Full duplex secret transmission scheme based on user cooperation
Papers|更新时间:2024-06-05
|
Full duplex secret transmission scheme based on user cooperation
Journal on CommunicationsVol. 38, Issue 1, Pages: 76-82(2017)
作者机构:
国家数字交换系统工程技术研究中心,河南 郑州 450002
作者简介:
基金信息:
The National Natural Science Foundation of China(61379006);The National Natural Science Foundation of China(61401510);The National Natural Science Foundation of China(61471396);The National Natural Science Foundation of China(61501516);The Innovation Group Program Project of National Natural Science Foundation of China(61521003);The National High Technology Research and Development of China(863 Program)(2014AA01A704)
Xiao-lei KANG, Xin-sheng JI, Lu XIA, et al. Full duplex secret transmission scheme based on user cooperation[J]. Journal on Communications, 2017, 38(1): 76-82.
DOI:
Xiao-lei KANG, Xin-sheng JI, Lu XIA, et al. Full duplex secret transmission scheme based on user cooperation[J]. Journal on Communications, 2017, 38(1): 76-82. DOI: 10.11959/j.issn.1000-436x.2017009.
Full duplex secret transmission scheme based on user cooperation
Full-duplex artificial noise scheme can achieve a limited improvement while the interference power keeps increasing and the full-duplex gain is null.To solve these two problems
a full-duplex secure transmission scheme based on user cooperation was proposed
in which the full-duplex receiver used partial power to send artificial noise
and transmitted the downlink signal by the remaining power to the user who shared the same frequency.In order to maximize the system secrecy rate
the beam vector of the desired signal and the artificial noise were designed.Besides
the optimal power allocation factor was obtained by one-dimensional search simply.Simulation results show that compared with the RS-ref and HD methods
the proposed method can achieve an approximate linear growth in high power and can obtain the full-duplex gain.
关键词
Keywords
references
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise [J ] . IEEE Transactions on Wireless Communications , 2008 , 7 ( 6 ): 2180 - 2189 .
KANG X L , JI X S , HUANG K Z . Secure D2D heterogeneous cellular communication based on artificial noise assisted [J ] . Journal on Communications , 2015 , 36 ( 10 ): 149 - 156 .
KHISTI A , WORNEL G W . Secure transmission with multiple antennas—part I:the MISOME wiretap channel [J ] . IEEE Transactions on Information Theory , 2010 , 56 ( 7 ): 3088 - 3104 .
LI J Y , PETROPULU A P . On ergodic secrecy rate for Gaussian MISO wiretap channels [J ] . IEEE Transactions onWireless Communications , 2011 , 10 ( 4 ): 1176 - 1187 .
WANG H M , ZHENG T , MU P . Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading [J ] . IEEE Transactions on Wireless Communications , 2014 , 14 ( 1 ): 5396 - 5401 .
KHISTI A , WORNELL G W . Secure transmission with multiple antennas—part II:The MIMOME wiretap channel [J ] . IEEE Transactions on Information Theory , 2010 , 56 ( 11 ): 5515 - 5532 .
LI N , TAO X F , XU J . Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback [J ] . IEEE Communications Letters , 2014 , 18 ( 6 ): 969 - 972 .
DONG L , HAN Z , PETROPULU A P , et al . Improving wireless physical layer security via cooperating relays [J ] . IEEE Transactions on Signal Processing , 2010 , 58 ( 3 ): 1875 - 1888 .
WANG C , WANG H M , XIA X G , et al . Uncoordinated jammer selection for securing SIMOME wiretap channels:a stochastic geometry approach [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 5 ): 2596 - 2612 .
LI W , GHOGHO M , CHEN B , et al . Secure communication via sending artificial noise by the receiver:outage secrecy capacity/ region analysis [J ] . IEEE Communications Letters , 2012 , 16 ( 10 ): 1628 - 1631 .
ZHOU Y , ZHU Y , LI F , et al . Securing communication via transmission of artificial noise by both sides:bipolar-beamforming optimization [J ] . Mathematical Problems in Engineering , 2013 , 18 ( 5 ): 708 - 716 .
ZHOU Y , XIANG Z Z , ZHU Y , et al . Application of full-duplex wireless technique into secure MIMO communication:achievable secrecy rate based optimization [J ] . IEEE Signal Processing Letters , 2014 , 21 ( 7 ): 804 - 808 .
ZHENG G , KRIKIDIS I , LI J , et al . Improving physical layer secrecy using full-duplex jamming receivers [J ] . IEEE Transactions on Signal Process , 2013 , 61 ( 20 ): 4962 - 4974 .