{"title":"Research on BSS in Artificial Noise aided secure communication","authors":"Li Xinxin, Cai Xiaoxia, Dong Wei","doi":"10.1109/ICCSN.2016.7586671","DOIUrl":null,"url":null,"abstract":"The broadcast nature of wireless channels leads to the developments and applications of physical layer security techniques. The Artificial Noise (AN) aided technique is proposed to interfere with the eavesdropper for secure communications. A suppression method called Joint Approximate Diagonalization of Eigen-matrices (JADE), which is based on blind source separation algorithm (BSS), is presented under this circumstance. The eavesdropper is able to separate the communication signal and the noise. Simulation results demonstrate that the proposed method is feasible under certain circumstances, which helps the eavesdropper to defeat the AN aided secure communications effectively.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2016.7586671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The broadcast nature of wireless channels leads to the developments and applications of physical layer security techniques. The Artificial Noise (AN) aided technique is proposed to interfere with the eavesdropper for secure communications. A suppression method called Joint Approximate Diagonalization of Eigen-matrices (JADE), which is based on blind source separation algorithm (BSS), is presented under this circumstance. The eavesdropper is able to separate the communication signal and the noise. Simulation results demonstrate that the proposed method is feasible under certain circumstances, which helps the eavesdropper to defeat the AN aided secure communications effectively.