浏览全部资源
扫码关注微信
[ "徐赛(1987- ),男,博士,哈尔滨工业大学副教授,主要研究方向为物理层安全、移动通信技术和空天通信技术" ]
[ "韩帅(1981- ),男,博士,哈尔滨工业大学教授,主要研究方向为无线信号处理、MIMO、非正交多址接入和卫星定位导航及对抗等" ]
[ "孟维晓(1968- ),男,博士,哈尔滨工业大学电子与信息工程学院副院长、长聘教授、博士生导师,主要研究方向为无线通信与网络、空天地信息传输、精确定位与无缝导航" ]
网络出版日期:2021-06,
纸质出版日期:2021-06-20
移动端阅览
徐赛, 韩帅, 孟维晓. 一种基于合作干扰的主窃信道安全传输方法[J]. 电信科学, 2021,37(6):105-114.
Sai XU, Shuai HAN, Weixiao MENG. A secure transmission method based on cooperative jamming for correlated main and wiretap channels[J]. Telecommunications science, 2021, 37(6): 105-114.
徐赛, 韩帅, 孟维晓. 一种基于合作干扰的主窃信道安全传输方法[J]. 电信科学, 2021,37(6):105-114. DOI: 10.11959/j.issn.1000-0801.2021121.
Sai XU, Shuai HAN, Weixiao MENG. A secure transmission method based on cooperative jamming for correlated main and wiretap channels[J]. Telecommunications science, 2021, 37(6): 105-114. DOI: 10.11959/j.issn.1000-0801.2021121.
提出一种基于合作干扰的安全传输方法,用以减少主窃信道之间相关性带来的保密损失,提高通信系统的保密性能。考虑现有的合作干扰方法集中于主窃信道相互独立的情形,因此,当主窃信道相关时,现有的合作干扰方法由于设计的局限性无法获得足够理想的保密性能。鉴于此,提出一种面向相关主窃信道具有针对性的合作干扰方法。基于相关主窃信道的合作干扰模型,对保密中断概率约束下的保密速率最大化问题进行了形式化。通过采用范数边界法和伯恩不等式法将优化问题的概率约束条件转化成近似的确定形式,能够获得波束成形和人工噪声的一组近似解。仿真结果显示,提出的合作干扰方法能够在高相关性的条件下减少通信系统的保密损失。
A secure transmission method was proposed based on cooperative jamming to reduce the secrecy loss caused by the correlation between main and wiretap channels and to improve the secrecy.Considering that the existing methods of cooperative jamming focused on the case of independent main and wiretap channels
the achievable secrecy performance was not satisfactory.In view of this
a cooperative jamming method for correlated main and wiretap channels was proposed.Based on the model of cooperative jamming under correlated main and wiretap channels
the secrecy rate maximization under secrecy outage constraint was formulated.Then
the norm bounding approach and the Bernstein-type inequality approach were employed to approximately transform the probabilistic constraint into a deterministic form
and a safe approximate solution of beamforming vector and AN covariance matrix was obtained.Simulation results show that the proposed method can reduce the secrecy loss under high correlation.
SUN W , LIU J , YUE Y , et al . Double auction-based resource allocation for mobile edge computing in industrial internet of things [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 10 ): 4692 - 4701 .
JAMEEL F , WYNE S , KADDOUM G , et al . A comprehensive survey on cooperative relaying and jamming strategies for physical layer security [J ] . IEEE Communications Surveys &Tutorials , 2019 , 21 ( 3 ): 2734 - 2771 .
LIU Y , CHEN H , WANG L . Physical layer security for next generation wireless networks:theories,technologies,and challenges [J ] . IEEE Communications Surveys & Tutorials , 2017 , 19 ( 1 ): 347 - 376 .
LV L , ZHOU F , CHEN J , et al . Secure cooperative communications with an untrusted relay:a NOMA-inspired jamming and relaying approach [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 12 ): 3191 - 3205 .
NG K , LO E , SCHOBER R . Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 10 ): 3528 - 3540 .
DING Z , LEUNG K , GOECKEL D , et al . On the application of cooperative transmission to secrecy communications [J ] . IEEE Journal On Selected Areas in Communications , 2012 , 30 ( 2 ): 359 - 368 .
YAN S , YANG N , LAND I , et al . Three artificial-noise-aided secure transmission schemes in wiretap channels [J ] . IEEE Transactions on Vehicular Technology , 2018 , 67 ( 4 ): 3669 - 3673 .
ZHANG H , XING H , CHENG J , et al . Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming [J ] . IEEE Transactions on Information Forensics and Security , 2016 12 ( 5 ): 1714 - 1725 .
DENG H , WANG H , GUO W , et al . Secrecy transmission with a helper:to relay or to jam [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 2 ): 293 - 307 .
JIANG X , LIN H , ZHONG C , et al . Proactive eavesdropping in relaying systems [J ] . IEEE Signal Processing Letter , 2017 , 24 ( 6 ): 917 - 921 .
