Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kim, Jong Yeop -
dc.contributor.author Kim, Jin Woong -
dc.contributor.author Lee, Jemin -
dc.contributor.author Choi, Jihwan P. -
dc.date.accessioned 2018-06-25T10:25:53Z -
dc.date.available 2018-06-25T10:25:53Z -
dc.date.created 2018-06-25 -
dc.date.issued 2018-06 -
dc.identifier.citation IEEE Access, v.6, pp.32945 - 32957 -
dc.identifier.issn 2169-3536 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/6641 -
dc.description.abstract As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attacks on multiple-input-multiple-output wiretap channels for a legitimate transceiver. We present a smart eavesdropper model and a cooperative jamming solution between transceivers that can control the jamming signal power to achieve the optimal secrecy performance. In particular, for practical applications, our proposed solution considers the residual self-interference from the full-duplex receiver and the limited cancellation capability of the smart eavesdropper. We derive the secrecy outage probability in general and smart eavesdropper cases, and show numerical results and secrecy regions for evaluation. As a result, our proposed solutions can improve the secrecy performance significantly by exploiting the full-duplex receiver and the cooperative jamming strategies with the sophisticated power control according to power expenditure. © 2013 IEEE. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title Physical-Layer Security against Smart Eavesdroppers: Exploiting Full-Duplex Receivers -
dc.type Article -
dc.identifier.doi 10.1109/ACCESS.2018.2844558 -
dc.identifier.wosid 000438592600001 -
dc.identifier.scopusid 2-s2.0-85048153161 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.citation.publicationname IEEE Access -
dc.contributor.nonIdAuthor Kim, Jong Yeop -
dc.contributor.nonIdAuthor Kim, Jin Woong -
dc.identifier.citationVolume 6 -
dc.identifier.citationStartPage 32945 -
dc.identifier.citationEndPage 32957 -
dc.identifier.citationTitle IEEE Access -
dc.type.journalArticle Article -
dc.embargo.liftdate 9999-12-31 -
dc.embargo.terms 9999-12-31 -
dc.description.isOpenAccess Y -
dc.subject.keywordAuthor Physical layer security -
dc.subject.keywordAuthor full-duplex systems -
dc.subject.keywordAuthor optimal power allocation -
dc.subject.keywordAuthor jamming -
dc.subject.keywordAuthor eavesdropping -
dc.subject.keywordAuthor residual self-interference -
dc.subject.keywordAuthor secrecy outage probability -
dc.subject.keywordPlus ARTIFICIAL-NOISE -
dc.subject.keywordPlus WIRELESS NETWORKS -
dc.subject.keywordPlus OFDM SYSTEMS -
dc.subject.keywordPlus SECRECY RATE -
dc.subject.keywordPlus COMMUNICATION -
dc.subject.keywordPlus CHANNELS -
dc.contributor.affiliatedAuthor Kim, Jong Yeop -
dc.contributor.affiliatedAuthor Kim, Jin Woong -
dc.contributor.affiliatedAuthor Lee, Jemin -
dc.contributor.affiliatedAuthor Choi, Jihwan P. -

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE