期刊文献+

蜂窝网络下中继D2D系统的保密速率研究 被引量:2

Research on security rate of relayed D2D systems in cellular networks
下载PDF
导出
摘要 对蜂窝网络下中继D2D系统中蜂窝用户的物理层安全性能进行了研究,实现了既满足D2D对的传输速率要求,又提升蜂窝用户的保密速率的双赢局面.在空闲的蜂窝用户中挑选中继节点,将D2D对的干扰看作友好干扰,构建了多约束的非凸混合整数优化模型,通过分层求解,提出了单用户场景下的功率控制算法和多用户场景下的信道分配算法.仿真结果表明:功率和信道的联合优化算法与通信系统中随机接入算法相比,能够在满足约束条件的同时提升蜂窝用户的保密速率,增强物理层安全性能. This paper studies the physical layer security performance of Cellular Users(CU)for D2Dcommunications in relayed cellular networks.It can achieve a win-win situation that satisfies the requirements of transmission rate for D2Dpairs and increases the security rate of cellular users.In this communication mode,relay is selected from idle cellular user,and the interference of D2Dpairs is regarded as friendly interference.The problem is solved by constructing a mixed integer optimization model,which is multi-constraint and non-convex.We solve the problem hierarchically,and propose a power control algorithm in a single-user scenario and a channel allocation algorithm in a multi-user scenario.The numerical results show the algorithm of jointing the power and channel optimization can increase the security rate and improve physical layer security performance of cellular users,compared with the traditional random access algorithms.
作者 陶成 彭珂 周涛 TAO Cheng;PENG Ke;ZHOU Tao(School of Electronic and Information Engineering,Beijing Jiaotong University,Beijing 100044,China)
出处 《北京交通大学学报》 CAS CSCD 北大核心 2020年第2期83-90,共8页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金(51178026)。
关键词 D2D通信 保密速率 功率控制 信道分配 D2Dcommuniation security rate power control channel allocation
  • 相关文献

参考文献2

二级参考文献65

  • 1OkamotoT,Yamamoto H.Modern cryptography[M].Japan:Sangyo-Tosho,1997.
  • 2Kasahara M,Sakai R.Cryptography[M].Kyoritsu,2002.
  • 3Shannon C E.Communication theory of secrecy systems[J].BellSys Tech Journ,1949,28:656-715.
  • 4Wyner A D.The wire-tap channel[J].Bell Sys Tech Journ,1975,54:1355-1387.
  • 5Maurer U.Secret key agreement by public discussion from common information[J].IEEE Trans Inf Theory,1993,39(3):733-742.
  • 6Mukherjee A,Fakoorian S A A,Huang J,et al.Principles of physical layer security in multiuser wireless networks:A survey[J].ArXiv Preprint ArXiv:2010,1011:3754.
  • 7Carleial A B,Hellman M.A note on Wyner's wiretap channel[J].IEEE Trans Inf Theory,1977,23(5):625-627.
  • 8Barros J,Rodrigues M R D.Secrecy capacity of wireless channels[J].IEEE Trans Inf Theory,2006,24(3):339-348.
  • 9Li Z,Yates R,Trappe W.Secret communication with a fading eavesdropper channel[C]//IEEE International Symposium on Information Theory.Nice,France:IEEE,2007:1296-1300.
  • 10Xiao C,Wu J,Leong S Y,et al.A discrete-time model for triply selective MIMO Rayleigh fading channels[J].IEEE Trans Wireless Commun,2004,3(5):1678-1688.

共引文献27

同被引文献26

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部