Efficient wireless security through jamming, coding and routing
暂无分享,去创建一个
Ariel Orda | Dennis Goeckel | Majid Ghaderi | Mostafa Dehghan | A. Orda | D. Goeckel | M. Ghaderi | Mostafa Dehghan
[1] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[2] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[3] Upamanyu Madhow,et al. Receiver-coordinated distributed transmit nullforming with channel state uncertainty , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[4] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[5] Candice King,et al. Fundamentals of wireless communications , 2013, 2013 IEEE Rural Electric Power Conference (REPC).
[6] Marco Gruteser,et al. Phantom: Physical layer cooperation for location privacy protection , 2012, 2012 Proceedings IEEE INFOCOM.
[7] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[8] Candice King,et al. Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.
[9] Jill Britton,et al. Introduction to Tessellations , 1990 .
[10] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[11] Yuguang Fang,et al. SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.
[12] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[15] Kamal Jain. Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.
[16] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[17] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[18] H. Vincent Poor,et al. Distributed transmit beamforming: challenges and recent progress , 2009, IEEE Communications Magazine.
[19] Sisi Liu,et al. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2010, IEEE Trans. Mob. Comput..
[20] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[21] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[22] Raghuraman Mudumbai,et al. A Scalable Architecture for Distributed Transmit Beamforming with Commodity Radios: Design and Proof of Concept , 2013, IEEE Transactions on Wireless Communications.
[23] Satoshi Nagata,et al. Coordinated multipoint transmission and reception in LTE-advanced: deployment scenarios and operational challenges , 2012, IEEE Communications Magazine.
[24] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[25] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[28] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[29] Zhiguo Ding,et al. Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.
[30] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[31] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[32] Soura Dasgupta,et al. Fully wireless implementation of distributed beamforming on a software-defined radio platform , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[33] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[34] Raghuraman Mudumbai,et al. Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[35] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[36] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[37] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[38] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[39] G. Turin. The characteristic function of Hermitian quadratic forms in complex normal variables , 1960 .
[40] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[41] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels with Imperfect ECSI , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[42] Danny Raz,et al. A simple efficient approximation scheme for the restricted shortest path problem , 2001, Oper. Res. Lett..
[43] M.Z. Win,et al. Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[44] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .