Advanced Search
Volume 39 Issue 2
Feb.  2017
Turn off MathJax
Article Contents
LIU Miao, XIA Yuhong, ZHAO Haitao, GUO Liang, SHI Zheng, ZHU Hongbo. Federated Learning Technologies for 6G Industrial Internet of Things: From Requirements, Vision to Challenges, Opportunities[J]. Journal of Electronics & Information Technology, 2024, 46(12): 4335-4353. doi: 10.11999/JEIT240574
Citation: WANG Shu, DA Xinyu. Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information[J]. Journal of Electronics & Information Technology, 2017, 39(2): 342-350. doi: 10.11999/JEIT160429

Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information

doi: 10.11999/JEIT160429
Funds:

The National Natural Science Foundation of China (61271250, 61571460)

  • Received Date: 2016-04-29
  • Rev Recd Date: 2016-09-23
  • Publish Date: 2017-02-19
  • Considering a general eavesdropping case where the eavesdropper is equipped with multiple antennas and two uncertainty models for the imperfect Channel State Information (CSI) on the main and eavesdroppers channels at the transmitter. Two robust transmission methods are proposed for multiuser Multiple-In, Single-Out, Multiple-antenna Eavesdropper (MISOME) systems to provide SINR guarantee for the legitimate user by the optimization of beamforming and artificial noise covariance matrix. For the deterministic uncertainty model, the Worst-Case Secrecy Rate Maximization (WC-SRM) problem is derived an equivalent problem of the WC-SRM problem through analysis. The equivalent problem can be recast as a single-variable optimization problem, which can be handled by solving a sequence of convex SemiDefinite Programs (SDPs). For the stochastic uncertainty model, a suboptimal scheme to solve the Outage Probability constrained Secrecy Rate Maximization (OP-SRM) problem is proposed based on the robust design for the WC-SRM problem. Finally, the effectiveness and the robustness of the proposed algorithms are validated by the simulation results.
  • ZHANG Xi, MCKAY M R , ZHOU Xiangyun, et al. Artificial-noise-aided secure multi-antenna transmission with limited feedback[J]. IEEE Transactions on Wireless Communications, 2015, 14(5): 2742-2754. doi: 10.1109/TWC. 2015.2391261.
    LI Na, TAO Xiaofeng, and XU Jin. Artificial noise assisted communication in the multiuser downlink: optimal power allocation[J]. IEEE Wireless Communations Letters, 2015, 19(2): 295-298. doi: 10.1109/LCOMM.2014.2385779.
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j. 1538-7305.1975.tb02040.x.
    CSISZAR I and KOMER J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348. doi: 10.1109/TIT.1978. 1055892.
    GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189. doi: 10.1109/TWC.2008.060848.
    WANG Huiming, ZHENG Tongxin, and XIA Xianggen. Secure MISO wiretap channels with multiantenna passive eavesdropper artificial noise vs. artificial fast fading[J]. IEEE Transactions on Wireless Communications, 2015, 14(1): 94-106. doi: 10.1109/TWC.2014.2332164.
    LIU Shuiyin, HONG Yi, and VITERBO Emanuele. Guaranteeing positive secrecy capacity for MIMOME wiretap channels with finite-rate feedback using artificial noise[J]. IEEE Transactions on Wireless Communications, 2015, 14(8): 4193-4203. doi: 10.1109/ TWC.2015.2417886.
