메뉴 건너뛰기




Volumn 63, Issue 11, 2015, Pages 4347-4362

Multi-Antenna Transmission with Artificial Noise Against Randomly Distributed Eavesdroppers

Author keywords

artificial noise; multi antenna; Optimization; Physical layer security; power allocation; secrecy outage; secrecy throughput; stochastic geometry

Indexed keywords

ANTENNAS; FADING CHANNELS; GEOMETRY; MOLECULAR PHYSICS; NETWORK LAYERS; OPTIMAL SYSTEMS; OPTIMIZATION; STOCHASTIC SYSTEMS; THROUGHPUT; TRANSMISSIONS;

EID: 84960156001     PISSN: 00906778     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCOMM.2015.2474390     Document Type: Article
Times cited : (167)

References (41)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 3
    • 84880150823 scopus 로고    scopus 로고
    • Large system analysis of linear precoding in MISO broadcast channels with confidential messages
    • Sep.
    • G. Geraci, R. Couillet, J. Yuan, M. Debbah, I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential messages," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1660-1671
    • Geraci, G.1    Couillet, R.2    Yuan, J.3    Debbah, M.4    Collings, I.B.5
  • 4
    • 84901335099 scopus 로고    scopus 로고
    • Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
    • May
    • G. Geraci, S. Singh, J. G.,rews, J. Yuan, I. B. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2931-2943, May 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.5 , pp. 2931-2943
    • Geraci, G.1    Singh, S.2    Rews, J.G.3    Yuan, J.4    Collings, I.B.5
  • 5
    • 52349090496 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Toronto, ON, Canada Jul.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 524-528.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 524-528
    • Oggier, F.1    Hassibi, B.2
  • 6
    • 77955721830 scopus 로고    scopus 로고
    • Multiple-input multiple-output Gaussian broadcast channels with confidential messages
    • Sep.
    • R. Liu, T. Liu, H. V. Poor, S. Shamai, "Multiple-input multiple-output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4215-4227
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 7
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 8
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 9
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 10
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI
    • Jan.
    • H.-M. Wang, M. Luo, X.-G. Xia, Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 11
    • 84930197364 scopus 로고    scopus 로고
    • Outage constrained secrecy throughput maximization for DF relay networks
    • May
    • T.-X. Zheng, H.-M. Wang, F. Liu, M. H. Lee, "Outage constrained secrecy throughput maximization for DF relay networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1741-1755, May 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.5 , pp. 1741-1755
    • Zheng, T.-X.1    Wang, H.-M.2    Liu, F.3    Lee, M.H.4
  • 12
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 13
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 14
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang, M. Luo, Q. Yin, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3
  • 15
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • Mar.
    • A. Mukherjee, S. Fakoorian, J. Huang, A. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Mar. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.2    Huang, J.3    Swindlehurst, A.4
  • 16
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 17
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct.
    • X. Zhou and M. R.McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 18
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels
    • Jun.
    • X. Zhang, X. Zhou, M. R. McKay, "On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 19
    • 84866621680 scopus 로고    scopus 로고
    • A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming
    • Sep.
    • J. Xiong, K.-K. Wong, D. Ma, J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming," IEEE Commum. Lett., vol. 16, no. 9, pp. 1496-1499, Sep. 2012.
    • (2012) IEEE Commum. Lett. , vol.16 , Issue.9 , pp. 1496-1499
    • Xiong, J.1    Wong, K.-K.2    Ma, D.3    Wei, J.4
  • 20
    • 84907000771 scopus 로고    scopus 로고
    • Artificial noise with optimal power allocation in multi-input single-output wiretap channels
    • Syndey, NSW, Australia
