基于网络编码的无线协同中继技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线协同中继技术是一种新的空间分集解决方法,它克服了多天线技术(MIMO)在实际应用中的限制,不仅可以扩展网络的覆盖范围,还可以利用空间分集效应来获得容量增益,引起了宽带无线通信领域的重视。然而,无线协同中继技术侧重于采用分集来抵抗多径衰落,对于提高系统的传输容量作用有限。而网络编码技术(Network Coding)作为一种从理论上可以达到组播传输(Multicast)容量上限的全新技术,恰好弥补了无线协同中继技术的不足。因此,将无线协同中继技术与网络编码技术相融合,二者优势互补,可进一步提升系统的整体传输性能。因此,基于网络编码的无线协同中继技术具有极为广阔的研究和发展前景。
     除了可以显著提高网络的传输容量,网络编码还是一种增强系统安全性和可靠性的好方法。然而,网络编码通过中间节点对信息进行编码再转发的机制,会因数据包的丢失、篡改和失效等问题面临新的挑战;并且,协同中继网络中大量引入的中继节点,也会使网络更容易遭受外部恶意的窃听。然而,无论是传统的基于密钥的安全机制还是网络编码机制都不能保证无线通信的绝对安全,因此,人们开始关注一种基于信息论的无条件安全理论——无线物理层安全。这一安全理论的建立,为通信安全开辟了一个新的研究方向。
     本文在基于模拟网络编码(ANC)的无线协同中继传输方案的基础之上,以信道容量和窃听信道的安全容量问题作为主要研究对象,进行了如下几个方面的研究:
     (1)在无线协同中继系统中融合网络编码技术的初衷,是为了能够利用其显著提高网络传输容量的优良特性。因此,首先论文以信道容量作为主要研究对象,针对两种典型的无线协同中继应用场景(双向中继信道和上行多址接入协同中继信道),分别设计了不同的基于ANC的无线协同中继传输方案;并详细描述了其信号传输和编/解码的过程,及如何缩减传输时隙数;然后,理论推导出了不同方案的信道容量表达式;最后,通过数值计算与仿真,比较和分析了ANC技术在提高无线协同中继系统信道容量性能方面的技术先进性。
     (2)尽管仿真结果证明了在不同的应用场景下,无线协同中继系统中采用ANC技术均可以获得显著的信道容量性能增益,但是该性能增益同时还受到了信噪比(SNR)、中继位置和ANC噪声累积负效应的影响。因此,论文为了降低以上因素对ANC性能增益的影响,在系统资源受限的前提下,采用优化无线资源分配的方法,分别提出了两种无线协同中继应用场景下,以最大化系统信道容量为目标的最优功率分配方案;并通过数值仿真,分析了最优功率分配方案为提高系统信道容量性能所带来的增益。
     (3)网络编码还是一种增强系统安全性和可靠性的好方法,然而它还是无法保证无线通信的绝对安全,而且当窃听者位于某些特定位置时,网络编码毫无安全性可言。因此,论文以窃听信道的安全容量特性作为另一主要研究对象,以双向中继窃听信道作为分析场景,首先理论推导出了基于ANC的双向中继窃听信道安全容量表达式;然后,通过数值仿真,分析了影响该系统安全容量特性的主要因素:包括窃听者距被窃听节点的距离、角度及节点功率分配策略;最后,根据影响因素分析结果,提出了提高ANC双向中继窃听信道安全容量特性的两种策略:包括调整节点功率分配和利用噪声累积负效应,并通过仿真分析了调整节点功率分配的策略对于提高系统安全容量特性的效果。
     (4)针对论文提出的提高ANC双向中继窃听信道安全容量特性的第二种策略——利用噪声累积负效应,论文按照无线物理层安全的观点,采用协同干扰机制(Cooperative Jamming),以双向中继窃听信道作为分析场景,分别设计了基于中继干扰和节点干扰的几种不同的协同干扰传输方案,并详细描述了其信号传输和编/解码过程,及如何引入主动干扰来抑制窃听;然后,理论推导出了不同方案的窃听信道安全容量表达式;最后,通过数值仿真,分析了协同干扰方案为提高窃听信道安全容量特性所带来的增益。
Wireless cooperative relay technology is a new spatial diversity solution, which can overcome the limitations of MIMO in practical applications, extend the network coverage and gain larger capacity through spatial diversity effect. It has drawn growing attention in the field of broadband wireless communications. However, wireless cooperative relay technology mainly focuses on combating multi-path fading thorough diversity, and is limited to improve the transmission capacity of the system. As a new technology, Network Coding can achieve the theoretical upper bound of multicast transmission capacity, which makes up the lack of wireless cooperative relay technology. So the integration and complemention of wireless cooperative relaying and network coding can further enhance the transmission performances of system. There are broad research and development prospects in wireless cooperative relay technology based on network coding.
