通信学报 ›› 2014, Vol. 35 ›› Issue (11): 59-68.doi: 10.11959/j.issn.1000-436x.2014.11.007

• 安全通信 • 上一篇    下一篇

基于非信任中继协作的保密通信联合功率控制

冯文江,蒋卫恒,邓艺娜,袁杨   

  1. 重庆大学 通信工程学院,重庆 400044
  • 出版日期:2014-11-25 发布日期:2017-06-20
  • 基金资助:
    中央高校基本科研业务费基金资助项目

Joint power control for untrusted relay cooperation-based confidential communication

Wen-jiang FENG,Wei-heng JIANG,Yi-na DENG,Yang YUAN   

  1. College of Communication Engineering,Chongqing University,Chongqing 400044,China
  • Online:2014-11-25 Published:2017-06-20
  • Supported by:
    The Fundamental Research Funds for the Central Universities

摘要:

针对多个与基站(BS,base station)无直达链路蜂窝边缘移动站(MS,mobile station)在上行链路具有保密信息传输需求且存在不信任中继(UR,untrusted relay)协作通信场景,引入目的节点(即BS)干扰机制,并研究MS固定传输功率下UR与BS功率分配以最大化系统安全速率问题。分析表明,该联合功率控制问题等价于联合接入控制与功率分配问题因而是NP-难。通过问题松弛,提出一种次优MS接入控制与基于交替优化的功率分配算法,并证明该次优算法具有多项式复杂度且至少收敛到原始问题一个次优解。仿真结果表明,所提次优算法相对于同场景各种参考算法在系统可达安全速率性能上有显著提高。

关键词: OFDMA, 非信任中继, 功率控制, 信息论安全

Abstract:

The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure communication between BS and multiple MS,destination-based jamming (DBJ) scheme was adopted.With the assumption that all MS had fixed transmit power,the joint UR and BS power control which aims at maximizing system sum secrecy rate was discussed.For this problem,analysis indicated that it was equivalent to joint access control and power allocation problem thus its NP-hard.Through problem relaxation,a suboptimal MS access control and alternatively power allocation algorithm was provided.This algorithm is proved to have polynomial complexity and can converge to at least a suboptimal solution for original problem.Simulation results show that compared with the benchmark algorithms,the proposed suboptimal algorithm is better in the achievable secrecy rate performance.

Key words: OFDMA, untrusted relay, power control, information-theoretic security

No Suggested Reading articles found!