메뉴 건너뛰기




Volumn 66, Issue 2, 2017, Pages 1144-1158

Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications with Social Interaction Constraints

Author keywords

Cooperative jamming; Physical layer security; Power allocation; Secrecy rate

Indexed keywords

CHANNEL STATE INFORMATION; COMPLEX NETWORKS; ELECTRIC POWER TRANSMISSION; JAMMING; NETWORK LAYERS; NETWORK SECURITY; ONE DIMENSIONAL; OPTIMIZATION;

EID: 85013074924     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2016.2553121     Document Type: Article
Times cited : (60)

References (36)
  • 2
    • 84906079345 scopus 로고    scopus 로고
    • Living on the edge: The role of proactive caching in 5G wireless networks
    • Aug.
    • E. Bastug, M. Bennis, M. Debbah, "Living on the edge: The role of proactive caching in 5G wireless networks, " IEEE Commun. Mag., vol. 52, no. 8, pp. 82-89, Aug. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.8 , pp. 82-89
    • Bastug, E.1    Bennis, M.2    Debbah, M.3
  • 3
    • 84979799702 scopus 로고    scopus 로고
    • Wireless distributed storage in socially enabled D2D communications
    • Mar.
    • L. Wang, H. Wu, Z. Han, "Wireless distributed storage in socially enabled D2D communications, " IEEE Access, doi: 10. 1109/ACCESS. 2016. 2546685, Mar. 2016.
    • (2016) IEEE Access
    • Wang, L.1    Wu, H.2    Han, Z.3
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 84953708676 scopus 로고    scopus 로고
    • Secrecy-oriented partner selection based on social trust in device-to-device communications
    • Jun. 8-12
    • L. Wang, H. Wu, L. Liu, M. Song, Y. Cheng, "Secrecy-oriented partner selection based on social trust in device-to-device communications, " in Proc. IEEE ICC, London, U. K., Jun. 8-12, 2015, pp. 7275-7279.
    • (2015) Proc. IEEE ICC, London, U. K. , pp. 7275-7279
    • Wang, L.1    Wu, H.2    Liu, L.3    Song, M.4    Cheng, Y.5
  • 6
    • 84948434446 scopus 로고    scopus 로고
    • Exploiting social ties for cooperative D2D communications: A mobile social networking case
    • Oct.
    • X. Chen, B. Proulx, X. Gong, J. Zhang, "Exploiting social ties for cooperative D2D communications: A mobile social networking case, " IEEE/ACM Trans. Netw., vol. 23, no. 5, pp. 1471-1484, Oct. 2015.
    • (2015) IEEE/ACM Trans. Netw. , vol.23 , Issue.5 , pp. 1471-1484
    • Chen, X.1    Proulx, B.2    Gong, X.3    Zhang, J.4
  • 7
    • 84871643875 scopus 로고    scopus 로고
    • On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input
    • Dec.
    • S. Bashar, Z. Ding, C. Xiao, "On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input, " IEEE Trans. Commun., vol. 60, no. 12, pp. 3816-3825, Dec. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.12 , pp. 3816-3825
    • Bashar, S.1    Ding, Z.2    Xiao, C.3
  • 8
    • 84939522682 scopus 로고    scopus 로고
    • Secrecy enhancement analysis against unknown eavesdroppering in spatial modulation
    • Aug.
    • L. Wang, S. Bashar, Y. Wei, R. Li, "Secrecy enhancement analysis against unknown eavesdroppering in spatial modulation, " IEEE Commun. Lett., vol. 19, no. 8, pp. 1351-1354, Aug. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.8 , pp. 1351-1354
    • Wang, L.1    Bashar, S.2    Wei, Y.3    Li, R.4
  • 9
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Nov.
    • J. Yue, C. Ma, H. Yu, W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks, " IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 10
    • 84930508485 scopus 로고    scopus 로고
    • Advances on security threats and countermeasures for cognitive radio networks: A survey
    • 2nd Quart.
    • R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: A survey, " IEEE Commun. Surveys Tut., vol. 17, no. 2, pp. 1023-1043, 2nd Quart. 2015.
    • (2015) IEEE Commun. Surveys Tut. , vol.17 , Issue.2 , pp. 1023-1043
    • Sharma, R.K.1    Rawat, D.B.2
  • 11
    • 84929359010 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
    • May
