期刊文献+

部分信道特征下的物理层安全编码方法 被引量:1

Scheme of physical layer secrecy coding under partial channel characteristics
下载PDF
导出
摘要 针对部分信道特征(授权信道特征存在估计误差且窃听信道特征未知)下的物理层安全传输问题,结合人工噪声和安全编码,提出了一种实用的物理层安全编码方法。多天线发射机采用波束成型传输信号时添加与授权信道特征正交的人工噪声,利用交织LDPC码缩小安全距离,在授权信道SNR约束下求最小私密中断概率,实现功率优化分配,尽可能使窃听信道保持低SNR高BER,授权信道保持高SNR低BER,从而实现物理层安全传输。仿真结果表明,在授权信道SNR约束下,本方法可以实现较低的私密中断概率。 This paper proposed a scheme of physical layer secrecy coding under partial channel characteristics aiming at physical layer secure transmission problem.The multi-antenna transmitter exploited beam-former to send signal with artificial noise which was orthogonal with authorized channel characteristics.It used interleaving LDPC to reduce the security gap between authorized channel and eavesdropping channel.Then found the minimum secrecy outage probability with authorized channel SNR constraint,and archived the optimal power allocation for physical layer secure transmission.So the authorized channel could keep low BER with high SNR,while the eavesdropping channel could only have high BER with low SNR.Simulation results show that,the proposed method can realize lower secrecy outage probability with authorized channel SNR constraint
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3452-3455,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61171108)
关键词 人工噪声 波束成型 交织LDPC 私密中断概率 artificial noise beam-former interleaving LDPC secrecy outage probability
  • 相关文献

参考文献15

  • 1SHANNON C. Communication theory of secrecy systems [ J ]. Bell Systems Technical Journal, 1949,29(1) ;656-715.
  • 2WYNER A D. The wire-tap channel[ J]. Bell Systems Technical Journal,1975,54(8) :1355-1387.
  • 3LEUNG-YAN-CHEONG S,HELLMAN M E. The gaussian wire-tap channel[ J]. IEEE Trans on Information Theory, 1978,24(4): 451-456.
  • 4KHISTI A, WORNELL G W. Secure transmission with multiple antennas I:the MISOME wiretap channel[ J]. IEEE Trans on Information Theory,2010,56(7) :3088-3104.
  • 5LI Jiang-yuan, PETROPULU A P. On ergodic secrecy rate for gaussian miso wiretap channels[ J]. IEEE Trans on Wireless Comrnuni-cations,2011,10(4) :1176-1187.
  • 6KLINC D, HA J, MCLAUGHLIN S,et al. LDPC codes for physical layer security [ C ] //Proc of the 28 th IEEE Global Telecommunications Conference. Piscataway,NJ:IEEE Press,2009:1-6.
  • 7BALDI M, BIANCHI M,CHIARALUCE F. Non-systematic codes for physical layer security [ C ] //Proc of IEEE Information Theory Workshop. 2010:1-5.
  • 8GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[ J]. IEEE Trans on Wireless Communications, 2008, 7 (6) : 2180-2189.
  • 9ZHOU Xiang-yun, MCKAY M R. Secure transmission with artificial noise over fading channels : achievable rate and optimal power allocation [J]. IEEE Trans on Vehicular Technology, 2010,59 (8 ): 3831-3842.
  • 10LIAO Wei-cheng, CHANG T H, MA W K’ef al. QoS-based transmit beamforming in the presence of eavesdroppers : an optimized artificial-noise-aided approach [ J ]. IEEE Trans on Signal Processing, 2011,59(3) : 1202-1216.

同被引文献13

  • 1Goldsmith A.无线通信[M].杨鸿文,李卫东,郭文彬,等译.北京:人民邮电出版社.2006:1-5.
  • 2LUN Dong, ZHU Han, PETROPULU A P, et al.Improving wireless physical layer security via cooperating relays[J].IEEE Trans on Signal Processing,2010,5(3):1875-1888.
  • 3WANG Qian, SU Hai, REN Kui, et al.Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]//Proc of IEEE INFOCOM.2011:1422-1430.
  • 4WANG Qian , XU Kai-he, REN Kui.Cooperative secret key generation from phase estimation in narrowband fading channels[J].IEEE Journal on Selected Areas in Communication,2012,30(9):1666-1674.
  • 5JANA S, PREMNATH S N, CLARK M, et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[J].IEEE Trans on Mobile Computing,2013,12(5):917-930.
  • 6SUN Xiao-jun, XU Wei, JIANG Ming, et al.Improved generation efficiency for key extracting from wireless channels[C]//Proc of IEEE International Conference on Communications.2011:1-6.
  • 7PATWARI N, CROFT J, JANA S, et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Trans on Mobile Computing,2010,9(1):17-30.
  • 8RIFE D, BOORSTYN R.Single-tone parameter estimation from discrete-time observations[J].IEEE Trans on Information Theory,1974,20(5):591-598.
  • 9陈玉磊,季新生,黄开枝,吉江.一种提高OFDM系统安全传输的载波功率分配算法[J].计算机应用研究,2012,29(6):2236-2239. 被引量:1
  • 10李翔宇,金梁,黄开枝.基于人工噪声的中继网络物理层安全传输机制[J].计算机应用研究,2012,29(9):3467-3469. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部