메뉴 건너뛰기




Volumn 103, Issue 10, 2015, Pages 1747-1761

Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

Author keywords

Internet of Things (IoT); low complexity; physical layer security; resource constraints; secure sensing

Indexed keywords

BLOCK CODES; COMPLEX NETWORKS; ENERGY EFFICIENCY; FLOW MEASUREMENT; INTERNET OF THINGS; NETWORK LAYERS; SENSOR NETWORKS; SPACE TIME CODES; SPACE-TIME BLOCK CODING (STBC);

EID: 84960105777     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/JPROC.2015.2466548     Document Type: Article
Times cited : (344)

References (95)
  • 2
    • 84923122221 scopus 로고    scopus 로고
    • Machine-to-machine communications with in-network data aggregation, processing and actuation for large scale cyber-physical systems
    • Apr.
    • I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing and actuation for large scale cyber-physical systems," IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.2 , pp. 122-128
    • Stojmenovic, I.1
  • 3
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, security of emerging machine to machine communications
    • Apr.
    • R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, security of emerging machine to machine communications," IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.4    Lin, X.5
  • 4
    • 84903157057 scopus 로고    scopus 로고
    • Machine-to-machine communication
    • Jul./Aug.
    • M. Weyrich, J.-P. Schmidt, and C. Ebert, "Machine-to-machine communication," IEEE Software, vol. 31, no. 4, pp. 19-23, Jul./Aug. 2014.
    • (2014) IEEE Software , vol.31 , Issue.4 , pp. 19-23
    • Weyrich, M.1    Schmidt, J.-P.2    Ebert, C.3
  • 6
    • 84905027899 scopus 로고    scopus 로고
    • Enabling technologies and architectures for 5G wireless
    • Tampa, FL, USA, Jun.
    • S. Talwar et al., "Enabling technologies and architectures for 5G wireless," in Proc. IEEE Int. Microw. Symp., Tampa, FL, USA, Jun. 2014, DOI: 10.1109/MWSYM.2014. 6848639.
    • (2014) Proc. IEEE Int. Microw. Symp.
    • Talwar, S.1
  • 7
    • 84904993644 scopus 로고    scopus 로고
    • [Online]
    • Huawei, "5G: A technology vision," 2013. [Online]. Available: http://www.huawei.com/5gwhitepaper/.
    • (2013) 5G: A Technology Vision
  • 8
    • 84913591455 scopus 로고    scopus 로고
    • Visible light communications for 5G wireless networking systems: From fixed to mobile communications
    • Nov./Dec.
    • S. Wu, H. Wang, and C.-H. Youn, "Visible light communications for 5G wireless networking systems: From fixed to mobile communications," IEEE Network, vol. 28, no. 6, pp. 41-45, Nov./Dec. 2014.
    • (2014) IEEE Network , vol.28 , Issue.6 , pp. 41-45
    • Wu, S.1    Wang, H.2    Youn, C.-H.3
  • 9
    • 84904488356 scopus 로고    scopus 로고
    • PriWhisper: Enabling keyless secure acoustic communication for smartphones
    • Feb.
    • B. Zhang et al., "PriWhisper: Enabling keyless secure acoustic communication for smartphones," IEEE Internet Things J., vol. 1, no. 1, pp. 33-45, Feb. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 33-45
    • Zhang, B.1
  • 10
    • 84907666239 scopus 로고    scopus 로고
    • Externally controllable molecular communication
    • Dec.
    • T. Nakano et al., "Externally controllable molecular communication," IEEE J. Sel. Areas Commun., vol. 32, no. 12, pp. 2417-2431, Dec. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.12 , pp. 2417-2431
    • Nakano, T.1
  • 11
    • 79957583041 scopus 로고    scopus 로고
    • Multimedia traffic security architecture for the internet of things
    • May
    • L. Zhou and H. Chao, "Multimedia traffic security architecture for the Internet of Things," IEEE Network, vol. 25, no. 3, pp. 35-40, May 2011.
    • (2011) IEEE Network , vol.25 , Issue.3 , pp. 35-40
    • Zhou, L.1    Chao, H.2
  • 12
    • 84938672829 scopus 로고    scopus 로고
    • Security for the internet of things: A survey of existing protocols and open research issues
    • 3rd Quart
    • J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues," IEEE Commun. Survey Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
    • (2015) IEEE Commun. Survey Tuts. , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 13
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 14
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 16
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the internet of things
    • Oct.
