بهینه سازی میزان امنیت در شبکه های دوپلکس کامل چند هاب بی سیم / Secrecy Rate Optimization in Wireless Multi-hop Full Duplex Networks

بهینه سازی میزان امنیت در شبکه های دوپلکس کامل چند هاب بی سیم Secrecy Rate Optimization in Wireless Multi-hop Full Duplex Networks

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : IEEE
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط فناوری اطلاعات و ارتباطات
گرایش های مرتبط دیتا
مجله
دانشگاه Key Lab of Broadband Wireless Communication and Sensor Network Technology – Nanjing University of Posts and Telecommunications – China

منتشر شده در نشریه IEEE

Description

I. INTRODUCTION due to the characteristics of wireless channels, it is particularly vulnerable for wireless networks to be attacked by an eavesdropper, which puts forward great challenges to secure communications. Traditional security approaches apply different cryptographic algorithm to achieving confidentiality and authentication in communications. Meanwhile, physical layer security (PLS) is applied by Shannon theory to exploring secrecy communication by coding. The basic idea of PLS is to explore the random nature of physical layer media to enhance the quality of legitimate channel while attenuating the quality of eavesdropping channel. Compared with traditional cryptographic technologies mainly at upper layers, PLS shows more security in some degree with its advantages, for example, applying proper coding and signal processing to guarantee message confidentiality, while traditional cryptographic methods can be broken by advanced computing technologies; PLS can be easily and conveniently achieved rather than massive resources and infrastructure exploited by sharing cryptographic materials among legitimate users; and the authentication of PLS for legitimate nodes is quick. Hence, as an important and promising technique to prevent eavesdropping, it has attracted more attention in both industry and academic fields [1-5]. Related works in physical layer security were pioneered by Shannon’s information theoretic secrecy analysis [1] and Wyner’s discrete memory-less wiretap channel secrecy analysis [2]. Wyner proved that if it is a degraded version of the main channel for the eavesdropper’s channel, the source and destination can achieve a positive perfect information rate, which is defined as the secrecy rate. And secrecy capacity is defined as the maximum secrecy rate from the source to the destination. In order to enhance physical layer security, there are numerous studies focused on node cooperation approaches, especially three-point cooperation mode with one source, one destination and one relay (or multiple relays) [3-5].
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری