$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] Space–Time Line Code for Enhancing Physical Layer Security of Multiuser MIMO Uplink Transmission

IEEE systems journal, v.15 no.3, 2021년, pp.3336 - 3347  

Choi, Jihoon (Korea Aerospace University, School of Electronics and Information Engineering, Gyeonggi-do, South Korea) ,  Joung, Jingon (Chung-Ang University, School of Electrical and Electronics Engineering, Seoul, South Korea) ,  Jung, Bang Chul (Chungnam National University, Department of Electronics Engineering, Daejeon, South Korea)

Abstract AI-Helper 아이콘AI-Helper

In this article, we investigate a secure uplink multiple-input multiple-output communication system, in which the multiple users transmit information to a legitimate access point (AP) when a passive eavesdropper exists. A secure multiple access method is proposed for single-antenna users by employin...

참고문헌 (65)

  1. Yu, Heejung, Kim, Taejoon. Training and Data Structures for AN-Aided Secure Communication. IEEE systems journal, vol.13, no.3, 2869-2872.

  2. Liu, Yiliang, Chen, Hsiao-Hwa, Wang, Liangmin, Meng, Weixiao. Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading—A Physical Layer Security Approach. IEEE systems journal, vol.14, no.2, 2121-2132.

  3. Goel, S., Negi, R.. Guaranteeing Secrecy using Artificial Noise. IEEE transactions on wireless communications, vol.7, no.6, 2180-2189.

  4. Yang, Tinghan, Zhang, Rongqing, Cheng, Xiang, Yang, Liuqing. Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction. IEEE transactions on information forensics and security, vol.14, no.6, 1610-1623.

  5. Al-Qahtani, Fawaz S., Yuzhen Huang, Hessien, Salah, Radaydeh, Redha M., Caijun Zhong, Alnuweiri, Hussein M.. Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. IEEE transactions on information forensics and security, vol.12, no.2, 257-270.

  6. Pu Zhao, Meng Zhang, Hui Yu, Hanwen Luo, Wen Chen. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks. IEEE transactions on information forensics and security, vol.10, no.9, 1812-1823.

  7. Cumanan, Kanapathippillai, Alexandropoulos, George C., Ding, Zhiguo, Karagiannidis, George K.. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis. IEEE transactions on vehicular technology, vol.66, no.8, 7495-7505.

  8. Allen, Trevor, Tajer, Ali, Al-Dhahir, Naofal. Secure Alamouti MAC Transmissions. IEEE transactions on wireless communications, vol.16, no.6, 3674-3687.

  9. 10.1109/ACSSC.2011.6190083 

  10. Mukherjee, Amitav, Swindlehurst, A Lee. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society, vol.59, no.1, 351-361.

  11. Bellili, Faouzi, Methenni, Achref, Affes, Sofiene. Closed-Form CRLBs for SNR Estimation From Turbo-Coded BPSK-, MSK-, and Square-QAM-Modulated Signals. IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society, vol.62, no.15, 4018-4033.

  12. Gao, Ping, Tepedelenlioglu, C.. SNR estimation for nonconstant modulus constellations. IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society, vol.53, no.3, 865-870.

  13. Bellili, F, Stephenne, A, Affes, S. Cramer-Rao Lower Bounds for NDA SNR Estimates of Square QAM Modulated Transmissions. IEEE transactions on communications, vol.58, no.11, 3211-3218.

  14. Ding, Zhi, Qiu, Li. Blind MIMO channel identification from second order statistics using rank deficient channel convolution matrix. IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society, vol.51, no.2, 535-544.

  15. Chao Wang, Hui-Ming Wang, Bo Wang. Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI. IEEE signal processing letters, vol.22, no.12, 2294-2298.

  16. 10.1017/CBO9780511841224 

  17. 10.1109/ICC.2010.5502312 

  18. 10.1017/CBO9780511804441 

  19. Sci China Inf Sci Two-step transmission with artificial noise for secure wireless SIMO communications bo 2015 58 42�308:1 

  20. Xiaoming Chen, Wing Kwan Ng, Derrick, Gerstacker, Wolfgang H., Hsiao-Hwa Chen. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE Communications surveys and tutorials, vol.19, no.2, 1027-1053.

  21. Liu, Yiliang, Chen, Hsiao-Hwa, Wang, Liangmin. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Communications surveys and tutorials, vol.19, no.1, 347-376.

