期刊文献+

存在辅助节点的MIMO窃听信道安全性能研究

Research on Secrecy Performance of MIMO wiretap channel with a Helper
下载PDF
导出
摘要 为了提高MIMO窃听信道的可达安全速率,提出了基于广义奇异值分解的合作干扰策略。该策略中源节点和辅助节点同时采用基于广义奇异值分解的波束形成技术,源节点发送消息信号,辅助节点发送独立于消息信号的噪声信号,噪声信号对目的节点和窃听节点都产生干扰。此外设计了源节点和辅助节点采用合作干扰策略时的联合最优功率分配算法。该算法可以实现源节点和辅助节点在总功率受限时的可达安全速率最大化。仿真结果表明,与现有的非合作最优功率分配算法相比,本文提出的合作干扰策略在大信噪比时可以显著提高系统的可达安全速率。 To improve the achievable secrecy rate in MIMO wiretap channel, a cooperative jamming strategy based on generalized singular value decomposition (GSVD) is proposed. Beamforming based on GSVD is employed both at the source node and helper node. The source node sends messages, while the helper transmits jamming signals independent of the source messages. The jamming signal is treated as noise at both the intended node and the eavesdropper node. Further- more, joint optimal power allocation algorithm is designed between the source and the helper to maximize the achievable se-crecy rate, under total power constraints. Compared with the existing optimal non-cooperative scheme, the numerical results demonstrated that the proposed strategy achieves a higher achievable secrecy rate in the high SNR.
出处 《信号处理》 CSCD 北大核心 2013年第8期1064-1070,共7页 Journal of Signal Processing
基金 国家自然科学基金(60972045 61071089 61271232) 江苏省自然科学基金(BK2010077) 移动通信国家重点实验室开放课题(2012D05) 江苏省优势学科(信息与通信工程)建设项目资助 PAPD
关键词 MIMO窃听信道 广义奇异值分解 合作干扰 可达安全速率 MIMO wiretap channel Generalized Singular Value Decomposition Cooperative jamming Achievable se-crecy rate
  • 相关文献

参考文献11

  • 1C. E. Shannon. Communication theory of secrecy systems [J]. Bell Systems Technical Journal, 1949, 28( 1 ) : 656- 715.
  • 2A. Wyner. The wire-tap channel [ J ]. Bell Systems Tech- nical Journal, 1975, 54(8) : 1355-1387.
  • 3I. Csiszar, J. Korner. Broadcast channels with confiden- tial messages [J]. IEEE Trans. Inf. Theory, 1978, 24 (3), 339-348.
  • 4F. Oggier and B. Hassibi. The secrecy capacity of the MI- MO wiretap channel [J]. IEEE Trans. Inf. Theory, 2011, 57(8) :4961-4972.
  • 5A. Khisti and G. Wornell. Secure transmission with multi- ple antennas I: The MISOME wiretap channel [ J ]. IEEE Trans. Inf. Theory, 2010, 56(7) :3088-3104.
  • 6Shabnam Shafiee, Nan Liu, and Sennur Ulukus. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel [J]. IEEE Transaction on information theory, 2009, 55 (9) :4033- 4039.
  • 7A. Khisti and G. Womell. Secure transmission with multiple antennas-II: the MIMOME wiretap channe [ J ]. IEEE Trans. Inform. Theory, 2010, 56(11): 5515-5532.
  • 8Fakoorian, S. A. A. and A.L. Swindlehurst. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel [ C ]. IEEE International Sympo- sium on Information Theory Proceedings, Cambridge,2012: 2321-2325.
  • 9A. Mukherjee and A. L. Swindlehurst. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels [ C]. IEEE SPAWC, Perugia, 2009:344-348.
  • 10L. Lai and H. El Gamal. The relay-eavesdropper chan- nel: Cooperation for secrecy [ J]. IEEE Trans. Inf. The- ory, 2008, 54(9) : 4005-4019.

二级参考文献15

  • 1A. D. Wyner,The wiretap channel [ J ] , Bell Syst. Tech. J, 1975,54 : 1355-1387.
  • 2I. Csiszar and J. Korner, " Broadcast channels with confi- dential messages [ J ] , IEEE Trans. Inform. Theory, vol. IT-24, no. 3, May 1978 : 339-348.
  • 3F. Oggier and B. Hassibi, The secrecy capacity of the MI- MO wiretap channel[ C], in IEEE Int. Symp. Informa- tion Theory (ISIT) ,Toronto, ON, Canada,2008:524-528.
  • 4Y. Liang, H. V. Poor, and S. Shamai (Shitz) , Secure com- munication over fading channels [ J ] , IEEE Transactions on Information Theory, Jun, 2008,54 ( 6 ) : 2470-2492.
  • 5S. Goel and R. Neg, Guaranteeing Secrecy using Artificial Noise[ J ] ,IEEE TRANSACTIONS ON WIRELESS COM- MUNICATIONS ,2008,7:2180-2189.
  • 6W. C. Liao, T. H. Chang, W. K. Ma, et al. , Joint transmit beamforming and artificial noise design for QoS discrimi- nation in wireless downlink [ C ], presented at the IC- ASSP,2010.
  • 7Q. Haohao, C. Xiang, S. Yin, et al. , Optimal Power Alloca- tion for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications [ C ], in Communications Workshops ( ICC), 2011 IEEE International Conference on,2011:1-5.
  • 8M. Ghogho and A. Swami, Physical-layer secrecy of MI-MO communications in the presence of a Poisson random field of eavesdroppers [ C ], presented at the IEEE ICC Workshop on Physical Layer Security ,2011.
  • 9L. Wei-Cheng, C. Tsung-Hui, M. Wing-Kin, etal ,QoS- Based Transmit Beamforming in the Presence of Eaves- droppers: An Optimized Artificial-Noise-Aided Approach [ J ] , Signal Processing, IEEE Transactions on,2011,59 : 1202-1216.
  • 10M. Jainy, J. I. Choiy, T. M. Kim, et al. , Practical, Real- time, Full Duplex Wireless [ C ], presented at the Mobi- Corn, Las Vegas, Nevada,USA. ,2011.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部