메뉴 건너뛰기




Volumn 14, Issue 7, 2015, Pages 1433-1448

Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers

Author keywords

cooperative secrecy; minimum energy; secure routing; Wireless security

Indexed keywords

ALGORITHMS; COMPLEX NETWORKS; CONSTRAINED OPTIMIZATION; ENERGY CONSERVATION; ENERGY UTILIZATION; INFORMATION THEORY; JAMMING; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK LAYERS; NETWORK ROUTING; OPTIMIZATION; POLYNOMIAL APPROXIMATION; POLYNOMIALS; WIRELESS NETWORKS;

EID: 84961574762     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2014.2354031     Document Type: Article
Times cited : (39)

References (46)
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 5
  • 6
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar, and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 7
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May.
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 9
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel, and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 10
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin, and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 11
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 12
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai, and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 13
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • Dec.
    • D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.10 , pp. 2067-2076
    • Goeckel, D.1    Vasudevan, S.2    Towsley, D.3    Adams, S.4    Ding, Z.5    Leung, K.6
  • 14
    • 84863157582 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels with imperfect ECSI
    • Dec.
    • J. Huang, and A. L. Swindlehurst, "Robust secure transmission in MISO channels with imperfect ECSI," in Proc. IEEE Global Telecommun. Conf., Dec. 2011, pp. 1-5.
    • (2011) Proc. IEEE Global Telecommun. Conf. , pp. 1-5
    • Huang, J.1    Swindlehurst, A.L.2
  • 15
    • 80051757223 scopus 로고    scopus 로고
    • Position-based jamming for enhanced wireless security
    • Sep.
    • J. P. Vilela, P. C. Pinto, and J. Barros, "Position-based jamming for enhanced wireless security," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 616-627, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 616-627
    • Vilela, J.P.1    Pinto, P.C.2    Barros, J.3
  • 16
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Jun.
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2008, pp. 539-543.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 539-543
    • Haenggi, M.1
  • 17
    • 62949215603 scopus 로고    scopus 로고
    • Physical-layer security in stochastic wireless networks
    • Nov.
    • P. Pinto, J. Barros, and M. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. Commun. Syst., Nov. 2008, pp. 974-979.
    • (2008) Proc. IEEE Int. Conf. Commun. Syst. , pp. 974-979
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 18
    • 70449514539 scopus 로고    scopus 로고
    • Wireless physical-layer security: The case of colluding eavesdroppers
    • Jun.
    • P. Pinto, J. Barros, and M. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2442-2446.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 2442-2446
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 19
    • 70449514137 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs with malicious nodes
    • Jun.
    • Y. Liang, H. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 1189-1193.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 1189-1193
    • Liang, Y.1    Poor, H.2    Ying, L.3
  • 22
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multiantenna transmission
    • Mar.
    • Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. Conf. Inf. Sci. Syst., Mar. 2007, pp. 905-910.
    • (2007) Proc. Conf. Inf. Sci. Syst. , pp. 905-910
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 23
    • 62149087803 scopus 로고    scopus 로고
    • Distributed transmit beamforming: Challenges and recent progress
    • Feb.
    • R. Mudumbai, D. R. Brown III, U. Madhow, and H. V. Poor, "Distributed transmit beamforming: Challenges and recent progress," IEEE Commun. Mag., vol. 47, no. 2, pp. 102-110, Feb. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.2 , pp. 102-110
    • Mudumbai, R.1    Brown, D.R.2    Madhow, U.3    Poor, H.V.4
  • 25
    • 84863174459 scopus 로고    scopus 로고
    • Coordinated multipoint transmission and reception in LTE-advanced: Deployment scenarios and operational challenges
    • Feb.
    • D. Lee, H. Seo, B. Clerckx, E. Hardouin, D. Mazzarese, S. Nagata, and K. Sayana, "Coordinated multipoint transmission and reception in LTE-advanced: Deployment scenarios and operational challenges," IEEE Commun. Mag., vol. 50, no. 2, pp. 148-155, Feb. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.2 , pp. 148-155
    • Lee, D.1    Seo, H.2    Clerckx, B.3    Hardouin, E.4    Mazzarese, D.5    Nagata, S.6    Sayana, K.7
  • 26
