Computer Science ›› 2020, Vol. 47 ›› Issue (3): 304-311.doi: 10.11896/jsjkx.190200369
• Information Security • Previous Articles Next Articles
XI Chen-jing,GAO Yuan-yuan,SHA Nan
CLC Number:
[1]SHAFIEE S,ULUKUSS.Achievable rates in Gaussian MISO channels with secrecy constraints[C]∥IEEE International Symposium on Conference:Information Theory,2007(ISIT 2007).IEEE,2007:2466-2470. [2]KHISTI A,WORNELL G,WIESEL A,et al.On the Gaussian MIMO wiretap channel[C]∥IEEE International Symposium on Conference:Information Theory,2007(ISIT 2007).IEEE,2007:2471-2475. [3]WANG K,WANG X,ZHANG X.SLNR-based transmit beamforming for MIMO wiretap channel[J].Wireless Personal Communications,2013,71(1):109-121. [4]LI Q,MAW K.Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming[J].IEEE Tran-sactions on Signal Processing,2011,59(8):3799-3812. [5]BAGHERIKARAM G,MOTAHARIA S,KHANDANI A K.The secrecy capacity region of the Gaussian MIMO broadcast channel [J].IEEE Transactions on Information Theory,2013,59(5):2673-2682. [6]NEGI R,GOEL S.Secret communication using artificial noise [C]∥IEEE 62nd Vehicular Technology Conference,2005.IEEE,2005. [7]LAI L,GAMAL H E.The relay-eavesdropper channel:Cooperation for secrecy [J].IEEE Transactions on Information Theory,2008,54(9):4005-4019. [8]LUO S,LI J,PETROPULU A.Physical layer security with uncoordinated helpers implementing cooperative jamming[J].ar-Xiv:1202.6596,2012. [9]DONG L,HAN Z,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888. [10]EKREM E,ULUKUS S.Secrecy in cooperative relay broadcast channels[J].IEEE Transactions on Information Theory,2011,57(1):137-155. [11]LIU Y,DRAPER S C,SAYEED A M.Exploiting channel diversity in secret key generation from multipath fading randomness[J].IEEE Transactions on Information Forensics and Security,2012,7(5):1484-1497. [12]AONO T,HIGUCHI K,OHIRA T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784. [13]REN K,SU H,WANG Q.Secret key generation exploiting channel characteristics in wireless communications[J].IEEE Wireless Communications,2011,18(4):6-12. [14]BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Theory,2008,54(6):2515-2534. [15]GOERGEN N,LIN W S,LIU K J R,et al.Extrinsic channel-like fingerprint embedding for authenticating MIMO systems [J].IEEE Transactions on Wireless Communications,2011,10(12):4270-4281. [16]COBB W E,LASPE E D,BALDWIN R O,et al.Intrinsic physi- cal-layer authentication of integrated circuits [J].IEEE Tran-sactions on Information Forensics & Security,2015. [17]MARTINIAN E,WORNELLG W,CHEN B.Authentication with distortion criteria[J].IEEE Transactions on Information Theory,2005,51(7):2523-2542. [18]MA R,DAI L,WANG Z,et al.Secure communication in TDS-OFDM system using constellation rotation and noise insertion[J].IEEE Transactions on Consumer Electronics,2010,56(3):1328-1332. [19]HAN C G,HASHIMOTO T,SUEHIRO N.Constellation-rota- ted vector OFDM and its performance analysis over rayleigh fading channels [J].IEEE Transactions on Communications,2010,58(3):828-838. [20]PÖPPER C,TIPPENHAUER N O,DANEV B,et al.Investigation of Signal and Message Manipulations on the Wireless Channel[C]∥European Conference on Research in Computer Security.Springer-Verlag,2011:40-59. [21]CHEN B,ZHU C S,LI W,et al.Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper[J].IEEE Access,2017,4:3016-3025. [22]XU Z,YUAN T,GONG Y,et al.Achieving secure communica- tion through random phase rotation technique[C]∥Wireless Communications & Mobile Computing Conference.IEEE,2017. [23]ALTHUNIBAT,SUCASAS V,RODRIGUEZ J.A Physical Layer Security Scheme by Phase-Based Adaptive Modulation[J].IEEE Transactions on Vehicular Technology,2017,66(11):9931-9942. [24]HUSAIN M I,MAHANT S,SRIDHAR R.CD-PHY:Ph-ysical layer security in wireless networks through constellation diversity [J].arXiv:1108.5148,2012. [25]MA R,WANG Z,YANG Z.Improving physical layer security using APSK constellations with finite-alphabet inputs [C]∥2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).2013:149-152. [26]ZANG G,HUANG B,CHEN L,et al.One trans-mission scheme based on variable MSK modulator for wireless physical layer security[C]∥2015 International Conference on Wireless Communications & Signal Processing (WCSP).2015:1-5. [27]MAO X N,LIN K J,LIU H.A physical layer security algorithm based on constellation[C]∥International Conference on Communication Technology.IEEE,2018. [28]HUANG Y,EL-HAJJAR M.Mohammed Multi-dimensional en- cryption scheme based on physical layer for fading channel[J].IET Communications,2018,12(9):2470-2477. [29]LEI B B.Research on Protection Algorithms of Modulation Mode Based on Physical Layer Encryption[D].Xi’an:Northwest University,2012. [30]XIONG T,LOU W,ZHANG J,et al.MIO:Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation [J].IEEE Transactions on Information Forensics and Security,2015,10(8):1678-1691. [31]PROAKIS J G,MASOUD S.Digital Communications:Fifth Edition[M].Electronic Industry Press,2012. |
[1] | JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278. |
[2] | ZHAO Geng, SONG Xin-yu, MA Ying-jie. Secure Data Link of Unmanned Aerial Vehicle Based on Chaotic Sub-carrier Modulation [J]. Computer Science, 2022, 49(3): 322-328. |
[3] | WANG Chao, WEI Xiang-lin, TIAN Qing, JIAO Xiang, WEI Nan, DUAN Qiang. Feature Gradient-based Adversarial Attack on Modulation Recognition-oriented Deep Neural Networks [J]. Computer Science, 2021, 48(7): 25-32. |
[4] | DING Qing-feng, XI Tao, LIAN Yi-chong, WU Ze-xiang. Antenna Selection for Spatial Modulation Based on Physical Layer Security [J]. Computer Science, 2020, 47(7): 322-327. |
[5] | CHEN Jin-yin, CHENG Kai-hui and ZHENG Hai-bin. Deep Learning Based Modulation Recognition Method in Low SNR [J]. Computer Science, 2020, 47(6A): 283-288. |
[6] | CHEN Jin-yin, JIANG Tao and ZHENG Hai-bin. Radio Modulation Recognition Based on Signal-noise Ratio Classification [J]. Computer Science, 2020, 47(6A): 310-317. |
[7] | CHEN Pei-pei, LI Tao-shen, FANG Xing, WANG Zhe. Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System [J]. Computer Science, 2020, 47(6): 316-321. |
[8] | XU Mao,HOU Jin,WU Pei-jun,LIU Yu-ling,LV Zhi-liang. Convolutional Neural Networks Based on Time-Frequency Characteristics for Modulation Classification [J]. Computer Science, 2020, 47(2): 175-179. |
[9] | CHEN Chao, ZHAO Chun-lei, ZHANG Chun-xiang, LUO Hui. Review of IoT Sonar Perception [J]. Computer Science, 2020, 47(10): 9-18. |
[10] | PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you. Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference [J]. Computer Science, 2019, 46(6): 168-173. |
[11] | ZOU Peng, CHEN Yu-zhang, CHEN Long-biao, ZENG Zhang-fan. Night Vision Restoration Algorithm Based on Neural Network for Illumination Distribution Prediction [J]. Computer Science, 2019, 46(11A): 329-333. |
[12] | YU Xiu-lan, WANG Si-yi. Adaptive Information Transmission Scheme for LEO Satellite Based on Ka Band [J]. Computer Science, 2019, 46(11): 72-79. |
[13] | JIANG Xuan-you, WEI Yi-min, WANG Lei, LIU Ling-jun, PENG Lei. M-APSK Signal Modulation and Demodulation Method Approaching Gaussian Channel Capacity [J]. Computer Science, 2019, 46(10): 97-102. |
[14] | CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153. |
[15] | LIU Dan, MA Xiu-rong and SHAN Yun-long. Digital Modulation Signal Recognition Method Based on ST-RFT Algorithm [J]. Computer Science, 2018, 45(5): 64-68. |
|