1 |
S. Y. Shin and I. A. Wicaksono, "Improving wireless physical layer security using alamouti code and artificial noise," ICTC, pp. 1061-1064, 2013.
|
2 |
S. M. Alamouti, "A simple transmit diversity technique for wireless communications," IEEE J. Sel. Areas in Commun., vol. 16, no. 8, pp. 1451-1458, 1998.
DOI
|
3 |
S.-Y. Jin, J.-H. Kim, K.-H. Park, and H.-Y. Song, "Equivalence of hadamard matrices whose rows Form a vector space," J. KICS, vol. 34, no. 7, pp. 635-639, Jul. 2009.
|
4 |
T. S. Siadari and S. Y. Shin, "Joint hadamard transform and alamouti scheme for wireless communication system," AEU-Int. J. Electron. Commun., vol. 68, no. 9, pp. 889-891, 2014.
|
5 |
Y. Zou, et al., "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015.
DOI
|
6 |
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, 2010.
DOI
|
7 |
Y.-S. Shiu, et al., "Physical layer security in wireless networks: a tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
DOI
|
8 |
J. Choi, J. Ha, and H. Jeon, "Physical layer security for wireless sensor networks," IEEE PIMRC, pp. 1-6, 2013.
|
9 |
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949.
DOI
|
10 |
A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.
DOI
|
11 |
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.
DOI
|
12 |
I. Son, I. Kim, J. Yang, and N. Lee, "Smart device security technology for cyber defense," J. KICS, vol. 37, no. 10, pp. 986-992, Oct. 2012.
|
13 |
S. Corson and J. Macker, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, No. RFC 2501, 1998.
|
14 |
J.-K. Hong, "The analysis of crypto communication relay effect in the security framework technique of network centric warfare environment," J. Korea Academia-Ind. Cooperation Soc., vol. 8, no. 4, pp. 788-794, 2007.
|