期刊文献+

基于多径信道随机延时的物理层全算法

Security method of wireless physical layer security based on multipath channel random delay
下载PDF
导出
摘要 针对无线通信遇到的第三方窃听问题,利用无线通信系统信道多径延时丰富的特征,提出了一种保证物理层安全传输的加密算法。该算法中,数据发送用户根据估计的多径延时信息随机提前符号发送时间,使授权用户的同步位置有较强的多径信号到达,授权接收用户在保持同步状态不变的情况下可以正常接收信息。而窃听用户具有不同的信道多径延时特征,接收到的信号幅度和相位会随机变化,难以进行同步跟踪,因此接收到的符号会产生大量的误码,从而提高授权用户之间的安全传输性能。仿真结果表明,该算法能有效提高窃听方的误码率,提高授权用户通信的安全性,从而可在多径环境中有效保证物理层通信安全。 For the wire-tapping in wireless communication system, this paper presented an encrypting method based on chan- nel multipath delay-time information to ensure the security of physical layer in wireless communication system. In this method, the transmitter made the time to transmit symbol random with channel multipath delay-time information that estimated, and made the received signal of legitimate receiver stronger at the synchronization location. So the legitimate could receive the information normally. While the received signal of eavesdropper turned random for different channel information, such as phase and range. Then the eavesdropper couldn' t recover the information with the random received signal, and the error probability was high,which increased the security of legitimate receiver. The simulations show that the method can keep the eavesdropper' s error probability at a high level, so as to increase the system security. Finally, it comes to the conclusion that this method can ensure the security of physical layer in wireless communication system with channel multipath.
出处 《计算机应用研究》 CSCD 北大核心 2012年第8期3039-3041,3045,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61171108)
关键词 无线通信系统 物理层安全 信道多径信息 延时信息 同步 误码率 wireless communication system physical layer secrecy channel multipath information delay-time informa- tion synchronization error probability
  • 相关文献

参考文献15

  • 1WYNER A D. The wire-tap channel [ J ]. The Bell System Techni- cal doumal, 1975,54 (8) : 1355-1387.
  • 2CSISZAR I, KONER J. Broadcast channels with confidential messages [ J]. IEEE Trans on Information Theory, 1978,24(5 ) :339-348.
  • 3LEUNG S K, CHEONG Y, HELLMAN M E. The Gaussian wire-tap channel [ J ]. IEEE Trans on Information Theory, 1978,24 ( 7 ) : 451-456.
  • 4LIANG Ying-bin, POOR H V, SHAMAI S ( Shitz ). Information theo- retic security [ J ]. Foundations and Trends in Communications and Information Theory,2008,5(4-5 ) :355-580.
  • 5NEGI R, GOEL S. Secure communications using artificial noise [ C ]// Proc of IEEE Vehicle Technology Conference. 2005:1906-1910.
  • 6GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [ J ]. IEEE Trans on Wireless Communication, 2008,7 ( 6 ) : 2180- 2189.
  • 7LI Xiao-hua, CHEN Mo. Array-transmission based physical-layer secu- rity techniques for wireless sensor networks [ C ]//Proc of IEEE Inter-national Conference on Mechatronics & Automation. 2005.
  • 8LI Xiao-hua, HWU J. Using antenna array redundancy and channel diversity for secure wireless transmissions [ J]. Journal of communi- cations ,2007,2 (3) :24- 32.
  • 9穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. 被引量:36
  • 10ZHANG R, SONG L, HAN Z, et al. Physical layer security for two way relay communications with friendly jammers [ C ]//Proc of IEEE Global Telecommunications Conference. 2010 : 1-6.

二级参考文献11

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部