Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack
暂无分享,去创建一个
Jinho Choi | Sanghun Im | Jeongseok Ha | Hyoungsuk Jeon | Jinho Choi | J. Ha | Sanghun Im | Hyoungsuk Jeon
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[3] G. Ferrari,et al. New bounds for the Marcum Q-function , 2002, IEEE Trans. Inf. Theory.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Vincent Y. F. Tan,et al. The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents , 2011, IEEE Transactions on Information Theory.
[6] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[7] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[8] Wei Yu,et al. Rateless Slepian-Wolf Codes , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..
[9] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[10] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[11] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[12] Jinho Choi. Optimal Combining and Detection: Statistical Signal Processing for Communications , 2010 .
[13] Raymond Knopp,et al. A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..
[14] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[15] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[16] Sriram Vishwanath,et al. Channel Estimation and Linear Precoding in Multiuser Multiple-Antenna TDD Systems , 2008, IEEE Transactions on Vehicular Technology.
[17] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[18] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[19] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[20] Björn E. Ottersten,et al. Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[21] Ning Zhang,et al. Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design , 2014, IEEE Transactions on Information Forensics and Security.
[22] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[23] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[24] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[25] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[26] Andrew Thangaraj,et al. LDPC-based secret key agreement over the Gaussian wiretap channel , 2006, 2006 IEEE International Symposium on Information Theory.
[27] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[28] Vijay K. Bhargava,et al. Secure transmission in multi-cell massive MIMO systems , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[29] Dake He,et al. Rateless Slepian-Wolf Coding Based on Rate Adaptive Low-Density-Parity-Check Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[30] Haralabos C. Papadopoulos,et al. Techniques for Multi-User MIMO with Two-Way Training , 2008, 2008 IEEE International Conference on Communications.
[31] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[32] Thomas L. Marzetta,et al. Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.
[33] Thomas L. Marzetta,et al. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.
[34] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[35] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[36] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[37] Mohamed-Slim Alouini,et al. Exponential-type bounds on the generalized Marcum Q-function with application to error probability analysis over fading channels , 2000, IEEE Trans. Commun..
[38] John M. Shea,et al. Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel , 2011, IEEE Transactions on Information Forensics and Security.
[39] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[40] Kai-Kit Wong,et al. A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.
[41] Jinho Choi,et al. Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II , 2012, IEEE Transactions on Information Forensics and Security.
[42] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[43] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[44] Jinho Choi,et al. Secret key agreement under an active attack in MU-TDD systems with large antenna arrays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[45] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[46] Mikael Skoglund,et al. Secret-key agreement over a non-coherent block-fading MIMO wiretap channel , 2012, 2012 IEEE Information Theory Workshop.
[47] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[48] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[49] Vincent Y. F. Tan,et al. The sender-excited secret key agreement model: Capacity theorems , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[50] Jinho Choi,et al. Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack , 2013, 2013 International Conference on ICT Convergence (ICTC).
[51] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[52] M. L. Eaton. Multivariate statistics : a vector space approach , 1985 .
[53] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[54] Thomas L. Marzetta,et al. BLAST training : Estimating Channel Characteristics for High-Capacity Space-Time Wireless , 1999 .