期刊文献+

Physical layer security strategies for downlink heterogeneous cloud radio access networks 被引量:1

Physical layer security strategies for downlink heterogeneous cloud radio access networks
原文传递
导出
摘要 Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance. Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第5期47-54,60,共9页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (U1035001)
关键词 C-RAN Poisson point process (PPP) physical layer security HETEROGENEOUS C-RAN, Poisson point process (PPP), physical layer security, heterogeneous
  • 相关文献

参考文献1

二级参考文献15

  • 1Wyner A. The wire-tap channel. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 2Dong L, Han Z, Petropulu P A, et al. Secure wireless communications via cooperation. Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, Sep 23-26, 2008, Monticello, IL, USA. Piscataway, NJ, USA: IEEE, 2008: 1132-1138.
  • 3Dong L, Han Z, Petropulu P A, et al. Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888.
  • 4Krikidis L, Thompson J, Mclaughlin S. Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 2009, 8(10): 5003-5011.
  • 5Ding Z G, Leung K K, Goeckel D, et al. Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting. IEEE Transactions on Wireless Communications, 2011, I 0(6): 1725-1729.
  • 6Bloch M, Barros J 0, Rodrigues M. R. D, et al. Wireless information-theoretic security. IEEE Transactions on Information Theory, 2008,54(6): 2515-2534.
  • 7Li J Y, Petropulu P A, Weber S. On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing, 20 ll, 59(10): 4985-4997.
  • 8Boyd S, Kim S J, Vandenberghe L, et al. A tutorial on geometric programming. Optimization and Engineering, 2007, 8(1): 67-127.
  • 9Nocedal J, Wright S 1. Numerical optimization. Berlin, Germany: Springer, 1999:488-522.
  • 10Yuan Y X. Computational method for nonlinear optimization. Beijing, China: Science Press, 2008 (in Chinese).

共引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部