메뉴 건너뛰기




Volumn 114, Issue 1, 2017, Pages 19-26

Wireless physical layer security

Author keywords

Information theory; Security; Wireless networks

Indexed keywords

ANTENNA (RADIO); CODING; CONFERENCE PAPER; HUMAN; INFORMATION PROCESSING; INFORMATION SCIENCE; PRIORITY JOURNAL; UNCERTAINTY; WIRELESS COMMUNICATION; WIRELESS PHYSICAL LAYER SECURITY; ARTICLE;

EID: 85008197093     PISSN: 00278424     EISSN: 10916490     Source Type: Journal    
DOI: 10.1073/pnas.1618130114     Document Type: Article
Times cited : (322)

References (57)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28: 656-715.
    • (1949) Bell Syst Tech J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54:1355-1387.
    • (1975) Bell Syst Tech J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 6
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • Vernam GS (1926) Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans Am Inst Electr Eng XLV:295-301.
    • (1926) Trans Am Inst Electr Eng , vol.45 , pp. 295-301
    • Vernam, G.S.1
  • 7
    • 5144231861 scopus 로고    scopus 로고
    • On the role of MMSE estimation in approaching the informationtheoretic limits of linear Gaussian channels: Shannon meets Wiener
    • IEEE, Piscataway, NJ
    • Forney GD, Jr (2003) On the role of MMSE estimation in approaching the informationtheoretic limits of linear Gaussian channels: Shannon meets Wiener. Proceedings of the 41st Allerton Conference on Communication, Control, and Computing (IEEE, Piscataway, NJ), pp 430-439.
    • (2003) Proceedings of the 41st Allerton Conference on Communication, Control, and Computing , pp. 430-439
    • Forney, G.D.1
  • 8
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • eds Blahut RE, Costello DJ, Maurer U, Mittelholzer T (Springer, Boston)
    • Maurer UM (1994) The strong secret key rate of discrete random triples. Communication and Cryptography - Two Sides of One Tapestry, eds Blahut RE, Costello DJ, Maurer U, Mittelholzer T (Springer, Boston), pp 271-285.
    • (1994) Communication and Cryptography - Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 9
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Csiszá r I (1996) Almost independence and secrecy capacity. Probl Peredachi Inf 32: 48-57.
    • (1996) Probl Peredachi Inf , vol.32 , pp. 48-57
    • Csiszá R, I.1
  • 10
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Lecture Notes in Computer Science, ed Preneel B (Springer, Berlin)
    • Maurer U, Wolf S (2000) Information-theoretic key agreement: From weak to strong secrecy for free. Proceedings of EUROCRYPT 2000 on Advances in Cryptography, Lecture Notes in Computer Science, ed Preneel B (Springer, Berlin), Vol 1807, pp 351-368.
    • (2000) Proceedings of EUROCRYPT 2000 on Advances in Cryptography , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 11
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Bloch MR, Laneman JN (2013) Strong secrecy from channel resolvability. IEEE Trans Inf Theory 59:8077-8098.
    • (2013) IEEE Trans Inf Theory , vol.59 , pp. 8077-8098
    • Bloch, M.R.1    Laneman, J.N.2
  • 12
    • 12444299059 scopus 로고    scopus 로고
    • The private classical capacity and quantum capacity of a quantum channel
    • Devetak I (2005) The private classical capacity and quantum capacity of a quantum channel. IEEE Trans Inf Theory 51:44-55.
    • (2005) IEEE Trans Inf Theory , vol.51 , pp. 44-55
    • Devetak, I.1
  • 13
    • 84908252542 scopus 로고    scopus 로고
    • Reliability and secrecy functions of the wiretap channel under cost constraint
    • Han TS, Endo H, Sasaki M (2014) Reliability and secrecy functions of the wiretap channel under cost constraint. IEEE Trans Inf Theory 60:6819-6843.
    • (2014) IEEE Trans Inf Theory , vol.60 , pp. 6819-6843
    • Han, T.S.1    Endo, H.2    Sasaki, M.3
  • 14
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
