浏览全部资源
扫码关注微信
国家数字交换系统工程技术研究中心,河南 郑州 450002
[ "邹羿(1991-),男,山东济南人,国家数字交换系统工程技术研究中心硕士生,主要研究方向为无线物理层安全、协作通信等。" ]
[ "黄开枝(1973-),女,安徽滁州人,国家数字交换系统工程技术研究中心教授、博士生导师,主要研究方向为移动通信网络与信息安全等。" ]
[ "康小磊(1986-),男,陕西咸阳人,国家数字交换系统工程技术研究中心博士生,主要研究方向为无线物理层安全、D2D通信。" ]
网络出版日期:2017-09,
纸质出版日期:2017-09-25
移动端阅览
邹羿, 黄开枝, 康小磊. 基于中继间干扰消除的轮流转发系统安全传输方案[J]. 通信学报, 2017,38(9):185-192.
Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG. Successive relaying secure transmission scheme based on inter-relay interference cancellation[J]. Journal on communications, 2017, 38(9): 185-192.
邹羿, 黄开枝, 康小磊. 基于中继间干扰消除的轮流转发系统安全传输方案[J]. 通信学报, 2017,38(9):185-192. DOI: 10.11959/j.issn.1000-436x.2017132.
Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG. Successive relaying secure transmission scheme based on inter-relay interference cancellation[J]. Journal on communications, 2017, 38(9): 185-192. DOI: 10.11959/j.issn.1000-436x.2017132.
针对轮流转发系统中非信任中继窃听的问题,提出一种基于中继间干扰消除的安全传输方案。首先,利用可信中继与非信任中继交替转发产生的中继间干扰,恶化非信任中继的窃听条件。然后,利用信号在时域上的相关性进行干扰迭代消除,完全消除合法用户处中继间干扰,提升合法用户接收信号质量。在此基础上,提出了以最小化窃听和容量为目标的快速功率分配算法。分析和仿真结果表明,方案在保障通信效率的同时抑制了非信任中继的窃听,在仿真条件下,系统的保密速率提升了至少2 bit·s
-1
·Hz
-1
。
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition
then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this
a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency
a promotion of at least 2 bit·s
-1
·Hz
-1
in secrecy rate can be observed.
CHEN G , YU G , PEI X , et al . Physical layer network security in the full-duplex relay system [J ] . IEEE Transactions on Information Forensics & Security , 2015 , 10 ( 3 ): 574 - 583 .
YANG S , BELFIORE J C . Towards the optimal amplify-and-forward cooperative diversity scheme [J ] . IEEE Transactions on Information Theory , 2006 , 53 ( 9 ): 3114 - 3126 .
RANKOV B , WITTNEBEN A . Spectral efficient protocols for half-duplex fading relay channels [J ] . IEEE Journal on Selected Areas in Communications , 2007 , 25 ( 2 ): 379 - 389 .
LUO C , GONG Y , ZHENG F . Full interference cancellation for two-path relay cooperative networks [J ] . IEEE Transactions on Vehicular Technology , 2011 , 60 ( 1 ): 343 - 347 .
WICAKSANA H , TING S H , GUAN Y L , et al . Decode-and-forward two-path half-duplex relaying:diversity-multiplexing tradeoff analysis [J ] . IEEE Transactions on Communications , 2011 , 59 ( 7 ): 1985 - 1994 .
REN C , CHEN J , KUO Y , et al . Differential successive relaying scheme for fast and reliable data delivery in vehicular ad hoc,networks [J ] . IET Communications , 2015 , 9 ( 8 ): 1088 - 1095 .
NOMIKOS N , CHARALAMBOUS T , KRIKIDIS I , et al . A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems [J ] . IEEE Transactions on Communications , 2014 , 63 ( 5 ): 1623 - 1634 .
HE X , YENER A . Cooperation with an untrusted relay:a secrecy perspective [J ] . IEEE Transactions on Information Theory , 2009 , 56 ( 8 ): 3807 - 3827 .
SUN L , ZHANG T , LI Y , et al . Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes [J ] . IEEE Transactions on Vehicular Technology , 2012 , 61 ( 8 ): 3801 - 3807 .
JEONG C , KIM I M , DONG I K . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system [J ] . IEEE Transactions on Signal Processing , 2012 , 60 ( 1 ): 310 - 325 .
MO J , TAO M , LIU Y , et al . Secure beamforming for MIMO two-way communications with an untrusted relay [J ] . IEEE Transactions on Signal Processing , 2013 , 62 ( 9 ): 2185 - 2199 .
JU M C , KIM D H , HWANG K S . Opportunistic transmission of nonregenerative network with untrusted relay [J ] . IEEE Transactions on Vehicular Technology , 2015 , 64 ( 6 ): 2703 - 2709 .
HUANG J , MUKHERJEE A , SWINDLEHURST A L . Secure communication via an untrusted non-regenerative relay in fading channels [J ] . IEEE Transactions on Signal Processing , 2013 , 61 ( 10 ): 2536 - 2550 .
KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 7 ): 3866 - 3876 .
WANG W , TEH K C , LI K H . Relay selection for secure successive af relaying networks with untrusted nodes [J ] . IEEE Transactions on Information Forensics & Security , 2016 , 11 ( 11 ): 2466 - 2476 .
0
浏览量
746
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构