     Besides significantly increasing the network transmission capacity, network coding is also a good method to enhance the security and reliability of system. However, the network coding mechanism, which encodes and forwards information through intermediate nodes, will raise some new challenges to security due to the loss, tampering and failure of packets transmission; and the introduction of a large number of relay nodes will make the wireless cooperative relay networks more vulnerable to interference and eavesdropping. Neither the traditional key-based security mechanism nor network coding mechanism can ensure the wireless communication's absolute security. Therefore, more and more researchers pay attention to the new security theory——wireless physical layer security, which is a kind of unconditional security based on information theory. The establishment of the theory has opened up a new research direction for the communication security.
     Based on the transmission schemes of wireless cooperative relay system using analog network coding (ANC), the following aspects are researched in this paper regarding the channel capacity and security capacity of the wiretap channel as two main objects.
     (1) The original purpose of integrating network coding technology in wireless cooperative relay system is to use its excellent feature to in-crease the the network transmission capacity. So firstly, regarded the ch-annel capacity as the main object, different transmission schemes of wireless cooperative relay system using ANC are designed for two typical wireless cooperative relay scenarios (Two way relay channel and Uplink multiple access relay channel). The process of signal transmission, encoding/decoding and how to reduce the transmission time slots are described; and then the channel capacity of different transmission schemes are derived; finally, the advantage of using ANC technology to improve the transmission capacity of wireless cooperative relay system is analyzed through numerical calculation and simulation.
     (2) Although the simulation results demonstrate that using the ANC technology in wireless cooperative relay system can significantly enhance the transmission capacity for different scenarios, the performan-ce gain is also influenced by the signal-to-noise ratio (SNR), the relay location and the cumulation of ANC noises. So, in order to reduce the influence of above factors on the ANC performance gain, the optimal power allocation schemes to maximize the channel capacity for two wireless scenarios are presented, using the resource optimization al-location method in the case of limited resources. Finally the gain of channel capacity by optimal power allocation schemes is analyzed through numerical calculation and simulation.
     (3) Network coding is also a good method to enhance the security and reliability of system, but it can not ensure the wireless communication's absolute security. When the eavesdroppers locate at some special positions, it is not secure at all. So, regarded the wiretap channel's security capacity as another object, the security capacity for ANC two way relay wiretap channel is derived; then the main factors influencing the security capacity are analyzed through numerical simulation, including eavesdropper's distance from communication node, angle and power allocation strategy; finally two strategies to improve security capacity of ANC two-way relay wiretap channel are presented, including adjusting the nodes'power allocation and using the negative effect of noise cumulation. The gain of security capacity by adjusting the nodes'power allocation is analyzed through numerical simulation.
     (4) For the second strategy (using the negative effect of noise cumulation) to improve the security capacity of ANC two-way relay wiretap channel, according to the viewpoint of the wireless physical layer security and cooperative jamming mechanism, the different cooperative jamming schemes of ANC two-way relay wiretap channel based on relay and node are designed; then the process of signal transmission, encoding/decoding and how to introduce active interferen-ce to suppress the wiretap are described, and the security capacity of diff-erent schemes are derived; finally, the gain of security capacity by cooperative jamming schemes is analyzed through numerical simulation.
引文
[1]秦飞IMT-Advanced标准化进程介绍http://tech.sina.com.cn/t/2007-10-15/ 08221792041.shtml,2007.
    [2]谢显中,雷维嘉IMT-Advanced标准发展分析.信息通信技术,2010,1,pp.33-39.
    [3]闻立群,胡海波,庾志成.4G技术发展特征及趋势分析.通信世界,2008,2,pp.41-42.
    [4]沈嘉IMT-Advanced无线空中接口关键技术.电信科学,2007,9,pp.51-54.
    [5]覃团发,姚海涛,覃远年等.移动通信.重庆:重庆大学出版社,2004.
    [6]啜刚,高伟东,彭涛TD-SCDMA无线网络规划优化及无线资源管理.北京:人民邮电出版社,2007.
    [7]龚建民,刘崇春.多入多出通信系统原理.北京:科学出版社,2010.
    [8]张忠培,魏宁,史治平.协同无线通信导论.北京:电子工业出版社,2010.
    [9]彭木根,王文博等.协同无线通信原理与应用.北京:机械工业出版社,2008.
    [10]黄宇胜.LTE-Advanced中核心技术的介绍http://wenku.baidu.com/view/6dcd 2420dd36a32d73758171.html,2011.
    [11]You Z. D., R10中继技术总结报告http://wenku.baidu.com/view/6e017d39376 flffc4fadca.html,2010.
    [12]Cover T., El-Gamal A., Capacity theorems for the relay channel, IEEE Transactions on Information Theory,25(5),1979, pp.572-584.
    [13]Sendonaris A., Erkip E., Aazhang B., Increasing uplink capacity via user cooperation diversity, Information Theory,1998, Aug. pp.16-21.
    [14]Laneman J. N., Wornell G. W., Tse D., An efficient protocol for realizing cooperative diversity in wireless networks, IEEE International Symposium on Information Theory,2011, pp.294-299.
    [15]Laneman J. N., Copeative diversity in wireless networks:algorithms and architectures [Dissertation], MIT, Cambridge, MA,2002.
    [16]Laneman J. N., Tse D., Wornell G. W., Coperative diversity in wireless networks: efficient protocols and outage behavior, IEEE Transactions on Information Theory,50(12),2004, pp.3062-3080.
    [17]Laneman J. N., Wornell G. W., Distributed space-time code protocols for exploiting cooperative diversity in wireless networks, IEEE Transactions on Information Theory,49(12),2003, pp.3062-3080.
    [18]Yu G. D., Zhang Z. Y., Qiu P. L., Space-time code ARQ Protocol for wireless networks, IEEE WCNM, Wuhan, China,2005, pp.453-457.
    [19]Hunter T. E., Nosratinia A., Coperative diversity through coding, IEEE ISIT, Lausanne, Switzerland,2002, pp.220-225.
    [20]Simoens S., Munoz O., Vidal J., Achievabale Rates of Compress-and-Forward Copperative Relaying on Gaussian Vector Channels, IEEE ICC2007,2007, pp.4225-4231.
    [21]Bao X., Li J., Efficient message relaying for wireless user cooperation: Decode-Amplify-Forward (DAF) and hybrid DAF and coded-coperation, IEEE Transactions on Wireless Communications,6(11),2007, pp.3975-3984.
    [22]Janani M., Hedayat A., Hunter T. E., et al., Coded cooperation in wireless communication:space-time transmission and iterative decoding, IEEE Transactions on Signal Processing,52(2),2004, pp.362-371.
    [23]Hasna M. O., Alouini M. S., End-to-end performance of transmission system with relays over Rayleigh-fading channels, IEEE Transactions on Wireless Communications,2(6),2003, pp.1126-1131.
    [24]Yi Z., Adve R., Teng J. L., Symbol error rate of selection amplify-and-forward relay systems, Communication Letters,10(11),2006, pp.757-759.
    [25]Chau Y. A., Huang K. Y., Channel statistics and performance of cooperative selection diversity with dual-hop amplify-and-forward relay over Rayleigh fading channels, IEEE Transactions on Wireless Communications,7(5),2008, pp.1779-1785.
    [26]Yi Z., Adve R., Teng J. L., Outage probability at arbitrary SNR with cooperative diversity, Communication Letters,9(8),2005, pp.700-702.
    [27]Himal A. S., Peter J. S., Jean A., Outage probability of cooperative relay networks in Nakagami-m fadig channels, Communication Letters,10(12),2006, pp.834-836.
    [28]Kramer G., Gastpar M., Gupta P., Cooperation strategies and capacity theorems for relay networks, IEEE Transactions on Information Theory,51(9),2005, pp.3037-3063.
    [29]Zahedi S., Mohseni M., El-Gamal A., On the capacity of AWGN relay channels with linear relaying functions, In Proceedings of IEEE ISIT, Chicago, USA, 2004,pp.399-403.
    [30]Rankov B., Wittneben A., Achievable rate regions for the two-way relay channel, IEEE International Symposium on Information theory,2006, pp.1668-1672.
    [31]Rankov B., Wittneben A., Spectral efficient protocols for halfduplex fading relay channels, IEEE J. Sel. Areas Commun,25(2),2007, pp.379-389.
