期刊文献+

一种基于投影的MIMO物理层安全传输方法

A Security Scheme of Physical Layer transmission based on Projection in MIMO Wireless Communication
下载PDF
导出
摘要 为了保证MIMO系统无线传输安全,提出了一种基于投影的物理层安全传输方案。基站在合法信道的投影空间发射相互正交的涉密信号和干扰信号,干扰窃听方恢复信息,同时不影响期望用户接收信号。给出了两种信号保密容量准则下功率分配的迭代算法。通过分析干扰对窃听信号统计特性的影响,证明了对窃听方盲处理造成的不确定度(indeterminacy)。仿真结果表明,该方案具有较高的保密信道容量,在期望用户处获得比已有方案更低的误码率,而窃听方无法正确解调。 A scheme based on projection operator is proposed to guarantee the information theoretical security in MIMO physical layer transmission.The transmitter has multiple antennas and is able to simultaneously transmit separately information bearing signal to the intended receiver and randomized interference to the eavesdropper in the projection space.An iterative algorithm of power allocation between them is given according to the secret channel capacity criteria.Based on the special statistical distributions of the adversary’s received signal,the indeterminacy of its blind deconvolution is proved.Numerical results indicate that the secret channel capacity of this scheme is enhanced with reduced bit error rate at the target user,while the eavesdropper can not demodulate correctly.
出处 《电路与系统学报》 北大核心 2013年第1期290-296,共7页 Journal of Circuits and Systems
基金 国家重大科技专项(2009zx03003-005 2009zx03007-003) 国家自然科学基金(61271253) 国家863项目(2013AA013603)
关键词 多入多出 物理层安全 低截获概率 投影 不确定度 multi-input multi-output(MIMO) physical layer security low probability of interception projection indeterminacy
  • 相关文献

参考文献16

  • 1Liang Y, Poor H V, Shamai Shitz S. Information theoretic security [I]. Foundations and Trends in Communications and Information Theory, 2009, 5(4-5): 355-580.
  • 2Chunxuan Ye, Suhas Mathur, Alex Reznik, et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 240-254.
  • 3Chan Chen, Michael A. Jensen. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients [J]. IEEE Transcations on Mobile Computing, 2011, 10(2): 205-215.
  • 4穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. 被引量:36
  • 5Li X, Ratazzi E P. MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks [A]. IEEE MILCOM 2005 [C]. 2005. 1-7.
  • 6Mukherjee A, Swindlehurst A L. Robust beamforming for security in MIMO wiretap channels with imperfect CSI [J]. IEEE Transactions onSignal Processing, 2011, 59(1): 351-361.
  • 7Goel S, Negi R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 8Goel S. Guaranteeing Secrecy in Wireless Networks using Artificial Noise [A]. VTC-2005-Fall [C]. 2005. 1906-1910.
  • 9程云鹏.矩阵论(第二版)[M].西安:西北工业出版社,2008.
  • 10Zhang Y Y, Zhang S L, Zhu Y J, et al. Linear Precoder-Based Signal Design of H-BLAST in MIMO Wireless Communications System [J]. Advanced Materials Research, 2011,204: 1915-1919.

二级参考文献11

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部