메뉴 건너뛰기




Volumn 103, Issue 10, 2015, Pages 1814-1825

Wireless Physical-Layer Security: Lessons Learned from Information Theory

Author keywords

Cooperative jamming; information theoretic secrecy; physical layer security; structured signaling; untrusted relays

Indexed keywords

COMPUTATION THEORY; NETWORK LAYERS; RELIABILITY THEORY; SECURITY SYSTEMS;

EID: 84959499960     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/JPROC.2015.2459592     Document Type: Article
Times cited : (171)

References (70)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 2
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 3
    • 84862323270 scopus 로고    scopus 로고
    • [Online]
    • "RSA factoring challenge." [Online]. Available: http://en.wikipedia.org/wiki/RSA-Factoring-Challenge
    • RSA Factoring Challenge
  • 7
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan.
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 8
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 9
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Germany: Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in CryptologyVEUROCRYPT 2000. Berlin, Germany: Springer-Verlag, 2000, pp. 351-368.
    • (2000) Advances in CryptologyVEUROCRYPT 2000. Berlin , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 11
    • 84871819283 scopus 로고    scopus 로고
    • Strong secrecy and reliable byzantine detection in the presence of an untrusted relay
    • X. He and A. Yener, "Strong secrecy and reliable byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.1 , pp. 177-192
    • He, X.1    Yener, A.2
  • 13
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
    • Apr.
    • M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 14
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec.
    • M. Bloch and J. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.1    Laneman, J.2
  • 15
    • 80051727482 scopus 로고    scopus 로고
    • Strongly secure communications over the two-way wiretap channel
    • Sep.
    • A. Pierrot and M. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Foren. Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
    • (2011) IEEE Trans. Inf. Foren. Security , vol.6 , Issue.3 , pp. 595-605
    • Pierrot, A.1    Bloch, M.2
  • 20
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 21
    • 45249085230 scopus 로고    scopus 로고
    • Secret communication with a fading eavesdropper channel
    • Jun.
    • Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 1296-1300.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 1296-1300
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 22
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.1    Lai, L.2    Gamal, H.E.3
  • 23
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 26
    • 77956908999 scopus 로고    scopus 로고
    • Achieving secret communication for fast rayleigh fading channels
    • Sep.
    • Z. Li, R. Yates, and W. Trappe, "Achieving secret communication for fast rayleigh fading channels," IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.9 , pp. 2792-2799
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 27
    • 84908291362 scopus 로고    scopus 로고
    • On the secrecy capacity of the wiretap channel with imperfect main channel estimation
    • Oct.
    • Z. Rezki, A. Khisti, andM.-S. Alouini, "On the secrecy capacity of the wiretap channel with imperfect main channel estimation," IEEE Trans. Commun., vol. 62, no. 10, pp. 3652-3664, Oct. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.10 , pp. 3652-3664
    • Rezki, Z.1    Khisti, A.2    Alouini, M.-S.3
  • 29
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.2
  • 30
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sep.
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 31
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 32
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • Jun.
    • R. Liu, I.Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 33
    • 79952846257 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
    • E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 2083-2114
    • Ekrem, E.1    Ulukus, S.2
  • 34
    • 84908245996 scopus 로고    scopus 로고
    • MIMO wiretap channels with unknown and varying eavesdropper channel states
    • Nov.
    • X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.11 , pp. 6844-6869
    • He, X.1    Yener, A.2
  • 35
    • 84880521772 scopus 로고    scopus 로고
    • MIMO multiple access channel with an arbitrarily varying eavesdropper
    • X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.8 , pp. 4733-4745
    • He, X.1    Khisti, A.2    Yener, A.3
  • 36
    • 84893760853 scopus 로고    scopus 로고
    • MIMO broadcast channel with an unknown eavesdropper: Secrecy degrees of freedom
    • Jan.
    • X. He, A. Khisti, and A. Yener, "MIMO broadcast channel with an unknown eavesdropper: Secrecy degrees of freedom," IEEE Trans. Commun., vol. 62, no. 1, pp. 246-255, Jan. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.1 , pp. 246-255
    • He, X.1    Khisti, A.2    Yener, A.3
  • 37
    • 40949147785 scopus 로고    scopus 로고
    • Multiple access channels with confidential messages
    • Mar.
    • Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 38
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 39
    • 61349186445 scopus 로고    scopus 로고
    • Capacity of cognitive interference channels with and without secrecy
    • Feb.
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 604-619
    • Liang, Y.1    Somekh-Baruch, A.2    Poor, H.V.3    Shamai, S.4    Verdu, S.5
  • 40
    • 79955504787 scopus 로고    scopus 로고
    • The Gaussian many-to-one interference channel with confidential messages
    • May
    • X. He and A. Yener, "The Gaussian many-to-one interference channel with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2730-2745, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 2730-2745
    • He, X.1    Yener, A.2
  • 41
    • 84875720845 scopus 로고    scopus 로고
    • The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise
    • Oct.
    • X. He and A. Yener, "The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise," in Proc. 50th Annu. Allerton Conf. Commun. Control Comput., Oct. 2012.
    • (2012) Proc. 50th Annu. Allerton Conf. Commun. Control Comput.
    • He, X.1    Yener, A.2
  • 42
    • 85032751357 scopus 로고    scopus 로고
    • Cooperative security at the physical layer: A summary of recent advances
    • R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Processing Mag., vol. 30, no. 5, pp. 16-28, 2013.
    • (2013) IEEE Signal Processing Mag. , vol.30 , Issue.5 , pp. 16-28
