ISSN 0253-2778

CN 34-1054/N

Open AccessOpen Access JUSTC Original Paper

Joint antenna selection and cooperative communication design to enhance physical layer security

Cite this:
https://doi.org/10.3969/j.issn.0253-2778.2017.08.007
  • Received Date: 26 September 2016
  • Rev Recd Date: 07 November 2016
  • Publish Date: 31 August 2017
  • The prevailing research on physical layer security assumes that users are static, while takes no account of user mobility. In view of user mobility, a novel transmit antenna selection and cooperative communication design (TAS-Cop) to enhance physical layer security was proposed. The scenario considered contains two cooperative base stations, which are equipped with multiple antennas respectively. Firstly, both of the two transmitters apply TAS technology to maximize the signal to noise ratio (SNR) at the legal receiver. Next, when the legal receiver moves in the coverage of the two base stations, the transmitters cooperate with each other such that the best security performance can be acquired. Based on Rayleigh fading channel, key security metrics such as the closed-form expressions for non-zero secrecy capacity probability and secrecy outage probability were derived. Following that, an optimal power allocation strategy between the two transmitters was presented. Numerical simulation results show that the proposed scheme can achieve better security performance when compared with existing TAS schemes with user mobility is taken into consideration.
    The prevailing research on physical layer security assumes that users are static, while takes no account of user mobility. In view of user mobility, a novel transmit antenna selection and cooperative communication design (TAS-Cop) to enhance physical layer security was proposed. The scenario considered contains two cooperative base stations, which are equipped with multiple antennas respectively. Firstly, both of the two transmitters apply TAS technology to maximize the signal to noise ratio (SNR) at the legal receiver. Next, when the legal receiver moves in the coverage of the two base stations, the transmitters cooperate with each other such that the best security performance can be acquired. Based on Rayleigh fading channel, key security metrics such as the closed-form expressions for non-zero secrecy capacity probability and secrecy outage probability were derived. Following that, an optimal power allocation strategy between the two transmitters was presented. Numerical simulation results show that the proposed scheme can achieve better security performance when compared with existing TAS schemes with user mobility is taken into consideration.
  • loading
  • [1]
    MASSEY J L. An introduction to contemporary cryptology[J]. Proceedings of the IEEE, 1988,76(5):533-549.
    [2]
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 2014, 54(8): 1355-1387.
    [3]
    CHEONG S L Y, HELLMAN M. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 2003, 24(4): 451-456.
    [4]
    MUKHERJEE A, FAKOORIAN S A, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16(3): 1550-1573.
    [5]
    刘春国,李立忠. MIMO系统的物理层安全性[J]. 电讯技术,2015, 55(7): 725-729.
    [6]
    LIAO W C, CHANG T H, MA W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3):1202-1216.
    [7]
    BASHAR S, DING Z, LI G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback[J]. IEEE Transactions on Wireless Communications, 2011, 10(4):1212-1223.
    [8]
    王东,李永成,白铂,等. 放大转发中继网络中绿色的物理层安全通信技术[J].电子与信息学报, 2016,38(4):841-847.
    [9]
    雷维嘉,左莉杰,江雪,等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报,2015, 37(9): 2191-2197.
    [10]
    王鼎宇,付晓梅,厚丽君. 中继行为的物理层安全博弈模型研究[J]. 南开大学学报, 2015, 5(5): 96-101.
    [11]
    GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transations on Wireless Communications, 2008, 7(6): 2180-2189.
    [12]
    SANAYEI S, NOSRATINIA A. Antenna selection in MIMO systems[J]. IEEE Communication Magazine, 2004, 42(10): 68-73.
    [13]
    ALVE H, SOUZA R D, DEBBAH M, et tal. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012, 19(6): 372-375.
    [14]
    CHEN Z, YUAN J, VUCETIC B. Analysis of transmit antenna selection/maximal-ratio combining in rayleigh fading channels[J]. IEEE Transactions on Vehicular Technology, 2005, 54(4): 1312-1321.
    [15]
    WANG L F, ELKASHALN M, HUANG J, et al. Secure transmission with antenna selection in MIMO nakagami-m fading channels[J]. IEEE Transations on Wireless Communications, 2014, 13(11): 6054-6067.
    [16]
    YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transations on Wireless Communications, 2013, 61(1): 144-154.
    [17]
    张亚军,梁涛,柳永祥,等. 联合发端天线选择和收端人工噪声的物理层安全传输方法[J]. 电子与信息学报, 2015, 37(9): 2183-2190.
    [18]
    邓单,王伟,赵明. 联合天线选择和人工噪声的安全传输技术[J]. 系统仿真学报,2016,28(2):321-327.
    [19]
    洪涛,宋茂忠,王保云. 基于随机天线阵列的物理层安全通信系统峰均功率比问题研究[J]. 电子与信息学报,2015,37(1):188-192.
    [20]
    GRADSHTEYN I S, RYZHIK I M. Table of Integrals, Series and Products[M]. San Diego: Elsevier, 2007:25,337,340-341.
  • 加载中

