차세대 무선 네트워크를 위한 물리계층 보안 기술

  • 임상훈 (한국과학기술원 전기 및 전자공학부) ;
  • 윤상석 (한국과학기술원 전기 및 전자공학부) ;
  • 박정욱 (한국과학기술원 전기 및 전자공학부) ;
  • 하정석 (한국과학기술원 전기 및 전자공학부)
  • Published : 2015.10.25

Abstract

Keywords

References

  1. R. V. Meter, K. M. Itoh, and T. D. Ladd. "Architecturedependent execution time of Shor's algorithm." in Proc. Int. Symp. on Mesoscopic Superconductivity and Spintronics. 2006.
  2. C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  3. A. D. Wyner "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1255-2387, Oct. 1975.
  4. S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. on Inf. Theory, vol. 23, no. 5, pp. 625-627, Sept. 1977. https://doi.org/10.1109/TIT.1977.1055763
  5. A. Khisti and G. W. Wornell, "Secure Transmission With Multiple Antennas&-Part II: The MIMOME Wiretap Channel," IEEE Trans. on Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. https://doi.org/10.1109/TIT.2010.2068852
  6. S. Goel and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. on Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. https://doi.org/10.1109/TWC.2008.060848
  7. H. Qin, X. Chen, Y. Sun, M. Zhao, and J. Wang, "Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications," IEEE Int. Conf. on Commun. Workshops (ICC) , June 2011, pp.1-5.
  8. X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Trans. on Vehicular Tech., vol. 59, no. 8, pp. 3831-3842, Oct. 2010. https://doi.org/10.1109/TVT.2010.2059057
  9. Hu Jin, 김준수, "협력중계 시스템에서의 물리계층 보안 기술," 한국 통신학회지, 제 31권 제2호, 91-97, 2014년 2월
  10. K. Lee, C. Chae, and J. Kang. "Spectrum leasing via cooperation for enhanced physical-layer secrecy," IEEE Trans. on Vehicular Tech., vol. 62, no. 9, pp. 4672-4678, June 2013. https://doi.org/10.1109/TVT.2013.2269617
  11. H. Jeon, S. W. McLaughlin, I. Kim, and J. Ha, "Secure communications with untrusted secondary nodes in cognitive radio networks," IEEE Trans. on Wireless Commun. vol. 13, no. 4, pp. 1790-1805, Apr. 2014. https://doi.org/10.1109/TWC.2013.021214.130089
  12. P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Sep. 2005, pp. 2152-2155.
  13. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908
  14. Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Communications, Control and Computing, Monticello, Sep. 2006, pp. 841-848.
  15. Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secrecy capacity region of fading broadcast channels," in Proc. IEEE Int. Symp. Information Theory, Nice, Jun. 2007, pp. 1291-1295.
  16. P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, June 2007, pp. 1306-1310.
  17. Mitola III, Joseph, and Gerald Q. Maguire Jr. "Cognitive radio: making software radios more personal," IEEE Personal Commun., vol. 6. no. 4, pp. 13-18, Aug. 1999. https://doi.org/10.1109/98.788210
  18. I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008. https://doi.org/10.1109/MCOM.2008.4481339
  19. Y. Wu, and K. J. Liu. "An information secrecy game in cognitive radio networks," IEEE Trans. Inform. Forensics and Security, vol. 6, no. 3, pp. 831-842, Sep. 2011. https://doi.org/10.1109/TIFS.2011.2144585
  20. I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013. https://doi.org/10.1109/TWC.2012.120412.112001
  21. Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009. https://doi.org/10.1109/TIT.2008.2009584
  22. M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011.
  23. X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011. https://doi.org/10.1109/TIT.2011.2121450