期刊文献+

物理层安全的随机波束成型传输算法 被引量:5

The Random Beamforming Security Scheme of Physical Layer
下载PDF
导出
摘要 针对传统信息论物理层安全研究中,对合法用户信道质量要求较高的问题,文中提出随机波束成型的物理层安全传输方法。该方法通过在主信道特征向量的垂直方向构造人工随机波束成型信道,使得合法用户与窃听方信道传输特征的差异性转化为信道质量的差异,最终得到正的保密容量。为保证算法的完备性,文章解决了三方面问题:1)给出随机波束成型的空间构造方法;2)随机波束成型方法的保密容量和最佳信源分布;3)人工随机信道的构造方法。最后针对采用随机波束成型算法的发送分集系统,通过设计、仿真其噪声发生和功率分配方案,进一步说明即使在合法用户信道质量差的情况下,随机波束成型传输算法也可获得保密传输容量。 In conventional information theory research on physical layer security, to lower the requirement of the main channel quality, the random beanfforming security scheme (RBS) is presented in this paper. This method sends the information data on the direction of the main channel, and adds muhiplicative interference on the vertical direction. As a result, this scheme converts the channel characteristic (such as channel states vector) difference between the main channel and the wiretap channel to the channel quality difference, and makes the secrecy capacity positive. For the completeness of RBS, we solved three problems : 1 ) Presenting the construction method of RBS in vector space ; 2) Calculating the secrecy capacity and optimum source distribution; 3 ) Constructing the artificial noise. Finally, with the RBS in transmitting diversity system, after designing and simulating the noise generating, power allocation scheme, we illustrate that RBS can get a positive secrecy capacity, even the main channel is worse than the wiretap channel.
出处 《信号处理》 CSCD 北大核心 2013年第1期24-30,共7页 Journal of Signal Processing
基金 国家自然科学基金资助(编号:61171108)
关键词 无线安全 物理层 信道特性 随机波束成型 Wireless communication security Physical layer Channel characteristic Random beamforming
  • 相关文献

参考文献1

二级参考文献1

共引文献1

同被引文献56

  • 1WYNER A D. The wire-tap channel [ J ]. Bell System Technical Journal, 1975, 54(8): 1334-1387.
  • 2GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[ J ]. IEEE Transactions on Wireless Communica- tion, 2008, 7(6): 2180-2189.
  • 3LI X H, HWU J, RATAZZI E P. Array redundancy and diversity for wireless transmissions with low probability of interception [ C ]. IEEE International Conference on A- coustics, Speech and Signal Processing, Toulouse, 2006.
  • 4LI X H, HWU J. Using antenna array redundancy and channel diversity for secure wireless transmissions [ J ]. Journal of Communications, 2007, 2(3):24-32.
  • 5罗文字,金梁,黄开枝适定理论与应用[J].保障无线物理层安全的不信号处理,2011,27(11):1751-1756.
  • 6GODARD D. Self-leeovering equalization amt carrier tracking in Two-Dimensional data communication sys- tems [ J ]- IEEE Transactions on Communications, 1980, 28( 11 ) :1867-1875.
  • 7LI H, WANG W, YIN Q. A MUSIC-like blind co-chan- nel signals separation algorithm and its performance anal- ysis[ C ]. IEEE International Symposium on Circuits and Systems, Taipei, 2009: 844-847.
  • 8Bloch M, Barros J, Rodrigues M, et al. Wireless infor- mation theoretic security[ J]. IEEE Transactions on Infor- mation Theory, 2008, 54(6) :2515-2534.
  • 9Dean T, Goldsmith A. Physical-layer cryptography through massive MIMO[ C ] .//2013 IEEE Information Theory Work- shop (ITW) ,2013 : 1-5.
  • 10Wang H M, Yin Q Y. Distributed beamforming for physi- cal-layer security of two-way relay networks [ J ]. IEEE Transactions on Signal Processing, 2012, 60 ( 7 ) : 3532-3545.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部