Bảo mật thông tin ở lớp vật lý giao thức hiệu quả và đánh giá hiệu năng

162 74 0
Bảo mật thông tin ở lớp vật lý  giao thức hiệu quả và đánh giá hiệu năng

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

HC VIN CặNG NGH BìU CHãNH VIN THặNG CHU TIN DễNG BO MT THặNG TIN é LẻP VT Lị: GIAO THÙC HI›U QUƒ V€ •NH GI• HI›U N‹NG LUŠN •N TI˜N Sž Kß THUŠT H€ NËI - 2019 HÅC VI›N CặNG NGH BìU CHãNH VIN THặNG CHU TIN DễNG BO MT THặNG TIN é LẻP VT Lị: GIAO THC HIU QU V ãNH GIã HIU NNG Chuyản ng nh: Kò THUT VIN THặNG M số: 9.52.02.08 LUN ãN TIN S Kò THUT NGìI HìẻNG DN KHOA HC: PGS TS V NGUY™N QC BƒO TS NGUY™N L×ÌNG NHŠT H€ NËI - 2019 LÍI CAM OAN Tỉi xin cam oan c¡c k¸t quÊ trẳnh b y luên Ăn l cổng trẳnh nghiản cựu cừa tổi dữợi sỹ hữợng dăn cừa cĂc giĂo viản hữợng dăn CĂc số liằu, kát quÊ trẳnh b y luªn ¡n l ho n to n trung thỹc v chữa ữủc cổng bố bi bĐt ký tĂc giÊ n o hay bĐt ký cổng trẳnh n o trữợc Ơy CĂc kát quÊ sỷ dửng tham khÊo Ãu  ữủc trẵch Ưy v theo úng quy ành H Nëi, ng y th¡ng n«m 2019 T¡c giÊ Chu Tián Dụng LI CM èN Trong quĂ trẳnh nghiản cựu v ho n th nh luên Ăn n y, tĂc giÊ Â nhên ữủc nhiÃu sỹ giúp ù v õng gõp quỵ bĂu Ưu tiản, tĂc giÊ xin b y tọ lỏng cÊm ỡn sƠu s-c tợi PGS TS Vó Nguyạn Quốc BÊo v TS Nguyạn Lữỡng Nhêt  hữợng dăn, nh hữợng nghiản cựu khoa hồc, giúp ù tĂc giÊ quĂ trẳnh nghiản cựu v ho n th nh luên Ăn TĂc giÊ xin chƠn th nh cÊm ỡn Ban GiĂm ốc, Hởi ỗng khoa hồc, Hởi ỗng tián sắ, Khoa Quốc Tá v o TÔo Sau Ôi hồc, Khoa Viạn Thổng - Hồc Viằn Cổng Nghằ Bữu Chẵnh Viạn Thổng  tÔo iÃu kiằn thuên lđi º t¡c gi£ ho n th nh luªn ¡n T¡c gi£ cơng xin c£m ìn thõ tr÷ðng Bë T÷ lằnh Thổng Tin Liản LÔc v Trữớng Sắ Quan Thổng Tin l ỡn v chừ quÊn,  tÔo iÃu kiằn cho tĂc giÊ tham gia nghiản cựu v hồc têp thíi gian l m nghi¶n cùu sinh Ci cịng, t¡c gi£ xin b y tä láng bi¸t ìn ¸n gia ẳnh, bÔn b, cĂc ỗng chẵ, ỗng nghiằp  luổn ởng viản, chia s, giúp ù tĂc giÊ vữủt qua cĂc khõ khôn và mồi mt Ôt ữủc nhỳng kát quÊ nghiản cựu nhữ ng y hổm H Nëi, ng y th¡ng n«m 2019 T¡c gi£ Chu Ti¸n Dơng MƯC LƯC MƯC LƯC DANH MƯC C•C TØ VI˜T T•T iv DANH MÖC HœNH V“ vi DANH MƯC KÞ HI›U TO•N HÅC MÐ x †U Chữỡng TấNG QUAN V THặNG TIN Vặ TUYN V BO AN TON THặNG TIN é LẻP VT LÞ ƒM 15 1.1 B£o mªt thỉng tin h» thèng thỉng tin vỉ tuy¸n 15 1.2 CĂc tham số hiằu nông bÊo mêt 19 1.2.1 Dung lữủng bÊo mêt 19 1.2.2 X¡c su§t dung lữủng bÊo mêt khĂc khổng 21 1.2.3 X¡c su§t døng b£o mªt 22 1.3 Truy·n thỉng hđp t¡c 24 1.3.1 Phữỡng phĂp chuyn tiáp vổ tuyán 27 1.3.2 K thuêt xỷ lỵ tẵn hiằu chuyºn ti¸p vỉ tuy¸n 29 1.3.3 CĂc phữỡng phĂp lỹa chồn nút chuyn tiáp 31 1.4 Vổ tuyán nhên thực 32 1.4.1 Mổ hẳnh mÔng vổ tuyán nhên thực dÔng nÃn - Underlay 34 1.4.2 Mæ hẳnh mÔng vổ tuyán nhên thực dÔng an xen - Interweave 34 1.4.3 Mổ hẳnh mÔng vổ tuyán nhên thực dÔng chỗng chêp - Overlay 35 i ii 1.5 Kát luên chữỡng 35 Chữỡng PHN TãCH HIU NNG BO MT CếA H THẩNG Vặ TUYN TRUYN THặNG A CHãNG 36 2.1 MÔng vổ tuyán nhên thực chuyºn ti¸p a ch°ng 36 2.1.1 C¡c nghi¶n cùu li¶n quan 36 2.1.2 Mổ hẳnh hằ thống xuĐt à 37 2.1.3 PhƠn tẵch hiằu n«ng h» thèng 41 2.1.4 Mæ phäng v ¡nh gi¡ k¸t qu£ 46 2.2 MÔng chuyn tiáp a chng