期刊文献+

分布式多天线跳空收发技术(Ⅱ)——权值反馈型反向训练模式下的0/1式跳空技术 被引量:9

A Distributed Multi-Antenna Space Hopping Transceiver Technique:PartⅡ 0/1 Space Hopping Technique in Backward Training Mode with Weight-Feedback
下载PDF
导出
摘要 针对正向训练模式下的0/1式跳空技术在跳空图案泄露后存在的安全隐患,提出了权值反馈型反向训练模式下的0/1式跳空技术。该技术在发射方和目标用户均使用多天线,双方采用反向训练技术,使目标用户获得与正向训练模式下一致的权值,而侦听方即使窃取了跳空图案,但由于无线信道的差异性,仍然无法正确解调,这一点完全不同于传统跳频扩频方案。反向训练技术以从根源上解决无线通信安全问题为出发点,充分利用无线信号丰富的时空谱资源,保证了物理层安全传输。仿真结果表明,在跳空图案和反馈权值都泄露的情况下,侦听方的误符号率始终极高,根本无法侦听信息。 Since the 0/1 space hopping technique in forward training mode has security problems after the leak of space hopping pattern,a backward training technique with weight-feedback is proposed.Through backward training between the transmitter and the target user,the target user can obtain the weights that are equivalent with those generated from the forward training,while the eavesdropper,even if she steals the space hopping pattern,cannot correctly demodulate because of the diversity of the wireless channel.It is this technique that is completely different from the traditional frequency hopping spread spectrum technique.The proposed technique aims at solving the secure problem of wireless communications fundamentally,makes full use of the abundant space-time spectrum resources of the wireless signals,and ensures secure transmission in physical layer.Simulation results show that even when both the space hopping pattern and the feedback weights are leaked,the eavesdropper keeps a high symbol error rate and cannot intercept information.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2013年第6期1-5,11,共6页 Journal of Xi'an Jiaotong University
基金 国家创新群体科学基金资助项目(61221063) 国家自然科学基金资助项目(61071125 61071216 61102081 61172093)
关键词 无线通信 物理层安全 多天线 无线信道 跳空 时空谱 跳频扩频 wireless communications physical layer security multi-antenna wireless channel space hopping space-time spectrum frequency hopping spread spectrum
  • 相关文献

参考文献10

  • 1洪涛,宋茂忠,刘渝.切换天线发射的低截获率通信信号物理层安全传输[J].应用科学学报,2011,29(4):368-373. 被引量:11
  • 2洪涛,宋茂忠.一种基于天线虚拟运动的跳空扩频调制方法[J].南京航空航天大学学报,2011,43(4):481-485. 被引量:8
  • 3殷勤业,贾曙乔,左莎琳,董柳青,尹诗媛.分布式多天线跳空收发技术(Ⅰ)[J].西安交通大学学报,2013,47(1):1-6. 被引量:16
  • 4穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. 被引量:36
  • 5AONO K, HIGUCHI T, OHIRA B, et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J]. IEEE Transactions on Antennas and Propagation, 2005, 53 (11) .. 3776-3784.
  • 6WILSON R, TSE D, SCHOLTZ R A. Channel identi- fication: secret sharing using reciprocity in UWB chan- nels [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 364-375.
  • 7LI Xiaohua, HWU J, RATAZZI E P. Array redun- dancy and diversity for wireless transmissions with low probability of interception [C] // Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Piscataway, NJ, USA: IEEE, 2006: 525-528.
  • 8LI Xiaohua, HWU J. Using antenna array redundancy and channel diversity for secure wireless transmissions [J]. Journal of Communications, 2007, 2(3): 24-32.
  • 9WANG Jintao, JIA Shuyun, SONG Jian. Generalised spatial modulation system with multiple active transmit antennas and low complexity detection scheme [J]. IEEE Transactions on Wireless Communications, 2012, 11(4): 1605-1615.
  • 10穆鹏程,殷勤业.空谱的描述与定义[M]∥10000个科学难题:信息科学卷.北京:科学出版社,2011:449-451.

二级参考文献58

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献51

同被引文献71

  • 1朱彦军,杨嘉林,卓东风,王岩.基于ZF-V-BLAST算法的收发天线数量对系统的影响[J].科技广场,2007(3):89-91. 被引量:1
  • 2SHIN M, MA J, MISHRA A, et al. Wireless net- work security and interworking [J]. Proceedings of the IEEE, 2006, 94(2): 455-433.
  • 3PAHAN ASK, LEEHW, HONGCS. Security in wireless sensor networks: issues and challenges [C]/// Proceedings of the 8th International Conference on Ad- vanced Communication Technology. Piscataway, NJ, USA: IE-tEE, 2006: 1043-1048.
  • 4LEUNG-YAN-CHEONG S K, HELLMAN M E. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.
  • 5GOEL S, NEGI R. Guaranteeing secrecy using artifi- cial noise [J]. IEEE Transactions on Wireless Com- munications, 2008, 7(6): 2180-2189.
  • 6KHISTI A, WORNELL G. Secure transmission with multiple antennasz I The MISOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(6) : 3088-3104.
  • 7KHISTI A, WORNELL G. Secure transmission with multiple antennas: II The MIMOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(11) : 5515-5532.
  • 8OGGIER F, HASSIBI B. The secrecy capacity of the MIMO wiretap channel [J]. IEEE Transactions Infor- mation Theory, 2011, 57(8)- 4961-4972.
  • 9LIANG Yingbin, POOR H, SHAMAI S. Secure com- munication over fading channels [J]. IEEE Transac- tions on Information Theory, 2008, 54 (6): 2470- 2492.
  • 10GOPALA P K, LAI Lifeng, GAMAL H E. On the secrecy capacity of fading channels [J]. IEEE Trans- actions on Information Theory, 2008, 54 (10) : 4687- 4698.

引证文献9

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部