一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案

雷維嘉 左莉杰 江雪 謝顯中

雷維嘉, 左莉杰, 江雪, 謝顯中. 中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
引用本文: 雷維嘉, 左莉杰, 江雪, 謝顯中. 中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
Citation: Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579

中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案

doi: 10.11999/JEIT141579
基金項(xiàng)目: 

國家自然科學(xué)基金(61471076, 61271259, 61301123),長江學(xué)者和創(chuàng)新團(tuán)隊(duì)發(fā)展計(jì)劃(IRT1299)以及重慶市科委重點(diǎn)實(shí)驗(yàn)室專項(xiàng)經(jīng)費(fèi)

Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network

  • 摘要: 該文研究存在多個(gè)相互勾結(jié)的單天線竊聽者的多中繼傳輸系統(tǒng)中,采用零空間人工噪聲和放大轉(zhuǎn)發(fā)的中繼波束賦形的物理層安全傳輸方案。在中繼竊聽端的信道狀態(tài)信息不準(zhǔn)確的情況下,基于半定規(guī)劃理論,對中繼的波束賦形加權(quán)矩陣和人工噪聲協(xié)方差矩陣進(jìn)行聯(lián)合優(yōu)化,有效減少相互勾結(jié)的多個(gè)竊聽者所獲得的信息量,顯著提高系統(tǒng)保密容量,是一種具有良好魯棒性的物理層安全傳輸方案。仿真結(jié)果顯示方案具有良好的性能。
  • Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715.
    Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.
    Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
    Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5.
    Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717.
    Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.
    Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506.
    Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networkspart II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147.
    Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446.
    Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343.
    Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56.
    Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487.
    Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162.
    Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655.
    Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34.
    Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9.
    Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1358
  • HTML全文瀏覽量:  126
  • PDF下載量:  477
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-12-10
  • 修回日期:  2015-05-04
  • 刊出日期:  2015-09-19

目錄

    /

    返回文章
    返回