Citation: | SHEN Yulong, PEI Qingqi, MA Jianfeng, “Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 746-752, 2016, doi: 10.1049/cje.2016.07.004 |
J. Talbot and D. Welsh, Complexity and Crytography:An Introduction, Cambridge, U.K., 2006.
|
A.D. Wyner, "The wire-tap channel", Bell Syst. Tech. Journal, Vol.54, No.8 pp.1355-1387, 1975.
|
J. Hershey, A. Hassan and R. Yarlagedda, "Unconventional cryptographic keying variable management", IEEE Transaction on Communications, Vol.43, No.1, pp.3-6, 1995.
|
X. Zhao, X. Wang, W. Yu, et al., "An effcient broadcast authentication protocolin wireless sensor networks", Chinese Journal of Electronics, Vol.18, No.2, pp.368-372, 2009.
|
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Transactions on Wireless Communications, Vol.7, No.6, pp.2180-2189, 2008.
|
S. Vasudevan, S. Adams, D. Geockel, et al., "Multi-user diversity for secrecy in wireless networks", Information Theorem and Applications Workshop, Amherst, MA, USA, pp.1-5, 2009.
|
L. Lai and H. El Gamal, "The relay-eavesdropper channel:Cooperation for secrecy", IEEE Trans. Inf. Theory, Vol.54, No.9, pp.4005-4019, 2008.
|
V. Aggarwal, L. Sankar, A.R. Calderbank, et al., "Secrecy capacity of a class of orthogonal relay eavesdropper channels", EURASIP Journal on Wireless Communications and Networking, Vol.2009, Article No.4, 15 pages, doi:10.1155/2009/494696, 2009.
|
M. Yuksel, X. Liu and E. Erkip, "Secure communication with a relay helping the wiretapper", IEEE Trans. on Information Forensics and Security, Vol.6, No.3, pp.818-830, 2011.
|
X. He and A. Yener, "Two-hop secure communication using an untrusted relay", EURASIP Journal on Wireless Communications and Networking, Vol.2009, Article No.9, 13 pages, doi:10.1155/2009/305146, 2009.
|
R. Negi and S. Goelm, "Secret communication using artificial noise", Proc. IEEE Vehicular Tech. Conf, Dallas TX, pp.1906-1910, 2005.
|
L. Dong, Z. Han, A. Petropulu, et al., "Improving wireless physical layer security via cooperating relays", IEEE Trans. Sig. Proc., Vol.58, No.3, pp.1875-1888, 2010.
|
D. Goeckel, S. Vasudevan, D. Towsley, et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks", IEEE Journal on Selected Areas in Communications, Vol.29, No.10, pp.2067-2076, 2011.
|
A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, et al., "Physical layer security from inter-session interference in large wireless networks", Proc. IEEE INFOCOM, Orlando, FL, pp.1179-1187, 2012.
|
S. Vasudevan, D. Goeckel and D. Towsley, "Security versus capacity tradeoffs in large wireless networks using keyless secrecy", ACM MobiHoc, Chicago, Illinois, pp.21-30, 2010.
|
L. Tamilselvan and V. Sankaranarayanan, "Prevention of impersonation attack in wireless mobile ad hoc networks", IJCSNS International Journal of Computer Science and Network Security, Vol.7, No.3, pp.118-123, 2007.
|
M. Xiao, L. Huang, H. Xu, et al., "Privacy preserving hop-distance computation in wireless sensor networks", Chinese Journal of Electronics, Vol.19, No.1, pp.191-194, 2010.
|
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel", IEEE Trans. on Information Theory, Vol.24, No.4, pp.451-456, 1978.
|
M. Mitzenmacher and E. Upfal, Probability and Computing:Randomized Alogrithms and Probabilitic Analysis, Cambridge University Press, 2005.
|