期刊文献+

基于非可信FDR采集能量的物理层安全传输性能分析

Performance Analysis of Physical Layer Security Transmission based on Untrusted-FDR Energy Acquisition
下载PDF
导出
摘要 随着无线通信业务的飞速发展,通信资源变得紧缺,同时通信业务面临更大的安全威胁。因此,考虑了一个包含非可信中继的协同通信网络,其中进行信息转发的中继和接收端工作在全双工模式,且FDR会对信息进行窃听。为了更加切合下一代通信网络架构“绿色能量消耗”的主题,令FDR以PS方式从所接收到的信号中提取能量和解码信息。通过理论分析和仿真研究该系统的安全性能,同时分析了不同参数对系统安全性能的影响。 With the rapid development of wireless communication services, communication resources have become extremely scarce, while communication services are also facing greater security threats. Therefore, a cooperative communication network including untrusted relays is considered, in which the relay and the receiver for information forwarding work in full duplex mode, and FDR would steal information. In order to fairly meet the theme of "green energy consumption" of next generation communication network architecture, FDR extracts energy and decoding information from the received signal in PS mode. Theoretical analysis simulation are done on the safety performance of the system, and at the same time, the influence of difierent parameters on the safety performance of the system is explored.
作者 陶业荣 李博轮 李鹏飞 TAO Ye-rong;LI Bo-lun;LI Peng-fei(Luoyang Electronic Equipment Test Center, Luoyang Henan 471000, China)
出处 《通信技术》 2019年第10期2489-2493,共5页 Communications Technology
关键词 物理层安全 功率分割 非可信FDR 安全中断概率 physical layer security power splitting untrusted FDR secrecy outage probability
  • 相关文献

参考文献1

二级参考文献66

  • 1J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
  • 2M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless infor- mation-theoretic security," IEEE Trans. Inf.. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
  • 3C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
  • 4A. D. Wyner, "The wire-tap channel," Bell Syst. Tecb. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  • 5I. Csiszdr and J. Ktirner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
  • 6U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," IEEE Trans. In. Theo- ry, vol. 49, no. 4, pp. 822-831, Apr. 2003.
  • 7U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part Ⅱ: the simulatability condition," IEEE Trans. InT. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
  • 8T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over muhipath wireless channels," in Proe. IEEE ISIT, Seoul, Korea, June 2009, pp. 2296-2300.
  • 9L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. INT.. Forensics Security, vol. 7, no. 2, pp. 480-490. Aor. 2012.
  • 10L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-com- modity flow in networks," in Proc. IEEE 1TW, Lausanne, Switzerland, Sept. 2012, pp. 627-631.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部