Cooperative interference power allocation in physical layer security under imperfect time synchronization
Papers|更新时间:2024-06-05
|
Cooperative interference power allocation in physical layer security under imperfect time synchronization
Journal on CommunicationsVol. 40, Issue 11, Pages: 86-93(2019)
作者机构:
1. 电子科技大学通信抗干扰技术国家级重点实验室,四川 成都 611731
2. 成都工业学院网络与通信工程学院,四川 成都 611730
作者简介:
基金信息:
The National Key Research and Development Program of China(2018YFB1801903);The National Natural Science Foundation of China(61771115);The National Natural Science Foundation of China(61771107);The National Natural Science Foundation of China(61701075);The National Natural Science Foundation of China(61531009);The Nationa1 Major Projects of China(2016ZX03001009);Sichuan Science and Technology Program(2019JDRC0006)
Wenbo GUO, Changqing SONG, Rong WEN, et al. Cooperative interference power allocation in physical layer security under imperfect time synchronization[J]. Journal on Communications, 2019, 40(11): 86-93.
DOI:
Wenbo GUO, Changqing SONG, Rong WEN, et al. Cooperative interference power allocation in physical layer security under imperfect time synchronization[J]. Journal on Communications, 2019, 40(11): 86-93. DOI: 10.11959/j.issn.1000-436x.2019214.
Cooperative interference power allocation in physical layer security under imperfect time synchronization
a power allocation scheme was proposed to maximize the system secrecy capacity.By analyzing the residual interference power at the authorized receiver caused by imperfect time synchronization
the optimal power distribution method was given
and the relationship between the optimal interference power and the relative channel quality was discussed.Theory and simulation analysis show that when the synchronization error is small
the synchronization error consumes extra power to reach the preset secrecy capacity
and the interference power increases with its increase.As the synchronization error increases
the secrecy capacity of the system gradually fails to reach the preset target
ZHANG L J , LIU Z H , ZHANG H B , et al . Wireless secure enhancement with cooperative jamming [J ] . Journal on Communications , 2017 , 38 ( 2 ): 183 - 195 .
HONGLIANG H , QINGHE D , PINYI R , et al . Joint feedback and artificial noise design for secure communications over fading channels without eavesdropper’s CSI [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 12 ): 11414 - 11418 .
CHAKRABORTY P , PRAKRIYA S . Secrecy performance of an idle receiver assisted underlay secondary network [J ] . IEEE Transactions on Vehicular Technology , 2017 , 66 ( 10 ): 9555 - 9560 .
ANJOS G , CASTANHEIRA D , SILVA A , et al . Exploiting reciprocal channel estimations for jamming to secure wireless communications [C ] // 2017 Wireless Days . IEEE , 2017 : 136 - 142 .
CHOI Y , LEE J H . Power allocation for cooperative jamming in amplify-and-forward relaying network with eavesdropper [C ] // 2015 IEEE 81st Vehicular Technology Conference . IEEE , 2015 : 1 - 5 .
KUHESTANI A , MOHAMMADI A , MOHAMMADI M . Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 13 ( 2 ): 341 - 355 .
HE B , NI Q , CHEN J , et al . User-pair selection in multiuser cooperative networks with an untrusted relay [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 1 ): 869 - 882 .
LEE J H . Full-duplex relay for enhancing physical layer security in multi-hop relaying systems [J ] . IEEE Communications Letters , 2015 , 19 ( 4 ): 525 - 528 .
ZHANG M , LIU Y , ZHANG R . Artificial noise aided secrecy information and power transfer in OFDMA systems [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 4 ): 3085 - 3096 .
WANG W , LI X R , YIN L G , et al . Secure resource allocation in hybird energy-harvesting relay and full-duplex receiver [J ] . Journal on Communications , 2019 , 40 ( 1 ): 114 - 122 .
SHEIKHOLESLAMI A , GOECKEL D PISHRO-NIK H . Jamming based on an ephemeral key to obtain everlasting security in wireless environments [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 11 ): 6072 - 6081 .
SICHITIU M L , VEERARITTIPHAN C . Simple,accurate time synchronization for wireless sensor networks [C ] // Wireless Communications & Networking . IEEE , 2003 : 1266 - 1273 .
DONG L , HAN Z , PETROPULU A P , et al . Cooperative jamming for wireless physical layer security [C ] // IEEE/SP Workshop on Statistical Signal Processing . IEEE , 2009 : 417 - 420 .
PARK K H , WANG T , ALOUINI M S . On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 9 ): 1741 - 1750 .
ZHENG G , CHOO L C , WONG K K . Optimal cooperative jamming to enhance physical layer security using relays [J ] . IEEE Transactions on Signal Processing , 2011 , 59 ( 3 ): 1317 - 1322 .