分段线性AF策略的安全性能分析
摘要
本文从信息理论安全的角度对无线通信中的正交中继信道的模型进行研究。本文在传统AF策略上做了一定的改进,通过将中继函数分段,并优化实现更好的安全性能。通过高斯信道的仿真,说明了分段线性AF策略在不需要复杂的编译码处理,更小的时延情况下提供比传统AF更大的安全速率。
参考文献10
-
1C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
2A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
3Lifeng Lai and Hesham E1 Gamal, " The Relay- Eavesdropper Channel: Cooperation for Secrecy" , IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
-
4I. Csiszar and J. Korner, "Broadcast channels wish confidential messages," IEEE Trans. on Information Theory, vol. 24, pp. 339-348, May 1978.
-
5A. Sendonaris, E. Erkip, B. Aazhang. User cooperation diversity-part i: System description[J]. 1EEE Trans. on Communications, 2003, 51(11): 1927-1938.
-
6J. N. Laneman, D. N. C. Tse, G. W. Wornel. Cooperative diversity in wireless networks: Efficient protocols and outage behavior[J]. IEEE Trans. on Inf. Theory, 2004, 50(12): 3062-3080.
-
7G. Kramer, M. Gastpar, P. Gupta. Cooperative strategies and capacity theorems few relay networks [J]. IEEE Transactions on Information Theory, 2005, 51(9): 3037-3063.
-
8Gupta P, Kumar P R. Toward an information theory of large networks: Anachievable rate region [J]. IEEE Transactions on Information Theory, 2003, 49(8): 1877-1894.
-
9J. N. Laneman. Cooperative Diversity: Models, Algorithms, and Architectures. Cooperation in wireless networks: Principles and applications[M]. Springer, 2006.
-
10Majid Nasiri Khormuji, and Mikael Sknglund, "On Instantaneous Relayifig," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3378-3394, July. 2010.
-
1冯友宏,曹喜珠,王韦刚,丁绪星,王再见,王启蒙.多用户调度在中继网路中的安全性能分析[J].无线电通信技术,2017,43(1):35-38.
-
2张绣望.基于802·11i的无线局域网安全性能分析[J].软件导刊,2007,0(1):59-61. 被引量:2
-
3王磊,林志,杨炜伟,管新荣.非理想CSI时MISO网络物理层安全性能分析[J].军事通信技术,2015,36(4):21-27.
-
4原泉,李海成,周亚建,赵明峰.模拟网络编码双向中继窃听信道安全性能分析[J].北京邮电大学学报,2012,35(3):112-115. 被引量:1
-
5胡德斌,胡萍,蒋启明.WiMAX中EAP-AKA认证协议与安全性能分析[J].网络安全技术与应用,2011(6):15-17.
-
6丁洁,林志阳,沈荻帆.浅谈无可信第三方的身份认证协议[J].科技创新与应用,2016,6(10):57-58. 被引量:5
-
7孙克辉,盛利元,黄德祥.逻辑加密型IC卡的安全性能分析[J].微电子技术,2002,30(1):20-23. 被引量:12
-
8王念平.一类广义Feistel密码的安全性能分析[J].大连海事大学学报,2007,33(3):63-67. 被引量:11
-
9刘在爽,王坚,孙瑞,王昭诚.无线通信物理层安全技术综述[J].通信技术,2014,47(2):128-135. 被引量:31
-
10宋紫毓,彭盛亮,赵睿.可见光通信中一种基于分段误差函数的变步长LMS算法[J].信号处理,2017,33(4):551-557. 被引量:8