|Table of Contents|

[1] Ding Xiaojin, Song Tiecheng, Zou Yulong, Chen Xiaoshu, et al. Joint jammer and user scheduling schemefor wireless physical-layer security [J]. Journal of Southeast University (English Edition), 2016, 32 (3): 261-266. [doi:10.3969/j.issn.1003-7985.2016.03.001]
Copy

Joint jammer and user scheduling schemefor wireless physical-layer security()
一种基于联合干扰与用户调度的无线物理层安全机制
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
32
Issue:
2016 3
Page:
261-266
Research Field:
Information and Communication Engineering
Publishing date:
2016-09-20

Info

Title:
Joint jammer and user scheduling schemefor wireless physical-layer security
一种基于联合干扰与用户调度的无线物理层安全机制
Author(s):
Ding Xiaojin1 Song Tiecheng1 Zou Yulong2 Chen Xiaoshu1
1National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
2School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
丁晓进1 宋铁成1 邹玉龙2 陈晓曙1
1东南大学移动通信国家重点实验室, 南京 210096; 2南京邮电大学通信与信息工程学院, 南京 210003
Keywords:
security-reliability tradeoff(SRT) multi-user scheduling artificial noise physical-layer security
安全与可靠性折中 多用户调度 人工噪声 物理层安全
PACS:
TN929.5
DOI:
10.3969/j.issn.1003-7985.2016.03.001
Abstract:
In order to improve the performance of the security-reliability tradeoff(SRT), a joint jammer and user scheduling(JJUS)scheme is proposed. First, a user with the maximal instantaneous channel capacity is selected to transmit its signal to the base station(BS)in the transmission time slot. Then, when the user transmits its signal to BS, the jammer is invoked for transmitting artificial noise in order to perturb the eavesdropper’s reception. Simulation results show that increasing the number of users can enhance the SRT performance of the proposed JJUS scheme. In addition, the SRT performance of the proposed JJUS scheme is better than that of the traditional round-robin scheduling and pure user scheduling schemes. The proposed JJUS scheme can guarantee the secure transmission even in low main-to-eavesdropper ratio(MER)regions.
为了提高无线传输的安全与可靠性折中性能, 提出了一种基于联合干扰与用户的调度机制.首先, 在传输时隙中, 具有最大瞬时信道容量的用户节点会被选择与基站进行数据传输;然后, 当用户节点与基站进行数据传输时, 干扰节点会被用于发送人工噪声信号, 以干扰窃听节点窃听用户与基站间的数据传输.仿真结果表明, 增加用户数目可以提高所提出机制的安全与可靠性折中性能.此外, 与传统的轮询调度及纯粹的用户调度这2种机制相比, 该机制能够取得更好的安全与可靠性折中性能, 尤其是在主信道与窃听信道增益比较低时, 该机制还能够确保安全传输.

References:

[1] Al-Ghadhban S. Opportunistic round robin scheduling for V-BLAST systems over multiuser MIMO channels[J]. EURASIP Journal on Wireless Communications and Networking, 2014, 2014: 128. DOI:10.1186/1687-1499-2014-128.
[2] Fritzsche R, Rost P, Fettweis G. Robust rate adaptation and proportional fair scheduling with imperfect CSI [J]. IEEE Transactions on Wireless Communications, 2015, 14(8): 4417-4427. DOI:10.1109/twc.2015.2420564.
[3] Long H, Xiang W, Wang J, et al. Cooperative jamming and power allocation with untrusty two-way relay nodes[J]. IET Communications, 2014, 8(13): 2290-2297. DOI:10.1049/iet-com.2013.0580.
[4] Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. DOI:10.1002/j.1538-7305.1975.tb02040.x.
[5] Li N, Tao X F, Xu J. Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback [J]. IEEE Communications Letters, 2014, 18(6): 969-972.
[6] Geraci G, Egan M, Yuan J H, et al. Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding [J]. IEEE Transactions on Communications, 2012, 60(11): 3472-3482. DOI:10.1109/tcomm.2012.072612.110686.
[7] Zhao P, Zhang M, Yu H, et al. Robust beamforming design for sum secrecy rate optimization in MU-MISO networks [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1812-1823. DOI:10.1109/tifs.2015.2423263.
[8] Krikidis I, Ottersten B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling[J]. IEEE Signal Processing Letters, 2013, 20(2): 141-144. DOI:10.1109/lsp.2012.2234109.
[9] Zou Y L, Wang X B, Shen W M, et al. Security versus reliability analysis of opportunistic relaying [J]. IEEE Transactions on Vehicular Technology, 2014, 63(6): 2653-2661. DOI:10.1109/tvt.2013.2292903.
[10] Kundu C, Ghose S, Bose R. Secrecy outage of dual-hop regenerative multi-relay system with relay selection [J]. IEEE Transactions on Wireless Communications, 2015, 14(8): 4614-4625. DOI:10.1109/twc.2015.2423290.
[11] Chu Z, Cumanan K, Ding Z G, et al. Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer [J]. IEEE Transactions on Vehicular Technology, 2015, 64(5): 1833-1847.
[12] Lee J, Choi W. Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DOF and JOF scaling law [J]. IEEE Transactions on Signal Processing, 2014, 62(4): 828-851. DOI:10.1109/tsp.2013.2293979.
[13] Tang X J, Liu R H, Spasojevic P, et al. Interference assisted secret communication [J]. IEEE Transactions on Information Theory, 2011, 57(5): 3153-3167. DOI:10.1109/tit.2011.2121450.
[14] Garnaev A, Baykal-Gursoy M, Poor H V. A game theoretic analysis of secret and reliable communication with active and passive adversarial modes [J]. IEEE Transactions on Wireless Communications, 2016, 15(3): 2155-2163. DOI:10.1109/twc.2015.2498934.
[15] Zou Y L, Li X L, Liang Y C. Secrecy outage and diversity analysis of cognitive radio systems[J]. IEEE Journal on Selected Areas in Communications, 2014, 32(11): 2222-2236. DOI:10.1109/jsac.2014.141121.
[16] Shannon C E. A mathematical theory of communication[J]. Bell System Technical Journal, 1948, 27(3): 379-423. DOI:10.1002/j.1538-7305.1948.tb01338.x.
[17] Zou Y, Zhu J, Zheng B, et al. An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks[J]. IEEE Transactions on Signal Processing, 2010, 58(10): 5438-5445. DOI:10.1109/tsp.2010.2053708.

Memo

Memo:
Biographies: Ding Xiaojin(1981—), male, graduate;Song Tiecheng(corresponding author), male, doctor, professor, songtc@seu.edu.cn.
Foundation items: The National Natural Science Foundation of China(No.61271207, 61372104), the Science and Technology Project of SGCC(No.SGRIXTKJ[2015]349).
Citation: Ding Xiaojin, Song Tiecheng, Zou Yulong, et al.Joint jammer and user scheduling scheme for wireless physical-layer security[J].Journal of Southeast University(English Edition), 2016, 32(3):261-266.DOI:10.3969/j.issn.1003-7985.2016.03.001.
Last Update: 2016-09-20