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, S. Y. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer, " IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.5 , pp. 1833-1847
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.Y.5
  • 12
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers, " IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 13
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • 3rd Quart
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, 3rd Quart. 2014.
    • (2014) IEEE Commun. Surveys Tut. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 14
    • 84933048120 scopus 로고    scopus 로고
    • The challenges facing physical layer security
    • Jun.
    • W. Trappe, "The challenges facing physical layer security, " IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 16-20
    • Trappe, W.1
  • 15
    • 84942279827 scopus 로고    scopus 로고
    • Device-to-Device link admission policy based on social interaction information
    • Sep.
    • L. Wang, H. Tang, M. ? Cierny, "Device-to-Device link admission policy based on social interaction information, " IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4180-4186, Sep. 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.9 , pp. 4180-4186
    • Wang, L.1    Tang, H.2    Cierny, M.3
  • 16
    • 84893284854 scopus 로고    scopus 로고
    • Social network enhance device-to-device communication underlaying cellular networks
    • Aug.
    • Y. Zhang, et al., "Social network enhance device-to-device communication underlaying cellular networks, " in Proc. IEEE/CIC Int. Conf. Commun. China, Xi an, China, Aug. 2013, pp. 182-186.
    • (2013) Proc. IEEE/CIC Int. Conf. Commun. China, Xi An, China , pp. 182-186
    • Zhang, Y.1
  • 17
    • 85008538314 scopus 로고    scopus 로고
    • Combined relay selection and cooperative beamforming for physical layer security
    • Aug.
    • J. Kim, A. Ikhlef, R. Schober, "Combined relay selection and cooperative beamforming for physical layer security, " J. Commun. Netw., vol. 14, no. 4, pp. 364-373, Aug. 2012.
    • (2012) J. Commun. Netw. , vol.14 , Issue.4 , pp. 364-373
    • Kim, J.1    Ikhlef, A.2    Schober, R.3
  • 18
    • 84883029780 scopus 로고    scopus 로고
    • Social trust and social reciprocity Based Cooperative D2D Communications
    • Aug.
    • X. Chen, B. Proulx, X. Gong, J. Zhang, "Social trust and social reciprocity Based Cooperative D2D Communications, " in Proc. ACM Int. Symp. MobiHoc, Aug. 2013, pp. 187-196.
    • (2013) Proc. ACM Int. Symp. MobiHoc , pp. 187-196
    • Chen, X.1    Proulx, B.2    Gong, X.3    Zhang, J.4
  • 21
    • 77649274105 scopus 로고    scopus 로고
    • Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks
    • Apr.
    • A. K. Sadek, Z. Han, K. J. R. Liu, "Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks, " IEEE Trans. Mobile Comput., vol. 9, no. 4, pp. 505-515, Apr. 2010.
    • (2010) IEEE Trans. Mobile Comput. , vol.9 , Issue.4 , pp. 505-515
    • Sadek, A.K.1    Han, Z.2    Liu, K.J.R.3
  • 22
    • 0038444540 scopus 로고    scopus 로고
    • Optimal transmitter eigen-beamforming and space-time block coding based on channel correlations
    • Jul.
    • S. Zhou and G. B. Giannakis, "Optimal transmitter eigen-beamforming and space-time block coding based on channel correlations, " IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1673-1690, Jul. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.7 , pp. 1673-1690
    • Zhou, S.1    Giannakis, G.B.2
  • 24
    • 84944189169 scopus 로고    scopus 로고
    • Socially enabled wireless networks: Resource allocation via bipartite graph matching
    • Oct.
    • L. Wang, H. Wu, W. Wang, K. C. Chen, "Socially enabled wireless networks: Resource allocation via bipartite graph matching, " IEEE Commun. Mag., vol. 53, no. 10, pp. 128-135, Oct. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.10 , pp. 128-135
    • Wang, L.1    Wu, H.2    Wang, W.3    Chen, K.C.4
  • 25
    • 84949642579 scopus 로고    scopus 로고
    • Jamming partner selection for maximising the worst D2D secrecy rate based on social trust
