基于人工噪声的物理层信息安全研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
鉴于无线媒介的广播特性,其信息传输的安全性一直备受关注。作为对加密技术的一种补充,物理层安全成为一种新的研究方向。在发送信号中添加人工噪声的方式是一种衰落窃听信道下实现保密通信的有效方法。因此,以凸优化理论为数学工具,本文对基于人工噪声的物理层信息安全进行深入研究,重点研究多输入单输出(MISO)系统和认知无线电网络的保密通信的鲁棒性设计。论文的主要工作和创新如下:
     (1)为实现发射端和合法接收端的保密通信,根据通信系统的物理层特性,引入分布于主信道(发射端和合法接收端之间的信道)零空间内的人工噪声,通过衰落窃听信道(发射端与非法接收端之间的信道),降低非法接收端的信噪比。仿真结果表明,此添加人工噪声的方法在干扰窃听信道的同时不会对主信道造成任何影响,可以实现发射端与合法接收端之间的保密通信,但没有考虑功率分配优化问题。
     (2)为实现发射功率的合理分配,论文研究一种波束成形矢量和人工噪声的协方差矩阵联合优化的设计方法。假设发射端能获取主信道和窃听信道的完整的信道状态信息(CSI),为保证合法接收端的服务质量,以最小化总发射功率为目标,限制合法接收端信噪比的最小值和非法接收端信噪比的最大值为约束条件,实现发射功率在人工噪声和信息信号之间的合理分配,节省功率资源。仿真结果证明,在实现相同程度的保密通信条件下,添加人工噪声的设计方法比未添加人工噪声的设计方法节省发射功率,也说明人工噪声对于提高系统保密通信性能的作用。
     (3)针对发射端只获得信道状态信息的均值,信道误差在一定范围内的情况,论文提出了一种基于人工噪声的以优化发射功率为目标的鲁棒性设计方法,对优化问题进行数学建模和数值求解。在求解最优波束成形矢量和人工噪声的协方差矩阵时,CSI存在不确定度,优化问题的约束条件为无限多个,无法求解。论文采用S-procedure定理,将无限个约束条件变换为有限的线性矩阵不等式。仿真结果表明,论文提出的鲁棒性设计方法可提高保密通信系统发射功率的稳定性。
     (4)考虑到认知无线电技术可以提高频谱资源的利用率,论文研究认知无线电网络环境下的物理层安全问题,对波束成形矢量和人工噪声协方差矩阵进行联合优化。以最大化次用户接收端的信噪比为目标,限制非法接收端的接收信噪比最大值、主用户处的干扰温度(次用户发射信号对主用户接收端产生的干扰功率)及次用户发射功率。在此基础上,以最小化次用户的发射功率为目标,限制次用户的接收信噪比最小值和窃听端接收信噪比的最大值及干扰温度,论文提出了一种新的波束成形矢量和人工噪声协方差矩阵的联合设计方案,并对信道的鲁棒性进行分析。实验结果证明,在认知无线电网络的保密通信中,添加人工噪声可以节省发射功率,提高系统的物理层安全性能。
Given the broadcast nature of the wireless medium, the security of data communication has received considerable attentions. As a complement to cryptographic encryption, physical-layer security has become a new research area. Using artificial noise (AN) aided in transmitted signal is one of the efficient methods to guarantee secret communications over fading channels. Hence, the thesis does an in-depth study on the physical-layer security based on AN with convex optimization as math tools. It focuses on the secret communications in multi-input single-output (MISO) systems and cognitive radio networks and their robustness design. The major work and innovations are as follows:
     To guarantee the secret transmission between transmitter and the legal receiver, artificial noise which lies in the null space of the main channel (channel between transmitter and the legal receiver) according to physical-layer characteristics, to depress the signal-noise-ratio (SNR) at the illegal receiver by crippling its channel. The simulation results prove that the design with AN aided can fade the wire-tap channel while it has no impact on the main channel. And it can guarantee the secret communication between transmitter and legal receiver, but fails to take the optimization of power allocation into consideration.
