메뉴 건너뛰기




Volumn 58, Issue 1, 2011, Pages 95-109

Physical layer cryptography and cognitive networks

Author keywords

Cognitive; Modulation; Noise loop; Security; Wireless communications

Indexed keywords

COGNITIVE RADIO; COGNITIVE SYSTEMS; CRYPTOGRAPHY; MODULATION; PHYSICAL LAYER; QUALITY OF SERVICE; RADIO; RADIO SYSTEMS; SECURE COMMUNICATION;

EID: 84982318878     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-011-0290-y     Document Type: Article
Times cited : (24)

References (23)
  • 1
    • 1542712393 scopus 로고    scopus 로고
    • The end of spectrum scarcity
    • 10.1109/MSPEC.2004.1270548
    • G. Staple K. Werbach 2004 The end of spectrum scarcity IEEE Spectrum 41 3 48 52 10.1109/MSPEC.2004.1270548
    • (2004) IEEE Spectrum , vol.41 , Issue.3 , pp. 48-52
    • Staple, G.1    Werbach, K.2
  • 2
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • DOI 10.1109/JSAC.2004.839380
    • S. Haykin 2005 Cognitive radio: Brain-empowered wireless communications IEEE Journal on Selected Areas in Communications 23 2 201 220 10.1109/JSAC.2004.839380 (Pubitemid 40245487)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 3
    • 33745648091 scopus 로고    scopus 로고
    • NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
    • DOI 10.1016/j.comnet.2006.05.001, PII S1389128606001009
    • I. F. Akyildiz W. -Y. Lee M. C. Vuran S. Mohantly 2006 Next generation/dynamic spectrum access/cognitivw radio wireless network: A survey Elsevier Computer Networks 50 2127 2159 1107.68018 10.1016/j.comnet.2006.05.001 (Pubitemid 43975031)
    • (2006) Computer Networks , vol.50 , Issue.13 , pp. 2127-2159
    • Akyildiz, I.F.1    Lee, W.-Y.2    Vuran, M.C.3    Mohanty, S.4
  • 4
    • 51749122004 scopus 로고    scopus 로고
    • Security in cognitive radio networks: The required evolution in approaches to wireless network security
    • 15-17 May
    • Burbank, J. L. (2008). Security in cognitive radio networks: The required evolution in approaches to wireless network security. In 3rd international conference on CrownCom pp. 1-7, 15-17 May
    • (2008) 3rd International Conference on CrownCom , pp. 1-7
    • Burbank, J.L.1
  • 5
    • 42649092608 scopus 로고    scopus 로고
    • A survey on spectrum management in cognitive radio networks
    • DOI 10.1109/MCOM.2008.4481339
    • I. F. Akyildiz W. Lee M. C. Vuran S. Mohanty 2008 A survey on spectrum management in cognitive radio networks IEEE Communications Magazine 46 40 80 10.1109/MCOM.2008.4481339 (Pubitemid 351593406)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 40-48
    • Akyildiz, I.F.1    Lee, W.-Y.2    Vuran, M.C.3    Mohanty, S.4
  • 7
    • 0033171330 scopus 로고    scopus 로고
    • Cognitive radio: Making software radios more personal
    • 10.1109/98.788210
    • J. Mitola III G. Q. MaGuire Jr. 1999 Cognitive radio: Making software radios more personal IEEE Personal Communications 6 4 13 18 10.1109/98.788210
    • (1999) IEEE Personal Communications , vol.6 , Issue.4 , pp. 13-18
    • Mitola Iii, J.1    MaGuire Jr., G.Q.2
  • 8
    • 85043030447 scopus 로고    scopus 로고
    • IEEE 802 Tutorial: Cognitive Radio. Scott Seidel, Raytheon, Presented at the IEEE 802 Plenary, 18 July 2005
    • IEEE 802 Tutorial: Cognitive Radio. Scott Seidel, Raytheon, Presented at the IEEE 802 Plenary, 18 July 2005.
  • 9
    • 70349567245 scopus 로고    scopus 로고
    • A new modulation for intrinsically secure radio channel in wireless systems
    • 10.1007/s11277-008-9609-8 10.1007/s11277-008-9609-8
    • L. Mucchi L.S. Ronga L. Cipriani 2009 A new modulation for intrinsically secure radio channel in wireless systems Wireless Personal Communications 51 1 67 80 10.1007/s11277-008-9609-8 10.1007/s11277-008-9609-8
    • (2009) Wireless Personal Communications , vol.51 , Issue.1 , pp. 67-80
    • Mucchi, L.1    Ronga, L.S.2    Cipriani, L.3
  • 10
    • 79959211540 scopus 로고    scopus 로고
