计算机科学 ›› 2019, Vol. 46 ›› Issue (6): 168-173.doi: 10.11896/j.issn.1002-137X.2019.06.025

• 信息安全 • 上一篇    下一篇

LMS自适应干扰消除在基于人工干扰的物理层安全通信系统中的应用研究

彭磊, 臧国珍, 高媛媛, 沙楠, 奚晨婧, 蒋炫佑   

  1. (陆军工程大学通信工程学院 南京210007)
  • 收稿日期:2018-05-01 发布日期:2019-06-24
  • 通讯作者: 臧国珍(1978-),女,博士,副教授,主要研究方向为物理层安全和协同通信,E-mail:zgz_nj78@sina.com
  • 作者简介:彭 磊(1993-),男,硕士生,主要研究方向为物理层安全;高媛媛(1968-),女,博士,教授,主要研究方向为移动通信和MIMO;沙 楠(1981-),男,讲师,主要研究方向为物理层网络编码和协同通信;奚晨婧(1993-),女,硕士生,主要研究方向为物理层安全;蒋炫佑(1993-),男,硕士生,主要研究方向为物理层安全。
  • 基金资助:
    国家自然科学基金(61501511)资助。

Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference

PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you   

  1. (College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)
  • Received:2018-05-01 Published:2019-06-24

摘要: 针对外部窃听者对无线通信系统中的信息传输带来的安全威胁,首先提出了一种由源节点在发送源信息的同时发送人工干扰信号的安全传输方案。为有效消除人工干扰信号对合法目的端正确恢复源信息的影响,提出将LMS自适应算法应用于对接收信号中人工干扰信号的估计与消除。为检验所提方案的效果,文中以QPSK调制系统为例,专门设计了一种简单易行的人工干扰信号。通过对系统误比特率进行MATLAB仿真,验证了所提方案的有效性,并得到了所提方案中LMS自适应算法的最优步长因子和滤波器阶数。

关键词: LMS算法, 干扰消除, 人工干扰, 物理层安全, 误比特率

Abstract: Regarding to the security threat of information transmission brought by external eavesdropper in wireless communication system,this paper proposed a secure transmission scheme that source node sends source information and artificial interference simultaneously.To effectively eliminate the impact of artificial interference signal on the correct recovery of source information,the LMS adaptive algorithm was applied to estimate and eliminate the artificial interfe-rence signal.To verify the effectiveness of the proposed scheme,the QPSK modulation system was taken as an example,and a simple artificial interference signal was designed.Through the MATLAB simulation of the bit error rate of the system,the effectiveness of the proposed scheme is verified,and the optimal step size and filter order of the LMS adaptive algorithm in the proposed scheme are obtained.

Key words: Artificial interference, Bit error rate, Interference cancellation, LMS algorithm, Physical layer security

中图分类号: 

