Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming
![]() ![]() |
Guan, Xinrong
(Department of Wireless Communications, PLA University of Science and Technology)
Cai, Yueming (Department of Wireless Communications, PLA University of Science and Technology) Yang, Weiwei (Department of Wireless Communications, PLA University of Science and Technology) Cheng, Yunpeng (Department of Wireless Communications, PLA University of Science and Technology) Hu, Junquan (Department of Wireless Communications, PLA University of Science and Technology) |
1 | A. D. Wyner, "The Wire-tap Channel," Bell Syst. Technology Journal, vol.54, no.8, pp.1355-1387, Jan.1975. DOI ScienceOn |
2 | S. K. Leung-Yan-Cheong and M. E. Hellman, "The gaussian wiretap channel," IEEE Transactions Information Theory, vol.24, pp.451-456, Jul.1978. DOI |
3 | Hong Wen and Pin-Han Ho, "Physical layer technique to assist authentication based on PKI for Vehicular communication networks," KSII Trans. on Internet and information systems, vol.5, no.2, pp.440-456, Feb.2011. |
4 | F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. of IEEE International Symposium on Information Theory, pp.524-528, Jul.2008. Article (CrossRef Link). |
5 | H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," IEEE Communication Letters, vol.12, no.5, pp.386-388, 2008. |
6 | A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas—Part I: The MISOME Wiretap Channel," IEEE Transactions on Information Theory, vol.56, no.7, pp.3088-3104, 2009. |
7 | S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 Channel," IEEE Transactions on Information Theory, vol.55, no.9, pp.4033-4039, 2009. |
8 | Oussama Souihli and Tomoaki Ohtsuki, "The two-way MIMO wire-tap channel," in Proc. of IEEE International Conference on Communication, pp.1-6, Jun.2009. |
9 | A Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME Wiretap Channel," IEEE Transactions on Information Theory, vol.56, no.11, pp.5515-5532, 2010. DOI |
10 | L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. of 46th Annual Allerton Conference Commuication, Control, and Computing, pp.1132-1138, Sep.2008. |
11 | L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. of IEEE Intl Conference Acoust. Speech Signal Processing, pp.2613-2616, Apr.2009. |
12 | J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. of the IEEE International Conference on Communication (ICC), pp.1-5, May.2010. Article (CrossRef Link). |
13 | J. Zhang and M. C. Gursory, "Relay beamforming strategies for physical layer security," in Proc. of 44th Annual Conference on Information Sciences and Systems, pp.1-6, Mar.2010. Article (CrossRef Link). |
14 | L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperative relays," IEEE Transactions on Signal Processing, vol.58, no.3, pp.1875-1888, Mar.2010. DOI |
15 | S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol.7, no.6, pp.2180-2189, Jun.2008. DOI |
16 | J. Zhu, J. Mo, and M. Tao, "Cooperative secret communication with artificial noise in symmetric interference channel," IEEE Communications Letters, vol.14, no.10, Oct.2010. Article (CrossRef Link). |
17 | M. Bloch, J. O. Barrors, M. R. D. Rodrigues, and S. W. Mclaughlin, "Wireless information-theoretical security," IEEE Transactions on Information Theory, vol.54, no.6, pp.2515-25, Jun.2008. DOI |
18 | R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. of IEEE GLOBECOM, pp.1-6, Dec.6-10, 2010. |
19 | L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security", in Proc. of IEEE SSP, pp.417-420, Aug.2009. |
![]() |