최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국통신학회논문지 = The Journal of Korean Institute of Communications and Information Sciences, v.41 no.11, 2016년, pp.1341 - 1348
김진우 (Department of IT Convergence Engineering, Kumoh National Institute of Technology) , 신수용 (Kumoh National Institute of Technology)
In this paper, we propose method to enhance security performance using HT-STBC with artificial noise under Wier-Tap channel model that exist with legitimate receiver and illegal eavesdropper. Conventional STBC with artificial noise scheme has a weakness that a limited increase in the BER of the diff...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Y.-S. Shiu, et al., "Physical layer security in wireless networks: a tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
J. Choi, J. Ha, and H. Jeon, "Physical layer security for wireless sensor networks," IEEE PIMRC, pp. 1-6, 2013.
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949.
A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.
I. Son, I. Kim, J. Yang, and N. Lee, "Smart device security technology for cyber defense," J. KICS, vol. 37, no. 10, pp. 986-992, Oct. 2012.
J.-K. Hong, "The analysis of crypto communication relay effect in the security framework technique of network centric warfare environment," J. Korea Academia-Ind. Cooperation Soc., vol. 8, no. 4, pp. 788-794, 2007.
S. Corson and J. Macker, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, No. RFC 2501, 1998.
S. Y. Shin and I. A. Wicaksono, "Improving wireless physical layer security using alamouti code and artificial noise," ICTC, pp. 1061-1064, 2013.
S. M. Alamouti, "A simple transmit diversity technique for wireless communications," IEEE J. Sel. Areas in Commun., vol. 16, no. 8, pp. 1451-1458, 1998.
S.-Y. Jin, J.-H. Kim, K.-H. Park, and H.-Y. Song, "Equivalence of hadamard matrices whose rows Form a vector space," J. KICS, vol. 34, no. 7, pp. 635-639, Jul. 2009.
T. S. Siadari and S. Y. Shin, "Joint hadamard transform and alamouti scheme for wireless communication system," AEU-Int. J. Electron. Commun., vol. 68, no. 9, pp. 889-891, 2014.
Y. Zou, et al., "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015.
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, 2010.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.