中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案
doi: 10.11999/JEIT141579
基金項(xiàng)目:
國家自然科學(xué)基金(61471076, 61271259, 61301123),長江學(xué)者和創(chuàng)新團(tuán)隊(duì)發(fā)展計(jì)劃(IRT1299)以及重慶市科委重點(diǎn)實(shí)驗(yàn)室專項(xiàng)經(jīng)費(fèi)
Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network
-
摘要: 該文研究存在多個(gè)相互勾結(jié)的單天線竊聽者的多中繼傳輸系統(tǒng)中,采用零空間人工噪聲和放大轉(zhuǎn)發(fā)的中繼波束賦形的物理層安全傳輸方案。在中繼竊聽端的信道狀態(tài)信息不準(zhǔn)確的情況下,基于半定規(guī)劃理論,對中繼的波束賦形加權(quán)矩陣和人工噪聲協(xié)方差矩陣進(jìn)行聯(lián)合優(yōu)化,有效減少相互勾結(jié)的多個(gè)竊聽者所獲得的信息量,顯著提高系統(tǒng)保密容量,是一種具有良好魯棒性的物理層安全傳輸方案。仿真結(jié)果顯示方案具有良好的性能。
-
關(guān)鍵詞:
- 物理層安全 /
- 保密速率 /
- 多竊聽者 /
- 不準(zhǔn)確信道狀態(tài)信息 /
- 半定規(guī)劃
Abstract: This paper investigates the relay transmission system in the presence of multiple collusion single-antenna eavesdroppers. A physical layer security scheme employing nullspace Artificial Noise (AN) and Amplify-and-Forward (AF) relay beamforming is designed. In the case that channel state information can not be accurately obtained, the weighted matrice of relay beamforming and the nullspace AN covariance are jointed optimized based on the Semi-Definite Programs (SDP), which can effectively reduce the amount of the information likely to be obtained by the multiple collusion eavesdroppers and significantly improve the security capacity of the system. It is an effective physical security transmission scheme with good robustness. Simulation results verify that the scheme has good performance. -
Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715. Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456. Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38. Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5. Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717. Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545. Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506. Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networkspart II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446. Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343. Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56. Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487. Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162. Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655. Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186. Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9. Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216. -
計(jì)量
- 文章訪問數(shù): 1358
- HTML全文瀏覽量: 126
- PDF下載量: 477
- 被引次數(shù): 0