박사

Design and Performance Analysis of Secure Communications with Cooperative Jamming

Sung-Il Kim 2015년
논문상세정보
' Design and Performance Analysis of Secure Communications with Cooperative Jamming' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • cooperatve relay networks
  • secure communications
  • wireless communications
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
12 0

0.0%

' Design and Performance Analysis of Secure Communications with Cooperative Jamming' 의 참고문헌

  • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, Opportunistic relayingfor secrecy communications: Cooperative jamming vs. relay chatting, IEEETrans. Wireless Commun., vol. 10, no. 6, pp. 1725?1729, June 2011.
  • Y. Zou, X. Wang, and W. Shen, Physical-layer security with multiuserscheduling in cognitive radio networks, IEEE Trans. Commun., vol. 61, no.12, pp. 5103?5113, Dec. 2013.
  • Y. Zou, X. Wang, and W. Shen, Optimal relay selection for physical-layersecurity in cooperative wireless networks, IEEE J. Sel. Areas Commun., vol.31, no. 10, pp. 2099?2111, Oct. 2013.102
  • Y. Zou, B. Zheng, and W. Zhu, Outage analysis of opportunistic cooperationover Rayleigh fading channels, IEEE Trans. Wireless Commun., vol. 8, no.6, pp. 3077?3085, Jun. 2009.
  • Y. Zou, B. Zheng, and W. Zhu, An opportunistic cooperation scheme and itsBER analysis, IEEE Trans. Wireless Commun., vol. 8, no. 9, pp. 4492?4497,Sep. 2009.
  • Y. Wu and K. J. R. Liu, An information secrecy game in cognitive radionetworks, IEEE Trans. Inf. Forensics and Security, vol. 6, no. 3, pp. 831?842, Sep. 2011.
  • Y. Liu, J. Li, and A. P. Petropulu, Destination assisted cooperative jammingfor wireless physical-layer security, IEEE Trans. Inf. Forensics and Security,vol. 61, no. 8, pp. 3801?3807, Oct. 2012.
  • Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fadingchannels, IEEE Trans. Inf. Theory, vol. 6, no. 54, pp. 2470?2492, June 2008.96
  • Y. Jing and H. Jafarkhani, Single and multiple relay selection schemes andtheir achievable diversity orders, IEEE Trans. Wireless Commun., vol. 8,no. 3, pp. 1414?1423, Mar. 2009.
  • X. Zhang, W. Wang, and X. Ji, Multiuser diversity in multiuser two-hop cooperativerelay wireless networks: System model and performance analysis, IEEE Trans. Veh. Technol., vol. 58, no. 2, pp. 1031?1036, Feb. 2009.
  • X. He and A. Yener, Two-hop secure communication using an untrustedrelay, EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1?13, Nov.2009.
  • W. Choi, D. I. Kim, and B. Kim, Adaptive multi-node incremental relayingfor hybrid-ARQ in AF relay networks, IEEE Trans. Wireless Commun., vol.9, no. 2, pp. 505?511, Feb. 2010.
  • V. N. Q. Bao, N. L. Trung, and M. Debbah, Relay selection schemes fordual-hop networks under security constraints with multiple eavesdroppers, IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076?6085, Dec. 2013.
  • T.-H. Chang, W.-C. Chiang, Y.-W. Peter Hong, and C.-Y. Chi, Trainingsequence design for discriminatory channel estimation in wireless MIMO systems, IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223?6237, Dec.2010.
  • T. E. Hunter, S. Sanayei, and A. Nosrantinia, Outage analysis of codedcooperation, IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 375?391, Feb.2006.93
  • T. E. Hunter and A. Nosrantinia, Diversity through coded cooperation, IEEE Trans. Wireless Commun., vol. 5, no. 2, pp. 283?289, Fub. 2006.
  • S.-I. Kim and J. Heo, An efficient relay selection strategy for interferencelimited relaying networks, in Proc. PIMRC 2010, Sep. 2010.
  • S. S. Ikki and S. A ssa, Performance analysis of dual-hop relaying systems inthe presence of co-channel interference, in Proc. IEEE GLOBECOM 2010,pp. 1?5, Dec. 2010.
  • S. S. Ikki and M. H. Ahmed, On the performance of amplify-and-forward cooperativediversity with the Nth best-relay selection scheme, in Proc. IEEEICC, June 2009, pp. 1?6.
  • S. K. Leung-Yan-Cheong and M. E. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451?456, July 1978.
  • S. Ikki and M. H. Ahmed, Exact error probability and channel capacity ofthe best-relay cooperative-diversity networks, IEEE Signal Process. Lett.,vol. 16, no. 12, pp. 1051?1054, Dec. 2009.
  • S. Chen, W. Wang, and X. Zhang, Performance analysis of multiuser diversityin cooperative multi-relay networks under Rayleigh-fading channels, IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3415?3419, July 2009.
  • S. Chen, W. Wang, X. Zhang, and Z. Sun, Performance analysis of OSTBCtransmission in amplify-and-forward cooperative relay networks, IEEETrans. Veh. Tech., vol. 59, no. 1, pp. 105?113, Jan. 2010.
  • R. Knopp and P. Humblet, Information capacity and power control in singlecellmultiuser communication, in Proc. IEEE ICC, June 1995, pp. 331?335.
  • Q. F. Zhou, F. C. M. Lau, and S. F. Hau, Asymptotic analysis of opportunisticrelaying protocols, IEEE Trans. Wireless Commun., vol. 8, no. 8,pp. 3915?3920, Aug. 2009.
  • P. Viswanath, D. N. C. Tse, and R. Laroia, Opportunistic beamformingusing dumb antennas, IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1277?1294, June 2002.
  • P. K. Gopala, L. Lai, and H. El Gamal, On the secrecy capacity of fadingchannels, IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687?5403, Oct.2008.
  • N. Yang, P. L. Yeoh, M. Elkashlan, J. Yuan, and I. B. Collings, CascadedTAS/MRC in MIMO multiuser relay networks, IEEE Trans. Wireless Commun.,vol. 11, no. 10, pp. 3829?3839, Oct. 2012.
  • N. Yang, M. Elkashlan, and J. Yuan, Impact of opportunistic scheduling oncooperative dual-hop relay networks, IEEE Trans. Commun., vol. 59, no. 3,pp. 689?694, Mar. 2011.
  • M. K. Simon and M.-S. Alouini, Digital Communication over Fading Channels,New York: Wiley, 2000.
  • M. Bloch, J. Barros, M. R. D. Rodriques, and S. W. McLaughlin, Wirelessinformation-theoretic security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp.2515?2534, June 2008.
  • L. yang and M. S. Alouini, Performance comparison of different selectioncombining algorithms in presence of co-channel interference, IEEE Trans.Veh. Tech., vol. 55, no. 2, pp. 559?571, Mar. 2006.
  • L. Sun, T. Zhang, Y. Li, and H. Niu, Performance study of two-hop amplifyand-forward systems with untrustworthy relay nodes, IEEE Trans. Veh.Technol., vol. 61, no. 8, pp. 3801?3807, Oct. 2012.98
  • L. Fan, X. Lei, and W. Li, Exact closed-form expression for ergodic capacityof amplify-and-forward relaying in channel-noise-assisted cooperativenetworks with relay selection, IEEE Comm. Lett., vol. 15, no. 3, pp. 332?333,Mar. 2011.
  • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, Improving wirelessphysical layer security via cooperating relays, IEEE Trans. Signal Process.,vol. 58, no. 3, pp. 1875?1888, Mar. 2010.
  • K.-H. Park, T. Wang, and M.-S. Alouini, On the jamming power allocationfor secure amplify-and-forward relaying via cooperative jamming, IEEE J.Sel. Areas Commun., vol. 31, no. 9, pp. 1741?1750, Sep. 2013.
