메뉴 건너뛰기




Volumn 15, Issue 10, 2016, Pages 6913-6924

On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels

Author keywords

Physical layer security; quasi static fading channel; secrecy outage probability; secure transmission design

Indexed keywords

DECODING; NETWORK LAYERS; PROBABILITY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84994516293     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2016.2593445     Document Type: Article
Times cited : (65)

References (33)
  • 1
    • 84949923063 scopus 로고    scopus 로고
    • New physical layer security measures for wireless transmissions over fading channels
    • Dec.
    • B. He and X. Zhou, "New physical layer security measures for wireless transmissions over fading channels," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 722-727.
    • (2014) Proc. IEEE GLOBECOM , pp. 722-727
    • He, B.1    Zhou, X.2
  • 4
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Labs Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 5
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 6
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 9
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai Shitz, S.3
  • 10
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 12
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjørungnes, A.4
  • 13
    • 84924410728 scopus 로고    scopus 로고
    • Wireless physical layer security with imperfect channel state information: A survey
    • Sep.
    • B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Commun., vol. 11, no. 3, pp. 11-19, Sep. 2013.
    • (2013) ZTE Commun. , vol.11 , Issue.3 , pp. 11-19
    • He, B.1    Zhou, X.2    Abhayapala, T.D.3
  • 14
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 15
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • Jan.
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 16
    • 84888090785 scopus 로고    scopus 로고
    • Secure on-off transmission design with channel estimation errors
    • Dec.
    • B. He and X. Zhou, "Secure on-off transmission design with channel estimation errors," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1923-1936, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1923-1936
    • He, B.1    Zhou, X.2
  • 17
    • 84863152970 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure decode-and-forward two-way relay communications
    • Dec.
    • J. Chen, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure decode-and-forward two-way relay communications," in Proc. IEEE GLOBECOM, Dec. 2011, pp. 1-5.
    • (2011) Proc. IEEE GLOBECOM , pp. 1-5
    • Chen, J.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 18
    • 84988273338 scopus 로고    scopus 로고
    • Secure communication via jamming in massive MIMO rician channels
    • Dec.
    • J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, "Secure communication via jamming in massive MIMO Rician channels," in Proc. IEEE GLOBECOM Workshops, Dec. 2014, pp. 340-345.
    • (2014) Proc. IEEE GLOBECOM Workshops , pp. 340-345
    • Wang, J.1    Lee, J.2    Wang, F.3    Quek, T.Q.S.4
  • 19
    • 84883307797 scopus 로고    scopus 로고
    • An error probability approach to MIMO wiretap channels
    • Aug.
    • J.-C. Belfiore and F. Oggier, "An error probability approach to MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 8, pp. 3396-3403, Aug. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.8 , pp. 3396-3403
    • Belfiore, J.-C.1    Oggier, F.2
  • 20
    • 84947798997 scopus 로고    scopus 로고
    • Probability estimates for fading and wiretap channels from ideal class zeta functions
    • Nov.
    • D. Karpuk, A.-M. Ernvall-Hytönen, C. Hollanti, and E. Viterbo, "Probability estimates for fading and wiretap channels from ideal class zeta functions," Adv. Math. Commun., vol. 9, no. 4, pp. 391-413, Nov. 2015.
    • (2015) Adv. Math. Commun. , vol.9 , Issue.4 , pp. 391-413
    • Karpuk, D.1    Ernvall-Hytönen, A.-M.2    Hollanti, C.3    Viterbo, E.4
  • 21
    • 78651284967 scopus 로고    scopus 로고
    • Secrecy gain: A wiretap lattice code design
    • Oct.
    • J.-C. Belfiore and F. Oggier, "Secrecy gain: A wiretap lattice code design," in Proc. ISITA, Oct. 2010, pp. 174-178.
    • (2010) Proc. ISITA , pp. 174-178
    • Belfiore, J.-C.1    Oggier, F.2
  • 22
    • 84947814848 scopus 로고    scopus 로고
    • Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
    • Jun.
    • M. Baldi, G. Ricciutelli, N. Maturo, and F. Chiaraluce, "Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel," in Proc. IEEE ICC Workshops, Jun. 2015, pp. 435-440.
    • (2015) Proc. IEEE ICC Workshops , pp. 435-440
    • Baldi, M.1    Ricciutelli, G.2    Maturo, N.3    Chiaraluce, F.4
  • 24
    • 84861172829 scopus 로고    scopus 로고
    • Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis
    • Jun.
    • M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 883-894
    • Baldi, M.1    Bianchi, M.2    Chiaraluce, F.3
  • 25
    • 84863928823 scopus 로고    scopus 로고
    • Scalable PHY-layer security for distributed detection in wireless sensor networks
    • Aug.
    • R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1118-1126
    • Soosahabi, R.1    Naraghi-Pour, M.2
  • 26
    • 84944235523 scopus 로고    scopus 로고
    • Rethinking the intercept probability of random linear network coding
    • Oct.
    • A. S. Khan, A. Tassi, and I. Chatzigeorgiou, "Rethinking the intercept probability of random linear network coding," IEEE Commun. Lett., vol. 19, no. 10, pp. 1762-1765, Oct. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.10 , pp. 1762-1765
    • Khan, A.S.1    Tassi, A.2    Chatzigeorgiou, I.3
  • 27
    • 84899636821 scopus 로고    scopus 로고
    • Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
    • May
    • J. E. Barcelo-Llado, A. Morell, and G. Seco-Granados, "Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, May 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.5 , pp. 839-850
    • Barcelo-Llado, J.E.1    Morell, A.2    Seco-Granados, G.3
  • 29
    • 0028273691 scopus 로고
    • Relations between entropy and error probability
    • Jan.
    • M. Feder and N. Merhav, "Relations between entropy and error probability," IEEE Trans. Inf. Theory, vol. 40, no. 1, pp. 259-266, Jan. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.1 , pp. 259-266
    • Feder, M.1    Merhav, N.2
  • 30
    • 84863393230 scopus 로고    scopus 로고
    • LDPC code design for the BPSK-constrained Gaussian wiretap channel
    • Dec.
    • C. W. Wong, T. F. Wong, and J. M. Shea, "LDPC code design for the BPSK-constrained Gaussian wiretap channel," in Proc. IEEE GLOBECOM Workshops, Dec. 2011, pp. 898-902.
    • (2011) Proc. IEEE GLOBECOM Workshops , pp. 898-902
    • Wong, C.W.1    Wong, T.F.2    Shea, J.M.3
  • 31
    • 80051774472 scopus 로고    scopus 로고
    • Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel
    • Sep.
    • C. W. Wong, T. F. Wong, and J. M. Shea, "Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 551-564, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 551-564
    • Wong, C.W.1    Wong, T.F.2    Shea, J.M.3
  • 32
    • 84907528055 scopus 로고    scopus 로고
    • Secrecy transmission on parallel channels: Theoretical limits and performance of practical codes
    • Nov.
    • M. Baldi, F. Chiaraluce, N. Laurenti, S. Tomasin, and F. Renna, "Secrecy transmission on parallel channels: Theoretical limits and performance of practical codes," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1765-1779, Nov. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.11 , pp. 1765-1779
    • Baldi, M.1    Chiaraluce, F.2    Laurenti, N.3    Tomasin, S.4    Renna, F.5
  • 33
    • 84968496713 scopus 로고
    • Sequential minimax search for a maximum
    • J. Kiefer, "Sequential minimax search for a maximum," Proc. Amer. Math. Soc., vol. 4, no. 3, pp. 502-506, 1953.
    • (1953) Proc. Amer. Math. Soc. , vol.4 , Issue.3 , pp. 502-506
    • Kiefer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.