Catalog

    [1]
    MASSEY J L. An introduction to contemporary cryptology[J]. Proceedings of the IEEE, 1988,76(5):533-549.
    [2]
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 2014, 54(8): 1355-1387.
    [3]
    CHEONG S L Y, HELLMAN M. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 2003, 24(4): 451-456.
    [4]
    MUKHERJEE A, FAKOORIAN S A, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16(3): 1550-1573.
    [5]
    刘春国,李立忠. MIMO系统的物理层安全性[J]. 电讯技术,2015, 55(7): 725-729.
    [6]
    LIAO W C, CHANG T H, MA W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3):1202-1216.
    [7]
    BASHAR S, DING Z, LI G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback[J]. IEEE Transactions on Wireless Communications, 2011, 10(4):1212-1223.
    [8]
    王东,李永成,白铂,等. 放大转发中继网络中绿色的物理层安全通信技术[J].电子与信息学报, 2016,38(4):841-847.
    [9]
    雷维嘉,左莉杰,江雪,等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报,2015, 37(9): 2191-2197.
    [10]
    王鼎宇,付晓梅,厚丽君. 中继行为的物理层安全博弈模型研究[J]. 南开大学学报, 2015, 5(5): 96-101.
    [11]
    GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transations on Wireless Communications, 2008, 7(6): 2180-2189.
    [12]
    SANAYEI S, NOSRATINIA A. Antenna selection in MIMO systems[J]. IEEE Communication Magazine, 2004, 42(10): 68-73.
    [13]
    ALVE H, SOUZA R D, DEBBAH M, et tal. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012, 19(6): 372-375.
    [14]
    CHEN Z, YUAN J, VUCETIC B. Analysis of transmit antenna selection/maximal-ratio combining in rayleigh fading channels[J]. IEEE Transactions on Vehicular Technology, 2005, 54(4): 1312-1321.
    [15]
    WANG L F, ELKASHALN M, HUANG J, et al. Secure transmission with antenna selection in MIMO nakagami-m fading channels[J]. IEEE Transations on Wireless Communications, 2014, 13(11): 6054-6067.
    [16]
    YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transations on Wireless Communications, 2013, 61(1): 144-154.
    [17]
    张亚军,梁涛,柳永祥,等. 联合发端天线选择和收端人工噪声的物理层安全传输方法[J]. 电子与信息学报, 2015, 37(9): 2183-2190.
    [18]
    邓单,王伟,赵明. 联合天线选择和人工噪声的安全传输技术[J]. 系统仿真学报,2016,28(2):321-327.
    [19]
    洪涛,宋茂忠,王保云. 基于随机天线阵列的物理层安全通信系统峰均功率比问题研究[J]. 电子与信息学报,2015,37(1):188-192.
    [20]
    GRADSHTEYN I S, RYZHIK I M. Table of Integrals, Series and Products[M]. San Diego: Elsevier, 2007:25,337,340-341.

    Article Metrics

    Article views (496) PDF downloads(189)
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return