Mean physical-layer secrecy capacity in mobile communication systems

被引:0
|
作者
Li, Tao [1 ]
Zhang, Yan [2 ]
Xu, Xibin [3 ]
Zhou, Shidong [1 ,3 ]
机构
[1] State Key Lab on Microwave and Digital Communications, Department of Electronic Engineering, Tsinghua University, Beijing
[2] School of Information and Electronics, Beijing Institute of Technology, Beijing
[3] Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing
来源
Qinghua Daxue Xuebao/Journal of Tsinghua University | 2015年 / 55卷 / 11期
关键词
Mean physical-layer secrecy capacity; Mobile communication; Physical-layer security;
D O I
10.16511/j.cnki.qhdxxb.2015.21.013
中图分类号
学科分类号
摘要
The security of mobile communication systems depends on the mean physical-layer secrecy capacity as the user moves. In realistic propagation environments, the physical-layer secrecy capacity varies over a vast range because of the user motion. A mean physical-layer secrecy capacity of a legitimate user is defined to characterize the secure communication performance of the system. The distribution characteristics of the mean physical-layer secrecy capacity are derived based on the impact of the eavesdropper's position on the mean physical-layer secrecy capacity. A scheme is then given to improve the mean physical-layer secrecy capacity according to the distribution characteristics. The mean physical-layer secrecy capacity can be made to be not lower than a specified value by limiting the eavesdropper's positions. Theoretical and numerical results demonstrate that this scheme can effectively guarantee the mean physical-layer secrecy capacity in mobile communication systems. © 2015, Press of Tsinghua University. All right reserved.
引用
收藏
页码:1241 / 1245and1252
相关论文
共 22 条
  • [1] Massey J.L., An introduction to contemporary cryptology, Proceedings of the IEEE, 76, 5, pp. 533-549, (1988)
  • [2] Schneier B., Cryptographic design vulnerabilities, Computer, 31, 9, pp. 29-33, (1998)
  • [3] Shannon C.E., Communication theory of secrecy systems, Bell System Technical Journal, 28, 4, pp. 656-715, (1949)
  • [4] Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
  • [5] Leung-Yan-Cheong S., Hellman M.E., The Gaussian wire-tap channel, Information Theory, IEEE Transactions on, 24, 4, pp. 451-456, (1978)
  • [6] Csiszar I., Korner J., Broadcast channels with confidential messages, Information Theory, IEEE Transactions on, 24, 3, pp. 339-348, (1978)
  • [7] Li Z., Yates R., Trappe W., Secret communication with a fading eavesdropper channel, Information Theory, 2007. ISIT 2007. IEEE International Symposium on, pp. 1296-1300, (2007)
  • [8] Li Z., Yates R., Trappe W., Secrecy capacity of independent parallel channels, Proceedings of Proc. 44th Annu. Allerton Conf., pp. 841-848, (2006)
  • [9] Hero A.O., Secure space-time communication, Information Theory, IEEE Transactions on, 49, 12, pp. 3235-3249, (2003)
  • [10] Pei Y., Liang Y.C., Teh K.C., Et al., Secure communication in multiantenna cognitive radio networks with imperfect channel state information, Signal Processing, IEEE Transactions on, 59, 4, pp. 1683-1693, (2011)