  22. Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.. Wireless Information-Theoretic Security. IEEE transactions on information theory, vol.54, no.6, 2515-2534.

  23. Tekin, Ender, Yener, Aylin. The Gaussian Multiple Access Wire-Tap Channel. IEEE transactions on information theory, vol.54, no.12, 5747-5755.

  24. Liang, Yingbin, Poor, H. Vincent. Multiple-Access Channels With Confidential Messages. IEEE transactions on information theory, vol.54, no.3, 976-1002.

  25. Shafiee, S., Nan Liu, Ulukus, S.. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel. IEEE transactions on information theory, vol.55, no.9, 4033-4039.

  26. Hero, A.O.. Secure space-time communication. IEEE transactions on information theory, vol.49, no.12, 3235-3249.

  27. Oggier, F., Hassibi, B.. The Secrecy Capacity of the MIMO Wiretap Channel. IEEE transactions on information theory, vol.57, no.8, 4961-4972.

  28. Khisti, Ashish, Wornell, Gregory W. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel. IEEE transactions on information theory, vol.56, no.11, 5515-5532.

  29. Joung, Jingon. Space–Time Line Code for Massive MIMO and Multiuser Systems With Antenna Allocation. IEEE access : practical research, open solutions, vol.6, 962-979.

  30. Joung, Jingon, Jeong, Eui-Rim. Multiuser Space–Time Line Code With Optimal and Suboptimal Power Allocation Methods. IEEE access : practical research, open solutions, vol.6, 51766-51775.

  31. Choi, Jihoon, Heath Jr., R.W.. Interpolation based transmit beamforming for MIMO-OFDM with limited feedback. IEEE transactions on signal processing : a publication of the IEEE Signal Processing Society, vol.53, no.11, 4125-4135.

  32. Joung, Jingon, Choi, Jihoon, Jung, Bang Chul, Yu, Sungwook. Artificial Noise Injection and Its Power Loading Methods for Secure Space-Time Line Coded Systems. Entropy, vol.21, no.5, 515-.

  33. Joung, Jingon, Choi, Jihoon, Jung, Bang Chul. Double Space–Time Line Codes. IEEE transactions on vehicular technology, vol.69, no.2, 2316-2321.

  34. Joung, J., Jung, B.C., Choi, J.. Space-time line coded regenerative two‐way relay systems with power control. Electronics letters, vol.55, no.12, 694-696.

  35. Joung, Jingon, Choi, Jihoon. Space–Time Line Codes With Power Allocation for Regenerative Two-Way Relay Systems. IEEE transactions on vehicular technology, vol.68, no.5, 4884-4893.

  36. Joung, Jingon. Energy Efficient Space–Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints. IEEE access : practical research, open solutions, vol.6, 47026-47035.

  37. Joung, Jingon, Jung, Bang Chul. Machine Learning Based Blind Decoding for Space–Time Line Code (STLC) Systems. IEEE transactions on vehicular technology, vol.68, no.5, 5154-5158.

  38. Joung, Jingon, Choi, Jihoon. Uneven Power Amplifier Shuffling for Space-Time Line Code Systems. IEEE access : practical research, open solutions, vol.6, 58491-58500.

  39. Wu, Yongpeng, Schober, Robert, Ng, Derrick Wing Kwan, Xiao, Chengshan, Caire, Giuseppe. Secure Massive MIMO Transmission With an Active Eavesdropper. IEEE transactions on information theory, vol.62, no.7, 3880-3900.

  40. Zhang, Xianyu, Guo, Daoxing, An, Kang, Zhang, Bangning. Secure Communications Over Cell-Free Massive MIMO Networks With Hardware Impairments. IEEE systems journal, vol.14, no.2, 1909-1920.

  41. Minyan Pei, Jibo Wei, Kai-Kit Wong, Xin Wang. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI. IEEE transactions on wireless communications, vol.11, no.2, 544-549.

  42. Tian, Xiaowen, Liu, Qian, Wang, Zihuan, Li, Ming. Secure Hybrid Beamformers Design in mmWave MIMO Wiretap Systems. IEEE systems journal, vol.14, no.1, 548-559.

  43. Zhu, Yongxu, Wang, Lifeng, Wong, Kai-Kit, Heath, Robert W.. Secure Communications in Millimeter Wave Ad Hoc Networks. IEEE transactions on wireless communications, vol.16, no.5, 3205-3217.

