메뉴 건너뛰기




Volumn 62, Issue 5, 2016, Pages 2545-2556

Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel

Author keywords

lattice codes; modulo andforward; physical layer security; Untrusted relay

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); DEGREES OF FREEDOM (MECHANICS); ELECTRIC RELAYS; NETWORK LAYERS; OUTAGES;

EID: 84968919997     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2016.2530080     Document Type: Article
Times cited : (21)

References (31)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1948.
    • (1948) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.1
  • 5
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 7
    • 64249156371 scopus 로고    scopus 로고
    • On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
    • Apr.
    • X. Tang, R. Liu, P. Spasojevíc, H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.4 , pp. 1575-1591
    • Tang, X.1    Liu, R.2    Spasojevíc, P.3    Poor, H.V.4
  • 12
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 15
    • 67650631347 scopus 로고    scopus 로고
    • Channel coding and decoding in a relay system operated with physical-layer network coding
    • Jun.
    • S. Zhang and S.-C. Liew, "Channel coding and decoding in a relay system operated with physical-layer network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 788-796, Jun. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.5 , pp. 788-796
    • Zhang, S.1    Liew, S.-C.2
  • 16
  • 18
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 19
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 20
    • 84873099749 scopus 로고    scopus 로고
    • End-to-end secure multi-hop communication with untrusted relays
    • Jan.
    • X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.1 , pp. 1-11
    • He, X.1    Yener, A.2
  • 23
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.3
  • 24
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 12 log(1+SNR) on the AWGN channel with lattice encoding and decoding
    • Oct.
    • U. Erez and R. Zamir, "Achieving 12 log(1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.10 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 25
    • 26844546304 scopus 로고    scopus 로고
    • Lattices which are good for (almost) everything
    • Oct.
    • U. Erez, S. Litsyn, R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.10 , pp. 3401-3416
    • Erez, U.1    Litsyn, S.2    Zamir, R.3
  • 26
    • 84889564298 scopus 로고    scopus 로고
    • Approximately achieving Gaussian relay network capacity with lattice-based QMF codes
    • Dec.
    • A. Ozgur and S. Diggavi, "Approximately achieving Gaussian relay network capacity with lattice-based QMF codes," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8275-8294, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8275-8294
    • Ozgur, A.1    Diggavi, S.2
  • 27
    • 77953740795 scopus 로고    scopus 로고
    • Generalized degrees of freedom of the symmetric Gaussian K user interference channel
    • Jul.
    • S. A. Jafar and S. Vishwanath, "Generalized degrees of freedom of the symmetric Gaussian K user interference channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3297-3303, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3297-3303
    • Jafar, S.A.1    Vishwanath, S.2
  • 28
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Oct.
    • L. Sun, T. Zhang, Y. Li, N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, N.4
  • 29
    • 67651149765 scopus 로고    scopus 로고
    • Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis
    • Jun.
    • J. L. Vicario, A. Bel, J. Lopez-Salcedo, G. Seco, "Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2872-2876, Jun. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.6 , pp. 2872-2876
    • Vicario, J.L.1    Bel, A.2    Lopez-Salcedo, J.3    Seco, G.4
  • 30
    • 61449257403 scopus 로고    scopus 로고
    • Relay subset selection in wireless networks using partial decode-and-forward transmission
    • Feb.
    • C. K. Lo, S. Vishwanath, R. W. Heath, "Relay subset selection in wireless networks using partial decode-and-forward transmission," IEEE Trans. Veh. Technol., vol. 58, no. 2, pp. 692-704, Feb. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.2 , pp. 692-704
    • Lo, C.K.1    Vishwanath, S.2    Heath, R.W.3
  • 31
    • 77949416026 scopus 로고    scopus 로고
    • Dual-hop systems with noisy relay and interference-limited destination
    • Mar.
    • C. Zhong, S. Jin, K.-K. Wong, "Dual-hop systems with noisy relay and interference-limited destination," IEEE Trans. Commun., vol. 58, no. 3, pp. 764-768, Mar. 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.3 , pp. 764-768
    • Zhong, C.1    Jin, S.2    Wong, K.-K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.