期刊文献+

稀疏阵列方向调制信号综合算法

Synthesis algorithm of directional modulation signals based on sparse arrays
下载PDF
导出
摘要 方向调制技术是近年来物理层安全通信领域研究的热点之一。现有的研究都是采用均匀相控阵根据应用场景性能要求的不同来研究方向调制信号的综合算法,不同场景性能要求下综合算法不具有通用性。针对这一问题提出了一种基于稀疏阵列的方向调制信号综合算法,算法中首先利用前向后向矩阵束方法求解稀疏阵列的阵元位置,然后针对方向调制信号应用场景性能要求建立相应的优化问题,通过优化问题中的目标函数和约束条件将不同的性能要求统一到一个优化问题中求解稀疏阵元对应的激励。仿真结果表明所提的基于稀疏阵列的方向调制信号综合算法相比于均匀阵列的方向调制信号综合算法能够更好地适应不同场景性能要求下方向调制信号发射机的设计。 Directional modulation technology is one of the hot spots in the field of physical layer security communications in recent years.The existing researches study the synthesis algorithm of the directional modulation signal based on uniform phased arrays according to the different performance requirements of the application scenario.Those synthesis algorithms do not have universality under different performance requirements.To solve this problem,a synthesis algorithm of directional modulation signals based on sparse array is proposed.In the algorithm,the array element position of the sparse array is first solved by the forward-backward matrix pencil method.Then,the corresponding optimization problem is established according to the performance requirements of the directional modulation signal.Utilize the objective function and constraints to unify different performance requirements into the same optimization problem to solve the array excitation.Simulation result shows that the proposed algorithm is better than the uniform array-based directional modulation signal synthesis algorithm in the adaptability of transmitter design for different application scenarios.
作者 马威 洪涛 MA Wei;HONG Tao(College of Telecommunications & Information Engineering,Nanjing University of Posts andTelecommunications,Nanjing 210003,China)
出处 《系统工程与电子技术》 EI CSCD 北大核心 2018年第12期2816-2823,共8页 Systems Engineering and Electronics
基金 国家自然科学基金(61302102 91738201)资助课题
关键词 物理层安全通信 方向调制 稀疏阵列 前向后向矩阵束 凸优化 physical layer security communication directional modulation(DM) sparse array forward-backward matrix pencil method (FBMPM) convex optimization
  • 相关文献

参考文献1

二级参考文献15

  • 1Gupta P and Kumar P. The capacity of wireless networks[J]. IEEE Transactions on Information Theory, 2000, 46(2): 388-404.
  • 2Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 3Liu R, Maric I, Spasojevic P, et al.. Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2493-2507.
  • 4Jorswieck E, Lai Li-feng, Ma Wing-kin. Signal processing for wireless physical layer security[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1657-1659.
  • 5Marano S and Matta V. Achieving perfect secrecy by pdf- bandlimited jamming[J]. IEEE Signal Processing Letters, 2014, 21(1): 83-87.
  • 6Liu B, Zhang L, and Xin X. Physical layer security in OFDM- PON based on dimension-transformed chaotic permutation[J] IEEE Photonics Technology Letters, 2014, 26(2): 127-130.
  • 7Lin P H, Lai S H, and Lin S C. On secrecy rate of the generalized artificial-Noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1728-1740.
  • 8Zhang Rong-qing and Song Ling-yang. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693-3704.
  • 9Manzoor A K, Hamidou T, and Athanasios V. Evolutionary coalitional games: design and chMlenges in wireless networks[J]. IEEE Wireless Communications, 2012, 19(2): 50-56.
  • 10Walid S, Zhang Xiang-yun, and Behrouz M. Tree formation with physical layer security considerations in wireless multi-hop networks[J]. IEEE Transactions on Wireless Communications, 2012, 11(11): 3980-3991. 3, 2012.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部