全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

部分信道状态信息下抗窃听协作中继传输方案

, PP. 1658-1664

Keywords: 通信技术,物理层安全,中继波束赋形,协作干扰,抗窃听,人工噪声

Full-Text   Cite this paper   Add to My Lib

Abstract:

给出一种在缺少窃听节点信道信息、存在直接链路的情况下基于放大转发的中继波束赋形加人工噪声的传输方案。基于凸优化理论,对中继的波束赋形权值进行了优化,优化结果是唯一的和全局性的。仿真结果表明:利用此方案能够有效地防止窃听节点窃听,减少信息泄露,从而提高安全传输速率。

References

[1]  Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28: 656-715.
[2]  Leung-Yan-Cheong S K, Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24: 451-456.
[3]  Csiszár I, Körner J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24: 339-348.
[4]  Chiurtu N, Rimoldi B, Telatar I E. On the capacity of multi-antenna Gaussian channels[C]∥IEEE International Symposium on Information Theory,Washington,2001.
[5]  Sendonaris A, Erkip E, Aazhang B. User cooperation diversity part I: system description and part II: implementation aspects and performance analysis[J]. IEEE Transactions on Communication, 2003, 51(11): 1927-1948.
[6]  Laneman J N, Tse D N C, Wornell G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080.
[7]  Praveen K G, Lai L F, Gamal E L H. On the secrecy capacity of fading channels[J]. IEEE Transactions on Information Theory, 2008, 54(10): 4687-4698.
[8]  Li J Y, Petropulu A P, Weber S. On cooperative relaying schemes for wireless physical layer security[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4985-4997.
[9]  Lun D, Zhu H, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.
[10]  Ye Y, Li Q, Wing-Kin M, et al. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
[11]  Liang Y B, Gerhard K, Vincent H, et al. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2007.
[12]  Boyd S, Vandenberghe L. Convex Optimization[M]. Cambridge, UK: Cambridge University Press, 2004.
[13]  Sturm J F. Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones[J]. Optimization Methods and Software, 1999, 11(1-4): 625-653.
[14]  Zhang J W, Gursoy M C. Collaborative relay beamforming for secrecy[C]∥Preceding of IEEE International Conference on Communications, 2010.
[15]  Huang J, Swindlehurst A L. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
[16]  Wang H M, Yin Q Y, Xia X G. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133