期刊文献+

物理层安全约束下的AF双向中继系统波束赋形和人工干扰联合设计 被引量:1

Joint Design of Cooperative Beamforming and Jamming for Physical Layer Security Improvement in AF-based Two-Way Relay Networks
下载PDF
导出
摘要 波束赋形和人工干扰是现有研究中最为常见的两种物理层安全增强技术,本文针对AF(放大转发)双向中继模型,探讨了两者的联合设计问题。在已知理想信道状态信息的条件下,本文提出了一种波束赋形和人工干扰的混合协同传输方案,推导了总功率受限条件下的和安全速率,通过两步迭代搜索算法得到了其最佳联合方案,并与一种低复杂度的次佳联合方案进行比较。仿真结果验证了所得联合方案优于次佳联合方案,并进一步改善了AF双向中继系统的安全性能。 Cooperative beamforming and jamming are two common techniques to enhance the Physical-layer security of a wireless transmission,in this paper,we study the problem that joint design of cooperative beamforming and jamming for secrecy rate improvement in AF(Amplify-and-Forward)-based two-way relay networks. Under the assumption that the full CSI is obtained,we propose a joint scheme that the relay not only adopt distributed beamforming but also jam the eavesdroppers. Then we compute the sum secrecy rate with the total power constraint. A two-step iterative algorithm is proposed to search the optimal cooperative scheme which can maximize the sum secrecy rate of the networks,and we compare it with a suboptimal cooperative scheme with low complexity. Simulations show that the proposed scheme searched by two-step approach is superior to suboptimal cooperative scheme in enhancing the security of the AF-based two-way relay networks.
出处 《信号处理》 CSCD 北大核心 2014年第11期1286-1291,共6页 Journal of Signal Processing
基金 国家自然科学基金(61371122 61301162) 中国博士后科学基金(2013T60912)资助项目
关键词 物理层安全 双向中继系统 波束赋形和人工干扰 和安全容量 physical layer security two-way relay networks beamforming and jamming sum secrecy rate
  • 相关文献

参考文献10

  • 1Wyner A D. The wire-tap channel[J]. Bell System Tech- nical Journal. Oct. 1975,54(8) :1355-1389.
  • 2Oggier F, Hassibi B. The seerecy capacity of MIMO wire- tap channel[J]. IEEE Trans. Inf. Theory, Aug. 2011,57 (8) :4961-4972.
  • 3Negi R, Goelm S. Secret communication using artificial noise[ C] //in Proc. IEEE Vehicular Tech. Conf. , Dal- las, TX, Sep. 2005,3:1906-1910.
  • 4Zhang J, Gursoy M C. Collaborative relay beamforming for secure broadcasting [ C ]// in Proc. IEEE WCNC, Sydney, Australia, Apr. 2010:1-6.
  • 5Guan X, Cai Y, Yang W. Increasing Secrecy Capacity via joint Design of Cooperative Beamforming and Jamming [ J ]. in KSII Transactions on internet and Information Systems, Apr. 2012,6(4) : 1041-1062.
  • 6Li C, Yang L, Sift Y. An Asymptotically Optimal Cooperative Relay Scheme for Two-Way Relaying Protocol[ J ]. IEEE Sig- nal Processing Letter, Feb. 2010,17(2) :145-148.
  • 7Wang H, Xia X, Yin Q, et al. Hybrid relaying and jam- ming for secure two-way relay networks with passive eavesdroppers[ C]//IEEE 24th International Symposium on PIMRC. , London, UK, Sept. 2013:451-455.
  • 8Wang H, Luo M, Yin Q. Hybrid Cooperative Beamform- ing and Jamming for Physical-Layer Security of Two-Way Relay Networks [ J ]. IEEE Trans. Information Forensics and Security. , Dee. 2013,8(12) :2007-2020.
  • 9Lin M, Ge J, Yang Y, et al. Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximiza- tion in Two-Way AF Relay Networks [ J ]. IEEE Communica- tions Letters. , Feb. 2014,18(2) :380-383.
  • 10曹阔,林志,管新荣,杨文东,印国祥.物理层安全约束下的双向中继系统波束赋形方案[J].军事通信技术,2013(1):57-61. 被引量:1

二级参考文献10

  • 1ZHOU Qing,LI Yong-hui,LAU F C M,et al.Decode and forwardtwo-way relaying with network coding and opportunistic relay selection[].IEEE Transactions on Communications.2010
  • 2da Costa D B,Assa S.Beamforming in dual-hop fixedgain relaying systems[].Proceedings of IEEEInternational Conference on Communications.2009
  • 3ZhANG J,GURSOY M.Relay Beamforming Strategies for Physical-Layer Security[].Proceedings of th An- nual Conference on Information Sciences and Systems (CISS ).2010
  • 4WYNER A D.The wire-tap channel[].The Bell System Technical Journal.1975
  • 5Shannon C E.Communication theory of secret system[].Bell System Technical Journal The.1949
  • 6Liu Tie,Shamai S.A note on the secrecy capacity of the multi-antenna wiretap channel. http:∥arxiv.org/abs/0710.4105 . 2012
  • 7Dong Lun,Han Zhu,Petropulu A P,et al.Secure wireless communications via cooperation[].Proceedings of th Mn-nual Allerton Conference CommunicationControland Computing.2008
  • 8Dong Lun,Han Zhu,Petropulu A P,et al.Amplify-and-forward based cooperation for secure wireless communications[].Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing.2009
  • 9Rankov B,Wittneben A.Spectral efficient protocols for half-duplex fading relay channels[].IEEE Journal on SelectedAreas in Communications.2007
  • 10Jitvanichphaibool K,Zhang Rui,Liang Yinchang.Optimal resource allocation for two-way relay-assisted OFDMA[].IEEE Transactions on Vehicular Technology.2009

同被引文献13

  • 1Zhu H, Sbeng Z, Li L. Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel [ C ]//2011 Proceedings IEEE, Shanghai, April. 2011: 2156-2164.
  • 2Ye C X, Mathur S, Reznik A, et al, Mandayam Narayan B. Information-Theoretically Secret Key Generation forFading Wireless Channels [ J ]. Informaiton Forensics and Security, IEEE Transactions on, 2010, 5 ( 2 ) :240-254.
  • 3Sayeed A,Perrig A. Secure wireless communications: Se- cret keys through muhipath[ C]//ICASSP 2008. IEEE In- ternational Coference, Las Vegas, Nv. 2008:3013-3016.
  • 4Xiao S, Gong W, Towsley D. Secure wireless communi- cation with dynamic secrets [ C ]///Infocom, 2010 Pro- ceedings IEEE, San Diego, CA. March 2010:1-9.
  • 5Huang P F, Wang X D. Fast Secret Key Generation in Stat- ic Wireless Networks : A Virtual Channel Approach [ C ]// INFOCOM, 2013 Proceedings IEEE, Turin, April 2013: 2292-2300.
  • 6Negi R, Goelm S. Guaranteeing Secrecy using Artificial Noise[ J ]. IEEE Trans, Wireless Communication, June 2008, 7(6) :2180-2189.
  • 7Lun D, Zhu H, Petropulu A P, et al. Cooperative jam- ming for wireless physical layer security[ C ]//2009. SSP' 09. IEEE/SP 15th Workshop. Cardiff, 2009: 417-420.
  • 8Arora A, Sang L F. Dialog codes for Secure Wireless Communications [ C ]// In IPSN, 2009, San Francisco, CA. April 2009:13-24.
  • 9Gollskota S, Katabi D. Physical layer wireless security made fast and channel independent [ C ] //INFOCOM, 2011 Proceedings IEEE. Shanghai, 2011 : 1125-1133.
  • 10Goldsmith A. Wireless Communications [ M]. Cambridge University Press, 2005.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部