Joint jammer and user scheduling scheme for wireless physical-layer security

被引:0
作者
Ding X. [1 ]
Song T. [1 ]
Zou Y. [2 ]
Chen X. [1 ]
机构
[1] National Mobile Communications Research Laboratory, Southeast University, Nanjing
[2] School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing
基金
中国国家自然科学基金;
关键词
Artificial noise; Multi-user scheduling; Physical-layer security; Security-reliability tradeoff (SRT);
D O I
10.3969/j.issn.1003-7985.2016.03.001
中图分类号
学科分类号
摘要
In order to improve the performance of the security-reliability tradeoff (SRT), a joint jammer and user scheduling (JJUS) scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station (BS) in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper's reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio(MER) regions. © 2016, Editorial Department of Journal of Southeast University. All right reserved.
引用
收藏
页码:261 / 266
页数:5
相关论文
共 17 条
  • [1] Al-Ghadhban S., Opportunistic round robin scheduling for V-BLAST systems over multiuser MIMO channels, EURASIP Journal on Wireless Communications and Networking, 2014, (2014)
  • [2] Fritzsche R., Rost P., Fettweis G., Robust rate adaptation and proportional fair scheduling with imperfect CSI, IEEE Transactions on Wireless Communications, 14, 8, pp. 4417-4427, (2015)
  • [3] Long H., Xiang W., Wang J., Et al., Cooperative jamming and power allocation with untrusty two-way relay nodes, IET Communications, 8, 13, pp. 2290-2297, (2014)
  • [4] Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
  • [5] Li N., Tao X.F., Xu J., Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback, IEEE Communications Letters, 18, 6, pp. 969-972, (2014)
  • [6] Geraci G., Egan M., Yuan J.H., Et al., Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding, IEEE Transactions on Communications, 60, 11, pp. 3472-3482, (2012)
  • [7] Zhao P., Zhang M., Yu H., Et al., Robust beamforming design for sum secrecy rate optimization in MU-MISO networks, IEEE Transactions on Information Forensics and Security, 10, 9, pp. 1812-1823, (2015)
  • [8] Krikidis I., Ottersten B., Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling, IEEE Signal Processing Letters, 20, 2, pp. 141-144, (2013)
  • [9] Zou Y.L., Wang X.B., Shen W.M., Et al., Security versus reliability analysis of opportunistic relaying, IEEE Transactions on Vehicular Technology, 63, 6, pp. 2653-2661, (2014)
  • [10] Kundu C., Ghose S., Bose R., Secrecy outage of dual-hop regenerative multi-relay system with relay selection, IEEE Transactions on Wireless Communications, 14, 8, pp. 4614-4625, (2015)