     To allocate the transmitted power reasonably, a joint beamforming and artificial noise design are discussed here. On the assumption that transmitter has known perfect channel statement information (CSI) of both the main channel and the eavesdropping channel, to guarantee the legal receiver's quality of service (QoS), minimizing the transmitted power is set as the object with the maximum SINRs of eavesdroppers and the minimum SINRs of the intended receiver as constraints. The simulation results show that the joint design based on AN can save more transmitting power to achieve the secret communications with the same level,compared with design without AN. Besides, the impact of artificial noise on guaranteeing the secret communication is proved.
     In allusion to the case that transmitter only knows the mean value and there are channel errors within limits, a robustness design based on AN is proposed, which sets optimizing power as object. Mathematical modeling and solution of the optimization problems are studied. Given the presence of channel uncertainties, the restrictions mentioned before are infinite. To solve the problem efficiently, the constraints are turned into linear matrix inequalities via S-procedure. The simulation results indicate that robustness design can improve the stability of the system.
     In view of the fact that cognitive radio technique can increase frequency spectrum utilization, the physical-layer security of cognitive radio networks is studied, with joint beamforming and artificial noise design. Firstly, the maximum SNR at SU-Rx is viewed as the objective function, constraining the maximum SNR at eavesdroppers and maximum value of interference temperature (the allowable interference power level at primary receiver) and transmitted power. On that basis above, a new design scheme is proposed. The minimum transmitted power is set as objective function. And the minimum SNR at SU-Rx are maximum value of interference temperature and maximum SNR at eavesdroppers as constraints. Moreover, the robustness designs of the two schemes are given. The simulation results testify the impact of artificial noise on improving the secret communications' safety performance in cognitive radio networks.
引文
[1]王新梅,肖国镇,纠错码原理与方法,西安电子科技大学出版社,1991.
    [2]R. Negi and S. Goel, "Secret Communication using Artificial Noise," in Proc.VTC Fall 2005, vol.3, pp.1906-1910, Sept.2005.
    [3]J.Barros and M.R.D.Rodrigues,"Secrecy Capacity of Wireless Channels," to appear in Proc. ISIT 2006,July 2006.
    [4]A. D. Wyner. "The Wiretap Channel," Bell System Technical Journal, vol.54, pp.1355-1387,1975.
    [5]I. Csiszar and J. Korner, "The Broadcast Channels with Confidential Messages," IEEE Trans.on Inform. Theory, vol.24, no.4, pp.451-456, July 1978.
    [6]S.Leung-Yan-Cheong and M. E. Hellman, "The Gaussian Wiretap Channel," IEEE Trans, on Inform. Theory, vol.24, no.24, pp.451456, July 1978.
    [7]C.E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, vol.29, pp.656-715,1949.
    [8]Z. Li, R. Yates and W. Trappe, "Secure Capacity of Independent Parallel Channels," Proc. IEEE int. Symp. Information Theory (ISIT), Seattle, WA, pp. 3088-3104, Jul,2006.
    [9]Y. Liang, H. V. Poor and S.Shitz, "Secure Communication over Fading Channels," IEEE Trans. Inform. Theory., vol.54, no.6, pp.2470-2492, Jun,2008.
    [10]M.Bloch, J.Barros, M.Rodrigues, S.McLaughlin," Wireless Information-theoretic Security,"IEEE Transactions on information Theory 54(2008) 2515-2534.
    [11]W. C. Liao, T. H. Chang, W. K. Ma and C. Y. Chi, "Qos-based Transmit Beamforming in the Presence of Eavesdroppers:An Optimized Artificial-noise-aided Approach," IEEE Trans, on Signal Processing, vol.59, no.3, pp.1202-1216, Mar.2011.
    [12]Andrea Goldsmith, Sued Ali Jafar, Nihar Jindal and Sriram Vishwanath,"Capacity Limits of MIMO Channels,"IEEE Journal on Selected Areas in Communications, vol.21, no.5, pp.684-702,June 2003.
    [13]A.Khisti and G.W.Wornell, "Secure Transmission with Multiple Antennas I:The MISOME Wiretap Channel,"IEEE Trans. Inf. Theory, vol.56, no.7, pp.3088-3104, July 2010.