    • Hayashi M (2006) General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel. IEEE Trans Inf Theory 52:1562-1575.
    • (2006) IEEE Trans Inf Theory , vol.52 , pp. 1562-1575
    • Hayashi, M.1
  • 17
    • 84865447746 scopus 로고    scopus 로고
    • A cryptographic treatment of the wiretap channel
    • eds Safavi-Naini R, Canetti R (Springer, Berlin)
    • Bellaire M, Tessaro S, Vardy A (2012) A cryptographic treatment of the wiretap channel. Proceedings of Advances in Cryptology (CRYPTO), eds Safavi-Naini R, Canetti R (Springer, Berlin), pp 1-31.
    • (2012) Proceedings of Advances in Cryptology (CRYPTO) , pp. 1-31
    • Bellaire, M.1    Tessaro, S.2    Vardy, A.3
  • 18
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Csiszá r I, Kö rner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24:339-348.
    • (1978) IEEE Trans Inf Theory , vol.24 , pp. 339-348
    • Csiszá R, I.1    Kö Rner, J.2
  • 21
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel/Part II: The MIMOME wiretap channel
    • Khisti A, Wornell GW (2010) Secure transmission with multiple antennas I: The MISOME wiretap channel/Part II: The MIMOME wiretap channel. IEEE Trans Inf Theory 56:5515-5532.
    • (2010) IEEE Trans Inf Theory , vol.56 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 22
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57:4961-4972.
    • (2011) IEEE Trans Inf Theory , vol.57 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 23
    • 69249208566 scopus 로고    scopus 로고
    • An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
    • Bustin R, Liu R, Poor HV, Shamai(Shitz) S (2009) An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP J Wirel Commun Netw 2009:370970.
    • (2009) EURASIP J Wirel Commun Netw , vol.2009 , pp. 370970
    • Bustin, R.1    Liu, R.2    Poor, H.V.3    Shamai, S.4
  • 25
    • 84959570869 scopus 로고    scopus 로고
    • Secure communication under channel uncertainty and adversarial attacks
    • IEEE
    • Schaefer RF, Boche H, Poor HV (2015) Secure communication under channel uncertainty and adversarial attacks. Proc IEEE 103:1796-1813.
    • (2015) Proc , vol.103 , pp. 1796-1813
    • Schaefer, R.F.1    Boche, H.2    Poor, H.V.3
  • 27
    • 84959419251 scopus 로고    scopus 로고
    • The secrecy capacity of compound MIMO Gaussian channels
    • Schaefer RF, Loyka S (2015) The secrecy capacity of compound MIMO Gaussian channels. IEEE Trans Inf Theory 61:5535-5552.
    • (2015) IEEE Trans Inf Theory , vol.61 , pp. 5535-5552
    • Schaefer, R.F.1    Loyka, S.2
  • 28
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Liang Y, Poor HV, Shamai(Shitz) S (2008) Secure communication over fading channels. IEEE Trans Inf Theory 54:2470-2492.
    • (2008) IEEE Trans Inf Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 31
    • 84960154644 scopus 로고    scopus 로고
    • Broadcast networks with layered decoding and layered secrecy: Theory and applications
    • Zou S, Liang Y, Lai L, Poor HV, Shamai (Shitz) S (2015) Broadcast networks with layered decoding and layered secrecy: Theory and applications. Proc IEEE 10:1841-1856.
    • (2015) Proc IEEE , vol.10 , pp. 1841-1856
    • Zou, S.1    Liang, Y.2    Lai, L.3    Poor, H.V.4    Shamai, S.5
  • 32
    • 77958520866 scopus 로고    scopus 로고
    • Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
    • Ly HD, Liu T, Liang Y (2010) Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages. IEEE Trans Inf Theory 56:5477-5487.
    • (2010) IEEE Trans Inf Theory , vol.56 , pp. 5477-5487
    • Ly, H.D.1    Liu, T.2    Liang, Y.3
  • 33
    • 84907459082 scopus 로고    scopus 로고
    • Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance
    • Schaefer RF, Boche H (2014) Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance. IEEE Trans Inf Forensics Secur 9:1720-1732.
    • (2014) IEEE Trans Inf Forensics Secur , vol.9 , pp. 1720-1732
    • Schaefer, R.F.1    Boche, H.2