    • 84877658480 scopus 로고    scopus 로고
    • Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback
    • Dec.
    • F. Quitin, M. M. Ur Rahman, R. Mudumbai, and U. Madhow, "Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback," in Proc. IEEE Global Telecommun. Conf., Dec. 2012, pp. 4787-4792.
    • (2012) Proc. IEEE Global Telecommun. Conf. , pp. 4787-4792
    • Quitin, F.1    Ur Rahman, M.M.2    Mudumbai, R.3    Madhow, U.4
  • 27
    • 84875619688 scopus 로고    scopus 로고
    • A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept
    • Mar.
    • F. Quitin, M. M. Ur Rahman, R. Mudumbai, and U. Madhow, "A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept," IEEE Trans. Wireless Commun., vol. 12, no. 3, pp. 1418-1428, Mar. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.12 , Issue.3 , pp. 1418-1428
    • Quitin, F.1    Ur Rahman, M.M.2    Mudumbai, R.3    Madhow, U.4
  • 28
    • 84861591386 scopus 로고    scopus 로고
    • Phantom: Physical layer cooperation for location privacy protection
    • presented at Orlando, USA, Mar.
    • S. Oh, T. Vu, M. Gruteser, and S. Banerjee, "Phantom: Physical layer cooperation for location privacy protection," presented at the IEEE Conf. Comput. Commun., Orlando, USA, Mar. 2012.
    • (2012) The IEEE Conf. Comput. Commun.
    • Oh, S.1    Vu, T.2    Gruteser, M.3    Banerjee, S.4
  • 33
    • 84866730731 scopus 로고    scopus 로고
    • Energy efficiency of cooperative jamming strategies in secure wireless networks
    • Sep.
    • M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.9 , pp. 3025-3029
    • Dehghan, M.1    Goeckel, D.L.2    Ghaderi, M.3    Ding, Z.4
  • 34
    • 84868585200 scopus 로고    scopus 로고
    • Receiver-coordinated distributed transmit nullforming with channel state uncertainty
    • Mar.
    • D. R. Brown III, U. Madhow, P. Bidigare, and S. Dasgupta, "Receiver-coordinated distributed transmit nullforming with channel state uncertainty," in Proc. Conf. Inf. Sci. Syst., Mar. 2012, pp. 1-6.
    • (2012) Proc. Conf. Inf. Sci. Syst. , pp. 1-6
    • Brown, D.R.1    Madhow, U.2    Bidigare, P.3    Dasgupta, S.4
  • 35
    • 84860255627 scopus 로고    scopus 로고
    • On the secrecy capacity scaling in wireless networks
    • May
    • O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On the secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.O.1    Koksal, C.E.2    Gamal, H.E.3
  • 36
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 38
    • 0035364530 scopus 로고    scopus 로고
    • A simple efficient approximation scheme for the restricted shortest path problem
    • D. H. Lorenz, and D. Raz, "A simple efficient approximation scheme for the restricted shortest path problem," Oper. Res. Lett., vol. 28, pp. 213-219, 1999.
    • (1999) Oper. Res. Lett. , vol.28 , pp. 213-219
    • Lorenz, D.H.1    Raz, D.2
  • 39
    • 70450164574 scopus 로고    scopus 로고
    • A survey of secure mobile ad hoc routing protocols
    • Fourth Quarter
    • L. Abusalah, A. Khokhar, and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 78-93, Fourth Quarter 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.4 , pp. 78-93
    • Abusalah, L.1    Khokhar, A.2    Guizani, M.3
  • 40
    • 80053135174 scopus 로고    scopus 로고
    • They can hear your heartbeats: Non-invasive security for implantable medical devices
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," in Proc. ACM Sigcomm Conf., 2011, pp. 2-13.
    • (2011) Proc. ACM Sigcomm Conf. , pp. 2-13
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 41
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • May
    • P. Gupta, and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, May 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 388-404
    • Gupta, P.1    Kumar, P.R.2
  • 43
    • 60049091288 scopus 로고    scopus 로고
    • SPREAD: Improving network security by multipath routing in mobile ad hoc networks
    • W. Lou, W. Liu, Y. Zhang, and Y. Fang, "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," ACM Wireless Netw., vol. 15, pp. 279-293, 2009.
    • (2009) ACM Wireless Netw. , vol.15 , pp. 279-293
    • Lou, W.1    Liu, W.2    Zhang, Y.3    Fang, Y.4
  • 44
    • 77952986444 scopus 로고    scopus 로고
    • Secure data collection in wireless sensor networks using randomized dispersive routes
    • Jul.
    • T. Shu, M. Krunz, and S. Liu, "Secure data collection in wireless sensor networks using randomized dispersive routes," IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul. 2010.
    • (2010) IEEE Trans. Mobile Comput. , vol.9 , Issue.7 , pp. 941-954
    • Shu, T.1    Krunz, M.2    Liu, S.3
  • 46
    • 1842815876 scopus 로고    scopus 로고
    • Security based on network topology against the wiretapping attack
    • Feb.
    • K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Commun. Mag., vol. 11, no. 1, pp. 68-71, Feb. 2004.
    • (2004) IEEE Wireless Commun. Mag. , vol.11 , Issue.1 , pp. 68-71
    • Jain, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.