메뉴 건너뛰기




Volumn 19, Issue 1, 2017, Pages 347-376

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Author keywords

authentication; key generation; multi antenna systems; Physical layer security; relay; wiretap channel

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; NETWORK LAYERS; NEXT GENERATION NETWORKS; SIGNAL PROCESSING; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85014101616     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2016.2598968     Document Type: Article
Times cited : (634)

References (224)
  • 1
    • 0001254670 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (blowfish)
    • Cambridge, U.K., Dec.
    • B. Schneier, "Description of a new variable-length key, 64-bit block cipher (blowfish)," in Proc. Fast Softw. Encryption Cambridge Security Workshop, Cambridge, U.K., Dec. 1993, pp. 191-204.
    • (1993) Proc. Fast Softw. Encryption Cambridge Security Workshop , pp. 191-204
    • Schneier, B.1
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 5
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.23 , Issue.3 , pp. 387-390
    • Carleial, A.1    Hellman, M.2
  • 6
    • 0024666944 scopus 로고
    • Coding theorem for secret sharing communication systems with two noisy channels
    • May
    • H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inf. Theory, vol. 35, no. 3, pp. 572-578, May 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.3 , pp. 572-578
    • Yamamoto, H.1
  • 7
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 8
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • Mar.
    • M. V. Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.2 , pp. 712-714
    • Dijk, M.V.1
  • 9
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 10
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • Jul.
    • S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Leung-Yan-Cheong, S.1    Hellman, M.2
  • 11
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • Seattle, WA, USA, Jul.
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA, Jul. 2006, pp. 356-360.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 356-360
    • Barros, J.1    Rodrigues, M.R.D.2
  • 12
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 13
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 14
    • 51649109883 scopus 로고    scopus 로고
    • On the secrecy capacity of fading wireless channel with multiple eavesdroppers
    • Nice, France, Jun.
    • P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 1301-1305.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 1301-1305
    • Wang, P.1    Yu, G.2    Zhang, Z.3
  • 15
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 16
    • 79952822109 scopus 로고    scopus 로고
    • Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
    • Apr.
    • H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1975-1983, Apr. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 1975-1983
    • Jeon, H.1    Kim, N.2    Choi, J.3    Lee, H.4    Ha, J.5
  • 17
    • 77953857917 scopus 로고    scopus 로고
    • Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers
    • Pacific Grove, CA, USA, Nov.
    • M. Z. I. Sarkar, T. Ratnarajah, and M. Sellathurai, "Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers," in Proc. Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2009, pp. 829-833.
    • (2009) Proc. Conf. Signals Syst. Comput. , pp. 829-833
    • Sarkar, M.Z.I.1    Ratnarajah, T.2    Sellathurai, M.3
  • 18
    • 84893305820 scopus 로고    scopus 로고
    • On ergodic secrecy capacity of fast fading MIMOME wiretap channel with statistical CSIT
    • Kaohsiung, Taiwan, Oct.
    • S.-C. Lin, "On ergodic secrecy capacity of fast fading MIMOME wiretap channel with statistical CSIT," in Proc. Asia Pac. Conf. Signal Inf. Process. Assoc., Kaohsiung, Taiwan, Oct. 2013, pp. 1-4.
    • (2013) Proc. Asia Pac. Conf. Signal Inf. Process. Assoc. , pp. 1-4
    • Lin, S.-C.1
  • 19
    • 84908291362 scopus 로고    scopus 로고
    • On the secrecy capacity of the wiretap channel with imperfect main channel estimation
    • Oct.
    • Z. Rezki, A. Khisti, and M.-S. Alouini, "On the secrecy capacity of the wiretap channel with imperfect main channel estimation," IEEE Trans. Commun., vol. 62, no. 10, pp. 3652-3664, Oct. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.10 , pp. 3652-3664
    • Rezki, Z.1    Khisti, A.2    Alouini, M.-S.3
  • 20
    • 84906766299 scopus 로고    scopus 로고
    • Secure communication in frequency selective channels with fade-avoiding subchannel usage
    • Sydney, NSW, Australia, Jun.
    • E. Güvenkaya and H. Arslan, "Secure communication in frequency selective channels with fade-avoiding subchannel usage," in Proc. IEEE ICC, Sydney, NSW, Australia, Jun. 2014, pp. 813-818.
    • (2014) Proc. IEEE ICC , pp. 813-818
    • Güvenkaya, E.1    Arslan, H.2
  • 21
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide, SA, Australia, Sep.
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, SA, Australia, Sep. 2005, pp. 2152-2155.
    • (2005) Proc. IEEE Int. Symp. Inf. Theory , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 22
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb.
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5
  • 23
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multiantenna transmission
    • Baltimore, MD, USA, Mar.
    • Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. 41st Annu. Conf. Inf. Sci. Syst., Baltimore, MD, USA, Mar. 2007, pp. 905-910.
    • (2007) Proc. 41st Annu. Conf. Inf. Sci. Syst. , pp. 905-910
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 24
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Nice, France, Jun.
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 25
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 26
    • 77953222550 scopus 로고    scopus 로고
    • On the relationship between the multi-antenna secrecy communications and cognitive radio communications
    • Jun.
    • L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun., vol. 58, no. 6, pp. 1877-1886, Jun. 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.6 , pp. 1877-1886
    • Zhang, L.1    Zhang, R.2    Liang, Y.-C.3    Xin, Y.4    Cui, S.5
  • 27
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug.
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 28
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.O.1
  • 29
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sep.
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 30
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 31
    • 77955721830 scopus 로고    scopus 로고
    • Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
    • Sep.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4215-4227
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 33
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 34
    • 80051719720 scopus 로고    scopus 로고
    • MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design
    • Sep.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 640-649
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 35
    • 84867563712 scopus 로고    scopus 로고
    • Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel
    • Cambridge, MA, USA, Jul.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 2321-2325.
    • (2012) Proc. IEEE Int. Symp. Inf. Theory , pp. 2321-2325
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 36
    • 84857202295 scopus 로고    scopus 로고
    • Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages
    • Houston, TX, USA, Dec.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages," in Proc. IEEE GLOBECOM, Houston, TX, USA, Dec. 2011, pp. 1-5.
    • (2011) Proc. IEEE GLOBECOM , pp. 1-5
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 37
    • 65449150244 scopus 로고    scopus 로고
    • Zero-forcing precoding and generalized inverses
    • Sep.
    • A. Wiesel, Y. C. Eldar, and S. Shamai, "Zero-forcing precoding and generalized inverses," IEEE Trans. Signal Process., vol. 56, no. 9, pp. 4409-4418, Sep. 2008.
    • (2008) IEEE Trans. Signal Process. , vol.56 , Issue.9 , pp. 4409-4418
    • Wiesel, A.1    Eldar, Y.C.2    Shamai, S.3
  • 38
    • 84880560795 scopus 로고    scopus 로고
    • Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
    • Aug.
    • H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.15 , pp. 3799-3814
    • Reboredo, H.1    Xavier, J.2    Rodrigues, M.R.D.3
  • 39
    • 84870563576 scopus 로고    scopus 로고
    • Secrecy sumrates for multi-user MIMO regularized channel inversion precoding
    • Nov.
