期刊文献+

全双工网络的友好干扰协作机制和功率分配

Friendly Jamming Cooperative Scheme and Power Allocation in Full-Duplex Network
下载PDF
导出
摘要 在无线全双工中继网络中,假设中继节点是不可信任的,为了改善合法用户的物理层安全性能,利用友好干扰节点向中继节点发射干扰信号进行协作,且为了获得帮助,合法用户需向干扰节点支付一定的费用。基于此协作干扰机制,讨论了如何对友好干扰节点进行有效的功率分配,从而使得合法用户获得的效用达到最优。理论分析和仿真结果表明,由于中继节点采用了全双工技术,且利用友好干扰节点进行协作,并在此基础上进行最优功率分配,合法用户的物理层安全性能可得到有效提高。 In wireless full-duplex relay network,the relay node is assumed to be untrusted.In order to enhance the physical layer security of legitimate user,the friendly jammers are proposed to transmit interference signals to the untrusted relay node for cooperation.The legitimate user must pay the costs to friendly jammers for gaining help.Based on this cooperative jamming scheme,the power allocation problem of friendly jammers for maximizing the physical layer security of legitimate users was discussed.Theoretical analysis and simulation results show that when the relay nodes adopt full duplex technology and cooperate with the friendly jammers,and the optimal power allocation is also carried out according to the scheme,the physical layer security of the legitimate users can be effectively improved.
作者 罗荣华 雷俊 胡国兵 LUO Rong-hua1,LEI Jun2,HU Guo- bing1(1. Jingling Institute of Technology,Nanjing 211169, China;2. Nanjing Panda Handa Technology Company Limited,Nanjing 210094, Chin)
出处 《金陵科技学院学报》 2018年第2期15-18,共4页 Journal of Jinling Institute of Technology
基金 江苏省自然科学基金资助项目(BK20161104) 江苏省高校自然科学研究面上项目(16KJB510011) 金陵科技学院校级科研基金(jit-2016-jlxm-24) 金陵科技学院博士科研启动基金(jit-b-201409)
关键词 全双工 物理层安全 友好干扰节点 协作干扰机制 功率分配 full-duplex physical layer security friendly jammers cooperative jamming scheme power allocation
  • 相关文献

参考文献1

二级参考文献14

  • 1C.E.Shannon. Communication theory ofsecrecy systems[J].Bell System Technical Journal,1949.656-715.
  • 2A.D.Wyner. The wire-tap channel[J].Bell System Technical Journal,1975,(08):1355-1387.
  • 3S.K.Leung-Yan-Chcong,M.E.Hellman. The Gaussian WireTap Channel[J].IEEE Transactions on Information theory,1978,(04):451-456.
  • 4I.Csiszar,J.Komer. Broadcast Channels with Confidential Messages[J].IEEE Transactions on Information theory,1978,(03):339-348.
  • 5P.K.Gopala,L.Lai,H.E.Garnal. On the Secrecy Capacity of Fading Channels[J].IEEE Transactions on Information theory,2008,(10):4687-4698.
  • 6Z.Li,R.Yates,W.Trappe. Achieving Secret Communication for Fast Rayleigh Fading Channels[J].IEEE Trnsactions on Wireless Communications,2010,(09):2792-2799.
  • 7H.Jeon,N.Kim,J,Choi,H.Lee,J.Ha. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR[J].IEEE Transactions on Information theory,2011,(04):1975-1983.
  • 8A.Khisti,G.W.Wornell. Secure Transmission With Multiple Antennas Ⅰ:The MISOME Wire-tap Channel[J].IEEE Transactions on Information theory,2010,(07):3088-3104.
  • 9A.Thangaraj,S.Dihida,A.R.Calderbank,S.W.McLaughlin,J-M.Merolla. Application of LDPC Codes to the Wiretap Channel[J].IEEE Transactions on Information theory,2007,(08):2933-2945.
  • 10D.Klinc,J.Ha,S.W.McLaughlin,J.Barros,B-J.Kwak. LDPC Codes for the Gaussian Wiretap Channel[J].IEEE Transactions on Information Forensics and Security,2011,(03):532-540.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部