異構(gòu)密集網(wǎng)中一種抗多竊聽者的協(xié)作安全波束成形方案
doi: 10.11999/JEIT161152
基金項(xiàng)目:
河南省科技攻關(guān)計(jì)劃項(xiàng)目(152102210013),國(guó)家863計(jì)劃項(xiàng)目 (2015AA01A708),國(guó)家自然科學(xué)基金(61171108, 61471396)
Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks
Funds:
The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61171108, 61471396)
-
摘要: 為保證異構(gòu)密集網(wǎng)中多個(gè)竊聽者聯(lián)合竊聽時(shí)宏基站用戶的下行通信安全,該文提出一種抗多竊聽者的協(xié)作安全波束成形方案。該方案通過聯(lián)合設(shè)計(jì)宏基站和微基站的最優(yōu)協(xié)作波束成形矢量,使保密信息傳輸速率提升的同時(shí),其他用戶的下行信號(hào)進(jìn)一步干擾竊聽者,從而最大化系統(tǒng)安全速率。為獲得最優(yōu)的協(xié)作波束成形矢量,在考慮其他合法用戶的服務(wù)質(zhì)量及基站功率限制時(shí),對(duì)該安全速率最大化問題進(jìn)行建模。采用半定松弛技術(shù)及Lagrange 對(duì)偶理論將原始的非凸優(yōu)化問題轉(zhuǎn)化為一系列的半定規(guī)劃問題進(jìn)行求解。仿真結(jié)果驗(yàn)證了所提方案的有效性和安全性。
-
關(guān)鍵詞:
- 異構(gòu)密集網(wǎng) /
- 物理層安全 /
- 協(xié)作安全波束成形 /
- 半定松弛 /
- 半定規(guī)劃
Abstract: To guarantee the secrecy of downlink confidential information sent to marcocell user when there were multiple colluding eavesdroppers in dense heterogenous networks, a cooperative secrecy beamforming scheme resistant to multi-eavesdroppers is proposed in the paper. The transmission rate of confidential information is improved and eavesdroppers are jammed by jointly optimizing the beamforming vectors at macrocell base station and femtocell base stations. To obtain the optimal beamforming vectors, the problem of maximizing the secrecy rate is modeled under the limitations of quality of service and base station power. The secrecy rate maximization problem is non-convex. Due to the intractability, this problem is recast into a series of SemiDefinite Programs (SDP) using the SemiDefinite Relaxation (SDR) technique and the Lagrange duality. Simulation results validate the efficacy and the secrecy of the proposed scheme. -
HAIDER F, GAO X, YOU X H, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014.6736752. HU R Q and QIAN Y. An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems[J]. IEEE Communications Magazine, 2014, 52(5): 94-101. doi: 10.1109/MCOM.2014.6815898. SONG K, JI B, HUANG Y, et al. Performance analysis of antenna selection in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2015, 63(10): 2520-2532. doi: 10.1109/TSP.2015.2414904. 宋康, 韋磊, 冀保峰, 等. 基于干擾消除的異構(gòu)蜂窩網(wǎng)絡(luò)中斷分析[J]. 電子與信息學(xué)報(bào), 2015, 38(2): 255-261. doi: 10.11999/JEIT150532. SONG Kang, WEI Lei, JI Baofeng, et al. Outage performance for heterogeneous cellular networks with interference cancellation[J]. Journal of Electronics Information Technology, 2015, 38(2): 255-261. doi: 10.11999/ JEIT150532. 鐘智豪, 羅文宇, 彭建華, 等. 多層異構(gòu)蜂窩網(wǎng)協(xié)作傳輸和協(xié)作干擾機(jī)制的安全性能分析[J]. 中國(guó)科學(xué): 信息科學(xué), 2016, 46(1): 33-48. doi: 10.1360/N112015-00174. ZHONG Zhihao, LUO Wenyu, PENG Jianhua, et al. Secrecy performasnce analysis of cooperative transmisson and cooperative jamming in K-tier heterogeneous cellular networks[J]. Scientia Sinica Informations, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174. SAMDANIS K, TALEB T, and SCHMID S. Traffic? offload? enhancements for eUTRANn[J]. IEEE Communications Surveys Tutorials, 2012, 14(3): 884-896. doi: 10.1109/SURV. 2011.072711.00168. WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j.1538- 7305. 1975.tb02040.x. GOEL S and NEGI R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, 2005, 3: 1501-1506. doi: 10.1109/ MILCOM.2005.1605889. PINTO P C, BARROS J, and WIN M Z. Secure communication in stochastic wireless networksPart II: Maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. doi: 10.1109/TIFS.2011. 2165947. PINTO P C, BARROS J, and WIN M Z. Wireless physical-layer security: The case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, 2009: 2442-2446. doi: 10.1109/ISIT.2009.5206050. 雷維嘉, 左莉杰, 江雪, 等. 中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579 LEI Weijia, ZUO Lijie, JIANG Xue, et al. Physical layer security resistant to multi-eavesdroppers with inaccurate channel state information in relay network[J]. Journal of Electronics Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579. L? T, GAO H, CAO R, et al. Coordinated secure beamforming in K-User interference channel with multiple eavesdroppers[J]. IEEE Wireless Communication Letters, 2016, 5(2): 212-215. doi: 10.1109/LWC.2016.2519905. NGUYEN Van-Dinh, DUONG Trung Q, DUONG Octavia A, et al. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2609-2623. doi: 10.1109/TIFS.2016.2594131. LUO Z Q, MA W K, SO A C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010. 936019. YANG S, LV T, and HANZO L. Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM[J]. IEEE Transactions on Vehicular Technology, 2013, 62(4): 1667-1677. doi: 10.1109/TVT.2012.2235190. CHARNES A and COOPER W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186. BOYD S and VANDENBERGHE L. Convex Optimization[M]. Cambridge, U.K.: Cambridge University Press, 2004: 121-180. 張立健, 金梁, 羅文宇. 多用戶MISO干擾信道中的安全協(xié)同波束成形[J]. 通信學(xué)報(bào), 2015, 36(11): 41-51. doi: 10.11959/ j.issn.1000-436x.2015198. ZHANG Lijian, JIN Liang, and LUO Wen-yu. Secure coordinated beamforming for multiuser MISO interference channels[J]. Journal on Communications, 2015, 36(11): 41-51. doi: 10.11959/j.issn.1000-436x.2015198. L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984. LOPEZ-PEREZ D, GUVENC I, DELAROCHE G, et al. Enhanced intercell interference coordination challenges in heterogeneous networks[J]. IEEE Wireless Communications, 2011, 18(3): 22-30. doi: 10.1109/MWC.2011.5876497. SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. doi: 10.1109/MWC. 2011.5751298. FAKOORIAN S A A and SWINDLEHURS A L T. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649. doi: 10.1109/TIFS.2011.2156788. -
計(jì)量
- 文章訪問數(shù): 1195
- HTML全文瀏覽量: 183
- PDF下載量: 250
- 被引次數(shù): 0