期刊文献+

基于最小信息泄漏的线性随机化实现物理层安全传输 被引量:3

Linear randomization with lowest information leakage for physical layer secure transmission
下载PDF
导出
摘要 为设计实用物理层安全传输机制,给出了线性随机化预处理模型。该模型指出,基于无线信道的特征差异,恰当地设计加性和乘性随机化模块可以为合法用户提供信道优势。从信息理论安全角度论证了加性随机化权值和乘性随机化权值具有最小信息泄漏时应满足的最佳分布。最后提出一种随机子载波参考安全传输机制对乘性随机化权值的优化设计进行了实例化分析。 Linear randomization pre-processing framework was presented to design feasible physical layer secure trans- mission schemes. The framework show that, based on characteristic differentiae of wireless channels, additive and multi- plicative randomization modules with suitable design would create channel advantage for legitimate users. In the view point of information theory security, the optimal distributions of the additive randomization weights and the multiplica- tive randomization weights to induce the lowest information leakage to the eavesdropper were verified. Finally, A random sub-carrier refereiacing security scheme was proposed as an instantiation analysis for the optimization design of multipli- cative randomization weights.
作者 李桥龙 金梁
出处 《通信学报》 EI CSCD 北大核心 2013年第7期42-48,58,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61171108) 国家高技术研究发展计划("863"计划)基金资助项目(2011AA010604)~~
关键词 物理层安全 线性随机化 信息理论安全 随机子载波参考 physical layer security linear randomization information theory security random sub-carrier referencing
  • 相关文献

参考文献16

  • 1SHIU Y S, CHANG S Y, WU H C. Physical layer security in wireless networks: a tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
  • 2LIANG Y, POOR H V, SHAMAI (SHITZ) S. Information theoretic security[J]. Foundations and Trends in Communications and Informa- tion Theory, 2008, 5(4/5): 355-580.
  • 3WYNER D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 4CSISZ,:R I, KORNER J. Broadcast channels with confidential mes- sages[J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348.
  • 5BUSTIN R, LIU R, POOR H V. An MMSE approach to the secrecy capacity of the MIMO Ganssian wiretap channel[J]. EURASIP Journal Wireless Communication Network-special Issue on Wireless Physical Layer Security, 2009,(7).
  • 6GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communication, 2008, 7(6): 2180- 2189.
  • 7SW1NDLEHURST A L. Fixed SINR solutions for the MIMO wiretap channel[A]. Proceedings of IEEE International Conference on Acous- tics, Speech, and Signal Processing[C]. Taipei, China, 2009.
  • 8LI X, HWU J, RATAZZI E P. Using antenna array redundancy and channel diversity for secure wireless transmissions[J]. Journal on Communication, 2007, 2(3): 24-32.
  • 9穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. 被引量:36
  • 10LI Z, XIA X G. A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of intercep- tion[J]. IEEE Transactions on Wireless Communication, 2009, 8(7): 3372-3379.

二级参考文献11

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献35

同被引文献40

  • 1Schneier B. Cryptographic design vulnerabilities [J]. IEEE Computer, 1998, 31(9): 29-33.
  • 2Wyner A D. The wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8):1355-1387.
  • 3Lai L, E1 Gamal H, Poor H V. The wiretap channel with feedback: Encryption over the channel [J]. IEEE Transactions on Information Theory, 2008, 54 (11): 5059-5067.
  • 4Aono T, Higuchi K, Ohira T, et al. Wireless secret key generation exploiting reactance-domain scalar re- sponse of multipath fading channels [J]. IEEE Trans- actions on Antennas and Propagation, 2005, 53 (11) :3776-3784.
  • 5Wilson R, Tse D, Scholtz R A. Channel identification: Secret sharing using reciprocity in ultrawideband chan- nels [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 364-375.
  • 6Krikidis I, Thompson J S, McLaughlin S. Relay selec- tion for secure cooperative networks with jamming [J]. IEEE Transactions on Wireless Communications, 2009, 8(10) : 5003-5011.
  • 7Dong L, Han Z, Petropulu A P, et al. Amplify-and- forward based cooperation for secure wireless communi- cations [C]//IEEE International Conference on Acous- tics, Speech and Signal. Taipei, China, 2009, 1-5.
  • 8Lai H Q, Liu K J R. Space-time network coding [J]. IEEE Transactions on Signal Processing, 2011, 59(4): 1706-1718.
  • 9Gao Z Z, Yang Y H, Liu K J R. Anti-eavesdropping space-time network coding for cooperative communica- tions [J]. IEEE Transactions on Wireless Communica- tions, 2011, 10(11): 3898-3908.
  • 10Laneman J N, Tse D N C, Wornell G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior [J]. IEEE Transactions on Information Theory, 2004, 50(12):3062-3080.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部