无线中继网络中的目的地辅助秘密传输

Shaobo Jia, Jiayan Zhang, Honglin Zhao, Ruoyu Zhang
{"title":"无线中继网络中的目的地辅助秘密传输","authors":"Shaobo Jia, Jiayan Zhang, Honglin Zhao, Ruoyu Zhang","doi":"10.1109/VTCFall.2016.7880959","DOIUrl":null,"url":null,"abstract":"To improve physical (PHY) layer security of a wireless relay system in the presence of an eavesdropper, a two-phase cooperative relaying scheme is investigated in this paper. In phase I, the source transmits confidential message, simultaneously, it cooperates with the friendly jammers and destination to create jamming signal at the eavesdropper without affecting the forwarding relay which is preselected. In phase II, the forwarding relay retransmits the decoded signal, meanwhile, the particular relay cooperates with the friendly jammers to create jamming signal at the eavesdropper without affecting the destination. We focus on the investigation of optimal power allocation for maximizing achievable secrecy rate subject to a total power constraint. Optimal relay selection and suboptimal relay selection schemes are also proposed. It is shown that as the number of relays increases, both secrecy rate and the performance of suboptimal relay selection scheme improve significantly. Numerical results are presented to validate the derived analytical results and compare them to existing work","PeriodicalId":6484,"journal":{"name":"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)","volume":"101 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Destination Assisted Secret Transmission in Wireless Relay Networks\",\"authors\":\"Shaobo Jia, Jiayan Zhang, Honglin Zhao, Ruoyu Zhang\",\"doi\":\"10.1109/VTCFall.2016.7880959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To improve physical (PHY) layer security of a wireless relay system in the presence of an eavesdropper, a two-phase cooperative relaying scheme is investigated in this paper. In phase I, the source transmits confidential message, simultaneously, it cooperates with the friendly jammers and destination to create jamming signal at the eavesdropper without affecting the forwarding relay which is preselected. In phase II, the forwarding relay retransmits the decoded signal, meanwhile, the particular relay cooperates with the friendly jammers to create jamming signal at the eavesdropper without affecting the destination. We focus on the investigation of optimal power allocation for maximizing achievable secrecy rate subject to a total power constraint. Optimal relay selection and suboptimal relay selection schemes are also proposed. It is shown that as the number of relays increases, both secrecy rate and the performance of suboptimal relay selection scheme improve significantly. Numerical results are presented to validate the derived analytical results and compare them to existing work\",\"PeriodicalId\":6484,\"journal\":{\"name\":\"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)\",\"volume\":\"101 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VTCFall.2016.7880959\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTCFall.2016.7880959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

为了提高存在窃听者时无线中继系统物理层的安全性,研究了一种两相协作中继方案。在第一阶段,源端发送机密报文,同时与友方干扰机和目的端合作,在不影响预选转发中继的情况下,在窃听端产生干扰信号。在阶段II中,转发中继将解码后的信号进行重传,同时,特定中继与友方干扰机合作,在不影响目标的情况下在窃听器处产生干扰信号。我们重点研究了在总功率约束下,为使可实现的保密率最大化而进行的最优功率分配。提出了最优中继选择和次最优中继选择方案。结果表明,随着中继数量的增加,次优中继选择方案的保密率和性能都有显著提高。数值结果验证了推导出的分析结果,并与已有工作进行了比较
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Destination Assisted Secret Transmission in Wireless Relay Networks
To improve physical (PHY) layer security of a wireless relay system in the presence of an eavesdropper, a two-phase cooperative relaying scheme is investigated in this paper. In phase I, the source transmits confidential message, simultaneously, it cooperates with the friendly jammers and destination to create jamming signal at the eavesdropper without affecting the forwarding relay which is preselected. In phase II, the forwarding relay retransmits the decoded signal, meanwhile, the particular relay cooperates with the friendly jammers to create jamming signal at the eavesdropper without affecting the destination. We focus on the investigation of optimal power allocation for maximizing achievable secrecy rate subject to a total power constraint. Optimal relay selection and suboptimal relay selection schemes are also proposed. It is shown that as the number of relays increases, both secrecy rate and the performance of suboptimal relay selection scheme improve significantly. Numerical results are presented to validate the derived analytical results and compare them to existing work
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信