一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

異構(gòu)密集網(wǎng)中一種抗多竊聽者的協(xié)作安全波束成形方案

黃開枝 張波

黃開枝, 張波. 異構(gòu)密集網(wǎng)中一種抗多竊聽者的協(xié)作安全波束成形方案[J]. 電子與信息學(xué)報(bào), 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
引用本文: 黃開枝, 張波. 異構(gòu)密集網(wǎng)中一種抗多竊聽者的協(xié)作安全波束成形方案[J]. 電子與信息學(xué)報(bào), 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
Citation: HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152

異構(gòu)密集網(wǎng)中一種抗多竊聽者的協(xié)作安全波束成形方案

doi: 10.11999/JEIT161152
基金項(xiàng)目: 

河南省科技攻關(guān)計(jì)劃項(xiàng)目(152102210013),國(guó)家863計(jì)劃項(xiàng)目 (2015AA01A708),國(guó)家自然科學(xué)基金(61171108, 61471396)

Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks

Funds: 

The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61171108, 61471396)

  • 摘要: 為保證異構(gòu)密集網(wǎng)中多個(gè)竊聽者聯(lián)合竊聽時(shí)宏基站用戶的下行通信安全,該文提出一種抗多竊聽者的協(xié)作安全波束成形方案。該方案通過聯(lián)合設(shè)計(jì)宏基站和微基站的最優(yōu)協(xié)作波束成形矢量,使保密信息傳輸速率提升的同時(shí),其他用戶的下行信號(hào)進(jìn)一步干擾竊聽者,從而最大化系統(tǒng)安全速率。為獲得最優(yōu)的協(xié)作波束成形矢量,在考慮其他合法用戶的服務(wù)質(zhì)量及基站功率限制時(shí),對(duì)該安全速率最大化問題進(jìn)行建模。采用半定松弛技術(shù)及Lagrange 對(duì)偶理論將原始的非凸優(yōu)化問題轉(zhuǎn)化為一系列的半定規(guī)劃問題進(jìn)行求解。仿真結(jié)果驗(yàn)證了所提方案的有效性和安全性。
  • HAIDER F, GAO X, YOU X H, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014.6736752.
    HU R Q and QIAN Y. An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems[J]. IEEE Communications Magazine, 2014, 52(5): 94-101. doi: 10.1109/MCOM.2014.6815898.
    SONG K, JI B, HUANG Y, et al. Performance analysis of antenna selection in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2015, 63(10): 2520-2532. doi: 10.1109/TSP.2015.2414904.
    宋康, 韋磊, 冀保峰, 等. 基于干擾消除的異構(gòu)蜂窩網(wǎng)絡(luò)中斷分析[J]. 電子與信息學(xué)報(bào), 2015, 38(2): 255-261. doi: 10.11999/JEIT150532.
    SONG Kang, WEI Lei, JI Baofeng, et al. Outage performance for heterogeneous cellular networks with interference cancellation[J]. Journal of Electronics Information Technology, 2015, 38(2): 255-261. doi: 10.11999/ JEIT150532.
    鐘智豪, 羅文宇, 彭建華, 等. 多層異構(gòu)蜂窩網(wǎng)協(xié)作傳輸和協(xié)作干擾機(jī)制的安全性能分析[J]. 中國(guó)科學(xué): 信息科學(xué), 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    ZHONG Zhihao, LUO Wenyu, PENG Jianhua, et al. Secrecy performasnce analysis of cooperative transmisson and cooperative jamming in K-tier heterogeneous cellular networks[J]. Scientia Sinica Informations, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    SAMDANIS K, TALEB T, and SCHMID S. Traffic? offload? enhancements for eUTRANn[J]. IEEE Communications Surveys Tutorials, 2012, 14(3): 884-896. doi: 10.1109/SURV. 2011.072711.00168.
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j.1538- 7305. 1975.tb02040.x.
    GOEL S and NEGI R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, 2005, 3: 1501-1506. doi: 10.1109/ MILCOM.2005.1605889.
    PINTO P C, BARROS J, and WIN M Z. Secure communication in stochastic wireless networksPart II: Maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. doi: 10.1109/TIFS.2011. 2165947.
    PINTO P C, BARROS J, and WIN M Z. Wireless physical-layer security: The case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, 2009: 2442-2446. doi: 10.1109/ISIT.2009.5206050.
    雷維嘉, 左莉杰, 江雪, 等. 中繼網(wǎng)絡(luò)中不準(zhǔn)確信道狀態(tài)信息下抗多竊聽者的物理層安全方案[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
    LEI Weijia, ZUO Lijie, JIANG Xue, et al. Physical layer security resistant to multi-eavesdroppers with inaccurate channel state information in relay network[J]. Journal of Electronics Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579.
    L? T, GAO H, CAO R, et al. Coordinated secure beamforming in K-User interference channel with multiple eavesdroppers[J]. IEEE Wireless Communication Letters, 2016, 5(2): 212-215. doi: 10.1109/LWC.2016.2519905.
    NGUYEN Van-Dinh, DUONG Trung Q, DUONG Octavia A, et al. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2609-2623. doi: 10.1109/TIFS.2016.2594131.
    LUO Z Q, MA W K, SO A C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010. 936019.
    YANG S, LV T, and HANZO L. Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM[J]. IEEE Transactions on Vehicular Technology, 2013, 62(4): 1667-1677. doi: 10.1109/TVT.2012.2235190.
    CHARNES A and COOPER W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    BOYD S and VANDENBERGHE L. Convex Optimization[M]. Cambridge, U.K.: Cambridge University Press, 2004: 121-180.
    張立健, 金梁, 羅文宇. 多用戶MISO干擾信道中的安全協(xié)同波束成形[J]. 通信學(xué)報(bào), 2015, 36(11): 41-51. doi: 10.11959/ j.issn.1000-436x.2015198.
    ZHANG Lijian, JIN Liang, and LUO Wen-yu. Secure coordinated beamforming for multiuser MISO interference channels[J]. Journal on Communications, 2015, 36(11): 41-51. doi: 10.11959/j.issn.1000-436x.2015198.
    L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
    LOPEZ-PEREZ D, GUVENC I, DELAROCHE G, et al. Enhanced intercell interference coordination challenges in heterogeneous networks[J]. IEEE Wireless Communications, 2011, 18(3): 22-30. doi: 10.1109/MWC.2011.5876497.
    SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. doi: 10.1109/MWC. 2011.5751298.
    FAKOORIAN S A A and SWINDLEHURS A L T. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649. doi: 10.1109/TIFS.2011.2156788.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1195
  • HTML全文瀏覽量:  183
  • PDF下載量:  250
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-10-27
  • 修回日期:  2017-02-26
  • 刊出日期:  2017-07-19

目錄

    /

    返回文章
    返回