    TANG Yanqun, XIONG Jun, MA Dongtang, et al. Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty[J]. IEEE Communications Letters, 2013, 17(11): 2096-2099. doi: 10.1109/LCOMM.2013. 100713.131673.
    LI Qiang and MA Wingkin. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717. doi: 10.1109/TSP.2013. 2253771.
    JIANG Lei, ZHU Han, Marangeles Vazquez-Castro, et al. Secure satellite communication systems design with individual secrecy rate constraints[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 661671. doi: 10.1109/TIFS.2011.2148716.
    GAN Zheng, ATHANASIOS D, and OTTERSTEN Bjorn. Physical layer security in multibeam satellite systems[J]. IEEE Transactions on Wireless Communications, 2012, 11(2): 852863. doi: 10.1109/TWC.2011.120911.111460.
    DESTOUNIS A and ATHANASIOS D. Dynamic power allocation for broadband multi-beam satellite communication networks[J]. IEEE Communications Letters, 2011, 15(4): 380382. doi: 10.1109/LCOMM.2011.020111.102201.
    赵家杰, 彭建华, 黄开枝, 等. 基于人工噪声的多用户 MIMO 系统加密算法[J]. 电子与信息学报, 2012, 34(8): 19391943. doi: 10.3724/SP.J.1146.2011.01068.
    ZHAO Jiajie, PENG Jianhua, HUANG Kaizhi, et al. A multi- user MIMO system encryption algorithm based on artificial noise[J]. Journal of Electronics Information Technology, 2012, 34(8): 19391943. doi: 10.3724/SP.J.1146.2011.01068.
    ZHU Jun, SCHOBER Robert, and BHARGAVA V K. Linear precoding of data and artificial noise in secure massive MIMO systems[J]. IEEE Transactions on Wireless Communications, 2016, 15(3): 22452261. doi: 10.1109/TWC.2015.2500578.
    LI Qiang, MA Wingkin, and SO Anthony Mancho. A safe approximation approach to secrecy outage design for MIMO wiretap channels[J]. IEEE Signal Processing Letters, 2014, 21(1): 118-121. doi: 10.1109/LSP.2013.2293884.
    LI Qiang and MA Wingkin. Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming[J]. IEEE Transactions on Signal Processing, 2011, 59(8): 3799-3812. doi: 10.1109/TSP.2011.2146775.
    LUO Zhiquan, MA Wingkin, SO Anthony Mancho, et al. Semidefinite relaxation of quadratic optimization problems [J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010.936019.
    DATTORRO J. Convex Optimization and Euclidean Distance Geometry[M]. Meboo Publishing USA, 2005: 404-410.
    LUO Zhiquan, STURM F, and ZHANG Shuzhong. Multivariate nonnegative quadratic mappings[J]. SIAM Journal on Control and Optimization, 2004, 14(4): 1140-1162. doi: 10.2139/ssrn.545582.
    KOLDA T, LEWIS R, and TORCZON V. Optimization by direct search: new perspectives on some classical and modern methods[J]. SIAM Review, 2003, 45(3): 385-482. doi: 10.1137 /S003614450242889.
    XIONG Jun, MA Dongtang, WONG Kaikit, et al. Robust masked beamforming for MISO cognitive radio networks with unknown eavesdroppers[J]. IEEE Transactions on Vehicular Technology, 2016, 65(2): 744-755. doi: 10.1109/TVT.2015. 2400452.
  • Cited by

    Periodical cited type(5)

    1. 王昊,宋骊平. AP聚类和特征划分融合的群结构模型及跟踪算法. 兵器装备工程学报. 2025(02): 228-235 .
    2. 林立鑫,杨真. 隐私信息泄露属性深度跟踪方法仿真. 计算机仿真. 2023(01): 428-432 .
    3. 申屠晗,李凯斌,荣英佼,李彦欣,郭云飞. 一种多传感器自适应量测迭代更新GM-PHD跟踪算法. 电子与信息学报. 2022(12): 4168-4177 . 本站查看
    4. 姜琦,王锐,周超,张天然,胡程. 基于代数图论的修正贝叶斯群目标航迹起始算法. 电子与信息学报. 2021(03): 531-538 . 本站查看
    5. 陈华杰,白浩然. 基于子空间投影的复杂水下环境运动小目标检测前跟踪方法. 电子与信息学报. 2021(03): 826-833 . 本站查看

    Other cited types(1)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1329) PDF downloads(443) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return