Defining Spatial Secrecy Outage Probability for Exposure Region-Based Beamforming
暂无分享,去创建一个
Yuanrui Zhang | Youngwook Ko | Alan Marshall | Roger Woods | Y. Ko | A. Marshall | R. Woods | Yuanrui Zhang
[1] Xianbin Wang,et al. Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.
[2] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[3] D. Stoyan,et al. Stochastic Geometry and Its Applications , 1989 .
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[6] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[7] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[8] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[9] Ting Wang,et al. Enhancing wireless communication privacy with artificial fading , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[10] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[11] Mounir Ghogho,et al. Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[12] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[13] Raghupathy Sivakumar,et al. Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[14] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[15] Joy Kuri,et al. Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[16] Shihao Yan,et al. Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[17] Roger F. Woods,et al. Creating secure wireless regions using configurable beamforming , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[18] Shihao Yan,et al. Line-Of-Sight Based Beamforming for Security Enhancements in Wiretap Channels , 2014, 2014 International Conference on IT Convergence and Security (ICITCS).
[19] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[20] Chenxi Liu,et al. Location-based beamforming for Rician wiretap channels , 2015, 2016 Australian Communications Theory Workshop (AusCTW).
[21] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[22] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[23] Joseph R. Cavallaro,et al. Investigation of secure wireless regions using configurable beamforming on WARP , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[24] Srinivasan Seshan,et al. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries , 2009, Pervasive.
[25] Sung-Ju Lee,et al. STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.
[26] Tony Q. S. Quek,et al. Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.
[27] Jie Xiong,et al. ArrayTrack: A Fine-Grained Indoor Location System , 2011, NSDI.
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[29] Benjamin Allen,et al. Adaptive Array Systems: Fundamentals and Applications , 2005 .
[30] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[31] Raghupathy Sivakumar,et al. Aegis: Physical Space Security for Wireless Networks With Smart Antennas , 2010, IEEE/ACM Transactions on Networking.
[32] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[33] B.D. Van Veen,et al. Beamforming: a versatile approach to spatial filtering , 1988, IEEE ASSP Magazine.
[34] Huiming Wang,et al. On Transmission Secrecy Outage of a Multi-Antenna System With Randomly Located Eavesdroppers , 2014, IEEE Communications Letters.
[35] D. Grunwald,et al. Enhancing WLAN security with smart antennas: a physical layer response for information assurance , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.