计算机科学 ›› 2019, Vol. 46 ›› Issue (6): 168-173.doi: 10.11896/j.issn.1002-137X.2019.06.025
彭磊, 臧国珍, 高媛媛, 沙楠, 奚晨婧, 蒋炫佑
PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you
摘要: 针对外部窃听者对无线通信系统中的信息传输带来的安全威胁,首先提出了一种由源节点在发送源信息的同时发送人工干扰信号的安全传输方案。为有效消除人工干扰信号对合法目的端正确恢复源信息的影响,提出将LMS自适应算法应用于对接收信号中人工干扰信号的估计与消除。为检验所提方案的效果,文中以QPSK调制系统为例,专门设计了一种简单易行的人工干扰信号。通过对系统误比特率进行MATLAB仿真,验证了所提方案的有效性,并得到了所提方案中LMS自适应算法的最优步长因子和滤波器阶数。
中图分类号:
[1]WYNER A D.The wire-tap channel [J].The Bell System Technical Journal,1975,54(8):1355-1387. [2]ZHOU L.Research on Physical Layer Security of Cognitive Radio Based on Cooperative Communication[C]∥2015 Sixth International Conference on Intelligent Systems Design and Enginee-ring Applications.Guiyang:IEEE Press,2015:661-664. [3]LI L,PETROPULU A P,CHEN Z,et al.Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference [J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1433-1448. [4]WANG L,TEH K C,LI K H.Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks [J].IEEE Transactions on Information Forensics and Security,2017,12(6):1470-1482. [5]HU L,WEN H,WU B,et al.Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks[J].IEEE Communications Letters,2017,21(3):524-527. [6]ZHANG Q,GAO Y,ZANG G,et al.Physical layer security for cooperative communication system with untrusted relay based on jamming signals[C]∥2015 International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-4. [7]YANG Y,CHEN J,HUANG Y,et al.Secure Transmission of Wireless Relaying Systems with Jammer and Multiple-User Selection[J].IEEE Access,2017,5:8771-8779. [8]LONG H,WANG J,ZHANG Y Y,et al.Cooperative Jamming Technique:Proposal,Survey and Future[J].Telecommunications Science,2013,29(1):109-114.(in Chinese) 龙航,王静,张月莹,等.协作干扰技术的提出、现状和未来展望[J].电信科学,2013,29(1):109-114. [9]HAYKIN S.Adaptive Filter Theory[M].Upper Saddle River:Prentice Hall,2002:325-415. [10]WIDROW B,GOODLIN R C.Adaptive noise canceling:principles and applications[J].Proceedings of the IEEE,1975,63(12):1692-1716. [11]HUANG B.Performance Analysis of NCLMS-based PCMA [C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1375-1378. [12]ARIF M,NASEEM I,MOINUDDIN M,et al.Adaptive noise cancellation using q-LMS[C]∥2017 International Conference on Innovations in Electrical Engineering and Computational Technologies.Karachi:IEEE Press,2017:1-4. [13]LIU J,QUAN H,LI Z,et al.Digital Nonlinear Self-Interference Cancellation Based on LMS-Volterra Algorithm[C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1298-1302. [14]GORRIZ J M,RAMIREZ J,CRUCES-ALVAREZ,et al.A Novel LMS Algorithm Applied to Adaptive Noise Cancellation[J].IEEE Signal Processing Letters,2009,16(1):34-37. [15]JIN J,WANG X,YU Y B,et al.Adaptive De-noising Method of Ballistocar diogram Based on Orthogonal Wavelet Transform[J].Computer Science,2010,37(8):232-235.(in Chinese) 金晶晶,王旭,于艳波,等.基于正交小波变换的心冲击图自适应去噪方法[J].