用户名: 密码: 验证码:
物联网中一种抗大规模天线阵列窃听者的噪声注入方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Noise Injection Scheme Resistant to Massive MIMO Eavesdropper in IoT
  • 作者:彭建华 ; 张帅 ; 许晓明 ; 黄开枝 ; 金梁
  • 英文作者:PENG Jianhua;ZHANG Shuai;XU Xiaoming;HUANG Kaizhi;JIN Liang;National Digital Switching System Engineering & Technological Research Center;
  • 关键词:物联网 ; 物理层安全 ; 噪声注入
  • 英文关键词:Internet of Things(IoT);;Physical layer security;;Noise injection
  • 中文刊名:DZYX
  • 英文刊名:Journal of Electronics & Information Technology
  • 机构:国家数字交换系统工程技术研究中心;
  • 出版日期:2018-10-24 17:03
  • 出版单位:电子与信息学报
  • 年:2019
  • 期:v.41
  • 基金:国家自然科学基金(61501516,61701538,61601514)~~
  • 语种:中文;
  • 页:DZYX201901010
  • 页数:7
  • CN:01
  • ISSN:11-4494/TN
  • 分类号:72-78
摘要
物联网中无线传输的安全难题是制约其发展的重要瓶颈,物联网终端受限的计算能力与硬件配置以及配备大规模天线阵列的窃听者给物理层安全技术带来了新的挑战。针对该问题,该文提出一种可对抗大规模天线阵列窃听者的轻量级噪声注入策略。首先,对所提出的噪声注入策略进行介绍,并分析了该策略的安全性;然后,基于该策略得到了系统吞吐量的闭式表达式,并对时隙分配系数和功率分配系数进行优化设计。理论和仿真结果表明,通过对物联网系统参数进行设计,所提出的噪声注入策略能够实现私密信息的安全传输。
        The security issue of wireless transmission becomes a significant bottleneck in the development of Internet of Things(IoT). The limited computing capability and hardware configuration of IoT terminals andeavesdroppers equipped with massive Multiple-Input Multiple-Output(MIMO) bring new challenges to physicallayer security technology. To solve this problem, a lightweight noise injection scheme is proposed that cancombat massive MIMO eavesdropper. Firstly, the proposed noise injection scheme is introduced, along with thecorresponding secrecy analysis. Then, the close-formed expression of the throughput is derived based on theproposed scheme. Furthermore, the slot allocation coefficient and power allocation coefficient are optimized.The analytical and simulation results show that the proposed noise injection scheme can achieve the security of private information transmission by designing of the IoT system parameters.
引文
[1]AKPAKWU G A,SILVA B J,HANCKE G P,et al.Asurvey on 5G networks for the internet of things:Communication technologies and challenges[J].IEEEAccess,2017,99(6):3619-3647.doi:10.1109/ACCESS.2017.2779844.
    [2]MASSEY J L.An introduction to contemporary cryptology[J].Proceedings of the IEEE,1988,76(5):533-549.doi:10.1109/5.4440.
    [3]黄开枝,张波.异构密集网中一种抗多窃听者的协作安全波束成形方案[J].电子与信息学报,2017,39(7):1673-1680.doi:10.11999/JEIT161152.HUANG Kaizhi and ZHANG Bo.Cooperative secrecy beamforming scheme resistant to multi-eavesdroppers in dense heterogeneous networks[J].Journal of Electronics&Information Technology,2017,39(7):1673-1680.doi:10.11999/JEIT161152.
    [4]LI Yiqing,JIANG Miao,ZHANG Qi,et al.Secure beamforming in downlink MISO non-orthogonal multiple access systems[J].IEEE Transactions on Vehicular Technology,2017,66(8):7563-7567.doi:10.1109/TVT.2017.2658563.
    [5]DENG Yansha,WANG Lifeng,YUAN Jinhong,et al.Artificial-noise aided secure transmission in large scale spectrum sharing networks[J].IEEE Transactions on Communications,2016,64(5):2116-2129.doi:10.1109/TCOMM.2016.2544300.
    [6]LIU Chenxi,YANG Nan,MALANEY R,et al.Artificialnoise-aided transmission in multi-antenna relay wiretap channels with spatially random eavesdroppers[J].IEEETransactions on Wireless Communications,2016,15(11):7444-7456.doi:10.1109/TWC.2016.2602337.
    [7]MUKHERJEE A.Physical-layer security in the internet of things:Sensing and communication confidentiality under resource constraints[J].Proceedings of the IEEE,2015,103(10):1747-1761.doi:10.1109/JPROC.2015.2466548.
    [8]XU Qian,REN Pinyi,SONG Houbing,et al.Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations[J].IEEE Access,2016,4:2840-2853.doi:10.1109/ACCESS.2016.2575863.
    [9]KIM J and CHOI J P.Cancellation-based friendly jamming for physical layer security[C].IEEE Global Communications Conference,Washington,USA,2016:16655354.doi:10.1109/GLOCOM.2016.7841646.
    [10]Al-NAHARI A.Physical layer security using massive multiple-input and multiple-output:Passive and active eavesdroppers[J].IET Communications,2016,10(1):50-56.doi:10.1049/iet-com.2015.0216.
    [11]WU Yongpeng,SCHOBER R,NG D W K,et al.Securemassive MIMO transmission with an active eavesdropper[J].IEEE Transactions on Information Theory,2016,62(7):3880-3900.doi:10.1109/TIT.2016.2569118.
    [12]WANG Chao and WANG Huiming.Robust joint beamforming and jamming for secure AF networks:LowComplexity design[J].IEEE Transactions on Vehicular Technology,2015,64(5):2192-2198.doi:10.1109/TVT.2014.2334640.
    [13]HE Biao,SHE Yechao,and LAU V K N.Artificial noise injection for securing single-antenna systems[J].IEEETransactions on Vehicular Technology,2017,66(10):9577-9581.doi:10.1109/TVT.2017.2703159.
    [14]黄开枝,许耘嘉,丁大钊,等.非理想情况下K层密集异构蜂窝网的安全性能分析[J].电子与信息学报,2017,39(10):2456-2463.doi:10.11999/JEIT161376.HUANG Kaizhi,XU Yunjia,DING Dazhao,et al.Secrecy performance analysis of K-tier dense heterogeneous cellular networks with imperfect channel state information[J].Journal of Electronics&Information Technology,2017,39(10):2456-2463.doi:10.11999/JEIT161376.
    [15]ZHANG Yuanyu,SHEN Yulong,WANG Hua,et al.On secure wireless communications for IoT under eavesdropper collusion[J].IEEE Transactions on Automation Science&Engineering,2016,13(3):1281-1293.doi:10.1109/TASE.2015.2497663.
    [16]ZHOU Xiangyun,MEKAT M R,MAHAM B,et al.Rethinking the secrecy outage formulation:A secure transmission design perspective[J].IEEE Communications Letters,2011,15(3):302-304.doi:10.1109/LCOMM.2011.011811.102433.
    [17]HE Biao and ZHOU Xiangyun.Secure on-off transmission design with channel estimation errors[J].IEEE Transactions on Information Forensics&Security,2013,8(12):1923-1936.doi:10.1109/TIFS.2013.2284754.
    [18]ZHU Fengchao,GAO Feifei,YAO Minli,et al.Joint information and jamming-beamforming for physical layer security with full duplex base station[J].IEEE Transactions on Signal Processing,2014,62(24):6391-6401.doi:10.1109/TSP.2014.2364786.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700