咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A physical layer security sche... 收藏

A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI

作     者:Weijia Lei Yang Zhou Xiuzhen Lin Weijia Lei;Yang Zhou;Xiuzhen Lin

作者机构:School of Communication and Information EngineeringChongqing University of Posts and TelecommunicationsChongqing400065China 

出 版 物:《Digital Communications and Networks》 (数字通信与网络(英文版))

年 卷 期:2021年第7卷第3期

页      面:352-361页

核心收录:

学科分类:0810[工学-信息与通信工程] 0808[工学-电气工程] 08[工学] 0839[工学-网络空间安全] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:This work was supported by the National Nature Science Foundation of China(No.61971080,No.61471076) Chongqing Research Program of Basic Research and Frontier Exploration(No.cstc2018jcyjAX0432) the Key Project of Science and Technology Research of Chongqing Education Commission(No.KJZD-K201800603,No.KJZD-M201900602). 

主  题:Physical layer security Full-duplex Self-interference Eavesdropping CSI Multi-antenna 

摘      要:We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分