    [32]Liang Y., Kramer G., Capacity theorems for cooperative relay broadcast channels, The 40th Annual Conference on information sciences and system, New Jersey, USA,2006, pp.1719-1724.
    [33]Wang B., Zhang J., Mdsen A. H., On the capacity of MIMO relay channels, IEEE Transactions on Information Theory,51(1),2005, pp.29-43.
    [34]Yao Y, Cai X., Giannskis G B., On energy efficiency and optimum resource allocation of relay transmissions in the low-power regime, IEEE Transactions on Wireless Communications,4(6),2005, pp.2917-2927.
    [35]Xitirnin D., Haimovich A. M., Power allocation for cooperative relaying in wireless networks, Communications Letters,9(11),2005, pp.994-996.
    [36]Gunduz D., Erkip E., Opportunistic cooperation by dynamic resource allocation, IEEE Transactions on Wireless Communications,6(4),2007, pp.1446-1454.
    [37]张静美,邵春菊,王莹等.基于不同信道状态信息的两跳中继系统最优功率分配.北京邮电大学学报,04,2005,pp.58-61.
    [38]Zhang J. M., Zhang Q., Adaptive Optimal Transmit Power Allocation for Two-hop Non-regenerative Wireless Relaying System, IEEE Vehicular Technology Conference, Milan, Italy,2004, pp.1214-1217.
    [39]Zhang Q., Zhang J. M., Shao C., et al., Power allocation for regenerative relay channel with Rayleigh fading, in Proc IEEE 59th Veh. Technol. Conference (VTC), Milan, Italy,2004,2, pp.1167-1171.
    [40]唐伦,刘通,陈前斌等Two-way中继系统协作节点选择及功率分配策略.电子与信息学报,32(9),2010,pp.2077-2082.
    [41]Agustin A., Vidal J., Munoz O., Protocols and resource allocation for the two-way relay channel with half-duplex terminals, IEEE International Conference on Communications, Chengdu, Sichuan, CHINA,2009, pp. 4288-4292.
    [42]Wyner A. D., The wire-tap channel, Bell Syst. Tech,1975,54(8), pp.1355-1387.
    [43]Leung-Yan-Cheong S. K., Hellman M. E., The gaussian wiretap channel, IEEE Tans. Inf. Theory,24,1978, pp.451-456.
    [44]Liang Y., Poor H. V., Multiple-access channels with confidential messages, IEEE Trans. Inf. Theory,54(3),2008, pp.976-1002.
    [45]Tekin E., Yener A., The general gaussian multiple access and two-way wiretap channels:achievable rates and cooperative jamming, IEEE Trans. Inf. Theory, 54(6),2008, pp.2735-2751.
    [46]Yuksel M., Erkip E., Secure communication with a relay helping the wiretapper, IEEE ITW, Lake Tahoe, CA,2007, pp.595-600.
    [47]He X., Yener A., On the equivocation region of relay channels with orthogonal components, The 41st Annual Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA,2007, pp.883-887.
    [48]Dong L., Han Z., Petropulu A., et al., Improving wireless physical layer security via cooperating relays, IEEE Transactions on Signal Processing.58(3),2010, pp. 1875-1888.
    [49]Tarasak P., Minn H., Lee Y. H., Analysis of incremental relaying protocol with RCPC in cooperative diversity systems, IEEE Vehicular Technology Conference, Stockholm, Sweden,2005,4, pp.2537-2541.
    [50]Ganesan G., Li Y, Agility improvement through cooperative diversity in cognitive radio, IEEE Global Telecommunications Conference,2005,5, pp.2505-2509.
    [51]Katti S., Network Coded Wireless Architecture [Dissertation], Boston, Massachusetts, USA:Massachusetts Institute of Technology,2008.
    [52]彭木根,王月新,刘红梅等.无线多跳通信网络中的网络编码技术.电信快报,2007,8,pp.10-15.
    [53]Katti S., Maric I., Goldsmith A., et al., Joint relaying and network coding in wireless networks, in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice,France, 2007, pp.1101-1105.
    [54]Maric I., Analog Network Coding in the High-SNR Regime,2010 IEEE Wireless Network Coding Conference (WiNC), Boston, USA,2010, pp.1-6.
    [55]Elias P., Feinstein A., Shannon C., A note on the Maximum Flow Through a Network, IEEE Transaction on Information Theory,2(4),1956, pp.117-119.
