메뉴 건너뛰기




Volumn 12, Issue 1, 2016, Pages 291-300

Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks

Author keywords

constellation rotation; Cooperative relay transmissions; fountain codes; physical layer security; QoS violating probability

Indexed keywords

CODES (SYMBOLS); COOPERATIVE COMMUNICATION; FADING (RADIO); FADING CHANNELS; FORWARD ERROR CORRECTION; JAMMING; NETWORK LAYERS; PROBABILITY; QUALITY CONTROL; QUALITY OF SERVICE; RADIO TRANSMISSION; RADIO WAVES; RELAY CONTROL SYSTEMS; SIGNAL RECEIVERS; WIRELESS SENSOR NETWORKS;

EID: 84962611636     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2015.2509442     Document Type: Article
Times cited : (82)

References (25)
  • 1
    • 84959219264 scopus 로고    scopus 로고
    • Using cognitive radio for interference-resistant industrial wireless sensor networks: An overview
    • Dec.
    • T. M. Chiwewe, C. F. Mbuya, and G. P. Hancke, "Using cognitive radio for interference-resistant industrial wireless sensor networks: An overview, " IEEE Trans. Ind. Informat., vol. 11, no. 6, pp. 1466-1481, Dec. 2015.
    • (2015) IEEE Trans. Ind. Informat. , vol.11 , Issue.6 , pp. 1466-1481
    • Chiwewe, T.M.1    Mbuya, C.F.2    Hancke, G.P.3
  • 2
    • 84929335760 scopus 로고    scopus 로고
    • Assignment of segmented slots enabling reliable realtime transmission in industrial wireless sensor networks
    • Jun.
    • D. Yang et al., "Assignment of segmented slots enabling reliable realtime transmission in industrial wireless sensor networks, " IEEE Trans. Ind. Electron., vol. 62, no. 6, pp. 3966-3977, Jun. 2015.
    • (2015) IEEE Trans. Ind. Electron. , vol.62 , Issue.6 , pp. 3966-3977
    • Yang, D.1
  • 3
    • 0345258506 scopus 로고    scopus 로고
    • User cooperation diversity-Part I: System description
    • Nov.
    • A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-Part I: System description, " IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
    • (2003) IEEE Trans. Commun. , vol.51 , Issue.11 , pp. 1927-1938
    • Sendonaris, A.1    Erkip, E.2    Aazhang, B.3
  • 4
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec.
    • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 6
    • 84858300925 scopus 로고    scopus 로고
    • Opportunistic distributed space-time coding for decode-and-forward cooperative systems
    • Apr.
    • Y. Zou, Y.-D. Yao, and B. Zheng, "Opportunistic distributed space-time coding for decode-and-forward cooperative systems, " IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1766-1781, Apr. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1766-1781
    • Zou, Y.1    Yao, Y.-D.2    Zheng, B.3
  • 7
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • Feb.
    • A. Mukherjee, S. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Feb., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 8
    • 29144503977 scopus 로고    scopus 로고
    • Fountain codes
    • Dec.
    • D. J. C. MacKay, "Fountain codes, " IEE Proc. Commun., vol. 152, no. 6, pp. 1062-1068, Dec. 2005.
    • (2005) IEE Proc. Commun. , vol.152 , Issue.6 , pp. 1062-1068
    • MacKay, D.J.C.1
  • 9
    • 47749092821 scopus 로고    scopus 로고
    • Joint design of relay and packet combining schemes for wireless industrial networks
    • Singapore, May
    • E. Uhlemann and A. Willig, "Joint design of relay and packet combining schemes for wireless industrial networks, " in Proc. IEEE Veh. Technol. Conf. (VTC-Spring), Singapore, May 2008, pp. 2441-2445.
    • (2008) Proc. IEEE Veh. Technol. Conf. (VTC-Spring) , pp. 2441-2445
    • Uhlemann, E.1    Willig, A.2
  • 10
    • 84923036885 scopus 로고    scopus 로고
    • Opportunistic routing algorithm for relay node selection in wireless sensor networks
    • Feb.
    • J. Luo, J. Hu, D. Wu, and R. Li, "Opportunistic routing algorithm for relay node selection in wireless sensor networks, " IEEE Trans. Ind. Informat., vol. 11, no. 1, pp. 112-121, Feb. 2015.
    • (2015) IEEE Trans. Ind. Informat. , vol.11 , Issue.1 , pp. 112-121
    • Luo, J.1    Hu, J.2    Wu, D.3    Li, R.4
  • 11
    • 84926477337 scopus 로고    scopus 로고
    • An experimental study of selective cooperative relaying in industrial wireless sensor networks
    • Aug.
    • N. Marchenko, T. Andre, G. Brandner, W. Masood, and C. Bettstetter, "An experimental study of selective cooperative relaying in industrial wireless sensor networks, " IEEE Trans. Ind. Informat., vol. 10, no. 3, pp. 1806-1816, Aug. 2014.
    • (2014) IEEE Trans. Ind. Informat. , vol.10 , Issue.3 , pp. 1806-1816
    • Marchenko, N.1    Andre, T.2    Brandner, G.3    Masood, W.4    Bettstetter, C.5
  • 12
    • 84929330256 scopus 로고    scopus 로고
    • Artificial-noiseaided secure multi-antenna transmission with limited feedback
    • May
