期刊文献+

自适应窃听和干扰下机会式中继和协作干扰技术的安全性能分析 被引量:4

Secure performance analysis of opportunistic relay and cooperative jamming technique under adaptive eavesdropping and jamming
下载PDF
导出
摘要 在存在一个半双工自适应窃听者的多中继协作通信模型中,针对窃听者能够智能地选择被动窃听或主动干扰的问题,选择一个中继协助源节点转发信息,其余中继用于发送人工干扰信号以混淆窃听者,从而提升系统的遍历可达安全速率(Ergodic achievable secrecy rate,EASR)性能。在仅有窃听信道统计信息的假设下,推导了EASR的渐进闭合表达式,并进行了Monte-Carlo仿真验证。仿真结果表明:即使在中继数目较小的情况下,渐进分析结果与仿真结果也基本吻合。同时表明:采用机会式中继和中继协作干扰的组合技术可显著地提升系统的安全传输性能。 A multi-relay cooperative communication model is considered,where there exists a half-duplex adaptive eavesdropper that performs either passive eavesdropping or active jamming. To improve the performance in ergodic achievable secrecy rate(EASR),one cooperative relay is selected to assist the source node to transmit information,and the remaining relays are used to send artificial jamming to confuse the eavesdropper. Under the assumption that only the statistical channel state information of the eavesdropper is known,the asymptotic closed-form expression for the EASR is derived,and Monte-Carlo simulations are conducted to validate the derivations. Simulation results show that the asymptotic analysis results coincide well with the simulation results even when the number of relays are relatively small,and meanwhile,the combined opportunistic relaying and cooperative jamming technique can significantly improve the secure transmission performance of the system.
作者 贾丽君 贺玉成 周林 Jia Lijun;He Yucheng;Zhou Lin(School of Information Science and Engineering,Huaqiao University,Xiamen 361021,China;State Key Laboratory of Integrated Services Networks,Xidian University,Xi ’ an 710071,China)
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2019年第1期29-34,共6页 Journal of Nanjing University of Science and Technology
基金 福建省自然科学基金(2018J01096) 重庆市/信息产业部"计算机网络与通信技术重点实验室"开放基金(CY-CNCL-2017-05)
关键词 物理层安全 自适应窃听者 机会式中继 协作干扰 遍历可达安全速率 半双工 协作通信 physical layer security adaptive eavesdropper opportunistic relay cooperative jamming ergodic achievable secrecy rate half-duplex cooperative communication
  • 相关文献

参考文献2

二级参考文献20

  • 1WANG H M, LIU F, and XIA X G. Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1240-1250.
  • 2FAN L S, LEI X, DUONG T Q, et al. Secure multiuser communications in multiple amplify-and-forward relay networks[J]. IEEE Transactions on Communications, 2014, 62(9): 3299-3310.
  • 3LIN H X, ZHAO R, HE Y C, et al. Secrecy performance of transmit antenna selection with outdated CSI for MIMO relay systems[C]. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016: 2516-2521.
  • 4YUAN Y, ZHAO R, LIN H X, et al. Secrecy outage probability of cognitive decode-and-forward relay networks[C]. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016: 3167-3172.
  • 5ZHAO R, HUANG Y M, WANG W, et al. Ergodic secrecy capacity of dual-hop multiple-antenna AF relaying systems[C]. IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015: 1-6.
  • 6LAI L and GAMAL H E. The relay-eavesdropper channel: Cooperation for secrecy[J]. IEEE Transactions on Information Theory, 2008, 54(9): 4005-4019.
  • 7LIN M, GE J, YANG Y, et al. Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks[J]. IEEE Communications Letters, 2014, 18(2): 380-383.
  • 8HUANG J. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
  • 9DING Z, PENG M, and CHEN H H. A general relaying transmission protocol for MIMO secrecy communications[J]. IEEE Transactions on Communications, 2012, 60(11): 3461-3471.
  • 10GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.

同被引文献15

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部