  • 34
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inf Theory 54:972-1002.
    • (2008) IEEE Trans Inf Theory , vol.54 , pp. 972-1002
    • Liang, Y.1    Poor, H.V.2
  • 36
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • Tekin E, Yener A (2008) The Gaussian multiple access wire-tap channel. IEEE Trans Inf Theory 54:5747-5755.
    • (2008) IEEE Trans Inf Theory , vol.54 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 38
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • Liu R, Maric I, Spasojevic P, Yates R (2008) Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Trans Inf Theory 54:2493-2507.
    • (2008) IEEE Trans Inf Theory , vol.54 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.4
  • 40
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • He X, Yener A (2010) Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans Inf Theory 56:3801-3827.
    • (2010) IEEE Trans Inf Theory , vol.56 , pp. 3801-3827
    • He, X.1    Yener, A.2
  • 42
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Lai L, El Gamal H (2008) The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans Inf Theory 54:4005-4019.
    • (2008) IEEE Trans Inf Theory , vol.54 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 45
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Ahlswede R, Csiszar I (1993) Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans Inf Theory 39:1121-1132.
    • (1993) IEEE Trans Inf Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csisz Ar, I.2
  • 46
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39:733-742.
    • (1993) IEEE Trans Inf Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 47
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Csiszar I, Narayan P (2000) Common randomness and secret key generation with a helper. IEEE Trans Inf Theory 46:344-366.
    • (2000) IEEE Trans Inf Theory , vol.46 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 48
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Wilson R, Tse D, Scholtz RA (2007) Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Trans Inf Forensics Secur 2:364-375.
    • (2007) IEEE Trans Inf Forensics Secur , vol.2 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 50
    • 84960154985 scopus 로고    scopus 로고
    • Error-control coding for physical-layer secrecy
    • IEEE
    • Bloch M,Hayashi M, Thangaraj A (2015) Error-control coding for physical-layer secrecy. Proc IEEE 103:1725-1746.
    • (2015) Proc , vol.103 , pp. 1725-1746
    • Bloch, M.1    Hayashi, M.2    Thangaraj, A.3
  • 52
    • 80051779980 scopus 로고    scopus 로고
    • Secure communications over wireless broadcast networks: Stability and utility maximization
    • Liang Y, Poor HV, Ying L (2011) Secure communications over wireless broadcast networks: Stability and utility maximization. IEEE Trans Inf Forensics Secur 6:682-692.
    • (2011) IEEE Trans Inf Forensics Secur , vol.6 , pp. 682-692
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 54
    • 84897525383 scopus 로고    scopus 로고
    • Rate-distortion-based physical layer secrecy in multimode fiber
    • Song EC, Soljanin E, Cuff P, Poor HV, Guan K (2014) Rate-distortion-based physical layer secrecy in multimode fiber. IEEE Trans Commun 62:1080-1090.
    • (2014) IEEE Trans Commun , vol.62 , pp. 1080-1090
    • Song, E.C.1    Soljanin, E.2    Cuff, P.3    Poor, H.V.4    Guan, K.5
  • 56
    • 79951830125 scopus 로고    scopus 로고
    • Privacy-security tradeoff in biometric security systems part I: Single uses case/part II: Multiple uses case
    • Lai L, Ho S-W, Poor HV (2011) Privacy-security tradeoff in biometric security systems part I: Single uses case/part II: Multiple uses case. IEEE Trans Inf Forensics Secur 1:122-151.
    • (2011) IEEE Trans Inf Forensics Secur , vol.1 , pp. 122-151
    • Lai, L.1    Ho, S.-W.2    Poor, H.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.