期刊文献+

A novel artificial noise aided security scheme to resist blind source separation attacks 被引量:3

A novel artificial noise aided security scheme to resist blind source separation attacks
原文传递
导出
摘要 In this paper,we discuss the physical layer security from a new angle of view and propose a novel approach to resist some attacks in signal processing perspective.The scenario considered in this paper is that the eavesdropper has the similar channel performance compared to the legitimate receiver.We design the optimal artificial noise(AN)to resist the attacks of the eavesdropper who uses the blind source separation(BSS)technology to reconstruct the secret information.For speech signals,the optimal AN is obtained by minimizing the maximum of the correlation coefficients between the source signal and the received signals at Eve and the correlation coefficients between the source signal and separated results of BSS.For binary phase shift keying(BPSK)signals,we maximize the minimum bit error rates(BERs)of the separated signals and the obtained signals at Eve.Moreover,we consider the AN design from the point of breaking the BSS conditions,and propose a method by changing the correlation coefficient randomly.The simulation results show that the AN we proposed has better performance than that of the white Gaussian AN to resist the BSS attacks for both speech signals and the BPSK signals. In this paper, we discuss the physical layer security from a new angle of view and propose a novel approach to resist some attacks in signal processing perspective. The scenario considered in this paper is that the eavesdropper has the similar channel performance compared to the legitimate receiver. We design the optimal artificial noise (AN) to resist the attacks of the eavesdropper who uses the blind source separation (BSS) technology to reconstruct the secret information. For speech signals, the optimal AN is obtained by minimizing the maximum of the correlation coefficients between the source signal and the received signals at Eve and the correlation coefficients between the source signal and separated results of BSS. For binary phase shift keying (BPSK) signals, we maximize the minimum bit error rates (BERs) of the separated signals and the obtained signals at Eve. Moreover, we consider the AN design from the point of breaking the BSS conditions, and propose a method by changing the correlation coefficient randomly. The simulation results show that the AN we proposed has better performance than that of the white Gaussian AN to resist the BSS attacks for both speech signals and the BPSK signals.
出处 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4225-4234,共10页
基金 supported by the National‘‘Twelfth Five-Year’’Project of China(2012BAH38B05)
关键词 盲源分离 抗攻击 安全计划 噪声 BPSK信号 信号处理 相关系数 语音信号 Physical layer security ; Artificial noiseBlind source separation ; Second order statistics ;Wireless communication
  • 相关文献

参考文献22

  • 1Bloch M, Barros J, Rodrigues MRD et al (2008) Wirelessinformation theoretic security. IEEE Trans Inf Theory 54:2515-2534.
  • 2Kavitha T, Sridharan D (2010) Security vulnerabilities in wirelesssensor networks: a survey. J Inf Assur Secur 5:31-44.
  • 3Perrig A, Szewczyk R, Tygar JD et al (2002) SPINS: securityprotocols for sensor networks. Wirel Netw 8:521-534.
  • 4Jolly G, Kuscu M, Kokate P et al (2003) A low-energy keymanagement protocol for wireless sensor networks. Paper presentedat IEEE international symposium on computers andcommunication, Kiris-Kemer, Turkey, 30 June-3 July 2003.
  • 5Pinto PC, Barros J, Win MZ (2009) Wireless physical-layersecurity: the case of colluding eavesdroppers. In: IEEE (eds)Proceedings of IEEE international symposium on informationtheory, Seoul, Korea, 28 June-3 July 2009. IEEE, New York,pp 2442-2446.
  • 6Dong L, Han Z, Petropulu AP et al (2009) Cooperative jammingfor wireless physical layer security. Paper presented at IEEE/SP 15th workshop on statistical signal processing, Cardiff, UnitedKingdom, 31 August-3 September 2009.
  • 7Goel S, Negi R (2008) Guaranteeing secrecy using artificialnoise. IEEE Trans Wirel Commun 7:2180-2189.
  • 8Zhou X, McKay MR (2010) Secure transmission with artificialnoise over fading channels: achievable rate and optimal powerallocation. IEEE Trans Veh Technol 59:3831-3842.
  • 9Tekin E, Yener A (2008) The general Gaussian multiple-accessand two-way wiretap channels: achievable rates and cooperativejamming. IEEE Trans Inf Theory 54:2735-2751.
  • 10Tang X, Liu R, Spasojevic P et al (2011) Interference assistedsecret communication. IEEE Trans Inf Theory 57:3153-3167.

同被引文献16

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部