    • K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.5 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 17
    • 84936802475 scopus 로고    scopus 로고
    • Security and privacy in the internet of things: Current status and open issues
    • May
    • M. Abomhara and G. M. Koien, "Security and privacy in the Internet of Things: Current status and open issues," in Proc. IEEE Int. Conf. Privacy Security Mobile Syst., May 2014, DOI: 10.1109/PRISMS.2014.6970594.
    • (2014) Proc. IEEE Int. Conf. Privacy Security Mobile Syst.
    • Abomhara, M.1    Koien, G.M.2
  • 18
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 19
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • Jul.
    • S. L. Y. Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.4 , pp. 451-456
    • Cheong, S.L.Y.1    Hellman, M.E.2
  • 20
    • 84874945275 scopus 로고    scopus 로고
    • An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for internet of things
    • Mar.
    • J.-M. Liang, J.-J. Chen, H.-H. Cheng, and Y.-C. Tseng, "An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-Advanced networks for Internet of Things," IEEE J. Emerg. Sel. Top. Circuits Syst., vol. 3, no. 1, pp. 13-22, Mar. 2013.
    • (2013) IEEE J. Emerg. Sel. Top. Circuits Syst. , vol.3 , Issue.1 , pp. 13-22
    • Liang, J.-M.1    Chen, J.-J.2    Cheng, H.-H.3    Tseng, Y.-C.4
  • 21
    • 84979710346 scopus 로고    scopus 로고
    • White Paper, Apr. 2015. [Online]
    • Ericsson, "LTE release 13," White Paper, Apr. 2015. [Online]. Available: www.ericsson.com/res/docs/whitepapers/150417-wp-lterelease-13.pdf.
    • LTE Release 13
  • 22
    • 34249704132 scopus 로고    scopus 로고
    • Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks
    • Jul.
    • D. Dardari, A. Conti, C. Buratti, and R. Verdone, "Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 790-802, Jul. 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.7 , pp. 790-802
    • Dardari, D.1    Conti, A.2    Buratti, C.3    Verdone, R.4
  • 24
    • 84963692169 scopus 로고    scopus 로고
    • Device-to-device communication in LTE-advanced networks: A survey
    • J. Liu, N. Kato, J. Ma, and N. Kadowaki, "Device-to-device communication in LTE-Advanced networks: A survey," IEEE Commun. Survey Tuts., 2014, DOI: 10.1109/COMST.2014.2375934.
    • (2014) IEEE Commun. Survey Tuts.
    • Liu, J.1    Kato, N.2    Ma, J.3    Kadowaki, N.4
  • 26
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Nov.
    • J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 27
    • 84907003865 scopus 로고    scopus 로고
    • Radio resource allocation for physical-layer security in D2D underlay communications
    • Sydney, Australia
    • H. Zhang, T. Wang, L. Song, and Z. Han, "Radio resource allocation for physical-layer security in D2D underlay communications," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, 2014, pp. 2319-2324.
    • (2014) Proc. IEEE Int. Conf. Commun. , pp. 2319-2324
    • Zhang, H.1    Wang, T.2    Song, L.3    Han, Z.4
  • 28
    • 84921323282 scopus 로고    scopus 로고
    • Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
    • Jan.
    • C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.1 , pp. 229-242
    • Ma, C.1
  • 29
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 30
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 31
    • 84858388451 scopus 로고    scopus 로고
    • A unified framework for key agreement over wireless fading channels
    • Apr.
    • L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 480-490
    • Lai, L.1    Liang, Y.2    Poor, H.V.3
  • 32
    • 84883325225 scopus 로고    scopus 로고
    • Intrinsic information of wideband channels
    • Sep.
    • Y. Shen and M. Z. Win, "Intrinsic information of wideband channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1875-1888, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1875-1888
    • Shen, Y.1    Win, M.Z.2
  • 36
    • 65649139984 scopus 로고    scopus 로고
    • Distributed detection with censoring sensors under physical layer secrecy
    • May
    • S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
    • (2009) IEEE Trans. Signal Process , vol.57 , Issue.5 , pp. 1976-1986
    • Marano, S.1    Matta, V.2    Willett, P.K.3
  • 37
    • 64549108398 scopus 로고    scopus 로고
    • Security and privacy for distributed multimedia sensor networks
    • Jan.
    • D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. IEEE, vol. 96, no. 1, pp. 112-130, Jan. 2008.
    • (2008) Proc. IEEE , vol.96 , Issue.1 , pp. 112-130
    • Kundur, D.1    Luh, W.2    Okorafor, U.N.3    Zourntos, T.4
  • 39
    • 84875140327 scopus 로고    scopus 로고
    • Channel aware encryption and decision fusion for wireless sensor networks
    • Apr.