    [14]A.Khisti and G.W.Wornell, "Secure Transmission with Multiple Antennas II:The MIMOME WiretapChannel,'TEEE Trans. Inf. Theory, vol.56, no.11, pp.5515-5532, Nov.2010.
    [15]N.Chiurtu, B.Rimoldi, E.Telatar, "On the Capacity of Multi-antanna Guassian Channels,"in 2001 Proceedings IEEE International Symposium on Information Theory,2001,p.53.
    [16]S.Shafiee, S.Ulukus,"Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,"IEEE International Symposium on Information Theory,ISIT 2007, PP.2466-2470.
    [17]A.Mukherjee and A.L.Swidlehurst,"Fixed-rate Power Allocation Strategies for Enhanced Secrecy in MIMO Wiretap Channels,"IEEE SPAWC'09, June 2009, pp.344-348.
    [18]Satashu Goel and Rohit Negi,"Guaranteeing Secrecy using Artificial Noise,"IEEE Transactions on Wireless Communications, vol.7, no.6, pp.2180-2189, June 2008.
    [19]J.N.Laneman, D.N.C.Tse and W.Wornell, "Cooperative Diversity in Wireless Networks:Efficient Protocols and Outage Behavior," IEEE Trans. Inform. Theory, vol.50, no.12, pp.3062-3080.
    [20]Yingbin Liang, H.Vincent Poor, and Shamai(Shiz),"Information Theoretic Security," vol.5 of Foundations and Trends in Communications and Information Theory,pp.355-580, noew publishers 2009.
    [21]Eduard A.Jorswieck, Anne Wolf, and Sabrina Gerbracht,"Secrecy on the Physical Layer in Wireless Networks, " in Telecommunications, IN-TECH Education and Publishing,2009.
    [22]Z.Li, R.Yates and W.Trappe,"Securecy Capacity of Independent Parallel Channels,"Proc. IEEE int. Symo. Information Theory (ISIT), Seattle, WA, pp.356-360,J ul.2006.
    [23]F.Oggier and B.Hassibi,"The Secrecy Capacity of the MIMO Wiretap Channels," Proc.45th Annu.Allerton Conf. Communication,Control and Computing., Monticello, IL, Sept.2007, pp.848-855.
    [24]P.K.Gopala, L.Lai and H.E.Gamal, "On the Secrecy Capacity of Fading Channels," IEEE Trans. Inf. Theory, vol.54, no.10, pp.4687-4698, Oct.2008.
    [25]P.Parada and R.Blahut, "Secrecy Capacity of SIMO and Slow Fading Channels," in Proc. IEEE ISIT, Adelaide, Australia, Sep.2005. pp.2152-2155.
    [26]F.Oggier and B.Hassibi, "The Secrecy Capacity of MIMO Wiretap Channel,"in Proc., IEEE Int'l Symn. On Inform. Theory,6-11, July.2008, pp.524-528.
    [27]T.Liu and S. Shamai(Shiz),"A Note on the Secrecy Capacity of the Multiple-antenna Wiretap Channel," IEEE Trans. Inform. Theory, vol.55, no.6, pp.5515-55332.
    [28]E.Telatar, "Capacity of Multi-Antenna Gaussian Channels," Eur. Trans. Telecomm. ETT, vol.10, no.6, pp.585-596, Nov.1999.
    [29]Ueli M.Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Transactions on Information Theory, vol.39, no.3, pp.733-742, 1993.
    [30]III Alfred O.Hero, "Secure Space-time Communication," IEEE Trans. On Inform. Theory, vol.49, no.12, pp.3235-3249, December 2003.
    [31]H.Koorapaty, A.A.Hassan, S.Chennakeshu, "Secure Information Trasmisson for Mobile Radio,"IEEE Trans. Wireless Communications, pp.52-55, July 2003.
    [32]W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "Joint Transmit Beamforming and Artificial Noise Design for QoS Discrimination in Wireless Downlink," ICASSP 2010, Dallas, Texas, USA, pp.2562-2565, Mar,2010.
    [33]Nabil Romero-Zurita, Mounir Ghogho and Des McLernon, "Physical Layer Security of MIMO-OFDM Systems by Beamforming and Artificial Noise Generation," Physical Communication 4(2011)313-321.
