计算机科学 ›› 2016, Vol. 43 ›› Issue (4): 163-166.doi: 10.11896/j.issn.1002-137X.2016.04.033

• 信息安全 • 上一篇    下一篇

基于时频资源分配的认知无线中继网络物理层安全研究

高锐锋,倪丹艳,包志华,胡英东   

  1. 南通大学交通学院 南通226001;南通大学电子信息学院 南通226001,南通大学电子信息学院 南通226001,南通大学电子信息学院 南通226001,南通大学电子信息学院 南通226001
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61371111,61371112)资助

Time-bandwidth Allocation Scheme for Physical Layer Security in Cooperative Cognitive Radio Networks

GAO Rui-feng, NI Dan-yan, BAO Zhi-hua and HU Ying-dong   

  • Online:2018-12-01 Published:2018-12-01

摘要: 提出了一种在认知无线中继网络物理层安全意义下的最优时频资源分配方案。在该方案中,主用户通过次用户的协作进行通信;作为回馈,允许次用户接入该频段传输信息。在次用户网络中,选择两个最优次用户,一个用作协作转发,一个用作协作干扰,同时在保证次用户网络传输速率的条件下,通过寻求系统的最优带宽分配因子、时隙分配因子以及次用户的协作功率,来最大化主用户的安全容量。仿真结果表明,提出的方案切实可行,能够显著提高主用户的安全容量。

关键词: 认知无线中继网络,物理层安全,时隙分配,带宽分配

Abstract: Cognitive radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems.We proposed a time-bandwidth allocation scheme for physical layer security in cognitive radio networks,in which the primary users (PUs) communicate with the help of the secondary users (SUs).As feedback,PUs share the bandwidth with SUs for the communication of the secondary network.Particularly,we selected two SUs,a relay SU and a jammer SU,to maximize the physical secrecy capacity of the PUs on the premise of meeting the lowest transmission rate requirement of the SUs.The optimal bandwidth allocation factor,time allocation factor and the cooperative power allocation of the SUs were given in this paper.Numerical results show that the proposed scheme can improve the secrecy capacity of the PUs significantly.

Key words: Cooperative cognitive radio networks,Physical security,Time allocation,Bandwidth allocation

[1] Wei Ji-bo,Wang Shan,Zhao Hai-tao.Cognitive wireless net-works:key techniques and sate of the art [J].Journal on Communications,2011(11):147-158(in Chinese) 魏急波,王杉,赵海涛.认知无线网络:关键技术与研究现状[J].通信学报,2011(11):147-158
[2] Zhou Xian-wei,Meng Tan,Wang Li-na,et al.Summary of the Research on Cognitive Radio[J].Telecommunication Engineering,2006(6):1-6(in Chinese) 周贤伟,孟潭,王丽娜,等.认知无线电研究综述[J].电讯技术,2006(6):1-6
[3] Kartalopoulos S V.A primer on cryptography in communica-tions[J].Communications Magazine,IEEE,2006,4(4):146-51
[4] Zhou Jian,Zhou Xian-wei,Sun Li-yan.Key exchange protocols of cognitive radio based on self certified[J].Computer Science,2010,37(6):94-96(in Chinese) 周健,周贤伟,孙丽艳.基于自认证的认知无线电密钥交换协议研究[J].计算机科学,2010,37(6):94-96
[5] Shannon C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,8(4):656-715
[6] Wyner A D.The wire-tap channel[J].Bell System TechnicalJournal,1975,4(8):1355-1387
[7] Lun D,Zhu H,Petropulu A P,et al.Improving Wireless Physical Layer Security via Cooperating Relays[J].IEEE Transactions on Signal Processing,2010,8(3):1875-1888
[8] Maric I,Yates R D.Bandwidth and Power Allocation for Coo-perative Strategies in Gaussian Relay Networks[J].IEEE Tran-sactions on Information Theory,2010,6(4):1880-1889
[9] Haohao Q,Xiang C,Yin S,et al.Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications[C]∥2011 IEEE International Conference on Communications Workshops (ICC).2011:5-9
[10] Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].Network,IEEE,2015,9(1):42-48
[11] Ning Z,Ning L,Nan C,et al.Towards secure communications in cooperative cognitive radio networks[C]∥2013 IEEE/CIC International Conference on Communications in China (ICCC).2013:12-14
[12] Jain A,Kulkarni S R,Verdu S.Energy Efficiency of Decode-and-Forward for Wideband Wireless Multicasting[J].IEEE Transactions on Information Theory,2011,7(12):7695-713
[13] Ning K,et al.Performance Comparison Among ConventionalSelection Combining[C]∥2009 IEEE International Conference on Optimum Selection Combining and Maximal Ratio Combining(ICC’09).2009:14-18

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!