  • K. Lee, C.-B. Chae, and J. Kang, Spectrum leasing via cooperation forenhanced physical-layer secrecy, IEEE Trans. Veh. Technol., vol. 62, no. 9,pp. 4672?4678, Nov. 2013.
  • J. Yang, I.-M. Kim, and D. I. Kim, Power-constrained optimal cooperativejamming for multiuser broadcast channel, IEEE Wireless Comm. Lett., vol.2, no. 4, pp. 411?414, Aug. 2013.97
  • J. Yang, I.-M. Kim, and D. I. Kim, Optimal cooperative jamming for multiuserbroadcast channel with multiple eavesdroppers, IEEE Trans. WirelessCommun., vol. 12, no. 6, pp. 2840?2852, June 2013.
  • J. Si, and Zan. Li, and Z. Liu, Outage Probability of opportunistic relayingin Rayleigh fading channels with multiple interferers, IEEE Signal Process.Lett., vol. 17, no. 5, pp. 445?448, May. 2010.
  • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity inwireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
  • J. Kim, D. S. Michalopoulos, and R. Schober, Diversity analysis of multiusermulti-relay networks, IEEE Trans. Wireless Commun., vol. 10, no. 7,pp. 2380?2389, July 2011.
  • J. Kim, A. Ikhlef, and R. Schober, Combined relay selection and cooperativebeamforming for physical layer security, Jounal of Communications andNetworks, vol. 14, no. 4, pp. 364?373, Aug. 2012.
  • J. Huang, A. Mukherjee, and A. L. Swindlehurst, Secure communication viaan untrusted non-regenerative relay in fading channels, IEEE Trans. SignalProcess., vol. 61, no. 10, pp. 2536?2550, May 2013.
  • J. Huang and A. L. Swindlehurst, Cooperative jamming for secure communicationsin MIMO relay networks, IEEE Trans. Signal Process., vol. 59,no. 10, pp. 4871?4884, Oct. 2011.
  • J. -B. Kim and D. Kim, Exact and closed-form outage probability of opportunisticdecode-and-forward relaying with unequal-power interferers, IEEETrans. Wireless Commun., vol. 9, no. 12, pp. 3601?3606, Dec. 2010.
  • I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products,7th ed. San Diego, CA:Academic, 2007.
  • I. Krikidis, J. Thompson, S. McLaughlin, and N. Goertz, Max-min relayselection for legacy amplify-and-forward systems with interference, IEEETrans. Wireless Commun., vol. 8 no. 6, pp. 3016?3027, Jun. 2009.
  • I. Krikidis, J. Thompson, S. McLaughlin, and N. Goertz, Amplify-andforwardwith partial relay selection, IEEE Commun. Lett., vol. 12, no. 4,pp. 235?237, Apr. 2008.99
  • I. Krikidis, J. S. Thompson, and S. McLaughlin, Relay selection for securecooperative networks with jamming, IEEE Trans. Wireless Commun., vol.8, no. 10, pp. 5003?5011, Oct. 2009.
  • I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339?348, May 1978.
  • H. Jeon, S. W. McLaughlin, I.-M. Kim, and J. Ha, Secure communicationswith untrusted secondary nodes in cognitive radio networks, IEEE Trans.Wireless Commun., vol. 13, no. 4, pp. 1790?1805, Apr. 2014.
  • H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, On multiuser secrecy rate inflat fading channel, in Proc. IEEE MILCOM, Oct. 2009, pp. 1?7.101
  • H. Chen, J. Liu, L. Zheng, C. Zhai and Y. Zhou, An improved selectioncooperation scheme for decode-and-forward relaying, IEEE Commun. Lett.,vol. 14, no. 12, pp. 1143?1145, Dec. 2010.
  • H. A. Suraweera, H. K. Garg, and A. Nallanathan, Performance analysis oftwo hop amplify-and-forward systems with interference at the relay, IEEECommun. Lett., vol. 14, no. 8, pp. 692?694, Aug. 2010.95
  • F. A. Onat, Y. Fan, H. Yanikomeroglu, and J. S. Thompson, AsymptoticBER analysis of threshold digital relaying schemes in cooperative wirelesssystems, IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4938?4947,Dec. 2008.
