메뉴 건너뛰기




Volumn 11, Issue 3, 2017, Pages 393-399

Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation

Author keywords

[No Author keywords available]

Indexed keywords

BUDGET CONTROL; JAMMING; NETWORK LAYERS; RELAY CONTROL SYSTEMS;

EID: 85012083491     PISSN: 17518628     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-com.2016.0355     Document Type: Article
Times cited : (55)

References (32)
  • 1
    • 33646932650 scopus 로고    scopus 로고
    • A primer on crypography in communications
    • Kartalopoulos, S.V.: A primer on crypography in communications, IEEE Commun. Mag., 2006, 44, (4), pp. 146-151
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 146-151
    • Kartalopoulos, S.V.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A.D.: The wire-tap channel, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355-1387
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Dong, L., Han, Z., Petropulu, A.P., et al.: Improving wireless physical layer security via cooperating relays, IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875-1888
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3
  • 4
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Li, J., Petropulu, A.P., Weber, S.: On cooperative relaying schemes for wireless physical layer security, IEEE Trans. Signal Process., 2011, 59, (10), pp. 4985-4997
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 5
    • 84920830630 scopus 로고    scopus 로고
    • Secrecy transmission with a helper: to relay or to jam
    • Deng, H., Wang, H., Guo, W., et al.: Secrecy transmission with a helper: to relay or to jam, IEEE Trans. Inf. Forensics Sec., 2015, 10, (2), pp. 293-307
    • (2015) IEEE Trans. Inf. Forensics Sec. , vol.10 , Issue.2 , pp. 293-307
    • Deng, H.1    Wang, H.2    Guo, W.3
  • 6
    • 77957340850 scopus 로고    scopus 로고
    • Opportunistic relay selection for cooperative networks with secrecy constraints
    • Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints, IET Commun., 2010, 4, (15), pp. 1787-1791
    • (2010) IET Commun. , vol.4 , Issue.15 , pp. 1787-1791
    • Krikidis, I.1
  • 7
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical-layer security in cooperative wireless networks
    • Zou, Y.,Wang, X., Shen,W.: Optimal relay selection for physical-layer security in cooperative wireless networks, IEEE J. Sel. Areas Commun., 2013, 31, (10), pp. 2099-2111
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 8
    • 84921773816 scopus 로고    scopus 로고
    • Secure relay and jammer selection for physical layer security
    • Hui, H., Swindlehurst, A.L., Li, G., et al.: Secure relay and jammer selection for physical layer security, IEEE Signal Process. Lett., 2015, 22, (8), pp. 1147-1151
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.8 , pp. 1147-1151
    • Hui, H.1    Swindlehurst, A.L.2    Li, G.3
  • 9
    • 80052157752 scopus 로고    scopus 로고
    • Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
    • Dong, L., Yousefizadeh, H., Jafarkhani, H.: Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. Proc. IEEE ICC, Kyoto, Japan, 2011, pp. 1-5
    • (2011) Proc. IEEE ICC, Kyoto, Japan , pp. 1-5
    • Dong, L.1    Yousefizadeh, H.2    Jafarkhani, H.3
  • 10
    • 85027929481 scopus 로고    scopus 로고
    • Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting
    • Ding, Z., Leung, K.K., Goeckel, D.L., et al.: Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting, IEEE Trans. Wirel. Commun., 2011, 10, (6), pp. 1725-1729
    • (2011) IEEE Trans. Wirel. Commun. , vol.10 , Issue.6 , pp. 1725-1729
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3
  • 11
    • 84876796391 scopus 로고    scopus 로고
    • Destination assisted cooperative jamming for wireless physical-layer security
    • Liu, Y., Li, J., Petropulu, A.P.: Destination assisted cooperative jamming for wireless physical-layer security, IEEE Trans. Inf. Forensics Sec., 2013, 8, (4), pp. 682-694
    • (2013) IEEE Trans. Inf. Forensics Sec. , vol.8 , Issue.4 , pp. 682-694
    • Liu, Y.1    Li, J.2    Petropulu, A.P.3
  • 12
    • 84883380753 scopus 로고    scopus 로고
    • On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
    • Park, K.-H., Wang, T., Alouini, M.-S.: On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 1741-1750
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1741-1750
    • Park, K.-H.1    Wang, T.2    Alouini, M.-S.3
  • 13
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Wang, C., Wang, H.-M., Xia, X.-G.: Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Trans. Wirel. Commun., 2015, 14, (2), pp. 589-605
    • (2015) IEEE Trans. Wirel. Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 14
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI
    • Wang, H.-M., Luo, M., Xia, X.-G., et al.: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI, IEEE Signal Process. Lett., 2013, 20, (1), pp. 39-42
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3
  • 15
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid beamforming and jamming for physical-layer security of two-way relay networks
    • Wang, H.-M., Luo, M., Yin, Q.: Hybrid beamforming and jamming for physical-layer security of two-way relay networks, IEEE Trans. Inf. Forensics Sec., 2012, 8, (12), pp. 2007-2020
    • (2012) IEEE Trans. Inf. Forensics Sec. , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3
  • 16
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: a secrecy perspective
    • He, X., Yener, A.: Cooperation with an untrusted relay: a secrecy perspective, IEEE Trans. Inf. Theory, 2010, 56, (8), pp. 3807-3827
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 17
