高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于人工噪声预编码的多天线中继安全性能分析

赵睿 贺玉成 周林 谢维波

赵睿, 贺玉成, 周林, 谢维波. 基于人工噪声预编码的多天线中继安全性能分析[J]. 电子与信息学报, 2016, 38(10): 2575-2581. doi: 10.11999/JEIT160053
引用本文: 赵睿, 贺玉成, 周林, 谢维波. 基于人工噪声预编码的多天线中继安全性能分析[J]. 电子与信息学报, 2016, 38(10): 2575-2581. doi: 10.11999/JEIT160053
ZHAO Rui, HE Yucheng, ZHOU Lin, XIE Weibo. Secrecy Performance Analysis of Multiple-antenna Relay Systems with Artificial Noise Precoding[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2575-2581. doi: 10.11999/JEIT160053
Citation: ZHAO Rui, HE Yucheng, ZHOU Lin, XIE Weibo. Secrecy Performance Analysis of Multiple-antenna Relay Systems with Artificial Noise Precoding[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2575-2581. doi: 10.11999/JEIT160053

基于人工噪声预编码的多天线中继安全性能分析

doi: 10.11999/JEIT160053
基金项目: 

国家自然科学基金(61401165, 61302095, 61271383),福建省自然科学基金(2015J01262, 2014J01243)

Secrecy Performance Analysis of Multiple-antenna Relay Systems with Artificial Noise Precoding

Funds: 

The National Natural Science Foundation of China (61401165, 61302095, 61271383), The Natural Science Foundation of Fujian Province (2015J01262, 2014J01243)

  • 摘要: 为提升存在窃听者的中继网络的安全性能,在多天线放大转发中继端采用人工噪声预编码(ANP)和特征波束形成(EB)安全传输策略,推导了ANP和EB的可达安全速率(EASR)闭合表达式。在中继配置大规模天线时,推导了ANP的EASR下界,并在高信噪比和低信噪比情况下研究了渐近性能。分析和仿真结果显示,在中高信噪比区域,ANP相比于EB可获得显著的性能增益,而在低信噪比区域,EB优于ANP。当信噪比增加时,EB的EASR接近一个与第1跳无关的常数。在高信噪比区域,ANP的最优功率分配方案是将一半左右的功率分配给人工噪声。
  • WANG H M, LIU F, and XIA X G. Joint source-relay precoding and power allocation for secure amplify-
    and-forward MIMO relay networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1240-1250. doi: 10.1109/TIFS.2014.2327480.
    FAN L S, LEI X, DUONG T Q, et al. Secure multiuser communications in multiple amplify-and-forward relay networks[J]. IEEE Transactions on Communications, 2014, 62(9): 3299-3310. doi: 10.1109/TCOMM.2014.2345763.
    LIN H X, ZHAO R, HE Y C, et al. Secrecy performance of transmit antenna selection with outdated CSI for MIMO relay systems[C]. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016: 2516-2521.
    YUAN Y, ZHAO R, LIN H X, et al. Secrecy outage probability of cognitive decode-and-forward relay networks[C]. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016: 3167-3172.
    ZHAO R, HUANG Y M, WANG W, et al. Ergodic secrecy capacity of dual-hop multiple-antenna AF relaying systems[C]. IEEE Global Communications Conference (GLOBECOM), San Diego, USA, Dec. 2015: 1-6. doi: 10.1109/GLOCOM.2015.7417212.
    LAI L and GAMAL H E. The relayeavesdropper channel: Cooperation for secrecy[J]. IEEE Transactions on Information Theory, 2008, 54(9): 4005-4019. doi: 10.1109/TIT.2008.928272.
    LIN M, GE J, YANG Y, et al. Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks[J]. IEEE Communications Letters, 2014, 18(2): 380-383. doi: 10.1109/LCOMM.2013. 121713.132262.
    HUANG J. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884. doi: 10.1109/TSP.2011. 2161295.
    DING Z, PENG M, and CHEN H H. A general relaying transmission protocol for MIMO secrecy communications[J]. IEEE Transactions on Communications, 2012, 60(11): 3461-3471. doi: 10.1109/TCOMM.2012.081012.110236.
    GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189. doi: 10.1109/TWC.2008.060848.
    TSAI S H and POOR H V. Power allocation for artificial-noise secure MIMO precoding systems[J]. IEEE Transactions on Signal Processing, 2014, 62(13): 3479-3493. doi: 10.1109/TSP.2014.2329273.
    XIONG Q, GONG Y, LIANG Y C, et al. Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information[J]. IEEE Wireless Communications Letters, 2014, 3(4): 357-360. doi: 10.1109/LWC.2014.2317194.
    AKHTAR A, BEHNAD A, and WANG X. On the secrecy rate achievability in dual-hop amplify-and-forward relay networks[J]. IEEE Wireless Communications Letters, 2014, 3(5): 493-496. doi: 10.1109/LWC.2014.2349514.
    MUNOZ-MEDINA O, VIDAL J, and AGUSTIN A. Linear transceiver design in nonregenerative relays with channel state information[J]. IEEE Transactions on Signal Processing, 2007, 55(6): 2593-2604. doi: 10.1109/TSP.2006.890913.
    PARK K H, WANG T, and ALOUINI M S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1741-1750. doi: 10.1109/ JSAC.2013.130908.
    BLOCH M, BARROS J, RODRIGUES M R D, et al. Wireless information-theoretic security[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2515-2534. doi: 10.1109/TIT.2008.921908.
    GRADSHTEYN I S and RYZHIK I M. Table of Integrals, Series, and Products [M]. New York: Academic Press, 2007: 1-20.
    JIN S, LIANG X, WONG K K, et al. Ergodic rate analysis for multipair massive MIMO two-way relay networks[J]. IEEE Transactions on Wireless Communications, 2015, 14(3): 1480-1491. doi: 10.1109/TWC.2014.2367503.
  • 加载中
计量
  • 文章访问数:  1315
  • HTML全文浏览量:  111
  • PDF下载量:  374
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-01-13
  • 修回日期:  2016-06-20
  • 刊出日期:  2016-10-19

目录

    /

    返回文章
    返回