "Interference and outage in poisson cognitive networks," IEEE Trans. Wireless Commun., Vol. 11, no. 4, pp. 1392-1401, Apr. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.4 , pp. 1392-1401
    • Han Lee, C.1    Haenggi, M.2
  • 13
    • 84887058800 scopus 로고    scopus 로고
    • Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
    • Nov.
    • X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, Vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1802-1814
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 14
    • 85010046244 scopus 로고
    • Stochastic geometry and its applications
    • D. Stoyan, W. Kendall, and J. Mecke, "Stochastic geometry and its applications," Wiley New York, Vol. 2, 1987.
    • (1987) Wiley New York , vol.2
    • Stoyan, D.1    Kendall, W.2    Mecke, J.3
  • 15
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 16
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct.
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., Vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 17
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb.
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, Vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.