期刊文献+

一种基于多载波的多播系统物理层安全方案 被引量:10

A Multicarrier-based Physical Layer Security Scheme for the Multicast Systems
下载PDF
导出
摘要 受限于发送方天线数目,无线多播系统整体信道通常不存在零空间,无法利用传统的物理层安全技术保证其安全传输。针对这一问题,该文提出一种基于多载波的多播系统物理层安全方案。首先,建立了多载波多播系统物理层安全通信模型;之后,通过分配载波产生合法用户的信道零空间,在零空间内引入人工噪声保证系统的安全传输;最后,以最大化保密传输速率为目标,在系统总功率受限情况下,利用Kuhn-Tucher条件对各子载波功率进行了优化。仿真结果表明:该方案不受限于发送方天线数目,并且所提功率分配方法的系统保密传输速率比等功率分配方法提升约2 bit/(s Hz)。 Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than eavesdroppers, which is not practical in the multicasting system. To solve this problem, a multicarrier-based physical layer security scheme for the multicast systems is proposed, which takes the advantage of both space and frequency domain to form a relatively virtual multi-antennas system. Through subearrier allocation the existence of null space in every subcarrier channel matrix is guaranteed, so that the artificial noise can be added to ensure a secure communication. Based on the Kuhn-Tucher condition, an optimal power allocation method is also proposed to maximize the security rates under the restriction of total power. Simulation results indicate that this scheme is unlimited by the amount of the sender antennas, and it improves the security rates by 2 bit/(s. Hz) than the average power allocation method.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第6期1338-1343,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61171108)资助课题
关键词 无线通信 多载波多播 物理层安全 人工噪声 最优化 Wireless communication Multicarrier multicast Physical layer security Artificial noise Optimization method
  • 相关文献

参考文献12

  • 1Correia A, Silva J, and Souto N. Multi-resolution broadcast/multicast systems for MBMS[J]. IEEE Transactions on Broadcasting, 2007, 53(1): 224-234.
  • 2Richard A O, Dadlani A, and Kim K. Multicast schedulingand resource allocation algorithms for OFDMA-Based systems: a survey[J]. IEEE Communications Surveys and Tutorials, 2013, 15(1): 240-254.
  • 3Yu Y J, Hsiu P C, and Pang A C. Energy-efficient video multicast in 4G wireless systems[J]. IEEE Transactions on Mobile Computing, 2012, 11(10): 1508-1522.
  • 4Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4): 656-715.
  • 5Shannon C E. A Mathematical Theory of Communication[M]. Illinois: University of Illinois Press, 1949: 25-45.
  • 6Goel S and Negi R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 7Li X H and Hwu J. Using antenna array redundancy and channel diversity for secure wireless transmissions[J]. Journal of Communications, 2007, 2(3): 24-32.
  • 8Luo W Y, Jin L, and Li Y. A subcarrier-reference scheme for multiuser MISO-OFDMA system with low probability of interception[J]. IEICE Transactions on Communications, 2011, E94-B(10): 2872-2876.
  • 9Li Q and Ma W. Multicast secrecy rate maximization forMISO channels with multiple multi-antenna eavesdroppers [C]. IEEE International Conference on Communications, Kyoto, 2011: 1-5.
  • 10Xu J, Lee S J, and Kang W S. Adaptive resource allocation for MIMO-OFDM based wireless multicast systems[J]. IEEE Transactions on Broadcasting, 2010, 56(1): 98 102.

同被引文献44

  • 1Delfs H,Knebl H.Introduction to Cryptography:Principles and Applications[M].2nd ed.Berlin,Germany:Springer,2007.
  • 2Wyner A D.The Wire-tap Channel[J].Bell System Technical Journal,1975,54(8):1355-1387.
  • 3Leung Yan Cheong S K,Hellman M E.The Gaussian Wiretap Channel[J].IEEE Transactions on Information Theory,1978,24(4):451-456.
  • 4Csiszár I,Krner J.Broadcast Channels with Confidential Messages[J].IEEE Transactions on Information Theory,1978,24(3):339-348.
  • 5Oggier F,Hassibi B.The Secrecy Capacity of the MIMO Wiretap Channel[J].IEEE Transactions on Information Theory,2011,57(8):4961-4972.
  • 6Pei M,Swindlehurst A L,Ma D,et al.On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling[J].IEEE Communications Letters,2014,18(1):50-53.
  • 7Dong Lun,Zhu Han,Petropulu A P,et al.Improving Wireless Physical Layer Security via Cooperating Relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
  • 8Wang Huiming,Luo Miao,Xia Xianggen,et al.Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper’s CSI[J].IEEE Signal Processing Letters,2013,20(1):39-42.
  • 9Krikidis I.Opportunistic Relay Selection for Cooper-ative Networks with Secrecy Constraints[J].IET Communications,2010,4(15):1787-1791.
  • 10Zou Yulong,Wang Xianbin,Shen Weiming.Optimal Relay Selection for Physical-layer Security in Cooperative Wireless Networks[J].IEEE Journal on Selected Areas in Communications,2013,31(10):2099-2111.

引证文献10

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部