AMPLIFY-AND-FORWARD BASED COOPERATION FOR SECURE WIRELESS COMMUNICATIONS

被引:35
作者
Dong, Lun [1 ]
Han, Zhu [2 ]
Petropulu, Athina R. [1 ]
Poor, H. Vincent [3 ]
机构
[1] Drexel Univ, Dept Elect & Comp Engn, Philadelphia, PA 19104 USA
[2] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[3] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS | 2009年
基金
美国国家科学基金会;
关键词
physical layer based wireless security; cooperation; amplify-and-forward; secrecy capacity;
D O I
10.1109/ICASSP.2009.4960158
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
A physical layer approach to security for wireless networks is considered. In single-antenna wireless systems, such approaches are hampered by channel conditions in the presence of one or more eavesdroppers. Cooperation has the potential to overcome this problem and improve the security of of wireless communications. In this paper, an amplify-and-forward based cooperative protocol is proposed. Assuming availability of global channel state information, system design that maximizes the secrecy capacity is considered. Since the optimal solution to this problem is intractable, suboptimal closed-form solutions are proposed that optimize bounds on secrecy capacity for the case of a single eavesdropper, or that introduce additional constraints, such as nulling of signals at all eavesdroppers, for the case of multiple eavesdroppers.
引用
收藏
页码:2613 / +
页数:2
相关论文
共 11 条
[1]  
[Anonymous], P 46 ANN ALL C COMM
[2]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[3]  
Golub G. H., 2012, Matrix computations, V4th
[4]   Secure space-time communication [J].
Hero, AO .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) :3235-3249
[5]  
KHISTI A, 2007, SECURE TRANSMI UNPUB
[6]  
LAI L, IEEE T INFO IN PRESS
[7]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[8]  
LI Z, 2007, P 41 C INF SCI SYST
[9]  
Parada P, 2005, 2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, P2152
[10]  
SHAFIEE S, 2007, P IEEE INT S INF THE