Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks
暂无分享,去创建一个
Weidong Yang | Limin Sun | Qing Li | Le Xiao
[1] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[2] A. Robert Calderbank,et al. Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.
[3] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[4] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[5] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[6] Onur Ozan Koyluoglu,et al. Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.
[7] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[8] N.H. Vaidya,et al. Secure capacity of multi-hop wireless networks with random key pre-distribution , 2008, IEEE INFOCOM Workshops 2008.
[9] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[10] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[11] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[12] A. Robert Calderbank,et al. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels , 2009, 2009 Information Theory and Applications Workshop.
[13] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[14] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[15] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[16] V. Sankaranarayanan,et al. Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .
[17] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[18] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[20] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..