    • N. Yang, J. Yuan, R. Malaney, R. Subramanian, I. Land, "Artificial noise with optimal power allocation in multi-input single-output wiretap channels," in Proc. IEEE ICC, Syndey, NSW, Australia, 2014, pp. 2184-2190.
    • (2014) Proc. IEEE ICC , pp. 2184-2190
    • Yang, N.1    Yuan, J.2    Malaney, R.3    Subramanian, R.4    Land, I.5
  • 21
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
    • Mar.
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 22
    • 84861311185 scopus 로고    scopus 로고
    • Safe convex approximation to outagebased MISO secrecy rate optimization under imperfect CSI and with artificial noise
    • Nov.
    • Q. Li, W.-K. Ma, A. M.-C. So, "Safe convex approximation to outagebased MISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. 45th Asilomar Conf. Signals, Syst. Comput., Nov. 2011, pp. 207-211.
    • (2011) Proc. 45th Asilomar Conf. Signals, Syst. Comput. , pp. 207-211
    • Li, Q.1    Ma, W.-K.2    So, A.M.-C.3
  • 23
    • 84883395475 scopus 로고    scopus 로고
    • Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization
    • May
    • Q. Li andW.-K.Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2704-2717
    • Li, Q.1    Ma, W.-K.2
  • 24
    • 84903650326 scopus 로고    scopus 로고
    • On linear rrecoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks
    • Jul.
    • M. F. Hanif, L.-N. Tran, M. Juntti, S. Glisic, "On linear rrecoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 3536-3551, Jul. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.14 , pp. 3536-3551
    • Hanif, M.F.1    Tran, L.-N.2    Juntti, M.3    Glisic, S.4
  • 25
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • Sep.
    • M. Haenggi, J.,rews, F. Baccelli, O. Dousse, M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Rews, J.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5
  • 26
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. Ganti, J.,rews, A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.2    Rews, J.3    Hjørungnes, A.4
  • 27
    • 84893266496 scopus 로고    scopus 로고
    • Secrecy outage in random wireless networks subjected to fading
    • Sep.
    • S. Vuppala and G. Abreu, "Secrecy outage in random wireless networks subjected to fading," in Proc. IEEE 24th Int. Symp. PIMRC, Sep. 2013, pp. 446-450.
    • (2013) Proc. IEEE 24th Int. Symp. PIMRC , pp. 446-450
    • Vuppala, S.1    Abreu, G.2
  • 28
    • 84880159277 scopus 로고    scopus 로고
    • Physical layer security in cellular networks: A stochastic geometry approach
    • Jun.
    • H. Wang, X. Zhou, M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2776-2787
    • Wang, H.1    Zhou, X.2    Reed, M.C.3
  • 29
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb.
    • X. Zhou, R. K. Ganti, J. G.,rews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.K.2    Rews, J.G.3
  • 30
    • 84906228732 scopus 로고    scopus 로고
    • On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
    • Aug.
    • T.-X. Zheng, H.-M. Wang, Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers," IEEE Commun. Lett., vol. 18, no. 8, pp. 1299-1302, Aug. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.8 , pp. 1299-1302
    • Zheng, T.-X.1    Wang, H.-M.2    Yin, Q.3
  • 31
    • 84903148893 scopus 로고    scopus 로고
    • Physical layer security in downlink multi-antenna cellular networks
    • Jun.
    • G. Geraci, H. S. Dhillon, J. G.,rews, J. Yuan, I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.6 , pp. 2006-2021
    • Geraci, G.1    Dhillon, H.S.2    Rews, J.G.3    Yuan, J.4    Collings, I.B.5
  • 32
    • 80051955278 scopus 로고    scopus 로고
    • Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers
    • Jun.
    • M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers," in Proc. IEEE ICC Workshops, Jun. 2011, pp. 1-5.
    • (2011) Proc. IEEE ICC Workshops , pp. 1-5
    • Ghogho, M.1    Swami, A.2
  • 33
    • 84887058800 scopus 로고    scopus 로고
    • Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
    • Nov.
    • X. Zhang, X. Zhou, M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1802-1814
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 35
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjørungnes, A.4
  • 36
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. Gopala, L. Lai, H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.1    Lai, L.2    El Gamal, H.3
  • 37
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X.Wang,W. Shen, "Optimal relay selection for physical layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.