메뉴 건너뛰기




Volumn 4, Issue , 2016, Pages 5607-5623

Adaptive Base Station Cooperation for Physical Layer Security in Two-Cell Wireless Networks

Author keywords

adaptive secure transmission; cooperative jamming; Physical layer security; secrecy rate maximization; security protection

Indexed keywords

BASE STATIONS; CHANNEL STATE INFORMATION; JAMMING; NETWORK LAYERS; QUALITY OF SERVICE; TRANSMISSIONS; WIRELESS NETWORKS;

EID: 85027694554     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2016.2605918     Document Type: Article
Times cited : (27)

References (49)
  • 1
    • 84962332990 scopus 로고    scopus 로고
    • A time efficient tag identification algorithm using dual prefix probe scheme (DPPS)
    • Mar.
    • J. Su, Z. Sheng, G. Wen, and V. C. M. Leung, "A time efficient tag identification algorithm using dual prefix probe scheme (DPPS)," IEEE Signal Process. Lett., vol. 23, no. 3, pp. 386-389, Mar. 2016.
    • (2016) IEEE Signal Process. Lett. , vol.23 , Issue.3 , pp. 386-389
    • Su, J.1    Sheng, Z.2    Wen, G.3    Leung, V.C.M.4
  • 2
    • 84927712570 scopus 로고    scopus 로고
    • Safeguarding 5G wireless communication networks using physical layer security
    • Apr.
    • N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 20-27
    • Yang, N.1    Wang, L.2    Geraci, G.3    Elkashlan, M.4    Yuan, J.5    Di Renzo, M.6
  • 3
    • 0032164539 scopus 로고    scopus 로고
    • Cryptographic design vulnerabilities
    • Sep.
    • B. Schneier, "Cryptographic design vulnerabilities," Computer, vol. 31, no. 9, pp. 29-33, Sep. 1998.
    • (1998) Computer , vol.31 , Issue.9 , pp. 29-33
    • Schneier, B.1
  • 4
    • 84867877630 scopus 로고    scopus 로고
    • Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
    • Nov.
    • A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures," Proc. IEEE, vol. 100, no. 11, pp. 3056-3076, Nov. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.11 , pp. 3056-3076
    • Barenghi, A.1    Breveglieri, L.2    Koren, I.3    Naccache, D.4
  • 5
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • Aug.
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
    • (2014) IEEE Commun. Surveys Tut. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 8
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Labs Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 9
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 11
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 12
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 13
    • 84924814210 scopus 로고    scopus 로고
    • A cross-layer secure communication model based on discrete fractional fourier transform (DFRFT)
    • Mar.
    • H. Wen et al., "A cross-layer secure communication model based on discrete fractional Fourier transform (DFRFT)" IEEE Trans. Emerg. Topics Comput., vol. 3, no. 1, pp. 119-126, Mar. 2015.
    • (2015) IEEE Trans. Emerg. Topics Comput. , vol.3 , Issue.1 , pp. 119-126
    • Wen, H.1
  • 14
    • 84903279448 scopus 로고    scopus 로고
    • Achieving secure communications over wiretap channels via security codes from resilient functions
    • Jun.
    • H. Wen, P.-H. Ho, and B. Wu, "Achieving secure communications over wiretap channels via security codes from resilient functions," IEEE Wire-less Commun. Lett., vol. 3, no. 3, pp. 273-276, Jun. 2014.
    • (2014) IEEE Wire-less Commun. Lett. , vol.3 , Issue.3 , pp. 273-276
    • Wen, H.1    Ho, P.-H.2    Wu, B.3
  • 15
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 16
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 17
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 18
    • 84921405314 scopus 로고    scopus 로고
    • Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. Artificial fast fading
    • Jan.
    • H.-M. Wang, T.-X. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94-106, Jan. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.1 , pp. 94-106
    • Wang, H.-M.1    Zheng, T.-X.2    Xia, X.-G.3
  • 19
    • 84883698532 scopus 로고    scopus 로고
    • On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
    • Sep.
    • P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1728-1740
    • Lin, P.-H.1    Lai, S.-H.2    Lin, S.-C.3    Su, H.-J.4
  • 20
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels
    • Jun.
    • X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 21
