-
2
-
-
84923122221
-
Machine-to-machine communications with in-network data aggregation, processing and actuation for large scale cyber-physical systems
-
Apr.
-
I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing and actuation for large scale cyber-physical systems," IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.2
, pp. 122-128
-
-
Stojmenovic, I.1
-
3
-
-
79953785474
-
GRS: The green, reliability, security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, security of emerging machine to machine communications," IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
4
-
-
84903157057
-
Machine-to-machine communication
-
Jul./Aug.
-
M. Weyrich, J.-P. Schmidt, and C. Ebert, "Machine-to-machine communication," IEEE Software, vol. 31, no. 4, pp. 19-23, Jul./Aug. 2014.
-
(2014)
IEEE Software
, vol.31
, Issue.4
, pp. 19-23
-
-
Weyrich, M.1
Schmidt, J.-P.2
Ebert, C.3
-
5
-
-
77954774933
-
Towards resource-aware network of networks
-
May
-
A. Manzalini, R. Minerva, and C. Moiso, "Towards resource-aware network of networks," in Proc. 5th IEEE Int. Symp. Wireless Perv. Comput., May 2010, pp. 221-225.
-
(2010)
Proc. 5th IEEE Int. Symp. Wireless Perv. Comput.
, pp. 221-225
-
-
Manzalini, A.1
Minerva, R.2
Moiso, C.3
-
6
-
-
84905027899
-
Enabling technologies and architectures for 5G wireless
-
Tampa, FL, USA, Jun.
-
S. Talwar et al., "Enabling technologies and architectures for 5G wireless," in Proc. IEEE Int. Microw. Symp., Tampa, FL, USA, Jun. 2014, DOI: 10.1109/MWSYM.2014. 6848639.
-
(2014)
Proc. IEEE Int. Microw. Symp.
-
-
Talwar, S.1
-
7
-
-
84904993644
-
-
[Online]
-
Huawei, "5G: A technology vision," 2013. [Online]. Available: http://www.huawei.com/5gwhitepaper/.
-
(2013)
5G: A Technology Vision
-
-
-
8
-
-
84913591455
-
Visible light communications for 5G wireless networking systems: From fixed to mobile communications
-
Nov./Dec.
-
S. Wu, H. Wang, and C.-H. Youn, "Visible light communications for 5G wireless networking systems: From fixed to mobile communications," IEEE Network, vol. 28, no. 6, pp. 41-45, Nov./Dec. 2014.
-
(2014)
IEEE Network
, vol.28
, Issue.6
, pp. 41-45
-
-
Wu, S.1
Wang, H.2
Youn, C.-H.3
-
9
-
-
84904488356
-
PriWhisper: Enabling keyless secure acoustic communication for smartphones
-
Feb.
-
B. Zhang et al., "PriWhisper: Enabling keyless secure acoustic communication for smartphones," IEEE Internet Things J., vol. 1, no. 1, pp. 33-45, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 33-45
-
-
Zhang, B.1
-
10
-
-
84907666239
-
Externally controllable molecular communication
-
Dec.
-
T. Nakano et al., "Externally controllable molecular communication," IEEE J. Sel. Areas Commun., vol. 32, no. 12, pp. 2417-2431, Dec. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.12
, pp. 2417-2431
-
-
Nakano, T.1
-
11
-
-
79957583041
-
Multimedia traffic security architecture for the internet of things
-
May
-
L. Zhou and H. Chao, "Multimedia traffic security architecture for the Internet of Things," IEEE Network, vol. 25, no. 3, pp. 35-40, May 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.3
, pp. 35-40
-
-
Zhou, L.1
Chao, H.2
-
12
-
-
84938672829
-
Security for the internet of things: A survey of existing protocols and open research issues
-
3rd Quart
-
J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues," IEEE Commun. Survey Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
-
(2015)
IEEE Commun. Survey Tuts.
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
14
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
15
-
-
84900391197
-
A decentralized approach for security and privacy challenges in the internet of things
-
Mar.
-
A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. Moreno, "A decentralized approach for security and privacy challenges in the Internet of Things," in Proc. IEEE World Forum Internet Things, Mar. 2014, pp. 67-72.
