메뉴 건너뛰기




Volumn 11, Issue 6, 2016, Pages 1128-1138

Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach

Author keywords

Beamforming; decode and forward (DF); physical layer security; stochastic geometry; wireless sensor networks (WSNs)

Indexed keywords

BEAMFORMING; GEOMETRY; LOCAL AREA NETWORKS; NETWORK LAYERS; NETWORK SECURITY; REMOTE SENSING; STOCHASTIC SYSTEMS;

EID: 84963979497     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2516917     Document Type: Article
Times cited : (110)

References (25)
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 84858162419 scopus 로고    scopus 로고
    • Information and inference in the wireless physical layer
    • Feb.
    • H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Commun., vol. 19, no. 1, pp. 40-47, Feb. 2012.
    • (2012) IEEE Wireless Commun. , vol.19 , Issue.1 , pp. 40-47
    • Poor, H.V.1
  • 5
    • 84903148893 scopus 로고    scopus 로고
    • Physical layer security in downlink multi-antenna cellular networks
    • Jun.
    • G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.6 , pp. 2006-2021
    • Geraci, G.1    Dhillon, H.S.2    Andrews, J.G.3    Yuan, J.4    Collings, I.B.5
  • 6
    • 84880159277 scopus 로고    scopus 로고
    • Physical layer security in cellular networks: A stochastic geometry approach
    • Jun.
    • H. Wang, X. Zhou, M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2776-2787
    • Wang, H.1    Zhou, X.2    Reed, M.C.3
  • 7
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.-C.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 9
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 10
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physicallayer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 11
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • Dec.
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2008, pp. 1-5.
    • (2008) Proc IEEE Global Telecommun. Conf. (GLOBECOM) , pp. 1-5
    • He, X.1    Yener, A.2
  • 12
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb.
    • X. Zhou, R. K. Ganti, J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3
  • 13
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjørungnes, A.4
  • 14
    • 84887058800 scopus 로고    scopus 로고
    • Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
    • Nov.
    • X. Zhang, X. Zhou, M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1802-1814
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 16
    • 27744501279 scopus 로고    scopus 로고
    • Array-transmission based physicallayer security techniques for wireless sensor networks
    • Jul.
    • X. Li, M. Chen, E. P. Ratazzi, "Array-transmission based physicallayer security techniques for wireless sensor networks," in Proc. IEEE Int. Conf. Mechatron. Autom. (ICMA), Jul. 2005, pp. 1618-1623.
    • (2005) Proc IEEE Int. Conf. Mechatron. Autom. (ICMA) , pp. 1618-1623
    • Li, X.1    Chen, M.2    Ratazzi, E.P.3
  • 17
    • 65649139984 scopus 로고    scopus 로고
    • Distributed detection with censoring sensors under physical layer secrecy
    • May
    • S. Marano, V. Matta, P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.5 , pp. 1976-1986
    • Marano, S.1    Matta, V.2    Willett, P.K.3
  • 18
    • 84863928823 scopus 로고    scopus 로고
    • Scalable PHY-layer security for distributed detection in wireless sensor networks
    • Aug.
    • R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1118-1126
    • Soosahabi, R.1    Naraghi-Pour, M.2
  • 19
    • 84899636821 scopus 로고    scopus 로고
    • Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
    • May
    • J. E. Barcelo-Llado, A. Morell, G. Seco-Granados, "Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, May 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.5 , pp. 839-850
    • Barcelo-Llado, J.E.1    Morell, A.2    Seco-Granados, G.3
  • 20
    • 84859052098 scopus 로고    scopus 로고
    • Modeling and analysis of K-tier downlink heterogeneous cellular networks
    • Apr.
    • H. S. Dhillon, R. K. Ganti, F. Baccelli, J. G. Andrews, "Modeling and analysis of K-tier downlink heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.3 , pp. 550-560
    • Dhillon, H.S.1    Ganti, R.K.2    Baccelli, F.3    Andrews, J.G.4
  • 21
    • 85028099494 scopus 로고    scopus 로고
    • Interference and outage in Poisson cognitive networks
    • Apr.
    • C.-H. Lee and M. Haenggi, "Interference and outage in Poisson cognitive networks," IEEE Trans. Wireless Commun., vol. 11, no. 4, pp. 1392-1401, Apr. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.4 , pp. 1392-1401
    • Lee, C.-H.1    Haenggi, M.2
  • 22
    • 84880180988 scopus 로고    scopus 로고
    • Random deployment of data collectors for serving randomly-located sensors
    • Jun.
    • T. Kwon and J. M. Cioffi, "Random deployment of data collectors for serving randomly-located sensors," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2556-2565, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2556-2565
    • Kwon, T.1    Cioffi, J.M.2
  • 23
    • 79952985353 scopus 로고    scopus 로고
    • Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel
    • Mar.
    • M. Yuksel and E. Erkip, "Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 762-771, Mar. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.3 , pp. 762-771
    • Yuksel, M.1    Erkip, E.2
  • 24
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb.
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.