期刊文献+

卫星通信物理层安全技术研究展望 被引量:9

Physical Layer Security in Satellite Communications
下载PDF
导出
摘要 物理层安全技术为通信信息安全研究开辟了新的途径。论述了卫星通信物理层安全技术应用的可行性,分析了现有物理层安全技术及其应用于卫星通信的潜在问题,提出了卫星通信物理层安全可研究方向,及基于单星平台、星座平台、天基平台通信系统条件下的关键技术,展望了卫星通信物理层安全技术的发展前景。 The technology of physical layer security(PLS) has provided a new way for information protection. This paper discusses the applications of PLS in satellite communications(SC). First, the foundation of PLS is in- troduced, and several popular PLS methods used in terrestrial wireless communication are reviewed. Second, the possibilities of applying those methods on SC are discussed with different platforms, including single-satellite, constellation and space platform. Finally, the prospect of PLS in SC is omsDected.
出处 《电讯技术》 北大核心 2013年第3期363-370,共8页 Telecommunication Engineering
关键词 卫星通信 物理层安全 星座平台 satellite communication physical-layer security constellation platform
  • 相关文献

参考文献41

二级参考文献54

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献68

同被引文献45

  • 1多丽华,杨拥民.装备远程协同诊断服务共享框架及其关键技术研究[J].设备管理与维修,2006(3):35-37. 被引量:3
  • 2Shannon C E.Communication Theory of Secrecy Systems[J].Bell System Technical Journal,1949,28(04):656-715.
  • 3Wyner A D. The Wire-tap Channel[J].The Bell SystemTechnical Journal,1975,54(08): 1355-1387.
  • 4Goel S,Negi R.Guaranteeing Secrecy Using ArtificialNoise[J].IEEE Transactions on Wireless Communications,2008,7(06):2180-2189.
  • 5Li W,Ghogho M,Chen B,et al.Secure Communication ViaSending Artificial Noise By the Receiver:Outage SecrecyCapacityregion Analysis[J].IEEE CommunicationsLetters,2012,16(10):1628-1631.
  • 6Oohama Y.Capacity Theorems for Relay ChannelsWith Confidential Messages[C].IEEE InternationalSymposium on Information Theory,Seattle,USA:IEEEISIT,2007:926-930.
  • 7Dong L,Han Z,Petropulu A P,et al.Improving WirelessPhysical Layer Security Via Cooperating Relays[J].IEEETransactions on Signal Processing,2010,58(03):1875-1888.
  • 8Ekrem E,Ulukus S.Secrecy in Cooperative RelayBroadcast Channels[J].IEEE Transactions on InformationTheoiy,2011,57(01):137-155.
  • 9Huang J,Swindlehurst A L.Secure Communications ViaCooperative Jamming in Two-hop Relay Systems[C].IEEEGlobal Communications Conference,Miami,USA:IEEEPress,2010:1-5.
  • 10Jeong C,Kim I M,Kim D I.Joint Secure Beamfonning DesignAt the Source and the Relay for An Amplify-and-forwardMIMO Untrusted Relay System[J].IEEE Transaction onSignal Processing,2012,60(01):310-325.

引证文献9

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部