-
(2014)
Proc. IEEE World Forum Internet Things
, pp. 67-72
-
-
Skarmeta, A.F.1
Hernandez-Ramos, J.L.2
Moreno, M.V.3
-
16
-
-
84908454906
-
Sybil attacks and their defenses in the internet of things
-
Oct.
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
17
-
-
84936802475
-
Security and privacy in the internet of things: Current status and open issues
-
May
-
M. Abomhara and G. M. Koien, "Security and privacy in the Internet of Things: Current status and open issues," in Proc. IEEE Int. Conf. Privacy Security Mobile Syst., May 2014, DOI: 10.1109/PRISMS.2014.6970594.
-
(2014)
Proc. IEEE Int. Conf. Privacy Security Mobile Syst.
-
-
Abomhara, M.1
Koien, G.M.2
-
18
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
19
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. L. Y. Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Cheong, S.L.Y.1
Hellman, M.E.2
-
20
-
-
84874945275
-
An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for internet of things
-
Mar.
-
J.-M. Liang, J.-J. Chen, H.-H. Cheng, and Y.-C. Tseng, "An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-Advanced networks for Internet of Things," IEEE J. Emerg. Sel. Top. Circuits Syst., vol. 3, no. 1, pp. 13-22, Mar. 2013.
-
(2013)
IEEE J. Emerg. Sel. Top. Circuits Syst.
, vol.3
, Issue.1
, pp. 13-22
-
-
Liang, J.-M.1
Chen, J.-J.2
Cheng, H.-H.3
Tseng, Y.-C.4
-
21
-
-
84979710346
-
-
White Paper, Apr. 2015. [Online]
-
Ericsson, "LTE release 13," White Paper, Apr. 2015. [Online]. Available: www.ericsson.com/res/docs/whitepapers/150417-wp-lterelease-13.pdf.
-
LTE Release 13
-
-
-
22
-
-
34249704132
-
Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks
-
Jul.
-
D. Dardari, A. Conti, C. Buratti, and R. Verdone, "Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 790-802, Jul. 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.7
, pp. 790-802
-
-
Dardari, D.1
Conti, A.2
Buratti, C.3
Verdone, R.4
-
23
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Alexandria, VA, USA
-
K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw., Alexandria, VA, USA, 2006, pp. 169-176.
-
(2006)
Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw.
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
24
-
-
84963692169
-
Device-to-device communication in LTE-advanced networks: A survey
-
J. Liu, N. Kato, J. Ma, and N. Kadowaki, "Device-to-device communication in LTE-Advanced networks: A survey," IEEE Commun. Survey Tuts., 2014, DOI: 10.1109/COMST.2014.2375934.
-
(2014)
IEEE Commun. Survey Tuts.
-
-
Liu, J.1
Kato, N.2
Ma, J.3
Kadowaki, N.4
-
25
-
-
84905227083
-
Device-to-device communications: The physical layer security advantage
-
Florence, Italy, May
-
D. Zhu, A. L. Swindlehurst, A. Fakoorian, W. Xu, and C. Zhao, "Device-to-device communications: The physical layer security advantage," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Florence, Italy, May 2014, DOI: 10.1109/ICASSP.2014. 6853869.
-
(2014)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process
-
-
Zhu, D.1
Swindlehurst, A.L.2
Fakoorian, A.3
Xu, W.4
Zhao, C.5
-
26
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Nov.
-
J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
27
-
-
84907003865
-
Radio resource allocation for physical-layer security in D2D underlay communications
-
Sydney, Australia
-
H. Zhang, T. Wang, L. Song, and Z. Han, "Radio resource allocation for physical-layer security in D2D underlay communications," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, 2014, pp. 2319-2324.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 2319-2324
-
-
Zhang, H.1
Wang, T.2
Song, L.3
Han, Z.4
-
28
-
-
84921323282
-
Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
-
Jan.
-
C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 229-242
-
-
Ma, C.1
-
29
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
30
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
31
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr.
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
32
-
-
84883325225
-
Intrinsic information of wideband channels
-
Sep.