    [56]Ahlswede R., Cai N., Li S. Y., et al., Network information flow, IEEE Transaction on Information Theory,46,2000, pp.1204-1216.
    [57]Li S. Y,, Yeung R. W., Cai N., Linear network coding, IEEE Tans Info Theory, 49(2),2003, pp.371-381.
    [58]Koetter R., Medard M., An algebraic approach to network coding, IEEE/ACM Transaction on Networking,2003,11, pp.782-795.
    [59]Ho T., Madard M., Shi J., et al., On Randomized Network Coding, In 41st Annual Allerton Conference on Communication Control and Computing, Oct. 2003,pp.1-10.
    [60]Wu Y. N., Jain K., Kung S. Y., A unification of Menger's and Edmonds's graph theorems and Aslswede et al's network coding theorem, The 42nd Conf on Communication, Control, and Computing, Monticello,2004, pp.1-27.
    [61]Ho T., Koetter R., Medard M., et al., The benefits of coding over routing in a randomized setting, In IEEE International Symposium on Information Theory, 2003, pp.442.
    [62]Neely M., Modiano E., Rohrs C. E., Dynamic power allocation and routing for time-varying wireless networks, in Proceedings of IEEE Infocom,23(1),2003, pp.89-103.
    [63]Yuan J., Li Z. P., Yu W., et al., A Cross-Layer Optimization Framework for Muticast in Multi-hop Wireless Networks, Proc. Of First International Conference of Wireless Internet (WICON), Budapest, Hunggary,2005, pp. 47-54.
    [64]Zhang S., Liew S., Lam P., Physical layer network coding, In Proc.of ACM MOBICOM,2006, pp.358-365.
    [65]Katti S., Gollakota S., Katabi D., Embracing wireless interference:Analog network coding, in ACM SIGCOMM,37(4),2007, pp.397-408.
    [66]Wu Y. N., Chou P. A., Kung S. Y., Minimum-energy Multicast in Mobile Ad-hoc Networks using Network Coding, Proc. IEEE Information Theory Workshop, San Antonio, Texas, United States,53(11), Oct.2004, pp.1906-1918.
    [67]Widmer J., Fragouli C., Boudec L., Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding, First Workshop on Network Coding, March 2005, pp.1-6.
    [68]Fragouli C., Widmer J., Boudec L., A network coding approach to energy efficient brocasting:from theory to practice, Inforcom 2006, EPFL, July 2005, pp.1-11.
    [69]Petrovic D., Ramchandran K., Rabaey J., Coding for sensor networks using untuned radios, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, Jnue 2005, pp.1093-1097.
    [70]Cai N., Yeung R.W., Network coding and error correction, in Proc. of ITW, Rangalore, India,2002, pp.119-122.
    [71]Yeung R.W., Cai N., Network error correction, Part I Basic cncept and upper bound, Communications in Inf. And Sys.,2006,6, pp.19-36.
    [72]Wu Y., Chou P. A., Zhang Q., et al., Network planning in wireless ad hoc networks:A cross-layer approach, IEEE J Sel Areas Communications,23(1), 2005, pp.136-150.
    [73]Yang S., Yeung R.W., Refined Cording Bounds for Network Error Correction, IEEE Information Theory Workshop Information Theory for Wireless Network, July 2007, pp.1-5.
    [74]Yang S., Yeung R.W., Characterizations of network error correction/detection and erasure correction, in Netcod2007,2007, pp.1-6.
    [75]Matsumoto R., Construction Algorithm for Network Error-Correction Codes Attaining the Singleton Bound, IEICE TRANS. FUNDAMENTALS,2007, pp. E90-A(9).
    [76]Nguyen D., Nguyen T., Bose B., Wireless broadcast using network coding, In Proc. of the Third Workshop on Network Coding, Theory, and Applications, San Diego, CA:ACM Press,2007, pp.1-11.
    [77]Lu F., Geng L., Chia L.T., et al., Secure Multi-path in Sensor Network, SenSys 07, Proceedings of the 5th international conference on Embedded networked sensor systems, November 2007, pp.413-414.
    [78]Cai N., Yeung R.W., A security condition for multi-source linear network coding, in Proc.ISIT, Nice, France,2007, pp.561-565.
    [79]Lima L., Medard M., Barros J., Random linear network coding:a free cipher, in Proc. of IEEE International Symposium on Information Theory, Nice, France, 2007, pp.546-550.
