메뉴 건너뛰기




Volumn 64, Issue 10, 2015, Pages 4893-4898

Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems

Author keywords

Beamforming; physical layer security; power allocation; relay system

Indexed keywords

DATA COMMUNICATION SYSTEMS; DATA TRANSFER; EIGENVALUES AND EIGENFUNCTIONS; JAMMING; NETWORK LAYERS; OPTIMIZATION; RADIO LINKS; RADIO TRANSCEIVERS;

EID: 84957100456     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2014.2370754     Document Type: Article
Times cited : (101)

References (17)
  • 1
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 2
    • 77955026667 scopus 로고    scopus 로고
    • Collaborative relay beamforming for secure broadcasting
    • Princeton, NJ, USA, Apr
    • J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secure broadcasting," in Proc. IEEE WCNC, Princeton, NJ, USA, Apr. 2010, pp. 1-6.
    • (2010) Proc. IEEE WCNC , pp. 1-6
    • Zhang, J.1    Gursoy, M.C.2
  • 3
    • 77953707901 scopus 로고    scopus 로고
    • Relay beamforming strategies for physicallayer security
    • Princeton, NJ, USA, Mar
    • J. Zhang and M. C. Gursoy, "Relay beamforming strategies for physicallayer security," in Proc. CISS, Princeton, NJ, USA, Mar. 2010, pp. 1-6.
    • (2010) Proc. CISS , pp. 1-6
    • Zhang, J.1    Gursoy, M.C.2
  • 4
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 5
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-39, Jan. 2013.
    • (2013) IEEE Signal Process. Lett , vol.20 , Issue.1 , pp. 35-39
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 6
    • 77955397265 scopus 로고    scopus 로고
    • Friendly jamming for wireless secrecy
    • Cape Town, South Africa
    • M. Bloch, J. Barros, J. P. Vilela, and S. W. McLaughlin, "Friendly jamming for wireless secrecy," in Proc. IEEE ICC, Cape Town, South Africa, 2010, pp. 1-6.
    • (2010) Proc. IEEE ICC , pp. 1-6
    • Bloch, M.1    Barros, J.2    Vilela, J.P.3    McLaughlin, S.W.4
  • 7
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct
    • I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 8
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar
    • G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 9
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 10
    • 84883380753 scopus 로고    scopus 로고
    • On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
    • Sep
    • K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE. J. Sel. Areas Commun., vol, 31, no. 9, pp. 1741-1750, Sep. 2013.
    • (2013) IEEE. J. Sel. Areas Commun , vol.31 , Issue.9 , pp. 1741-1750
    • Park, K.-H.1    Wang, T.2    Alouini, M.-S.3
  • 11
    • 84870499401 scopus 로고    scopus 로고
    • A general relaying transmission protocol for MIMO secrecy communications
    • Nov
    • Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
    • (2012) IEEE Trans. Commun , vol.60 , Issue.11 , pp. 3461-3471
    • Ding, Z.1    Peng, M.2    Chen, H.-H.3
  • 12
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • Jan
    • H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 13
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 14
    • 84904282993 scopus 로고    scopus 로고
    • Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
    • Aug
    • H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.8 , pp. 1240-1250
    • Wang, H.-M.1    Liu, F.2    Xia, X.-G.3
  • 15
    • 84883052221 scopus 로고    scopus 로고
    • An effective secure transmission scheme for AF relay networks with two-hop information leakage
    • Aug
    • M. Lin, J. Ge, and Y. Yang, "An effective secure transmission scheme for AF relay networks with two-hop information leakage," IEEE Commun. Lett., vol. 17, no. 8, pp. 1676-1679, Aug. 2013.
    • (2013) IEEE Commun. Lett , vol.17 , Issue.8 , pp. 1676-1679
    • Lin, M.1    Ge, J.2    Yang, Y.3
  • 16
    • 34247359530 scopus 로고    scopus 로고
    • Optimal design of non-regenerative MIMO wireless relays
    • Apr
    • X. Tang and Y. Hua, "Optimal design of non-regenerative MIMO wireless relays," IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1398-1407, Apr. 2007.
    • (2007) IEEE Trans. Wireless Commun , vol.6 , Issue.4 , pp. 1398-1407
    • Tang, X.1    Hua, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.