    • 84921324940 scopus 로고    scopus 로고
    • Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint
    • Jan.
    • B. Wang, P. Mu, and Z. Li, "Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint," IEEE Commun. Lett., vol. 19, no. 1, pp. 18-21, Jan. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.1 , pp. 18-21
    • Wang, B.1    Mu, P.2    Li, Z.3
  • 22
    • 85027679625 scopus 로고    scopus 로고
    • Associating MIMO beamforming with security codes to achieve unconditional communication security
    • Aug.
    • J. Tang et al., "Associating MIMO beamforming with security codes to achieve unconditional communication security," IET Commun., vol. 10, no. 12, pp. 1522-1531, Aug. 2016.
    • (2016) IET Commun. , vol.10 , Issue.12 , pp. 1522-1531
    • Tang, J.1
  • 23
    • 84960156001 scopus 로고    scopus 로고
    • Multiantenna transmission with artificial noise against randomly distributed eavesdroppers
    • Nov.
    • T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multiantenna transmission with artificial noise against randomly distributed eavesdroppers," IEEE Trans. Commun., vol. 63, no. 11, pp. 4347-4362, Nov. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.11 , pp. 4347-4362
    • Zheng, T.-X.1    Wang, H.-M.2    Yuan, J.3    Towsley, D.4    Lee, M.H.5
  • 24
    • 85027039668 scopus 로고    scopus 로고
    • Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers
    • T.-X. Zheng and H.-M. Wang, "Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers," IEEE Trans. Veh. Technol., 2016, doi: 10.1109/TVT.2015.2513003.
    • (2016) IEEE Trans. Veh. Technol.
    • Zheng, T.-X.1    Wang, H.-M.2
  • 25
    • 85032751357 scopus 로고    scopus 로고
    • Cooperative security at the physical layer: A summary of recent advances
    • Sep.
    • R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 16-28
    • Bassily, R.1
  • 26
    • 84961815117 scopus 로고    scopus 로고
    • Physical layer security in wireless cooperative relay networks: State of the art and beyond
    • Dec.
    • L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, "Physical layer security in wireless cooperative relay networks: State of the art and beyond," IEEE Commun. Mag., vol. 53, no. 12, pp. 32-39, Dec. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 32-39
    • Rodriguez, L.J.1    Tran, N.H.2    Duong, T.Q.3    Le-Ngoc, T.4    Elkashlan, M.5    Shetty, S.6
  • 27
    • 84961793621 scopus 로고    scopus 로고
    • Enhancing wireless secrecy via cooperation: Signal design and optimization
    • Dec.
    • H.-M. Wang and X.-G. Xia, "Enhancing wireless secrecy via cooperation: Signal design and optimization," IEEE Commun. Mag., vol. 53, no. 12, pp. 47-53, Dec. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 47-53
    • Wang, H.-M.1    Xia, X.-G.2
  • 28
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Pro-cess., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Pro-cess. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 29
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no Eavesdropper's CSI
    • Jan.
    • H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 30
    • 84953721841 scopus 로고    scopus 로고
    • Secure green communication for amplify-and-forward relaying with eavesdroppers
    • Jun.
    • D. Wang, B. Bai, W. Chen, and Z. Han, "Secure green communication for amplify-and-forward relaying with eavesdroppers," in Proc. IEEE ICC, Jun. 2015, pp. 4468-4473.
    • (2015) Proc. IEEE ICC , pp. 4468-4473
    • Wang, D.1    Bai, B.2    Chen, W.3    Han, Z.4
  • 31
    • 84930197364 scopus 로고    scopus 로고
    • Outage constrained secrecy throughput maximization for DF relay networks
    • May
    • T. X. Zheng, H. M. Wang, F. Liu, and M. H. Lee, "Outage constrained secrecy throughput maximization for DF relay networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1741-1755, May 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.5 , pp. 1741-1755
    • Zheng, T.X.1    Wang, H.M.2    Liu, F.3    Lee, M.H.4
  • 32
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Feb.
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 33
    • 84920830630 scopus 로고    scopus 로고
    • Secrecy transmission with a helper: To relay or to jam
    • Feb.
    • H. Deng, H. M. Wang, W. Guo, and W. Wang, "Secrecy transmission with a helper: To relay or to jam," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.2 , pp. 293-307
