浏览全部资源
扫码关注微信
1. 太原科技大学电子信息工程学院,山西 太原 030024
2. 北京邮电大学信息与通信工程学院,北京 100876
3. 北京市网络与体系架构重点实验室,北京 100876
[ "李美玲(1982-),女,山西宁武人,太原科技大学副教授,主要研究方向为无线通信关键技术、认知无线网络、协作通信。" ]
[ "董增寿(1979-),男,山西寿阳人,博士,太原科技大学教授,主要研究方向为故障诊断、图像处理与模式识别、专网通信技术等。" ]
[ "王钢飞(1981-),男,山西清徐人,太原科技大学助教,主要研究方向为信道估计、协作频谱感知。" ]
[ "路兆铭(1986-),男,河南安阳人,博士,北京邮电大学讲师,主要研究方向为软件定义无线网络、能源互联网等。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
李美玲, 董增寿, 王钢飞, 等. 基于多窃听协作的最佳中继安全可靠性能研究[J]. 通信学报, 2017,38(10):71-80.
Mei-ling LI, Zeng-shou DONG, Gang-fei WANG, et al. Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay[J]. Journal on communications, 2017, 38(10): 71-80.
李美玲, 董增寿, 王钢飞, 等. 基于多窃听协作的最佳中继安全可靠性能研究[J]. 通信学报, 2017,38(10):71-80. DOI: 10.11959/j.issn.1000-436x.2017199.
Mei-ling LI, Zeng-shou DONG, Gang-fei WANG, et al. Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay[J]. Journal on communications, 2017, 38(10): 71-80. DOI: 10.11959/j.issn.1000-436x.2017199.
物理层安全技术可以有效地对抗窃听行为,提高主链路传输的可靠性。考虑存在多个窃听攻击的无线中继网络,且信源到目的端的直传链路始终存在,中继节点和窃听节点在转发数据时均采用解码转发方式,提出了基于多窃听协作的最佳中继选择方案;推导了非中继传输系统和最佳中继传输系统的中断概率和截获概率表达式;分析了不同的中继选择方案对安全可靠性能的影响。仿真结果表明,不同的中继选择方案将直接影响到目的节点可获得的信道容量及系统中断概率;所提方案可以实现更低的系统中断概率;系统中断概率和截获概率均随着中继数的增加而降低,随着窃听节点数的增加,截获概率有所提高,但是当中继数大于窃听节点数时,可以有效抑制截获概率,保证主链路安全传输。
Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered
in the presence of the link from source to destination.A best relay selection scheme based on multieavesdropper’s cooperation was proposed
and the outage probability and the intercept probability was deduced under both schemes without relay and with best relay.Then
the security and reliability influenced by different relay selection schemes were analyzed.The simulation results show that the achievable channel capacity at the destination node and the system outage probability are directly affected by different relay selection scheme.Lower system outage probability can be achieved by the proposed scheme
and the system outage probability and intercept probability are both decreased with the increase of the number of relays.The intercept probability increases with the increase of the number of eavesdroppers
which
however
can be reduced by increasing the number of relays to ensure the main link’s reliable transmission.
LI J , FENG Z , FENG Z , et al . A survey of security issues in cognitive radio networks [J ] . China Communications , 2015 , 12 ( 3 ): 132 - 149 .
ZOU Y , ZHU J , WANG X . A survey on wireless security:technical challenges,recent advances,and future trends [J ] . Proceedings of the IEEE , 2016 , 104 ( 9 ): 1727 - 1765 .
MUKHERJEE A , FAKOORIAN S A , HUANG J , et al . Principles of physical layer security in multiuser wireless networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 3 ): 1550 - 1573 .
都晨辉 . 协作网络中物理层安全关键技术研究 [D ] . 北京:北京邮电大学 , 2014 .
DU C H . Physical layer security in collaboration communications networks [D ] . Beijing:Beijing University of Posts and Telecommunications , 2014 .
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy [J ] . IEEE Transactions on Information Theory , 2008 , 54 ( 9 ): 4005 - 4019 .
ZHANG J , GURSOY M . Collaborative relay beamforming for secrecy [J ] . Mathematics , 2010 : 1 - 5 .
GOECKEL D , VASUDEVAN S , TOWSLEY D , et al . Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2011 , 29 ( 10 ): 2067 - 2076 .
LIAO W , CHANG T , MA W , et al . QoS-based transmit beamforming in the presence of eavesdroppers:an optimized artificial-noise-aided approach [J ] . IEEE Transactions on Signal Processing , 2011 , 59 ( 3 ): 1202 - 1216 .
ZOU Y , WANG X , SHEN W . Optimal relay selection for physical-layer security in cooperative wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 10 ): 2099 - 2111 .
ZOU Y , WANG X , SHEN W . Security versus reliability analysis of opportunistic relaying [J ] . IEEE Transactions on Vehicular Technology , 2014 , 63 ( 6 ): 2653 - 2661 .
ZOU Y , ZHU J , WANG X , et al . Improving physical-layer security in wireless communications using diversity techniques [J ] . IEEE Network , 2014 , 29 ( 1 ): 42 - 48 .
DAI B , MA Z . Multiple-access relay wiretap channel [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1835 - 184 .
CHEN J C , ZHANG R Q , SONG L , et al . Joint relay and jammer selection for secure two-way relay networks [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 1 ): 310 - 320 .
DING X , SONG T , ZOU Y , et al . Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection [J ] . Transactions on Emerging Telecommunications Technologies , 2016 , 27 ( 7 ): 982 - 991 .
李美玲 . 基于中继的协作频谱感知性能分析及优化 [J ] . 通信学报 , 2013 , 34 ( 9 ): 33 - 40 .
LI M L . Performance analysis and optimization of cooperative specterum sensing with relay [J ] . Journal on Communications , 2013 , 34 ( 9 ): 33 - 40 .
LIU T X , SONG L Y . A threshold-based hybrid relay selection scheme [C ] // The Wireless Communications and Networking Conference Workshops . 2010 : 1 - 5 .
0
浏览量
1036
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构