    • G. Geraci, M. Egan, J. Yuan, A. Razi, and I. B. Collings, "Secrecy sumrates for multi-user MIMO regularized channel inversion precoding," IEEE Trans. Commun., vol. 60, no. 11, pp. 3472-3482, Nov. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.11 , pp. 3472-3482
    • Geraci, G.1    Egan, M.2    Yuan, J.3    Razi, A.4    Collings, I.B.5
  • 40
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr.
    • S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.A.3
  • 41
    • 84861601547 scopus 로고    scopus 로고
    • STROBE: Actively securing wireless communications using zero-forcing beamforming
    • Orlando, FL, USA, Mar.
    • N. Anand, S.-J. Lee, and E. W. Knightly, "STROBE: Actively securing wireless communications using zero-forcing beamforming," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 720-728.
    • (2012) Proc. IEEE INFOCOM , pp. 720-728
    • Anand, N.1    Lee, S.-J.2    Knightly, E.W.3
  • 42
    • 85180623047 scopus 로고    scopus 로고
    • Practical known-plaintext attacks against physical layer security in wireless MIMO systems
    • San Diego, CA, USA, [Online]
    • M. Schulz, A. Loch, and M. Hollick, "Practical known-plaintext attacks against physical layer security in wireless MIMO systems," in Proc. Symp. NDSS, San Diego, CA, USA, 2014, p. 13. [Online]. Available: http://www.internetsociety.org/doc/ practical-known-plaintext-attacks-against-physical-layer-securitywireless-mimo-systems
    • (2014) Proc. Symp. NDSS , pp. 13
    • Schulz, M.1    Loch, A.2    Hollick, M.3
  • 43
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas, TX, USA, Sep.
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. 62nd IEEE Conf. Veh. Tech., vol. 3. Dallas, TX, USA, Sep. 2005, pp. 1906-1910.
    • (2005) Proc. 62nd IEEE Conf. Veh. Tech. , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 44
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 45
    • 84857366666 scopus 로고    scopus 로고
    • Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
    • Feb.
    • M. Pei, J. Wei, K.-K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.2 , pp. 544-549
    • Pei, M.1    Wei, J.2    Wong, K.-K.3    Wang, X.4
  • 46
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr.
    • J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1696-1707
    • Huang, J.1    Swindlehurst, A.L.2
  • 47
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
    • Mar.
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 48
    • 84883395356 scopus 로고    scopus 로고
    • Transmit solutions for MIMO wiretap channels using alternating optimization
    • Sep.
    • Q. Li et al., "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 4, pp. 1714-1727, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.4 , pp. 1714-1727
    • Li, Q.1
  • 49
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct.
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 50
    • 84933053985 scopus 로고    scopus 로고
    • Artificial noise revisited
    • Jul.
    • S. Liu, Y. Hong, and E. Viterbo, "Artificial noise revisited," IEEE Trans. Inf. Theory, vol. 61, no. 7, pp. 3901-3911, Jul. 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.7 , pp. 3901-3911
    • Liu, S.1    Hong, Y.2    Viterbo, E.3
  • 51
    • 79952985755 scopus 로고    scopus 로고
    • On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
    • Mar.
    • S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.3 , pp. 901-915
    • Lin, S.-C.1    Chang, T.-H.2    Liang, Y.-L.3    Hong, Y.-W.P.4    Chi, C.-Y.5
  • 52
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 54
    • 80051744719 scopus 로고    scopus 로고
    • On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity
    • Sep.
    • V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 853-860
    • Prabhu, V.U.1    Rodrigues, M.R.D.2
  • 55
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 56
    • 84879416886 scopus 로고    scopus 로고
    • SLNR-based transmit beamforming for MIMO wiretap channel
    • K. Wang, X. Wang, and X. Zhang, "SLNR-based transmit beamforming for MIMO wiretap channel," Wireless Pers. Commun., vol. 71, no. 1, pp. 109-121, 2013.
    • (2013) Wireless Pers. Commun. , vol.71 , Issue.1 , pp. 109-121
    • Wang, K.1    Wang, X.2    Zhang, X.3
  • 58
    • 84876775276 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO broadcast channel
    • May
    • G. Bagherikaram, A. S. Motahari, and A. K. Khandani, "The secrecy capacity region of the Gaussian MIMO broadcast channel," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2673-2682, May 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.5 , pp. 2673-2682
    • Bagherikaram, G.1    Motahari, A.S.2    Khandani, A.K.3
  • 59
    • 84877752784 scopus 로고    scopus 로고
    • Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
    • May
    • S. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2620-2631
    • Fakoorian, S.A.1    Swindlehurst, A.L.2
  • 60
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper
    • May
    • K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.4 , pp. 1678-1690
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.Y.4    Leung, K.K.5
  • 61
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • Jan.
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 62
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 63
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 64
    • 84866730022 scopus 로고    scopus 로고
    • Physical layer integration of private, common, and confidential messages in bidirectional relay networks
    • Sep.
    • R. F. Wyrembelski and H. Boche, "Physical layer integration of private, common, and confidential messages in bidirectional relay networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3170-3179, Sep. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.9 , pp. 3170-3179
    • Wyrembelski, R.F.1    Boche, H.2
  • 65
    • 76949094931 scopus 로고    scopus 로고
    • Practical physical layer network coding for two-way relay channels: Performance analysis and comparison
    • Feb.
    • R. H. Y. Louie, Y. Li, and B. Vucetic, "Practical physical layer network coding for two-way relay channels: Performance analysis and comparison," IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 764-777, Feb. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.2 , pp. 764-777
    • Louie, R.H.Y.1    Li, Y.2    Vucetic, B.3
  • 66
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • Dec.
    • D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.10 , pp. 2067-2076
    • Goeckel, D.1
  • 67
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 68
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 69
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 70
    • 84863956395 scopus 로고    scopus 로고
    • Improving wireless security for bidirectional communication scenarios
    • Jul.
    • Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2842-2848
    • Ding, Z.1    Xu, M.2    Lu, J.3    Liu, F.4
  • 71
    • 84862617441 scopus 로고    scopus 로고
    • Distance spectrum and performance of channel-coded physical-layer network coding for binary-input Gaussian two-way relay channels
    • Jun.
    • T. Yang, I. Land, T. Huang, J. Yuan, and Z. Chen, "Distance spectrum and performance of channel-coded physical-layer network coding for binary-input Gaussian two-way relay channels," IEEE Trans. Commun., vol. 60, no. 6, pp. 1499-1510, Jun. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.6 , pp. 1499-1510
    • Yang, T.1    Land, I.2    Huang, T.3    Yuan, J.4    Chen, Z.5
  • 72
    • 84865022675 scopus 로고    scopus 로고
    • A new cooperative transmission strategy for physical-layer security with multiple eavesdroppers
    • Yokohama, Japan, May
    • C.-L. Wang, T.-N. Cho, and K.-J. Yang, "A new cooperative transmission strategy for physical-layer security with multiple eavesdroppers," in Proc. 75th IEEE Conf. Veh. Tech., Yokohama, Japan, May 2012, pp. 1-5.
    • (2012) Proc. 75th IEEE Conf. Veh. Tech. , pp. 1-5
    • Wang, C.-L.1    Cho, T.-N.2    Yang, K.-J.3
  • 73
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan.
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 35-38
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 74
    • 84870499401 scopus 로고    scopus 로고
    • A general relaying transmission protocol for MIMO secrecy communications
    • Nov.
    • Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.11 , pp. 3461-3471
    • Ding, Z.1    Peng, M.2    Chen, H.-H.3
  • 75
    • 84870266491 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy with multiple antennas at the helper
    • Dec.
    • R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1855-1864, Dec. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.6 , pp. 1855-1864
    • Bassily, R.1    Ulukus, S.2
  • 76
    • 84874906565 scopus 로고    scopus 로고
    • Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
    • Mar.
    • R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.6 , pp. 1544-1554
    • Bassily, R.1    Ulukus, S.2
  • 77
    • 84877748089 scopus 로고    scopus 로고
    • Design of irregular repeataccumulate coded physical-layer network coding for Gaussian two-way relay channels
    • Mar.
    • T. Huang, T. Yang, J. Yuan, and I. Land, "Design of irregular repeataccumulate coded physical-layer network coding for Gaussian two-way relay channels," IEEE Trans. Commun., vol. 61, no. 3, pp. 897-909, Mar. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.3 , pp. 897-909
    • Huang, T.1    Yang, T.2    Yuan, J.3    Land, I.4
  • 78
    • 84901255051 scopus 로고    scopus 로고
    • Wireless physical layer security enhancement with buffer-aided relaying
    • Pacific Grove, CA, USA, Nov.
    • J. Huang and A. L. Swindlehurst, "Wireless physical layer security enhancement with buffer-aided relaying," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2013, pp. 1560-1564.
    • (2013) Proc. Asilomar Conf. Signals Syst. Comput. , pp. 1560-1564
    • Huang, J.1    Swindlehurst, A.L.2
  • 79
    • 84867219611 scopus 로고    scopus 로고
    • Physical layer security with uncoordinated helpers implementing cooperative jamming
    • Hoboken, NJ, USA, Jun.
    • S. Luo, J. Li, and A. Petropulu, "Physical layer security with uncoordinated helpers implementing cooperative jamming," in Proc. 7th IEEE Sensor Array Multichannel Signal Process. Workshop, Hoboken, NJ, USA, Jun. 2012, pp. 97-100.
    • (2012) Proc. 7th IEEE Sensor Array Multichannel Signal Process. Workshop , pp. 97-100
    • Luo, S.1    Li, J.2    Petropulu, A.3
  • 80
    • 84879149313 scopus 로고    scopus 로고
    • Secure relay beamforming with imperfect channel side information
    • Jun.
    • X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2140-2155
    • Wang, X.1    Wang, K.2    Zhang, X.-D.3
  • 81
  • 82
    • 84897855007 scopus 로고    scopus 로고
    • When does relay transmission give a more secure connection in wireless ad hoc networks
    • Apr.
    • C. Cai, Y. Cai, X. Zhou, W. Yang, and W. Yang, "When does relay transmission give a more secure connection in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 624-632, Apr. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.4 , pp. 624-632
    • Cai, C.1    Cai, Y.2    Zhou, X.3    Yang, W.4    Yang, W.5
  • 83
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying
    • Jul.
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 84
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb.
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 85
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physicallayer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 86
    • 84925066114 scopus 로고    scopus 로고
    • Secrecy capacity optimization via cooperative relaying and jamming for WANETs
    • Apr.
    • B. Han, J. Li, J. Su, M. Guo, and B. Zhao, "Secrecy capacity optimization via cooperative relaying and jamming for WANETs," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 1117-1128, Apr. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.4 , pp. 1117-1128
    • Han, B.1    Li, J.2    Su, J.3    Guo, M.4    Zhao, B.5
  • 87
    • 84871978301 scopus 로고    scopus 로고
    • Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks
    • Ottawa, ON, Canada, Jun.
    • T. Wang, L. Song, Z. Han, X. Cheng, and B. Jiao, "Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks," in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Canada, Jun. 2012, pp. 1683-1687.
    • (2012) Proc. IEEE Int. Conf. Commun. , pp. 1683-1687
    • Wang, T.1    Song, L.2    Han, Z.3    Cheng, X.4    Jiao, B.5
  • 89
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 90
    • 84897459881 scopus 로고    scopus 로고
    • Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
    • Apr.
    • Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, "Algorithms for secrecy guarantee with null space beamforming in two-way relay networks," IEEE Trans. Signal Process., vol. 62, no. 8, pp. 2111-2126, Apr. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.8 , pp. 2111-2126
    • Yang, Y.1    Sun, C.2    Zhao, H.3    Long, H.4    Wang, W.5
  • 91
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, QLD, Australia
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Cairns, QLD, Australia, 2001, pp. 87-89.
    • (2001) Proc. IEEE Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 92
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Nice, France, Jun.
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 926-930.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 926-930
    • Oohama, Y.1
  • 93
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • Mar.
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, Mar. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw. , vol.2009
    • He, X.1    Yener, A.2
  • 94
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 95
    • 84871819283 scopus 로고    scopus 로고
    • Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay
    • Jan.
    • X. He and A. Yener, "Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.1 , pp. 177-192
    • He, X.1    Yener, A.2
  • 96
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 97
    • 84881572098 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way transmission with an untrusted relay
    • Shanghai, China, Apr.
    • J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE Wireless Commun. Netw. Conf., Shanghai, China, Apr. 2013, pp. 4180-4185.
    • (2013) Proc. IEEE Wireless Commun. Netw. Conf. , pp. 4180-4185
    • Mo, J.1    Tao, M.2    Liu, Y.3    Xia, B.4    Ma, X.5
  • 98
    • 84928974649 scopus 로고    scopus 로고
    • Weak secrecy in the multiway untrusted relay channel with computeand-forward
    • Jun.
    • J. Richter, C. Scheunert, S. Engelmann, and E. A. Jorswieck, "Weak secrecy in the multiway untrusted relay channel with computeand-forward," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1262-1273, Jun. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.6 , pp. 1262-1273
    • Richter, J.1    Scheunert, C.2    Engelmann, S.3    Jorswieck, E.A.4
  • 99
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Oct.
    • L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, H.4
  • 100
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 101
    • 77955712103 scopus 로고    scopus 로고
    • Near-optimal joint antenna selection for amplify-andforward relay networks
    • Aug.
    • Y. Zhang et al., "Near-optimal joint antenna selection for amplify-andforward relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2401-2407, Aug. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.8 , pp. 2401-2407
    • Zhang, Y.1
  • 102
    • 84901257838 scopus 로고    scopus 로고
    • Joint transmit design and node selection for one-way and two-way untrusted relay channels
    • Pacific Grove, CA, USA, Nov.
    • J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
    • (2013) Proc. Asilomar Conf. Signals Syst. Comput. , pp. 1555-1559
    • Huang, J.1    Swindlehurst, A.L.2
  • 103
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • New Orleans, LA, USA, Nov.
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE GLOBECOM, New Orleans, LA, USA, Nov. 2008, pp. 1-5.
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • He, X.1    Yener, A.2
  • 104
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 105
    • 84876054344 scopus 로고    scopus 로고
    • Physical-layer security in distributed wireless networks using matching theory
    • May
    • S. Bayat, R. H. Y. Louie, Z. Han, B. Vucetic, and Y. Li, "Physical-layer security in distributed wireless networks using matching theory," IEEE Trans. Inf. Forensics Security, vol. 8, no. 5, pp. 717-732, May 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.5 , pp. 717-732
    • Bayat, S.1    Louie, R.H.Y.2    Han, Z.3    Vucetic, B.4    Li, Y.5
  • 106
    • 84971225716 scopus 로고    scopus 로고
    • Secret key agreement for massive MIMO systems with two-way training under pilot contamination attack
    • San Diego, CA, USA, Dec.
