计算机科学 ›› 2017, Vol. 44 ›› Issue (7): 89-93.doi: 10.11896/j.issn.1002-137X.2017.07.016

• 网络与通信 • 上一篇    下一篇

融入LDPC纠错机制的认知无线电物理层认证分析

周雪倩,吴晓富,余训健   

  1. 南京邮电大学通信与信息工程学院 南京210003,南京邮电大学通信与信息工程学院 南京210003,南京邮电大学通信与信息工程学院 南京210003
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(61372123)资助

LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks

ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian   

  • Online:2018-11-13 Published:2018-11-13

摘要: 从信道纠错编码的角度来探讨认知无线电寄生认证信道的容量。首先,通过推导认证信道的对数似然比,给出了其简化计算方式,分析与仿真结果表明:简化计算与严格计算结果相仿,因而认证信道可等效为二元输入的加性高斯白噪声(BI-AWGN)信道。其次,基于对数似然比的简化形式,通过置信度传播迭代译码,考察了融入LDPC纠错机制的认证信道实际传输性能,仿真结果表明:实际简化译码的结果与理想BI-AWGN的译码性能无法区分。最终得出研究结论:认知无线电寄生认证信道可严格等效为BI-AWGN信道,因而可采用BI-AWGN信道设计的纠错编码来有效逼近寄生认证信道的传输极限。

关键词: 认知无线电,寄生认证信道,对数似然比,二元输入加性白噪声信道,纠错编码

Abstract: In this paper,the capacity of embedded primary transmitter authentication channel in cognitive radio is investigated.By employing the log-likelihood ratios(LLRs) of a tag bit and its approximation,we showed that the equivalent authentication channel observed by the secondary receiver can be viewed as a binary-input additive white Gaussian noise(BI-AWGN) channel.Then,we investigated the practical performance of the embedded authentication channel with the use of LDPC coding.With the approximate form of LLRs,we found that it performs very close to that of belief propagation decoding over the ideal BI-AWGN channel.Hence,we concluded that a good error-control coding scheme for a BI-AWGN channel is also good for embedded primary transmitter authentication channel,and the proposed approximate form of LLRs can be well exploited to facilitate the computation in practice with low complexity.

Key words: Cognitive radio,Embedded authentication channel,Log-likelihood ratios(LLRs),Binary-input additive white Gaussian noise(BI-AWGN) channel,Error-control coding

[1] STOTAS S,NALLANATHAN A.Enhancing the Capacity of Spectrum Sharing Cognitive Radio Networks [J].IEEE Tran-sactions on Vehicular Technology,2011,60(8):3768-3779.
[2] ZHAO C D,XIE L,JIANG X Y,et al.A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks[C]∥2010 International Conference on Communications and Mobile Computing (CMC).2010:154-158.
[3] SHU Z H,QIAN Y,CI S.On physical layer security for cognitive radio networks [J].IEEE Network,2013,27(3):28-33.
[4] SHANNON C E.Probability of error for optimal codes in a Gaussian channel [J].Bell System Technical Journal,1959,38(3):611-656.
[5] ZOU Y L,WANG X B,SHEN W M.Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks [J].IEEE Transactions on Communications,2013,61(12):5103-5113.
[6] SAKRAN H,SHOKAIR M,NASR O,et al.Proposed relay selection scheme for physical layer security in cognitive radio networks [J].IET Communications,2012,6(16):2676-2687.
[7] TAN X,BORLE K,DU W,et al.Cryptographic link signatures for spectrum usage authentication in cognitive radio [C]∥Proc.2011 ACM WiSec.2011:79-90.
[8] JIANG T,ZENG H,YAN Q,et al.On the limitation of embedding cryptographic signature for primary transmitter authentication [J].IEEE Wireless Communication Letter,2012,1(4):324-327.
[9] BORLE K M,CHEN B,DU W K.Physical Layer Spectrum Usa-ge Authentication in Cognitive Radio:Analysis and Implementation [J].IEEE Transaction Inference Forensics Security,2015,10(10):2225-2235.
[10] IDA A,FUJII T.Physical layer security using multi-band transmission considering channel selection for cognitive radio networks [C]∥Signal and Information Processing Association,Annual Summit and Conference(APSIPA).2014:1-5.
[11] ZOU Y L,ZHU J,YANG L Q,et al.Securing physical-layercommunications for cognitive radio networks [J].IEEE Communications,2015,53(9):48-54.
[12] CEPHELI O,KURT G K.Physical layer security in cognitive radio networks:A beamforming approach [C]∥First International Black Sea Conference Communications and Networking(BlackSeaCom).2013:233-237.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!