全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2014 

基于双变量泊松点过程的无线AdHoc网络的保密广播传输容量分析

DOI: 10.3969/j.issn.0372-2112.2014.09.028, PP. 1847-1851

Keywords: 无线adhoc网络,保密广播传输容量,双变量泊松点过程,保密速率

Full-Text   Cite this paper   Add to My Lib

Abstract:

本论文利用双变量泊松点过程对无线adhoc广播网络和非法窃听网络共存的网络场景进行建模,运用随机几何工具,研究了无线adhoc网络的保密广播传输容量,其定义为未发生窃听中断的广播发送节点密度、广播发送节点的相邻接收节点数量的平均值与保密速率的乘积.针对一般衰落和瑞利衰落信道条件,论文推导了造成保密中断的相邻窃听节点数量的平均值和保密广播传输容量的表达式.分析结果表明,与不存在相关性的网络场景相比,广播网络和窃听网络间的相关性会带来的保密广播传输容量的损失.

References

[1]  A Khisti, A Tchamkerten, G W Wornell.Secure broadcasting over fading channels[J].IEEE Transactions on Information Theory, 2008, 54(6):2453-2469.
[2]  X Zhou, R K Ganti, J G Andrews, et al.On the throughput cost of physical layer security in decentralized wireless networks[J].IEEE Transactions on Wireless Communications, 2011, 10(8):2764-2775.[LL]
[3]  W C Ao, K C Chen.Broadcast transmission capacity of heterogeneous wireless ad hoc networks with secrecy outage constraints[A].IEEE Proceeding of Globecom Conference[C].USA:IEEE Press, 2011.1-5.
[4]  J E Paloheimo.A spatial bivariate Poisson distribution[J].Biometrika, 1972, 59(2):489-492.
[5]  A Babaei, B Jabbari.Distance distribution of bivariate Poisson network nodes[J].IEEE Communication Letters, 2010, 14(9):845-850.
[6]  P C Pinto, J Barros, M Z Win.Wireless physical-layer security:The case of colluding eavesdroppers[A].IEEE Proceedings of International Symposium on Information Theory[C].USA:IEEE Press, 2009.2442-2446.
[7]  Y Liang, H V Poor, L Ying.Secrecy throughput of MANETs with malicious nodes[A].IEEE Proceedings of International Symposium on Information Theory[C].USA:IEEE Press, 2009.1189-1193.
[8]  J Kingman.Poisson Processes[M].Oxford:UK:Oxford University Press, 1993.
[9]  C E Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal, 1949, 28(4):656-715.
[10]  Y Liang, H V Poor, S Shamai.Information theoretic security[J].Foundations and Trends Communication Information Theory, 2009, 5(4):355-580.
[11]  A Wyner.The wire-tap channel[J].Bell System Technical Journal, 1975, 54(8):1355-1387.
[12]  P K Gopala, L Lai, H E Gamal.On the secrecy capacity of fading channels[J].IEEE Transactions on Information Theory, 2008, 54(10):4687-4698.
[13]  王育民.Shannon信息保密理论的新进展[J].电子学报, 1998, 26(7):27-34. Y M Wang.Developments in Shannon''s theory of information secrecy[J].Acta Electronica Sinica, 1998, 26(7):27-34.(in Chinese)
[14]  A Khisti, G W Wornell.Secure transmission with multiple antennas I:The MISOME wiretap channel[J].IEEE Transactions on Information Theory, 2010, 56(7):3088-3104.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133