메뉴 건너뛰기




Volumn 53, Issue 12, 2015, Pages 32-39

Physical layer security in wireless cooperative relay networks: State of the art and beyond

Author keywords

Communication system security; Physical layer; Protocols; Relay networks (telecommunications); Security; Wireless communication

Indexed keywords

NETWORK LAYERS; NETWORK PROTOCOLS; RELAY CONTROL SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84961815117     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2015.7355563     Document Type: Conference Paper
Times cited : (170)

References (15)
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. Wyner, "The Wire-Tap Channel," Bell Sys. Tech. J., vol. 54, no. 87, Oct. 1975, pp. 1355-87.
    • (1975) Bell Sys. Tech. J. , vol.54 , Issue.87 , pp. 1355-1387
    • Wyner, A.1
  • 3
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Processing, vol. 58, no. 3, Mar. 2010, pp. 1875-88.
    • (2010) IEEE Trans. Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1
  • 4
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an Untrusted Relay: A Secrecy Perspective," IEEE Trans. Info. Theory, vol. 56, no. 8, Aug. 2010, pp. 3807-27.
    • (2010) IEEE Trans. Info. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 5
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop ampli-fy-and-forward systems with untrustworthy relay nodes
    • Oct.
    • L. Sun et al., "Performance Study of Two-Hop Ampli-fy-and-Forward Systems with Untrustworthy Relay Nodes," IEEE Trans. Vehic. Tech., vol. 61, no. 8, Oct. 2012, pp. 3801-07.
    • (2012) IEEE Trans. Vehic. Tech. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1
  • 6
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beam-forming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint Secure Beam-forming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System," IEEE Trans. Signal Processing, vol. 60, no. 1, Jan. 2012, pp. 310-25.
    • (2012) IEEE Trans. Signal Processing , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 7
    • 84898039745 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way communications with an untrusted relay
    • May
    • J. Mo et al., "Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay," IEEE Trans. Signal Processing, vol. 62, no. 9, May 2014, pp. 2185-99.
    • (2014) IEEE Trans. Signal Processing , vol.62 , Issue.9 , pp. 2185-2199
    • Mo, J.1
  • 8
    • 84873099749 scopus 로고    scopus 로고
    • End-to-end secure multi-hop communication with untrusted relays
    • Jan.
    • X. He and A. Yener, "End-to-End Secure Multi-Hop Communication with Untrusted Relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, Jan. 2013, pp. 1-11.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 1-11
    • He, X.1    Yener, A.2
  • 9
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure Communication via an Untrusted Non-Regenerative Relay in Fading Channels," IEEE Trans. Signal Processing, vol. 61, no. 10, May 2013, pp. 2536-50.
    • (2013) IEEE Trans. Signal Processing , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 10
    • 70349175144 scopus 로고    scopus 로고
    • Analyzing amplify-and-forward and decode-and-forward cooperative strategies in wyner's channel model
    • Apr.
    • P. Zhang et al., "Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model," Proc. IEEE WCNC, Apr. 2009, pp. 1-5.
    • (2009) Proc. IEEE WCNC , pp. 1-5
    • Zhang, P.1
  • 11
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb.
    • J. Chen et al., "Joint Relay and Jammer Selection for Secure Two-Way Relay Networks," IEEE Trans. Info. Forensics Security, vol. 7, no. 1, Feb. 2012, pp. 310-20.
    • (2012) IEEE Trans. Info. Forensics Security , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1
  • 12
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using arti-fcial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing Secrecy Using Arti-fcial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-89.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 13
    • 84876796391 scopus 로고    scopus 로고
    • Destination assisted cooperative jamming for wireless physical-layer security
    • Apr.
    • Y. Liu, J. Li, and A. Petropulu, "Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security," IEEE Trans. Info. Forensics Security, vol. 8, no. 4, Apr. 2013, pp. 682-94.
    • (2013) IEEE Trans. Info. Forensics Security , vol.8 , Issue.4 , pp. 682-694
    • Liu, Y.1    Li, J.2    Petropulu, A.3
  • 14
    • 84939229063 scopus 로고    scopus 로고
    • Improving wireless secrecy rate via full-duplex relay-assisted protocols
    • Oct.
    • S. Parsaeefard and T. Le-Ngoc, "Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols", IEEE Trans. Info. Forensics & Security, vol. 10, no. 10, Oct. 2015, pp. 2095-2107.
    • (2015) IEEE Trans. Info. Forensics & Security , vol.10 , Issue.10 , pp. 2095-2107
    • Parsaeefard, S.1    Le-Ngoc, T.2
  • 15
    • 84865478919 scopus 로고    scopus 로고
    • Semantic security for the wiretap channel
    • Lecture Notes in Computer Science Springer-Verlag
    • M. Bellare, S. Tessaro, and A. Vardy, "Semantic Security for the Wiretap Channel," Advances in Cryptology-CRYPTO 2012, Lecture Notes in Computer Science, vol. 7417, Springer-Verlag, pp. 294-311.
    • (2012) Advances in Cryptology-CRYPTO , vol.7417 , pp. 294-311
    • Bellare, M.1    Tessaro, S.2    Vardy, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.