Cited 4 time in
Transmission Strategy Against Opportunistic Attack for MISO Secure Channels
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Ryu, Jong Yeol | - |
| dc.contributor.author | Lee, Jemin | - |
| dc.contributor.author | Quek, Tony Q. S. | - |
| dc.date.accessioned | 2022-12-26T20:01:17Z | - |
| dc.date.available | 2022-12-26T20:01:17Z | - |
| dc.date.issued | 2016-11 | - |
| dc.identifier.issn | 1089-7798 | - |
| dc.identifier.issn | 1558-2558 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/15162 | - |
| dc.description.abstract | For a multiple-input-single-output secure channel, we consider the transmission strategies, including transmission rate and beamformer against opportunistic attack, which eavesdrops or generates jamming signal with certain probabilities. Based on the perfect and partial channel state information of jamming channel, we design the transmission strategies against the jamming, eavesdropping, and both attacks. Then, we provide the optimal transmission strategy in terms of expected secrecy rate for the given attack strategy. | - |
| dc.format.extent | 4 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
| dc.title | Transmission Strategy Against Opportunistic Attack for MISO Secure Channels | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/LCOMM.2016.2591542 | - |
| dc.identifier.scopusid | 2-s2.0-84996931180 | - |
| dc.identifier.wosid | 000388629300046 | - |
| dc.identifier.bibliographicCitation | IEEE COMMUNICATIONS LETTERS, v.20, no.11, pp 2304 - 2307 | - |
| dc.citation.title | IEEE COMMUNICATIONS LETTERS | - |
| dc.citation.volume | 20 | - |
| dc.citation.number | 11 | - |
| dc.citation.startPage | 2304 | - |
| dc.citation.endPage | 2307 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Jamming | - |
| dc.subject.keywordAuthor | eavesdropping | - |
| dc.subject.keywordAuthor | opportunistic attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
