期刊文献+

多用户选择与协作干扰的安全性能分析 被引量:2

Secrecy Performance Analysis of Multi-user Selection and Cooperative Jamming
下载PDF
导出
摘要 研究了一种多用户选择与协作干扰相结合的无线安全传输系统。在Nakagami-m衰落信道下,考虑到信道的反馈延迟对信道状态信息的影响,提出了利用一般阶次选择策略来选择目的用户,并结合协作干扰策略,实现信息的安全传输。针对窃听信道状态信息已知和未知两种不同条件,分别提出了相应传输策略,推导了系统的中断概率和窃听概率的准确表达式。理论分析与数值仿真结果表明,提高用户选择的阶参数能够有效地改善系统的安全性能。 A wireless transmission model of combined multi-user selection and cooperative jamming is investigated.Under the Nakagami-m fading channel model,a general-order selection strategy is proposed to select the destination user upon considering the influence of channel feedback delay on channel state information(CSI),and then a cooperative jamming strategy is incorporated to realize secure information transmission.Under the conditions of known and unknown eavesdropping CSI,two different transmission strategies are proposed,and the corresponding exact expressions for the outage probability and the eavesdropping probability of the system are derived.The results of theoretical analysis and numerical simulations show that increasing the order parameter for user selection can improve effectively the security performance of the system.
作者 张勇建 贺玉成 蔡静 周林 Zhang Yongjian;He Yucheng;Cai Jing;Zhou Lin(Xiamen Key Laboratory of Mobile Multimedia Communications,Huaqiao University,Xiamen,Fujian 361021,China)
出处 《信号处理》 CSCD 北大核心 2019年第3期334-341,共8页 Journal of Signal Processing
基金 福建省自然科学基金(2018J01096) 重庆市/信息产业部"计算机网络与通信技术重点实验室"开放基金(CY-CNCL-2017-05)
关键词 多用户选择 协作干扰 NAKAGAMI-M衰落信道 中断概率 窃听概率 multi-user selection cooperative jamming Nakagami-m channel outage probability intercept probability
  • 相关文献

参考文献4

二级参考文献20

  • 1王保云,郑宝玉.Nakagami衰落环境下合并接收的平均错误概率[J].信号处理,2005,21(2):181-184. 被引量:2
  • 2Khisti A, Wornell G W. Secure transmission with multiple antennas I: The MISOME wiretap channel[J]. IEEE Trans- actions on Information Theory, 2010, 56(7) : 3088-3104.
  • 3Goel S, Negi R. Guaranteeing secrecy using artificial noise [ J ]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 4Laneman J N, Tse D N C, Wornell G W. Cooperative di- versity in wireless networks: Efficient protocols and out- age behavior[J]. IEEE Transactions on Information The- ory, 2004, 50(12): 3062-3080.
  • 5Ding Z, Leung K K, Goeckel D L, et al. Opportunistic relaying for secrecy communications: Cooperative jam- ming vs. relay chatting[J]. IEEE Transactions on Wire- less Communications, 2011, 10(6): 1725-1729.
  • 6Zou Y, Wang X, Shen W. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks [J ]. IEEE Journal on Selected Areas in Communica- tions, 2013, 31(10) :2099-2111.
  • 7Bao V N Q, Linh-Trung N, Debbah M. Relay SelectionSchemes for Dual-Hop Networks under Security Con- straints with Multiple Eavesdroppers [ J ]. IEEE Transac- tions on Wireless Communications, 2013, 12(12) :6076- 6085.
  • 8Fan L, Lei X, Duong T Q, et al. Secure Muhiuser Com- munications in Multiple Amplify-and-Forward Relay Net- works [ J ]. IEEE Transactions on Communications, 2014, 62(9) :3299-3310.
  • 9Liu Y, Petropulu A P. Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security [ J ]. IEEE Transactions on Information Forensics & Security, 2013, 8(4) :682-694.
  • 10Bletsas A, Khisti A, Reed D P, et al. A simple coopera- tive diversity method based on network path selection [J ]. IEEE Journal on Selected Areas in Communica- tions, 2006, 24 (3) : 659- 672.

共引文献13

同被引文献11

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部