高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于安全保护域的增强型多点协作传输机制

黄开枝 王兵 许晓明 康小磊 张波

黄开枝, 王兵, 许晓明, 康小磊, 张波. 基于安全保护域的增强型多点协作传输机制[J]. 电子与信息学报, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478
引用本文: 黄开枝, 王兵, 许晓明, 康小磊, 张波. 基于安全保护域的增强型多点协作传输机制[J]. 电子与信息学报, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478
HUANG Kaizhi, WANG Bing, XU Xiaoming, KANG Xiaolei, ZHANG Bo. An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone[J]. Journal of Electronics & Information Technology, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478
Citation: HUANG Kaizhi, WANG Bing, XU Xiaoming, KANG Xiaolei, ZHANG Bo. An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone[J]. Journal of Electronics & Information Technology, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478

基于安全保护域的增强型多点协作传输机制

doi: 10.11999/JEIT170478
基金项目: 

河南省科技攻关计划(152102210013),国家 863 计划项目(2015AA01A708),国家自然科学基金(61701538, 61171108, 61471396)

An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone

Funds: 

The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61701538, 61171108, 61471396)

  • 摘要: 现有针对异构蜂窝网多点协作安全传输的研究集中于增强主信道质量以提升安全性,然而多基站协作又使基站和窃听者之间的平均距离变近,网络的安全性受限于距离协作基站较近的窃听者。针对该问题,该文提出一种基于安全保护域的增强型多点协作传输机制。然后,理论分析了用户的连接中断概率、安全中断概率以及安全吞吐量。进一步,以最大化安全吞吐量为目标,优化协作微基站的发射功率以及有用信息功率分配比例系数。仿真结果表明,相比于传统的多点协作安全传输机制,在存在严重安全威胁(窃听者密度较大)的场景下,所提机制可以实现非零系统安全吞吐量;在存在较小安全威胁(窃听者密度较小)的场景下,系统安全吞吐量最大可提升76.1%。
  • WANG C X, HAIDER F, GAO X Q, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014. 6736752.
    BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2013, 52(2): 74-80. doi: 10.1109/ MCOM.2014.6736746.
    YANG N, WANG L F, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20-27. doi: 10.1109/MCOM.2015.7081071.
    ZHONG Z H, PENG J H, LUO W Y, et al. A tractable approach to analyzing the physical-layer security in k-tier heterogeneous cellular networks[J]. China Communications, 2015, 12(s1): 166173. doi: 10.1109/CC.2015.7386165.
    L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
    钟智豪, 罗文宇, 彭建华. 多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J]. 中国科学: 信息科学, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    ZHONG Zhihao, LUO Wenyu, and PENG Jianhua. Secrecy performance analysis of cooperative transmission and cooperative jamming for multi-tier heterogeneous cellular networks[J]. Science China Information Sciences, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    WU H C, TAO X F, LI N, et al. Secrecy outage probability in multi-rat heterogeneous networks[J]. IEEE Communications Letters, 2016, 20(1): 53-56. doi: 10.1109/LCOMM.2015. 2499748.
    WANG H M, ZHENG T X, YUAN J H, et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016, 64(3): 1204-1219. doi: 10.1109/TCOMM.2016.2519402.
    QI X H, HUANG K Z, ZHONG Z H, et al. Physical layer security of multi-hop aided downlink MIMO heterogeneous cellular networks[J]. China Communications, 2016(S2): 120-130. doi: 10.1109/CC.2016.7833466.
    XU M, TAO X F, YANG F, et al. Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks[J]. IEEE Communications Letters, 2016, 20(11): 2272-2275. doi: 10.1109/LCOMM.2016.2598536.
    GONG S Q, XING C W, FEI Z S, et al. Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper[J]. China Communications, 2016, 13(3): 82-95. doi: 10.1109/CC.2016.7445504.
    XU M, TAO X F, YANG F, et al. On energy efficient design for dynamic CoMP transmission in k-tier heterogeneous cellular networks[J]. China Communications, 2016, 13(6): 147-153. doi: 10.1109/CC.2016.7513210.
    YUSUF M and ARSLAN H. Secure multi-user transmission using CoMP directional modulation[C]. IEEE Vehicular Technology Conference, Boston, USA, 2015: 1-2. doi: 10.1109 /VTCFall.2015.7391131.
    CHAE S H, WAN C, LEE J H, et al. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1617-1628. doi: 10.1109/ TIFS.2014.2341453.
    HEATH R W, KOUNTOURIS M, and BAI T Y. Modeling heterogeneous network interference using Poisson point processes[J]. IEEE Transactions on Signal Processing, 2012, 61(16): 4114-4126. doi: 10.1109/TSP.2013.2262679.
    ZHOU X Y, GANTI R K, ANDREWS J G, et al. On the throughput cost of physical layer security in decentralized wireless networks[J]. IEEE Transactions on Wireless Communications, 2011, 10(8): 2764-2775. doi: 10.1109/TWC. 2011.061511.102257.
    LIU W G, DING Z G, RATNARAJAH T, et al. On ergodic secrecy capacity of random wireless networks with protected zone[J]. IEEE Transactions on Vehicular Technology, 2016, 65(8): 1-5. doi: 10.1109/TVT.2015.2477315.
    XU X M, YANG W W, and CAI Y M. Secure transmission in the random CRNs with secrecy guard zone and artificial noise[J]. Iet Communications, 2016, 10(15): 1904-1913. doi: 10.1049/iet-com.2016.0117.
    XU X M, YANG W W, and CAI Y M. On the secure spectral-energy efficiency tradeoff in random cognitive radio networks[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(10): 2706-2722. doi: 10.1109/ JSAC.2016.2605901.
    MUKHERJEE A and SWINDLEHURST A L. Detecting passive eavesdroppers in the MIMO wiretap channel[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, Japan, 2012: 2809-2812. doi: 10.1109/ICASSP.2012.6288501.
    YANG N, YAN S H, YUAN J H, et al. Artificial noise: transmission optimization in multi-input single-output wiretap channels[J]. IEEE Transactions on Communications, 2015, 63(5): 1771-1783. doi: 10.1109/TCOMM.2015.2419634.
  • 加载中
计量
  • 文章访问数:  1106
  • HTML全文浏览量:  146
  • PDF下载量:  211
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-05-17
  • 修回日期:  2017-08-23
  • 刊出日期:  2018-01-19

目录

    /

    返回文章
    返回