Asymptotically Optimal Cooperative Jamming for Physical Layer Security |
Yang, Jun
(Department of Statistical Sciences, University of Toronto)
Salari, Soheil (Department of Electrical and Computer Engineering, Queen's University) Kim, Il-Min (Department of Electrical and Computer Engineering, Queen's University) Kim, Dong In (School of Information and Communication Engineering, Sungkyunkwan University (SKKU)) Kim, Seokki (Electronics and Telecommunications Research Institute (ETRI)) Lim, Kwangae (Electronics and Telecommunications Research Institute (ETRI)) |
1 | L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010. DOI |
2 | A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, Nice, France, Apr. 2010, pp. 1-5. |
3 | G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. DOI |
4 | E. A. Jorswieck, "Secrecy capacity of single- and multi-antenna channels with simple helpers," in Proc. IEEE SCC, Nice, France, Apr. 2007, pp. 931-935. |
5 | M. Lai, X. Lifeng, and H. El Gamal, "Cooperative secrecy: The relayeavesdropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Apr. 2007, pp. 931-935. |
6 | J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011. DOI |
7 | A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975. DOI |
8 | S. Leung-Yan-Cheong, andM. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978. DOI |
9 | E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008. DOI |
10 | R. Liu, I. Maric, P. Spasojevic, and R. D. Yates,"Discrete memoryless interference and broadcast channels With confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008. DOI |
11 | X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE Information Theory Workshop, Porto, Portugal, Apr. 2008, pp. 164-168. |
12 | D. Tse and V. Pramod, Fundamentals of wireless communication, Harvard: Cambridge Univ. Press, 2005. |
13 | S. Goel and R. Negi, "Obtaining secrecy through intentional uncertainty," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 2. |
14 | X. He and A. Yender, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 4. |
15 | I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978. DOI |
16 | S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. DOI |
17 | F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, 2008, pp. 524-528. |
18 | T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009. DOI |
19 | Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control, and Computing, 2007. |
20 | S. Boyd and L. Vandenberghe, Convex optimization, Harvard: Cambridge Univ. Press, 2004. |
21 | A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: TheMIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. DOI |
22 | J. Yang, I. M. Kim, and D. I. Kim,"Joint design of optimal cooperative jamming and power allocation for linear precoding," IEEE Trans. Commun., vol. 62, no. 9, pp. 3285-3298, Sept. 2014. DOI |
23 | J. Yang, I. M. Kim, and D. I. Kim,"Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, June 2013. DOI |
24 | J. Nocedal and J. Stephen, Securing wireless communications at the physical layer, New York: Springer, 2000. |
25 | M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 2840-2852, July 2014. |
26 | A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010. DOI |
![]() |