数据采集与处理
數據採集與處理
수거채집여처리
JOURNAL OF DATA ACQUISITION & PROCESSING
2015年
4期
766-773
,共8页
物理层安全%多用户调度%协作干扰%安全中断概率%安全分集度
物理層安全%多用戶調度%協作榦擾%安全中斷概率%安全分集度
물리층안전%다용호조도%협작간우%안전중단개솔%안전분집도
physical layer security%multi-user scheduling%cooperative jammer%secrecy outage probabili-ty%secrecy diversity order
物理层安全策略作为一种利用无线信道物理特性来对抗窃听者的有效手段,已经吸引了越来越多的关注。本文重点研究多用户调度与协作干扰技术在无线通信物理层安全方面的表现,并将两种技术有机结合,深入研究无线网络的通信安全。通过联合采用多用户调度方案与协作干扰技术以增强无线通信安全,在多用户无线通信网络中,采用多用户调度策略,在选择最优信道进行通信的同时,对窃听节点进行协作干扰,在合法用户端通过波束权重矩阵对干扰信号进行合并以消除干扰信号对接收端的影响,最终达到在不干扰合法通信的前提下极大地干扰窃听信道,最终增强无线网络的通信安全。数值仿真表明,联合多用户调度与协作干扰的方案的安全中断概率明显低于仅采用多用户调度的方案。
物理層安全策略作為一種利用無線信道物理特性來對抗竊聽者的有效手段,已經吸引瞭越來越多的關註。本文重點研究多用戶調度與協作榦擾技術在無線通信物理層安全方麵的錶現,併將兩種技術有機結閤,深入研究無線網絡的通信安全。通過聯閤採用多用戶調度方案與協作榦擾技術以增彊無線通信安全,在多用戶無線通信網絡中,採用多用戶調度策略,在選擇最優信道進行通信的同時,對竊聽節點進行協作榦擾,在閤法用戶耑通過波束權重矩陣對榦擾信號進行閤併以消除榦擾信號對接收耑的影響,最終達到在不榦擾閤法通信的前提下極大地榦擾竊聽信道,最終增彊無線網絡的通信安全。數值倣真錶明,聯閤多用戶調度與協作榦擾的方案的安全中斷概率明顯低于僅採用多用戶調度的方案。
물리층안전책략작위일충이용무선신도물리특성래대항절은자적유효수단,이경흡인료월래월다적관주。본문중점연구다용호조도여협작간우기술재무선통신물리층안전방면적표현,병장량충기술유궤결합,심입연구무선망락적통신안전。통과연합채용다용호조도방안여협작간우기술이증강무선통신안전,재다용호무선통신망락중,채용다용호조도책략,재선택최우신도진행통신적동시,대절은절점진행협작간우,재합법용호단통과파속권중구진대간우신호진행합병이소제간우신호대접수단적영향,최종체도재불간우합법통신적전제하겁대지간우절은신도,최종증강무선망락적통신안전。수치방진표명,연합다용호조도여협작간우적방안적안전중단개솔명현저우부채용다용호조도적방안。
Physical layer security (PLS) is an effective means to protect communications against eaves‐dropping attacks by exploiting physical characteristics of wireless channels .As the information and com‐munication technology (ICT) has been developed for decades ,PLS attracts more and more attention of researchers .Here ,PLS performance of the joint multi‐user scheduling and the cooperative jammer selec‐tion is explored .With the combination of the two techniques ,the wireless communication security is in‐vestigated .In a wireless communication system with multiple users ,multi‐user scheduling schemes are adopted to choose one legitimate user of the best channel to transmit signals .Meanwhile ,the eavesdrop‐pers are interfered to keep the transmissions between BS and legitimate users confidential for avoiding the interference to the legitimate users .CJ signal is designed so that nulls are formed at the legitimate users . Simulation results show that the joint multi‐user scheduling and cooperative jammer scheme has a better performance of security than the multi‐user scheduling scheme .