Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks
暂无分享,去创建一个
[1] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[2] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[3] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] A. Robert Calderbank,et al. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels , 2009, 2009 Information Theory and Applications Workshop.
[6] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[7] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[8] A. Robert Calderbank,et al. Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.
[9] Massimo Franceschetti,et al. Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.
[10] Stylianos Papaharalabos,et al. Comparative study of cooperative transmission techniques in multipath rician fading environments , 2015, Panhellenic Conference on Informatics.
[11] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[12] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[13] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[14] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[15] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[18] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[19] Hongjun Chen,et al. Cooperative Transmission Mechanisms in Next Generation WiFi: IEEE 802.11ac , 2013, Int. J. Distributed Sens. Networks.
[20] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[21] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[22] V. Sankaranarayanan,et al. Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .
[23] Pramod Kumar Soni,et al. A Survey of Mobile Ad Hoc Network Attacks , 2013 .
[24] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[25] PAUL EMBRECHTS,et al. Modelling of extremal events in insurance and finance , 1994, Math. Methods Oper. Res..
[26] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .