首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
该文研究存在多个相互勾结的单天线窃听者的多中继传输系统中,采用零空间人工噪声和放大转发的中继波束赋形的物理层安全传输方案。在中继窃听端的信道状态信息不准确的情况下,基于半定规划理论,对中继的波束赋形加权矩阵和人工噪声协方差矩阵进行联合优化,有效减少相互勾结的多个窃听者所获得的信息量,显著提高系统保密容量,是一种具有良好鲁棒性的物理层安全传输方案。仿真结果显示方案具有良好的性能。  相似文献   

2.
针对传统信息论物理层安全研究中,对合法用户信道质量要求较高的问题,文中提出随机波束成型的物理层安全传输方法。该方法通过在主信道特征向量的垂直方向构造人工随机波束成型信道,使得合法用户与窃听方信道传输特征的差异性转化为信道质量的差异,最终得到正的保密容量。为保证算法的完备性,文章解决了三方面问题:1)给出随机波束成型的空间构造方法;2)随机波束成型方法的保密容量和最佳信源分布;3)人工随机信道的构造方法。最后针对采用随机波束成型算法的发送分集系统,通过设计、仿真其噪声发生和功率分配方案,进一步说明即使在合法用户信道质量差的情况下,随机波束成型传输算法也可获得保密传输容量。   相似文献   

3.
该文在同频全双工技术快速发展的背景下,针对物理层安全研究中波束成形技术的高复杂度和发端天线选择(TAS)技术的低性能,提出一种联合发端天线选择和收端人工噪声(AN)的物理层安全传输方法TAS-rAN。首先,有多根天线的发端,利用天线选择技术,选取能使合法接收方接收信噪比最大的天线发送保密消息;其次,有同频全双工能力的收端,在接收到消息的同时,发送人工噪声来扰乱窃听方对保密消息的窃听。在Nakagami-m信道下,推导了安全中断概率的闭合表达式,并基于此,得到非零安全容量的概率表达式;通过渐进安全中断概率的推导,得到TAS-rAN方法的安全分集度。仿真结果表明,与已有的TAS-single和TAS-Alamouti方法相比,TAS-rAN安全方法具有较强的稳定性,且能提供更优的安全性能。  相似文献   

4.
为了解决安全空间调制系统中合法信道增益差的问题,提出了一种用智能反射面(Intelligent Reflective Surface,IRS)实现空间调制的物理层安全传输方案。IRS接收到发射端发射的幅相调制信号后,通过选择不同的IRS反射元件序号对空域部分信息进行映射,再将信号反射到接收端,以增大窃听端获取完整信息的难度。此外,在发射端采用波束赋形和天线分集技术,提高了系统有效性和可靠性。对系统的保密速率和误比特率进行的理论分析和仿真实验结果表明,所提方案不仅可以提高系统保密速率,还可以降低合法接收端的误比特率。  相似文献   

5.
研究了基于TD-SCDMA系统的下行波束赋形,利用最大信干噪比准则计算出天线的加权系数,在发送端进行赋形,并做了仿真,结果表明下行波束赋形能明显降低接收端误码率,进而降低了基站发射功率。  相似文献   

6.
黄莹  吕刚明  朱世华 《通信学报》2014,35(2):24-201
针对下行蜂窝无线通信系统,提出了一种基于接收矢量估计辅助优化的分布式协调波束赋形方案。该方案通过在发射端间共享少量信息,并基于MVDR准则对接收端的接收矢量进行估计,从而优化发送波束赋形矢量设计。仿真结果和分析表明,该分布式方案能以较低的开销和算法复杂度获得接近于集中式方案的性能。此外,还提出了一种简化方案,该方案可进一步降低系统开销。  相似文献   

7.
多流波束赋形技术是LTE-Advanced中采用的多天线增强技术。采用单用户多流波束赋形技术,可以使得单个用户在某一时刻可以进行多个数据流传输,在提升系统性能上表现出极大优势。提出一种LTE-Advanced中下行单用户自适应多流波束赋形算法,基站端基于接收模型对下行链路容量进行预估计,在一定信噪比要求的条件下,以信道容量最大化准则选择波束赋形流数。仿真结果表明,自适应算法增加了波束赋形系统的灵活性,能够有效提高LTE-Advanced系统中下行链路性能。  相似文献   

8.
《无线电通信技术》2018,(3):224-229
物理层安全作为一种密钥缺省的安全方案,逐渐成为信息安全和无线通信两个领域的交叉热点,其主要利用物理层传输资源保证合法接收者正常通信,同时抑制窃听信道通信。针对这一特点,提出了基于无线通信网络中窃听用户多天线、发送端多用户调度,合法接收端选择最好用户的模型,这时窃听用户进行随机选择,分析这种情况下主信道信噪比、窃听信道信噪比、安全传输速率以及窃听用户天线数目对系统安全性能的影响。仿真结果表明,窃听信道多天线时中断概率增加,即降低了系统的安全性能,但增加发送端用户数目、降低窃听信道信噪比、增加主信道信噪比可以显著提高系统的安全速率。同时证明,这种方案同随机选择发送用户相比较,切实提高了系统的安全性能。  相似文献   

9.
当多用户MIMO系统中的用户数多于或等于发射端天线数时,现有的基于人工噪声的物理层加密算法会导致合法用户无法正常接收。为提高此时的多用户MIMO系统的安全性,该文提出一种新的基于人工噪声的多用户MIMO系统加密算法。首先,发送端对多个合法用户进行联合处理,建立多用户联合信道状态矩阵;然后,将联合信道状态矩阵进行奇异值分解,并根据最小的奇异值进行预编码,以消除人工噪声对合法用户的影响;最后,提出一种优化功率分配的方案。仿真结果表明,该算法将多用户MIMO系统的保密容量平均增加了0.1 bit/(s?Hz),从而提高多用户MIMO系统的安全性。  相似文献   

10.
康小磊  季新生  黄开枝  王婧 《电子学报》2016,44(11):2767-2772
传统物理层安全人工噪声方法无法带来合法用户可靠性增强.针对该问题,提出一种新型动态人工噪声生成方法,发送方利用噪声发送时权系数剩下的最后一个的自由度,来改变合法接收方收到的人工噪声的相位,使得噪声方向与瞬时信号方向对齐,以提升合法用户瞬时接收信噪比.首先给出了具体的实现方法,然后给出理论上相应的性能分析和复杂度分析.仿真结果表明在对窃听者造成同等干扰水平下该方法能够有效提升合法用户性能.  相似文献   

11.
侯晓赟  黄庭金  朱艳  范伟 《信号处理》2014,30(11):1263-1266
针对未来多天线通信系统的安全问题,提出了一种增强无线物理层安全的传输策略。该策略基于发射天线的选择以及人工噪声,并采用Alamouti编码。它可以使发射机和接收机以较低的复杂度代价提高合法信道的分集增益,同时有效干扰窃听信道,使通信系统获得更高的安全容量。对系统安全容量、天线数量、以及信息信号与人工噪声之间的功率分配等问题进行了研究,仿真结果表明,该传输策略能够有效地增强物理层安全。   相似文献   

12.
韩帅  王金明  孟维晓  徐赛  李静涛 《信号处理》2022,38(9):1872-1880
近些年来,人们一直在开发可重构智能表面(Reconfigurable Intelligent Surface, RIS),它是一种由许多无源反射器组成的低成本结构,可以自由地改变每个元素的反射系数,并重新配置无线传输环境以改变入射信号的传播。由于具有若干新型和独特的优势,RIS应用场景广泛,关于其在物理层安全中应用的研究蓬勃发展。与此同时,物理层安全研究中窃听者的信道状态信息(Channel State Information,CSI)一直是人们讨论的热点,实际通信场景中窃听CSI通常是不易获取或未知的。因此本文考虑了一个更接近现实的情况,即针对窃听CSI未知的场景,考虑存在一个合法接收者以及多个非法窃听者,从功率分配的角度出发,结合波束成形,设计一种多RIS辅助的人工噪声与功率分配方案,通过对基站波束成形矩阵和RIS反射系数的交替优化,并应用二分法,使得在合法接收用户信号质量不变的前提下,降低基站处发送保密信息至合法用户所需的功率,降低其接收信号的信干噪比,进而提高系统的保密容量。同时考虑到了多个RIS协作辅助保密通信不一定最优,并可能增加系统优化的复杂度,设计了多个 RIS的选择方案,在保证通信系统保密性的同时,进一步提高了能量效率。通过对所设计算法进行复杂度分析,证明了所设计方案的可行性和有效性。接着对联合波束成形RIS辅助的人工噪声方案进行了仿真分析。最后得出结论,即窃听CSI未知时,通过合理联合优化RIS和基站波束成形进行功率分配,并结合多RIS选择技术,可以降低窃听者处信号质量,同时提高通信系统的能量效率,最终实现保密通信。   相似文献   

13.
This paper considers a full-duplex (FD) secure transmission scheme with aid of the artificial noise deployed at both transmitter and receiver under imperfect self-interference cancellation. The expressions of secrecy and connection outage probabilities are derived, and hence, the secrecy throughput of the proposed scheme is evaluated. The results show that the performance of the proposed FD scheme outperforms that of conventional half-duplex and FD receiver schemes in terms of the secrecy outage probability. In addition, the proposed FD scheme can achieve high secrecy throughput under various locations of the eavesdropper. Especially when the eavesdropper is located close to the transmitter, the secrecy throughput of the proposed FD scheme is nearly double that of the half-duplex scheme with artificial noise injection while that of the scheme with FD jamming receiver goes to zero.  相似文献   

14.
In this paper we present a new scheme combining artificial noise beam forming and secrecy coding to strengthen the security of existing wireless communication systems. Artificial noise and beam forming guarantee a radio advantage to legitimate users, enabling the use of our secrecy coding scheme to provide reliability and secrecy. This overall security protocol is compliant with existing widespread radio access technologies and it can be considered as a key-free add-on to improve security of the physical layer of wireless networks.  相似文献   

15.
雷维嘉  周洋 《电子学报》2020,48(6):1041-1051
研究多入多出(Multiple Input Multiple Output,MIMO)同时同频全双工双向通信系统中,合法节点在接收信息的同时向对方发送保密信息,并发送零空间人工噪声干扰窃听节点的物理层安全方案的优化问题.针对窃听信道状态信息仅统计分布已知,且存在残余自干扰的情况,首先推导出系统平均保密和速率的闭合表达式,进一步给出其下界.在此基础上,以最大化系统该下界为目标,对两节点的信息信号与人工噪声的功率分配因子、信息信号的功率分配矩阵进行联合优化.采用迭代的方法进行优化,每轮迭代中,先固定前者,优化后者,再固定后者,优化前者.使用DC(Difference of Concave/Convex,DC)规划优化信息信号功率分配矩阵,使用遗传算法优化信息信号与人工噪声的功率分配因子.对所提方案进行了仿真验证,证明理论推导正确,优化算法能有效地提高系统的平均保密和速率.  相似文献   

16.
常玉晴  芮贤义 《信号处理》2020,36(10):1784-1788
在无线通信系统的实际传输中,当窃听用户距离合法接受者足够近,或者位于合法接收机信号的无线电波路径上时,就会出现主信道与窃听信道相关的场景。为此我们考虑一个多输入单输出,并且存在单天线被动窃听者的无线通信系统,研究了当基站采用最大比技术发射技术发送信号时,相关对系统性能的影响。推导了安全中断概率与平均安全容量的闭合表达式。数值仿真结果表明:(1)当主信道的信道质量高于窃听信道时,较低的相关对系统安全中断概率性能影响不大,然而强相关却能够带来更低的安全中断概率;(2)该相关对系统平均安全容量始终是有害的,且随着相关程度的增强,最大比发射技术相对于天线选择的优势逐渐变小。   相似文献   

17.
This paper considers a multiuser multiple‐input single‐output (MISO) broadcasting system with simultaneous wireless information and power transfer (SWIPT), which consists of one information receiver (IR) and several energy harvesting receivers (ERs) which are capable of eavesdropping the legitimate signals. For reducing cost and hardware complexity, transmit antenna selection (TAS) is applied in the transmitter. We aim to maximize the achievable secrecy rate under the individual energy harvesting constraint at the ERs and the transmit power constraint at the transmitter by jointly optimizing TAS, transmit beamforming, and artificial noise (AN). The joint optimization problem is a non‐convex mixed integer programming problem. We apply variable replacements to decouple the variable couplings and relax and approach the binary constraint by the difference of two convex constraints. Afterwards, penalty method and constrained concave convex procedure (CCCP) are applied to transform the relaxed problem into a sequence of semi‐definiteness programming (SDP) problems. Simulation results shows that our proposed joint optimization scheme is superior over existing non‐joint optimization schemes. This paper studies the joint transmit antenna selection (TAS), transmit beamforming, and artificial noise (AN) optimization in a multiple‐input multiple‐output (MISO) wiretap system with simultaneous wireless information and power transfer (SWIPT). The joint optimization problem is nonconvex and we propose a penalty method based scheme to solve it. The simulation results show that our joint optimization scheme is superior to other non‐joint optimization schemes.  相似文献   

18.
The secrecy rate of limited feedback beamforming is studied for a Multiple-Input Single-Output(MISO) wiretap channel with a multi-antenna eavesdropper.We first obtain the secrecy rate of limited feedback beamforming achieved at the legitimate receiver.We then derive a lower bound for the asymptotic secrecy rate in the large system limit.From this bound,we observe a threshold for the ratio of eavesdrop antennas to transmit antennas to obtain a positive secrecy rate.We further show that the secrecy rate loss due to limited feedback decays with the number of feedback bits per transmit antenna.  相似文献   

19.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

20.

EHONs (Energy Harvesting Overlay Networks) satisfy stringent design requirements such as high energy-and-spectrum utilization efficiencies. However, due to open access nature of these networks, eavesdroppers can emulate cognitive radios to wire-tap legitimate information, inducing information security to become a great concern. In order to protect legitimate information against eavesdroppers, this paper generates artificial noise transmitted simultaneously with legitimate information to interfere eavesdroppers. Nonetheless, artificial noise cannot be perfectly suppressed at legitimate receivers as for its primary purpose of interfering only eavesdroppers. Moreover, channel information used for signal detection is hardly estimated at receivers with absolute accuracy. As such, to quickly evaluate impact of channel estimation-and-artificial noise cancellation imperfection on secrecy performance of secondary/primary communication in ANaEHONs (Artificial Noise-aided EHONs), this paper firstly proposes precise closed-form formulas of primary/secondary SOP (Secrecy Outage Probability). Then, computer simulations are provided to corroborate these formulas. Finally, various results are illustrated to shed insights into secrecy performance of ANaEHON with key system parameters from which optimum parameters are recognized. Notably, secondary/primary communication can be secured at different levels by flexibly adjusting various parameters of the proposed system model.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号