Browse > Article

협력중계 시스템에서의 물리계층 보안 기술  

Jin, Hu (경상대학교)
Kim, Jun-Su (한국산업기술대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Dec. 2010.
2 A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, June 2010, p. 1.
3 A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.   DOI   ScienceOn
4 I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints,"IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010.   DOI   ScienceOn
5 I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.   DOI   ScienceOn
6 J. Kim, A. Ikhlef, and R. Schober, "Combined relay selection and cooperative Beamforming for physical layer security," J. Commun. Netw., vol. 14, no. 14, Aug. 2012.
7 G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
8 C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949.   DOI
9 A. Wyner, "Wire-tap channel," Bell Syst. Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.   DOI   ScienceOn
10 L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.   DOI   ScienceOn
11 L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-2010, Mar. 2010.   DOI   ScienceOn
12 G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.   DOI   ScienceOn
13 J. Zhang and M. Gursoy, "Relay beamforming strategies for physical-layer security," in Proc. CISS, Mar. 2010, pp. 1-6.