Detailed Information

Cited 3 time in webofscience Cited 4 time in scopus
Metadata Downloads

Transmission Strategy Against Opportunistic Attack for MISO Secure Channels

Full metadata record
DC Field Value Language
dc.contributor.authorRyu, Jong Yeol-
dc.contributor.authorLee, Jemin-
dc.contributor.authorQuek, Tony Q. S.-
dc.date.accessioned2022-12-26T20:01:17Z-
dc.date.available2022-12-26T20:01:17Z-
dc.date.issued2016-11-
dc.identifier.issn1089-7798-
dc.identifier.issn1558-2558-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/15162-
dc.description.abstractFor a multiple-input-single-output secure channel, we consider the transmission strategies, including transmission rate and beamformer against opportunistic attack, which eavesdrops or generates jamming signal with certain probabilities. Based on the perfect and partial channel state information of jamming channel, we design the transmission strategies against the jamming, eavesdropping, and both attacks. Then, we provide the optimal transmission strategy in terms of expected secrecy rate for the given attack strategy.-
dc.format.extent4-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleTransmission Strategy Against Opportunistic Attack for MISO Secure Channels-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/LCOMM.2016.2591542-
dc.identifier.scopusid2-s2.0-84996931180-
dc.identifier.wosid000388629300046-
dc.identifier.bibliographicCitationIEEE COMMUNICATIONS LETTERS, v.20, no.11, pp 2304 - 2307-
dc.citation.titleIEEE COMMUNICATIONS LETTERS-
dc.citation.volume20-
dc.citation.number11-
dc.citation.startPage2304-
dc.citation.endPage2307-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorJamming-
dc.subject.keywordAuthoreavesdropping-
dc.subject.keywordAuthoropportunistic attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
해양과학대학 > 지능형통신공학과 > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Ryu, Jong Yeol photo

Ryu, Jong Yeol
IT공과대학 (AI정보공학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE