Advanced Search
Volume 40 Issue 1
Jan.  2018
Turn off MathJax
Article Contents
Lun TANG, Yu ZHOU, Youchao YANG, Guofan ZHAO, Qianbin CHEN. Virtual Network Function Dynamic Deployment Algorithm Based on Prediction for 5G Network Slicing[J]. Journal of Electronics & Information Technology, 2019, 41(9): 2071-2078. doi: 10.11999/JEIT180894
Citation: HUANG Kaizhi, WANG Bing, XU Xiaoming, KANG Xiaolei, ZHANG Bo. An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone[J]. Journal of Electronics & Information Technology, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478

An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone

doi: 10.11999/JEIT170478
Funds:

The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61701538, 61171108, 61471396)

  • Received Date: 2017-05-17
  • Rev Recd Date: 2017-08-23
  • Publish Date: 2018-01-19
  • The existing researches on Coordinated Multi-Point transmission (CoMP) secure transmission in heterogeneous cellular networks mainly focus on improving the quality of the main channel to enhance security. However, CoMP also makes the average distance between base station and eavesdropper close which makes the security threat more severe. Based on secrecy guard zone, an enhanced CoMP policy is proposed in this paper. Then, the connection outage probability, secrecy outage probability and secrecy throughput are analyzed. Furthermore, the transmission power and power allocation factor are designed very carefully to maximize the secrecy throughput. Simulation results show that compared with conventional CoMP policy, the proposed policy can not only achieve non-zero secrecy throughput when faced with severe security threats (i.e. for larger eavesdropper density), but also improve the secrecy throughput of 76.1% at most when faced with small security threats (i.e. for smaller eavesdropper density).
  • WANG C X, HAIDER F, GAO X Q, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014. 6736752.
    BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2013, 52(2): 74-80. doi: 10.1109/ MCOM.2014.6736746.
    YANG N, WANG L F, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20-27. doi: 10.1109/MCOM.2015.7081071.
    ZHONG Z H, PENG J H, LUO W Y, et al. A tractable approach to analyzing the physical-layer security in k-tier heterogeneous cellular networks[J]. China Communications, 2015, 12(s1): 166173. doi: 10.1109/CC.2015.7386165.
    L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
    钟智豪, 罗文宇, 彭建华. 多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J]. 中国科学: 信息科学, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    ZHONG Zhihao, LUO Wenyu, and PENG Jianhua. Secrecy performance analysis of cooperative transmission and cooperative jamming for multi-tier heterogeneous cellular networks[J]. Science China Information Sciences, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    WU H C, TAO X F, LI N, et al. Secrecy outage probability in multi-rat heterogeneous networks[J]. IEEE Communications Letters, 2016, 20(1): 53-56. doi: 10.1109/LCOMM.2015. 2499748.
    WANG H M, ZHENG T X, YUAN J H, et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016, 64(3): 1204-1219. doi: 10.1109/TCOMM.2016.2519402.
    QI X H, HUANG K Z, ZHONG Z H, et al. Physical layer security of multi-hop aided downlink MIMO heterogeneous cellular networks[J]. China Communications, 2016(S2): 120-130. doi: 10.1109/CC.2016.7833466.
    XU M, TAO X F, YANG F, et al. Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks[J]. IEEE Communications Letters, 2016, 20(11): 2272-2275. doi: 10.1109/LCOMM.2016.2598536.
    GONG S Q, XING C W, FEI Z S, et al. Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper[J]. China Communications, 2016, 13(3): 82-95. doi: 10.1109/CC.2016.7445504.
    XU M, TAO X F, YANG F, et al. On energy efficient design for dynamic CoMP transmission in k-tier heterogeneous cellular networks[J]. China Communications, 2016, 13(6): 147-153. doi: 10.1109/CC.2016.7513210.
    YUSUF M and ARSLAN H. Secure multi-user transmission using CoMP directional modulation[C]. IEEE Vehicular Technology Conference, Boston, USA, 2015: 1-2. doi: 10.1109 /VTCFall.2015.7391131.
    CHAE S H, WAN C, LEE J H, et al. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1617-1628. doi: 10.1109/ TIFS.2014.2341453.
    HEATH R W, KOUNTOURIS M, and BAI T Y. Modeling heterogeneous network interference using Poisson point processes[J]. IEEE Transactions on Signal Processing, 2012, 61(16): 4114-4126. doi: 10.1109/TSP.2013.2262679.
    ZHOU X Y, GANTI R K, ANDREWS J G, et al. On the throughput cost of physical layer security in decentralized wireless networks[J]. IEEE Transactions on Wireless Communications, 2011, 10(8): 2764-2775. doi: 10.1109/TWC. 2011.061511.102257.
    LIU W G, DING Z G, RATNARAJAH T, et al. On ergodic secrecy capacity of random wireless networks with protected zone[J]. IEEE Transactions on Vehicular Technology, 2016, 65(8): 1-5. doi: 10.1109/TVT.2015.2477315.
    XU X M, YANG W W, and CAI Y M. Secure transmission in the random CRNs with secrecy guard zone and artificial noise[J]. Iet Communications, 2016, 10(15): 1904-1913. doi: 10.1049/iet-com.2016.0117.
    XU X M, YANG W W, and CAI Y M. On the secure spectral-energy efficiency tradeoff in random cognitive radio networks[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(10): 2706-2722. doi: 10.1109/ JSAC.2016.2605901.
    MUKHERJEE A and SWINDLEHURST A L. Detecting passive eavesdroppers in the MIMO wiretap channel[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, Japan, 2012: 2809-2812. doi: 10.1109/ICASSP.2012.6288501.
    YANG N, YAN S H, YUAN J H, et al. Artificial noise: transmission optimization in multi-input single-output wiretap channels[J]. IEEE Transactions on Communications, 2015, 63(5): 1771-1783. doi: 10.1109/TCOMM.2015.2419634.
  • Cited by

