[1]贾丽君,贺玉成,周 林.自适应窃听和干扰下机会式中继和协作干扰技术的安全性能分析[J].南京理工大学学报(自然科学版),2019,43(01):29.[doi:10.14177/j.cnki.32-1397n.2019.43.01.004]
 Jia Lijun,He Yucheng,Zhou Lin.Secure performance analysis of opportunistic relay and cooperativejamming technique under adaptive eavesdropping and jamming[J].Journal of Nanjing University of Science and Technology,2019,43(01):29.[doi:10.14177/j.cnki.32-1397n.2019.43.01.004]
点击复制

自适应窃听和干扰下机会式中继和协作干扰技术的安全性能分析()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
43卷
期数:
2019年01期
页码:
29
栏目:
出版日期:
2019-02-28

文章信息/Info

Title:
Secure performance analysis of opportunistic relay and cooperativejamming technique under adaptive eavesdropping and jamming
文章编号:
1005-9830(2019)01-0029-06
作者:
贾丽君12贺玉成12周 林12
1.华侨大学 厦门市移动多媒体通信重点实验室,福建 厦门 361021; 2.西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
Author(s):
Jia Lijun12He Yucheng12Zhou Lin12
1.School of Information Science and Engineering,Huaqiao University,Xiamen 361021,China; 2.State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
关键词:
物理层安全 自适应窃听者 机会式中继 协作干扰 遍历可达安全速率 半双工 协作通信
Keywords:
physical layer security adaptive eavesdropper opportunistic relay cooperative jamming ergodic achievable secrecy rate half-duplex cooperative communication
分类号:
TN92
DOI:
10.14177/j.cnki.32-1397n.2019.43.01.004
摘要:
在存在一个半双工自适应窃听者的多中继协作通信模型中,针对窃听者能够智能地选择被动窃听或主动干扰的问题,选择一个中继协助源节点转发信息,其余中继用于发送人工干扰信号以混淆窃听者,从而提升系统的遍历可达安全速率(Ergodic achievable secrecy rate,EASR)性能。在仅有窃听信道统计信息的假设下,推导了EASR的渐进闭合表达式,并进行了Monte-Carlo仿真验证。仿真结果表明:即使在中继数目较小的情况下,渐进分析结果与仿真结果也基本吻合。同时表明:采用机会式中继和中继协作干扰的组合技术可显著地提升系统的安全传输性能。
Abstract:
A multi-relay cooperative communication model is considered,where there exists a half-duplex adaptive eavesdropper that performs either passive eavesdropping or active jamming. To improve the performance in ergodic achievable secrecy rate(EASR),one cooperative relay is selected to assist the source node to transmit information,and the remaining relays are used to send artificial jamming to confuse the eavesdropper. Under the assumption that only the statistical channel state information of the eavesdropper is known,the asymptotic closed-form expression for the EASR is derived,and Monte-Carlo simulations are conducted to validate the derivations. Simulation results show that the asymptotic analysis results coincide well with the simulation results even when the number of relays are relatively small,and meanwhile,the combined opportunistic relaying and cooperative jamming technique can significantly improve the secure transmission performance of the system.

参考文献/References:

[1] Dong Lun,Han Zhu,Petropulu A P,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[2]Su Yinjie,Jiang Lingge,He Chen. Joint relay selection and power allocation for full-duplex DF co-operative networks with outdated CSI[J]. IEEE Communications Letters,2016,20(3):510-513.
[3]Al-Qahtani F S,Zhong Caijun,Alnuweiri H M. Opportunistic relay selection for secrecy enhancement in cooperative networks[J]. IEEE Transactions on Communications,2015,63(5):1756-1770.
[4]Krikidis I,Thompson J S,Mclaughlin S. Relay selection for secure cooperative networks with jamming[J]. IEEE Transactions on Wireless Communications,2009,8(10):5003-5011.
[5]Goel S,Negi R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[6]Guo Haiyan,Yang Zhen,Zhang Linghua,et al. Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks[J]. IEEE Transactions on Communications,2017,65(5):2180-2193.
[7]赵睿,贺玉成,周林,等. 基于人工噪声预编码的多天线中继安全性能分析[J]. 电子与信息学报,2016,38(10):2575-2581.
Zhao Rui,He Yucheng,Zhou Lin,et al. Secrecy performance analysis of multiple-antenna relay systems with artificial noise precoding[J]. Journal of Electronics and Information Technology,2016,38(10):2575-2581.
[8]钱振宇,束锋,王进,等. MIMO双向中继系统中一种交替迭代结构[J]. 南京理工大学学报,2015,39(5):596-601.
Qian Zhenyu,Su Feng,Wang Jin,et al. Alternating iterative structure for MIMO two-way relay system[J]. Journal of Nanjing University of Science and Technology,2015,39(5):596-601.
[9]Wang Wei,Teh K C,Li K H,et al. On the impact of adaptive eavesdroppers in multi-antenna cellular networks[J]. IEEE Transactions on Information Forensics and Security,2018,13(2):269-279.

[10]Yang Long,Chen Jian,Jiang Hai,et al. Optimal relay selection for secure cooperative communications with an adaptive eavesdropper[J]. IEEE Transactions on Wireless Communications,2017,16(1):26-42.
[11]Gao H,Smith P J,Clark M V. Theoretical reliability of MMSE linear diversity combining in rayleigh-fading additive interference channels[J]. IEEE Transactions on Communications,1998,46(5):666-672.

备注/Memo

备注/Memo:
收稿日期:2018-07-18 修回日期:2018-10-09
基金项目:福建省自然科学基金(2018J01096); 重庆市/信息产业部“计算机网络与通信技术重点实验室”开放基金(CY-CNCL-2017-05)
作者简介:贾丽君(1995-),女,硕士生,主要研究方向:物理层安全,E-mail:1342562554@qq.com; 通讯作者:贺玉成(1964-),男,博士,教授,主要研究方向:无线通信和信道编码,E-mail:yucheng.he@hqu.edu.cn。
引文格式:贾丽君,贺玉成,周林. 自适应窃听和干扰下机会式中继和协作干扰技术的安全性能分析[J]. 南京理工大学学报,2019,43(1):29-34.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2019-02-28