    • S. Im, J. Choi, and J. Ha, "Secret key agreement for massive MIMO systems with two-way training under pilot contamination attack," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE GLOBECOM , pp. 1-6
    • Im, S.1    Choi, J.2    Ha, J.3
  • 107
    • 84960373745 scopus 로고    scopus 로고
    • Secret key generation rate with power allocation in relay-based LTE-A networks
    • Nov.
    • K. Chen, B. B. Natarajan, and S. Shattil, "Secret key generation rate with power allocation in relay-based LTE-A networks," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2424-2434, Nov. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.11 , pp. 2424-2434
    • Chen, K.1    Natarajan, B.B.2    Shattil, S.3
  • 108
    • 84933522482 scopus 로고    scopus 로고
    • Physical layer key generation in wireless networks: Challenges and opportunities
    • Jun.
    • K. Zeng, "Physical layer key generation in wireless networks: Challenges and opportunities," IEEE Commun. Mag., vol. 53, no. 6, pp. 33-39, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 33-39
    • Zeng, K.1
  • 109
    • 84866269425 scopus 로고    scopus 로고
    • Exploiting channel diversity in secret key generation from multipath fading randomness
    • Oct.
    • Y. Liu, S. C. Draper, and A. M. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1484-1497, Oct. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.5 , pp. 1484-1497
    • Liu, Y.1    Draper, S.C.2    Sayeed, A.M.3
  • 110
    • 84962132625 scopus 로고    scopus 로고
    • Physical-layer secret key generation with colluding untrusted relays
    • Feb.
    • C. D. T. Thai, J. Lee, and T. Q. S. Quek, "Physical-layer secret key generation with colluding untrusted relays," IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.2 , pp. 1517-1530
    • Thai, C.D.T.1    Lee, J.2    Quek, T.Q.S.3
  • 111
    • 84964848526 scopus 로고    scopus 로고
    • Secret group key generation in physical layer for mesh topology
    • San Diego, CA, USA, Dec.
    • C. D. T. Thai, J. Lee, and T. Q. S. Quek, "Secret group key generation in physical layer for mesh topology," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE GLOBECOM , pp. 1-6
    • Thai, C.D.T.1    Lee, J.2    Quek, T.Q.S.3
  • 112
    • 84964902033 scopus 로고    scopus 로고
    • LDPC code design aspects for physical-layer key reconciliation
    • San Diego, CA, USA, Dec.
    • N. Islam, O. Graur, A. Filip, and W. Henkel, "LDPC code design aspects for physical-layer key reconciliation," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-7.
    • (2015) Proc. IEEE GLOBECOM , pp. 1-7
    • Islam, N.1    Graur, O.2    Filip, A.3    Henkel, W.4
  • 113
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov.
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) IEEE Trans. Antennas Propag. , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 114
    • 80052337836 scopus 로고    scopus 로고
    • Secret key generation exploiting channel characteristics in wireless communications
    • Aug.
    • K. Ren, H. Su, and Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, Aug. 2011.
    • (2011) IEEE Wireless Commun. , vol.18 , Issue.4 , pp. 6-12
    • Ren, K.1    Su, H.2    Wang, Q.3
  • 115
    • 84964885214 scopus 로고    scopus 로고
    • Physical layer secret key exchange using phase randomization in MIMO-OFDM
    • San Diego, CA, USA, Dec.
    • H. Taha and E. Alsusa, "Physical layer secret key exchange using phase randomization in MIMO-OFDM," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE GLOBECOM , pp. 1-6
    • Taha, H.1    Alsusa, E.2
  • 116
    • 84962007216 scopus 로고    scopus 로고
    • RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements
    • Feb.
    • Y. Luo, L. Pu, Z. Peng, and Z. Shi, "RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements," IEEE Commun. Mag., vol. 54, no. 2, pp. 32-38, Feb. 2016.
    • (2016) IEEE Commun. Mag. , vol.54 , Issue.2 , pp. 32-38
    • Luo, Y.1    Pu, L.2    Peng, Z.3    Shi, Z.4
  • 119
    • 80051749392 scopus 로고    scopus 로고
    • Physical-layer secret key agreement in two-way wireless relaying systems
    • Sep.
    • T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 650-660
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 120
    • 84902988987 scopus 로고    scopus 로고
    • Secret key generation from reciprocal spatially correlated MIMO channels
    • Atlanta, GA, USA, Dec.
    • E. A. Jorswieck, A. Wolf, and S. Engelmann, "Secret key generation from reciprocal spatially correlated MIMO channels," in Proc. IEEE GLOBECOM, Atlanta, GA, USA, Dec. 2013, pp. 1245-1250.
    • (2013) Proc. IEEE GLOBECOM , pp. 1245-1250
    • Jorswieck, E.A.1    Wolf, A.2    Engelmann, S.3
  • 121
    • 84959431549 scopus 로고    scopus 로고
    • Polar coding for secret-key generation
    • Nov.
    • R. A. Chou, M. R. Bloch, and E. Abbe, "Polar coding for secret-key generation," IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6213-6237, Nov. 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.11 , pp. 6213-6237
    • Chou, R.A.1    Bloch, M.R.2    Abbe, E.3
  • 123
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • Glasgow, U.K., Jun.
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in Proc. IEEE Int. Conf. Commun., Glasgow, U.K., Jun. 2007, pp. 4646-4651.
    • (2007) Proc. IEEE Int. Conf. Commun. , pp. 4646-4651
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 124
    • 84355162331 scopus 로고    scopus 로고
    • Extrinsic channel-like fingerprint embedding for authenticating MIMO systems
    • Dec.
    • N. Goergen, W. S. Lin, K. J. R. Liu, and T. C. Clancy, "Extrinsic channel-like fingerprint embedding for authenticating MIMO systems," IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 4270-4281, Dec. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.12 , pp. 4270-4281
    • Goergen, N.1    Lin, W.S.2    Liu, K.J.R.3    Clancy, T.C.4
  • 125
    • 77953185209 scopus 로고    scopus 로고
    • Physical layer authentication watermarks through synthetic channel emulation
    • Singapore, Apr.
    • N. Goergen, T. C. Clancy, and T. R. Newman, "Physical layer authentication watermarks through synthetic channel emulation," in Proc. IEEE Symp. New Front. Dyn. Spectr., Singapore, Apr. 2010, pp. 1-7.
    • (2010) Proc. IEEE Symp. New Front. Dyn. Spectr. , pp. 1-7
    • Goergen, N.1    Clancy, T.C.2    Newman, T.R.3
  • 126
    • 79551638642 scopus 로고    scopus 로고
    • Authenticating MIMO transmissions using channel-like fingerprinting
    • Miami, FL, USA, Dec.
    • N. Goergen, W. S. Lin, K. J. Liu, and T. C. Clancy, "Authenticating MIMO transmissions using channel-like fingerprinting," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-6
    • Goergen, N.1    Lin, W.S.2    Liu, K.J.3    Clancy, T.C.4
  • 128
    • 84927167486 scopus 로고    scopus 로고
    • An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems
    • May
    • Q. Xiong, Y.-C. Liang, K. H. Li, and Y. Gong, "An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems," IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 932-940, May 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.5 , pp. 932-940
    • Xiong, Q.1    Liang, Y.-C.2    Li, K.H.3    Gong, Y.4
  • 129
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • Jul.
