基于方向调制的无线安全传输基本原理、关键技术与未来展望
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Basic Principles,Key Technologies,and Future Prospects of Wireless Security Transmission Based on Directional Modulation
  • 作者:陆锦辉 ; 万思明 ; 秦耀璐 ; 王正旺 ; 陆造宇 ; 束锋 ; 许庆贤
  • 英文作者:LU Jinhui;WAN Siming;QIN Yaolu;WANG Zhengwang;LU Zaoyu;SHU Feng;XU Qingxian;School of Electronic and Optical Engineering,Nanjing University of Science and Technology;College of Computer and Information,Fujian Agriculture and Forestry University;National Mobile Communications Research Laboratory,Southeast University;College of Computer and Information,Taiwan University of China;
  • 关键词:方向调制 ; 到达角估计 ; 稳健波束成形 ; 功率分配
  • 英文关键词:directional modulation(DM);;direction of arrival estimation;;robust beamforming;;power allocation
  • 中文刊名:NJHK
  • 英文刊名:Journal of Nanjing University of Aeronautics & Astronautics
  • 机构:南京理工大学电子工程与光电技术学院;福建农林大学计算机与信息学院;东南大学移动通信国家重点实验室;台湾中华大学计算机与信息学院;
  • 出版日期:2018-06-15
  • 出版单位:南京航空航天大学学报
  • 年:2018
  • 期:v.50;No.240
  • 语种:中文;
  • 页:NJHK201803003
  • 页数:10
  • CN:03
  • ISSN:32-1429/V
  • 分类号:18-27
摘要
方向调制(Directional modulation,DM)作为无线物理层安全传输的关键技术能够很好地提升系统的安全性能。然而,由于在角度测量过程中存在误差,因此需要在设计有用信号波束成形向量和人工噪声(Artificial noise,AN)投影矩阵时考虑角度误差,从而提升系统安全性能。本文首先描述了DM系统模型,然后介绍了到达角(Direction of arrival,DOA)估计技术、稳健波束成形设计的3种算法及功率分配技术。仿真表明:稳健波束成形合成方法的性能明显要优于非稳健合成方法,且有用信号和AN之间最优功率分配能明显提高安全速率性能。最后,对DM未来新的发展方向与所面临的挑战性等开放问题进行展望与总结。
        Directional modulation( DM),as the key technology of wireless physical layer security transmission,can improve the secrecy performance of the system. However,due to the angle measurement error,we need to consider the angle error to improve system security performance when designing useful signal beamforming vector and artificial noise( AN) projection matrix. The paper first describes system model of DM. Then we introduce the direction of arrival( DOA) estimation technique,three algorithms of robust beamforming design and power allocation technology. Simulations show that the performance of the robust beamforming synthesis method is obviously better than that of the non-robust synthesis method,and the optimal power allocation between the confidential information and the AN can significantly improve the security rate performance. Finally,the future new research directions and challenging problems are presented.
引文
[1]TUNCER T E,FRIEDLANDER B.Classical and modern direction-of-arrival estimation[M].Burlington,MA:Academic Press,2009.
    [2]YOON Y,KAPLAN L M,MCCLELLAN J H.New DOA estimator for wideband signals[J].IEEE Trans Signal Process,2006,54(6):1977-1989.
    [3]HUNG H,KAVEH M.Focusing matrices for coherent signal-subspace processing[J].IEEE Trans Signal Process,1988,36(8):1272-1281.
    [4]WANG H,KAVEH M.Coherent signal-subspace processing for the detection and estimation of angles of arrival of multiple wide-band sources[J].IEEE Trans Signal Process,1985,33(4):823-831.
    [5]WANG H,KAVEH M.On the performance of signalsubspace processing-part II:Coherent wideband systems[J].IEEE Trans Signal Process,1987,35(11):1583-1591.
    [6]KROLIK J,SWINGLER D.Multiple broadband source location using steered covariance matrices[J].IEEE Trans Signal Process,1989,37(10):1481-1494.
    [7]KROLIK J,SWINGLER D.Focused wideband array processing by spatial resampling[J].IEEE Trans Signal Process,1990,38(2):356-360.
    [8]BRONEZ T P.Sector interpolation of non-uniform arrays for efficient high-resolution bearing estimation[C]//Int Conf Acoust Speech Signal Process.New York:IEEE,1988:2885-2888.
    [9]FRIEDLANDER B.The root-MUSIC algorithm for direction finding with interpolated arrays[J].Signal Process,1933,30(1):15-29.