    • 84933057122 scopus 로고    scopus 로고
    • Opportunistic transmission of nongenerative network with untrusted relay
    • Ju, M., Kim, D.-H., Hwang, K.-S.: Opportunistic transmission of nongenerative network with untrusted relay, IEEE Trans. Veh. Technol., 2015, 64, (6), pp. 2703-2709
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.6 , pp. 2703-2709
    • Ju, M.1    Kim, D.-H.2    Hwang, K.-S.3
  • 18
    • 84891634602 scopus 로고    scopus 로고
    • Link adaption with untrusted relay assignment: design and performance analysis
    • Khodakarami, H., Lahouti, F.: Link adaption with untrusted relay assignment: design and performance analysis, IEEE Trans. Commun., 2013, 61, (12), pp. 4874-4883
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 4874-4883
    • Khodakarami, H.1    Lahouti, F.2
  • 19
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • Huang, J., Mukherjee, A., Swindlehurst, A.L.: Secure communication via an untrusted non-regenerative relay in fading channels, IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536-2550
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 20
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Sun, L., Zhang, T., Li, Y., et al.: Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801-3807
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3
  • 21
    • 84924902824 scopus 로고    scopus 로고
    • Security-aware relaying scheme for cooperative networks with untrusted relay nodes
    • Sun, L., Ren, P., Du, Q., et al.: Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett., 2015, 19, (3), pp. 463-466
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.3 , pp. 463-466
    • Sun, L.1    Ren, P.2    Du, Q.3
  • 22
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Wang, L., Elkashlan, M., Huang, J., et al.: Secure transmission with optimal power allocation in untrusted relay networks, IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289-292
    • (2014) IEEE Wirel. Commun. Lett. , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3
  • 23
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Wang, Q., Su, H., Ren, K., et al.: Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. Proc. INFCOM, Shanghai, China, 2011, pp. 1422-1430
    • (2011) Proc. INFCOM, Shanghai, China , pp. 1422-1430
    • Wang, Q.1    Su, H.2    Ren, K.3
  • 24
    • 84883100210 scopus 로고    scopus 로고
    • Fast secret key generation in static wireless networks: a virtual channel approach
    • Huang, P., Wang, X.: Fast secret key generation in static wireless networks: a virtual channel approach. Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2292-2300
    • (2013) Proc. IEEE INFOCOM, Turin, Italy , pp. 2292-2300
    • Huang, P.1    Wang, X.2
  • 25
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • Jana, S., Premnath, S., Clark, M., et al.: On the effectiveness of secret key extraction from wireless signal strength in real environments. Proc. ACM MOBICOM, Beijing, China, 2009, pp. 321-332
    • (2009) Proc. ACM MOBICOM, Beijing, China , pp. 321-332
    • Jana, S.1    Premnath, S.2    Clark, M.3
  • 26
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Zhang, R., Song, L., Han, Z., et al.: Physical layer security for two-way untrusted relaying with friendly jammers, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3693-3704
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3
  • 27
    • 34548074211 scopus 로고    scopus 로고
    • Improving amplify-and-forward relay networks: optimal power allocation versus selection
    • Zhao, Y., Adve, R., Lim, T.J.: Improving amplify-and-forward relay networks: optimal power allocation versus selection, IEEE Trans. Wirel. Commun., 2007, 6, (8), pp. 3114-3123
    • (2007) IEEE Trans. Wirel. Commun. , vol.6 , Issue.8 , pp. 3114-3123
    • Zhao, Y.1    Adve, R.2    Lim, T.J.3
  • 28
    • 28244477514 scopus 로고    scopus 로고
    • Power allocation for cooperative relaying in wireless networks
    • Deng, X., Haimovich, A.M.: Power allocation for cooperative relaying in wireless networks, IEEE Commun. Lett., 2005, 9, (11), pp. 994-996
    • (2005) IEEE Commun. Lett. , vol.9 , Issue.11 , pp. 994-996
    • Deng, X.1    Haimovich, A.M.2
  • 29
    • 84982305842 scopus 로고    scopus 로고
    • Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
    • WangL., Cai, Y., Zou, Y., et al.: Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays, IEEE Trans. Veh. Technol., 2016, 65, (8), pp. 6259-6274
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.8 , pp. 6259-6274
    • Wang, L.1    Cai, Y.2    Zou, Y.3
  • 30
    • 0003498504 scopus 로고    scopus 로고
    • Table of integrals, series, and products
    • 7th edn, (Academic, San Diego
    • Gradshteyn, I.S., Ryzhik, I.M.: Table of integrals, series, and products (Academic, San Diego, 2007, 7th edn.)
    • (2007)
    • Gradshteyn, I.S.1    Ryzhik, I.M.2
  • 31
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: efficient protocols and outage behavior
    • Laneman, J.N., Tse, D.N.C., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behavior, IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 3062-3080
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 32
    • 0842267629 scopus 로고    scopus 로고
    • Limiting analysis of outage probabilities for diversity schemes in fading channels
    • Laneman, J.N.: Limiting analysis of outage probabilities for diversity schemes in fading channels. Proc. IEEE GLOBECOM, San Francisco, CA, 2003, pp. 1242-1246
    • (2003) Proc. IEEE GLOBECOM, San Francisco, CA , pp. 1242-1246
    • Laneman, J.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.