|
- 2015
单发多收无线窃听信道中的自适应保密速率传输方案
|
Abstract:
针对无线通信中基于保密中断的物理层安全问题,提出了一种单发多收(SIMO)窃听信道下使用保密中断概率约束的自适应保密速率方案。利用信道估计与信道的衰落特性分别获得发射端到合法接收端信道(主信道)的信道状态信息(CSI)与发射端到窃听者信道(窃听信道)的统计CSI。在发射端已知主信道CSI而未知窃听信道CSI的情况下,根据主信道CSI和窃听信道CSI的概率密度函数对保密传输速率进行自适应调整,并根据保密中断的定义确定发射门限,然后在满足保密中断概率约束的条件下实现保密吞吐量的最大化。在准静态瑞利衰减信道条件下进行了仿真验证,结果表明:与以往的SISO系统方法相比,在保密中断概率低于0??1、合法接收端天线数不少于窃听端时,系统的保密吞吐量可提高1倍以上;即使合法接收端的天线数少于窃听端,只要合法接收端的天线数足够多,SIMO系统的保密吞吐量仍能优于SISO系统。
An adaptive secret transmission rate scheme with secret outage probability constraint in SIMO wireless wiretap channel is proposed to consider the physical layer security issue for the wireless communication with secrecy outage. The channel estimation and channel fading characteristics are used to obtain the channel state information (CSI) about the channel from the transmitter to the legitimate receiver (the main channel) and the CSI about the channel from the transmitter to the eavesdropper (the eavesdropper’s channel), respectively. When the CSI about the main channel is known while the CSI about the eavesdropper’s channel is not known by the transmitter, the secrecy rate is adjusted according to the CSI of the main channel and the probability density function of the eavesdropper’s channel, and the emission threshold is obtained according to the definition of secrecy outage. Then the secrecy throughput is maximized in the condition of satisfying the constraint of secrecy outage probability. The quasi??static Rayleigh fading channel is used in the simulation. Simulation results show that when secrecy outage probability is lower than 0??1 and the antenna number of the legitimate receivers is no less than that of eavesdropper, the secrecy throughput of the proposed approach is twice that of the previous methods for SISO system, and that as long as there are sufficient antennas in the legitimate receiver, the secrecy throughput of SIMO system is larger than that of SISO system even if the antenna number of the legitimate receivers is smaller than that of eavesdropper
[1] | [2]PAHAN A S K, LEE H W, HONG C S. Security in wireless sensor networks: issues and challenges [C]∥Proceedings of the 8th International Conference on Advanced Communication Technology. Piscataway, NJ, USA: IEEE, 2006: 1043??1048. |
[2] | [3]LEUNG??YAN??CHEONG S K, HELLMAN M E. The Gaussian wire??tap channel [J]. IEEE Transactions on Information Theory, 1978, 24(4): 451??456. |
[3] | [8]殷勤业, 贾曙乔, 左莎琳, 等. 分布式多天线跳空收发技术: I [J]. 西安交通大学学报, 2013, 47(1): 1??6. |
[4] | [12]BARROS J, RODRIGUES M. Secrecy capacity of wireless channels [C]∥Proceedings of 2006 IEEE International Symposium on Information Theory. Piscataway, NJ, USA: IEEE, 2006: 356??360. |
[5] | YIN Qinye, ZHANG Jianguo, ZHENG Tongxing, et al. A distributed multi??antenna space hopping transceiver technique: part II0/1 space hopping technique in backward training mode with weight??feedback [J]. Journal of Xi’an Jioatong University, 2013, 47(6): 1??5. |
[6] | [10]LIANG Yingbin, POOR H, SHAMAI S. Secure communication over fading channels [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2470??2492. |
[7] | [13]ZHOU Xiangyun, MCKAY M, MAHAM B, et al. Rethinking the secrecy outage formulation: a secure transmission design perspective [J]. IEEE Communi??cations Letters, 2011, 15(3): 302??304. |
[8] | [4]GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180??2189. |
[9] | [5]KHISTI A, WORNELL G. Secure transmission with multiple antennas: IThe MISOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(6): 3088??3104. |
[10] | [6]KHISTI A, WORNELL G. Secure transmission with multiple antennas: IIThe MIMOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515??5532. |
[11] | [7]OGGIER F, HASSIBI B. The secrecy capacity of the MIMO wiretap channel [J]. IEEE Transactions Information Theory, 2011, 57(8): 4961??4972. |
[12] | YIN Qinye, JIA Shuqiao, ZUO Shalin, et al. A distributed multi??antenna space hopping transceiver technique: I [J]. Journal of Xi’an Jioatong University, 2013, 47(1): 1??6. |
[13] | [9]殷勤业, 张建国, 郑通兴, 等. 分布式多天线跳空收发技术: II权值反馈型反向训练模式下的0/1跳空技术 [J]. 西安交通大学学报, 2013, 47(6): 1??5. |
[14] | [11]GOPALA P K, LAI Lifeng, GAMAL H E. On the secrecy capacity of fading channels [J]. IEEE Transactions on Information Theory, 2008,54(10): 4687??4698. |
[15] | [14]MU Pengcheng, YANG Peizhi, WANG Bo, et al. A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power [C]∥Proceedings of IEEE ICC2014 WS??WPLS. Piscataway, NJ, USA: IEEE, 2014: 777??782. |
[16] | [1]SHIN M, MA J, MISHRA A, et al. Wireless network security and interworking [J]. Proceedings of the IEEE, 2006, 94(2): 455??433. |