期刊文献+

保障无线物理层安全的不适定理论与应用 被引量:1

Ⅲ-Posed Theory and Applications for Guaranteeing the Security of Wireless Physical Layer
下载PDF
导出
摘要 本文将不适定的思想引入无线物理层安全领域,提出不适定安全理论框架。首先,把不适定问题解的不唯一性或者不稳定性转化为信息冗余,然后结合扰动理论,使原问题转化为两类冗余信息随机化问题,形成了保障无线物理层安全的第一、二类不适定理论框架;然后,在存在信道估计误差的情况下,利用安全容量概念对理论框架的安全性能进行度量;最后,应用不适定安全理论框架研究了几个典型实例,结果表明:现有基于信号处理的物理层安全传输方法均为该理论框架的特例。 The Ill-posed security theoretical framework for guaranteeing wireless physical-layer security is proposed in the paper, by introducing the concept of ill-posed.Firstly,the ill-posed security transforms non-unique and instability of solutions into information redundancy,which transforms the original problem into two randomized problems with redundancy combining the theory of perturbation. The framework includes the first kind ill-posed secure theory based on non-unique solutions and the second kind ill-posed secure theory based on instable solutions of an ill-posed problem.The first one utilizes the non-uniqueness of ill-posed problem to introduce redundancy for the transmitted precoding parameters,which is used to randomize transmitted signals for guaranteeing physical-layer security.The second one utilizes the instability of ill-posed problem to introduce redundancy for the transmitted precoding parameters,which can be used to guarantee physical-layer security at a little cost of legitimate users' performance.Secondly,the security of the proposed framework is measured by using secrecy capacity with imperfect channel statement information.At last,some typical examples are researched under the theoretical framework of ill-posed security.The results reveal that the existing signal processing based physical-layer security methods are all the special cases of the framework.
出处 《信号处理》 CSCD 北大核心 2011年第11期1749-1756,共8页 Journal of Signal Processing
基金 国家自然科学基金项目(NO.61171108)
关键词 不适定 物理层安全 无线信道 扰动 低截获概率 Ill-posed Physical-layer security Wireless channel Perturbation Low probability of interception
  • 相关文献

参考文献1

二级参考文献5

共引文献22

同被引文献14

  • 1A. D. Wyner,The wiretap channel [ J ] , Bell Syst. Tech. J, 1975,54 : 1355-1387.
  • 2I. Csiszar and J. Korner, " Broadcast channels with confi- dential messages [ J ] , IEEE Trans. Inform. Theory, vol. IT-24, no. 3, May 1978 : 339-348.
  • 3F. Oggier and B. Hassibi, The secrecy capacity of the MI- MO wiretap channel[ C], in IEEE Int. Symp. Informa- tion Theory (ISIT) ,Toronto, ON, Canada,2008:524-528.
  • 4Y. Liang, H. V. Poor, and S. Shamai (Shitz) , Secure com- munication over fading channels [ J ] , IEEE Transactions on Information Theory, Jun, 2008,54 ( 6 ) : 2470-2492.
  • 5S. Goel and R. Neg, Guaranteeing Secrecy using Artificial Noise[ J ] ,IEEE TRANSACTIONS ON WIRELESS COM- MUNICATIONS ,2008,7:2180-2189.
  • 6W. C. Liao, T. H. Chang, W. K. Ma, et al. , Joint transmit beamforming and artificial noise design for QoS discrimi- nation in wireless downlink [ C ], presented at the IC- ASSP,2010.
  • 7Q. Haohao, C. Xiang, S. Yin, et al. , Optimal Power Alloca- tion for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications [ C ], in Communications Workshops ( ICC), 2011 IEEE International Conference on,2011:1-5.
  • 8M. Ghogho and A. Swami, Physical-layer secrecy of MI-MO communications in the presence of a Poisson random field of eavesdroppers [ C ], presented at the IEEE ICC Workshop on Physical Layer Security ,2011.
  • 9L. Wei-Cheng, C. Tsung-Hui, M. Wing-Kin, etal ,QoS- Based Transmit Beamforming in the Presence of Eaves- droppers: An Optimized Artificial-Noise-Aided Approach [ J ] , Signal Processing, IEEE Transactions on,2011,59 : 1202-1216.
  • 10M. Jainy, J. I. Choiy, T. M. Kim, et al. , Practical, Real- time, Full Duplex Wireless [ C ], presented at the Mobi- Corn, Las Vegas, Nevada,USA. ,2011.

引证文献1

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部