浏览全部资源
扫码关注微信
1. 华侨大学厦门市移动多媒体通信重点实验室,福建 厦门 361021
2. 东南大学信息科学与工程学院,江苏 南京 210096
[ "赵睿(1980-),男,江苏扬州人,博士,华侨大学教授,主要研究方向为无线通信信号处理、协作通信和物理层安全等。" ]
[ "谭星(1993-),男,重庆人,华侨大学硕士生,主要研究方向为物理层安全技术、协作中继通信技术等。" ]
[ "李元健(1993-),男,山东德州人,华侨大学硕士生,主要研究方向为无线通信信号处理、物理层安全技术等。" ]
[ "贺玉成(1964-),男,山西太原人,博士,华侨大学教授,主要研究方向为无线通信信号处理、深空通信和信道编码等。" ]
[ "李春国(1983-),男,山东胶州人,博士,东南大学教授、博士生导师,主要研究方向为新一代移动通信技术、MIMO-OFDM技术、协作通信和水下无线通信技术等。" ]
网络出版日期:2018-09,
纸质出版日期:2018-09-25
移动端阅览
赵睿, 谭星, 李元健, 等. 全双工加扰的非可信中继系统的渐近性能分析[J]. 通信学报, 2018,39(9):20-30.
Rui ZHAO, Xing TAN, Yuanjian LI, et al. Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination[J]. Journal on communications, 2018, 39(9): 20-30.
赵睿, 谭星, 李元健, 等. 全双工加扰的非可信中继系统的渐近性能分析[J]. 通信学报, 2018,39(9):20-30. DOI: 10.11959/j.issn.1000-436x.2018155.
Rui ZHAO, Xing TAN, Yuanjian LI, et al. Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination[J]. Journal on communications, 2018, 39(9): 20-30. DOI: 10.11959/j.issn.1000-436x.2018155.
在物理层安全领域,协作中继技术因具备提升网络容量和扩展网络覆盖范围等优点,受到学术界广泛关注。但是,协作中继在某些时候可能存在非可信情形。基于此,在瑞利衰落信道下,为提升非可信中继系统安全性能,提出一种多天线全双工目的节点加扰(FDJ
full-duplex destination jamming)策略。为最大化系统安全容量,针对多天线目的节点提出一种切换分离式最优天线选择(OAS
optimal antenna selection)方案,并设计出信源和目的节点功率分配优化方案,给出相应的安全性能指标闭合表达式。在大规模天线下,推导出 FDJ-OAS 策略的遍历可达安全速率和瞬时安全容量下最优功率分配因子闭合表达式。在不同的渐近条件下,推导出 FDJ-OAS 策略的安全中断概率的渐近线闭合表达式。仿真结果显示,理论分析与蒙特卡洛仿真曲线十分吻合,FDJ-OAS策略的安全分集阶数与天线数呈正比,可实现天线全分集,凸显了FDJ-OAS策略的性能优越性。
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community
due to the advantages of increasing the network capacity and expanding the network coverage.However
cooperative relays may play as untrusted nodes in some certain circumstances.Based on this
to enhance the secrecy performance of untrusted relay systems
a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity
a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination
the power allocation optimization scheme between the source and destination was designed
and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis
the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore
based on different asymptotic cases
the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved
which reveals the advantages of the proposed FDJ-OAS scheme.
DONG L , HAN Z , PETROPULU A P , et al . Improving wireless physical layer security via cooperating relays [J ] . IEEE Transactions on Signal Processing , 2010 , 58 ( 3 ): 1875 - 1888 .
ZHAO R , HUANG Y , WANG W , et al . Ergodic achievable secrecy rate of multiple antenna relay systems with cooperative jamming [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 4 ): 2537 - 2551 .
ZHAO R , YUAN Y , FAN L , et al . Secrecy performance analysis of cognitive decode and-forward relay networks in nakagami fading channels [J ] . IEEE Transactions on Communications , 2017 , 65 ( 2 ): 549 - 563 .
JEONG C , KIM I M , KIM D I . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system [J ] . IEEE Transactions on Signal Processing , 2012 , 60 ( 1 ): 310 - 325 .
SUN L , ZHANG T , LI Y , et al . Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes [J ] . IEEE Transactions on Vehicular Technology , 2012 , 61 ( 8 ): 3801 - 3807 .
HUANG J , MUKHERJEE A , SWIND L A L . Secure communication via an untrusted non-regenerative relay in fading channels [J ] . IEEE Transactions on Signal Processing , 2013 , 61 ( 10 ): 2536 - 2550 .
KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 7 ): 3866 - 3876 .
KALAMKAR S S , BANERJEE A . Secure communication via a wireless energy harvesting untrusted relay [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 3 ): 2199 - 2213 .
邓单 , 周雯 . 不可信无线中继网络中基于用户选择的安全通信研究 [J ] . 电子学报 , 2017 , 45 ( 7 ): 1593 - 1600 .
DENG D , ZHOU W . Secure selection for decode-and-forward cooperative networks with untrusted relay [J ] . Acta Electronica Sinica , 2017 , 45 ( 7 ): 1593 - 1600 .
KUHESTANI A , MOHAMMADI A . Destination-based cooperative jamming in untrusted amplify-and-forward relay networks:resource allocation and performance study [J ] . IET Communications , 2016 , 10 ( 1 ): 17 - 23 .
