摘要
针对密集异构蜂窝网在非理想信道状态信息条件下的安全传输问题,该文分析了人工噪声对通信的可靠性和安全性的影响,在此基础上提出功率分配优化模型,在不同信道估计精度条件下给出了最优的功率分配因子。首先,考虑信道估计误差对合法信号传输以及人工噪声泄露的影响,推导了典型通信链路的连通中断概率和安全中断概率。然后,在安全性和可靠性约束条件下建立功率分配优化模型以最大化系统安全吞吐量,并通过K维联合搜索算法得到每层网络的最优功率分配因子。最后,仿真结果表明系统设置最优功率分配因子时,人工噪声方案可提升约15%的安全吞吐量。
To ensure secure transmission in dense heterogeneous cellular networks with imperfect Channel State Information(CSI), the influence of Artificial Noise(AN) on secure and reliable communication is analyzed, and a power split factor optimization model is presented to obtain the optimal value under different channel estimation accuracy. First, the connection outage probability and secrecy outage probability are deduced by considering the influence of channel estimation error on signal transmission and AN leakage. Then, a power split factor optimization model is presented, which maximizes the secrecy throughput subject to the security and reliability requirements. A K-dimensional search method is employed to solve the optimal power split factor of each tier. Finally, the numerical results verify that the AN transmission scheme with optimal power split factor can increase secrecy throughput by about 15%.
引文
[1]YANG Xiaobin and FAPOJUWO A O.Coverage probability analysis of heterogeneous cellular networks in rician/rayleigh fading environments[J].IEEECommunications Letters,2015,19(7):1197-1200.doi:10.1109/LCOMM.2015.2430346.
[2]BLOCH M and BARROS J.Physical-layer Security:From Information Theory to Security Engineering[M].Cambridge:Cambridge University Press,2011:290-308.doi:10.1017/CBO9780511977985.
[3]YANG Nan,WANG Lifeng,GERACI G,et al.Safeguarding 5G wireless communication networks using physical layer security[J].IEEE Communications Magazine,2015,53(4):20-27.doi:10.1109/MCOM.2015.7081071.
[4]GOEL S and NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communication,2008,7(6):2180-2189.doi:10.1109/TWC.2008.060848.
[5]ZHANG Xi,ZHOU Xiangyun,and MCKAY M.Enhancing secrecy with multi-antenna transmission in wireless Ad hoc networks[J].IEEE Transactions on Information Forensics and Security,2013,8(11):1802-1814.doi:10.1109/TIFS.2013.2279842.
[6]CAI Yueming,XU Xiaoming,and YANG Weiwei.Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise[J].IETCommunications,2016,10(15):1904-1913.doi:10.1049/ietcom.2016.0117.
[7]ZHONG Zhihao,LUO Wenyu,PENG Jianhua,et al.Secrecy performance analysis of cooperative transmission and cooperative jamming for multi-tier heterogeneous cellular networks[J].SCIENTIA SINICA INformationis China Information Sciences,2016,46(1):33-48.doi:10.1360/N112015-00174.
[8]WANG Chao and WANG Huiming.Opportunistic jamming for enhancing security stochastic geometry modeling and analysis[J].IEEE Transactions on Vehicular Technology,2016,65(12):10213-10217.doi:10.1109/TVT.2016.2536621.
[9]ZHENG Tongxing and WANG Huiming.Optimal power allocation for artificial noise under imperfect csi against spatially random eavesdroppers[J].IEEE Transactions on Vehicular Technology,2016,65(10):8812-8817.doi:10.1109/TVT.2015.2513003.
[10]WANG Huiming,WANG Chao,ZHENG Tongxing,et al.Impact of artificial noise on cellular networks:A stochastic geometry approach[J].IEEE Transactions on Wireless Communications,2016,15(11):7390-7404.doi:10.1109/TWC.2016.2601903.
[11]LI Si,LI Qiang,and SHAO Shihai.Robust secrecy beamforming for full-duplex two-way relay networks under imperfect channel state information[J].Science China Information Sciences,2018,61(2):022307.doi:10.1007/S11432-017-9110-X.
[12]CAO Weifeng,ZOU Yulong,and YANG Zhen.Joint source-relay selection for improving wireless physical layer security[C].2016 IEEE Global Communications Conference,Singapore,2017:1-5.doi:10.1109/GLOCOM.2016.7841935.
[13]CAI Yunlong,SHI Qingjiang,CHAMPAGNE B,et al.Joint transceiver design for secure downlink communications over an amplify-and-forward MIMO relay[J].IEEE Transactions on Communications,2017,65(9):3691-3704.doi:10.1109/TCOMM.2017.2708110.
[14]WANG Huiming,ZHENG Tongxing,YUAN Jinhong,et al.Physical layer security in heterogeneous cellular networks[J].IEEE Transactions on Communications,2016,64(3):1204-1219.doi:10.1109/TCOMM.2016.2519402.
[15]GRADSHTEYN I,RYZHIK I,JEFFREY A,et al.Table of Integrals,Series,and Products[M].New York,USA,Academic,2007.doi:10.2307/2007757.