Acknowledgement
Grant : Development of 5G Mobile Communication Technologies for Hyper-connected smart services
Supported by : IITP
References
- J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011. https://doi.org/10.1109/TSP.2011.2159598
- A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- S. Leung-Yan-Cheong, andM. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978. https://doi.org/10.1109/TIT.1978.1055917
- I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978. https://doi.org/10.1109/TIT.1978.1055892
- S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. https://doi.org/10.1109/TWC.2008.060848
- E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008. https://doi.org/10.1109/TIT.2008.921680
- R. Liu, I. Maric, P. Spasojevic, and R. D. Yates,"Discrete memoryless interference and broadcast channels With confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008. https://doi.org/10.1109/TIT.2008.921879
- M. Lai, X. Lifeng, and H. El Gamal, "Cooperative secrecy: The relayeavesdropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Apr. 2007, pp. 931-935.
- X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE Information Theory Workshop, Porto, Portugal, Apr. 2008, pp. 164-168.
- S. Goel and R. Negi, "Obtaining secrecy through intentional uncertainty," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 2.
- X. He and A. Yender, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 4.
- L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010. https://doi.org/10.1109/TSP.2009.2038412
- G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. https://doi.org/10.1109/TSP.2010.2092774
- E. A. Jorswieck, "Secrecy capacity of single- and multi-antenna channels with simple helpers," in Proc. IEEE SCC, Nice, France, Apr. 2007, pp. 931-935.
- A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, Nice, France, Apr. 2010, pp. 1-5.
- J. Yang, I. M. Kim, and D. I. Kim,"Joint design of optimal cooperative jamming and power allocation for linear precoding," IEEE Trans. Commun., vol. 62, no. 9, pp. 3285-3298, Sept. 2014. https://doi.org/10.1109/TCOMM.2014.2345659
- J. Yang, I. M. Kim, and D. I. Kim,"Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, June 2013. https://doi.org/10.1109/TWC.2013.040413.120972
- J. Nocedal and J. Stephen, Securing wireless communications at the physical layer, New York: Springer, 2000.
- M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 2840-2852, July 2014.
- A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010. https://doi.org/10.1109/TIT.2010.2048445
- A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: TheMIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. https://doi.org/10.1109/TIT.2010.2068852
- F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, 2008, pp. 524-528.
- T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009. https://doi.org/10.1109/TIT.2009.2018322
- Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control, and Computing, 2007.
- S. Boyd and L. Vandenberghe, Convex optimization, Harvard: Cambridge Univ. Press, 2004.
- D. Tse and V. Pramod, Fundamentals of wireless communication, Harvard: Cambridge Univ. Press, 2005.