    [80]Ho T., Leong B., Koetter R., et al., Byzantine modification detection in multicast network using randomized network coding, IEEE International Symposium on Information Theory,54(6),2008, pp.2798-2803.
    [81]Krohn M. N., Freedman M. J., Mazieres D., On the fly verification of rateless erasure codes for efficient content distribution, IEEE Symp Security and Privacy, Oakland,2004, pp.226-240.
    [82]Charles D., Jain K., Lauter K., Signatures for network coding, The 40th Annual Conference on Information Sciences and Systems, Princeton, NJ,2006, pp.857-863.
    [83]Paulo F., Barros J., Netwok Coding Protocols for Secret Key Distribution, OTM 2007, Part Ⅱ, LNCS 4804,2007, pp.1718-1733.
    [84]Ayday E., Delgosha F., Fekri F., Location-Aware Security Services for Wireless Sensor Nerworks using Network Coding, in Proc. IEEE INFOCOM,2007, pp.1226-1234.
    [85]Wang T., Giannakis G. B., Complex field network coding for multiuser cooperative communications, IEEE Journal on Selected Areas in Communications,26(3), Apr.2008, pp.561-571.
    [86]Wang T., Giannakis G. B., High-throughput cooperative communications with complex field network coding, In Proceedings of 41st Annual International Conference on Information Sciences and Systems (CISS), Baltimore, MD,2007, pp.253-258.
    [87]Wang T., Wang R., Giannakis G. B., Smart regenerative relays for link-adaptive cooperative communications, The 40th Annual Conference on Information Sciences and Systems, New Jersey, USA,2006, pp.1038-1043.
    [88]Cover T. M., Thomas J. A., Elements of Information Theory, John Wiley & Sons. Inc.2006.
    [89]Shannon C., A mathematical theory of communication, Bell System Technical JI, 27,1948, pp.379-423,623-656.
    [90]Van der meulen E., A survey of multi-way channels in information theory, IEEE Trans. Info. Theory,23(1),1977, pp.1-37.
    [91]Cover T. M., El-Gamal A., Capacity Theory for the Relay Channel, IEEE Trans. Info. Theory, IT-25(5),1979, pp.572-587.
    [92]Zhang S., Liew S.C., The capacity of two-way relay channel, http://arxiv.org/abs/0804.3120,2008.
    [93]Knopp R., Two-way wireless communication via a relay station, http://www.eurecom.fr/-gesbert/presentations/raymond.pdf,2007.
    [94]Sharma S., Is Network Coding Always Good for Cooperative Communications, INFOCOM,2010 Proceedings,2010, pp.1-9.
    [95]Larsson P., Johansson N., Sunell K. E., Coded bidirectional relaying, in Proc. IEEE 63rd Veh. Technol. Conference (VTC), Melbourne, Australia,2, May 2006, pp.851-855.
    [96]Shin W., Lee N., Lim J., et al., An optimal transmit power allocation for the two-way relay channel using physical-layer network coding, IEEE International Conference on Communications Workshops,2009, pp.1-6.
    [97]Peh E. C. Y., Liang Y. C., Guan Y. L., Power control for physical-layer network coding in fading environments, Personal, Indoor and Mobile Radio Communications,2008, pp.1-5.
    [98]Yi Z. H., Ju M. C., Kim I. M., Outage Probability and Optimum Power Allocation for Analog Network Coding, IEEE Transactions on Wireless Communications,2011,10, pp.407-412.
    [99]周旋.网络编码技术中的信息安全问题研究.计算机安全,2009,6,pp.14-16.
    [100]杨义先,郭钦.网络编码在网络安全中的应用.中兴通讯技术,15(1),2009,2,pp.4-7.
    [101]罗明星,杨义先,王励成等.抗窃听的安全网络编码.中国科学,40(2),2010,pp.371-380.
    [102]Liang Y. B., Poor H. V., Shamai S., Information Theoretic Security, Journal Foundations and Trends in Communications and Information Theory,5(4-5). Apr.2009, pp.355-580.
    [103]Shannon C, Communication theory of secrecy systems, Bell Systematic Technical Journal.28,1949, pp.656-715.
    [104]Csiszar I., Korner J., Broadcast channels with confidential messages, IEEE Trans on Information Theory,24,1978, pp.339-348.
