[1]陈璇,冯友宏. 安全中断概率约束下MISOME系统安全性能分析[J].计算机技术与发展,2017,27(02):76-80.
 CHEN Xuan,FENG You-hong. nalysis of Security Performance of MISOME System with Security Outage Probability Constraints[J].,2017,27(02):76-80.
点击复制

 安全中断概率约束下MISOME系统安全性能分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年02期
页码:
76-80
栏目:
安全与防范
出版日期:
2017-02-10

文章信息/Info

Title:
 nalysis of Security Performance of MISOME System with Security Outage Probability Constraints
文章编号:
1673-629X(2017)02-0076-05
作者:
 陈璇冯友宏
 南京邮电大学 通信与信息工程学院
Author(s):
 CHEN XuanFENG You-hong
关键词:
 物理层安全有效安全吞吐量天线选择波束成形人工噪声技术
Keywords:
 physical layer security effective security throughputtransmit antenna selectionbeamformingartificial noise
分类号:
TN918
文献标志码:
A
摘要:
 针对MISOME系统安全性能问题,考虑发送端硬件条件受限的情况,提出一种利用发端天线选择(TAS)、发端波束成形(TBF)以及安全速率自适应方法的传输方案(TASTBF-adaptive).安全中断概率(SoP)和有效安全吞吐量(EST)是衡量MISOME系统安全性能的两个重要指标.通过在安全中断概率约束下比较所提方案与传统人工噪声的物理层安全传输方法(AN-adaptive)的EST,分析两系统安全性能和研究影响安全性能的因素.仿真结果表明,在允许的最大SOP减小时,AN-adaptive方法比TASTBF-adaptive方法的安全性和鲁棒性更好;提高AN-adaptive方案安全性能应主要通过增大发送天线数和主信道平均信噪比,而提高TASTBF-adaptive方案安全性能应主要通过减小窃听天线数和窃听信道平均信噪比;TASTBF-adaptive方法中TAS选择多根天线比只选择一根天线安全性能更好.
Abstract:
 Regarding the security performance of MISOME system,a transmission scheme adopting Transmit Antenna Selection (TAS),Transmit Beamforming (TBF) is proposed as TASTBF-adaptive under the condition of limited hardware at transmitter.As Security Outage Probability (SOP) and Effective Security Throughput (EST) are two principal indicators in MISOME system,the proposed scheme is compared with traditional scheme (AN-adaptive) based on artificial noise technique under the constraint of SOP in order to analyze the security performance and its influence of the two schemes.Numerical results indicate that as the maximum allowed SOP decreases,TASTBF adaptive scheme shows a lower resilience than AN adaptive scheme.The improvement of security performance presents a strong sensitivity to the increase of transmit antennas and the average SNR of main channel in AN adaptive scheme while that in TASTBF adaptive scheme presents a profound sensitivity over the decrease of antennas at eavesdropper and the average SNR of eavesdropper channel.TAS provides better security performance of TASTBF adaptive scheme when using more transmit antennas than just one.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(02):47.
[11]冯元,侯晓贇,魏浩,等. 节点位置对窃听信道安全容量的影响[J].计算机技术与发展,2014,24(12):146.
 FENG Yuan,HOU Xiao-yun,WEI Hao,et al. Influence of Nodes Location to Security Capacity in Wire-tap Channel[J].,2014,24(02):146.
[12]贾仁庆,吴晓富,朱卫平. Cascade密钥协商的改进方案[J].计算机技术与发展,2016,26(11):97.
 JIA Ren-qing,WU Xiao-fu,ZHU Wei-ping. An Improved Scheme of Cascade Protocol[J].,2016,26(02):97.
[13]黄志川,吴蒙. 多目标优化的相控阵三维方向调制方法[J].计算机技术与发展,2016,26(11):111.
 HUANG Zhi-chuan,WU Meng. Three-dimensional Direction Modulation of Phased Array Based on Multi-objective Optimization[J].,2016,26(02):111.
[14]张雪麒,王保云. 多干扰者协作的MIMO系统下功率分配算法设计[J].计算机技术与发展,2017,27(07):120.
 ZHANG Xue-qi,WANG Bao-yun. Robust Power Allocation Design in Secure MIMO System with Multiple Cooperative Jammers[J].,2017,27(02):120.

更新日期/Last Update: 2017-05-11