期刊文献+

协同安全传输系统中最佳中继选择技术研究

Optimal relay selection analysis in cooperative secure transmission system
下载PDF
导出
摘要 对于中继不可信的多中继协同传输模型,主要针对如何构建协同安全系统,即利用人工干扰实现系统安全时的协同策略问题。协同系统构建完成后,又考虑了各中继节点间如何进行功率分配来提高系统安全性问题。分别采用等功率分配与最佳功率分配的方式,分析了不同中继节点分布场景下,最佳中继节点选择。结果表明,采用人工干扰的方式能够保证系统的安全传输,最佳中继的选择能够提高系统的安全性能。 It is mainly focused on how to build a cooperative security system, that means using the jamming to achieve cooperative strategy, for the multi untrusted relay system. After the construction of the cooperative system, the problem of how to improve the security of the system is also considered. Equal power allocation and optimal power allocation are used in this paper. The optimal relay selection is a.nalyzed under different relay distribution scenarios. The results show that the jamming can ensure the safe trans- mission of the system and the optimal relay selection can improve the security performance of the system.
出处 《电视技术》 北大核心 2016年第9期51-55,76,共6页 Video Engineering
基金 国家自然科学基金项目(61501511)
关键词 中继不可信 人工干扰 功率分配 最佳中继 untrusted relay jamming power allocation optimal relay
  • 相关文献

参考文献15

  • 1ENDER T, AYL/N Y. The general gaussian mu/tiple access and two-way wire-tap channels: achievable rates and coop- erative jamming[J]. IEEE transactions on information theo- ry,2008,54(6) :2735-2751.
  • 2LAI L F, GAMAL H. The relay-eavesdropper channel: co- operation for secrecy [ J ]. IEEE transactions on information theory, 2008,54 ( 9 ) : 4005--4019.
  • 3LUN D, ZHU H, PETROPULU A P. Secure wireless com- munications via cooperation [ C ]//46th Annual Allerton Conference on Communication, Control, and Computing. Se- attle Washington, USA : IEEE ,2008 : 1132-1138.
  • 4POOR H V, HAN Z. Amplify-and-forward based coopera- tion for secure wireless communications[ C]//Proc. IEEE int. Conf. Acoust. Speech, Signal process. New Jersey, USA : IEEE ,2009:2613-2616.
  • 5LUN D, ZHU H, PETROPULU A P. Cooperative jamming for wireless physical layer security [ C ]// IEEE Statistical Signal Processing Workshop. Wales, UK: Cardiff Universi- ty ,2009:417-420.
  • 6LUN D, ZHU H, PETROPULU A P. Improving wireless physical layer security via cooperating relays [ J ]. IEEE transactions on signal processing ,2010,58 ( 3 ) : 1875-1888.
  • 7LI J Y,ATHINA P P,STEVEN W. On cooperative relaying schemes for wireless physical layer security [ J ]. IEEE transactions on signal processing, 2011 , 59 ( 10 ) : 4985 - 4996.
  • 8MO J H,TAO M X,LIU Y. Secure beamforming for MIMO two-way communications with an untrusted relay [J].IEEE transactions on signal processing,2014,62(9) :2185-2199.
  • 9ZHANG R Q,SONG L Y,HAN Z,et al. Physical layer se- curity for two-way untrusted relaying with friendly jammers [J]. IEEE transactions on vehicular technology, 2012, 61 (8) :3693-3704.
  • 10LONG H,WEI X G, ZHANG X L, et al. Cooperative jam- ming and power allocation in three-phase two-way relaying system with untrusty relay node[ C]//IEEE General Assem- bly and Scientific Symposium( UPtSI GASS). Beijing, Chi- na : IEEE,2014 : 1-4.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部