Joint Artificial Noise and Repetition Coding for Secure Wireless Communications in TDD Systems

被引:5
作者
He, Hongliang [1 ,2 ]
Ren, Pinyi [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Shaanxi Smart Networks & Ubiquitous Access Res Ct, Xian 710049, Peoples R China
关键词
TDD; security; repetition coding; jamming;
D O I
10.1109/LWC.2019.2937859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we study the secure transmission in the wireless single-antenna time division duplexing (TDD) system when there is a passive eavesdropper. A joint artificial noise and repetition coding scheme is designed, in which the artificial noise can be removed only by the legitimate receiver instead of the eavesdropper. We prove that by using the proposed scheme, the capacity of the wiretap channel is limited by an upper bound, and the achievable secrecy rate can be maximized by power allocation. Finally, simulation results are supplied to corroborate the theoretical analysis.
引用
收藏
页码:1700 / 1703
页数:4
相关论文
共 7 条
  • [1] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [2] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [3] Artificial Noise Injection for Securing Single-Antenna Systems
    He, Biao
    She, Yechao
    Lau, Vincent K. N.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) : 9577 - 9581
  • [4] Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels
    Lai, Xiazhi
    Fan, Lisheng
    Lei, Xianfu
    Li, Jin
    Yang, Nan
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2088 - 2101
  • [5] Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security
    Lee, Kisong
    Hong, Jun-Pyo
    Choi, Hyun-Ho
    Quek, Tony Q. S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) : 162 - 174
  • [6] On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming
    Park, Ki-Hong
    Wang, Tian
    Alouini, Mohamed-Slim
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1741 - 1750
  • [7] Secret Wireless Communication with Public Feedback by Common Randomness
    Yang, Bin
    Wang, Wenjie
    Yin, Qinye
    Fan, Jiancun
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (03) : 269 - 272