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 130
    • 5444259436 scopus 로고    scopus 로고
    • Transmitter identification using embedded pseudo random sequences
    • Sep.
    • X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences," IEEE Trans. Broadcast., vol. 50, no. 3, pp. 244-252, Sep. 2004.
    • (2004) IEEE Trans. Broadcast. , vol.50 , Issue.3 , pp. 244-252
    • Wang, X.1    Wu, Y.2    Caron, B.3
  • 131
    • 84883362174 scopus 로고    scopus 로고
    • PHYCRAM: Physical layer challenge-response authentication mechanism for wireless networks
    • Sep.
    • D. Shan, K. Zeng, W. Xiang, P. Richardson, and Y. Dong, "PHYCRAM: Physical layer challenge-response authentication mechanism for wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1817-1827, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1817-1827
    • Shan, D.1    Zeng, K.2    Xiang, W.3    Richardson, P.4    Dong, Y.5
  • 133
    • 23744510451 scopus 로고    scopus 로고
    • Authentication with distortion criteria
    • Jul.
    • E. Martinian, G. W. Wornell, and B. Chen, "Authentication with distortion criteria," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2523-2542, Jul. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.7 , pp. 2523-2542
    • Martinian, E.1    Wornell, G.W.2    Chen, B.3
  • 134
    • 79551640226 scopus 로고    scopus 로고
    • PHY-authentication protocol for spoofing detection in wireless networks
    • Miami, FL, USA, Dec.
    • L. Xiao et al., "PHY-authentication protocol for spoofing detection in wireless networks," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-6
    • Xiao, L.1
  • 135
    • 84864117726 scopus 로고    scopus 로고
    • Physical layer authentication over MIMO fading wiretap channels
    • Jul.
    • P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, Jul. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.7 , pp. 2564-2573
    • Baracca, P.1    Laurenti, N.2    Tomasin, S.3
  • 136
    • 84904439278 scopus 로고    scopus 로고
    • Physical layer challengeresponse authentication in wireless networks with relay
    • Toronto, ON, Canada, Apr.
    • X. Du, D. Shan, K. Zeng, and L. Huie, "Physical layer challengeresponse authentication in wireless networks with relay," in Proc. IEEE INFOCOM, Toronto, ON, Canada, Apr. 2014, pp. 1276-1284.
    • (2014) Proc. IEEE INFOCOM , pp. 1276-1284
    • Du, X.1    Shan, D.2    Zeng, K.3    Huie, L.4
  • 138
    • 84864330345 scopus 로고    scopus 로고
    • Preventing wormhole attacks using physical layer authentication
    • Shanghai, China, Apr.
    • S. Jain and J. S. Baras, "Preventing wormhole attacks using physical layer authentication," in Proc. IEEE Conf. Wireless Commun. Netw., Shanghai, China, Apr. 2012, pp. 2712-2717.
    • (2012) Proc. IEEE Conf. Wireless Commun. Netw. , pp. 2712-2717
    • Jain, S.1    Baras, J.S.2
  • 139
    • 84891361344 scopus 로고    scopus 로고
    • A two dimensional quantization algorithm for CIR-based physical layer authentication
    • Budapest, Hungary, Jun.
    • F. J. Liu, X. Wang, and S. L. Primak, "A two dimensional quantization algorithm for CIR-based physical layer authentication," in Proc. IEEE Int. Conf. Commun., Budapest, Hungary, Jun. 2013, pp. 4724-4728.
    • (2013) Proc. IEEE Int. Conf. Commun. , pp. 4724-4728
    • Liu, F.J.1    Wang, X.2    Primak, S.L.3
  • 140
    • 84863039074 scopus 로고    scopus 로고
    • Robust physical layer authentication using inherent properties of channel impulse response
    • Baltimore, MD, USA, Nov.
    • F. J. Liu, X. Wang, and H. Tang, "Robust physical layer authentication using inherent properties of channel impulse response," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 538-542.
    • (2011) Proc. Mil. Commun. Conf. , pp. 538-542
    • Liu, F.J.1    Wang, X.2    Tang, H.3
  • 141
    • 84921345607 scopus 로고    scopus 로고
    • Physical-layer authentication for multi-carrier transmission
    • Jan.
    • X. Wu and Z. Yang, "Physical-layer authentication for multi-carrier transmission," IEEE Commun. Lett., vol. 19, no. 1, pp. 74-77, Jan. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.1 , pp. 74-77
    • Wu, X.1    Yang, Z.2
  • 142
    • 67650676864 scopus 로고    scopus 로고
    • Power allocation tradeoffs in multicarrier authentication systems
    • Princeton, NJ, USA, Mar.
    • P. L. Yu, J. S. Baras, and B. M. Sadler, "Power allocation tradeoffs in multicarrier authentication systems," in Proc. IEEE Symp. Sarnoff, Princeton, NJ, USA, Mar. 2009, pp. 1-5.
    • (2009) Proc. IEEE Symp. Sarnoff , pp. 1-5
    • Yu, P.L.1    Baras, J.S.2    Sadler, B.M.3
  • 143
    • 84883373500 scopus 로고    scopus 로고
    • Wireless user authentication via comparison of power spectral densities
    • Sep.
    • J. K. Tugnait, "Wireless user authentication via comparison of power spectral densities," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1791-1802, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1791-1802
    • Tugnait, J.K.1
  • 145
    • 84876772985 scopus 로고    scopus 로고
    • Physical layer security of hybrid spread spectrum systems
    • Austin, TX, USA, Jan.
    • A. Martin, Y. Hasan, and R. M. Buehrer, "Physical layer security of hybrid spread spectrum systems," in Proc. IEEE Symp. Radio Wireless, Austin, TX, USA, Jan. 2013, pp. 370-372.
    • (2013) Proc. IEEE Symp. Radio Wireless , pp. 370-372
    • Martin, A.1    Hasan, Y.2    Buehrer, R.M.3
  • 146
    • 61349140043 scopus 로고    scopus 로고
    • Authentication over noisy channels
    • Feb.
    • L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 906-916
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 147
    • 73049092718 scopus 로고    scopus 로고
    • Channelbased spoofing detection in frequency-selective Rayleigh channels
    • Dec.
    • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.12 , pp. 5948-5956
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 148
    • 4344692251 scopus 로고    scopus 로고
    • Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: Analysis and design
    • Sep.
    • Y. Hwang and H. C. Papadopoulos, "Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: Analysis and design," IEEE Trans. Signal Process., vol. 52, no. 9, pp. 2637-2649, Sep. 2004.
    • (2004) IEEE Trans. Signal Process. , vol.52 , Issue.9 , pp. 2637-2649
    • Hwang, Y.1    Papadopoulos, H.C.2
  • 149
    • 85014124024 scopus 로고    scopus 로고
    • Physical layer built-in security analysis and enhancement of CDMA systems
    • Atlantic City, NJ, USA, Oct.
    • T. Li, J. Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. IEEE Mil. Commun. Conf., vol. 2. Atlantic City, NJ, USA, Oct. 2005, pp. 956-962.
    • (2005) Proc. IEEE Mil. Commun. Conf. , vol.2 , pp. 956-962
    • Li, T.1    Ren, J.2    Ling, Q.3    Jain, A.4
  • 150
    • 84928128204 scopus 로고    scopus 로고
    • Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints
    • Jun.