    • Deng, H.1    Wang, H.M.2    Guo, W.3    Wang, W.4
  • 34
    • 84893471921 scopus 로고    scopus 로고
    • Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law
    • Feb.
    • J. H. Lee and W. Choi, "Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 828-839, Feb. 2014.
    • (2014) IEEE Trans. Signal Process , vol.62 , Issue.4 , pp. 828-839
    • Lee, J.H.1    Choi, W.2
  • 35
    • 84959206189 scopus 로고    scopus 로고
    • Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint
    • Dec.
    • P. Mu, X. Hu, B. Wang, and Z. Li, "Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint," IEEE Commun. Lett., vol. 19, no. 12, pp. 2174-2177, Dec. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.12 , pp. 2174-2177
    • Mu, P.1    Hu, X.2    Wang, B.3    Li, Z.4
  • 36
    • 84929327918 scopus 로고    scopus 로고
    • Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
    • May
    • C. Wang, H. M. Wang, X. G. Xia, and C. Liu, "Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2596-2612, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2596-2612
    • Wang, C.1    Wang, H.M.2    Xia, X.G.3    Liu, C.4
  • 37
    • 84929359010 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
    • May
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.5 , pp. 1833-1847
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.5
  • 38
    • 84981303335 scopus 로고    scopus 로고
    • Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming
    • May
    • L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, "Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming," in Proc. IEEE ICC, May 2016, pp. 1-5.
    • (2016) Proc. IEEE ICC , pp. 1-5
    • Hu, L.1    Wu, B.2    Tang, J.3    Pan, F.4    Wen, H.5
  • 39
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 40
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 41
    • 85027407300 scopus 로고    scopus 로고
    • Mode selection in MU-MIMO downlink networks: A physical-layer security perspective
    • X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical-layer security perspective," IEEE Syst. J., 2015, doi: 10.1109/JSYST.2015.2413843.
    • (2015) IEEE Syst. J.
    • Chen, X.1    Zhang, Y.2
  • 42
    • 84959543225 scopus 로고    scopus 로고
    • Base station cooperation for confidential broadcasting in multi-cell networks
    • Oct.
    • B. He, N. Yang, X. Zhou, and J. Yuan, "Base station cooperation for confidential broadcasting in multi-cell networks," IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5287-5299, Oct. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.10 , pp. 5287-5299
    • He, B.1    Yang, N.2    Zhou, X.3    Yuan, J.4
  • 43
    • 79952846257 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
    • Apr.
    • E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 2083-2114
    • Ekrem, E.1    Ulukus, S.2
  • 44
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 45
    • 84867619190 scopus 로고    scopus 로고
    • Detecting passive eavesdroppers in the MIMO wiretap channel
    • Mar.
    • A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel," in Proc. IEEE ICASSP, Mar. 2012, pp. 2809-2812.
    • (2012) Proc. IEEE ICASSP , pp. 2809-2812
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 47
    • 79951647261 scopus 로고    scopus 로고
    • Optimal beamforming in interference networks with perfect local channel information
    • Mar.
    • R. Mochaourab and E. A. Jorswieck, "Optimal beamforming in interference networks with perfect local channel information," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1128-1141, Mar. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1128-1141
    • Mochaourab, R.1    Jorswieck, E.A.2
  • 48
    • 78649738324 scopus 로고    scopus 로고
    • Multi-cell MIMO cooperative networks: A new look at interference
    • Dec.
    • D. Gesbert, S. Hanly, H. Huang, S. S. Shitz, O. Simeone, and W. Yu, "Multi-cell MIMO cooperative networks: A new look at interference," IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1380-1408, Dec. 2010.
    • (2010) IEEE J. Sel. Areas Commun. , vol.28 , Issue.9 , pp. 1380-1408
    • Gesbert, D.1    Hanly, S.2    Huang, H.3    Shitz, S.S.4    Simeone, O.5    Yu, W.6
  • 49


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.