메뉴 건너뛰기




Volumn 65, Issue 9, 2016, Pages 7274-7284

Destination-aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems

Author keywords

Amplify and forward (AF); Physical layer security (PLS); Secrecy rate; Untrusted relay

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); ITERATIVE METHODS; JAMMING; MIMO SYSTEMS; NETWORK LAYERS; TELECOMMUNICATION REPEATERS;

EID: 84990901993     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2015.2490099     Document Type: Article
Times cited : (64)

References (39)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas - Part I: The MISOME wiretap channel
    • Jul
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 5
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel
    • Nov
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 6
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 7
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 8
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 9
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach
    • Mar
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 10
    • 79955484022 scopus 로고    scopus 로고
    • On secrecy of codebook-based transmission beamforming under receiver limited feedback
    • Apr
    • S. Bashar, Z. Ding, and Y. G. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.4 , pp. 1212-1223
    • Bashar, S.1    Ding, Z.2    Li, Y.G.3
  • 11
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • Jan
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
    • (2013) IEEE Trans. Commun , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 12
    • 84884816590 scopus 로고    scopus 로고
    • MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining
    • Sep
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and J. Yuan, "MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining," IEEE Commun. Lett., vol. 17, no. 9, pp. 1754-1757, Sep. 2013.
    • (2013) IEEE Commun. Lett , vol.17 , Issue.9 , pp. 1754-1757
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Yuan, J.5
  • 13
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communication
    • Feb
    • Z. Ding, K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communication," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.2    Goeckel, D.L.3    Towsley, D.4
  • 14
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 15
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Oct
    • J. Y. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.Y.1    Petropulu, A.P.2    Weber, S.3
  • 16
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar
    • G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 13, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.13 , pp. 1317-1322
    • Zheng, G.1    Choo, L.C.2    Wong, K.K.3
  • 17
    • 77955366092 scopus 로고    scopus 로고
    • Collaborative relay beamforming for secrecy
    • May
    • J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. IEEE ICC, May 2010, pp. 1-5.
    • (2010) Proc. IEEE ICC , pp. 1-5
    • Zhang, J.1    Gursoy, M.C.2
  • 18
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
    • (2013) IEEE Signal Process. Lett , vol.20 , Issue.1 , pp. 35-38
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 19
    • 34249313010 scopus 로고    scopus 로고
    • Tracing malicious relays in cooperative wireless communications
    • Jun
    • Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 198-212, Jun. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.2 , pp. 198-212
    • Mao, Y.1    Wu, M.2
  • 20
    • 84878833098 scopus 로고    scopus 로고
    • On cooperative and malicious behaviors in multirelay fading channels
    • Jul
    • M.-H. Chen, S.-C. Lin, Y.-W. P. Hong, and X. Zhou, "On cooperative and malicious behaviors in multirelay fading channels," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1126-1139, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.7 , pp. 1126-1139
    • Chen, M.-H.1    Lin, S.-C.2    Hong, Y.-W.P.3    Zhou, X.4
  • 21
    • 84938932265 scopus 로고    scopus 로고
    • Relay channels with confidential messages
    • to be published
    • Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inf. Theory, to be published. [Online]. Available: http://arxiv.org/abs/cs/ 0611125
    • IEEE Trans. Inf. Theory
    • Oohama, Y.1
  • 22
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 23
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • Nov
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Nov. 2008, pp. 1-5.
    • (2008) Proc. IEEE Global Telecommun. Conf , pp. 1-5
    • He, X.1    Yener, A.2
  • 24
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • May
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, May 2009, Art. ID. 305146.
    • (2009) EURASIP J. Wireless Commun. Netw , vol.2009
    • He, X.1    Yener, A.2
  • 25
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 26
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec
    • J. N. Laneman, D. N. C. Tse, and G.W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 27
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Aug
    • L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3081-3087, Aug. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.8 , pp. 3081-3087
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, H.4
  • 28
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • Oct
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, Oct. 2013.
    • (2013) IEEE Trans. Signal Process , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 29
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Jun
    • L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
    • (2014) IEEE Wireless Commun. Lett , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Tran, N.H.4    Duong, T.Q.5
  • 30
    • 29144455916 scopus 로고    scopus 로고
    • High-SNR power offset in multiantenna communication
    • Dec
    • A. Lozano, A. M. Tulino, and S. Verdú, "High-SNR power offset in multiantenna communication," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4134-4151, Dec. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.12 , pp. 4134-4151
    • Lozano, A.1    Tulino, A.M.2    Verdú, S.3
  • 31
    • 77951604986 scopus 로고    scopus 로고
    • Ergodic capacity analysis of amplify-and-forward MIMO dual-hop systems
    • May
    • S. Jin, M. R. McKay, C. Zhong, and K.-K. Wong, "Ergodic capacity analysis of amplify-and-forward MIMO dual-hop systems," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2204-2224, May 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2204-2224
    • Jin, S.1    McKay, M.R.2    Zhong, C.3    Wong, K.-K.4
  • 32
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5
  • 34
    • 84988277250 scopus 로고
    • Programming with linear fractional functionals
    • Dec
    • A. Charnes and A. A. Cooper, "Programming with linear fractional functionals," Naval Res. Logist. Quart., vol. 9, no. 3/4, pp. 81-186, Dec. 1962.
    • (1962) Naval Res. Logist. Quart , vol.9 , Issue.3-4 , pp. 81-186
    • Charnes, A.1    Cooper, A.A.2
  • 35
    • 0033296299 scopus 로고    scopus 로고
    • Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
    • J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones," Optim. Methods Softw., vol. 11, no. 4, pp. 625-653, 1999.
    • (1999) Optim. Methods Softw , vol.11 , Issue.4 , pp. 625-653
    • Sturm, J.F.1
  • 36
    • 79957939502 scopus 로고    scopus 로고
    • New results on Hermitian matrix rank-one decomposition
    • Aug
    • W. Ai, Y. Huang, and S. Zhang, "New results on Hermitian matrix rank-one decomposition," Math. Program., vol. 128, no. 1, pp. 253-283, Aug. 2009.
    • (2009) Math. Program , vol.128 , Issue.1 , pp. 253-283
    • Ai, W.1    Huang, Y.2    Zhang, S.3
  • 37
    • 0004236492 scopus 로고    scopus 로고
    • Baltimore, MD, USA: The Johns Hopkins Univ. Press
    • G. H. Golub and C. F. V. Loan, Matrix Computations. Baltimore, MD, USA: The Johns Hopkins Univ. Press, 1996.
    • (1996) Matrix Computations
    • Golub, G.H.1    Loan, C.F.V.2
  • 38
    • 34247359530 scopus 로고    scopus 로고
    • Optimal design of non-regenerative MIMO wireless relays
    • Apr
    • X. Tang and Y. Hua, "Optimal design of non-regenerative MIMO wireless relays," IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1398-1407, Apr. 2007.
    • (2007) IEEE Trans. Wireless Commun , vol.6 , Issue.4 , pp. 1398-1407
    • Tang, X.1    Hua, Y.2
  • 39
    • 34249775806 scopus 로고    scopus 로고
    • Linear transceiver design in nonregenerative relays with channel state information
    • Jun
    • O. Muñoz-Medina, J. Vidal, and A. Agustín, "Linear transceiver design in nonregenerative relays with channel state information," IEEE Trans. Signal Process., vol. 55, pp. 2593-2604, Jun. 2007.
    • (2007) IEEE Trans. Signal Process , vol.55 , pp. 2593-2604
    • Muñoz-Medina, O.1    Vidal, J.2    Agustín, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.