-
Y. Shen and M. Z. Win, "Intrinsic information of wideband channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1875-1888, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1875-1888
-
-
Shen, Y.1
Win, M.Z.2
-
33
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
34
-
-
0034842559
-
Instrumenting the world with wireless sensor networks
-
Salt Lake City, UT, USA, May
-
D. Estrin, L. Girod, G. Pottie, and M. Srivastava, "Instrumenting the world with wireless sensor networks," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Salt Lake City, UT, USA, May 2001, pp. 2033-2036.
-
(2001)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process
, pp. 2033-2036
-
-
Estrin, D.1
Girod, L.2
Pottie, G.3
Srivastava, M.4
-
36
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
May
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
37
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
Jan.
-
D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. IEEE, vol. 96, no. 1, pp. 112-130, Jan. 2008.
-
(2008)
Proc. IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.N.3
Zourntos, T.4
-
38
-
-
80051774471
-
Secure type-based multiple access
-
Sep.
-
H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 763-774
-
-
Jeon, H.1
Hwang, D.2
Choi, J.3
Lee, H.4
Ha, J.5
-
39
-
-
84875140327
-
Channel aware encryption and decision fusion for wireless sensor networks
-
Apr.
-
H. Jeon, J. Choi, S. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 619-625, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 619-625
-
-
Jeon, H.1
Choi, J.2
McLaughlin, S.3
Ha, J.4
-
41
-
-
84863928823
-
Scalable PHY-layer security for distributed detection in wireless sensor networks
-
Aug.
-
R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1118-1126
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
-
42
-
-
84894207328
-
Optimal probabilistic encryption for secure detection in wireless sensor networks
-
Mar.
-
R. Soosahabi, M. Naraghi-Pour, D. Perkins, and M. Bayoumi, "Optimal probabilistic encryption for secure detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 375-385, Mar. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.3
, pp. 375-385
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
Perkins, D.3
Bayoumi, M.4
-
43
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
Jun.
-
T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
44
-
-
84906994141
-
Parallel distributed Bayesian detection with privacy constraints
-
Sydney, Australia, Jun.
-
Z. Li, T. Oechtering, and K. Kittichokechai, "Parallel distributed Bayesian detection with privacy constraints," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, Jun. 2014, pp. 2178-2183.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 2178-2183
-
-
Li, Z.1
Oechtering, T.2
Kittichokechai, K.3
-
45
-
-
84906767126
-
Parallel distributed neyman-pearson detection with privacy constraints
-
Sydney, Australia, Jun.
-
Z. Li, T. Oechtering, and J. Jalden, "Parallel distributed Neyman-Pearson detection with privacy constraints," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, Jun. 2014, pp. 765-770.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 765-770
-
-
Li, Z.1
Oechtering, T.2
Jalden, J.3
-
46
-
-
79957989409
-
Secure distributed detection in the presence of eavesdroppers
-
Nov.
-
V. S. S. Nadendla, H. Chen, and P. K. Varshney, "Secure distributed detection in the presence of eavesdroppers," in Proc. 44th Asilomar Conf. Signals Syst. Comput., Nov. 2010, pp. 1437-1441.
-
(2010)
Proc. 44th Asilomar Conf. Signals Syst. Comput.
, pp. 1437-1441
-
-
Nadendla, V.S.S.1
Chen, H.2
Varshney, P.K.3
-
48
-
-
84971595040
-
Securing while sampling in wireless body area networks with application to electrocardiography
-
R. Dautov and G. R. Tsouri, "Securing while sampling in wireless body area networks with application to electrocardiography," IEEE J. Biomed. Health Inf., 2014, DOI: 10.1109/JBHI.2014.2366125.
-
(2014)
IEEE J. Biomed. Health Inf.
-
-
Dautov, R.1
Tsouri, G.R.2
-
49
-
-
84899636821
-
Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
-
Apr.
-
J. E. Barceló-Lladó, A. Morell, and G. Seco-Granados, "Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 839-850
-
-
Barceló-Lladó, J.E.1
Morell, A.2
Seco-Granados, G.3
-
50
-
-
33645712892
-
Compressed sensing
-
Apr.
-
D. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1289-1306
-
-
Donoho, D.1
-
51
-
-
70349581451
-
Quantifying eavesdropping vulnerability in sensor networks
-
Aug.
