期刊文献+

基于信道估计的物理层安全多天线选择功率分配方案 被引量:1

Improving physical layer security exploiting multi-antennas selection with training sequence channel estimation
下载PDF
导出
摘要 针对多天线选择方案提高物理层安全的研究中信道已知条件的设定过于理想这一问题,提出利用导频信号估计主信道并进行多天线选择的方案。接收端发送导频信号供发射端进行主信道估计,发射端利用估计的信道状态信息选出多根天线并进行功率分配,推导所提方案的保密容量并设计仿真实例。结果表明,所提方案在估计误差条件下达成了低信噪比时的非零保密容量,且接收方误码率随信噪比增大急剧减小至10-4,而窃听方的误码率保持较高,验证了所提方案的有效性和可行性。 In current research about improving physical layer security exploiting multi-antennas selection at the transmitter,the assumption of knowing the channel state information( CSI) of main channel has been excessively idealized. This paper considered a practical scheme based on channel estimation at the transmitter,which selected multiple antennas using the estimated CSI of main channel. First of all,transmitter estimated the CSI of main channel by receiving the training sequence sending by the receiver. Then it selected antennas and allocated transmit power of each antenna using the estimated CSI. It deduced the secrecy capacity of the proposed scheme and designed a simulation for test and verify. The results show the proposed scheme achieves the non-zero secrecy capacity in low signal-to-noise ratio with channel estimation error. Bit error rate( BER) of receiver is sharply decreasing to 10- 4along with the rising signal to noise ratio,besides the bit error rate of eavesdropper stays high relatively. It shows the validity and feasibility of the proposed scheme.
机构地区 电子工程学院
出处 《计算机应用研究》 CSCD 北大核心 2017年第3期879-882,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61272333)
关键词 物理层安全 多天线选择 训练序列 信道估计 保密容量 physical layer security multiple antennas selection training sequence channel estimation secrecy capacity
  • 相关文献

参考文献4

二级参考文献53

  • 1Wyner A D. The wire-tap channel [ J ]. Bell System Technical Journal, 1975,54( 8 ) : 1355-1387.
  • 2Shannon C. Communication theory of secrecy systems [J].Bell Systems Technical Journal, 1949, 29: 656-715.
  • 3Jiaxi Xiao, Xiaoli Ma, McLaughlin S W. Random complex field code design for securityover wiretap channels [ C ]// Proceedings of the IEEE International Conference on Infor- mation Science and Systems (CISS), 2011: 1-6.
  • 4Byung-JaeKwak, Nah-Oak Song, Bumsoo Park,et al. Physi- cal layer security with Yargcode [ C ]//Proceedings of the First International Conference on Emerging Network Intel- ligence, Taejon, 2009: 43-48.
  • 5Klinc D, Ha J, Mclaughlin S W, et al. LDPC codes tor physical layer security[ C] //Proceedings of the Global Tel- ecommunications Cont)rence, Honolulu, America, 2009 : 1-6.
  • 6Klinc D, H~eongseok, McLaughlin S W, et al. LDPC codes for the Gaussian wiretap channel [ J ]. IEEE Trans- actions on Information Forensics and Security, 2011, 6 ( 3 ) :532-540.
  • 7Marco Baldi, Marco Bianchi, Franco Chiaraluce. Non-sys- tematic codes for physical layer security[ C ]//Proceedings of the IEEE Information Theory Workshop, Dublin, Ire- land, 2010 : 1-5.
  • 8Marco Baldi, Marco Bianchi, Franco Chiaraluce. Increas- ing physical layer security through scrambled codes and ARQ [ C ]//Proceedings of the IEEE International Confer- ence on Communications, Kyoto, Japan, 2011:1-5.
  • 9Marco Baldi. Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A Security Gap Analysis[ J ]. IEEE Transactions on Information Forensics and Security, 2012, 7(3) :883-894.
  • 10Kim H S. Measurement and model based characterization of indoor wireless channels [ D ]. USA : University of Mas- sachusetts Ix)well, Doctoral Dissertation,2003.

共引文献9

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部