    • D. R. Reising, M. A. Temple, and J. A. Jackson, "Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1180-1192, Jun. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.6 , pp. 1180-1192
    • Reising, D.R.1    Temple, M.A.2    Jackson, J.A.3
  • 151
    • 84988291998 scopus 로고    scopus 로고
    • Channel-based physical layer authentication
    • Austin, TX, USA, Dec.
    • C. Pei, N. Zhang, X. S. Shen, and J. W. Mark, "Channel-based physical layer authentication," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 4114-4119.
    • (2014) Proc. IEEE GLOBECOM , pp. 4114-4119
    • Pei, C.1    Zhang, N.2    Shen, X.S.3    Mark, J.W.4
  • 152
    • 0038343420 scopus 로고    scopus 로고
    • From theory to practice: An overview of MIMO space-time coded wireless systems
    • Apr.
    • D. Gesbert, M. Shafi, D.-S. Shiu, P. J. Smith, and A. Naguib, "From theory to practice: An overview of MIMO space-time coded wireless systems," IEEE J. Sel. Areas Commun., vol. 21, no. 3, pp. 281-302, Apr. 2003.
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.3 , pp. 281-302
    • Gesbert, D.1    Shafi, M.2    Shiu, D.-S.3    Smith, P.J.4    Naguib, A.5
  • 153
    • 85032752478 scopus 로고    scopus 로고
    • Cooperative communications in resource-constrained wireless networks
    • May
    • Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, "Cooperative communications in resource-constrained wireless networks," IEEE Signal Process. Mag., vol. 24, no. 3, pp. 47-57, May 2007.
    • (2007) IEEE Signal Process. Mag. , vol.24 , Issue.3 , pp. 47-57
    • Hong, Y.-W.1    Huang, W.-J.2    Chiu, F.-H.3    Kuo, C.-C.J.4
  • 154
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 155
    • 85032751357 scopus 로고    scopus 로고
    • Cooperative security at the physical layer: A summary of recent advances
    • Sep.
    • R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 16-28
    • Bassily, R.1
  • 156
    • 85032751057 scopus 로고    scopus 로고
    • Coding for secrecy: An overview of error-control coding techniques for physical-layer security
    • Sep.
    • W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 41-50
    • Harrison, W.K.1    Almeida, J.2    Bloch, M.R.3    McLaughlin, S.W.4    Barros, J.5
  • 158
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • 3rd Quart.
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 159
    • 84959512212 scopus 로고    scopus 로고
    • A survey on wireless security: Technical challenges, recent advances and future trends
    • to be published
    • Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances and future trends," Proc. IEEE, to be published.
    • Proc. IEEE
    • Zou, Y.1    Zhu, J.2    Wang, X.3    Hanzo, L.4
  • 160
    • 84930508485 scopus 로고    scopus 로고
    • Advances on security threats and countermeasures for cognitive radio networks: A survey
    • 2nd Quart.
    • R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: A survey," IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 1023-1043, 2nd Quart. 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.2 , pp. 1023-1043
    • Sharma, R.K.1    Rawat, D.B.2
  • 161
    • 84925881945 scopus 로고    scopus 로고
    • PHY-layer resiliency in OFDM communications: A tutorial
    • 1st Quart.
    • C. Shahriar et al., "PHY-layer resiliency in OFDM communications: A tutorial," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292-314, 1st Quart. 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.1 , pp. 292-314
    • Shahriar, C.1
  • 162
    • 84962197386 scopus 로고    scopus 로고
    • A survey: Spoofing attacks in physical layer security
    • Clearwater Beach, FL, USA, Oct.
    • M. H. Yilmaz and H. Arslan, "A survey: Spoofing attacks in physical layer security," in Proc. IEEE Local Comput. Netw. Conf. Workshops, Clearwater Beach, FL, USA, Oct. 2015, pp. 812-817.
    • (2015) Proc. IEEE Local Comput. Netw. Conf. Workshops , pp. 812-817
    • Yilmaz, M.H.1    Arslan, H.2
  • 163
    • 84933037312 scopus 로고    scopus 로고
    • Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
    • Jun.
    • D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 21-27
    • Kapetanovic, D.1    Zheng, G.2    Rusek, F.3
  • 164
    • 84925359289 scopus 로고    scopus 로고
    • A comparative review on the wireless implantable medical devices privacy and security
    • Athens, Greece, Nov.
    • Z. E. Ankarali et al., "A comparative review on the wireless implantable medical devices privacy and security," in Proc. Conf. Wireless Mobile Commun. Healthcare, Athens, Greece, Nov. 2014, pp. 246-249.
    • (2014) Proc. Conf. Wireless Mobile Commun. Healthcare , pp. 246-249
    • Ankarali, Z.E.1
  • 168
    • 84861327707 scopus 로고    scopus 로고
    • A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures
    • Pacific Grove, CA, USA, Nov.
    • A. Mukherjee and A. L. Swindlehurst, "A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures," in Proc. 45th Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 265-269.
    • (2011) Proc. 45th Asilomar Conf. Signals Syst. Comput. , pp. 265-269
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 169
    • 84981309810 scopus 로고    scopus 로고
    • Proactive eavesdropping via cognitive jamming in fading channels
    • submitted
    • J. Xu, L. Duan, and R. Zhang, "Proactive eavesdropping via cognitive jamming in fading channels," IEEE Trans. Inf. Theory, submitted.
    • IEEE Trans. Inf. Theory
    • Xu, J.1    Duan, L.2    Zhang, R.3
  • 170
    • 84962603357 scopus 로고    scopus 로고
    • Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels
    • Feb.
    • J. Xu, L. Duan, and R. Zhang, "Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels," IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 80-83, Feb. 2016.
    • (2016) IEEE Wireless Commun. Lett. , vol.5 , Issue.1 , pp. 80-83
    • Xu, J.1    Duan, L.2    Zhang, R.3
  • 173
    • 84861172829 scopus 로고    scopus 로고
    • Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis
    • Jun.
    • M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 883-894
    • Baldi, M.1    Bianchi, M.2    Chiaraluce, F.3
  • 174
    • 84877902869 scopus 로고    scopus 로고
    • A classification of unimodular lattice wiretap codes in small dimensions
    • Jun.
    • F. Lin and F. Oggier, "A classification of unimodular lattice wiretap codes in small dimensions," IEEE Trans. Inf. Theory, vol. 59, no. 6, pp. 3295-3303, Jun. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.6 , pp. 3295-3303
    • Lin, F.1    Oggier, F.2
  • 175
    • 84896958699 scopus 로고    scopus 로고
    • Providing secrecy with structured codes: Twouser Gaussian channels
    • Apr.
    • X. He and A. Yener, "Providing secrecy with structured codes: Twouser Gaussian channels," IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, Apr. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.4 , pp. 2121-2138
    • He, X.1    Yener, A.2
  • 179
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 180
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 181
    • 84863913546 scopus 로고    scopus 로고
    • Physical-layer secrecy for OFDM transmissions over fading channels
    • Aug.
    • F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1354-1367
    • Renna, F.1    Laurenti, N.2    Poor, H.V.3
  • 182
    • 84865360202 scopus 로고    scopus 로고
    • Degraded compound multi-receiver wiretap channels
    • Sep.
