메뉴 건너뛰기




Volumn 12, Issue 9, 2017, Pages 2052-2066

Multi-Terminal Two-Hop Untrusted-Relay Networks with Hierarchical Security Guarantees

Author keywords

cooperative jamming; levels of security clearance; two hop communications; Untrusted relays

Indexed keywords

COOPERATIVE COMMUNICATION; DECODING; GAUSSIAN NOISE (ELECTRONIC); JAMMING; RELAY CONTROL SYSTEMS; STOCHASTIC SYSTEMS; TESTBEDS;

EID: 85028337438     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2017.2695163     Document Type: Article
Times cited : (12)

References (23)
  • 1
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective, " IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 2
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Jun
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages, " in Proc. Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 926-930.
    • (2007) Proc. Int. Symp. Inf. Theory (ISIT) , pp. 926-930
    • Oohama, Y.1
  • 3
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • Dec
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay, " EURASIP J. Wireless Commun. Netw., vol. 2009, p. 305146, Dec. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw , vol.2009 , pp. 305146
    • He, X.1    Yener, A.2
  • 4
    • 84873099749 scopus 로고    scopus 로고
    • End-To-end secure multi-hop communication with untrusted relays
    • Jan
    • X. He and A. Yener, "End-To-end secure multi-hop communication with untrusted relays, " IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, Jan. 2013.
    • (2013) IEEE Trans. Wireless Commun , vol.12 , Issue.1 , pp. 1-11
    • He, X.1    Yener, A.2
  • 5
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels, " IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 6
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system, " IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.3
  • 7
    • 84871819283 scopus 로고    scopus 로고
    • Strong secrecy and reliable byzantine detection in the presence of an untrusted relay
    • Jan
    • X. He and A. Yener, "Strong secrecy and reliable byzantine detection in the presence of an untrusted relay, " IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.1 , pp. 177-192
    • He, X.1    Yener, A.2
  • 8
    • 84890393802 scopus 로고    scopus 로고
    • Lattice coding for strongly secure compute-And-forward in a bidirectional relay
    • V. Shashank and N. Kashyap, "Lattice coding for strongly secure compute-And-forward in a bidirectional relay, " in Proc. Int. Symp. Inf. Theory (ISIT), 2013, pp. 2775-2779.
    • (2013) Proc. Int. Symp. Inf. Theory (ISIT , pp. 2775-2779
    • Shashank, V.1    Kashyap, N.2
  • 9
    • 84938924365 scopus 로고    scopus 로고
    • Secure transmission using an untrusted relay with scaled compute-And-forward
    • Z. Ren, J. Goseling, J. H. Weber, and M. Gastpar, "Secure transmission using an untrusted relay with scaled compute-And-forward, " in Proc. Inf. Theory Workshop (ITW), 2015, pp. 1-5.
    • (2015) Proc. Inf. Theory Workshop (ITW , pp. 1-5
    • Ren, Z.1    Goseling, J.2    Weber, J.H.3    Gastpar, M.4
  • 10
    • 84929346934 scopus 로고    scopus 로고
    • The multiple access channel with an untrusted relay
    • A. A. Zewail and A. Yener, "The multiple access channel with an untrusted relay, " in Proc. Inf. Theory Workshop (ITW), 2014, pp. 25-29.
    • (2014) Proc. Inf. Theory Workshop (ITW , pp. 25-29
    • Zewail, A.A.1    Yener, A.2
  • 11
    • 84879973839 scopus 로고    scopus 로고
    • One-receiver two-eavesdropper broadcast channel with degraded message sets
    • Jul
    • S. Salehkalaibar, M. Mirmohseni, and M. R. Aref, "One-receiver two-eavesdropper broadcast channel with degraded message sets, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1162-1172, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.7 , pp. 1162-1172
    • Salehkalaibar, S.1    Mirmohseni, M.2    Aref, M.R.3
  • 13
    • 85027329503 scopus 로고    scopus 로고
    • Gaussian multiple access via compute-Andforward
    • J. Zhu and M. Gastpar, "Gaussian multiple access via compute-Andforward, " IEEE Trans. Inf. Theory, vol. 63, no. 5, pp. 2678-2695, 2017.
    • (2017) IEEE Trans. Inf. Theory , vol.63 , Issue.5 , pp. 2678-2695
    • Zhu, J.1    Gastpar, M.2
  • 15
    • 84962640362 scopus 로고    scopus 로고
    • The two-hop interference untrustedrelay channel with confidential messages
    • Oct
    • A. A. Zewail and A. Yener, "The two-hop interference untrustedrelay channel with confidential messages, " in Proc. Inf. Theory Workshop (ITW), Oct. 2015, pp. 322-326.
    • (2015) Proc. Inf. Theory Workshop (ITW) , pp. 322-326
    • Zewail, A.A.1    Yener, A.2
  • 16
    • 0016562514 scopus 로고
    • The wire-Tap channel
    • A. D. Wyner, "The wire-Tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 17
    • 0018523303 scopus 로고
    • Capacity theorems for the relay channel
    • Sep
    • T. M. Cover and A. A. El Gamal, "Capacity theorems for the relay channel, " IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.5 , pp. 572-584
    • Cover, T.M.1    El Gamal, A.A.2
  • 18
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-Access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-Access and two-way wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 21
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel, " IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 22
    • 84896958699 scopus 로고    scopus 로고
    • Providing secrecy with structured codes: Twouser Gaussian channels
    • Apr
    • X. He and A. Yener, "Providing secrecy with structured codes: Twouser Gaussian channels, " IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, Apr. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.4 , pp. 2121-2138
    • He, X.1    Yener, A.2
  • 23
    • 33947397919 scopus 로고    scopus 로고
    • Capacity with causal and noncausal side information: A unified view
    • Dec
    • S. Jafar, "Capacity with causal and noncausal side information: A unified view, " IEEE Trans. Inf. Theory, vol. 52, no. 12, pp. 5468-5474, Dec. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.12 , pp. 5468-5474
    • Jafar, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.