期刊文献+

一种多天线信道特征投影物理层安全编码算法 被引量:6

A Physical Layer Secrecy Coding Algorithm Using Multi-antenna Channel Characteristics Projection
在线阅读 下载PDF
导出
摘要 针对现有安全编码设计方法对信道条件依赖性强、收发无法共享随机性等问题,该文提出了一种多天线信道特征投影物理层安全编码算法。在满足信道互易性的时分双工系统中,多天线发射机根据单天线接收机发送的训练符号估计信道得到授权信道特征,利用信道特征投影生成投影矢量对,发射每个符号时随机选择投影矢量作为发射权重矢量,窃听接收机由于还原码字的汉明距离发生随机置乱而无法正确译码,从而实现安全传输。仿真结果表明:该算法使窃听者的误比特率接近0.5,授权接收机的误比特率较已有多天线物理层安全传输方法低一个数量级。 This paper proposed a physical layer secrecy coding algorithm using multi-antenna channel characteristics projection in consideration of the existing secrecy coding's problems, such as channel condition dependence and random sharing. In channel reciprocal Time-Division-Duplex (TDD) system, multi-antenna transmitter estimates the authorized channel characteristics according to the training symbols transmitted by the single-antenna receiver, and then generates the pair of projected vectors through multi-antenna channel characteristics projection.While transmitting weighted vector is randomly selected from the pair of projected vectors symbol-by-symbol, the Hamming distances of wiretapper's demodulated codewords are radomly confused so that it is hard to decode normally and secure transmission is qualified, Simulation results show that the scheme makes the wiretapper's BER near approximately 0.5 and the authorized receiver's BER a level lower than the existing methods of multi-antenna physical layer secure transmission.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第7期1653-1658,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61171108)资助课题
关键词 物理层安全编码 信道特征投影 汉明距离 发射权重矢量 Physical layer secrecy coding Channel characteristics projection Hamming distance Transmitting weighted vector
  • 相关文献

参考文献12

  • 1Shiu Y S, Chang S Y, et al.. Physical layer security in wireless networks: a tutorial [J]. IEEE Wireless Communications, 2011, 24(4): 1276-1284.
  • 2Debbah M, Gamal H E, Poor H V, et al.. Wireless Physical Layer Security [J]. EURASIP Journal on Wireless Communications and Networking, 2009, 2009: 1-2.
  • 3Shannon C E. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715.
  • 4Wyner A D. The wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 5Klinc D, Ha J, McLaughlin S M, et al.. LDPC codes for the Gaussian wiretap channel [C]. Proceedings of Information Theory Workshop (ITW), Taormina, Sicily, Italy, 2009: 95-99.
  • 6Khisti A and Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088-3104.
  • 7Khisti A and Wornell G W. Secure transmission with multiple antennas -- Part II: the MIMOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.
  • 8Goel S and Negi R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
  • 9Zhou X and McKay M R. Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation [J]. IEEE Transactions on Vehicular Technology, 2010, 59(8): 3831-3842.
  • 10Li X, Hwu J, redundancy and transmissions [J]. 24-32. and Ratazzi E P. Using antenna array channel diversity for secure wireless Journal of Communications, 2007, 2(3).

二级参考文献11

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献35

同被引文献61

  • 1Ozarow L H,Wyner A D.Wire-tap channel Ⅱ[J].Bell System Technical Journal,1984,63(10):2135-2137.
  • 2Thangaraj A,Dihidar S,Calderbank A R.Applications of LDPC codes to the wire-tap channel[J].IEEE Transactions on Information theory,2007,53 (8):2933-2945.
  • 3Belfiore J C,Oggier F.Lattice codes design for the Rayleigh fading wire-tap channel[C]//Proceedings of IEEE International Conference on Communications Workshops.2011:1-5.
  • 4Mahdavifar H,Vardy A.Achieving the secrecy capacity of wiretap channels using polar codes[J].IEEE Transactions on Information Theory,2011,57(10):6428-6443.
  • 5Klinc D,Ha J,Mclaughlin S W,et al.LDPC codes for physical layer security[C]//Proceedings of IEEE Global Telecommunications Conference.2009:1-6.
  • 6Andersson M.Coding for the wiretap channel[D].Sweden:School of Electrical Engineering Royal Institute of Technology,2011.
  • 7Kwark B J,Song N k,Park B,et al.Physical Layer security with Yarg Code[C]//Proceedings of IEEE International Conference on Emerging Network Intelligence.2009:43-48.
  • 8Baldi M,Bianchi M,Chiaraluce F.Non-systematic codes for physical layer security[C]//Proceedings of IEEE Information Theory Workshop.2009:1-5.
  • 9Harrison W K,Almeida J,McLaughlin S,et al.Coding for cryptographic security enhancement using stopping sets[J].IEEE Transaction on Information Forensics Security,2011,6 (3):575-584.
  • 10Baldi M,Bianchi M,Chiaraluce F.Coding with scrambling,concatenation,and HARQ for the AWGN wire-tap channel:A security gap analysis[J].IEEE Transaction on Information Forensics Security,2012,7 (3):883-894.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部