浏览全部资源
扫码关注微信
西安电子科技大学网络信息安全学院,陕西 西安 710071
[ "张丽娟(1991-),女,山西吕梁人,西安电子科技大学硕士生,主要研究方向为信息安全、无线传感器网络等。" ]
[ "刘志宏(1968-),男,湖南常德人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为密码学、信息安全、网络编码、复杂网络、传感器网络等。" ]
[ "张洪波(1991-),男,河南洛阳人,西安电子科技大学硕士生,主要研究方向为物理层安全、信息安全、动态密钥等。" ]
[ "曾勇(1978-),男,湖南石门人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为信息安全、无线传感器网络等。" ]
[ "马建峰(1965-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统结构和密码学等。" ]
网络出版日期:2017-02,
纸质出版日期:2017-02-25
移动端阅览
张丽娟, 刘志宏, 张洪波, 等. 协作干扰下的无线安全增强[J]. 通信学报, 2017,38(2):183-195.
Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, et al. Wireless secure enhancement with cooperative jamming[J]. Journal on communications, 2017, 38(2): 183-195.
张丽娟, 刘志宏, 张洪波, 等. 协作干扰下的无线安全增强[J]. 通信学报, 2017,38(2):183-195. DOI: 10.11959/j.issn.1000-436x.2017047.
Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, et al. Wireless secure enhancement with cooperative jamming[J]. Journal on communications, 2017, 38(2): 183-195. DOI: 10.11959/j.issn.1000-436x.2017047.
安全通信图(iS-Graph)的安全性能通过增加可控干扰以降低窃听者的信号与干扰比(SIR)来实现。研究无线网络中机密信息的传输,网络中合法节点在协作干扰节点的帮助下实现安全通信,在此基础上提出一种干扰协助的安全通信图,即jS-Graph。同时,研究了jS-Graph的安全属性,提出使用多个独立的干扰节点来干扰窃听者。为应对窃听者靠近发送者或接收者的难题,使用一种协作干扰策略来干扰源节点或目标节点附近的窃听者。结果表明,如果采用协作干扰,无线通信的机密性得以增强。
Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied
and a secure communication graph with jamming
jS-Graph was proposed.First
the security properties of jS-Graph was characterized.Then
jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem
a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that
with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks-part I:connectivity [J ] . IEEE Trans Inf Forensics Security , 2011 , 7 ( 1 ): 125 - 138 .
HAENGGI M , . The secrecy graph and some of its properties [C ] // ISIT . 2008 : 539 - 543 .
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks - part ii:maximum rate and collusion [J ] . IEEE Trans Inf Forensics Security , 2011 , 7 ( 1 ): 139 - 147 .
GOEL S , AGGARWAL V , YENER A , et al . The effect of eavesdroppers on network connectivity:a secrecy graph approach [J ] . IEEE Trans Inf Forensics Security , 2011 , 6 ( 3 ): 712 - 724 .
PINTO P C , WIN M Z . Percolation and connectivity in the intrinsically secure communications graph [J ] . IEEE Trans Inf Theory , 2012 , 58 ( 3 ): 1716 - 1730 .
VILELA J P , BLOCH M , BARROS J , et al . Wireless secrecy regions with friendly jamming [J ] . IEEE Trans Inf Forensics and Security , 2011 , 6 ( 2 ): 256 - 266 .
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise [J ] . IEEE Trans Wireless Communications , 2008 , 7 ( 6 ): 2180 - 2189 .
GOECKEL D , VASUDEVAN S , TOWSLEY D , et al . Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks [J ] . IEEE J Select Areas Commun , 2011 , 29 ( 10 ): 2067 - 2076 .
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy [J ] . IEEE Trans Inf Theory , 2008 , 54 ( 9 ): 4005 - 4019 .
TEKIN E , YENER A . The general Gaussian multiple-access and two-way wire-tap channels:achievable rates and cooperative jamming [J ] . IEEE Trans.Inf.Theory , 2008 , 54 ( 6 ): 2735 - 2751 .
HE X , YENER A . Securing wireless communications at the physical layer,chapter cooperative jamming:the tale of friendly interference for secrecy [M ] . New York : SpringerPress , 2009 : 65 - 88 .
GOLLAKOTA S , HASSANIEH H , RANSFORD B , et al . They can hear your heartbeats:non-invasive security for implantable medical devices [C ] // In ACM SIGCOMM , 2011 : 2 - 13 .
MARTINOVIC I , PICHOTA P , SCHMITT J B . Jamming for good:a fresh approach to authentic communication in WSNs [C ] // ACM WiSec . 2009 : 161 - 168 .
WILHELM M , MARTINOVIC I , SCHMITT J , et al . WiFire:a firewall for wireless networks [C ] // In ACM SIGCOMM . New York,NY,USA , 2011 : 456 - 457 .
BERGER D S , GRINGOLI F , FACCHI N , et al . Gaining insight on friendly jamming in a real-world IEEE 802.11 network [C ] // ACM WiSec'14 , 2014 : 23 - 25 .
AGATAY C , APAR C , GOECKEL D , et al . Secret communication in large wireless networks without eavesdropper location information [C ] // Proc INFOCOM . 2012 : 1152 - 1160 .
KOYLUOGLU O , KOKSAL C , GAMAL H E . On the secrecy capacity scaling in wireless networks [J ] . IEEE Trans Inf Theory , 2012 , 58 ( 11 ): 3000 - 3015 .
CHIU S N , STOYAN D , KENDALL W S , et al . Stochastic geometry and its applications,third edition [M ] . John Wiley & Sons,Ltd , 2013 .
HAN B , LI J . Secrecy capacity maximization for secure cooperative ad-hoc networks [C ] // In INFOCOM,2013 Proceedings IEEE , 2013 : 2796 - 2804 .
HAENGGI M . On distances in uniformly random networks [J ] . IEEE Trans Inf Theory , 2005 , 51 ( 10 ): 3584 - 3586 .
GOECKEL D , CAPAR C , TOWSLEY D . Physical layer security in wireless communications,chapter physical layer secrecy in large multihop wireless networks [M ] . CRC Press , 2014 : 271 - 285 .
LAI L , GAMAL H E , POOR H V . The wiretap channel with feedback:encryption over the channel [J ] . IEEE Trans Inf Theory , 2008 , 54 ( 11 ): 5059 - 5067 .
0
浏览量
580
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构