高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于半定规划方法的多个窃听用户认知网络物理层安全优化设计

谢显中 谢成静 雷维嘉 战美慧

谢显中, 谢成静, 雷维嘉, 战美慧. 基于半定规划方法的多个窃听用户认知网络物理层安全优化设计[J]. 电子与信息学报, 2015, 37(10): 2424-2430. doi: 10.11999/JEIT150111
引用本文: 谢显中, 谢成静, 雷维嘉, 战美慧. 基于半定规划方法的多个窃听用户认知网络物理层安全优化设计[J]. 电子与信息学报, 2015, 37(10): 2424-2430. doi: 10.11999/JEIT150111
Xie Xian-zhong, Xie Cheng-jing, Lei Wei-jia, Zhan Mei-hui . Improved Transmit Design for Physical Layer Security in Cognitive Radio Networks with Multiple Eavesdropper Base on Semi-definite Programming[J]. Journal of Electronics & Information Technology, 2015, 37(10): 2424-2430. doi: 10.11999/JEIT150111
Citation: Xie Xian-zhong, Xie Cheng-jing, Lei Wei-jia, Zhan Mei-hui . Improved Transmit Design for Physical Layer Security in Cognitive Radio Networks with Multiple Eavesdropper Base on Semi-definite Programming[J]. Journal of Electronics & Information Technology, 2015, 37(10): 2424-2430. doi: 10.11999/JEIT150111

基于半定规划方法的多个窃听用户认知网络物理层安全优化设计

doi: 10.11999/JEIT150111
基金项目: 

国家自然科学基金(61271259, 61471076),重庆市自然科学基金(CTSC2011jjA40006),重庆市教委科学技术研究项目(KJ120501, KJ130536),长江学者和创新团队发展计划(IRT1299)和重庆市科委重点实验室专项经费(CSTC)

Improved Transmit Design for Physical Layer Security in Cognitive Radio Networks with Multiple Eavesdropper Base on Semi-definite Programming

Funds: 

The National Natural Science Foundation of China (61271259, 61471076)

  • 摘要: 针对具有多个多天线窃听者的认知无线电网络(CRN),为了使系统保密速率达到最大,该文把对主用户的干扰设计成为一个约束条件,通过对次用户发送端传输协方差矩阵的优化设计来提高物理层安全性能。在已知信道状态信息(CSI)时利用矩阵性质和Charnes-Cooper变换,将该非凸函数转化为一个半定规划(SDP),从而得到次用户发送端的优化方案。仿真结果表明,相对于现有二次优化传输策略,该方案能够使系统的保密速率更大,并在复杂度方面具有优势。
  • Simon H. Cognitive radio: brain-empowered wireless communication[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(2): 201-220.
    Shu Zhi-hui, Qian Yi, and Song Ci. On physical layer security for cognitive radio networks[J]. IEEE Network, 2013, 27(3): 28-33.
    Zhang Rui and Liang Ying-chang. Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks[J]. IEEE Journal of Selected Topics in Signal Process, 2008, 2(1): 88-102.
    Pei Yi-yang, Liang Ying-chang, Zhang Lan, et al.. Secure communication over MISO cognitive radio channel[J]. IEEE Transactions on Wireless Communications, 2010, 9(4): 1494-1502.
    Pei Yi-yang, Liang Ying-chang, Zhang Lan, et al.. Secure communication in multi-antenna cognitive radio networks with imperfect channel state information[J]. IEEE Transactions on Signal Processing, 2011, 59(4): 1683-1693.
    陈涛, 余华, 韦岗. 认知无线电网络的物理层安全研究及其鲁棒性设计[J]. 电子与信息学报, 2012, 34(4): 770-775.
    Chen Tao, Yu Hua, and Wei Gang. Study on the physical layer security of cognitive radio networks and its robustness design[J]. Journal of Electronics Information Technology, 2012, 34(4): 770-775.
    Wang Chao and Wang Hui-ming. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channel[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1814-1827.
    Houjeij A, Saad W, and Basar T. A game-theoretic view on the physical layer security of cognitive radio networks[C]. Proceedings of IEEE International Conference on Communications (ICC), Budapest, 2013: 2095-2099.
    Zou Yu-long, Wang Xian-bin, and Shen Wei-ming. Physical-layer security with multiuser scheduling in cognitive radio network[J]. IEEE Transactions on Communications, 2013, 61(12): 5103-5113.
    Yang Nan, Yeoh P l, and Elkashlan M T. Transmit antenna selection for security enhancement in MIMO wiretap channel[J]. IEEE Transactions on Communications, 2013, 61(1): 144-154.
    Khisti A and Wornell G. Secure transmission with multiple antennas Part II: the MIMOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.
    He Xiang and Yener A. MIMO wiretap channels with unknown and varying eavesdropper channel states[J]. IEEE Transactions on Information Theory, 2014, 60(11): 6844-6869.
    Liu T and Shamai (Shitz) S. A note on the secrecy capacity of the multiple-antenna wiretap channel[J]. IEEE Transactions on Information Theory, 2009, 55(6): 2547-2553.
    Khisti A and Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.
    Shafiee S and Ulukus S. Achievable rates in Gaussian MISO channels with secrecy constraints[C]. Proceedings of IEEE International of Information Theory(ISIT), Nice, 2007: 2466-2470.
    Gerbracht S, Wolf A, and Jorswieck E A. Beamforming for fading_wiretap channels with partial channel information[C]. Proceedings of ITG Workshop on Smart Antennas (WSA), Bremen, 2010: 394-401.
    Liu Jia, Hou Y, and Sherali H D. Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels[C]. Proceedings of Information Sciences and Systems, Baltimore, MD, 2009: 606-611.
    Zang Li, Trappe W, and Yates R. Secret communication via multi-antenna transmission[C]. IEEE 41st Annual Conference on Information Sciences and Systems(CISS2007), Baltimore, MD, 2007: 905-910.
    Schaefer R F and Boche H. Physical layer service integration in wireless network: signal processing challenges [J]. IEEE Signal Processing Magazine, 2013, 31(3): 147-156.
    Li J and Petropulu A P. Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels[C]. IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) Dallas, TX, 2010: 3362-3365.
    Boyd S and Vandenbeighe L. Convex Optimization [M]. UK: Cambridge University Press, 2004: 69-71, 168-169, 655.
  • 加载中
计量
  • 文章访问数:  1157
  • HTML全文浏览量:  102
  • PDF下载量:  462
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-01-21
  • 修回日期:  2015-06-02
  • 刊出日期:  2015-10-19

目录

    /

    返回文章
    返回