  • F. A. Onat, A. Adinoyi, Y. Fan, H. Yanikomeroglu, J. S. Thompson, and I.D. Marsland, Threshold selection for SNR-based selective digital relaying incooperative wireless network, IEEE Trans. Wireless Commun., vol. 7, no.11, pp. 4226?4237, Nov. 2008.
  • E. Teckin and A. Yener, The general Gaussian multiple access and two-waywire-tap channels: Achievable rates and cooperative jamming, IEEE Trans.Inf. Theory, vol. 54, no. 6, pp. 2735?2751, June 2008.
  • D. Michalopoulos and G. Karagiannidis, Performance analysis of single relayselection in Rayleigh fading, IEEE Trans. Wireless Commun., vol. 7, no. 10,pp. 3718?3724, Oct. 2009.94
  • D. Lee and J. Lee, Outage probability for dual-hop relaying systems withmultiple interferers over Rayleigh fading channels, IEEE Trans. Veh. Tech.,vol. 60, no. 1, pp. 333?338, Jan. 2011.
  • D. B. Costa and S. A ssa, Amplify-and-forward relaying in channel-noiseassistedcooperative networks with relay selection, IEEE Commun. Lett.,vol. 14, no. 7, pp. 608?610, Jul. 2010.
  • C. Zhaong, S. Jin, and K.-K. Wong, Dual-hop systems with noisy relay andinterference-limited destination, IEEE Trans. Commun., vol. 58, no. 3, pp.764?768, Mar. 2010.
  • C. Jeong, I.-M. Kim, and D. I. Kim, Joint secure beamforming design atthe source and the relay for an amplify-and-forward MIMO untrusted relaysystem, IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310?325, Jan. 2012.
  • C. Jeong and I.-M. Kim, Optimal power allocation for secure multi-carrierrelay systems, IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428?5442,Nov. 2011.
  • C. E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech.J., vol. 28, pp. 6565?715, Oct. 1949.
  • C. Chayawan and A. Aalo, Average error probability of digital celluar ratiosystems usign MRC diversity in the presence of multiple interferers, IEEETrans. Wireless Commun., vol. 2, no. 5, pp. 860?864, Sep. 2003.
  • B. Barua, H. Q. Ngo, and H. Shin, On the SEP of cooperative diversity withopportunistic relaying, IEEE Commun. Lett., vol. 12, no. 10, pp. 727?729,Oct. 2008.
  • A. Shah and A. M. Haimovich, Performance analysis of maximal ratio combiningand comparison with optimum combining for mobile radio communicationswith cochannel interference, IEEE Trans. Veh. Tech., vol. 49, no. 4,pp. 1454?1463, July 2000.
  • A. Papoulis and S. U. Pillai, Probability, Random Variables and StochasticProcesses, McGrow Hill Editions, 4th ed., 2002.100
  • A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8, pp.1355?1387, Jan. 1975.
  • A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, A simple cooperativediversity method based on network path selection, IEEE J. Sel. Areas Commum.,vol. 24 no. 3, pp.659?672, Mar. 2006.
  • A. Adinoyi, Y. Fan, H. Yanikomeroglu, H. V. Poor, and F. Al-Shaalan, Performanceof selection relaying and cooperative diversity, IEEE Trans. WirelessCommun., vol. 8 no. 12, pp. 5790?5795, Dec. 2009.
  • ?[1] A. Sendonaris, E. Erkip, and B. Aazhang, User cooperation diversity-Part I:System description, IEEE Trans. Commun., vol. 51, no. 11, pp. 1927?1937,Nov. 2003.
  • ??, User cooperation diversity-Part II: Implementation aspects and performanceanalysis, IEEE Trans. Commun., vol. 51, no. 11, pp.1939?1948, Nov.2003.