    • E. Ekrem and S. Ulukus, "Degraded compound multi-receiver wiretap channels," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5681-5698, Sep. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.9 , pp. 5681-5698
    • Ekrem, E.1    Ulukus, S.2
  • 184
    • 52349104395 scopus 로고    scopus 로고
    • The secrecy capacity of a class of parallel Gaussian compound wiretap channels
    • Toronto, ON, Canada, Jul.
    • T. Liu, V. Prabhakaran, and S. Vishwanath, "The secrecy capacity of a class of parallel Gaussian compound wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 116-120.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 116-120
    • Liu, T.1    Prabhakaran, V.2    Vishwanath, S.3
  • 185
    • 84908245996 scopus 로고    scopus 로고
    • MIMO wiretap channels with unknown and varying eavesdropper channel states
    • Nov.
    • X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.11 , pp. 6844-6869
    • He, X.1    Yener, A.2
  • 186
    • 0031272703 scopus 로고    scopus 로고
    • Capacity of fading channels with channel side information
    • Nov.
    • A. J. Goldsmith and P. P. Varaiya, "Capacity of fading channels with channel side information," IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1986-1992, Nov. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.6 , pp. 1986-1992
    • Goldsmith, A.J.1    Varaiya, P.P.2
  • 187
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Mar.
    • Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 188
    • 84880521772 scopus 로고    scopus 로고
    • MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
    • Aug.
    • X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, Aug. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.8 , pp. 4733-4745
    • He, X.1    Khisti, A.2    Yener, A.3
  • 189
    • 84888354468 scopus 로고    scopus 로고
    • Rate regions for multiple access channel with conference and secrecy constraints
    • Dec.
    • P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1961-1974
    • Xu, P.1    Ding, Z.2    Dai, X.3
  • 191
    • 84923915852 scopus 로고    scopus 로고
    • Highly efficient known-plaintext attacks against orthogonal blinding based physical layer security
    • Feb.
    • Y. Zheng, M. Schulz, W. Lou, Y. T. Hou, and M. Hollick, "Highly efficient known-plaintext attacks against orthogonal blinding based physical layer security," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 34-37, Feb. 2015.
    • (2015) IEEE Wireless Commun. Lett. , vol.4 , Issue.1 , pp. 34-37
    • Zheng, Y.1    Schulz, M.2    Lou, W.3    Hou, Y.T.4    Hollick, M.5
  • 192
    • 84913593877 scopus 로고    scopus 로고
    • Joint information-and jamming-beamforming for physical layer security with full duplex base station
    • Dec.
    • F. Zhu, F. Gao, M. Yao, and H. Zou, "Joint information-and jamming-beamforming for physical layer security with full duplex base station," IEEE Trans. Signal Process., vol. 62, no. 24, pp. 6391-6401, Dec. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.24 , pp. 6391-6401
    • Zhu, F.1    Gao, F.2    Yao, M.3    Zou, H.4
  • 193
    • 0018523303 scopus 로고
    • Capacity theorems for the relay channel
    • Sep.
    • T. Cover and A. E. Gamal, "Capacity theorems for the relay channel," IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.5 , pp. 572-584
    • Cover, T.1    Gamal, A.E.2
  • 194
    • 84907222991 scopus 로고    scopus 로고
    • Semantically secure lattice codes for the Gaussian wiretap channel
    • Oct.
    • C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, "Semantically secure lattice codes for the Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 60, no. 10, pp. 6399-6416, Oct. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.10 , pp. 6399-6416
    • Ling, C.1    Luzzi, L.2    Belfiore, J.-C.3    Stehlé, D.4
  • 196
    • 0035669989 scopus 로고    scopus 로고
    • A comparison of pilot-aided channel estimation methods for OFDM systems
    • Dec.
    • M. Morelli and U. Mengali, "A comparison of pilot-aided channel estimation methods for OFDM systems," IEEE Trans. Signal Process., vol. 49, no. 12, pp. 3065-3073, Dec. 2001.
    • (2001) IEEE Trans. Signal Process. , vol.49 , Issue.12 , pp. 3065-3073
    • Morelli, M.1    Mengali, U.2
  • 197
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • Heidelberg, Germany: Springer
    • B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in Advances in Cryptology - EUROCRYPT 2009. Heidelberg, Germany: Springer, 2009, pp. 206-223.
    • (2009) Advances in Cryptology - EUROCRYPT 2009. , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 198
    • 84922456022 scopus 로고    scopus 로고
    • GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
    • Apr.
    • J. Han et al., "GenePrint: Generic and accurate physical-layer identification for UHF RFID tags," IEEE/ACM Trans. Netw., vol. 24, no. 2, pp. 846-858, Apr. 2016.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.2 , pp. 846-858
    • Han, J.1
  • 199
    • 85032752174 scopus 로고    scopus 로고
    • Scaling up MIMO: Opportunities and challenges with very large arrays
    • Jan.
    • F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-60, Jan. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.1 , pp. 40-60
    • Rusek, F.1
  • 200
    • 84963567995 scopus 로고    scopus 로고
    • Linear precoding of data and artificial noise in secure massive MIMO systems
    • Mar.
    • J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.3 , pp. 2245-2261
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 201
    • 84907195591 scopus 로고    scopus 로고
    • Secure transmission in multicell massive MIMO systems
    • Sep.
    • J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.9 , pp. 4766-4781
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 202
    • 84961590340 scopus 로고    scopus 로고
    • Jamming-aided secure communication in massive MIMO Rician channels
    • Dec.
    • J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, "Jamming-aided secure communication in massive MIMO Rician channels," IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6854-6868, Dec. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.12 , pp. 6854-6868
    • Wang, J.1    Lee, J.2    Wang, F.3    Quek, T.Q.S.4
  • 203
    • 84946607375 scopus 로고    scopus 로고
    • Large-scale MIMO relaying techniques for physical layer security: AF or DF?
    • Sep.
    • X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.9 , pp. 5135-5146
    • Chen, X.1    Lei, L.2    Zhang, H.3    Yuen, C.4
  • 204
    • 84922540471 scopus 로고    scopus 로고
    • Millimeter wave mobile communications for 5G cellular: It will work!
    • T. S. Rappaport et al., "Millimeter wave mobile communications for 5G cellular: It will work!" IEEE Access, vol. 1, pp. 335-349, 2013.
    • (2013) IEEE Access , vol.1 , pp. 335-349
    • Rappaport, T.S.1
  • 205
    • 84963746451 scopus 로고    scopus 로고
    • Switched phased-array transmission architecture for secure millimeter-wave wireless communication
    • Mar.
    • N. N. Alotaibi and K. A. Hamdi, "Switched phased-array transmission architecture for secure millimeter-wave wireless communication," IEEE Trans. Commun., vol. 64, no. 3, pp. 1303-1312, Mar. 2016.
    • (2016) IEEE Trans. Commun. , vol.64 , Issue.3 , pp. 1303-1312
    • Alotaibi, N.N.1    Hamdi, K.A.2
  • 206
    • 84964868834 scopus 로고    scopus 로고
    • Silent antenna hopping transmission technique for secure millimeter-wave wireless communication
    • San Diego, CA, USA, Dec.
    • N. N. Alotaibi and K. A. Hamdi, "Silent antenna hopping transmission technique for secure millimeter-wave wireless communication," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE GLOBECOM , pp. 1-6
    • Alotaibi, N.N.1    Hamdi, K.A.2
  • 208
    • 84963742236 scopus 로고    scopus 로고
    • Physical layer security in heterogeneous cellular networks
    • Mar.
