Advanced Search
Volume 39 Issue 2
Feb.  2017
Turn off MathJax
Article Contents
WANG Shu, DA Xinyu. Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information[J]. Journal of Electronics & Information Technology, 2017, 39(2): 342-350. doi: 10.11999/JEIT160429
Citation: WANG Shu, DA Xinyu. Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information[J]. Journal of Electronics & Information Technology, 2017, 39(2): 342-350. doi: 10.11999/JEIT160429

Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information

doi: 10.11999/JEIT160429
Funds:

The National Natural Science Foundation of China (61271250, 61571460)

  • Received Date: 2016-04-29
  • Rev Recd Date: 2016-09-23
  • Publish Date: 2017-02-19
  • Considering a general eavesdropping case where the eavesdropper is equipped with multiple antennas and two uncertainty models for the imperfect Channel State Information (CSI) on the main and eavesdroppers channels at the transmitter. Two robust transmission methods are proposed for multiuser Multiple-In, Single-Out, Multiple-antenna Eavesdropper (MISOME) systems to provide SINR guarantee for the legitimate user by the optimization of beamforming and artificial noise covariance matrix. For the deterministic uncertainty model, the Worst-Case Secrecy Rate Maximization (WC-SRM) problem is derived an equivalent problem of the WC-SRM problem through analysis. The equivalent problem can be recast as a single-variable optimization problem, which can be handled by solving a sequence of convex SemiDefinite Programs (SDPs). For the stochastic uncertainty model, a suboptimal scheme to solve the Outage Probability constrained Secrecy Rate Maximization (OP-SRM) problem is proposed based on the robust design for the WC-SRM problem. Finally, the effectiveness and the robustness of the proposed algorithms are validated by the simulation results.
  • loading
  • ZHANG Xi, MCKAY M R , ZHOU Xiangyun, et al. Artificial-noise-aided secure multi-antenna transmission with limited feedback[J]. IEEE Transactions on Wireless Communications, 2015, 14(5): 2742-2754. doi: 10.1109/TWC. 2015.2391261.
    LI Na, TAO Xiaofeng, and XU Jin. Artificial noise assisted communication in the multiuser downlink: optimal power allocation[J]. IEEE Wireless Communations Letters, 2015, 19(2): 295-298. doi: 10.1109/LCOMM.2014.2385779.
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j. 1538-7305.1975.tb02040.x.
    CSISZAR I and KOMER J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348. doi: 10.1109/TIT.1978. 1055892.
    GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189. doi: 10.1109/TWC.2008.060848.
    WANG Huiming, ZHENG Tongxin, and XIA Xianggen. Secure MISO wiretap channels with multiantenna passive eavesdropper artificial noise vs. artificial fast fading[J]. IEEE Transactions on Wireless Communications, 2015, 14(1): 94-106. doi: 10.1109/TWC.2014.2332164.
    LIU Shuiyin, HONG Yi, and VITERBO Emanuele. Guaranteeing positive secrecy capacity for MIMOME wiretap channels with finite-rate feedback using artificial noise[J]. IEEE Transactions on Wireless Communications, 2015, 14(8): 4193-4203. doi: 10.1109/ TWC.2015.2417886.
    TANG Yanqun, XIONG Jun, MA Dongtang, et al. Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty[J]. IEEE Communications Letters, 2013, 17(11): 2096-2099. doi: 10.1109/LCOMM.2013. 100713.131673.
    LI Qiang and MA Wingkin. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717. doi: 10.1109/TSP.2013. 2253771.
    JIANG Lei, ZHU Han, Marangeles Vazquez-Castro, et al. Secure satellite communication systems design with individual secrecy rate constraints[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 661671. doi: 10.1109/TIFS.2011.2148716.
    GAN Zheng, ATHANASIOS D, and OTTERSTEN Bjorn. Physical layer security in multibeam satellite systems[J]. IEEE Transactions on Wireless Communications, 2012, 11(2): 852863. doi: 10.1109/TWC.2011.120911.111460.
    DESTOUNIS A and ATHANASIOS D. Dynamic power allocation for broadband multi-beam satellite communication networks[J]. IEEE Communications Letters, 2011, 15(4): 380382. doi: 10.1109/LCOMM.2011.020111.102201.
    赵家杰, 彭建华, 黄开枝, 等. 基于人工噪声的多用户 MIMO 系统加密算法[J]. 电子与信息学报, 2012, 34(8): 19391943. doi: 10.3724/SP.J.1146.2011.01068.
    ZHAO Jiajie, PENG Jianhua, HUANG Kaizhi, et al. A multi- user MIMO system encryption algorithm based on artificial noise[J]. Journal of Electronics Information Technology, 2012, 34(8): 19391943. doi: 10.3724/SP.J.1146.2011.01068.
    ZHU Jun, SCHOBER Robert, and BHARGAVA V K. Linear precoding of data and artificial noise in secure massive MIMO systems[J]. IEEE Transactions on Wireless Communications, 2016, 15(3): 22452261. doi: 10.1109/TWC.2015.2500578.
    LI Qiang, MA Wingkin, and SO Anthony Mancho. A safe approximation approach to secrecy outage design for MIMO wiretap channels[J]. IEEE Signal Processing Letters, 2014, 21(1): 118-121. doi: 10.1109/LSP.2013.2293884.
    LI Qiang and MA Wingkin. Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming[J]. IEEE Transactions on Signal Processing, 2011, 59(8): 3799-3812. doi: 10.1109/TSP.2011.2146775.
    LUO Zhiquan, MA Wingkin, SO Anthony Mancho, et al. Semidefinite relaxation of quadratic optimization problems [J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010.936019.
    DATTORRO J. Convex Optimization and Euclidean Distance Geometry[M]. Meboo Publishing USA, 2005: 404-410.
    LUO Zhiquan, STURM F, and ZHANG Shuzhong. Multivariate nonnegative quadratic mappings[J]. SIAM Journal on Control and Optimization, 2004, 14(4): 1140-1162. doi: 10.2139/ssrn.545582.
    KOLDA T, LEWIS R, and TORCZON V. Optimization by direct search: new perspectives on some classical and modern methods[J]. SIAM Review, 2003, 45(3): 385-482. doi: 10.1137 /S003614450242889.
    XIONG Jun, MA Dongtang, WONG Kaikit, et al. Robust masked beamforming for MISO cognitive radio networks with unknown eavesdroppers[J]. IEEE Transactions on Vehicular Technology, 2016, 65(2): 744-755. doi: 10.1109/TVT.2015. 2400452.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1298) PDF downloads(442) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return