    [105]Tekin E., Yener A., The Gaussian Multiple-Access and Two-way Wire-tap Channels:Achievable Rates and Cooperative Jamming, IEEE Transactions on Information Theory,54(9), June 2008, pp.4762-4763.
    [106]Dong L., Han Z., Petropulu A. P., et al., Secure Wireless Communicationsvia Cooperation, Forty-Sixth Annual Allerton Conference, Illinois, USA. September 2008, pp.1132-1138.
    [107]Dong L., Han Z., Petropulu A. P., et al., Amplify-and-forward based cooperation for secure wireless communications, In Proc. IEEE Int. Conf. Acoust, Speech, Signal Process, Taipei, Apr.2009, pp.2613-2616.
    [108]Mukherjee A., Swindlehust A. L., Fixed-rate power allocation strategies for enhanced sececy in MIMO wier-tap channels, Proc. IEEE SPAWC, Perugia, June 2009, pp.344-348.
    [109]Tekin E., Yener A., The Gaussian multiple access wire-tap channel, IEEE Transactions on Information Theory, May 2006, pp.404-413.
    [110]Debbah M., El-Gamal H., Poor H.V., et al., Wireless Physical Layer Security, EURASIP Journal on Wireless Communications and Networking,2009, pp.1-2.
    [111]Bloch M., Barros J., Rodrigues R. D., et al., Wireless Information-Theoretic Security, IEEE Transactions on information theory, June 54(6),2008, pp.2515-2534.
    [112]Liu R. H., Trappe W., Securing Wireless Communications at the Physical Layer, Springer,2009.
    [113]龙航,袁广翔,王静等.物理层安全技术研究现状与展望.电信科学,09,2011,pp.60-65.
    [114]Lee Y, S., Liang Y. L., Cheng M. W., Time Domain Measurement System for Conducted EMI and CM/DM Noise Signal Separation, International Conference on Power Electronics and Drives Systems. PEDS 2005, Malaysia,2005,2, pp. 1640-1645.
    [115]Kannan G., Milani A. A., Panahi I., Active noise control of noisy periodic signals using signal separation, IEEE International Conference on Acoustics, Speech and Signal Processing,Las Vegas, USA, March 2008, pp.1617-1620.
    [116]Andreyev Y. V., Dmitriev A. S., Efremova E. V., Separation of chaotic signal sum into components in the presence of noise, IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,50,2003, pp.613-618.
    [117]Kim J., Cooperative radar jamming for groups of unmanned air vehicles.43rd IEEE Conference on Decision and Control (CDC2004),1, Dec.2004, pp.632-637.
    [118]Zhao Z. C., Wang X. S., Xiao S. P., Cooperative deception jamming against radar network using a team of UAVs,2009 IET International Radar Conference, April 2009, pp.1-4.
    [119]Sui J. B., Xing C. F., Wu L., Conflict decision model between the jamming system and SAM in fleet cooperative air defense,2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE2010), June 2010, pp.181-184.
    [120]Sui J. B., Xing C. F., Wu L., The confict resolution of hardkill and sofkill weapon in feet cooperative air defense,2009 Chinese Control and Decision Conference, China, June 2009, pp.5045-5049.
    [121]Han Z., Marina N., Debbah M., et al., Physical layer security game:interaction between source, eavesdropper and friendly jammer, EURASIP J. Wireless Commun. New, June 2009, pp.287-294.
    [122]Lai L., El-Gamal H., Cooperative secrecy:The relay-eavesdropper channel, in Proc. Of IEEE ISIT, Nice, France, July 2007, pp.931-935.
    [123]Yuksul M., Erkip E., Secure communication with a relay helping the wire-tapper, in Proceeding of 2007 Information Theory Workshop, Sep.2007, pp.595-600.
    [124]Tang X., Liu R., Spasojevic P., et al., The Gaussian wiretap channel with a helping interferer, in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, July 2008,pp.389-393.
    [125]Dong L., Han Z., Petropulu A., et al., Cooperative jamming for wireless physical layer security, In Proc. IEEE Statistical Signal Processing Workshop, Cardiff, U. K, Aug.-Sep.2009, pp.417-420.
    [126]He X., Yener A., Two-Hop Secure Communication Using an Untrusted Relay, EURASIP Journal on Wireless Communications and Networking,2009, pp. 1-13.
    [127]Yuksel M., Liu X., Erkip E., A secure communication game with a relay helping the eavesdropper, Information Theory Workshop (ITW2009), Oct.2009, pp. 110-114.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700