-
M. Anand, Z. Ives, and I. Lee, "Quantifying eavesdropping vulnerability in sensor networks," in Proc. 2nd Int. Workshop Data Manage. Sensor Netw., Aug. 2005, pp. 3-9.
-
(2005)
Proc. 2nd Int. Workshop Data Manage. Sensor Netw.
, pp. 3-9
-
-
Anand, M.1
Ives, Z.2
Lee, I.3
-
52
-
-
84869193834
-
Artificial noise scheme to ensure secure communications in CWSN
-
Aug.
-
A. Araujo, J. Blesa, E. Romero, and O. Nieto-Taladriz, "Artificial noise scheme to ensure secure communications in CWSN," in Proc. 8th Int. Wireless Commun. Mobile Comput. Conf., Aug. 2012, pp. 1023-1027.
-
(2012)
Proc. 8th Int. Wireless Commun. Mobile Comput. Conf.
, pp. 1023-1027
-
-
Araujo, A.1
Blesa, J.2
Romero, E.3
Nieto-Taladriz, O.4
-
53
-
-
84873424362
-
Cooperative jamming for physical layer security in wireless sensor networks
-
Taipei, Taiwan, Sep.
-
V. M. Rohokale, N. R. Prasad, and R. Prasad, "Cooperative jamming for physical layer security in wireless sensor networks," in Proc. IEEE Int. Symp. Wireless Pers. Multimedia Commun., Taipei, Taiwan, Sep. 2012, pp. 458-462.
-
(2012)
Proc. IEEE Int. Symp. Wireless Pers. Multimedia Commun.
, pp. 458-462
-
-
Rohokale, V.M.1
Prasad, N.R.2
Prasad, R.3
-
54
-
-
84940520923
-
On physical layer secrecy of collaborative compressive detection
-
Nov.
-
B. Kailkhura, T. Wimalajeewa, and P. K. Varshney, "On physical layer secrecy of collaborative compressive detection," in Proc. 48th Asilomar Conf. Signals Syst. Comput., Nov. 2014, pp. 51-55.
-
(2014)
Proc. 48th Asilomar Conf. Signals Syst. Comput.
, pp. 51-55
-
-
Kailkhura, B.1
Wimalajeewa, T.2
Varshney, P.K.3
-
56
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the internet of things
-
Oct.
-
F. Li and P. Xiong, "Practical secure communication for integrating wireless sensor networks into the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3683, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3677-3683
-
-
Li, F.1
Xiong, P.2
-
57
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El-Gamal, H.3
-
58
-
-
84883322841
-
Everlasting secrecy by exploiting non-idealities of the Eavesdropper's receiver
-
Sep.
-
A. Sheikholeslami, D. Goeckel, and H. Pishro-Nik, "Everlasting secrecy by exploiting non-idealities of the eavesdropper's receiver," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1828-1839, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1828-1839
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
-
59
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
60
-
-
27744501279
-
Array-transmission based physical-layer security techniques for wireless sensor networks
-
X. Li, M. Chen, and E. P. Ratazzi, "Array-transmission based physical-layer security techniques for wireless sensor networks," in Proc. IEEE Int. Conf. Mechatron. Autom., 2005, pp. 1618-1623.
-
(2005)
Proc. IEEE Int. Conf. Mechatron. Autom.
, pp. 1618-1623
-
-
Li, X.1
Chen, M.2
Ratazzi, E.P.3
-
61
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE. Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE. Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
62
-
-
45249085230
-
Secret communication with a fading eavesdropper channel
-
Nice, France, Jul.
-
Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jul. 2007, pp. 1296-1300.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
63
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
64
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
65
-
-
82155167606
-
Power allocation and achievable secrecy rates in MISOME wiretap channels
-
Nov.
-
T. V. Nguyen and H. Shin, "Power allocation and achievable secrecy rates in MISOME wiretap channels," IEEE Commun. Lett., vol. 15, no. 11, pp. 1196-1198, Nov. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.11
, pp. 1196-1198
-
-
Nguyen, T.V.1
Shin, H.2
-
66
-
-
79960399745
-
Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
67
-
-
77955721830
-
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
-
Sep.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multiple-output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
68
-
-
48849113556
-
Interference alignment on the degrees of freedom of the K user interference channel
-
Aug.
