메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Secrecy enhancement by antenna selection and FD communication with randomly located eavesdroppers

Author keywords

[No Author keywords available]

Indexed keywords

ANTENNAS; FINITE DIFFERENCE METHOD; INTELLIGENT SYSTEMS; MONTE CARLO METHODS; SIGNAL RECEIVERS;

EID: 85015409426     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2016.7842245     Document Type: Conference Paper
Times cited : (4)

References (25)
  • 1
    • 54849430727 scopus 로고    scopus 로고
    • Identity based key management in mobile ad hoc networks: Techniques and applications
    • Oct.
    • E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identity based key management in mobile ad hoc networks: Techniques and applications, " IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.15 , Issue.5 , pp. 46-52
    • Silva, E.D.1    Santos, A.L.D.2    Albini, L.C.P.3    Lima, M.4
  • 2
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
    • June
    • E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming, " IEEE Trans. Inform. Theory, vol. 54, pp. 2735-2751, June 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 3
    • 67649499991 scopus 로고    scopus 로고
    • Wireless secrecy in cellular systems with infrastructure-aided cooperation
    • June
    • P. Popovski and O. Simeone, "Wireless secrecy in cellular systems with infrastructure-aided cooperation, " IEEE Trans. Inform. Forensics and Security, vol. 4, no. 2, pp. 242-256, June 2009.
    • (2009) IEEE Trans. Inform. Forensics and Security , vol.4 , Issue.2 , pp. 242-256
    • Popovski, P.1    Simeone, O.2
  • 4
    • 85032613550 scopus 로고    scopus 로고
    • Secure resource allocation for OFDMa two-way relay wireless sensor networks without and with cooperative jamming
    • H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. Leung, "Secure resource allocation for OFDMa two-way relay wireless sensor networks without and with cooperative jamming, " accepted by IEEE Trans. Industrial Inf., 2015.
    • (2015) IEEE Trans. Industrial Inf.
    • Zhang, H.1    Xing, H.2    Cheng, J.3    Nallanathan, A.4    Leung, V.5
  • 5
    • 84896908427 scopus 로고    scopus 로고
    • Max-ratio relay selection in secure buffer-aided cooperative wireless networks
    • Apr.
    • G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Max-ratio relay selection in secure buffer-aided cooperative wireless networks, " IEEE Trans. Inform. Forensics and Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
    • (2014) IEEE Trans. Inform. Forensics and Security , vol.9 , Issue.4 , pp. 719-729
    • Chen, G.1    Tian, Z.2    Gong, Y.3    Chen, Z.4    Chambers, J.A.5
  • 6
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel, " IEEE Trans. Information Theory, vol. 55, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Information Theory , vol.55 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 7
    • 70350706020 scopus 로고    scopus 로고
    • The capacity region of the degraded multiple-input multiple-output compound broadcast channel
    • Nov.
    • H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel, " IEEE Trans. Inf. Theory, vol. 55, pp. 5011-5023, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , pp. 5011-5023
    • Weingarten, H.1    Liu, T.2    Shamai, S.3    Steinberg, Y.4    Viswanath, P.5
  • 8
    • 84922811042 scopus 로고    scopus 로고
    • Physical layer network security in the full-duplex relay system
    • Apr.
    • G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system, " IEEE Trans. Inform. Forensics and Security, vol. 10, no. 3, pp. 574-583, Apr. 2015.
    • (2015) IEEE Trans. Inform. Forensics and Security , vol.10 , Issue.3 , pp. 574-583
    • Chen, G.1    Gong, Y.2    Xiao, P.3    Chambers, J.A.4
  • 12
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • July, Canada, Toronto
    • M. Haenggi, "The secrecy graph and some of its properties, " in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, pp. 539-543, July 2008.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 539-543
    • Haenggi, M.1
  • 13
    • 62949215603 scopus 로고    scopus 로고
    • Physical-layer security in stochastic wireless networks
    • Nov., Guangzhou, China
    • P. C. Pinto, J. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks, " in Proc. IEEE Int. Conf. Commun. Syst., Guangzhou, China, pp. 974-979, Nov. 2008.
    • (2008) Proc. IEEE Int. Conf. Commun. Syst. , pp. 974-979