vợi phƯn cựng khổng lỵ tững 51 2.2.1 C¡c nghi¶n cùu li¶n quan 51 2.2.2 Mỉ h¼nh h» thèng xu§t à 53 2.2.3 PhƠn tẵch hi»u n«ng h» thèng 56 2.2.4 Mæ phäng v ¡nh gi¡ k¸t qu£ 58 2.3 Kát luên chữỡng 64 Ch÷ìng PHN TãCH HIU NNG BO MT CếA H THẩNG Vặ TUYN TRUYN THặNG HẹP TãC 66 3.1 GƠy nhiạu v chuyn tiáp cõ lỹa chồn mÔng truyÃn thổng hủp tĂc hai ch°ng 66 3.1.1 C¡c nghi¶n cùu li¶n quan 66 3.1.2 Mổ hẳnh hằ thống xuĐt · 68 3.1.3 PhƠn tẵch hiằu nông hằ thống 72 3.1.4 Mỉ phäng v ¡nh gi¡ k¸t qu£ 80 iii 3.2 BÊo mêt mÔng vổ tuyán hủp tĂc kát hủp k thuêt thu thêp nông lữủng 86 3.2.1 C¡c nghi¶n cùu li¶n quan 86 3.2.2 Mỉ h¼nh h» thèng · 87 xu§t 3.2.3 PhƠn tẵch hiằu nông h» thèng 90 3.2.4 Mæ phäng v ¡nh gi¡ k¸t qu£ 94 3.3 Kát luên chữỡng 97 Chữỡng PHN TãCH HIU N‹NG BƒO MŠT CÕA H› THÈNG VỈ TUY˜N TRUY—N THỈNG HẹP TãC TRONG IU KIN THặNG TIN TRNG THãI KNH TRUY—N KHỈNG HO€N HƒO 99 4.1 C¡c nghi¶n cùu li¶n quan 99 4.2 nh hững cừa kảnh truyÃn khổng lỵ tững ối vợi hiằu nông bÊo mêt cừa mÔng chuyn tiáp 101 4.2.1 Mỉ h¼nh h» thèng 101 4.2.2 PhƠn tẵch hiằu nông hằ thống 106 4.2.3 Mỉ phäng v ¡nh gi¡ k¸t qu£ 108 4.3 K¸t luên chữỡng 114 K˜T LUŠN 116 DANH MệC CãC CặNG TRNH CặNG Bẩ 119 T€I LI›U THAM KHƒO 121 122 [10] V N Q Bao, N T Duc, and H D Chien, "Incremental cooperative diversity for wireless networks under opportunistic spectrum access," The 2011 International Conference on Advanced Technologyogies for Communications, pp 121-125, 2011 [11] V N Q Bao and T T Duy (2012), "Performance Analysis of Cognitive Underlay DF Relay Protocol with Kth Best Partial Relay Selection", International Con-ference on Advanced Technologyogies for Communications (ATC), pp 130-135, 2012 [12] V N Q Bao and B Dang Hoai, A unified framework for performance analysis of DF cognitive relay networks under interference constraints, Processding 2011 International Conference on ICT Convergence (ICTC), pp 537 542, 2011 [13] V N Q Bao and T Q Duong, "Outage Analysis of Cognitive Multihop Networks under Interference Constraints," IEICE Transactions Communication, vol E95-B, pp 1019-1022, 2012 [14] V N Q Bao and N L Trung, "Multihop Decode-and-Forward Relay Networks: Secrecy Analysis and Relay Position Optimization", Journal on Electronics and Communication (JEC), vol 2, no 2, pp 33-42, 2012 [15] V N Q Bao, T T Thanh, N T Duc, and V D Thanh, "Spectrum Sharingbased Multihop Decode-and-Forward Relay Networks under Interference Con-straints: Performance Analysis and Relay Position Optimization," Journal of Communications and Networks, 2013 [16] V N Q Bao and H Y Kong, Diversity order analysis of dual-hop relaying with partial relay selection, IEICE Transactions Communication, vol E92-B, no 12, pp 3942 3946, 2009 [17] V N Q Bao and T Q Duong, Outage analysis of cognitive multihop networks under interference constraints, IEICE Transactions Communication, vol E95-B, no 03, pp 1019 1022, 2012 [18] V N Q Bao, T Q Duong, and C Tellambura, On the performance of cognitive underlay multihop networks with imperfect channel state information, IEEE Transactions on Communication, vol 61, no 12, pp 4864 4873, 2013 [19] V N Q Bao, N Linh-Trung, and M Debbah, "Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers," IEEE Transactions on Wireless Communication, vol 12, pp 6076-6085, 2013 123 [20] J Barros and M R D Rodrigues, "Secrecy capacity of wireless channels," IEEE International Symposium on Information Theory, pp 356-360, 2006 [21] B Barua, M Abolhasan, D R Franklin, and F Safaei, "Outage probability of multihop relay networks," International Wireless Communications & Mobile Computing Conference (IWCMC), pp 456-460, 2013 [22] R Bassily, E Ekrem, X He, E Tekin, J Xie, M Bloch, S Ulukus, and A Yener, Cooperative security at the physical layer: A summary of recent advances, IEEE Signal Processding Magazine, vol 30, pp 16 28, 2013 [23] R Bassoli, H Marques, J Rodriguez, K W Shum, and R Tafazolli, "Network coding theory: A survey," IEEE Communication Surveys & Toturials, vol 15, no 4, pp 1950-1978, 2013 [24] J van de Beek, J Riihijarvi, A Achtzehn, and P Mahonen, "TV White Space in Europe," IEEE Transactions on Mobile Computing, vol 11, pp 178-188, 2012 [25] R Berry, M L Honig, and R Vohra, Spectrum markets: motivation, challenges, and implications, IEEE Communication Magazine, vol 48, no 11, pp 146 155, 2008 [26] E Bjornson, M Matthaiou, and M Debbah, "A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments," IEEE Transactions on Communication, vol 61, pp 4512-4525, 2013 [27] E Bjornsony, A Papadogiannisz, M Matthaiouz, and M Debbah, "Two-Way Relaying under the Presence of Relay Transceiver Hardware Impairments," IEEE Communication Letter, 2013 [28] A Bletsas, A Khisti, D P Reed, and A Lippman, A simple cooperative diversity method based on network path selection, IEEE Journal on Selected Areas in Communications, vol 24, no 3, pp 659 672, Mar 2006 [29] R Boris and W Armin, "Spectral efficient protocols for half-duplex fading relay channels," IEEE Journal on Selected Areas in Communications, vol 25, no 2, pp 379-389, 2007 [30] J Boyer, D Falconer, and H Yanikomeroglu, "A theoretical characterization of the multihop wireless communications channel without diversity," IEEE Inter-national Symposium Personal, Indoor and Mobile Radio Communications, pp E-116-E-120 vol 2, 2001 124 [31] R W Broderson, A Wolisz, D Cabric, S M Mishra, and D Willkomm CORVUS : A cognitive radio approach for usage of virtual unlisenced spectrum [32] A Carleial and M Hellman, A note on wyner's wiretap channel, IEEE Transactions Information Theory, vol 23, pp 387 390, 1977 [33] I Csiszar and J Korner, Broadcast channels with confidential messages, IEEE Transactions Information Theory, vol 24, pp 339 348, 1978 [34] Chan Dai Truyen Thai, Jemin Lee, Tony Q S Quek, Physical-Layer Secret Key Generation With Colluding Untrusted Relays, IEEE Transactions on Wireless Communications, vol 15, pp 1517-1530, 2016 [35] W Chao and W Hui-Ming, "Joint relay selection and artificial jamming power allocation for secure DF relay networks," IEEE International Conference on Com-munications Workshops (ICC), pp 819-824, 2014 [36] X Chen, J Chen, H Zhang, Y Zhang, and C Yuen, On secrecy performance of a multi-antenna jammer aided secure communications with imperfect CSI, IEEE Transactions Vehicular Technology., vol PP, no 99, pp 1, 2015 [37] J Chen, R Zhang, L Song, Z Han, and B Jiao, Joint relay and jammer selection for secure two-way relay networks, IEEE Transactions Information Forensics Security, vol 7, no 1, pp 310 320, 2012 [38] S L Y Cheong and M Hellman, The Gaussian wire-tap channel, IEEE Trans-actions Information Theory, vol 24, pp 451 456, 1978 [39] H Deng, H M Wang, W Guo, and W Wang, Secrecy transmission with a helper: To relay or to jam, IEEE Transactions Information Forensics and Secu-rity, vol 10, no 2, pp 293 307, 2015 [40] Z Ding, K Leung, D Goeckel, and D Towsley, Opportunistic relaying for se- crecy communications: Cooperative jamming vs relay chatting, IEEE Transactions on Wireless Communication, vol 10, no 6, pp 1725 1729, 2011 [41] Z Ding, S Perlaza, I Esnaola, and H Poor, Power allocation strategies in energy harvesting wireless cooperative networks, IEEE Transactions Wireless Communication, vol 13, no 2, pp 846 860, Feb 2014 [42] M Dohler, E Lefranc, and H Aghvami, "Virtual Antenna arrays for future mobile communication systems," IEEE ICT2002, Beijing, China, 2002 125 [43] M Dohler, "Virtual Antenna Array," PhD., King's College London, London, UK, 2003 [44] L Dong, Z Han, A P Petropulu, and H V Poor, "Secure wireless communica-tions via cooperation," The 46th Annual Allerton Conference on Communication, Control, and Computing, pp 1132-1138, 2008 [45] T T Duy and H.Y Kong, "On Performance Evaluation of Hybrid DecodeAmplifyForward Relaying Protocol with Partial Relay Selection in Underlay Cog-nitive Networks", Journal of Communication Network., vol 16, no 5, pp 502-511, 2014 [46] T T Duy and V N Q Bao, "Multi-hop Transmission with Diversity Com-bining Techniques Under Interference Constraint", International Conference on Advanced Technologyogies for Communications (ATC), pp 131-135, 2013 [47] T T Duy and V N Q Bao, "Secrecy outage performance of relay networks under interference constraint," International Conference on Advanced Technologyogies for Communications (ATC), pp 125-130, 2014 [48] T T Duy, V N Q Bao, and T Q Duong, "Secured communication in cogni-tive MIMO schemes under hardware impairments," International Conference on Advanced Technologyogies for Communications (ATC), pp 109-112, 2014 [49] T T Duy and V N Quoc Bao, "Outage performance of cooperative multihop transmission in cognitive underlay networks," International Conference on Computing, Management and Telecommunications (ComManTel), pp 123-127, 2013 [50] T T Duy and H Y Kong, "Exact outage probability of cognitive two-way relaying scheme with opportunistic relay selection under interference constraint," Communications IET, vol 6, pp 2750-2759, 2012 [51] T T Duy, T Q Duong, D B da Costa, V N Q Bao, and M Elkashlan, "Proactive Relay Selection With Joint Impact of Hardware Impairment and Co-Channel Interference," IEEE Transactions on Communication, vol 63, pp 1594-1606, 2015 [52] T T Duy and H Kong, Performance analysis of incremental amplify-andforward relaying protocols with nth best partial relay selection under interference constraint, Wireless Pers Communication (WPC), vol 71, no 4, pp 2741 2757, 2013 126 [53] A E Ekpenyong and Y F Huang, Feedback constraints for adaptive transmis- sion, IEEE Signal Processding Magazine, vol 24, no 3, pp 69 78, 2007 [54] E Ekrem and S Ulukus, Secrecy in cooperative relay broadcast channels, IEEE Transactions on Information Theory, vol 57, no 1, pp 137 155, 2011 [55] S Ghose and R Bose, Outage optimal relay selection strategy using destination- based jamming for secure communication in amplify-and-forward relay networks, IEEE Workshop on Statistical Signal Processing (SSP), pp 404 407, 2014 [56] A Goldsmith, Wireless communications Cambridge ; New York: Cambridge Uni-versity Press, 2005 [57] X Gong, H Long, F Dong and H Yin, "Secure communication design for multi-user peer-to-peer wireless relay networks," IET Communications, vol 10, pp 770-777, 2016 [58] P K Gopala, L Lifeng, and H El Gamal, On the secrecy capacity of fading chan-nels, IEEE Transactions on Information Theory, vol 54, no 10, pp 4687 4698, 2008 [59] I S Gradshteyn and I M Ryzhik, Table of Integrals, Series, and Products, 6th ed San Diego, CA, 2000 [60] I S Gradshteyn and I M Ryzhik, Table of Integrals, Series and Products, 6th ed New York, NY, USA: Academic Press, 2000 [61] I S Gradshteyn, I M Ryzhik, A Jeffrey, and D Zwillinger, Table of integrals, series and products , 7th ed Amsterdam; Boston: Elsevier, 2007 [62] E Gvenkaya and H Arslan, Secure communication in frequency selective chan- nels with fade-avoiding subchannel usage, IEEE ICC, pp 813 818, 2014 [63] Ha Nguyen Vu and Vo Nguyen Quoc Bao, "Study of Relay Selection for Dual-hop Networks under Secrecy Constraints with Multiple Eavesdroppers", International Conference on Advanced Technologyogies for Communications, pp 89-92, 2011 [64] W Harrison, J Almeida, M Bloch, S McLaughlin, and J Barros, Coding for se-crecy: An overview of error-control coding techniques for physical-layer security, IEEE Signal Processding Magazine, vol 30, pp 41 50, 2013 [65] S Haykin, Cognitive radio: Brain-empowered wireless communications, IEEE Journal on Selected Areas in Communication, 23(2):201 220, 2005 127 [66] H M F He and W Wang, Maximal ratio diversity combining enhanced security, IEEE Communication Letter, pp 3, 2011 [67] M E Hellman and S K L Y C., "The Gaussian Wiretap Channel," IEEE Transactions Information Theory, vol 24, pp 451-456, 1978 [68] T M Hoang, T Q Duong, N S Vo and C Kundu, "Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer," IEEE Wireless Communications Letters, vol 6, no 2, pp 174-177, 2017 [69] Y W Hong, P.-C Lan, and C.