通信工程

正交中继-窃听信道的最优中继函数及其可达安全速率

展开
  • 1. 南京邮电大学通信与信息工程学院,南京210003
    2. 东南大学移动通信国家重点实验室,南京210096
    3. 南京邮电大学自动化学院,南京210003
王保云,教授,博导,研究方向:无线安全通信、信号处理、信息理论,E-mail: bywang@njupt.edu.cn

收稿日期: 2012-05-18

  修回日期: 2013-01-14

  网络出版日期: 2013-01-14

基金资助

国家自然科学基金(No.60972045, No.61271232, No.61071089);江苏省自然科学基金(No.BK2010077);东南大学移动通信国家重点实验室开放研究基金(No.2012D05);江苏省优势学科建设项目基金;江苏省高校研究生创新项目基金(No.CXZZ11_0395);江苏省高校优秀创新研究团队基金(No.TJ208029)资助

Optimal Relay Function and Achievable Secrecy Rate in Orthogonal Relay-Eavesdropper Channel

Expand
  • 1. College of Communication and Information Engineering, Nanjing University of Posts and
    Telecommunications, Nanjing 210003, China
    2. National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
    3. College of Automation, Nanjing University of Posts and Telecommunications, Nanjing 210003, China

Received date: 2012-05-18

  Revised date: 2013-01-14

  Online published: 2013-01-14

摘要

从信息理论安全的角度研究正交中继-窃听信道中的安全通信. 考虑采用瞬时中继策略的中继信道,即中继的输出仅依赖当前接收信号,首先给出可达安全速率的表达式,在此基础上得到中继函数为分段线性函数时信道安全速率的数学表示. 给出了安全速率的数值计算方法,通过迭代网格搜索优化分段线性函数的各段参数,得到了安全速率的次优解. 通过仿真对比了分段线性中继策略、放大前传策略、译码前传策略下的可达安全速率,结果表明分段线性中继比放大前传中继策略的可达安全速率更大. 当源-中继信道增益较小时,分段线性中继的安全速率比译码前传策略更高,复杂度更低且时延更小.

本文引用格式

陈驰阳1,2, 邓志祥1, 王保云2,3 . 正交中继-窃听信道的最优中继函数及其可达安全速率[J]. 应用科学学报, 2014 , 32(2) : 119 -124 . DOI: 10.3969/j.issn.0255-8297.2014.02.002

Abstract

In this paper, secret communication in an orthogonal relay-eavesdropper channel is studied in view of information-theoretical security. For an orthogonal relay-eavesdropper channel with instantaneous relay in which the present output depends only on the currently received signal, the achievable secrecy rate is
formulated. The achievable secrecy rate with piecewise linear(PL) relaying function is derived and computed numerically. A sub-optimal solution to this secrecy rate is obtained by optimizing the parameters of the piecewise linear function with an iterative grid search algorithm. The achievable secrecy rate with PL relaying is compared to that with amplify-and-forward (AF) relaying and decode-and-forward (DF) relaying by simulation. The results show that PL always outperforms AF, and outperforms DF when the source-relay link is poor. Meanwhile, compared with DF, PL relaying has lower complexity and lower time-delay.

参考文献

[1]SHANNON C E. Communication theory of secrecy systems [J]. Bell Systems Technical Journal, 1949, 28: 656-715.

[2]WYNER A. The wire-tap channel [J]. Bell Systems Technical Journal, 1975, 54(8): 1355-1387.

[3]CSISZÁR I, KÖRNER J. Broadcast channels with confidential messages [J]. IEEE Transactions on Information Theory, 1978, 24(3):  339-348.

[4]Van Der MEULEN E C . Three-terminal communication channels[J]. Adv. Appl. Prob(全拼?). 1971, 3: 120-154.

[5]COVER T M, A. GAMAL El A G. Capacity theorems for the relay channel [J]. IEEE Transactions on Information Theory, 1979, 25(5): 572-584.

[6]LAI L, GAMAL El  (这位作者与上面文献是同一人吗?究竟姓什么?名什么?). The relay-eavesdropper channel: Cooperation for secrecy [J]. IEEE Transactions on Information Theory, 2008, 54(9): 4005-4019.

[7]陈莹,王保云. 多级中继窃听信道的可达安全速率[J],应用科学学报,2011, 29(3) 243-250.

CHEN Ying, WANG Baoyun. Achievable secrecy rate of multiple-level relay-eavesdropper channel [J]. Journal of Applied Sciences, 2011, 29(3) 243-250.

[8]SENDONARIS A, ERKIP E, AAZHANG B. User cooperation diversity-part I: system description [J]. IEEE Trans. on Communications, 2003, 51(11): 1927-1938.

[9]LANEMAN J N, TSE D N C, WORNEL G W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior [J]. IEEE Trans. on Inf.(全拼?) Theory, 2004, 50(12): 3062-3080.

[10]KRAMER G, GASTPAR M, GUPTA P. Cooperative strategies and capacity theorems for relay networks [J]. IEEE Transactions on Information Theory, 2005, 51(9): 3037-3063.

[11]DONG Lun, HAN Zhu, PETROPULU A. P., POOR H. V. Amplify-and-forward based cooperation for secure wireless communications [C]//IEEE International Conference on ASSP, 2009 (ICASSP 2009), Taipei, 2009: 2613-2616.

[12]EKREM E, ULUKUS S. Secrecy in cooperative relay broadcast channels [J].  IEEE Transactions on Information Theory, 2011, 57(1): 137-155.

[13]KHORMUJI M N, SKOGLUND M. On instantaneous relaying [J]. IEEE Transactions on Information Theory, 2010, 56(7):3378-3394.

[14]DENG Zhixiang, WANG Baoyun, LANG Fei, MA Yayan, LIU Chen. Two-hop gaussian relay channel with linear relaying: achievable rate and optimization design [J], China Communication, 2012, 9(2): 96-104.
文章导航

/