[1]张雪麒,王保云. 多干扰者协作的MIMO系统下功率分配算法设计[J].计算机技术与发展,2017,27(07):120-125.
 ZHANG Xue-qi,WANG Bao-yun. Robust Power Allocation Design in Secure MIMO System with Multiple Cooperative Jammers[J].,2017,27(07):120-125.
点击复制

 多干扰者协作的MIMO系统下功率分配算法设计()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年07期
页码:
120-125
栏目:
安全与防范
出版日期:
2017-07-10

文章信息/Info

Title:
 Robust Power Allocation Design in Secure MIMO System with Multiple Cooperative Jammers
文章编号:
1673-629X(2017)07-0120-06
作者:
 张雪麒王保云
 南京邮电大学 通信与信息工程学院
Author(s):
 ZHANG Xue-qiWANG Bao-yun
关键词:
 物理层安全多入多出系统协作干扰鲁棒无线通信
Keywords:
 physical layer securityMIMOcooperative jammingrobust wireless communication
分类号:
TP301.6
文献标志码:
A
摘要:
 随着无线通信技术的快速发展与广泛应用,基于信道状态信息进行信息安全传输的物理层安全技术已成为业界的研究重点.为此,基于物理层安全技术,在分析加入了多个协作干扰者的MIMO无线通信系统的系统模型并同时考虑信道状态信息不确定性的基础上,提出了安全速率最大化优化问题以寻找合适的功率分配方案,并进一步基于一阶泰勒展开和S-程序理论设计出相应的鲁棒优化算法.为验证所提出算法的有效性和可行性,应用MATLAB进行了仿真计算,并就干扰者个数和安全速率的关系进行了分析.仿真实验结果表明,增加协作干扰者个数可提升系统的安全性能;在信道信息未完全已知的前提下,所提出的鲁棒优化算法可比非鲁棒优化算法达到更高的安全速率.
Abstract:
 With the rapid development and wide application of wireless communication technique,the physical layer security technology based on channel state information for information transmission has been research focus of the industry.Based on the physical layer security,the system model of MIMO wireless communication with multiple cooperative jammers is analyzed and the uncertainty of channel state information is considered simultaneously.On the basis,the problem of maximizing the security rate is put forward to find the appropriate power allocation scheme and the corresponding robust optimization algorithm is designed further based on the first-order Taylor expansion and S-procedure theory.In order to validate its effectiveness and practicability,the simulation is carried out by MATLAB and the relationship between jammer’s number and security rate is analyzed.Simulation results illustrate that increase of jammers have significantly enhanced the secure performance of the system.Moreover,by contrast with non-robust algorithm,the higher performances of the proposed robust algorithm have been verified.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.
[11]冯元,侯晓贇,魏浩,等. 节点位置对窃听信道安全容量的影响[J].计算机技术与发展,2014,24(12):146.
 FENG Yuan,HOU Xiao-yun,WEI Hao,et al. Influence of Nodes Location to Security Capacity in Wire-tap Channel[J].,2014,24(07):146.
[12]贾仁庆,吴晓富,朱卫平. Cascade密钥协商的改进方案[J].计算机技术与发展,2016,26(11):97.
 JIA Ren-qing,WU Xiao-fu,ZHU Wei-ping. An Improved Scheme of Cascade Protocol[J].,2016,26(07):97.
[13]黄志川,吴蒙. 多目标优化的相控阵三维方向调制方法[J].计算机技术与发展,2016,26(11):111.
 HUANG Zhi-chuan,WU Meng. Three-dimensional Direction Modulation of Phased Array Based on Multi-objective Optimization[J].,2016,26(07):111.
[14]陈璇,冯友宏. 安全中断概率约束下MISOME系统安全性能分析[J].计算机技术与发展,2017,27(02):76.
 CHEN Xuan,FENG You-hong. nalysis of Security Performance of MISOME System with Security Outage Probability Constraints[J].,2017,27(07):76.

更新日期/Last Update: 2017-08-22