    Periodical cited type(20)

    1. 蔡卫红,郭旭静,李聪. 基于NFV的5G核心网络切片研究. 长沙大学学报. 2023(02): 6-11 .
    2. 蔡卫红,仇益彩,文杰斌,吕宏悦. 基于NST规范的5G网络切片计费设计. 湖南邮电职业技术学院学报. 2023(02): 13-18 .
    3. 王颖,张龙龙. 基于5G技术的化工智能园区虚拟网络功能仿真实验研究. 粘接. 2023(07): 132-136 .
    4. 惠聪. 基于流量预测的5G通信网络资源分配方法. 信息技术. 2023(07): 71-76 .
    5. 陈功平,王红. 基于雾计算及RoF-DAS架构的物联网调度系统设计. 太原学院学报(自然科学版). 2022(01): 53-58 .
    6. 李岚. 基于神经网络反馈的移动通信平台动态负载均衡算法. 大庆师范学院学报. 2022(03): 102-108 .
    7. 兰巨龙,朱棣,李丹. 面向多模态网络业务切片的虚拟网络功能资源容量智能预测方法. 通信学报. 2022(06): 143-155 .
    8. 刘春林,秦进. 面向5G网络的移动边缘计算节点部署算法设计. 计算机仿真. 2022(12): 436-439+473 .
    9. 唐伦,贺兰钦,谭颀,陈前斌. 基于深度确定性策略梯度的虚拟网络功能迁移优化算法. 电子与信息学报. 2021(02): 404-411 . 本站查看
    10. 袁泉,游伟,季新生,汤红波. 虚拟网络功能资源容量自适应调整方法. 电子与信息学报. 2021(07): 1841-1848 . 本站查看
    11. 武静雯,江凌云,刘祥军. 基于特征选择的VNF资源需求预测方法. 计算机应用研究. 2021(10): 3131-3136+3142 .
    12. 高志华,王居正,樊旻,张凌云,李国良. 基于5G网络切片在线映射算法的电力通信远程视频指挥系统设计. 内蒙古电力技术. 2021(05): 80-83 .
    13. 李锦煊,王维. 基于智能电网的5G网络切片资源优化分配模型构建及仿真. 自动化与仪器仪表. 2021(11): 36-39+44 .
    14. 黄宏程,鲍晓萌,胡敏. 边缘网络中一种VNF需求预测方法. 电讯技术. 2021(12): 1476-1483 .
    15. 纪浩,虞颖映,糜蒙. 面向健康老龄化的“5G+智慧养老”服务生态体系设计研究. 医学信息学杂志. 2021(11): 87-93 .
    16. 郭胜,孙立. SDN与NFV技术在延时敏感业务场景中的应用. 电子技术与软件工程. 2020(03): 16-18 .
    17. 陈云杰,游伟. 5G移动通信中基于安全信任的网络切片部署策略研究. 通信技术. 2020(09): 2206-2209 .
    18. 金涛伟. 共享移动互联空间离线网络短链接稳定性检测. 计算机仿真. 2020(09): 184-188 .
    19. 徐瑨,吴慧慈,陶小峰. 5G网络空间安全对抗博弈. 电子与信息学报. 2020(10): 2319-2329 . 本站查看
    20. 孙士清,彭建华,游伟,李英乐. 基于在线实例配置的服务功能链部署方法. 计算机工程. 2019(12): 71-78 .

    Other cited types(18)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1135) PDF downloads(211) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return