  44. Zhu, Yongxu, Zheng, Gan, Fitch, Michael. Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.36, no.7, 1397-1409.

  45. Li, An, Wu, Qingqing, Zhang, Rui. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE wireless communications letters, vol.8, no.1, 181-184.

  46. Kang, Honggu, Joung, Jingon, Ahn, Jinhyun, Kang, Joonhyuk. Secrecy-Aware Altitude Optimization for Quasi-Static UAV Base Station Without Eavesdropper Location Information. IEEE communications letters : a publication of the IEEE Communications Society, vol.23, no.5, 851-854.

  47. Hu, Dingkun, Zhang, Qi, Li, Quanzhong, Qin, Jiayin. Joint Position, Decoding Order, and Power Allocation Optimization in UAV-Based NOMA Downlink Communications. IEEE systems journal, vol.14, no.2, 2949-2960.

  48. Wyner, A. D.. The Wire-Tap Channel. The Bell System technical journal, vol.54, no.8, 1355-1387.

  49. Leung-Yan-Cheong, S., Hellman, M.. The Gaussian wire-tap channel. IEEE transactions on information theory, vol.24, no.4, 451-456.

  50. Yu, Hongyan, Guo, Songtao, Yang, Yuanyuan, Xiao, Bin. Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel. IEEE systems journal, vol.12, no.4, 3291-3302.

  51. Li, Bin, Fei, Zesong, Chu, Zheng, Zhang, Yan. Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer. IEEE systems journal, vol.12, no.4, 3755-3766.

  52. Guo, Chongtao, Liao, Bin, Feng, Daquan, He, Chunlong, Ma, Xiao. Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications. IEEE transactions on vehicular technology, vol.67, no.3, 2571-2581.

  53. Khandaker, Muhammad R. A., Wong, Kai-Kit, Zhang, Yangyang, Zheng, Zhongbin. Probabilistically Robust SWIPT for Secrecy MISOME Systems. IEEE transactions on information forensics and security, vol.12, no.1, 211-226.

  54. Jun Zhu, Schober, Robert, Bhargava, Vijay K.. Secure Transmission in Multicell Massive MIMO Systems. IEEE transactions on wireless communications, vol.13, no.9, 4766-4781.

  55. Saber, Mohammad Javad, Keshavarz, Ahmad, Mazloum, Jalil, Sazdar, Amir Mehdi, Piran, Md. Jalil. Physical-Layer Security Analysis of Mixed SIMO SWIPT RF and FSO Fixed-Gain Relaying Systems. IEEE systems journal, vol.13, no.3, 2851-2858.

  56. Joung, Jingon. Space–Time Line Code. IEEE access : practical research, open solutions, vol.6, 1023-1041.

  57. Jun Zhu, Schober, Robert, Bhargava, Vijay K.. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems. IEEE transactions on wireless communications, vol.15, no.3, 2245-2261.

  58. Andersson, M., Schaefer, R. F., Oechtering, T. J., Skoglund, M.. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.31, no.9, 1901-1908.

  59. Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J-M.. Applications of LDPC Codes to the Wiretap Channel. IEEE transactions on information theory, vol.53, no.8, 2933-2945.

  60. Xiangyun Zhou, Maham, B., Hjorungnes, A.. Pilot Contamination for Active Eavesdropping. IEEE transactions on wireless communications, vol.11, no.3, 903-907.

  61. Xiang He, Yener, Aylin. Providing Secrecy With Structured Codes: Two-User Gaussian Channels. IEEE transactions on information theory, vol.60, no.4, 2121-2138.

  62. Yongpeng Wu, Chengshan Xiao, Zhi Ding, Xiqi Gao, Shi Jin. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels. IEEE transactions on vehicular technology, vol.61, no.6, 2599-2612.

  63. Khisti, Ashish, Wornell, Gregory W. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel. IEEE transactions on information theory, vol.56, no.7, 3088-3104.

  64. Zhang, Chensi, Ge, Jianhua, Gong, Fengkui, Ji, Yancheng, Li, Jinxi. Improving Physical-Layer Security for Wireless Communication Systems Using Duality-Aware Two-Way Relay Cooperation. IEEE systems journal, vol.13, no.2, 1241-1249.

  65. Fakoorian, S. A. A., Swindlehurst, A. L.. On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.31, no.9, 1701-1713.

LOADING...

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 논문

해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

관련 콘텐츠

유발과제정보 저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로