双向中继无线网络中的安全传输设计

Miao Luo, Qinye Yin
{"title":"双向中继无线网络中的安全传输设计","authors":"Miao Luo, Qinye Yin","doi":"10.1109/TENCON.2018.8650482","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Transmission Designs in Two-Way Relay Wireless Networks\",\"authors\":\"Miao Luo, Qinye Yin\",\"doi\":\"10.1109/TENCON.2018.8650482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).\",\"PeriodicalId\":132900,\"journal\":{\"name\":\"TENCON 2018 - 2018 IEEE Region 10 Conference\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TENCON 2018 - 2018 IEEE Region 10 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TENCON.2018.8650482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TENCON 2018 - 2018 IEEE Region 10 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENCON.2018.8650482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文研究了在一个窃听者存在的情况下,由两个合法终端节点组成的双向中继无线网络在N个中间节点的帮助下相互通信的物理层传输安全问题。我们提出了一种协同中继和干扰策略,该策略选择一个中间节点对窃听者产生有意干扰,而其他K = N−1个中间节点以中继模式运行,并使用放大转发(AF)协议协助源节点将数据发送到相应的目的地。该系统中所有N个中间节点都在每个节点的功率约束下。当K≥3时,我们提出了基于零空间波束形成的两种不同的系统设计准则,一种是采用分率法迭代求得最大保密和速率,另一种是最大化两个终端之间的最小保密和速率。对于上述方案(K < 3),我们还提出了中间节点数量不足时的改进安全方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security Transmission Designs in Two-Way Relay Wireless Networks
In this paper, we investigate physical-layer transmission security problem of a two-way relay wireless network consisting of two legitimate terminal nodes who wants to communicate with each other in presence of one eavesdropper, with help of N intermediate nodes. We propose a cooperative relaying and jamming strategy, which selecting one intermediate node to create intentional interference upon the eavesdropper, while other K = N −1 intermediate nodes operating in relay mode and assisting the source nodes to deliver data to their corresponding destinations using an amplify-and-forward (AF) protocol. All N intermediate nodes in this system are under a per-node power constraint. When K ≥ 3, we propose two different system design criteria based on null-space beamforming, to maximize secrecy sum rate by rate-splitting method with a bisection numerical algorithm iteratively getting the maximal secrecy sum rate, or to maximize the minimum rate between the two terminals. And we also propose the modified security schemes when the number of intermediate nodes is not enough for the previously mentioned schemes (K < 3).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信