    • H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, "Physical layer security in heterogeneous cellular networks," IEEE Trans. Commun., vol. 64, no. 3, pp. 1204-1219, Mar. 2016.
    • (2016) IEEE Trans. Commun. , vol.64 , Issue.3 , pp. 1204-1219
    • Wang, H.-M.1    Zheng, T.-X.2    Yuan, J.3    Towsley, D.4    Lee, M.H.5
  • 209
    • 84962195676 scopus 로고    scopus 로고
    • Physical-layer security for full duplex communications with self-interference mitigation
    • Jan.
    • F. Zhu, F. Gao, T. Zhang, K. Sun, and M. Yao, "Physical-layer security for full duplex communications with self-interference mitigation," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 329-340, Jan. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.1 , pp. 329-340
    • Zhu, F.1    Gao, F.2    Zhang, T.3    Sun, K.4    Yao, M.5
  • 210
    • 84929353100 scopus 로고    scopus 로고
    • Secure degrees of freedom of MIMO rayleigh block fading wiretap channels with no CSI anywhere
    • May
    • T.-Y. Liu, P. Mukherjee, S. Ulukus, S.-C. Lin, and Y.-W. P. Hong, "Secure degrees of freedom of MIMO rayleigh block fading wiretap channels with no CSI anywhere," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2655-2669, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2655-2669
    • Liu, T.-Y.1    Mukherjee, P.2    Ulukus, S.3    Lin, S.-C.4    Hong, Y.-W.P.5
  • 211
    • 84883051913 scopus 로고    scopus 로고
    • On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio
    • Aug.
    • S. Althunibat et al., "On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio," IEEE Commun. Lett., vol. 17, no. 8, pp. 1564-1567, Aug. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.8 , pp. 1564-1567
    • Althunibat, S.1
  • 212
    • 84959334315 scopus 로고    scopus 로고
    • Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks
    • V. Sucasas et al., "Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks," Security Commun. Netw., vol. 8, no. 18, pp. 3978-3994, 2015.
    • (2015) Security Commun. Netw. , vol.8 , Issue.18 , pp. 3978-3994
    • Sucasas, V.1
  • 213
    • 84879072350 scopus 로고    scopus 로고
    • On physical layer security for cognitive radio networks
    • May/Jun.
    • Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., vol. 27, no. 3, pp. 28-33, May/Jun. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.3 , pp. 28-33
    • Shu, Z.1    Qian, Y.2    Ci, S.3
  • 214
    • 84901022882 scopus 로고    scopus 로고
    • A new decomposition method for multiuser DC-programming and its applications
    • Jun.
    • A. Alvarado, G. Scutari, and J.-S. Pang, "A new decomposition method for multiuser DC-programming and its applications," IEEE Trans. Signal Process., vol. 62, no. 11, pp. 2984-2998, Jun. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.11 , pp. 2984-2998
    • Alvarado, A.1    Scutari, G.2    Pang, J.-S.3
  • 215
    • 84919786115 scopus 로고    scopus 로고
    • Secure robust ergodic uplink resource allocation in relay-assisted cognitive radio networks
    • Jan.
    • N. Mokari, S. Parsaeefard, H. Saeedi, P. Azmi, and E. Hossain, "Secure robust ergodic uplink resource allocation in relay-assisted cognitive radio networks," IEEE Trans. Signal Process., vol. 63, no. 2, pp. 291-304, Jan. 2015.
    • (2015) IEEE Trans. Signal Process. , vol.63 , Issue.2 , pp. 291-304
    • Mokari, N.1    Parsaeefard, S.2    Saeedi, H.3    Azmi, P.4    Hossain, E.5
  • 216
    • 84923221226 scopus 로고    scopus 로고
    • MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
    • Feb.
    • L. Shi, J. Yuan, S. Yu, and M. Li, "MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks," IEEE Internet Things J., vol. 2, no. 1, pp. 52-62, Feb. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.1 , pp. 52-62
    • Shi, L.1    Yuan, J.2    Yu, S.3    Li, M.4
  • 217
    • 84883408567 scopus 로고    scopus 로고
    • BANA: Body area network authentication exploiting channel characteristics
    • Sep.
    • L. Shi, M. Li, S. Yu, and J. Yuan, "BANA: Body area network authentication exploiting channel characteristics," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1803-1816, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1803-1816
    • Shi, L.1    Li, M.2    Yu, S.3    Yuan, J.4
  • 218
    • 84911072446 scopus 로고    scopus 로고
    • Securing first-hop data provenance for bodyworn devices using wireless link fingerprints
    • Dec.
    • S. T. Ali, V. Sivaraman, D. Ostry, G. Tsudik, and S. Jha, "Securing first-hop data provenance for bodyworn devices using wireless link fingerprints," IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2193-2204, Dec. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.12 , pp. 2193-2204
    • Ali, S.T.1    Sivaraman, V.2    Ostry, D.3    Tsudik, G.4    Jha, S.5
  • 219
    • 84927712570 scopus 로고    scopus 로고
    • Safeguarding 5G wireless communication networks using physical layer security
    • Apr.
    • N. Yang et al., "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 20-27
    • Yang, N.1
  • 220
    • 84921323282 scopus 로고    scopus 로고
    • Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
    • Jan.
    • C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.1 , pp. 229-242
    • Ma, C.1
  • 221
    • 84921696409 scopus 로고    scopus 로고
    • Secure communications of cellular users in device-to-device communication underlaying cellular networks
    • Hefei, China, Oct.
    • Y. Wang, Z. Chen, Y. Yao, M. Shen, and B. Xia, "Secure communications of cellular users in device-to-device communication underlaying cellular networks," in Proc. 6th Int. Conf. Wireless Commun. Signal Process., Hefei, China, Oct. 2014, pp. 1-6.
    • (2014) Proc. 6th Int. Conf. Wireless Commun. Signal Process. , pp. 1-6
    • Wang, Y.1    Chen, Z.2    Yao, Y.3    Shen, M.4    Xia, B.5
  • 222
    • 84857921504 scopus 로고    scopus 로고
    • Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions
    • 4th Quart.
    • G. Karagiannis et al., "Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions," IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 584-616, 4th Quart. 2011.
    • (2011) IEEE Commun. Surveys Tuts. , vol.13 , Issue.4 , pp. 584-616
    • Karagiannis, G.1
  • 223
    • 84863962542 scopus 로고    scopus 로고
    • Joint topology control and authentication design in mobile ad hoc networks with cooperative communications
    • Jul.
    • Q. Guan, F. R. Yu, S. Jiang, and V. C. M. Leung, "Joint topology control and authentication design in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2674-2685, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2674-2685
    • Guan, Q.1    Yu, F.R.2    Jiang, S.3    Leung, V.C.M.4
  • 224
    • 84901454675 scopus 로고    scopus 로고
    • Physical layer authentication for mobile systems with time-varying carrier frequency offsets
    • May
    • W. Hou, X. Wang, J.-Y. Chouinard, and A. Refaey, "Physical layer authentication for mobile systems with time-varying carrier frequency offsets," IEEE Trans. Commun., vol. 62, no. 5, pp. 1658-1667, May 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.5 , pp. 1658-1667
    • Hou, W.1    Wang, X.2    Chouinard, J.-Y.3    Refaey, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.