    • A novel approach for physical layer cryptography in wireless networks
    • 10.1007/s11277-010-9950-6 10.1007/s11277-010-9950-6
    • L. Mucchi L.S. Ronga E. Del Re 2009 A novel approach for physical layer cryptography in wireless networks Wireless Personal Communications 53 3 329 347 10.1007/s11277-010-9950-6 10.1007/s11277-010-9950-6
    • (2009) Wireless Personal Communications , vol.53 , Issue.3 , pp. 329-347
    • Mucchi, L.1    Ronga, L.S.2    Del Re, E.3
  • 11
    • 42649135628 scopus 로고    scopus 로고
    • Toward secure distributed spectrum sensing in cognitive radio networks
    • DOI 10.1109/MCOM.2008.4481340
    • R. Chen J. Park Y. Hou J. H. Reed 2008 Toward secure distributed spectrum sensing in cognitive radio networks IEEE Communications Magazine 46 50 55 10.1109/MCOM.2008.4481340 (Pubitemid 351593407)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 50-55
    • Chen, R.1    Park, J.-M.2    Hou, Y.T.3    Reed, J.H.4
  • 12
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • 32133
    • C. Shannon 1949 Communication theory of secrecy systems Bell System Technical Journal 29 656 715 32133
    • (1949) Bell System Technical Journal , vol.29 , pp. 656-715
    • Shannon, C.1
  • 14
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • 2045799 10.1109/TIT.2003.820010
    • A. O. Hero III 2003 Secure space-time communication IEEE Transactions on Information Theory 49 12 3235 3249 2045799 10.1109/TIT.2003.820010
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero Iii, A.O.1
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • 1237712 0784.94018 10.1109/18.256484
    • U. Maurer 1993 Secret key agreement by public discussion from common information IEEE Transactions on Information Theory 39 3 733 742 1237712 0784.94018 10.1109/18.256484
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 16
    • 0016562514 scopus 로고
    • The wire-tap channel
    • 408979
    • A. D. Wyner 1975 The wire-tap channel Bell System Technical Journal 54 8 1355 1387 408979
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 17
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • 493646 0382.94017 10.1109/TIT.1978.1055892
    • I. Csiszar J. Korner 1978 Broadcast channels with confidential messages IEEE Transactions on Information Theory 24 3 339 348 493646 0382.94017 10.1109/TIT.1978.1055892
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 18
    • 74549226345 scopus 로고    scopus 로고
    • Quantum cryptography: A new generation of information technology security system, information technology: New generations, 2009
    • 27-29 April 2009
    • Sharbaf, M. S. (2009). Quantum cryptography: A new generation of information technology security system, information technology: New generations, 2009. In Sixth international conference on ITNG '09. 27-29 April 2009 (pp. 1644-1648).
    • (2009) Sixth International Conference on ITNG '09 , pp. 1644-1648
    • Sharbaf, M.S.1
  • 20
    • 44849094850 scopus 로고    scopus 로고
    • Secure MIMO communications in a system with equal numbers of transmit and receive antennas
    • DOI 10.1109/LCOMM.2008.080077
    • K. Hyungjin J. D. Villasenor 2008 Secure MIMO communications in a system with equal numbers of transmit and receive antennas Communications Letters IEEE 12 5 386 388 10.1109/LCOMM.2008.080077 (Pubitemid 351796190)
    • (2008) IEEE Communications Letters , vol.12 , Issue.5 , pp. 386-388
    • Kim, H.1    Villasenor, J.D.2
  • 21
    • 33847366177 scopus 로고    scopus 로고
    • MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    • Atlantic City, NJ, Oct. 17-20
    • Li, X., & Ratazzi, E. P. (2005). MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks. In IEEE Military communications conference (MILCOM'2005). Atlantic City, NJ, Oct. 17-20.
    • (2005) IEEE Military Communications Conference (MILCOM'2005)
    • Li, X.1    Ratazzi, E.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.