차세대 무선 네트워크를 위한 물리계층 보안 기술 |
Im, Sang-Hun
(한국과학기술원 전기 및 전자공학부)
Yun, Sang-Seok (한국과학기술원 전기 및 전자공학부) Park, Jeong-Uk (한국과학기술원 전기 및 전자공학부) Ha, Jeong-Seok (한국과학기술원 전기 및 전자공학부) |
1 | R. V. Meter, K. M. Itoh, and T. D. Ladd. "Architecturedependent execution time of Shor's algorithm." in Proc. Int. Symp. on Mesoscopic Superconductivity and Spintronics. 2006. |
2 | C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949. DOI |
3 | A. D. Wyner "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1255-2387, Oct. 1975. |
4 | S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. on Inf. Theory, vol. 23, no. 5, pp. 625-627, Sept. 1977. DOI |
5 | A. Khisti and G. W. Wornell, "Secure Transmission With Multiple Antennas&-Part II: The MIMOME Wiretap Channel," IEEE Trans. on Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. DOI |
6 | S. Goel and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. on Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. DOI |
7 | H. Qin, X. Chen, Y. Sun, M. Zhao, and J. Wang, "Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications," IEEE Int. Conf. on Commun. Workshops (ICC) , June 2011, pp.1-5. |
8 | X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Trans. on Vehicular Tech., vol. 59, no. 8, pp. 3831-3842, Oct. 2010. DOI |
9 | Hu Jin, 김준수, "협력중계 시스템에서의 물리계층 보안 기술," 한국 통신학회지, 제 31권 제2호, 91-97, 2014년 2월 |
10 | K. Lee, C. Chae, and J. Kang. "Spectrum leasing via cooperation for enhanced physical-layer secrecy," IEEE Trans. on Vehicular Tech., vol. 62, no. 9, pp. 4672-4678, June 2013. DOI |
11 | H. Jeon, S. W. McLaughlin, I. Kim, and J. Ha, "Secure communications with untrusted secondary nodes in cognitive radio networks," IEEE Trans. on Wireless Commun. vol. 13, no. 4, pp. 1790-1805, Apr. 2014. DOI |
12 | Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009. DOI |
13 | M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011. |
14 | X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011. DOI |
15 | Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secrecy capacity region of fading broadcast channels," in Proc. IEEE Int. Symp. Information Theory, Nice, Jun. 2007, pp. 1291-1295. |
16 | P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Sep. 2005, pp. 2152-2155. |
17 | M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. DOI |
18 | Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Communications, Control and Computing, Monticello, Sep. 2006, pp. 841-848. |
19 | P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, June 2007, pp. 1306-1310. |
20 | Mitola III, Joseph, and Gerald Q. Maguire Jr. "Cognitive radio: making software radios more personal," IEEE Personal Commun., vol. 6. no. 4, pp. 13-18, Aug. 1999. DOI |
21 | I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008. DOI |
22 | Y. Wu, and K. J. Liu. "An information secrecy game in cognitive radio networks," IEEE Trans. Inform. Forensics and Security, vol. 6, no. 3, pp. 831-842, Sep. 2011. DOI |
23 | I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013. DOI |