메뉴 건너뛰기




Volumn 66, Issue 5, 2017, Pages 4059-4072

Secure multiantenna cognitive wiretap networks

Author keywords

Cognitive radio; Full duplex (FD); Multiple antennas; Physical layer security

Indexed keywords

COMPLEX NETWORKS; DIGITAL TELEVISION; FADING (RADIO); FINITE DIFFERENCE METHOD; JAMMING; NETWORK LAYERS; RAYLEIGH FADING;

EID: 85017576898     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2016.2609396     Document Type: Review
Times cited : (29)

References (36)
  • 2
    • 84919627978 scopus 로고    scopus 로고
    • CognitiveMIMOrelaying networks with primary user's interference and outdated channel state information
    • Dec.
    • Y. Huang, F. S. Al-Qahtani, C. Zhong, Q. Wu, J. Wang, and H. M. Alnuweiri, "CognitiveMIMOrelaying networks with primary user's interference and outdated channel state information," IEEE Trans. Commun., vol. 62, no. 12, pp. 4241-4254, Dec. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.12 , pp. 4241-4254
    • Huang, Y.1    Al-Qahtani, F.S.2    Zhong, C.3    Wu, Q.4    Wang, J.5    Alnuweiri, H.M.6
  • 3
    • 84893384946 scopus 로고    scopus 로고
    • Multi-user andmulti-relay cognitive radio networks under spectrum sharing constraints
    • Jan.
    • F. R. V. Guimaraes, D. B. da Costa, T. A. Tsiftsis, and C. C. Cavalcante, "Multi-user andmulti-relay cognitive radio networks under spectrum sharing constraints," IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 433-439, Jan. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.1 , pp. 433-439
    • Guimaraes, F.R.V.1    Da Costa, D.B.2    Tsiftsis, T.A.3    Cavalcante, C.C.4
  • 4
    • 84907199198 scopus 로고    scopus 로고
    • Cognitive MIMO relay networks with generalized selection combining
    • Sep.
    • Y. Deng, M. Elkashlan, P. L. Yeoh, N. Yang, and R. K. Mallik, "Cognitive MIMO relay networks with generalized selection combining," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4911-4922, Sep. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.9 , pp. 4911-4922
    • Deng, Y.1    Elkashlan, M.2    Yeoh, P.L.3    Yang, N.4    Mallik, R.K.5
  • 5
    • 84925061290 scopus 로고    scopus 로고
    • Generalized selection combining for cognitive relay networks over Nakagami-m fading
    • Apr.
    • Y. Deng, L. Wang, M. Elkashlan, K. J. Kim, and T. Q. Duong, "Generalized selection combining for cognitive relay networks over Nakagami-m fading," IEEE Trans. Signal Process., vol. 63, no. 8, pp. 1993-2006, Apr. 2015.
    • (2015) IEEE Trans. Signal Process. , vol.63 , Issue.8 , pp. 1993-2006
    • Deng, Y.1    Wang, L.2    Elkashlan, M.3    Kim, K.J.4    Duong, T.Q.5
  • 6
    • 54849430727 scopus 로고    scopus 로고
    • Identitybased key management in mobile ad hoc networks: Techniques and applications
    • Oct.
    • E. Silva, A. Dos Santos, L. C. P. Albini, and M. N. Lima, "Identitybased key management in mobile ad hoc networks: Techniques and applications," IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.15 , Issue.5 , pp. 46-52
    • Silva, E.1    Dos Santos, A.2    Albini, L.C.P.3    Lima, M.N.4
  • 7
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.-C.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 11
    • 80051744719 scopus 로고    scopus 로고
    • On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity
    • Sep.
    • V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity," IEEE Trans. Inform Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
    • (2011) IEEE Trans. Inform Forensics Security , vol.6 , Issue.3 , pp. 853-860
    • Prabhu, V.U.1    Rodrigues, M.R.D.2
  • 12
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • Jan.
    • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Yeoh, P.L.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 13
    • 85012982024 scopus 로고    scopus 로고
    • Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks
    • to be published
    • H. Zhao, Y. Tan, G. Pan, Y. Chen, and N. Yang, "Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks," IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2529704.
    • IEEE Trans. Veh. Technol.
    • Zhao, H.1    Tan, Y.2    Pan, G.3    Chen, Y.4    Yang, N.5
  • 14
    • 85015765643 scopus 로고    scopus 로고
    • Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over Nakagamim channels
    • to be published
    • H. Lei et al., "Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over Nakagamim channels," IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2574315.
    • IEEE Trans. Veh. Technol.
    • Lei, H.1
  • 15
    • 84870508360 scopus 로고    scopus 로고
    • Enhancing security in correlated channel with maximal ratio combining diversity
    • Dec.
    • M. Z. I. Sarkar and T. Ratnarajah, "Enhancing security in correlated channel with maximal ratio combining diversity," IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6745-6751, Dec. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.12 , pp. 6745-6751
    • Sarkar, M.Z.I.1    Ratnarajah, T.2
  • 16
    • 84883785476 scopus 로고    scopus 로고
    • Improving physical layer secrecy using full-duplex jamming receivers
    • Oct.
    • G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers," IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Oct. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.20 , pp. 4962-4974
    • Zheng, G.1    Krikidis, I.2    Li, J.3    Petropulu, A.P.4    Ottersten, B.5
  • 17
    • 85009386997 scopus 로고    scopus 로고
    • A full-duplex Bob in the MIMO Gaussian wiretap channel: Scheme and performance
    • Jan.
    • L. Li, Z. Chen, D. Zhang, and J. Fang, "A full-duplex Bob in the MIMO gaussian wiretap channel: Scheme and performance," IEEE Signal Process. Lett., vol. 23, no. 1, pp. 107-111, Jan. 2016.
    • (2016) IEEE Signal Process. Lett. , vol.23 , Issue.1 , pp. 107-111
    • Li, L.1    Chen, Z.2    Zhang, D.3    Fang, J.4
  • 18
    • 84990923837 scopus 로고    scopus 로고
    • On physical layer security over SIMO generalized-K fading channels
    • Sep.
    • H. Lei, C. Gao, I. S. Ansari, Y. Guo, G. Pan, and K. A. Qaraqe, "On physical layer security over SIMO generalized-K fading channels," IEEE Trans. Veh. Technol., vol. 65, no. 9, pp. 7780-7785, Sep. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.9 , pp. 7780-7785
    • Lei, H.1    Gao, C.2    Ansari, I.S.3    Guo, Y.4    Pan, G.5    Qaraqe, K.A.6
  • 20
    • 84891556729 scopus 로고    scopus 로고
    • Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers
    • Dec.
    • V. N. Q. Bao, N. L. Trung, and M. Debbah, "Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076-6085, Dec. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.12 , pp. 6076-6085
    • Bao, V.N.Q.1    Trung, N.L.2    Debbah, M.3
  • 21
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 22
    • 80052913251 scopus 로고    scopus 로고
    • Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
    • Oct.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 5013-5022
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 23
    • 84860224511 scopus 로고    scopus 로고
    • Performance of cooperative spectrum-sharing systems with amplify-and-forward relaying
    • 1295-1230 Apr.
    • V. Asghari and S. Aïssa, "Performance of cooperative spectrum-sharing systems with amplify-and-forward relaying," IEEE Trans. Wireless Commun., vol. 11, no. 4, pp. 1295-1230, Apr. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.11 , Issue.4
    • Asghari, V.1    Aïssa, S.2
  • 24
    • 84867873837 scopus 로고    scopus 로고
    • Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
    • Oct. 1628-1631
    • W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.10
    • Li, W.1    Ghogho, M.2    Chen, B.3    Xiong, C.4
  • 25
    • 84922811042 scopus 로고    scopus 로고
    • Physical layer network security in the full-duplex relay system
    • Mar.
    • G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. Inform. Forensics Security, vol. 10, no. 3, pp. 574-583, Mar. 2015.
    • (2015) IEEE Trans. Inform. Forensics Security , vol.10 , Issue.3 , pp. 574-583
    • Chen, G.1    Gong, Y.2    Xiao, P.3    Chambers, J.A.4
  • 26
    • 84899797495 scopus 로고    scopus 로고
    • Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization
    • Jul.
    • Y. Zhou, Z. Z. Xiang, Y. Zhu, and Z. Xue, "Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization," IEEE Signal Process. Lett., vol. 21, no. 7, pp. 804-808, Jul. 2014.
    • (2014) IEEE Signal Process. Lett. , vol.21 , Issue.7 , pp. 804-808
    • Zhou, Y.1    Xiang, Z.Z.2    Zhu, Y.3    Xue, Z.4
  • 27
    • 84913593877 scopus 로고    scopus 로고
    • Joint information- and jammingbeamforming for physical layer security with full duplex base station
    • Dec.
    • F. Zhu, F. Gao, M. Yao, and H. Zou, "Joint information- and jammingbeamforming for physical layer security with full duplex base station," IEEE Trans. Signal Process., vol. 62, no. 24, pp. 6391-6401, Dec. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.24 , pp. 6391-6401
    • Zhu, F.1    Gao, F.2    Yao, M.3    Zou, H.4
  • 28
    • 69349100509 scopus 로고    scopus 로고
    • On the Gaussian MIMO relay channel with full channel state information
    • Sep.
    • S. Simoens, O. Munoz-Medina, J.Vidal, andA. del Coso, "On the gaussian MIMO relay channel with full channel state information," IEEE Trans. Signal Process., vol. 57, no. 9, pp. 3588-3599, Sep. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.9 , pp. 3588-3599
    • Simoens, S.1    Munoz-Medina, O.2    Vidal, J.3    Del Coso, A.4
  • 29
    • 65749120701 scopus 로고    scopus 로고
    • Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation
    • May
    • V. R. Cadambe and S. A. Jafar, "Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation," IEEE Trans. Inform. Theory, vol. 55, no. 5, pp. 2334-2344, May 2009.
    • (2009) IEEE Trans. Inform. Theory , vol.55 , Issue.5 , pp. 2334-2344
    • Cadambe, V.R.1    Jafar, S.A.2
  • 32
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inform Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 34
    • 84939457021 scopus 로고    scopus 로고
    • Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI
    • Aug.
    • Y. Huang, F. S. Al-Qahtani, T. Q. Duong, and J. Wang, "Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI," IEEE Trans. Commun., vol. 63, no. 8, pp. 2959-2971, Aug. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.8 , pp. 2959-2971
    • Huang, Y.1    Al-Qahtani, F.S.2    Duong, T.Q.3    Wang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.