期刊文献+

多发单收窃听信道中人工噪声辅助的鲁棒波束成形设计 被引量:1

A Robust Design of Transmit Beam Forming with Artificial Noises in MISO Wiretap Channels
下载PDF
导出
摘要 针对无线通信物理层安全中合法用户接收的信息易受到非法窃听者窃听的问题,提出了一种人工噪声辅助的鲁棒波束成形(AN-RBF)设计方案。首先,利用信道估计分别获取发射端到合法用户的瞬时非理想信道状态信息(CSI)和发射端到窃听者的统计CSI;然后,在发射端向合法用户发送的信号中添加人工噪声,通过对有用信号和人工噪声进行联合优化,在满足发射功率控制和中断概率限制的约束条件下实现安全传输速率的最大化。AN-RBF方案发射端仅需获取窃听者的统计CSI,且发射端获取的合法用户的瞬时CSI是非理想的,系统开销少,另外,人工噪声的添加可以降低窃听者接收端信干噪比,提高多发单收(MISO)窃听信道中的安全传输速率。仿真结果表明,在20dB功率且仿真环境相同的情况下,所提AN-RBF方案的安全速率比各态同向人工噪声辅助方案提高了约2bit·(s·Hz)-1。 A robust beam forming(AN-RBF)scheme with artificial noises is proposed to improve the physical layer for the wireless communication.Firstly,the channel estimation is used to get the imperfect channel state information(CSI)of a legitimate receiver and the statistical CSI of eavesdroppers.Then,the AN-RBF scheme adds artificial noises into transmission signals to maximize the secrecy rate under constraints of the transmit power and the secrecy rate outage probability.The AN-RBF scheme only needs to get the imperfect CSI of the link to the legitimate receiver and the statistical CSI of the link to eavesdroppers,therefore,reduces the system overhead.Adding artificial noise effectively reduces the signal-to-interference-and-noise ratio(SINR)received at eavesdroppers.Thus,the AN-RBF scheme improves the physical layer security performance of multiple-input single-output(MISO)wiretap channels.Simulation results and a comparison with the isotropic AN scheme in the same simulation environment show that the AN-RBF scheme improves the secrecy rate approximately by 2 bit·(s·Hz)-1.
作者 徐静 许思文 孙黎 XU Jing;XU Siwen;SUN Li(School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China)
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2017年第11期118-124,共7页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(61431011 61302068)
关键词 无线通信 物理层安全 鲁棒波束成形 人工噪声 wireless communication physical layer security robust beamforming artificial noise
  • 相关文献

参考文献3

二级参考文献28

  • 1殷勤业,张莹,丁乐,孟银阔.协作分集:一种新的空域分集技术[J].西安交通大学学报,2005,39(6):551-557. 被引量:58
  • 2SENDONARIS A, ERKIP E, AAZHANG B. User co operation diversity: part I system description [J]. IEEE Transactions on Communications, 2003, 51 (11) : 1927-1938.
  • 3LANEMAN J N, WORNELL G W. Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks [J]. IEEE Transactions on Information Theory, 2003, 49(10): 2415-2425.
  • 4BLETSAS A, SHIN H, WIN M Z. Cooperative communications with outage-optimal opportunistic relaying [J].IEEE Transactions on Wireless Communications, 2007, 6(9): 3450-3460.
  • 5BERES E, ADVE R. Seleetion cooperation in multisource cooperative networks [J].IEEE Transactions on Wireless Communications, 2008, 7(1): 118-127.
  • 6BLETSAS A, KHISTI A, REED D P, et al. A simple cooperative diversity method based on network path selection [J].IEEE Journal on Selected Areas in Communications, 2006, 24(3): 659-672.
  • 7LANEMAN J N, TSE D N C, WORNELL G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior [J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080.
  • 8ZHENG Lizhong, TSE D. Diversity and multiplexing:a fundamental tradeoff in multiple antenna channels [J]. IEEE Transactions on Information Theory, 2003, 49(5) : 1073-1096.
  • 9GOLDSTEIN J S, REED I S. Reduced rank adaptive filtering [J]. IEEE Transaction on Signal Processing, 1997, 45(2): 429-496.
  • 10GOLDSTEIN J S, REED I S, SCHARF L L. A multistage representation of the Wiener filter based on orthogonal projections [J]. IEEE Transaction on Information Theory, 1998, 44(7) : 2943-2959.

共引文献3

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部