    [34]X.Zhou, M.McKay, "Physical Layer Security with Artificial Noise:Secrecy Capacity and Optimal Power Allocation,"3rd International Conference on Signal Processing and Communication Systems, ICSPCS 2009,2009, pp.1-5.
    [35]X.Zhou, M.McKay, "Secure Transmission with Artificial Noise over Fading Channels:Achievable Rate and Optimal Power Allocation,"IEEE Transactions on Vehicular Technology 59(2010),2010. pp.3831-3842.
    [36]Ruoheng Liu and Wade Trappe, Eda., "Securing Wireless Communications at the Physical Layers,"Springer New York Dordrecht Heidelberg London,2010.
    [37]A.Swindlehurst,"Fixed SINR Solution for the MIMO Wiretap Channel,:IEEE International Conference on Acoustics, Speech and Signal Processing,ICASSP 2009,2009, pp.2437-2440.
    [38]G. J. Foschini and M, J. Gans, "On Limits of Wireless Communications in a Fading Environment When using Multiple Antennas," Wireless Personal Commun.:Kluwer Acadamic Press, no.6, pp.311-335,1998.
    [39]S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, UK:Cambridge University Press,2004.
    [40]FCC Spectrum Policy Task Force,"FCC Report of the Spectrum Efficient Working Group," FCC, Tech. Rep.,2002.
    [41]Khoa T.Phan, Sergiy A. etc,"Spectrum Sharing in Wireless Networks via QoS-Aware Secondary Multicast Beamforming," IEEE Transactions on Signal Processing, vol.57, no.6, June 2009.
    [42]Q.Zhao and B.M.Sadler, "A Survey of Dynamic Spectrum Access," IEEE Signal. Processing Magazing, pp.79-89, May 2007.
    [43]S.Haykin,"Cognitive Radio:Brain-empowered Wireless Communications," IEEE J.Select. Areas Commun.,vol.23, pp.201-220,Feb.2005.
    [44]I.Mitola and G.O.Maguire,"Cognitive Radio:Making Software Radios More Personal," IEEE Pers. Commun., vol.6, no.4, pp.13-18, Aug.1999.
    [45]Pei Y,Liang Y C,The K C,etl al.. "Secure Communication over MISO Cognitive Radio Channels [J]."IEEE Transactions on Wireless Communications,2010,9(4): 1494-1502.
    [46]R.Zhang, Y.C.Liang and S.Cui, "Dynamic Resource Allocation in Cognitive Radio Networks:A Convex Optimization Perspective," IEEE Signal Process. Mag., vol.27, no.3, pp.102-114, May 2010.
    [47]R.Zhang,Y.C.Liang,"Exploiting Multi-antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks," IEEE J.Sel.Topics Signals Process., vol.2, no.1, pp.88-102, Feb.2008.
    [48]Pei Y, Liang Y C, Teh K C, etl al.. "Secure Communication in Multiantenna Cognitive Radio Networks with Imperfect Channel State Information [J],"IEEE Transactions on Signal Processing,2011,59(4):1683-1693.
    [49]Y.Pei, Liang Y-C,K.C. The and K.H Li, "Achieving Cognitive and Secure Transmissions using Multiple Antennas," in Proc. IEEE Int., Symn. Pers., Indoor and Mobile Radio Commun.(PIMRC'09),Sep.2009.pp.1-5.
    [50]Chen Tao,Yu Hua and WeiGang,"Study on the Physical Layer Security of Cognitvie Radio Networks and Its Robustness Design," Journal of Electronics&Information Technology, vol.34, no.4, Apr.2012.
    [51]David Tse and Pramod Viswanath, Fundamentals of Wireless Communication, Cambridge University Press,2005.
    [52]J. Strum, "Using SeDuMi 1.02,A Matlab toolbox for optimization over symmetric cones," Opti. Meth. Softw., vol.11-12, pp.625-653,1999.
    [53]M.Grant and S.Boyd, "CVX:Matlab software for disciplined convex programming(web page and software) http://cvxr.com/cvx/," Jun.2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700