期刊文献+

基于人工噪声辅助的D2D异构蜂窝安全通信方法 被引量:8

Secure D2D underlaying cellular communication based on artificial noise assisted
下载PDF
导出
摘要 针对D2D通信安全性受资源限制问题,提出一种基于人工噪声辅助的D2D异构蜂窝安全通信方法。首先建立系统可达保密速率模型,然后在基站的蜂窝通信信号中添加人工噪声,以最大化系统保密速率为目标设计蜂窝用户期望信号与人工噪声的波束矢量。同时,基于公平性约束提出一种基站功率分配、期望信号预编码向量以及D2D功率控制的联合优化算法。仿真结果表明,相比于传统的SVD预编码法和ZF方法,此方法下系统可达保密速率最高提升约2.7 bit·s-1·Hz-1。 A secure communication scheme based on artificial noise assisted from base station(BS) was proposed to improve the system secrecy rate of the D2 D underlaying cellular. Firstly, the system secrecy rate was modeled. Then the BS with multi-antennas added artificial noise(AN) in cellular user's signal as well as designed beam vectors of the desired signal and artificial noise to maximize system secrecy rate. In the end, a joint optimization scheme based on the fairness constraint was introduced to optimize beam vectors of the desired signal, the power allocation for BS's information signal and AN and the D2 D power control. Simulation results show that the system ergodic secrecy rate can be improved 2.7 bit·s-1·Hz-1 more than the schemes based on SVD and zero-forcing at most.
出处 《通信学报》 EI CSCD 北大核心 2015年第10期149-156,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61379006 61401510 61471396 61501516) 国家高技术研究发展计划("863"计划)基金资助项目(2014AA01A701)~~
关键词 D2D通信 系统可达保密速率 人工噪声 物理层安全 D2D system secrecy rate artificial noise physical layer security
  • 相关文献

参考文献10

  • 1JAN-IS P, YU C H, DOPPLER K, et al. Device-to-device communica- tion under-laying cellular communications systems[J]. International Journal Communications Network and System Sciences, 2009, 2(3): 169-178.
  • 2ALAM M, DU YANG; RODR/GUEZ J, et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014, 52(4): 66-73.
  • 3YUE J T, MA C, YU H, et al. Secrecy-based channel assignment for device-to-device communication: an auction approach[A]. 2013 Inter- national Conference on Wireless Communications & Signal Process- ing (WCSP)[C]. Hangzhou, China, 2013.1-6.
  • 4ZHU D H, SWINDLEHURST A L, FAKOORIAN S A A, et al. De- vice-to-device communications: the physical layer security advan- tage[A]. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)[C]. Florence, 2014. 1606-1610.
  • 5ZHANG H, WANG T Y, SONG L Y, et al. Radfio resource allocation for physical-layer security ha D2D underlay communications[A]. 2014 IEEE International Conference on Communications (ICC)[C]. Sydney, NSW, 2014.2319-2324.
  • 6GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 7LI J Y, PETROPULU A P. On ergodic secrecy rate for gaussian MISO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2011, 10(4): 1176-1187.
  • 8XIONG Q, GONG Y, LIANG Y C, et al. Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information[J]. IEEE Wireless Communications Letters, 2014, 3(4): 357-360.
  • 9DONG L, HAN Z, PETROPULU A P, et al. Improving wireless phys- ical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.
  • 10KHISTI A, WORNELL, GREGORY W. Secure transmission with multiple antennas-part I: the MISOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.

同被引文献52

  • 1JANIS P, YU C, DOPPLER K, et al. Device-to-device communicationunder-laying cellular communications systems[J]. International JounalCommunications, Network and System Sciences, 2009,2(3):169-178.
  • 2DOPPLER K, RINNE M, R1BEIRO C, et al. Device to-device com-munication as an underlay to LTE-advanced networks[J]. IEEE Com-munications Magazine, 2009, 47(12): 42-49.
  • 3FODOR, DAHLMAN Q MILDH E, et al. Design aspects of networkassisted device-to-device communications[J]. IEEE Communications.Magazine, 2012, 50(3): 170-177.
  • 4DOPPLER K, RINNE M P, JANIS P, et al. Device-to-device commu-nications: functional prospects for LTE-advanced networks[C]//IEEEInternational Conference on Communications. c2009: 1-6.
  • 5ALAM M, DU Y, RODRIGUEZ J, et al. Secure device-to-devicecommunication in LTE-A[J]. IEEE Communications Magazine, 2014,52(4): 66-73.
  • 6ZHU D H, SWINDLEHURST A L, FAKOORIAN S A A, et al. De-vice-to-device communications: the physical layer security advan-tage[C]//2014 IEEE International Conference on Acoustics, Speechand Signal Processing (ICASSP). c2014: 1606-1610.
  • 7YUE J, MA C, YU H, et al. Secrecy-based channel assignment fordevice-to-device communication: an auction approach[C]//2013 IEEEInternational Conference on Wireless Communications & SignalProcessing (WCSP). Hangzhou, China, c2013: 1-6.
  • 8LIU Z, PENG T, XIANG S, et al. Mode selection for device-to-device(D2D) communication under LTE-Advance networks[C]//2012 IEEEInternational Conference on Communications (ICC). c2012: 5563-5567.
  • 9ZHANG R, CHENG X, YANG L. Cooperation via spectrum sharingfor physical layer security in device-to-device communications under-laying cellular networks[C]//2015 IEEE Global CommunicationsConference (GLOBECOM). c2015: 1-6.
  • 10CHU Z, CUMANAN K, XU M, et al. Robust secrecy rate optimiza-tions for multiuser multiple-input-single-output channel with de-vice-to-device communications [J]. IET Communications, 2015,9 (3):396-403.

引证文献8

二级引证文献128

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部