Advanced Search
Volume 38 Issue 11
Dec.  2016
Turn off MathJax
Article Contents
LEI Weijia, LIN Xiuzhen, YANG Xiaoyan, XIE Xianzhong. Physical Layer Security Scheme Exploiting Artificial Noise to Improve the Performance of Legitimate User[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2887-2892. doi: 10.11999/JEIT160054
Citation: LEI Weijia, LIN Xiuzhen, YANG Xiaoyan, XIE Xianzhong. Physical Layer Security Scheme Exploiting Artificial Noise to Improve the Performance of Legitimate User[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2887-2892. doi: 10.11999/JEIT160054

Physical Layer Security Scheme Exploiting Artificial Noise to Improve the Performance of Legitimate User

doi: 10.11999/JEIT160054
Funds:

The National Natural Science Foundation of China (61471076, 61301123), The Chongqing Research Program of Basic Research and Frontier Technology (cstc2015jcyjA40047), The Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), The Special Fund of Chongqing Key Laboratory (CSTC)

  • Received Date: 2016-01-13
  • Rev Recd Date: 2016-05-12
  • Publish Date: 2016-11-19
  • A physical layer security scheme is studied, which employs the advantage of artificial noise to improve the performance of legitimate user for multiple antenna systems using beamforming technology and artificial noise. Based on the transmitted symbols and channel coefficients, the sender determines whether or not the artificial noises are beneficial to the signal detection at the legitimate receiver. Then, beamforming vectors are designed accordingly. By taking advantage of useful noise, the signal to noise ratio at the legitimate receiver is improved effectively while that at the illegal receiver will remain the same. The bit error rate and the secrecy capacity are analyzed and simulated. The results demonstrate that the proposed scheme can improve the performance of the legal receiver and enhance secrecy capacity.
  • loading
  • SHANNON C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-710. doi: 10.1002/j.1538-7305.1949.tb00928.x.
    HONG W Y P, LAN P C, and KUO C C J. Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches[J]. IEEE Signal Processing Magazine, 2013, 30(5): 29-40. doi: 10.1109/ MSP.2013.2256953.
    CHEN X, ZHONG C, YUEN C, et al. Multi-antenna relay aided wireless physical layer security[J]. IEEE Communications Magazine, 2015, 53(12): 40-46. doi: 10.1109/MCOM.2015.7355564.
    CHEN X and LEI L. Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee[J]. IEEE Communications Letters, 2013, 17(4): 637-640. doi: 10.1109/LCOMM.2013.022713.130029.
    MA H and MA P. Beamforming design of decode-and- forward cooperation for improving wireless physical layer security[C]. 2013 15th International Conference on Advanced Communication Technology (ICACT), PyeongChang, 2013: 41-49.
    NEGI R and GOEL S. Secret communication using artificial noise[C]. IEEE Vehicular Technology Conference (VTC-2005-Fall), Dallas, USA, 2005: 1906-1910. doi: 10.1109/VETECF.2005.1558439
    CHAE S H, CHOI W, LEE J H, et al. Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1617-1627. doi: 10.1109/TIFS.2014.2341453.
    GREBRACHT S, WOLF A, and JORSWIECK E A. Beamforming for fading wiretap channels with partial channel information[C]. International Workshop on Smart Antennas, Bremen, Germany, 2010: 394-401. doi: 10.1109/ WSA.2010.5456398.
    HUANG J and SWINDLEHURST A L. Robust secure transmission in MISO channels based on worst-case optimization[J]. IEEE Transactions on Signal Processing, 2012, 60(4): 1696-1707. doi: 10.1109/TSP.2011.2182344.
    GREBRACHT S, SCHEUNERT C, and JORSWIECK E A. Secrecy outage in MISO systems with partial channel information[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 704-716. doi: 10.1109/TIFS. 2011.2181946.
    HU F, GAO F, ZHANG T, et al. Physical-layer security for full-duplex communications with self-interference mitigation[J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 329-340. doi: 10.1109/TWC. 2015.2472527.
    YANG Y, SUN C, ZHAO H, et al. Algorithms for secrecy guarantee with null space beamforming in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2014, 62(8): 2111-2126. doi: 10.1109/TSP.2014.2303942.
    ZHANG X, ZHOU X, MCKAY M R, et al. Arti cial-noise-aided secure multi-antenna transmission with limited feedback[J]. IEEE Transactions on Wireless Communications, 2015, 14(5): 2742-2754. doi: 10.1109/ ICASSP.2014.6854346.
    SIMON M K and ALOUIION M S. Digital Communication over Fading Channels[M]. New York: John Wiley Sons, Inc., 2000: 265-267.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1982) PDF downloads(582) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return