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 14
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks, " IEEE Transactions on Wireless Communications, vol. 10, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjorungnes, A.4
  • 15
    • 84901335099 scopus 로고    scopus 로고
    • Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
    • May
    • G. Geraci, S. Singh, J. G. Andrews, J. Yuan, and I. B. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers, " IEEE Trans. on Wireless Commun., vol. 13, pp. 2931-2943, May 2014.
    • (2014) IEEE Trans. on Wireless Commun. , vol.13 , pp. 2931-2943
    • Geraci, G.1    Singh, S.2    Andrews, J.G.3    Yuan, J.4    Collings, I.B.5
  • 16
    • 84906228732 scopus 로고    scopus 로고
    • On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
    • Aug.
    • T. X. Zheng, H. M. Wang, and Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers, " IEEE Commun. Lett., vol. 18, pp. 1299-1302, Aug. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , pp. 1299-1302
    • Zheng, T.X.1    Wang, H.M.2    Yin, Q.3
  • 17
    • 80051955278 scopus 로고    scopus 로고
    • Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers
    • June
    • M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers, " in Communications Workshops (ICC), 2011 IEEE International Conference on, pp. 1-5, June 2011.
    • (2011) Communications Workshops (ICC), 2011 IEEE International Conference on , pp. 1-5
    • Ghogho, M.1    Swami, A.2
  • 18
    • 84960156001 scopus 로고    scopus 로고
    • Multiantenna transmission with artificial noise against randomly distributed eavesdroppers
    • Nov.
    • T. X. Zheng, H. M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multiantenna transmission with artificial noise against randomly distributed eavesdroppers, " IEEE Trans. on Commun., vol. 63, pp. 4347-4362, Nov. 2015.
    • (2015) IEEE Trans. on Commun. , vol.63 , pp. 4347-4362
    • Zheng, T.X.1    Wang, H.M.2    Yuan, J.3    Towsley, D.4    Lee, M.H.5
  • 19
    • 84896850363 scopus 로고    scopus 로고
    • Applications of self-interference cancellation in 5G and beyond
    • Feb.
    • S. Hong, J. Brand, J. Choi, M. Jain, J. Mehlman, S. Katti, and P. Levis, "Applications of self-interference cancellation in 5G and beyond, " IEEE Commun. Magazine, vol. 52, no. 2, pp. 114-121, Feb. 2014.
    • (2014) IEEE Commun. Magazine , vol.52 , Issue.2 , pp. 114-121
    • Hong, S.1    Brand, J.2    Choi, J.3    Jain, M.4    Mehlman, J.5    Katti, S.6    Levis, P.7
  • 20
    • 84887058800 scopus 로고    scopus 로고
    • Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
    • Nov.
    • X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks, " IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1802-1814, Nov. 2013.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , pp. 1802-1814
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 21
    • 84929327918 scopus 로고    scopus 로고
    • Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
    • May
    • C. Wang, H. M. Wang, X. G. Xia, and C. Liu, "Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, " IEEE Transactions on Wireless Communications, vol. 14, pp. 2596-2612, May 2015.
    • (2015) IEEE Transactions on Wireless Communications , vol.14 , pp. 2596-2612
    • Wang, C.1    Wang, H.M.2    Xia, X.G.3    Liu, C.4
  • 22
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
    • June
    • X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels, " IEEE Transactions on Vehicular Technology, vol. 62, pp. 2170-2181, June 2013.
    • (2013) IEEE Transactions on Vehicular Technology , vol.62 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 23
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-part I: Connectivity
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-part I: Connectivity, " IEEE Trans. Inf. Forensics and Security, vol. 7, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics and Security , vol.7 , pp. 125-138
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 25
    • 84930677102 scopus 로고    scopus 로고
    • 5G cellular: Key enabling technologies and research challenges
    • June
    • E. Hossain and M. Hasan, "5G cellular: key enabling technologies and research challenges, " IEEE Instrumentation Measurement Magazine, vol. 18, pp. 11-21, June 2015.
    • (2015) IEEE Instrumentation Measurement Magazine , vol.18 , pp. 11-21
    • Hossain, E.1    Hasan, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.