    • H. Jeon, J. Choi, S. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 619-625, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 619-625
    • Jeon, H.1    Choi, J.2    McLaughlin, S.3    Ha, J.4
  • 41
    • 84863928823 scopus 로고    scopus 로고
    • Scalable PHY-layer security for distributed detection in wireless sensor networks
    • Aug.
    • R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1118-1126
    • Soosahabi, R.1    Naraghi-Pour, M.2
  • 42
    • 84894207328 scopus 로고    scopus 로고
    • Optimal probabilistic encryption for secure detection in wireless sensor networks
    • Mar.
    • R. Soosahabi, M. Naraghi-Pour, D. Perkins, and M. Bayoumi, "Optimal probabilistic encryption for secure detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 375-385, Mar. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.3 , pp. 375-385
    • Soosahabi, R.1    Naraghi-Pour, M.2    Perkins, D.3    Bayoumi, M.4
  • 43
    • 44049101044 scopus 로고    scopus 로고
    • Sensor data cryptography in wireless sensor networks
    • Jun.
    • T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 273-289
    • Aysal, T.C.1    Barner, K.E.2
  • 44
    • 84906994141 scopus 로고    scopus 로고
    • Parallel distributed Bayesian detection with privacy constraints
    • Sydney, Australia, Jun.
    • Z. Li, T. Oechtering, and K. Kittichokechai, "Parallel distributed Bayesian detection with privacy constraints," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, Jun. 2014, pp. 2178-2183.
    • (2014) Proc. IEEE Int. Conf. Commun. , pp. 2178-2183
    • Li, Z.1    Oechtering, T.2    Kittichokechai, K.3
  • 45
    • 84906767126 scopus 로고    scopus 로고
    • Parallel distributed neyman-pearson detection with privacy constraints
    • Sydney, Australia, Jun.
    • Z. Li, T. Oechtering, and J. Jalden, "Parallel distributed Neyman-Pearson detection with privacy constraints," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, Jun. 2014, pp. 765-770.
    • (2014) Proc. IEEE Int. Conf. Commun. , pp. 765-770
    • Li, Z.1    Oechtering, T.2    Jalden, J.3
  • 48
    • 84971595040 scopus 로고    scopus 로고
    • Securing while sampling in wireless body area networks with application to electrocardiography
    • R. Dautov and G. R. Tsouri, "Securing while sampling in wireless body area networks with application to electrocardiography," IEEE J. Biomed. Health Inf., 2014, DOI: 10.1109/JBHI.2014.2366125.
    • (2014) IEEE J. Biomed. Health Inf.
    • Dautov, R.1    Tsouri, G.R.2
  • 49
    • 84899636821 scopus 로고    scopus 로고
    • Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
    • Apr.
    • J. E. Barceló-Lladó, A. Morell, and G. Seco-Granados, "Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, Apr. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.5 , pp. 839-850
    • Barceló-Lladó, J.E.1    Morell, A.2    Seco-Granados, G.3
  • 50
    • 33645712892 scopus 로고    scopus 로고
    • Compressed sensing
    • Apr.
    • D. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1289-1306
    • Donoho, D.1
  • 56
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the internet of things
    • Oct.
    • F. Li and P. Xiong, "Practical secure communication for integrating wireless sensor networks into the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3683, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3677-3683
    • Li, F.1    Xiong, P.2
  • 57
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El-Gamal, H.3
  • 58
    • 84883322841 scopus 로고    scopus 로고
    • Everlasting secrecy by exploiting non-idealities of the Eavesdropper's receiver
    • Sep.
    • A. Sheikholeslami, D. Goeckel, and H. Pishro-Nik, "Everlasting secrecy by exploiting non-idealities of the eavesdropper's receiver," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1828-1839, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1828-1839
    • Sheikholeslami, A.1    Goeckel, D.2    Pishro-Nik, H.3
  • 59
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 60
    • 27744501279 scopus 로고    scopus 로고
    • Array-transmission based physical-layer security techniques for wireless sensor networks
    • X. Li, M. Chen, and E. P. Ratazzi, "Array-transmission based physical-layer security techniques for wireless sensor networks," in Proc. IEEE Int. Conf. Mechatron. Autom., 2005, pp. 1618-1623.
    • (2005) Proc. IEEE Int. Conf. Mechatron. Autom. , pp. 1618-1623
    • Li, X.1    Chen, M.2    Ratazzi, E.P.3
  • 61
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE. Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE. Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 62
    • 45249085230 scopus 로고    scopus 로고
    • Secret communication with a fading eavesdropper channel
    • Nice, France, Jul.
    • Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jul. 2007, pp. 1296-1300.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 1296-1300
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 63
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 64
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr.
    • S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.A.3
  • 65
    • 82155167606 scopus 로고    scopus 로고
    • Power allocation and achievable secrecy rates in MISOME wiretap channels
    • Nov.
    • T. V. Nguyen and H. Shin, "Power allocation and achievable secrecy rates in MISOME wiretap channels," IEEE Commun. Lett., vol. 15, no. 11, pp. 1196-1198, Nov. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.11 , pp. 1196-1198
    • Nguyen, T.V.1    Shin, H.2
  • 66
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 67
    • 77955721830 scopus 로고    scopus 로고
    • Multiple-input multiple-output Gaussian broadcast channels with confidential messages
    • Sep.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multiple-output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4215-4227
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 68
    • 48849113556 scopus 로고    scopus 로고
    • Interference alignment on the degrees of freedom of the K user interference channel
    • Aug.
    • V. R. Cadambe and S. A. Jafar, "Interference alignment on the degrees of freedom of the K user interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.8 , pp. 3425-3441
    • Cadambe, V.R.1    Jafar, S.A.2
  • 69
    • 84857722105 scopus 로고    scopus 로고
    • Ergodic secret alignment
    • Mar.
    • R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1594-1611
    • Bassily, R.1    Ulukus, S.2
  • 71
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. Ganti, J. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.2    Andrews, J.3    Hjørungnes, A.4
  • 72
    • 84880159277 scopus 로고    scopus 로고
    • Physical layer security in cellular networks: A stochastic geometry approach
    • Jun.
    • H. Wang, X. Zhou, and M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2776-2787
    • Wang, H.1    Zhou, X.2    Reed, M.C.3
  • 73
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part I: Connectivity
    • Feb.
    • P. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.1    Barros, J.2    Win, M.Z.3
  • 74
    • 84855911932 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
    • Feb.
    • P. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 139-147
    • Pinto, P.1    Barros, J.2    Win, M.Z.3
  • 75
    • 84901248745 scopus 로고    scopus 로고
    • Cognitive network secrecy with interference engineering
    • Sep./Oct.
    • M. Z. Win, A. Rabbachin, J. Lee, and A. Conti, "Cognitive network secrecy with interference engineering," IEEE Netw., vol. 28, no. 5, pp. 86-90, Sep./Oct. 2014.
    • (2014) IEEE Netw. , vol.28 , Issue.5 , pp. 86-90
    • Win, M.Z.1    Rabbachin, A.2    Lee, J.3    Conti, A.4
  • 76
    • 84857724638 scopus 로고    scopus 로고
    • Percolation and connectivity in the intrinsically secure communications graph
    • Mar.
    • P. Pinto and M. Z. Win, "Percolation and connectivity in the intrinsically secure communications graph," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1716-1730, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1716-1730
    • Pinto, P.1    Win, M.Z.2
  • 77
    • 85027938710 scopus 로고    scopus 로고
    • Wireless network intrinsic secrecy
    • Feb.
    • A. Rabbachin, A. Conti, and M. Z. Win, "Wireless network intrinsic secrecy," IEEE/ACM Trans. Netw., vol. 23, no. 1, pp. 56-69, Feb. 2015.
    • (2015) IEEE/ACM Trans. Netw. , vol.23 , Issue.1 , pp. 56-69
    • Rabbachin, A.1    Conti, A.2    Win, M.Z.3
  • 79
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical-layer security in multiuser wireless networks: A survey
    • 3rd Quart
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical-layer security in multiuser wireless networks: A survey," IEEE Commun. Surv. Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
    • (2014) IEEE Commun. Surv. Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 82
    • 80051723522 scopus 로고    scopus 로고
    • Noncoherent capacity of secret-key agreement with public discussion
    • Sep.
    • A. Agrawal, Z. Rezki, A. Khisti, and M.-S. Alouini, "Noncoherent capacity of secret-key agreement with public discussion," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 565-574, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 565-574
    • Agrawal, A.1    Rezki, Z.2    Khisti, A.3    Alouini, M.-S.4
  • 83
    • 0032023863 scopus 로고    scopus 로고
    • Space-time codes for high data rate wireless communication: Performance criterion and code construction
    • Mar.