    • L. Wang and H. Wu, "Jamming partner selection for maximising the worst D2D secrecy rate based on social trust, " Trans. Emerging Telecommun. Technol. [Online]. Available: 10. 1002/ett. 2992
    • Trans. Emerging Telecommun. Technol
    • Wang, L.1    Wu, H.2
  • 26
    • 84972487889 scopus 로고
    • Simulated annealing
    • D. Bertsimas and J. Tsitsiklis, "Simulated annealing, " Statist. Sci., vol. 8, no. 1, pp. 10-15, 1993.
    • (1993) Statist. Sci. , vol.8 , Issue.1 , pp. 10-15
    • Bertsimas, D.1    Tsitsiklis, J.2
  • 28
    • 84953723092 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for D2D communications in cellular networks
    • doi: TVT.2015.2482388, Sep.
    • T. D. Hoang, L. B. Le, T. Le-Ngoc, "Energy-efficient resource allocation for D2D communications in cellular networks, " IEEE Trans. Veh. Technol., doi: TVT. 2015. 2482388, Sep. 2015.
    • (2015) IEEE Trans. Veh. Technol.
    • Hoang, T.D.1    Le, L.B.2    Le-Ngoc, T.3
  • 29
    • 84355161968 scopus 로고    scopus 로고
    • Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks
    • Dec.
    • H. Min, J. Lee, S. Park, D. Hong, "Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks, " IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995-4000, Dec. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.12 , pp. 3995-4000
    • Min, H.1    Lee, J.2    Park, S.3    Hong, D.4
  • 31
    • 0001204054 scopus 로고    scopus 로고
    • A new algorithm for generalized fractional programs
    • Feb.
    • A. I. Barros, J. B. G. Frenk, S. Schaible, S. Zhang, "A new algorithm for generalized fractional programs, " Math. Program., vol. 72, no. 2, pp. 147-175, Feb. 1996.
    • (1996) Math. Program. , vol.72 , Issue.2 , pp. 147-175
    • Barros, A.I.1    Frenk, J.B.G.2    Schaible, S.3    Zhang, S.4
  • 32
    • 33750045684 scopus 로고    scopus 로고
    • Extensions of Dinkelbach's algorithm for solving nonlinear fractional programming problems
    • Jun.
    • R. G. Ródenas, M. L. López, D. Verastegui, "Extensions of Dinkelbach's algorithm for solving nonlinear fractional programming problems, " Top, vol. 7, no. 1, pp. 33-70, Jun. 1999.
    • (1999) Top , vol.7 , Issue.1 , pp. 33-70
    • Ródenas, R.G.1    López, M.L.2    Verastegui, D.3
  • 33
    • 0032593386 scopus 로고    scopus 로고
    • Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques
    • Jul.
    • M.-S. Alouini and A. J. Goldsmith, "Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques, " IEEE Trans. Veh. Technol., vol. 48, no. 4, pp. 1165-1181, Jul. 1999.
    • (1999) IEEE Trans. Veh. Technol. , vol.48 , Issue.4 , pp. 1165-1181
    • Alouini, M.-S.1    Goldsmith, A.J.2
  • 34
    • 0014535847 scopus 로고
    • A table of integrals of the exponential integral
    • Jul.-Sep.
    • M. Geller and E. W. Ng, "A table of integrals of the exponential integral, " J. Res. Nat. Bureau Standards B, Math. Math. Sci., vol. 73B, no. 3, pp. 191-210, Jul.-Sep. 1969.
    • (1969) J. Res. Nat. Bureau Standards B, Math. Math. Sci. , vol.73 B , Issue.3 , pp. 191-210
    • Geller, M.1    Ng, E.W.2
  • 35
    • 84883385828 scopus 로고    scopus 로고
    • Privacy-preserving profile matching for proximity-based mobile social networking
    • Sep.
    • R. Zhang, J. Zhang, Y. Zhang, J. Sun, G. Yan, "Privacy-preserving profile matching for proximity-based mobile social networking, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 656-668, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 656-668
    • Zhang, R.1    Zhang, J.2    Zhang, Y.3    Sun, J.4    Yan, G.5
  • 36
    • 84866513570 scopus 로고    scopus 로고
    • Morality-driven data forwarding with privacy preservation in mobile social networks
    • Sep.
    • X. Liang, et al., "Morality-driven data forwarding with privacy preservation in mobile social networks, " IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3209-3222, Sep. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.7 , pp. 3209-3222
    • Liang, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.