Dual-Beam Dual-Frequency Secure Transmission for Downlink Satellite Communication Systems

Purui Wang, Zuyao Ni, Chunxiao Jiang, Linling Kuang, W. Feng
{"title":"Dual-Beam Dual-Frequency Secure Transmission for Downlink Satellite Communication Systems","authors":"Purui Wang, Zuyao Ni, Chunxiao Jiang, Linling Kuang, W. Feng","doi":"10.1109/GCWkshps45667.2019.9024580","DOIUrl":null,"url":null,"abstract":"In the multi-antenna satellite communication system, beamforming and artificial noise are usually adopted to enhance physical layer security. However, due to the long distance between the satellite and the terrestrial terminal, the coverage of the main lobe in the satellite downlink is so large that the eavesdropper can get into the coverage easily despite of using spot beams. When the eavesdropper is close to the legitimate user, the difference between the main channel and the wiretap channel is small, which makes the secrecy capacity decrease rapidly. This paper proposes a novel scheme to solve this problem by using two different beams which work on different frequencies to transmit the same signal to the legitimate user. This dual-beam dual- frequency scheme can enlarge the difference between the desired channel and the wiretap channel. Then, if we add some artificial noise set the proper beamforming vectors, the secrecy capacity will remain high when the eavesdropper is in the small zone near the legitimate user. In order to derive the artificial noise and the beamforming vectors, we transform the problem into a semidefinite problem and use CVX tools to solve the problem. Simulation results prove that this scheme can achieve high secrecy capacity even when the eavesdropper is very close to the legitimate user.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCWkshps45667.2019.9024580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In the multi-antenna satellite communication system, beamforming and artificial noise are usually adopted to enhance physical layer security. However, due to the long distance between the satellite and the terrestrial terminal, the coverage of the main lobe in the satellite downlink is so large that the eavesdropper can get into the coverage easily despite of using spot beams. When the eavesdropper is close to the legitimate user, the difference between the main channel and the wiretap channel is small, which makes the secrecy capacity decrease rapidly. This paper proposes a novel scheme to solve this problem by using two different beams which work on different frequencies to transmit the same signal to the legitimate user. This dual-beam dual- frequency scheme can enlarge the difference between the desired channel and the wiretap channel. Then, if we add some artificial noise set the proper beamforming vectors, the secrecy capacity will remain high when the eavesdropper is in the small zone near the legitimate user. In order to derive the artificial noise and the beamforming vectors, we transform the problem into a semidefinite problem and use CVX tools to solve the problem. Simulation results prove that this scheme can achieve high secrecy capacity even when the eavesdropper is very close to the legitimate user.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
下行卫星通信系统的双波束双频安全传输
在多天线卫星通信系统中,通常采用波束形成和人工噪声来提高物理层的安全性。然而,由于卫星与地面终端之间的距离较远,卫星下行链路主瓣的覆盖范围很大,即使使用点波束,窃听者也很容易进入该覆盖范围。当窃听者靠近合法用户时,主信道与窃听信道之间的差异很小,这使得保密能力迅速下降。本文提出了一种利用工作在不同频率上的两种不同波束向合法用户传输相同信号的新方案。这种双波束双频方案可以扩大所需信道与窃听信道之间的差异。然后,在适当的波束形成矢量上加入一些人工噪声,窃听者在合法用户附近的小区域内仍能保持较高的保密能力。为了推导出人工噪声和波束形成矢量,我们将该问题转化为半定问题,并利用CVX工具进行求解。仿真结果表明,即使窃听者离合法用户很近,该方案也能获得较高的保密能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Timeliness Analysis of Service-Driven Collaborative Mobile Edge Computing in UAV Swarm 5G Enabled Mobile Healthcare for Ambulances Secure Quantized Sequential Detection in the Internet of Things with Eavesdroppers A Novel Indoor Coverage Measurement Scheme Based on FRFT and Gaussian Process Regression A Data-Driven Deep Neural Network Pruning Approach Towards Efficient Digital Signal Modulation Recognition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1