    [10]FRIEDLANDER B,WEISS A J.Direction finding using spatial smoothing with interpolated arrays[J].IEEE Trans Aerosp Electron Syst,1992,28(2):574-587.
    [11]HYBERG P,JANSSON M,OTTERSTEN B.Array interpolation and DOA MSE reduction[J].IEEE Trans Signal Process,2015,53(12):4464-4471.
    [12]ELIO D,CLAUDIO D,PARISI R.Waves:Weighted average of signal subspace for robust wideband direction finding[J].IEEE Trans Signal Process,2001,49(10):2179-2191.
    [13]REILLY Ng W,KIRUBARAJAN J P,LAROCQUE T J.Wideband array signal processing using MCMC methods[J].IEEE Trans Signal Process,2005,53(2):411-426.
    [14]KAYA YASAR T,TUNCER T E.Wideband DOA estimation for nonuniform linear arrays with Wiener array interpolation[C]//Fifth IEEE Sensor Array and Multichannel Signal Processing Workshop.[S.l.]:IEEE,2008:207-211.
    [15]TUNCER T E,KAYA YASAR T,FRIEDLANDER B.DOA estimation for nonuniform linear arrays by using array interpolation[J].Radio Sci,2007,42(4):4002.
    [16]TUNCER T E,KAYA YASAR T,FRIEDLANDER B.Partly-filled nonuniform linear arrays for DOA estimation in multipath signals[C]//Int Conf Acoust Speech Signal Process.Hawaii:IEEE,2007,2:1053-1056.
    [17]BABAKHANI A,RUTLEDGE D B,HAJIMIRI A.Transmitter architectures based on near-field direct antenna modulation[J].IEEE Journal of Solid-State Circuits,2008,43(12):2674-2692.
    [18]ALRABADI O N,PEDERSEN G F.Directional spacetime modulation:A novel approach for secured wireless communication[C]//IEEE International Conference on Communications(ICC).[S.l.]:IEEE,2012:3554-3558.
    [19]HONG T,SONG M Z,LIU Y.RF directional modulation technique using a switched antenna array for physical layer secure communication applications[J].Progress in Electromagnetics Research,2011,116:363-379.
    [20]DALY M P,BERNHARD J T.Directional modulation technique for phased arrays[J].IEEE Transactions on Antennas and Propagation,2009,57(9):2633-2640.
    [21]DALY M P,DALY E L,BERNHARD J T.Demonstration of directional modulation using a phased array[J].IEEE Transactions on Antennas and Propagation,2010,58(5):1545-1550.
    [22]DALY M P,BERNHARD J T.Beamsteering in pattern reconfigurable arrays using directional modulation[J].IEEE Transactions on Antennas and Propagation,2010,58(7):2259-2265.
    [23]SHI H,TENNANT A.Secure physical-layer communication based on directly modulated antenna arrays[C]//Antennas and Propagation Conference(LAPC).Leicestershire:IEEE,2012:1-4.
    [24]SHI H,TENNANT A.Tennant characteristics of a two element direction dependent antenna array[C]//Antennas and Propagation Conference(LAPC).Leicestershire:IEEE,2011:1-4.
    [25]SHI H,TENNANT A.Secure communications based on directly modulated antenna arrays combined with multipath[C]//Antennas and Propagation Conference(LAPC).Kunming:IEEE,2013:582-586.
    [26]DING Y,FUSCO V F.A vector approach for the analysis and synthesis of directional modulation transmitters[J].IEEE Trans Antennas Propag,2014,62(1):361-370.
    [27]ZOU Y,CHAMPAGNE B,ZHU W,et al.Relay-selection improves the security-reliability trade-off in cognitive radio systems[J].IEEE Trans Commun,2015,63(1):215-228.
    [28]WANG H,YIN Q,XIA X.Distributed beamforming for physical-layer security of two-way relay networks[J].IEEE Trans Signal Process,2012,61(5):3532-3545.
    [29]DONG L,HAN Z,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Trans Signal Process,2010,58(3):1875-1888.
    [30]SADEK M,TARIGHAT A,SAYED A H.A leakagebased precoding scheme for downlink multi-user MIMO channels[J].IEEE Trans Wireless Commun,2007,6(5):1711-1721.
    [31]HU J,YAN S,SHU F,et al.Artificial-noise aided secure transmission with directional modulation based on random frequency diverse arrays[J].IEEE Access,2017,5:1658-1667.