ZOU Y L , WANG X B , SHEN W M , et al . Security versus reliability analysis of opportunistic relaying [J ] . IEEE Transactions on Vehicular Technology , 2014 , 63 ( 6 ): 2653 - 2661 .
LIU J , LIU Z , ZENG Y , et al . Cooperative jammer placement for physical layer security enhancement [J ] . IEEE Network , 2016 , 30 ( 6 ): 56 - 61 .
YANG L , CHEN J , JIANG H , et al . Optimal relay selection for secure cooperative communications with an adaptive eavesdropper [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 1 ): 26 - 42 .
CHEN X , ZHONG C , YUEN C , et al . Multi-antenna relay aided wireless physical layer security [J ] . IEEE Communications Magazine , 2015 , 53 ( 12 ): 40 - 46 .
LIU Y W , WANG L F , DUY T T , et al . Relay selection for security enhancement in cognitive relay networks [J ] . IEEE Wireless Communications Letters , 2015 , 4 ( 1 ): 46 - 49 .
PEI M Y , SWINDLEHURST A L , MA D T , et al . Adaptive limited feedback for MISO wiretap channels with cooperative jamming [J ] . IEEE Transactions on Signal Processing , 2014 , 62 ( 4 ): 993 - 1004 .
LIU Y , LI L , ALEXANDROPOULOS G , et al . Securing relay networks with artificial noise:an error performance-based approach [J ] . Entropy , 2017 , 19 ( 8 ): 384 .
CUMANAN K , ALEXANDROPOULOS G , KARAGIANNIDIS . Secure communications with cooperative jamming:optimal power allocation and secrecy outage analysis [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 8 ): 7495 - 7505 .
FAN L , LEI X , DUONG T Q , et al . Secure multiuser communications in multiple amplify-and-forward relay networks [J ] . IEEE Transactions on Communications , 2014 , 62 ( 9 ): 3299 - 3310 .
JEON H , KIM N , CHOI J , et al . Bounds on secrecy capacity over correlated ergodic fading channels at high SNR [J ] . IEEE Transactions on Information Theory , 2011 , 57 ( 4 ): 1975 - 1983 .
SUN X J , WANG J H , XU W , et al . Performance of secure communications over correlated fading channels [J ] . IEEE Signal Processing Letters , 2012 , 19 ( 8 ): 479 - 482 .
FERDINAND N S , DA COSTA D B , DE ALMEIDA A L F , et al . Physical layer secrecy performance of TAS wiretap channels with correlated main and eavesdropper channels [J ] . IEEE Wireless Communications Letters , 2014 , 3 ( 1 ): 86 - 89 .
FAN L S , ZHAO R , GONG F K , et al . Secure multiple amplify-and-forward relaying over correlated fading channels [J ] . IEEE Transactions on Communications , 2017 , 65 ( 7 ): 2811 - 2820 .
FAN L , LEI X , YANG N , et al . Secrecy cooperative networks with outdated relay selection over correlated fading channels [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 8 ): 7599 - 7603 .
XU S , HAN S , DU Y , et al . AN-aided secure beamforming design for correlated MISO wiretap channels [J ] . IEEE Communications Letters , 2019 , 23 ( 4 ): 628 - 631 .
ZHENG G , KRIKIDIS I , LI J Y , et al . Improving physical layer secrecy using full-duplex jamming receivers [J ] . IEEE Transactions on Signal Processing , 2013 , 61 ( 20 ): 4962 - 4974 .
XU S , HAN S , MENG W X , et al . Multiple-jammer-aided secure transmission with receiver-side correlation [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 6 ): 3093 - 3103 .
XU S , HAN S , MENG W X , et al . Correlation-based secure transmission for correlated MISO wiretap channels [J ] . IEEE Wireless Communications Letters , 2020 , 9 ( 3 ): 302 - 305 .
CHARNES A , COOPER W W . Programming with linear fractional functionals [J ] . Naval Research Logistics Quarterly , 1962 , 9 ( 3/4 ): 181 - 186 .
BOYD S , VANDENBERGHE L . Convex Optimization [M ] . UK : Cambridge University Press , 2004 .
TANG Y Q , XIONG J , MA D T , et al . Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty [J ] . IEEE Communications Letters , 2013 , 17 ( 11 ): 2096 - 2099 .
MA S , HONG M Y , SONG E B , et al . Outage constrained robust secure transmission for MISO wiretap channels [J ] . IEEE Transactions on Wireless Communications , 2014 , 13 ( 10 ): 5558 - 5570 .
WANG K Y , SO A M C , CHANG T H , et al . Outage constrained robust transmit optimization for multiuser MISO downlinks:tractable approximations by conic optimization [J ] . IEEE Transactions on Signal Processing , 2014 , 62 ( 21 ): 5690 - 5705 .
0
浏览量
175
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构