N. Kolokotronis, Kyriakos Fytrakis, A. Katsiotis, N. Kalouptsidis
{"title":"资源受限监听器的安全无线通信合作","authors":"N. Kolokotronis, Kyriakos Fytrakis, A. Katsiotis, N. Kalouptsidis","doi":"10.1109/GLOCOMW.2014.7063626","DOIUrl":null,"url":null,"abstract":"Wireless communications system designs are sought that rely on the potential of the physical (PHY) layer to allow a transmitter-receiver pair communicate securely in the presence of one or more eavesdroppers. Communication is performed with the help of multiple trusted relays, via the decode-and-forward (DF) protocol, and assuming knowledge of global channel state information (CSI). Instead of dealing with information-theoretic security, we assume that eavesdroppers have bounded resources, and therefore we need to assure that the transmitted information is computationally secure; this is shown to impose constraints on the maximum power of the signals received by the eavesdroppers. The optimal relay weights that maximize the signal-to-noise ratio (SNR) difference SNRd - SNRe between the destination and the eavesdroppers are determined under various (transmit, security, reliability) power constraints. Closed-form solutions are obtained in some problem formulations for one eavesdropper, whereas an iterative algorithm is proposed if more eavesdroppers are present. Simulation results indicate that a higher SNR value (compared to the non-cooperative case) is attained at the destination, while satisfying the security constraints.","PeriodicalId":354340,"journal":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Cooperation for secure wireless communications with resource-bounded eavesdroppers\",\"authors\":\"N. Kolokotronis, Kyriakos Fytrakis, A. Katsiotis, N. Kalouptsidis\",\"doi\":\"10.1109/GLOCOMW.2014.7063626\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless communications system designs are sought that rely on the potential of the physical (PHY) layer to allow a transmitter-receiver pair communicate securely in the presence of one or more eavesdroppers. Communication is performed with the help of multiple trusted relays, via the decode-and-forward (DF) protocol, and assuming knowledge of global channel state information (CSI). Instead of dealing with information-theoretic security, we assume that eavesdroppers have bounded resources, and therefore we need to assure that the transmitted information is computationally secure; this is shown to impose constraints on the maximum power of the signals received by the eavesdroppers. The optimal relay weights that maximize the signal-to-noise ratio (SNR) difference SNRd - SNRe between the destination and the eavesdroppers are determined under various (transmit, security, reliability) power constraints. Closed-form solutions are obtained in some problem formulations for one eavesdropper, whereas an iterative algorithm is proposed if more eavesdroppers are present. Simulation results indicate that a higher SNR value (compared to the non-cooperative case) is attained at the destination, while satisfying the security constraints.\",\"PeriodicalId\":354340,\"journal\":{\"name\":\"2014 IEEE Globecom Workshops (GC Wkshps)\",\"volume\":\"93 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Globecom Workshops (GC Wkshps)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOCOMW.2014.7063626\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2014.7063626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cooperation for secure wireless communications with resource-bounded eavesdroppers
Wireless communications system designs are sought that rely on the potential of the physical (PHY) layer to allow a transmitter-receiver pair communicate securely in the presence of one or more eavesdroppers. Communication is performed with the help of multiple trusted relays, via the decode-and-forward (DF) protocol, and assuming knowledge of global channel state information (CSI). Instead of dealing with information-theoretic security, we assume that eavesdroppers have bounded resources, and therefore we need to assure that the transmitted information is computationally secure; this is shown to impose constraints on the maximum power of the signals received by the eavesdroppers. The optimal relay weights that maximize the signal-to-noise ratio (SNR) difference SNRd - SNRe between the destination and the eavesdroppers are determined under various (transmit, security, reliability) power constraints. Closed-form solutions are obtained in some problem formulations for one eavesdropper, whereas an iterative algorithm is proposed if more eavesdroppers are present. Simulation results indicate that a higher SNR value (compared to the non-cooperative case) is attained at the destination, while satisfying the security constraints.