Browse > Article

차세대 무선 네트워크를 위한 물리계층 보안 기술  

Im, Sang-Hun (한국과학기술원 전기 및 전자공학부)
Yun, Sang-Seok (한국과학기술원 전기 및 전자공학부)
Park, Jeong-Uk (한국과학기술원 전기 및 전자공학부)
Ha, Jeong-Seok (한국과학기술원 전기 및 전자공학부)
Publication Information
The Magazine of the IEIE / v.42, no.10, 2015 , pp. 63-72 More about this Journal
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. V. Meter, K. M. Itoh, and T. D. Ladd. "Architecturedependent execution time of Shor's algorithm." in Proc. Int. Symp. on Mesoscopic Superconductivity and Spintronics. 2006.
2 C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949.   DOI
3 A. D. Wyner "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1255-2387, Oct. 1975.
4 S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. on Inf. Theory, vol. 23, no. 5, pp. 625-627, Sept. 1977.   DOI
5 A. Khisti and G. W. Wornell, "Secure Transmission With Multiple Antennas&-Part II: The MIMOME Wiretap Channel," IEEE Trans. on Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.   DOI
6 S. Goel and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. on Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.   DOI
7 H. Qin, X. Chen, Y. Sun, M. Zhao, and J. Wang, "Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications," IEEE Int. Conf. on Commun. Workshops (ICC) , June 2011, pp.1-5.
8 X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Trans. on Vehicular Tech., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.   DOI
9 Hu Jin, 김준수, "협력중계 시스템에서의 물리계층 보안 기술," 한국 통신학회지, 제 31권 제2호, 91-97, 2014년 2월
10 K. Lee, C. Chae, and J. Kang. "Spectrum leasing via cooperation for enhanced physical-layer secrecy," IEEE Trans. on Vehicular Tech., vol. 62, no. 9, pp. 4672-4678, June 2013.   DOI
11 H. Jeon, S. W. McLaughlin, I. Kim, and J. Ha, "Secure communications with untrusted secondary nodes in cognitive radio networks," IEEE Trans. on Wireless Commun. vol. 13, no. 4, pp. 1790-1805, Apr. 2014.   DOI
12 Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.   DOI
13 M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011.
14 X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011.   DOI
15 Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secrecy capacity region of fading broadcast channels," in Proc. IEEE Int. Symp. Information Theory, Nice, Jun. 2007, pp. 1291-1295.
16 P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Sep. 2005, pp. 2152-2155.
17 M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.   DOI
18 Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Communications, Control and Computing, Monticello, Sep. 2006, pp. 841-848.
19 P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, June 2007, pp. 1306-1310.
20 Mitola III, Joseph, and Gerald Q. Maguire Jr. "Cognitive radio: making software radios more personal," IEEE Personal Commun., vol. 6. no. 4, pp. 13-18, Aug. 1999.   DOI
21 I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.   DOI
22 Y. Wu, and K. J. Liu. "An information secrecy game in cognitive radio networks," IEEE Trans. Inform. Forensics and Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.   DOI
23 I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.   DOI