高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

异构密集网中一种抗多窃听者的协作安全波束成形方案

黄开枝 张波

黄开枝, 张波. 异构密集网中一种抗多窃听者的协作安全波束成形方案[J]. 电子与信息学报, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
引用本文: 黄开枝, 张波. 异构密集网中一种抗多窃听者的协作安全波束成形方案[J]. 电子与信息学报, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
Citation: HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152

异构密集网中一种抗多窃听者的协作安全波束成形方案

doi: 10.11999/JEIT161152
基金项目: 

河南省科技攻关计划项目(152102210013),国家863计划项目 (2015AA01A708),国家自然科学基金(61171108, 61471396)

Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks

Funds: 

The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61171108, 61471396)

  • 摘要: 为保证异构密集网中多个窃听者联合窃听时宏基站用户的下行通信安全,该文提出一种抗多窃听者的协作安全波束成形方案。该方案通过联合设计宏基站和微基站的最优协作波束成形矢量,使保密信息传输速率提升的同时,其他用户的下行信号进一步干扰窃听者,从而最大化系统安全速率。为获得最优的协作波束成形矢量,在考虑其他合法用户的服务质量及基站功率限制时,对该安全速率最大化问题进行建模。采用半定松弛技术及Lagrange 对偶理论将原始的非凸优化问题转化为一系列的半定规划问题进行求解。仿真结果验证了所提方案的有效性和安全性。
  • HAIDER F, GAO X, YOU X H, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014.6736752.
    HU R Q and QIAN Y. An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems[J]. IEEE Communications Magazine, 2014, 52(5): 94-101. doi: 10.1109/MCOM.2014.6815898.
    SONG K, JI B, HUANG Y, et al. Performance analysis of antenna selection in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2015, 63(10): 2520-2532. doi: 10.1109/TSP.2015.2414904.
    宋康, 韦磊, 冀保峰, 等. 基于干扰消除的异构蜂窝网络中断分析[J]. 电子与信息学报, 2015, 38(2): 255-261. doi: 10.11999/JEIT150532.
    SONG Kang, WEI Lei, JI Baofeng, et al. Outage performance for heterogeneous cellular networks with interference cancellation[J]. Journal of Electronics Information Technology, 2015, 38(2): 255-261. doi: 10.11999/ JEIT150532.
    钟智豪, 罗文宇, 彭建华, 等. 多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J]. 中国科学: 信息科学, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    ZHONG Zhihao, LUO Wenyu, PENG Jianhua, et al. Secrecy performasnce analysis of cooperative transmisson and cooperative jamming in K-tier heterogeneous cellular networks[J]. Scientia Sinica Informations, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    SAMDANIS K, TALEB T, and SCHMID S. Traffic? offload? enhancements for eUTRANn[J]. IEEE Communications Surveys Tutorials, 2012, 14(3): 884-896. doi: 10.1109/SURV. 2011.072711.00168.
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j.1538- 7305. 1975.tb02040.x.
    GOEL S and NEGI R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, 2005, 3: 1501-1506. doi: 10.1109/ MILCOM.2005.1605889.
    PINTO P C, BARROS J, and WIN M Z. Secure communication in stochastic wireless networksPart II: Maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. doi: 10.1109/TIFS.2011. 2165947.
    PINTO P C, BARROS J, and WIN M Z. Wireless physical-layer security: The case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, 2009: 2442-2446. doi: 10.1109/ISIT.2009.5206050.
    雷维嘉, 左莉杰, 江雪, 等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
    LEI Weijia, ZUO Lijie, JIANG Xue, et al. Physical layer security resistant to multi-eavesdroppers with inaccurate channel state information in relay network[J]. Journal of Electronics Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579.
    L? T, GAO H, CAO R, et al. Coordinated secure beamforming in K-User interference channel with multiple eavesdroppers[J]. IEEE Wireless Communication Letters, 2016, 5(2): 212-215. doi: 10.1109/LWC.2016.2519905.
    NGUYEN Van-Dinh, DUONG Trung Q, DUONG Octavia A, et al. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2609-2623. doi: 10.1109/TIFS.2016.2594131.
    LUO Z Q, MA W K, SO A C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010. 936019.
    YANG S, LV T, and HANZO L. Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM[J]. IEEE Transactions on Vehicular Technology, 2013, 62(4): 1667-1677. doi: 10.1109/TVT.2012.2235190.
    CHARNES A and COOPER W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    BOYD S and VANDENBERGHE L. Convex Optimization[M]. Cambridge, U.K.: Cambridge University Press, 2004: 121-180.
    张立健, 金梁, 罗文宇. 多用户MISO干扰信道中的安全协同波束成形[J]. 通信学报, 2015, 36(11): 41-51. doi: 10.11959/ j.issn.1000-436x.2015198.
    ZHANG Lijian, JIN Liang, and LUO Wen-yu. Secure coordinated beamforming for multiuser MISO interference channels[J]. Journal on Communications, 2015, 36(11): 41-51. doi: 10.11959/j.issn.1000-436x.2015198.
    L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
    LOPEZ-PEREZ D, GUVENC I, DELAROCHE G, et al. Enhanced intercell interference coordination challenges in heterogeneous networks[J]. IEEE Wireless Communications, 2011, 18(3): 22-30. doi: 10.1109/MWC.2011.5876497.
    SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. doi: 10.1109/MWC. 2011.5751298.
    FAKOORIAN S A A and SWINDLEHURS A L T. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649. doi: 10.1109/TIFS.2011.2156788.
  • 加载中
计量
  • 文章访问数:  1167
  • HTML全文浏览量:  174
  • PDF下载量:  250
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-10-27
  • 修回日期:  2017-02-26
  • 刊出日期:  2017-07-19

目录

    /

    返回文章
    返回