    • Bassily, R.1
  • 44
    • 39049168628 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel with collective secrecy constraints
    • Jul.
    • E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2006.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory
    • Tekin, E.1    Yener, A.2
  • 45
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 47
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
    • Sep.
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. 44th Annu. Allerton Conf. Commun. Control Comput., Sep. 2006.
    • (2006) Proc. 44th Annu. Allerton Conf. Commun. Control Comput.
    • Tekin, E.1    Yener, A.2
  • 48
    • 84896958699 scopus 로고    scopus 로고
    • Providing secrecy with structured codes: Two-user Gaussian channels
    • X. He and A. Yener, "Providing secrecy with structured codes: Two-user Gaussian channels," IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.4 , pp. 2121-2138
    • He, X.1    Yener, A.2
  • 49
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical-layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical-layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.3    Poor, H.4
  • 50
    • 84901263705 scopus 로고    scopus 로고
    • Secure degrees of freedom of one-hop wireless networks
    • Jun.
    • J. Xie and S. Ulukus, "Secure degrees of freedom of one-hop wireless networks," IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3359-3378, Jun. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.6 , pp. 3359-3378
    • Xie, J.1    Ulukus, S.2
  • 51
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • Dec.
    • E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.12 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 52
    • 58249142630 scopus 로고    scopus 로고
    • Interference alignment on the deterministic channel and application to fully connected Gaussian interference networks
    • Jan.
    • V. Cadambe, S. Jafar, and S. Shamai, "Interference alignment on the deterministic channel and application to fully connected Gaussian interference networks," IEEE Trans. Inf. Theory, vol. 55, no. 1, pp. 269-274, Jan. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.1 , pp. 269-274
    • Cadambe, V.1    Jafar, S.2    Shamai, S.3
  • 53
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
    • Oct.
    • U. Erez and R. Zamir, "Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.10 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 54
    • 26844546304 scopus 로고    scopus 로고
    • Lattices which are good for (almost) everything
    • Oct.
    • U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.10 , pp. 3401-3416
    • Erez, U.1    Litsyn, S.2    Zamir, R.3
  • 55
    • 79960678507 scopus 로고    scopus 로고
    • Compute-and-forward: Harnessing interference through structured codes
    • B. Nazer and M. Gastpar, "Compute-and-forward: Harnessing interference through structured codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463-6486, 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6463-6486
    • Nazer, B.1    Gastpar, M.2
  • 56
    • 77958563966 scopus 로고    scopus 로고
    • Joint physical layer coding and network coding for bidirectional relaying
    • Nov.
    • M. Wilson, K. Narayanan, H. Pfister, and A. Sprintson, "Joint physical layer coding and network coding for bidirectional relaying," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5641-5654, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5641-5654
    • Wilson, M.1    Narayanan, K.2    Pfister, H.3    Sprintson, A.4
  • 57
    • 84857722105 scopus 로고    scopus 로고
    • Ergodic secret alignment
    • Mar.
    • R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1594-1611
    • Bassily, R.1    Ulukus, S.2
  • 58
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 59
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Sep.
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2001.
    • (2001) Proc. IEEE Inf. Theory Workshop
    • Oohama, Y.1
  • 60
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Jun.
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory
    • Oohama, Y.1
  • 61
    • 0018523303 scopus 로고
    • Capacity theorems for the relay channel
    • T. M. Cover and A. E. Gamal, "Capacity theorems for the relay channel," IEEE Trans. Inf. Theory, vol. 25, no. 9, pp. 572-584, 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.9 , pp. 572-584
    • Cover, T.M.1    Gamal, A.E.2
  • 62
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 63
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • Nov.
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., Nov. 2009, Art. ID. 305146.
    • (2009) EURASIP J. Wireless Commun. Netw.
    • He, X.1    Yener, A.2
  • 64
    • 0019069689 scopus 로고
    • Source coding theory for multiterminal communication systems with a remote source
    • Oct.
    • H. Yamamoto and K. Itoh, "Source coding theory for multiterminal communication systems with a remote source," Trans. IECE Jpn., vol. E-63, pp. 700-706, Oct. 1980.
    • (1980) Trans. IECE Jpn. , vol.E-63 , pp. 700-706
    • Yamamoto, H.1    Itoh, K.2
  • 65
    • 84929346934 scopus 로고    scopus 로고
    • The multiple access channel with an untrusted relay
    • presented at Nov
    • A. Zewail and A. Yener, "The multiple access channel with an untrusted relay," presented at the IEEE Inf. Theory Workshop, Nov. 2014.
    • (2014) The IEEE Inf. Theory Workshop
    • Zewail, A.1    Yener, A.2
  • 67
    • 84873099749 scopus 로고    scopus 로고
    • End-to-end secure multi-hop communication with untrusted relays
    • X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 1-11
    • He, X.1    Yener, A.2
  • 68
    • 84873097542 scopus 로고    scopus 로고
    • Improving secrecy rate via spectrum leasing for friendly jamming
    • I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 134-145
    • Stanojev, I.1    Yener, A.2
  • 69
    • 84881483763 scopus 로고    scopus 로고
    • Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
    • Mar.
    • J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. Conf. Inf. Sci. Syst., Mar. 2013.
    • (2013) Proc. Conf. Inf. Sci. Syst.
    • Xie, J.1    Ulukus, S.2
  • 70
    • 80051928178 scopus 로고    scopus 로고
    • Multiple access wiretap channels with strong secrecy
    • Aug.
    • M. Yassaee and M. Aref, "Multiple access wiretap channels with strong secrecy," in Proc. IEEE Inf. Theory Workshop, Aug. 2010, pp. 1-5.
    • (2010) Proc. IEEE Inf. Theory Workshop , pp. 1-5
    • Yassaee, M.1    Aref, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.