期刊文献+

多干扰者协作的MIMO系统下功率分配算法设计 被引量:1

Robust Power Allocation Design in Secure MIMO System with Multiple Cooperative Jammers
下载PDF
导出
摘要 随着无线通信技术的快速发展与广泛应用,基于信道状态信息进行信息安全传输的物理层安全技术已成为业界的研究重点。为此,基于物理层安全技术,在分析加入了多个协作干扰者的MIMO无线通信系统的系统模型并同时考虑信道状态信息不确定性的基础上,提出了安全速率最大化优化问题以寻找合适的功率分配方案,并进一步基于一阶泰勒展开和S-程序理论设计出相应的鲁棒优化算法。为验证所提出算法的有效性和可行性,应用MATLAB进行了仿真计算,并就干扰者个数和安全速率的关系进行了分析。仿真实验结果表明,增加协作干扰者个数可提升系统的安全性能;在信道信息未完全已知的前提下,所提出的鲁棒优化算法可比非鲁棒优化算法达到更高的安全速率。 With the rapid development and wide application of wireless communication technique, the physical layer security technology based on channel state information for information transmission has been research focus of the industry. Based on the physical layer security,the system model of MIMO wireless communication with multiple cooperative jammers is analyzed and the uncertainty of channel state information is considered simultaneously. On the basis, the problem of maximizing the security rate is put forward to find the appropriate power allocation scheme and the corresponding robust optimization algorithm is designed further based on the first-order Taylor expansion and S-procedure theory. In order to validate its effectiveness and practicability ,the simulation is carded out by MATLAB and the relationship between jammer' s number and security rate is analyzed. Simulation results illustrate that increase of jammers have significantly enhanced the secure performance of the system. Moreover,by contrast with non-robust algorithm,the higher performances of the pro- posed robust algorithm have been verified.
出处 《计算机技术与发展》 2017年第7期120-125,共6页 Computer Technology and Development
基金 国家自然科学基金资助项目(61271232) 国家移动通信研究实验室开放研究基金(2012D05)
关键词 物理层安全 多入多出系统 协作干扰 鲁棒 无线通信 physical layer security MIMO cooperative jamming robust wireless communication
  • 相关文献

参考文献7

二级参考文献218

  • 1Khisti A, Tchamkerten A, Wornell G W. Secure broadcasting over fading channels. IEEE Transactions on Information Theory, 2008, 54(6): 2 453-2 469.
  • 2Tan F Wong, Matthieu B, John M S. Secret sharing over fast-fading MIMO wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 3Yingbin Liang, Gerhard K, Poor H V, et ol. Compound wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 4Tie Liu, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, 2009, 55(6): 2 547-2 553.
  • 5Lifeng Lai, Hesham E G. The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 2008, 54(9): 4 005-4 019.
  • 6Aggarwal V, Sankar L, Calderbank A R, et al. Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 7Xiang He, Aylin Yener. Two-hop secure communication using an untrusted relay. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 8Zhu Han, Ninoslav Marina, Merouane Debbah, et ol. Physical layer security game: interaction between source, eavesdropper and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 9Kashyap A, Basar T, Srikant R. Correlated jamming on MIMO Gaussian fading channels. IEEE Transactions on Information Theory, 2004, 50(9): 2 119-2 123.
  • 10Ellis K J, Serinken N. Characteristics of radio transmitter fingerprints. Radio Science, 2001, 36(4): 585-597.

共引文献71

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部