  • TN918.91
[1]WYNER A D.The wire-tap channel [J].The Bell System Technical Journal,1975,54(8):1355-1387.
[2]ZHOU L.Research on Physical Layer Security of Cognitive Radio Based on Cooperative Communication[C]∥2015 Sixth International Conference on Intelligent Systems Design and Enginee-ring Applications.Guiyang:IEEE Press,2015:661-664.
[3]LI L,PETROPULU A P,CHEN Z,et al.Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference [J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1433-1448.
[4]WANG L,TEH K C,LI K H.Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks [J].IEEE Transactions on Information Forensics and Security,2017,12(6):1470-1482.
[5]HU L,WEN H,WU B,et al.Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks[J].IEEE Communications Letters,2017,21(3):524-527.
[6]ZHANG Q,GAO Y,ZANG G,et al.Physical layer security for cooperative communication system with untrusted relay based on jamming signals[C]∥2015 International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-4.
[7]YANG Y,CHEN J,HUANG Y,et al.Secure Transmission of Wireless Relaying Systems with Jammer and Multiple-User Selection[J].IEEE Access,2017,5:8771-8779.
[8]LONG H,WANG J,ZHANG Y Y,et al.Cooperative Jamming Technique:Proposal,Survey and Future[J].Telecommunications Science,2013,29(1):109-114.(in Chinese)
龙航,王静,张月莹,等.协作干扰技术的提出、现状和未来展望[J].电信科学,2013,29(1):109-114.
[9]HAYKIN S.Adaptive Filter Theory[M].Upper Saddle River:Prentice Hall,2002:325-415.
[10]WIDROW B,GOODLIN R C.Adaptive noise canceling:principles and applications[J].Proceedings of the IEEE,1975,63(12):1692-1716.
[11]HUANG B.Performance Analysis of NCLMS-based PCMA [C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1375-1378.
[12]ARIF M,NASEEM I,MOINUDDIN M,et al.Adaptive noise cancellation using q-LMS[C]∥2017 International Conference on Innovations in Electrical Engineering and Computational Technologies.Karachi:IEEE Press,2017:1-4.
[13]LIU J,QUAN H,LI Z,et al.Digital Nonlinear Self-Interference Cancellation Based on LMS-Volterra Algorithm[C]∥2016 3rd International Conference on Information Science and Control Engineering.Beijing:IEEE Press,2016:1298-1302.
[14]GORRIZ J M,RAMIREZ J,CRUCES-ALVAREZ,et al.A Novel LMS Algorithm Applied to Adaptive Noise Cancellation[J].IEEE Signal Processing Letters,2009,16(1):34-37.
[15]JIN J,WANG X,YU Y B,et al.Adaptive De-noising Method of Ballistocar diogram Based on Orthogonal Wavelet Transform[J].Computer Science,2010,37(8):232-235.(in Chinese)
金晶晶,王旭,于艳波,等.基于正交小波变换的心冲击图自适应去噪方法[J].计算机科学,2010,37(8):232-235.
[16]PANDA S,MOHANTY M N.Performance analysis of LMS based algorithms used for impulsive noise cancellation[C]∥2016 International Conference on Circuit,Power and Computing Technologies.Nagercoil:IEEE Press,2016:1-4.
[17]PROAKIS J G.Digital Communications (Fifth Edition)[M].New York:McGraw-Hill,2007:101-103.
[18]LI B,LIANG T.Cooperative jamming secure scheme for un-trusted full-duplex relay system[C]∥2016 2nd IEEE International Conference on Computer and Communication (ICCC).Chengdu:IEEE Press,2016:2328-2331.
[19]LV L,CHEN J,YANG L,et al.Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J].IET Communication,2017,11(3):393-399.
[20]HE B,SHE Y,LAU V K N.Artificial Noise Injection for Securing Single-Antenna Systems[J].IEEE Transactions on Vehicular Technology,2017,66(10):9577-9581.
[1] 陈佩佩, 李陶深, 方兴, 王哲.
能量收集全双工中继系统中的安全波束成形研究
Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System
计算机科学, 2020, 47(6): 316-321. https://doi.org/10.11896/jsjkx.190500115
[2] 奚晨婧,高媛媛,沙楠.
物理层安全星座模糊设计方法的性能研究
Performance Study on Constellation Obfuscation Design Method for Physical Layer Security
计算机科学, 2020, 47(3): 304-311. https://doi.org/10.11896/jsjkx.190200369
[3] 张培,张建明,王良民.
一种全双工认知中继网络中实现能量高效的安全传输方法
Design for Improving Energy-efficiency and Ensuring Physical-layer Security in Full-duplex Cognitive Relay Networks
计算机科学, 2017, 44(9): 172-177. https://doi.org/10.11896/j.issn.1002-137X.2017.09.033
[4] 高锐锋,倪丹艳,包志华,胡英东.
基于时频资源分配的认知无线中继网络物理层安全研究
Time-bandwidth Allocation Scheme for Physical Layer Security in Cooperative Cognitive Radio Networks
计算机科学, 2016, 43(4): 163-166. https://doi.org/10.11896/j.issn.1002-137X.2016.04.033
[5] 刘锋,王媛媛,曾连荪.
点对点信道与两用户广播信道并存时的自由度
Degrees of Freedom of Coexistence Network with Point-to-Point and Two-user Broadcast Channels
计算机科学, 2016, 43(2): 129-134. https://doi.org/10.11896/j.issn.1002-137X.2016.02.029
[6] 田心记,逯 静.
X信道中一种改进的干扰消除方法
Improved Interference Cancellation Method over X Channel
计算机科学, 2015, 42(5): 157-159. https://doi.org/10.11896/j.issn.1002-137X.2015.05.031
[7] 隋雷,郭渊博,姜文博,杨奎武.
基于无线信道特征的密钥生成与提取研究
Generation and Extraction of Secret Keys Based on Properties of Wireless Channels
计算机科学, 2015, 42(2): 137-141. https://doi.org/10.11896/j.issn.1002-137X.2015.02.030
[8] 周璐娜,刘锋,曾连荪.
两个点对点(PTP)网络并存时的自由度研究
Research on Degrees of Freedom of Two PTP Networks Coexistence
计算机科学, 2015, 42(1): 110-112. https://doi.org/10.11896/j.issn.1002-137X.2015.01.026
[9] 沈虎,吕绍和,王晓东,周兴铭.
一种应用干扰消除进行冲突消解的分布式无线MAC协议
Distributed Collision-resolvable MAC Protocol for Wireless LANs with Interference Cancellation Support
计算机科学, 2014, 41(12): 60-66. https://doi.org/10.11896/j.issn.1002-137X.2014.12.014
[10] 崔志富,张 杭,张 江,辜方林.
基于非高斯度量的多用户DS-CDMA系统多干扰消除与用户检测
External Interference Cancelation and Blind Multi-user Detection of DS-CDMA System Based on Non-gaussianity Measure
计算机科学, 2013, 40(1): 54-58.
[11] 冯镔 刘文予 朱光喜 马展.
AWGN信道下Turbo码误比特率模型

计算机科学, 2006, 33(4): 114-117.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!