Computer Science ›› 2019, Vol. 46 ›› Issue (6): 168-173.doi: 10.11896/j.issn.1002-137X.2019.06.025

Previous Articles     Next Articles

Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference

PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you   

  1. (College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)
  • Received:2018-05-01 Published:2019-06-24

Abstract: Regarding to the security threat of information transmission brought by external eavesdropper in wireless communication system,this paper proposed a secure transmission scheme that source node sends source information and artificial interference simultaneously.To effectively eliminate the impact of artificial interference signal on the correct recovery of source information,the LMS adaptive algorithm was applied to estimate and eliminate the artificial interfe-rence signal.To verify the effectiveness of the proposed scheme,the QPSK modulation system was taken as an example,and a simple artificial interference signal was designed.Through the MATLAB simulation of the bit error rate of the system,the effectiveness of the proposed scheme is verified,and the optimal step size and filter order of the LMS adaptive algorithm in the proposed scheme are obtained.

Key words: Artificial interference, Bit error rate, Interference cancellation, LMS algorithm, Physical layer security

CLC Number: 

  • TN918.91
[1]WYNER A D.The wire-tap channel [J].The Bell System Technical Journal,1975,54(8):1355-1387.
[2]ZHOU L.Research on Physical Layer Security of Cognitive Radio Based on Cooperative Communication[C]∥2015 Sixth International Conference on Intelligent Systems Design and Enginee-ring Applications.Guiyang:IEEE Press,2015:661-664.
[3]LI L,PETROPULU A P,CHEN Z,et al.Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference [J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1433-1448.
[4]WANG L,TEH K C,LI K H.Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks [J].IEEE Transactions on Information Forensics and Security,2017,12(6):1470-1482.
[5]HU L,WEN H,WU B,et al.Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks[J].IEEE Communications Letters,2017,21(3):524-527.
[6]ZHANG Q,GAO Y,ZANG G,et al.Physical layer security for cooperative communication system with untrusted relay based on jamming signals[C]∥2015 International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-4.
[7]YANG Y,CHEN J,HUANG Y,et al.Secure Transmission of Wireless Relaying Systems with Jammer and Multiple-User Selection[J].IEEE Access,2017,5:8771-8779.
[8]LONG H,WANG J,ZHANG Y Y,et al.Cooperative Jamming Technique:Proposal,Survey and Future[J].Telecommunications Science,2013,29(1):109-114.(in Chinese)
龙航,王静,张月莹,等.协作干扰技术的提出、现状和未来展望[J].电信科学,2013,29(1):109-114.
[9]HAYKIN S.Adaptive Filter Theory[M].Upper Saddle River:Prentice Hall,2002:325-415.
[10]WIDROW B,GOODLIN R C.Adaptive noise canceling:principles and applications[J].Proceedings of the IEEE,1975,63(12):1692-1716.
[11]HUANG B.Performance Analysis of NCLMS-based PCMA [C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1375-1378.
[12]ARIF M,NASEEM I,MOINUDDIN M,et al.Adaptive noise cancellation using q-LMS[C]∥2017 International Conference on Innovations in Electrical Engineering and Computational Technologies.Karachi:IEEE Press,2017:1-4.
[13]LIU J,QUAN H,LI Z,et al.Digital Nonlinear Self-Interference Cancellation Based on LMS-Volterra Algorithm[C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1298-1302.
[14]GORRIZ J M,RAMIREZ J,CRUCES-ALVAREZ,et al.A Novel LMS Algorithm Applied to Adaptive Noise Cancellation[J].IEEE Signal Processing Letters,2009,16(1):34-37.
[15]JIN J,WANG X,YU Y B,et al.Adaptive De-noising Method of Ballistocar diogram Based on Orthogonal Wavelet Transform[J].Computer Science,2010,37(8):232-235.(in Chinese)
金晶晶,王旭,于艳波,等.基于正交小波变换的心冲击图自适应去噪方法[J].计算机科学,2010,37(8):232-235.
[16]PANDA S,MOHANTY M N.Performance analysis of LMS based algorithms used for impulsive noise cancellation[C]∥2016 International Conference on Circuit,Power and Computing Technologies.Nagercoil:IEEE Press,2016:1-4.
[17]PROAKIS J G.Digital Communications (Fifth Edition)[M].New York:McGraw-Hill,2007:101-103.
[18]LI B,LIANG T.Cooperative jamming secure scheme for un-trusted full-duplex relay system[C]∥2016 2nd IEEE International Conference on Computer and Communication (ICCC).Chengdu:IEEE Press,2016:2328-2331.
[19]LV L,CHEN J,YANG L,et al.Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J].IET Communication,2017,11(3):393-399.
[20]HE B,SHE Y,LAU V K N.Artificial Noise Injection for Securing Single-Antenna Systems[J].IEEE Transactions on Vehicular Technology,2017,66(10):9577-9581.
[1] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[2] CHEN Pei-pei, LI Tao-shen, FANG Xing, WANG Zhe. Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System [J]. Computer Science, 2020, 47(6): 316-321.
[3] XI Chen-jing,GAO Yuan-yuan,SHA Nan. Performance Study on Constellation Obfuscation Design Method for Physical Layer Security [J]. Computer Science, 2020, 47(3): 304-311.
[4] TIAN Xian-zhong, YAO Chao, ZHAO Chen, DING Jun. 5G Network-oriented Mobile Edge Computation Offloading Strategy [J]. Computer Science, 2020, 47(11A): 286-290.
[5] JI Bao-feng, WANG Yi-dan, XING Bing-bing, LI Yu-qi, GAO Hong-feng, HAN Cong-cheng. Enhancement Method of Throughput in Ultra-dense Network Based on Hierarchical Multi-hop Physical Layer Network Coding [J]. Computer Science, 2019, 46(7): 56-60.
[6] CHENG Zhen, ZHAO Hui-ting, ZHANG Yi-ming, LIN Fei. Bit Error Rate Analysis of Diffusion-based Multicast Molecular Communication Networks [J]. Computer Science, 2019, 46(11): 80-87.
[7] LU Ming-yue, GUO Dao-xing and NIU He-hao. New Physical Layer Network Coding Denoising Mapping Algorithm Based on MQAM [J]. Computer Science, 2017, 44(Z6): 284-287.
[8] LIU Chun-ling and ZHANG Zi-hao. Performance Analysis of Beidou Receiver under Interference [J]. Computer Science, 2017, 44(2): 163-170.
[9] TIAN Xin-ji and LU Jing. Improved Interference Cancellation Method over X Channel [J]. Computer Science, 2015, 42(5): 157-159.
[10] ZHANG Xiao-rong, WU Cheng-mao and LI Wen-xue. Method of Constructing Spread-spectrum Code Based on Chaos and Self-coded [J]. Computer Science, 2015, 42(3): 42-46.
[11] ZHOU Lu-na, LIU Feng and ZENG Lian-sun. Research on Degrees of Freedom of Two PTP Networks Coexistence [J]. Computer Science, 2015, 42(1): 110-112.
[12] SHEN Hu,LV Shao-he,WANG Xiao-dong and ZHOU Xing-ming. Distributed Collision-resolvable MAC Protocol for Wireless LANs with Interference Cancellation Support [J]. Computer Science, 2014, 41(12): 60-66.
[13] YUAN Xiao-gang,HUANG Guo-ce,,LIU Jian,GUO Xing-yang. Adaptive FH Cosite Interference Cancellation Using Laguerre Filter [J]. Computer Science, 2009, 36(11): 93-96.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!