期刊文献+

基于协作波束形成的中继阻塞混合无线物理层安全传输 被引量:9

Hybrid relaying and jamming for wireless physical layer security based on cooperative beamforming
原文传递
导出
摘要 针对双向无线协作通信系统的安全传输(信息论安全)问题,提出一种基于多节点协作波束形成的中继与阻塞混合机制来提高物理层信息传输的安全性.其基本思想是:在协作传输阶段,系统中的一部分协作节点进行分布式波束形成来帮助发送方发送信息给合法用户,同时另一部分协作节点发送干扰信号阻塞窃听者的侦听,从而显著改善系统在协作广播阶段的安全性能.基于这一机制,针对窃听者的瞬时信道状态信息已知与否,本文提出两种不同的协作波束形成方法和优化方案,这两种方案在数学上均归结为解决一个或一系列的二阶凸锥规划问题,从而可以通过内点法有效地求解.仿真结果和对比实验验证了在中继节点数目较多时本文提出的混合安全机制和波束形成方法相对于单纯的协作中继机制或单纯的协作阻塞机制而言显著地提高了系统的物理层安全性能. To improve the information-theoretic security of two-way wireless cooperative communication sys- tems, we propose in this study a hybrid relaying and jamming mechanism based on multi-node cooperative beamforming to enhance the security of the physical layer transmission of information. The basic concept is that in the cooperative transmission phase, some intermediate nodes adopt distributed beamforming to help the transmitter send messages to legitimate users and simultaneously others jam the eavesdropper, which can significantly improve the security performance of the system in the broadcast phase. Two different cooperative beamforming schemes are proposed with and without the instantaneous channel state information (CSI) of the eavesdropper. We show that optimizing both the schemes requires the mathematical solving of one or a series of second-order convex cone programming (SOCP) problems, which can be executed by efficiently using the interior point method. Simulation and comparisons show that our proposed hybrid relaying, jamming mechanism and beamforming approaches significantly increase the security sum rate of the two source terminals and outperform both the relays-only and jammers-only mechanisms when the number of intermediate nodes is relatively large.
出处 《中国科学:信息科学》 CSCD 2013年第4期445-458,共14页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61071125 61102081 61172092 60921003) 教育部博士点基金(批准号:20110201120013) 陕西省自然科学基础研究计划(批准号:2011JQ8022) 中央高校基本科研业务费(批准号:2011jdhz06)资助项目
关键词 双向协作网络 无线通信 物理层安全 协作波束形成 人工噪声 安全速率 凸优化 two-way cooperative network, wireless communication, physical layer security, cooperative beam-forming, artificial noise, security rate, convex optimization
  • 相关文献

参考文献28

  • 1Xiao S, Gong W B, Towsley D. Secure wireless communication with dynamic secrets. In: Proceedings of INFOCOM, San Diego, 2010. 1-9.
  • 2Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath. In: IEEE International Conference on Speech and Signal Processing, Las Vegas, 2008. 3013-3016.
  • 3Parada P, Blahut R. Secrecy capacity of SIMO and slow fading channels. In: Proc IEEE Int Symp Inf Theory, Adelaide,2005. 2152-2155.
  • 4穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66. 被引量:36
  • 5Li Z, Trappe W, Yates R. Secret communication via multi-antenna transmission. In: Proc 41st Conf Information Sciences Systems, Baltimore, 2007. 905-910.
  • 6Khisti A, Wornell G. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 3088-3104.
  • 7Sha ee S, Liu N, Ulukus S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Trans Inf Theory, 2009, 55: 4033-4039.
  • 8Shannon C E. Communication theory of secrecy systems. Bell Syst Tech J, 1949, 28: 656-715.
  • 9Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355-1387.
  • 10Csiszar I, Korner J. Broadcast channels with con dential messages. IEEE Trans Inf Theory, 1978, 24: 339-348.

二级参考文献11

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献35

同被引文献110

  • 1Schneier B. Cryptographic design vulnerabilities [J]. IEEE Computer, 1998, 31(9): 29-33.
  • 2Wyner A D. The wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8):1355-1387.
  • 3Lai L, E1 Gamal H, Poor H V. The wiretap channel with feedback: Encryption over the channel [J]. IEEE Transactions on Information Theory, 2008, 54 (11): 5059-5067.
  • 4Aono T, Higuchi K, Ohira T, et al. Wireless secret key generation exploiting reactance-domain scalar re- sponse of multipath fading channels [J]. IEEE Trans- actions on Antennas and Propagation, 2005, 53 (11) :3776-3784.
  • 5Wilson R, Tse D, Scholtz R A. Channel identification: Secret sharing using reciprocity in ultrawideband chan- nels [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 364-375.
  • 6Krikidis I, Thompson J S, McLaughlin S. Relay selec- tion for secure cooperative networks with jamming [J]. IEEE Transactions on Wireless Communications, 2009, 8(10) : 5003-5011.
  • 7Dong L, Han Z, Petropulu A P, et al. Amplify-and- forward based cooperation for secure wireless communi- cations [C]//IEEE International Conference on Acous- tics, Speech and Signal. Taipei, China, 2009, 1-5.
  • 8Lai H Q, Liu K J R. Space-time network coding [J]. IEEE Transactions on Signal Processing, 2011, 59(4): 1706-1718.
  • 9Gao Z Z, Yang Y H, Liu K J R. Anti-eavesdropping space-time network coding for cooperative communica- tions [J]. IEEE Transactions on Wireless Communica- tions, 2011, 10(11): 3898-3908.
  • 10Laneman J N, Tse D N C, Wornell G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior [J]. IEEE Transactions on Information Theory, 2004, 50(12):3062-3080.

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部