Telecommunications Science ›› 2023, Vol. 39 ›› Issue (7): 68-79.doi: 10.11959/j.issn.1000-0801.2023141
• Research and Development • Previous Articles Next Articles
Hui LI, Guangqiu LI, Yancui LUO, Huizhi LIU
Revised:
2023-07-03
Online:
2023-07-20
Published:
2023-07-01
CLC Number:
Hui LI, Guangqiu LI, Yancui LUO, Huizhi LIU. Physical layer security of MIMO wireless systems with adaptive modulation[J]. Telecommunications Science, 2023, 39(7): 68-79.
[1] | 董洁, 李恒志, 陈岩 ,等. 频谱资源经济价值评估和定价机制研究及展望[J]. 电信科学, 2021,37(7): 107-114. |
DONG J , LI H Z , CHEN Y ,et al. Research and prospect on economic value evaluation and pricing mechanism of spectrum resources[J]. Telecommunications Science, 2021,37(7): 107-114. | |
[2] | GOLDSMITH A J , CHUA S G . Variable-rate variable-power MQAM for fading channels[J]. IEEE Transactions on Communications, 1997,45(10): 1218-1230. |
[3] | CHUNG S T , GOLDSMITH A J . Degrees of freedom in adaptive modulation:a unified view[J]. IEEE Transactions on Communications, 2001,49(9): 1561-1571. |
[4] | 段红光, 胡利, 田枚 . LTE-Advanced 系统中的自适应调制技术[J]. 电信科学, 2017,33(7): 88-93. |
DUAN H G , HU L , TIAN M . Adaptive modulation technology in LTE-Advanced system[J]. Telecommunications Science, 2017,33(7): 88-93. | |
[5] | 曾孝平, 毛海伟, 杨凡 ,等. Nakagami-m衰落信道下D2D通信自适应调制算法研究[J]. 通信学报, 2018,39(9): 31-42. |
ZENG X P , MAO H W , YANG F ,et al. Study on adaptive modulation in D2D communications over Nakagami-m fading channel[J]. Journal on Communications, 2018,39(9): 31-42. | |
[6] | 徐俊超, 林阳, 孙苗 ,等. 一种速率自适应的无线通信协议[J]. 电子测量技术, 2020,43(9): 1-7. |
XU J C , LIN Y , SUN M ,et al. Wireless communication protocol providing adaptive data rate[J]. Electronic Measurement Technology, 2020,43(9): 1-7. | |
[7] | COSTANZO A , LOSCRI V , BIAGI M . Adaptive modulation control for visible light communication systems[J]. Journal of Lightwave Technology, 2021,39(9): 2780-2789. |
[8] | 雷维嘉, 孙嘉琳, 谢显中 ,等. 能量收集通信系统中功率和调制方式的在线联合优化策略[J]. 电子与信息学报, 2022,44(3): 1024-1033. |
LEI W J , SUN J L , XIE X Z ,et al. Online joint optimization of power and modulation in energy harvesting communication systems[J]. Journal of Electronics & Information Technology, 2022,44(3): 1024-1033. | |
[9] | YU W J , JIA H W , MUSAVIAN L . Joint adaptive M-QAM modulation and power adaptation for a downlink NOMA network[J]. IEEE Transactions on Communications, 2022,70(2): 783-796. |
[10] | 李南希, 朱剑驰, 郭婧 ,等. NR MIMO增强演进及标准化进展[J]. 电信科学, 2022,38(3): 84-92. |
LI N X , ZHU J C , GUO J ,et al. Evolution and standardization progress for NR MIMO enhancement[J]. Telecommunications Science, 2022,38(3): 84-92. | |
[11] | ALOUINI M S , GOLDSMITH A J . Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques[J]. IEEE Transactions on Vehicular Technology, 1999,48(4): 1165-1181. |
[12] | ZHU X M , YUAN D F . Performance analysis of adaptive modulation in MIMO system using transmit antenna selection with Alamouti scheme[C]// Proceedings of 2008 4th International Conference on Wireless Communications,Networking and Mobile Computing. Piscataway:IEEE Press, 2008: 1-4. |
[13] | 闫富朝, 刘怡良, 韩帅 ,等. 空天地通信网络中物理层安全技术综述[J]. 电信科学, 2020,36(9): 1-13. |
YAN F C , LIU Y L , HAN S ,et al. A survey of physical layer security in space-air-ground communication and networks[J]. Telecommunications Science, 2020,36(9): 1-13. | |
[14] | SI J B , CHENG Z H , LI Z ,et al. Cooperative jamming for secure transmission with both active and passive eavesdroppers[J]. IEEE Transactions on Communications, 2020,68(9): 5764-5777. |
[15] | JAFARIAN F , MOBINI Z , MOHAMMADI M . Secure cooperative network with multi-antenna full-duplex receiver[J]. IEEE Systems Journal, 2019,13(3): 2786-2794. |
[16] | DONG L M , WANG H M . Enhancing secure MIMO transmission via intelligent reflecting surface[J]. IEEE Transactions on Wireless Communications, 2020,19(11): 7543-7556. |
[17] | KHODAKARAMI H , LAHOUTI F . Link adaptation for physical layer security over wireless fading channels[J]. IET Communications, 2012,6(3): 353-362. |
[18] | KHODAKARAMI H , LAHOUTI F . Link adaptation with untrusted relay assignment:design and performance analysis[J]. IEEE Transactions on Communications, 2013,61(12): 4874-4883. |
[19] | TAKI M , SADEGHI M . Spectral efficiency optimized secure broadcasting using adaptive modulation,coding and transmit power[C]// Proceedings of 2013 1st International Conference on Communications,Signal Processing,and their Applications (ICCSPA). Piscataway:IEEE Press, 2013: 1-5. |
