当前位置: X-MOL 学术IEEE Trans. Inform. Forensics Secur. › 论文详情
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications
IEEE Transactions on Information Forensics and Security ( IF 6.211 ) Pub Date : 2019-11-20 , DOI: 10.1109/tifs.2019.2954742
Renyong Wu; Chao Yuan; Ning Zhang; Kim-Kwang Raymond Choo

Wireless communication security can be enhanced by leveraging the characteristics of the physical (PHY) layer, where discriminatory scrambling can be employed at the symbol level to either improve the signal quality of the legitimate receiver or degrade that of the eavesdroppers. However, in the presence of multiple passive eavesdroppers with more antennas than the transmitter, the transmitted signals can still be reliably separated from random disturbances. To mitigate this challenge, we propose a two-dimensional vectorized secure transmission scheme. Unlike existing transmission schemes (where the same data symbol is sent over each antenna with a predesigned complex weight at a time), in the proposed scheme, a sequence of data symbols in a predefined order (named symbol vector) is first pre-superposed through pre-coding with a random complex matrix prior to been sent as a vector in parallel over each transmitting antenna at a time. As a result, physical randomness of the legitimate channel is introduced into the received signals at passive eavesdroppers in the pre-coding procedure. Moreover, to ensure that transmitted data symbols can be recovered in the right order, each symbol vector is sent repeatedly, according to the principle of maximum entropy. To ensure the intended receiver can recover the transmitted symbol vector, the random pre-coding matrices are selected such that a linear constraint imposed by the CSI of the legitimate channel is satisfied. In addition, an extended maximum likelihood (ML) detection method is developed for the desired receiver while the random pre-coding matrices are not required to be transmitted. We then analyze its security based on the signal detection theory to demonstrate that the intended receiver can recover the transmitted symbol vectors while the eavesdroppers are not capable of doing so. We also evaluate the performance of the proposed scheme to demonstrate its effectiveness.
更新日期:2020-02-11

 

全部期刊列表>>
全球疫情及响应:BMC Medicine专题征稿
欢迎探索2019年最具下载量的化学论文
新版X-MOL期刊搜索和高级搜索功能介绍
化学材料学全球高引用
ACS材料视界
南方科技大学
x-mol收录
南方科技大学
自然科研论文编辑服务
上海交通大学彭文杰
中国科学院长春应化所于聪-4-8
武汉工程大学
课题组网站
X-MOL
深圳大学二维材料实验室张晗
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug