双向中继无线网络中的安全传输设计

Miao Luo, Qinye Yin
{"title":"双向中继无线网络中的安全传输设计","authors":"Miao Luo, Qinye Yin","doi":"10.1109/TENCON.2018.8650482","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Transmission Designs in Two-Way Relay Wireless Networks\",\"authors\":\"Miao Luo, Qinye Yin\",\"doi\":\"10.1109/TENCON.2018.8650482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).\",\"PeriodicalId\":132900,\"journal\":{\"name\":\"TENCON 2018 - 2018 IEEE Region 10 Conference\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TENCON 2018 - 2018 IEEE Region 10 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TENCON.2018.8650482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TENCON 2018 - 2018 IEEE Region 10 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENCON.2018.8650482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文研究了在一个窃听者存在的情况下,由两个合法终端节点组成的双向中继无线网络在N个中间节点的帮助下相互通信的物理层传输安全问题。我们提出了一种协同中继和干扰策略,该策略选择一个中间节点对窃听者产生有意干扰,而其他K = N−1个中间节点以中继模式运行,并使用放大转发(AF)协议协助源节点将数据发送到相应的目的地。该系统中所有N个中间节点都在每个节点的功率约束下。当K≥3时,我们提出了基于零空间波束形成的两种不同的系统设计准则,一种是采用分率法迭代求得最大保密和速率,另一种是最大化两个终端之间的最小保密和速率。对于上述方案(K < 3),我们还提出了中间节点数量不足时的改进安全方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security Transmission Designs in Two-Way Relay Wireless Networks
In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Frequency Profile Improvement of a Microgrid through Aggregated Demand Response A Study on Coarse Stage Bit Allocation to Improve Power Efficiency of a 10-bit Coarse-Fine SAR ADC Implemented in 65nm CMOS Process for Environmental Sensing Applications Analysis on the Limitation of Number of Channels in WDM System Based on Photonic Microring Resonator BMK Stick: IMU-Based Motion Recognition Air Mouse and Five-Multikey Keyboard Demand Response for Enhancing Survivability of Microgrids During Islanded Operation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1