메뉴 건너뛰기




Volumn 14, Issue 4, 2012, Pages 364-373

Combined Relay Selection and Cooperative Beamforming for Physical Layer Security

Author keywords

Cooperative beamforming; optimal beamforming; physical layer security; relay selection

Indexed keywords


EID: 85008538314     PISSN: 12292370     EISSN: None     Source Type: Journal    
DOI: 10.1109/JCN.2012.6292243     Document Type: Article
Times cited : (57)

References (16)
  • 2
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, “Communication theory of secrecy systems,” Bell Syst. Technical J., vol. 28, no. 4, pp. 656–715, 1949.
    • (1949) Bell Syst. Technical J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 3
    • 0016562514 scopus 로고
    • Wire-tap channel
    • A. Wyner, “Wire-tap channel,” Bell Syst. Technical J., vol. 54, no. 8, pp. 1355–1387, 1975.
    • (1975) Bell Syst. Technical J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 4
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept.
    • L. Lai and H. E. Gamal, “The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005–4019, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 5
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–2010, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-2010
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 6
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L. -C. Choo, and K. -K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 7
    • 77953707901 scopus 로고    scopus 로고
    • Relay beamforming strategies for physical-layer security
    • Mar.
    • J. Zhang and M. Gursoy, “Relay beamforming strategies for physical-layer security,” in Proc. CISS, Mar. 2010, pp. 1–6.
    • (2010) Proc. CISS , pp. 1-6
    • Zhang, J.1    Gursoy, M.2
  • 8
    • 79551634548 scopus 로고    scopus 로고
    • Physical layer security for two way relay communications with friendly jammers
    • Dec.
    • R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, “Physical layer security for two way relay communications with friendly jammers,” in Proc. IEEE GLOBECOM, Dec. 2010.
    • (2010) Proc. IEEE GLOBECOM
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4    Debbah, M.5
  • 9
    • 78751552574 scopus 로고    scopus 로고
    • On the zero forcing optimality for friendly jamming in MISO wiretap channels
    • June
    • A. Wolf and E. A. Jorswieck, “On the zero forcing optimality for friendly jamming in MISO wiretap channels,” in Proc. IEEE SPAWC, June 2010, p. 1.
    • (2010) Proc. IEEE SPAWC , pp. 1
    • Wolf, A.1    Jorswieck, E.A.2
  • 10
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 11
    • 77957340850 scopus 로고    scopus 로고
    • Opportunistic relay selection for cooperative networks with secrecy constraints
    • Oct.
    • I. Krikidis, “Opportunistic relay selection for cooperative networks with secrecy constraints,” IET Commun., vol. 4, no. 15, pp. 1787–1791, Oct. 2010.
    • (2010) IET Commun. , vol.4 , Issue.15 , pp. 1787-1791
    • Krikidis, I.1
  • 12
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.S.2    McLaughlin, S.3
  • 14
    • 0004236492 scopus 로고    scopus 로고
    • 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press
    • G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
    • (1996) Matrix Computations
    • Golub, G.H.1    Loan, C.F.V.2
  • 15
    • 84865003969 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project Std. 3GPP TS 25. 214 V10. 1. 0, December
    • Physical layer procedures (FDD), 3rd Generation Partnership Project Std. 3GPP TS 25. 214 V10. 1. 0, December 2010.
    • (2010) Physical layer procedures (FDD)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.