浏览全部资源
扫码关注微信
1. 电子科技大学通信抗干扰技术国家级重点实验室,四川 成都 611731
2. 成都工业学院网络与通信工程学院,四川 成都 611730
[ "郭文博(1994– ),男,四川南充人,电子科技大学博士生,主要研究方向为协同干扰抑制、物理层安全和全双工通信等。" ]
[ "宋长庆(1996– ),男,江苏徐州人,电子科技大学硕士生,主要研究方向为无线通信信号处理、全双工通信自干扰抑制技术等。" ]
[ "文荣(1987– ),女,广西桂林人,成都工业学院助教,主要研究方向为多天线信号处理、通信抗干扰技术。" ]
[ "赵宏志(1978– ),男,河北石家庄人,博士,电子科技大学教授、博士生导师,主要研究方向为无线通信信号处理、通信抗干扰技术、同时同频全双工技术、并行化通信信号处理等。" ]
[ "唐友喜(1964– ),男,河南潢川人,博士,电子科技大学教授、博士生导师,主要研究方向为无线通信抗干扰技术、同时同频全双工技术、高效固态射频功率放大器技术以及软件无线电技术等。" ]
网络出版日期:2019-11,
纸质出版日期:2019-11-25
移动端阅览
郭文博, 宋长庆, 文荣, 等. 不完美时间同步下物理层安全协同干扰功率分配[J]. 通信学报, 2019,40(11):86-93.
Wenbo GUO, Changqing SONG, Rong WEN, et al. Cooperative interference power allocation in physical layer security under imperfect time synchronization[J]. Journal on communications, 2019, 40(11): 86-93.
郭文博, 宋长庆, 文荣, 等. 不完美时间同步下物理层安全协同干扰功率分配[J]. 通信学报, 2019,40(11):86-93. DOI: 10.11959/j.issn.1000-436x.2019214.
Wenbo GUO, Changqing SONG, Rong WEN, et al. Cooperative interference power allocation in physical layer security under imperfect time synchronization[J]. Journal on communications, 2019, 40(11): 86-93. DOI: 10.11959/j.issn.1000-436x.2019214.
物理层安全中,考虑不完美时间同步,提出了一种使通信系统保密容量最大化的协同干扰功率分配方法。通过分析授权接收机处由不完美时间同步引入的残余干扰功率,给出了最优功率分配方法,并讨论了最优干扰功率与相对信道质量之间的关系。理论和仿真分析表明,当同步误差较小时,需要消耗额外功率来达到预设的保密容量,且干扰功率随误差增大而增大;随着误差进一步增大,系统保密容量渐渐无法达到预设目标,甚至可能降至0。
In physical layer security
considering imperfect time synchronization
a power allocation scheme was proposed to maximize the system secrecy capacity.By analyzing the residual interference power at the authorized receiver caused by imperfect time synchronization
the optimal power distribution method was given
and the relationship between the optimal interference power and the relative channel quality was discussed.Theory and simulation analysis show that when the synchronization error is small
the synchronization error consumes extra power to reach the preset secrecy capacity
and the interference power increases with its increase.As the synchronization error increases
the secrecy capacity of the system gradually fails to reach the preset target
and may even drop to zero.
钟州 , 张波 , 戚晓慧 , 等 . 多天线全双工中继辅助的异构蜂窝网物理层安全性能分析 [J ] . 通信学报 , 2019 , 40 ( 5 ): 24 - 31 .
ZHONG Z , ZHANG B , QI X H , et al . Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network [J ] . Journal on Communications , 2019 , 40 ( 5 ): 24 - 31 .
WYNER A D . The wire-tap channel [J ] . Bell System Technical Journal , 1975 , 54 ( 8 ): 1355 - 1387 .
张丽娟 , 刘志宏 , 张洪波 , 等 . 协作干扰下的无线安全增强 [J ] . 通信学报 , 2017 , 38 ( 2 ): 183 - 195 .
ZHANG L J , LIU Z H , ZHANG H B , et al . Wireless secure enhancement with cooperative jamming [J ] . Journal on Communications , 2017 , 38 ( 2 ): 183 - 195 .
HONGLIANG H , QINGHE D , PINYI R , et al . Joint feedback and artificial noise design for secure communications over fading channels without eavesdropper’s CSI [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 12 ): 11414 - 11418 .
CHAKRABORTY P , PRAKRIYA S . Secrecy performance of an idle receiver assisted underlay secondary network [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 10 ): 9555 - 9560 .
ANJOS G , CASTANHEIRA D , SILVA A , et al . Exploiting reciprocal channel estimations for jamming to secure wireless communications [C ] // 2017 Wireless Days . IEEE , 2017 : 136 - 142 .
CHOI Y , LEE J H . Power allocation for cooperative jamming in amplify-and-forward relaying network with eavesdropper [C ] // 2015 IEEE 81st Vehicular Technology Conference . IEEE , 2015 : 1 - 5 .
KUHESTANI A , MOHAMMADI A , MOHAMMADI M . Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 13 ( 2 ): 341 - 355 .
HE B , NI Q , CHEN J , et al . User-pair selection in multiuser cooperative networks with an untrusted relay [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 1 ): 869 - 882 .
LEE J H . Full-duplex relay for enhancing physical layer security in multi-hop relaying systems [J ] . IEEE Communications Letters , 2015 , 19 ( 4 ): 525 - 528 .
ZHANG M , LIU Y , ZHANG R . Artificial noise aided secrecy information and power transfer in OFDMA systems [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 4 ): 3085 - 3096 .
王伟 , 李鑫睿 , 殷柳国 , 等 . 联合能量收集中继与全双工目的节点的安全资源分配方案 [J ] . 通信学报 , 2019 , 40 ( 1 ): 114 - 122 .
WANG W , LI X R , YIN L G , et al . Secure resource allocation in hybird energy-harvesting relay and full-duplex receiver [J ] . Journal on Communications , 2019 , 40 ( 1 ): 114 - 122 .
SHEIKHOLESLAMI A , GOECKEL D PISHRO-NIK H . Jamming based on an ephemeral key to obtain everlasting security in wireless environments [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 11 ): 6072 - 6081 .
SICHITIU M L , VEERARITTIPHAN C . Simple,accurate time synchronization for wireless sensor networks [C ] // Wireless Communications & Networking . IEEE , 2003 : 1266 - 1273 .
DONG L , HAN Z , PETROPULU A P , et al . Cooperative jamming for wireless physical layer security [C ] // IEEE/SP Workshop on Statistical Signal Processing . IEEE , 2009 : 417 - 420 .
PARK K H , WANG T , ALOUINI M S . On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 9 ): 1741 - 1750 .
ZHENG G , CHOO L C , WONG K K . Optimal cooperative jamming to enhance physical layer security using relays [J ] . IEEE Transactions on Signal Processing , 2011 , 59 ( 3 ): 1317 - 1322 .
0
浏览量
543
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构