    • V. Tarokh, N. Seshadri, and A. R. Calderbank, "Space-time codes for high data rate wireless communication: Performance criterion and code construction," IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 744-765, Mar. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.2 , pp. 744-765
    • Tarokh, V.1    Seshadri, N.2    Calderbank, A.R.3
  • 85
    • 84897913176 scopus 로고    scopus 로고
    • Transmit antenna selection with alamouti coding and power allocation in MIMO wiretap channels
    • Mar.
    • S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.3 , pp. 1656-1667
    • Yan, S.1    Yang, N.2    Malaney, R.3    Yuan, J.4
  • 86
    • 84890115672 scopus 로고    scopus 로고
    • Physical layer security in MIMO OSTBC line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation
    • Oct.
    • N. S. Ferdinand, D. Benevides da Costa, and M. Latva-aho, "Physical layer security in MIMO OSTBC line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 467-470, Oct. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.5 , pp. 467-470
    • Ferdinand, N.S.1    Benevides Da-Costa, D.2    Latva-Aho, M.3
  • 87
    • 0014983612 scopus 로고
    • The complexity of decoders-part II: Computational work and decoding time
    • Jan.
    • J. E. Savage, "The complexity of decoders-Part II: Computational work and decoding time," IEEE Trans. Inf. Theory, vol. 17, no. 1, pp. 77-85, Jan. 1971.
    • (1971) IEEE Trans. Inf. Theory , vol.17 , Issue.1 , pp. 77-85
    • Savage, J.E.1
  • 88
    • 84863941590 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for secure OFDMA systems
    • Jul.
    • D. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2584, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2572-2584
    • Ng, D.1    Lo, E.S.2    Schober, R.3
  • 89
    • 84859973376 scopus 로고    scopus 로고
    • Secure communication in the low-SNR regime
    • Apr.
    • M. C. Gursoy, "Secure communication in the low-SNR regime," IEEE Trans. Commun., vol. 60, no. 4, pp. 1114-1123, Apr. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.4 , pp. 1114-1123
    • Gursoy, M.C.1
  • 90
    • 84872294249 scopus 로고    scopus 로고
    • On energy-secrecy tradeoffs for Gaussian wire-tap channels
    • Feb.
    • C. Comaniciu and H. V. Poor, "On energy-secrecy tradeoffs for Gaussian wire-tap channels," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 314-323, Feb. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.2 , pp. 314-323
    • Comaniciu, C.1    Poor, H.V.2
  • 91
    • 84906537531 scopus 로고    scopus 로고
    • Many-broadcast channels: Definition and capacity in the degraded case
    • T.-Y. Chen, X. Chen, and D. Guo, "Many-broadcast channels: Definition and capacity in the degraded case," in Proc. IEEE Int. Symp. Inf. Theory, 2014, pp. 2569-2573.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 2569-2573
    • Chen, T.-Y.1    Chen, X.2    Guo, D.3
  • 92
    • 84906536096 scopus 로고    scopus 로고
    • Gaussian many-access channels with random transmitter activities
    • X. Chen and D. Guo, "Gaussian many-access channels with random transmitter activities," in Proc. IEEE Int. Symp. Inf. Theory, 2014, pp. 3127-3131.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 3127-3131
    • Chen, X.1    Guo, D.2
  • 93
    • 84903209092 scopus 로고    scopus 로고
    • On the physical layer security of backscatter wireless systems
    • Jun.
    • W. Saad, X. Zhou, Z. Han, and H. V. Poor, "On the physical layer security of backscatter wireless systems," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3442-3451, Jun. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.6 , pp. 3442-3451
    • Saad, W.1    Zhou, X.2    Han, Z.3    Poor, H.V.4
  • 94
    • 84940056690 scopus 로고    scopus 로고
    • Physical-layer security for MISO visible light communication channels
    • Sep.
    • A. Mostafa and L. Lampe, "Physical-layer security for MISO visible light communication channels," IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806-1818, Sep. 2015.
    • (2015) IEEE J. Sel. Areas Commun. , vol.33 , Issue.9 , pp. 1806-1818
    • Mostafa, A.1    Lampe, L.2
  • 95
    • 33750392429 scopus 로고    scopus 로고
    • Distributed detection in sensor networks with packet losses and finite capacity links
    • Nov.
    • V. Saligrama, M. Alanyali, and O. Savas, "Distributed detection in sensor networks with packet losses and finite capacity links," IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4118-4132, Nov. 2006.
    • (2006) IEEE Trans. Signal Process , vol.54 , Issue.11 , pp. 4118-4132
    • Saligrama, V.1    Alanyali, M.2    Savas, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.