-
V. R. Cadambe and S. A. Jafar, "Interference alignment on the degrees of freedom of the K user interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3425-3441
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
69
-
-
84857722105
-
Ergodic secret alignment
-
Mar.
-
R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1594-1611
-
-
Bassily, R.1
Ulukus, S.2
-
71
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. Ganti, J. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.2
Andrews, J.3
Hjørungnes, A.4
-
72
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
Jun.
-
H. Wang, X. Zhou, and M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.C.3
-
73
-
-
84855923041
-
Secure communication in stochastic wireless networks-part I: Connectivity
-
Feb.
-
P. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.1
Barros, J.2
Win, M.Z.3
-
74
-
-
84855911932
-
Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
-
Feb.
-
P. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.1
Barros, J.2
Win, M.Z.3
-
75
-
-
84901248745
-
Cognitive network secrecy with interference engineering
-
Sep./Oct.
-
M. Z. Win, A. Rabbachin, J. Lee, and A. Conti, "Cognitive network secrecy with interference engineering," IEEE Netw., vol. 28, no. 5, pp. 86-90, Sep./Oct. 2014.
-
(2014)
IEEE Netw.
, vol.28
, Issue.5
, pp. 86-90
-
-
Win, M.Z.1
Rabbachin, A.2
Lee, J.3
Conti, A.4
-
76
-
-
84857724638
-
Percolation and connectivity in the intrinsically secure communications graph
-
Mar.
-
P. Pinto and M. Z. Win, "Percolation and connectivity in the intrinsically secure communications graph," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1716-1730, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1716-1730
-
-
Pinto, P.1
Win, M.Z.2
-
77
-
-
85027938710
-
Wireless network intrinsic secrecy
-
Feb.
-
A. Rabbachin, A. Conti, and M. Z. Win, "Wireless network intrinsic secrecy," IEEE/ACM Trans. Netw., vol. 23, no. 1, pp. 56-69, Feb. 2015.
-
(2015)
IEEE/ACM Trans. Netw.
, vol.23
, Issue.1
, pp. 56-69
-
-
Rabbachin, A.1
Conti, A.2
Win, M.Z.3
-
78
-
-
84883430599
-
Distributed network secrecy
-
Sep.
-
J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, "Distributed network secrecy," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1889-1900, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1889-1900
-
-
Lee, J.1
Conti, A.2
Rabbachin, A.3
Win, M.Z.4
-
79
-
-
84906698210
-
Principles of physical-layer security in multiuser wireless networks: A survey
-
3rd Quart
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical-layer security in multiuser wireless networks: A survey," IEEE Commun. Surv. Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surv. Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
81
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. Zhou, L. Song, and Y. Zhang, Eds., Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013.
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.1
Song, L.2
Zhang, Y.3
-
82
-
-
80051723522
-
Noncoherent capacity of secret-key agreement with public discussion
-
Sep.
-
A. Agrawal, Z. Rezki, A. Khisti, and M.-S. Alouini, "Noncoherent capacity of secret-key agreement with public discussion," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 565-574, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 565-574
-
-
Agrawal, A.1
Rezki, Z.2
Khisti, A.3
Alouini, M.-S.4
-
83
-
-
0032023863
-
Space-time codes for high data rate wireless communication: Performance criterion and code construction
-
Mar.
-
V. Tarokh, N. Seshadri, and A. R. Calderbank, "Space-time codes for high data rate wireless communication: Performance criterion and code construction," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 744-765, Mar. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.2
, pp. 744-765
-
-
Tarokh, V.1
Seshadri, N.2
Calderbank, A.R.3
-
84
-
-
84861326653
-
Secure space-time block coding via artificial noise alignment
-
Pacific Grove, CA, USA, Nov.
-
A. Fakoorian, H. Jafarkhani, and A. L. Swindlehurst, "Secure space-time block coding via artificial noise alignment," in Proc. 45th Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 651-655.
-
(2011)
Proc. 45th Asilomar Conf. Signals Syst. Comput.
