Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming
暂无分享,去创建一个
[1] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[2] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[3] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[4] R. Negi,et al. Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[5] Dennis Goeckel,et al. Adaptive coding for time-varying channels using outdated fading estimates , 1999, IEEE Trans. Commun..
[6] Dennis Goeckel,et al. Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy , 2013, 2013 IEEE International Symposium on Information Theory.
[7] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[8] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[9] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[10] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[11] Leandros Tassiulas,et al. Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[12] Robert Schober,et al. Combined relay selection and cooperative beamforming for physical layer security , 2012, Journal of Communications and Networks.
[13] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[14] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[15] Dennis Goeckel,et al. Jamming-aware minimum energy routing in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[16] John S. Thompson,et al. Power allocation for cooperative-based jamming in wireless networks with secrecy constraints , 2010, 2010 IEEE Globecom Workshops.
[17] Elif Uysal-Biyikoglu,et al. Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..
[18] Ariel Orda,et al. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.
[19] Babak Hassibi,et al. How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.
[20] Ariel Orda,et al. Efficient wireless security through jamming, coding and routing , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[21] Dennis Goeckel,et al. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming , 2016, IEEE Transactions on Wireless Communications.
[22] Sven Semmelrodt,et al. Investigation of different fading forecast schemes for flat fading radio channels , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[23] Donald F. Towsley,et al. Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.
[24] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[25] Dennis Goeckel,et al. Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments , 2014, IEEE Transactions on Wireless Communications.
[26] Zhu Han,et al. Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.
[27] Mikael Skoglund,et al. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.
[28] Shunsuke Ihara,et al. On the Capacity of Channels with Additive Non-Gaussian Noise , 1978, Inf. Control..
[29] Dennis Goeckel,et al. Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.
[30] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[31] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[32] Dennis Goeckel,et al. Power allocation to noise-generating nodes for cooperative secrecy in the wireless environment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[33] Jan M. Rabaey,et al. Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).
[34] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[35] Teresa H. Meng,et al. Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[36] Dennis Goeckel,et al. Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[37] Jinhua Zhu,et al. Model and Protocol for Energy-Efficient Routing over Mobile Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.
[38] Sennur Ulukus,et al. Optimal Energy and Data Routing in Networks With Energy Cooperation , 2015, IEEE Transactions on Wireless Communications.
[39] K. J. Ray Liu,et al. Robust connectivity-aware energy-efficient routing for wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.
[40] M.Z. Win,et al. Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[41] Dennis Goeckel,et al. Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[42] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[43] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[44] Zhiguo Ding,et al. Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.
[45] S. M. Heemstra de Groot,et al. Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.
[46] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[47] Ness B. Shroff,et al. Energy-Efficient Interference-Based Routing for Multi-Hop Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[48] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.