高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案

雷维嘉 左莉杰 江雪 谢显中

雷维嘉, 左莉杰, 江雪, 谢显中. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
引用本文: 雷维嘉, 左莉杰, 江雪, 谢显中. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
Citation: Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579

中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案

doi: 10.11999/JEIT141579
基金项目: 

国家自然科学基金(61471076, 61271259, 61301123),长江学者和创新团队发展计划(IRT1299)以及重庆市科委重点实验室专项经费

Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network

  • 摘要: 该文研究存在多个相互勾结的单天线窃听者的多中继传输系统中,采用零空间人工噪声和放大转发的中继波束赋形的物理层安全传输方案。在中继窃听端的信道状态信息不准确的情况下,基于半定规划理论,对中继的波束赋形加权矩阵和人工噪声协方差矩阵进行联合优化,有效减少相互勾结的多个窃听者所获得的信息量,显著提高系统保密容量,是一种具有良好鲁棒性的物理层安全传输方案。仿真结果显示方案具有良好的性能。
  • Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715.
    Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.
    Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
    Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5.
    Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717.
    Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.
    Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506.
    Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networkspart II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147.
    Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446.
    Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343.
    Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56.
    Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487.
    Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162.
    Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655.
    Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34.
    Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9.
    Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216.
  • 加载中
计量
  • 文章访问数:  1339
  • HTML全文浏览量:  120
  • PDF下载量:  477
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-12-10
  • 修回日期:  2015-05-04
  • 刊出日期:  2015-09-19

目录

    /

    返回文章
    返回