WANG L , ELKASHLAN M , HUANG J , et al . Secure transmission with optimal power allocation in untrusted relay networks [J ] . IEEE Wireless Communications Letters , 2014 , 3 ( 3 ): 289 - 292 .
CHEN X , CHEN J , LIU T . Secure transmission in wireless powered massive MIMO relaying systems:performance analysis and optimization [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 10 ): 8025 - 8035 .
CHEN X , LEI L , ZHANG H , et al . Large-scale MIMO relaying techniques for physical layer security:AF or DF [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 9 ): 5135 - 5146 .
SHARIF M , HASSIBI B . On the capacity of MIMO broadcast channels with partial side information [J ] . IEEE Transactions on Information Theory , 2005 , 51 ( 2 ): 506 - 522 .
ZHENG T X , WANG H M , YANG Q , et al . Safeguarding decentralized wireless networks using full-duplex jamming receivers [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 1 ): 278 - 292 .
MASOOD M , GHRAYEB A , BABU P , et al . A minorization- maximization algorithm for maximizing the secrecy rate of the MIMOME wiretap channel [J ] . IEEE Communications Letters , 2017 , 21 ( 3 ): 520 - 523 .
LI Y , ZHAO R , FAN L , et al . Antenna mode switching for full-duplex destination-based jamming secure transmission [J ] . IEEE Access , 2018 , 6 : 9442 - 9453 .
YANG K , CUI H , SONG L , et al . Efficient full-duplex relaying with joint antenna-relay selection and self-interference suppression [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 7 ): 3991 - 4005 .
ZHOU M , SONG L , LI Y , et al . Simultaneous bidirectional link selection in full duplex MIMO systems [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 7 ): 4052 - 4062 .
LV L , CHEN J , YANG L , et al . Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation [J ] . IET Communications , 2017 , 11 ( 3 ): 393 - 399 .
李博轮 , 梁涛 , 鲍丽娜 . 基于全双工非可信中继的物理层安全性能分析 [J ] . 军事通信技术 , 2016 , 37 ( 4 ): 29 - 33 .
LI B L , LIANG T , BAO L N . Analysis of physical layer secure scheme for untrusted full-duplex relay system [J ] . Military Communications Technology , 2016 , 37 ( 4 ): 29 - 33 .
LI C G , ZHANG S , LIU P , et al . Overhearing protocol design exploiting intercell interference in cooperative green networks [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 1 ): 441 - 446 .
吴飞 , 邵士海 , 唐友喜 . 一种基于多天线波束成形的全双工自干扰抵消算法 [J]. 电子学报 , 2017 , 45 ( 1 ): 8 - 15 .
WU F , SHAO S H , TANG Y X . A novel self-interference cancellation algorithm using multi-antenna beamforming in full-duplex system [J]. Acta Electronica Sinica , 2017 , 45 ( 1 ): 8 - 15 .
ZHANG Z , CHAI X , LONG K , et al . Full duplex techniques for 5G networks:self-interference cancellation,protocol design,and relay selection [J ] . IEEE Communications Magazine , 2015 , 53 ( 5 ): 128 - 137 .
GUO T , WANG B , WU W , et al . Secrecy-oriented antenna assignment optimization at full-duplex receiver with self-interference [J ] . IEEE Wireless Communications Letters , 2018 ,PP( 99 ):1.
LI L , CHEN Z , ZHANG D , et al . A full-duplex Bob in the MIMO Gaussian wiretap channel:Scheme and performance [J ] . IEEE Signal Processing Letters , 2016 , 23 ( 1 ): 107 - 111 .
CHEN D , CHENG Y , YANG W , et al . Physical layer security in cognitive untrusted relay networks [J ] . IEEE Access , 2018 , 6 : 7055 - 7065 .
CIRIK A C , BISWAS S , VUPPALA S , et al . Beamforming design for full-duplex MIMO interference channels-QoS and energy efficiency considerations [J ] . IEEE Transactions on Communications , 2016 , 64 ( 11 ): 4635 - 4651 .
BLOCH M , BARROS J , RODRIGUES M R D , et al . Wireless information-theoretic security [J ] . IEEE Transactions on Information Theory , 2008 , 54 ( 6 ): 2515 - 2534 .
ZHAO R , LIN H , HE Y C , et al . Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI [J ] . IEEE Transactions on Communications , 2018 , 66 ( 2 ): 546 - 559 .
GRADSHTEYN I S , RYZHIK I M . Table of integrals,series,and products [M ] . Manhattan : Academic PressPress , 2007 .
HUANG J , SWINDLEHURST A L . Cooperative jamming for secure communications in MIMO relay networks [J ] . IEEE Transactions on Signal Processing , 2011 , 59 ( 10 ): 4871 - 4884 .
王伟 , 安立源 , 章国安 , 等 . 能量受限全双工双向中继系统的波束成形设计 [J ] . 通信学报 , 2018 , 39 ( 2 ): 43 - 52 .
WANG W , AN L Y , ZHANG G A , et al . Beamforming design for energy-constrained full-duplex two-way relaying system [J ] . Journal on Communications , 2018 , 39 ( 2 ): 43 - 52 .
WANG R , TAO M , LIU Y . Optimal linear transceiver designs for cognitive two-way relay networks [J ] . IEEE Transactions on Signal Processing , 2013 , 61 ( 4 ): 992 - 1005 .
0
浏览量
1149
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构