Home > Research > Publications & Outputs > Interference masking for secure wireless broadc...

Links

Text available via DOI:

View graph of relations

Interference masking for secure wireless broadcast communications

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Interference masking for secure wireless broadcast communications. / Ding, Zhiguo; Leung, Kin K.; Poor, H. Vincent.
In: IET Communications, Vol. 8, No. 8, 22.05.2014, p. 1184-1197.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Ding, Z, Leung, KK & Poor, HV 2014, 'Interference masking for secure wireless broadcast communications', IET Communications, vol. 8, no. 8, pp. 1184-1197. https://doi.org/10.1049/iet-com.2013.0330

APA

Ding, Z., Leung, K. K., & Poor, H. V. (2014). Interference masking for secure wireless broadcast communications. IET Communications, 8(8), 1184-1197. https://doi.org/10.1049/iet-com.2013.0330

Vancouver

Ding Z, Leung KK, Poor HV. Interference masking for secure wireless broadcast communications. IET Communications. 2014 May 22;8(8):1184-1197. doi: 10.1049/iet-com.2013.0330

Author

Ding, Zhiguo ; Leung, Kin K. ; Poor, H. Vincent. / Interference masking for secure wireless broadcast communications. In: IET Communications. 2014 ; Vol. 8, No. 8. pp. 1184-1197.

Bibtex

@article{7fde138edd0748599373b142b8605dc4,
title = "Interference masking for secure wireless broadcast communications",
abstract = "Physical layer security has been recognised as a promising technique to realise secure wireless communications. A novel interference masking approach is proposed for secure broadcast scenarios. Specifically, when there is an external jamming node, precoding matrices at the source and jammer are carefully designed to ensure that each destination can detect only its own message, and not the information intended for other destinations which is masked with artificial noise. When there is no external jamming node, interference masking is implemented through user cooperation, in which destinations switch roles from jammer to relay nodes during different time slots. Both analytical and numerical results are provided to demonstrate the performance of the proposed approaches.",
author = "Zhiguo Ding and Leung, {Kin K.} and Poor, {H. Vincent}",
year = "2014",
month = may,
day = "22",
doi = "10.1049/iet-com.2013.0330",
language = "English",
volume = "8",
pages = "1184--1197",
journal = "IET Communications",
issn = "1751-8628",
publisher = "Institution of Engineering and Technology",
number = "8",

}

RIS

TY - JOUR

T1 - Interference masking for secure wireless broadcast communications

AU - Ding, Zhiguo

AU - Leung, Kin K.

AU - Poor, H. Vincent

PY - 2014/5/22

Y1 - 2014/5/22

N2 - Physical layer security has been recognised as a promising technique to realise secure wireless communications. A novel interference masking approach is proposed for secure broadcast scenarios. Specifically, when there is an external jamming node, precoding matrices at the source and jammer are carefully designed to ensure that each destination can detect only its own message, and not the information intended for other destinations which is masked with artificial noise. When there is no external jamming node, interference masking is implemented through user cooperation, in which destinations switch roles from jammer to relay nodes during different time slots. Both analytical and numerical results are provided to demonstrate the performance of the proposed approaches.

AB - Physical layer security has been recognised as a promising technique to realise secure wireless communications. A novel interference masking approach is proposed for secure broadcast scenarios. Specifically, when there is an external jamming node, precoding matrices at the source and jammer are carefully designed to ensure that each destination can detect only its own message, and not the information intended for other destinations which is masked with artificial noise. When there is no external jamming node, interference masking is implemented through user cooperation, in which destinations switch roles from jammer to relay nodes during different time slots. Both analytical and numerical results are provided to demonstrate the performance of the proposed approaches.

U2 - 10.1049/iet-com.2013.0330

DO - 10.1049/iet-com.2013.0330

M3 - Journal article

AN - SCOPUS:84901938704

VL - 8

SP - 1184

EP - 1197

JO - IET Communications

JF - IET Communications

SN - 1751-8628

IS - 8

ER -