期刊文献+

基于用户配合的全双工蜂窝系统保密传输方案

Full duplex secret transmission scheme based on user cooperation
下载PDF
导出
摘要 全双工人工噪声机制在干扰功率持续增加时性能提升受限,并且损失了双工增益。针对上述2个问题,提出一种基于用户配合的全双工蜂窝系统保密传输方案,半双工的用户上行发送的同时,与其配合的用户可以进行下行发送。蜂窝基站使用全双工技术实现配合用户的干扰消除,并且采用部分功率发送人工噪声干扰窃听者。在此基础上以最大化系统保密速率为目标,设计下行用户期望信号矢量与人工噪声波束矢量;并且利用一维线性搜索获得最优功率配比。仿真结果表明,参考RS-ref方法和HD方法,所提方法能获得的系统保密速率呈线性增长,并且能够获得全双工增益。 Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null. To solve these two problems, a full-duplex secure transmission scheme based on user cooperation was proposed, in which the full-duplex receiver used partial power to send artificial noise, and transmitted the downlink signal by the remaining power to the user who shared the same frequency. In order to maximize the system secrecy rate, the beam vector of the desired signal and the artificial noise were designed. Besides, the optimal power allocation factor was obtained by one-dimensional search simply. Simulation results show that compared with the RS-ref and HD methods, the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.
出处 《通信学报》 EI CSCD 北大核心 2017年第1期76-82,共7页 Journal on Communications
基金 国家自然科学基金资助项目(No.61379006 No.61401510 No.61471396 No.61501516 No.61521003) 国家高技术研究发展计划("863"计划)基金资助项目(No.2014AA01A704)~~
关键词 保密通信 同时同频全双工 用户配合 人工噪声 功率分配 secret communication, co-frequency co-time full duplex, user coordination, artificial noise, power allocation
  • 相关文献

参考文献1

二级参考文献10

  • 1JAN-IS P, YU C H, DOPPLER K, et al. Device-to-device communica- tion under-laying cellular communications systems[J]. International Journal Communications Network and System Sciences, 2009, 2(3): 169-178.
  • 2ALAM M, DU YANG; RODR/GUEZ J, et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014, 52(4): 66-73.
  • 3YUE J T, MA C, YU H, et al. Secrecy-based channel assignment for device-to-device communication: an auction approach[A]. 2013 Inter- national Conference on Wireless Communications & Signal Process- ing (WCSP)[C]. Hangzhou, China, 2013.1-6.
  • 4ZHU D H, SWINDLEHURST A L, FAKOORIAN S A A, et al. De- vice-to-device communications: the physical layer security advan- tage[A]. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)[C]. Florence, 2014. 1606-1610.
  • 5ZHANG H, WANG T Y, SONG L Y, et al. Radfio resource allocation for physical-layer security ha D2D underlay communications[A]. 2014 IEEE International Conference on Communications (ICC)[C]. Sydney, NSW, 2014.2319-2324.
  • 6GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 7LI J Y, PETROPULU A P. On ergodic secrecy rate for gaussian MISO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2011, 10(4): 1176-1187.
  • 8XIONG Q, GONG Y, LIANG Y C, et al. Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information[J]. IEEE Wireless Communications Letters, 2014, 3(4): 357-360.
  • 9DONG L, HAN Z, PETROPULU A P, et al. Improving wireless phys- ical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.
  • 10KHISTI A, WORNELL, GREGORY W. Secure transmission with multiple antennas-part I: the MISOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部