, pp. 651-655
-
-
Fakoorian, A.1
Jafarkhani, H.2
Swindlehurst, A.L.3
-
85
-
-
84897913176
-
Transmit antenna selection with alamouti coding and power allocation in MIMO wiretap channels
-
Mar.
-
S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1656-1667
-
-
Yan, S.1
Yang, N.2
Malaney, R.3
Yuan, J.4
-
86
-
-
84890115672
-
Physical layer security in MIMO OSTBC line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation
-
Oct.
-
N. S. Ferdinand, D. Benevides da Costa, and M. Latva-aho, "Physical layer security in MIMO OSTBC line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 467-470, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 467-470
-
-
Ferdinand, N.S.1
Benevides Da-Costa, D.2
Latva-Aho, M.3
-
87
-
-
0014983612
-
The complexity of decoders-part II: Computational work and decoding time
-
Jan.
-
J. E. Savage, "The complexity of decoders-Part II: Computational work and decoding time," IEEE Trans. Inf. Theory, vol. 17, no. 1, pp. 77-85, Jan. 1971.
-
(1971)
IEEE Trans. Inf. Theory
, vol.17
, Issue.1
, pp. 77-85
-
-
Savage, J.E.1
-
88
-
-
84863941590
-
Energy-efficient resource allocation for secure OFDMA systems
-
Jul.
-
D. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2584, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2572-2584
-
-
Ng, D.1
Lo, E.S.2
Schober, R.3
-
89
-
-
84859973376
-
Secure communication in the low-SNR regime
-
Apr.
-
M. C. Gursoy, "Secure communication in the low-SNR regime," IEEE Trans. Commun., vol. 60, no. 4, pp. 1114-1123, Apr. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.4
, pp. 1114-1123
-
-
Gursoy, M.C.1
-
90
-
-
84872294249
-
On energy-secrecy tradeoffs for Gaussian wire-tap channels
-
Feb.
-
C. Comaniciu and H. V. Poor, "On energy-secrecy tradeoffs for Gaussian wire-tap channels," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 314-323, Feb. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 314-323
-
-
Comaniciu, C.1
Poor, H.V.2
-
91
-
-
84906537531
-
Many-broadcast channels: Definition and capacity in the degraded case
-
T.-Y. Chen, X. Chen, and D. Guo, "Many-broadcast channels: Definition and capacity in the degraded case," in Proc. IEEE Int. Symp. Inf. Theory, 2014, pp. 2569-2573.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2569-2573
-
-
Chen, T.-Y.1
Chen, X.2
Guo, D.3
-
92
-
-
84906536096
-
Gaussian many-access channels with random transmitter activities
-
X. Chen and D. Guo, "Gaussian many-access channels with random transmitter activities," in Proc. IEEE Int. Symp. Inf. Theory, 2014, pp. 3127-3131.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 3127-3131
-
-
Chen, X.1
Guo, D.2
-
93
-
-
84903209092
-
On the physical layer security of backscatter wireless systems
-
Jun.
-
W. Saad, X. Zhou, Z. Han, and H. V. Poor, "On the physical layer security of backscatter wireless systems," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3442-3451, Jun. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.6
, pp. 3442-3451
-
-
Saad, W.1
Zhou, X.2
Han, Z.3
Poor, H.V.4
-
94
-
-
84940056690
-
Physical-layer security for MISO visible light communication channels
-
Sep.
-
A. Mostafa and L. Lampe, "Physical-layer security for MISO visible light communication channels," IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806-1818, Sep. 2015.
-
(2015)
IEEE J. Sel. Areas Commun.
, vol.33
, Issue.9
, pp. 1806-1818
-
-
Mostafa, A.1
Lampe, L.2
-
95
-
-
33750392429
-
Distributed detection in sensor networks with packet losses and finite capacity links
-
Nov.
-
V. Saligrama, M. Alanyali, and O. Savas, "Distributed detection in sensor networks with packet losses and finite capacity links," IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4118-4132, Nov. 2006.
-
(2006)
IEEE Trans. Signal Process
, vol.54
, Issue.11
, pp. 4118-4132
-
-
Saligrama, V.1
Alanyali, M.2
Savas, O.3
|