[20] | HAMAMREH J M , YUSUF M , BAYKAS T ,et al. Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation[C]// Proceedings of 2016 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE Press, 2016: 1-7. |
[21] | ALVES H , SOUZA R D , DEBBAH M ,et al. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012,19(6): 372-375. |
[22] | YANG N , YEOH P L , ELKASHLAN M ,et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transactions on Communications, 2013,61(1): 144-154. |
[23] | ALVES H , DE CASTRO TOMé M , NARDELLI P H J ,et al. Enhanced transmit antenna selection scheme for secure throughput maximization without CSI at the transmitter[J]. IEEE Access, 2016(4): 4861-4873. |
[24] | 任婷洁, 李光球, 程英 . 多中继与多用户选择的中继系统安全性能分析[J]. 电信科学, 2019,35(8): 111-119. |
REN T J , LI G Q , CHENG Y . Secure performance analysis of relay systems with multi-relay and multi-user selection[J]. Telecommunications Science, 2019,35(8): 111-119. | |
[25] | 王占湾, 李光球, 钱辉 . 多窃听者场景下 TASP/MRC 系统的物理层安全性能分析[J]. 计算机工程, 2019,45(10): 160-165,170. |
WANG Z W , LI G Q , QIAN H . Physical layer security performance analysis of TASP/MRC system in multi-eavesdropper scene[J]. Computer Engineering, 2019,45(10): 160-165,170. | |
[26] | GAO Q , ZHU G , LIN S Y ,et al. Variable-rate variable-power MQAM for spectral efficiency maximization in full-duplex systems[J]. IEEE Wireless Communications Letters, 2018,7(3): 288-291. |
[27] | JEFFREY A , ZWILLINGER D . Preface to the seventh edition[M]// Table of Integrals,Series,and Products. Amsterdam: Elsevier, 2007. |
[1] | Xiaoqian LIU, Xinke TANG, Yuhan DONG. Spatial channel modeling for MIMO underwater wireless optical links [J]. Telecommunications Science, 2023, 39(5): 48-56. |
[2] | Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU. Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI [J]. Telecommunications Science, 2023, 39(3): 89-99. |
[3] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security of NOMA-D2D cooperative wireless system [J]. Telecommunications Science, 2022, 38(9): 83-94. |
[4] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers [J]. Telecommunications Science, 2022, 38(3): 133-142. |
[5] | Jianfeng CHEN, Miao CUI, Guangchi ZHANG, Qingqing WU, Hui ZENG. Secure communication optimization for double-IRS assisted SWIPT system [J]. Telecommunications Science, 2022, 38(1): 47-60. |
[6] | Ying CHENG, Guangqiu LI, Jingjie SHEN, Liang WEI. Physical layer security performance of MF relay selection systems [J]. Telecommunications Science, 2021, 37(9): 95-104. |
[7] | Sai XU, Shuai HAN, Weixiao MENG. A secure transmission method based on cooperative jamming for correlated main and wiretap channels [J]. Telecommunications Science, 2021, 37(6): 105-114. |
[8] | Xiaoqun SONG, Ming JIN, Zhongjie JIA. Joint user activity and signal detection for massive multiple-input multiple-output [J]. Telecommunications Science, 2021, 37(5): 113-123. |
[9] | Fuchao YAN,Yiliang LIU,Shuai HAN,Weixiao MENG. A survey of physical layer security in space-air-ground communication and networks [J]. Telecommunications Science, 2020, 36(9): 1-13. |
[10] | Hui QIAN,Guangqiu LI,Yifan DING. Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers [J]. Telecommunications Science, 2020, 36(5): 65-72. |
[11] | Tingjie REN,Guangqiu LI,Ying CHENG. Secure performance analysis of relay systems with multi-relay and multi-user selection [J]. Telecommunications Science, 2019, 35(8): 111-119. |
[12] | Shanshan TU,Jinliang YU,Yuan MENG,M WWAQAS,Lei LIU. Secure relay node selection method based on Q-learning for fog computing in 5G network [J]. Telecommunications Science, 2019, 35(7): 60-68. |
[13] | Bao FENG,Tao MA,Shilong CAI,Yang LI. Power allocation of MIMO system with RF mismatch in TD-LTE power wireless private network [J]. Telecommunications Science, 2018, 34(3): 177-182. |
[14] | Shuai HAN,Xiangxue TAI,Weixiao MENG. Physical layer security for the air-space-ground communication networks [J]. Telecommunications Science, 2018, 34(3): 23-31. |
[15] | Youhong FENG,Zhi YANG,Xuxing DING,Xuefeng YUE,Qiqi LI,Xiaojuan Xie. Optimal relay selection scheme and outage probability analysis in cooperative wireless networks [J]. Telecommunications Science, 2018, 34(11): 87-95. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|