计算机科学,2010,37(8):232-235. [16]PANDA S,MOHANTY M N.Performance analysis of LMS based algorithms used for impulsive noise cancellation[C]∥2016 International Conference on Circuit,Power and Computing Technologies.Nagercoil:IEEE Press,2016:1-4. [17]PROAKIS J G.Digital Communications (Fifth Edition)[M].New York:McGraw-Hill,2007:101-103. [18]LI B,LIANG T.Cooperative jamming secure scheme for un-trusted full-duplex relay system[C]∥2016 2nd IEEE International Conference on Computer and Communication (ICCC).Chengdu:IEEE Press,2016:2328-2331. [19]LV L,CHEN J,YANG L,et al.Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J].IET Communication,2017,11(3):393-399. [20]HE B,SHE Y,LAU V K N.Artificial Noise Injection for Securing Single-Antenna Systems[J].IEEE Transactions on Vehicular Technology,2017,66(10):9577-9581. |
[1] | 陈佩佩, 李陶深, 方兴, 王哲. 能量收集全双工中继系统中的安全波束成形研究 Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System 计算机科学, 2020, 47(6): 316-321. https://doi.org/10.11896/jsjkx.190500115 |
[2] | 奚晨婧,高媛媛,沙楠. 物理层安全星座模糊设计方法的性能研究 Performance Study on Constellation Obfuscation Design Method for Physical Layer Security 计算机科学, 2020, 47(3): 304-311. https://doi.org/10.11896/jsjkx.190200369 |
[3] | 张培,张建明,王良民. 一种全双工认知中继网络中实现能量高效的安全传输方法 Design for Improving Energy-efficiency and Ensuring Physical-layer Security in Full-duplex Cognitive Relay Networks 计算机科学, 2017, 44(9): 172-177. https://doi.org/10.11896/j.issn.1002-137X.2017.09.033 |
[4] | 高锐锋,倪丹艳,包志华,胡英东. 基于时频资源分配的认知无线中继网络物理层安全研究 Time-bandwidth Allocation Scheme for Physical Layer Security in Cooperative Cognitive Radio Networks 计算机科学, 2016, 43(4): 163-166. https://doi.org/10.11896/j.issn.1002-137X.2016.04.033 |
[5] | 刘锋,王媛媛,曾连荪. 点对点信道与两用户广播信道并存时的自由度 Degrees of Freedom of Coexistence Network with Point-to-Point and Two-user Broadcast Channels 计算机科学, 2016, 43(2): 129-134. https://doi.org/10.11896/j.issn.1002-137X.2016.02.029 |
[6] | 田心记,逯 静. X信道中一种改进的干扰消除方法 Improved Interference Cancellation Method over X Channel 计算机科学, 2015, 42(5): 157-159. https://doi.org/10.11896/j.issn.1002-137X.2015.05.031 |
[7] | 隋雷,郭渊博,姜文博,杨奎武. 基于无线信道特征的密钥生成与提取研究 Generation and Extraction of Secret Keys Based on Properties of Wireless Channels 计算机科学, 2015, 42(2): 137-141. https://doi.org/10.11896/j.issn.1002-137X.2015.02.030 |
[8] | 周璐娜,刘锋,曾连荪. 两个点对点(PTP)网络并存时的自由度研究 Research on Degrees of Freedom of Two PTP Networks Coexistence 计算机科学, 2015, 42(1): 110-112. https://doi.org/10.11896/j.issn.1002-137X.2015.01.026 |
[9] | 沈虎,吕绍和,王晓东,周兴铭. 一种应用干扰消除进行冲突消解的分布式无线MAC协议 Distributed Collision-resolvable MAC Protocol for Wireless LANs with Interference Cancellation Support 计算机科学, 2014, 41(12): 60-66. https://doi.org/10.11896/j.issn.1002-137X.2014.12.014 |
[10] | 崔志富,张 杭,张 江,辜方林. 基于非高斯度量的多用户DS-CDMA系统多干扰消除与用户检测 External Interference Cancelation and Blind Multi-user Detection of DS-CDMA System Based on Non-gaussianity Measure 计算机科学, 2013, 40(1): 54-58. |
[11] | 冯镔 刘文予 朱光喜 马展. AWGN信道下Turbo码误比特率模型 计算机科学, 2006, 33(4): 114-117. |
|