    • X. Zhang, M. R. McKay, X. Zhou, and R. W. Heath, "Artificial-noiseaided secure multi-antenna transmission with limited feedback, " IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2742-2754, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2742-2754
    • Zhang, X.1    McKay, M.R.2    Zhou, X.3    Heath, R.W.4
  • 13
    • 84904303963 scopus 로고    scopus 로고
    • Secure beamforming design for physical layer network coding basedMIMO twoway relaying
    • Jul.
    • K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, "Secure beamforming design for physical layer network coding basedMIMO twoway relaying, " IEEE Commun. Lett., vol. 18, no. 7, pp. 1270-1273, Jul. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.7 , pp. 1270-1273
    • Jayasinghe, K.1    Jayasinghe, P.2    Rajatheva, N.3    Latva-Aho, M.4
  • 14
    • 84878400311 scopus 로고    scopus 로고
    • Uncoordinated cooperative jamming for secret communications
    • Jul.
    • S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications, " IEEE Trans. Inf. Forensics Secur., vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.7 , pp. 1081-1090
    • Luo, S.1    Li, J.2    Petropulu, A.P.3
  • 15
    • 80051775150 scopus 로고    scopus 로고
    • Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
    • Sep.
    • X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks, " IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 693-702, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.3 , pp. 693-702
    • Wang, X.1    Tao, M.2    Mo, J.3    Xu, Y.4
  • 16
    • 84898039745 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way communications with an untrusted relay
    • May
    • J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay, " IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.9 , pp. 2185-2199
    • Mo, J.1    Tao, M.2    Liu, Y.3    Wang, R.4
  • 17
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying
    • Jul.
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying, " IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 18
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physicallayer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 19
    • 84924902824 scopus 로고    scopus 로고
    • Security-aware relaying scheme for cooperative networks with untrusted relay nodes
    • Mar.
    • L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes, " IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Mar. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.3 , pp. 463-466
    • Sun, L.1    Ren, P.2    Du, Q.3    Wang, Y.4    Gao, Z.5
  • 20
    • 33749359497 scopus 로고    scopus 로고
    • Adaptive low-complexity erasure-correcting codebased protocols for QoS-driven mobile multicast services over wireless networks
    • Sep.
    • X. Zhang and Q. Du, "Adaptive low-complexity erasure-correcting codebased protocols for QoS-driven mobile multicast services over wireless networks, " IEEE Trans. Veh. Technol., vol. 55, no. 5, pp. 1633-1647, Sep. 2006.
    • (2006) IEEE Trans. Veh. Technol. , vol.55 , Issue.5 , pp. 1633-1647
    • Zhang, X.1    Du, Q.2
  • 21
    • 83655165188 scopus 로고    scopus 로고
    • SPARC: Superposition-aided rateless coding in wireless relay systems
    • Nov.
    • X. Wang, W. Chen, and Z. Cao, "SPARC: Superposition-aided rateless coding in wireless relay systems, " IEEE Trans. Veh. Technol., vol. 60, no. 9, pp. 4427-4438, Nov. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.9 , pp. 4427-4438
    • Wang, X.1    Chen, W.2    Cao, Z.3
  • 22
    • 84901499657 scopus 로고    scopus 로고
    • Exploiting fountain codes for secure wireless delivery
    • May
    • H. Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, "Exploiting fountain codes for secure wireless delivery, " IEEE Commun. Lett., vol. 18, no. 5, pp. 777-780, May 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.5 , pp. 777-780
    • Niu, H.1    Iwai, M.2    Sezaki, K.3    Sun, L.4    Du, Q.5
  • 23
    • 0032123310 scopus 로고    scopus 로고
    • Signal space diversity: A power-and bandwidth-efficient diversity technique for the Rayleigh fading channel
    • Jul.
    • J. Boutros and E. Viterbo, "Signal space diversity: A power-and bandwidth-efficient diversity technique for the Rayleigh fading channel, " IEEE Trans. Inf. Theory, vol. 44, no. 4, pp. 1453-1467, Jul. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.4 , pp. 1453-1467
    • Boutros, J.1    Viterbo, E.2
  • 24
    • 84902196230 scopus 로고    scopus 로고
    • Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems
    • Jun.
    • H. Li, X. Wang, and Y. Zou, "Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems, " IEEE Commun. Lett., vol. 18, no. 6, pp. 1059-1062, Jun. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.6 , pp. 1059-1062
    • Li, H.1    Wang, X.2    Zou, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.