Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay
暂无分享,去创建一个
[1] Rui Zhang,et al. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.
[2] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[3] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[4] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[5] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[6] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[7] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[10] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[11] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[12] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[13] Zhu Han,et al. On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.
[14] Björn E. Ottersten,et al. Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[15] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[16] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[17] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[18] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[19] Fredrik Rusek,et al. Detection of active eavesdroppers in massive MIMO , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[20] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[21] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[22] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[23] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[24] Jie Xu,et al. Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).
[25] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[26] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[27] Qi Xiong,et al. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.
[28] Jitendra K. Tugnait,et al. Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.
[29] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[30] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[31] Jae-Mo Kang,et al. Detection of Pilot Contamination Attack for Multi-Antenna Based Secrecy Systems , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[32] Rui Zhang,et al. Active eavesdropping via spoofing relay attack , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.