Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jong Yeop | - |
dc.contributor.author | Kim, Jin Woong | - |
dc.contributor.author | Lee, Jemin | - |
dc.contributor.author | Choi, Jihwan P. | - |
dc.date.accessioned | 2018-06-25T10:25:53Z | - |
dc.date.available | 2018-06-25T10:25:53Z | - |
dc.date.created | 2018-06-25 | - |
dc.date.issued | 2018-06 | - |
dc.identifier.citation | IEEE Access, v.6, pp.32945 - 32957 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/6641 | - |
dc.description.abstract | As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attacks on multiple-input-multiple-output wiretap channels for a legitimate transceiver. We present a smart eavesdropper model and a cooperative jamming solution between transceivers that can control the jamming signal power to achieve the optimal secrecy performance. In particular, for practical applications, our proposed solution considers the residual self-interference from the full-duplex receiver and the limited cancellation capability of the smart eavesdropper. We derive the secrecy outage probability in general and smart eavesdropper cases, and show numerical results and secrecy regions for evaluation. As a result, our proposed solutions can improve the secrecy performance significantly by exploiting the full-duplex receiver and the cooperative jamming strategies with the sophisticated power control according to power expenditure. © 2013 IEEE. | - |
dc.language | English | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Physical-Layer Security against Smart Eavesdroppers: Exploiting Full-Duplex Receivers | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/ACCESS.2018.2844558 | - |
dc.identifier.wosid | 000438592600001 | - |
dc.identifier.scopusid | 2-s2.0-85048153161 | - |
dc.type.local | Article(Overseas) | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.citation.publicationname | IEEE Access | - |
dc.contributor.nonIdAuthor | Kim, Jong Yeop | - |
dc.contributor.nonIdAuthor | Kim, Jin Woong | - |
dc.identifier.citationVolume | 6 | - |
dc.identifier.citationStartPage | 32945 | - |
dc.identifier.citationEndPage | 32957 | - |
dc.identifier.citationTitle | IEEE Access | - |
dc.type.journalArticle | Article | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.description.isOpenAccess | Y | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | full-duplex systems | - |
dc.subject.keywordAuthor | optimal power allocation | - |
dc.subject.keywordAuthor | jamming | - |
dc.subject.keywordAuthor | eavesdropping | - |
dc.subject.keywordAuthor | residual self-interference | - |
dc.subject.keywordAuthor | secrecy outage probability | - |
dc.subject.keywordPlus | ARTIFICIAL-NOISE | - |
dc.subject.keywordPlus | WIRELESS NETWORKS | - |
dc.subject.keywordPlus | OFDM SYSTEMS | - |
dc.subject.keywordPlus | SECRECY RATE | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | CHANNELS | - |
dc.contributor.affiliatedAuthor | Kim, Jong Yeop | - |
dc.contributor.affiliatedAuthor | Kim, Jin Woong | - |
dc.contributor.affiliatedAuthor | Lee, Jemin | - |
dc.contributor.affiliatedAuthor | Choi, Jihwan P. | - |