Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[2] Xiang He,et al. Cooperative Jamming: The Tale of Friendly Interference for Secrecy , 2009 .
[3] Tongtong Li,et al. On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[4] Athina P. Petropulu,et al. Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.
[5] Matthew R. McKay,et al. Enhancing secrecy with sectorized transmission in decentralized wireless networks , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[6] Hyundong Shin,et al. Secure node packing of large-scale wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[7] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[8] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[9] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[10] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[11] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[12] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[14] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[15] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[16] Matthew R. McKay,et al. Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[17] Martin Haenggi,et al. Single-Hop Connectivity in Interference-Limited Hybrid Wireless Networks , 2007, 2007 IEEE International Symposium on Information Theory.
[18] Paul Mühlethaler,et al. Stochastic Analysis of Non-Slotted Aloha in Wireless Ad-Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[19] M. Haenggi,et al. Interference in Large Wireless Networks , 2009, Found. Trends Netw..
[20] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[21] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Rodney A. Kennedy,et al. Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[24] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[25] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[26] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.
[27] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[28] N. H. Abel. Beweis der Unmöglichkeit, algebraische Gleichungen von höheren Graden als dem vierten allgemein aufzulösen. , 1826 .
[29] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[30] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[31] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[32] S. P. Novikov,et al. THE TOPOLOGICAL PROOF OF ABEL–RUFFINI THEOREM , 2007 .
[33] Qiang Li,et al. Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[34] Ram Ramanathan,et al. Ad hoc networking with directional antennas: a complete system solution , 2004, IEEE Journal on Selected Areas in Communications.
[35] Wei Shi,et al. Distributed jamming for secure communication in poisson fields of legitimate nodes and eavesdroppers , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[36] Martin Haenggi,et al. On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.
[37] Jeffrey G. Andrews,et al. Transmission capacity of ad hoc networks with spatial diversity , 2007, IEEE Transactions on Wireless Communications.
[38] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[39] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[40] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[41] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[42] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.