    [32]SHU F,WU X,HU J,et al.Secure and precise wireless transmission for random-subcarrier selection-based directional modulation transmit antenna array[J].IEEE J Sel Areas Commun,2018,99:1-14.
    [33]WU Y,SCHOBER R,NG D K,et al.Secure massive MIMO transmission in the presence of an active eavesdropper[C]//IEEE ICC.[S.l.]:IEEE,2015:1434-1440.
    [34]ZHENG T,WANG H.Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers[J].IEEE Trans Veh Technol,2016,65(19):8812-8817.
    [35]ZHOU X,MCKAY M R.Secure transmission with artificial noise over fading channels:Achievable rate and optimal power allocation[J].IEEE Trans Veh Technol,2010,59(8):3831-3842.
    [36]HU L,WEN H,WU B,et al.Cooperative jamming for physical layer security enhancement in internet of things[J].IEEE Internet Things J,2018,5(1):219-228.
    [37]TSAI S,POOR H V.Power allocation for artificial-noise secure MIMO precoding systems[J].IEEE Trans Signal Process,2014,62(13):3479-3493.
    [38]WANG H,WANG C,WING KWAN Ng D.Artificial noise assisted secure transmission under training and feedback[J].IEEE Trans Signal Processing,2015,63(23):6285-6298.
    [39]WANG H,WANG C,WING KWAN Ng D,et al.Artificial noise assisted secure transmission for distributed antenna systems[J].IEEE Trans Signal Process,2016,64(15):4050-4064.
    [40]CAPON J.High-resolution frequency-wavenumber spectrum analysis[J].IEEE Proc,1969,57(8):1408-1418.
    [41]SCHMIDT R.Multiple emitter location and signal parameter estimation[J].IEEE Trans Antennas Propag,1986,34(3):276-280.
    [42]BARABELL A.Improving the resolution performance of eigenstructurebased direction-finding algorithms[C]//IEEE International Conference on Acoustics,Speech,and Signal Processing(ICASSP).Boston,MA:IEEE,1983:336-339.
    [43]WANG W,CHAI R F,GAO F.An improved Root-MUSIC algorithm and MSE analysis[C]//2016 International Conference on Computer,Information and Telecommunication Systems(CITS).Kunming:IEEE,2016:1-4.
    [44]RAO B D,HARI K V S.Performance analysis of RootMUSIC[J].IEEE Trans Acoustics Speech Signal Process,1989,37(12):1939-1949.
    [45]SHU F,WAN S,YAN S,et al.Secure directional modulation to enhance physical layer security in Io T networks[J].IEEE Internet Things J,2018(99):1-9.
    [46]YU H,WAN S,CAI W,et al.GPI-based secrecy rate maximization beamforming scheme for wireless transmission with AN-aided directional modulation[J].IEEE Access,2018,6(1):12044-12051.
    [47]GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Trans Wireless Commun,2008,7(6):2180-2189.
    [48]ZHAO N,YU F R,LI M,et al.Physical layer security issues in interference-alignment-based wireless networks[J].IEEE Commun Mag,2016,54(8):162-168.
    [49]YAN S,ZHOU X,YANG N,et al.Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation[J].IEEE Trans Wireless Commun,2016,15(12):8286-8297.
    [50]YANG N,YAN S,YUAN J,et al.Artificial noise:Transmission optimization in multi-input single-output wiretap channels[J].IEEE Trans Commun,2015,63(5):1771-1783.
    [51]HU J,SHU F,LI J.Robust synthesis method for secure directional modulation with imperfect direction angle[J].IEEE Commun Lett,2016,20(6):1084-1087.
    [52]SHU F,WU X,LI J,et al.Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems[J].IEEE Access,2016,4:6614-6623.
    [53]SHU F,ZHU W,ZHOU X,et al.Robust secure transmission of using main-lobe-integration based leakage beaforming in directional modulation MU-MIMO systems[J].IEEE Syst J,2017(99):1-11.
    [54]SHU F,XU L,WANG J,et al.Artificial-noise-aided secure multicast precoding for directional modulation systems[J].IEEE Trans Veh Technol,2018(99):1-5.
    [55]WAN S,SHU F,LU J,et al.Power allocation strategy of maximizing secrecy rate for secure directional modulation networks[J].IEEE Access,2018(99):1-7.
    [56]SHU F,QIN Y,LIU T,et al.Low complexity and highresolution DOA estimation for hybrid analog and digital massive MIMO receive array[J].IEEE Trans Commun,2018(99):1-14.