-C Kuo, Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, IEEE Signal Processding Magazine, vol 30, pp 29 40, 2013 [70] H Hui, A L Swindlehurst, L Guobing, and L Junli, "Secure Relay and Jammer Selection for Physical Layer Security," IEEE Signal Processding Letter, vol 22, pp 1147-1151, 2015 [71] A Hyadi, Z Rezki, A Khisti, and M Alouini, Secure broadcasting with imperfect channel state information at the transmitter, IEEE Transactions Wireless Communication, vol 15, no 3, pp 2215 2230, 2015 [72] J Hyoungsuk, K Namshik, C Jinho, L Hyuckjae, and H Jeongseok, "Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR," IEEE Transactions on Information Theory, vol 57, pp 1975-1983, 2011 [73] H Jeon, N Kim, J Choi, H Lee, and J Ha, Bounds on secrecy capacity over correlated ergodic fading channels at high SNR, IEEE Transactions Information Theory, vol 57, pp 1975 1983, 2011 [74] F K Jondral, Cognitive radio: A communications engineering view, IEEE Wireless Communication Magazine, vol 14, pp 28-33, 2007 [75] E A Jorswieck and A Sezgin, Impact of spatial correlation on the performance of orthogonal space-time block codes, IEEE Communication Letter, vol 8, no 1, pp 21-23, Jan 2004 [76] H Ju and R Zhang, Throughput maximization in wireless powered communica-tion networks, IEEE Transactions Communication, vol 13, no 1, pp 418 428, 2014 [77] H Karl and A Willig, "Protocols and architectures for wireless sensor networks" Hoboken, NJ: Wiley, 2005 128 [78] G Kefeng, C Jin, H Yuzhen, L Guoxin, and L Nian, "Outage and capacity anal-ysis between opportunistic and partial relay cooperative network with hardware impairments," International Workshop on High Mobility Wireless Communica-tions (HMWC), pp 78-83, 2014 [79] G Kefeng, C Jin, L Guoxin, and W Xueling, "Outage analysis of cooperative cellular network with hardware impairments," International Conference on Infor-mation Science, Electronics and Electrical Engineering (ISEEE), pp 1416-1420, 2014 [80] S Kim, I Kim, and J Heo, Secure transmission for multiuser relay networks, IEEE Transactions Wireless Communication, vol 14, no 7, pp 3724 3737, Jul 2015 [81] H Kim, H Wang, S Lim, and D Hong, On the impact of outdated channel information on the capacity of secondary user in spectrum sharing environments, IEEE Transactions on Wireless Communication, vol 11, no 1, pp 284 295, 2012 [82] T Koike-Akino and D Chunjie, Secrecy rate analysis of jamming superposition in presence of many eavesdropping users, Processding of IEEE Global Telecom-munications Conference (Globecom), pp 6, 2011 [83] I Krikidis, J Thompson, S McLaughlin, and N goertz, Amplify-and-forward with partial relay selection, IEEE Communication Letter, vol 12, no 4, pp 235 237, 2008 [84] I Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Communications, vol 4, pp 1787-1791, 2010 [85] I Krikidis, J S Thompson, P M Grant, and S McLaughlin, "Power allocation for cooperative based jamming in wireless networks with secrecy constraints," IEEE Globecom Workshops (GC Wkshps), pp 1177-1181, 2010 [86] I Krikidis, J S Thompson, and S McLaughlin, "Relay Selection for Secure Cooperative Networks with Jamming," IEEE Transactions on Wireless Commu-nication, vol 8, pp 5003-5011, 2009 [87] K Kyeong Jin, T Q Duong, T A Tsiftsis, and V N Q Bao, "Cognitive mul-tihop networks in spectrum sharing environment with multiple licensed users," IEEE International Conference on Communications (ICC), pp 2869-2873, 2013 [88] Y M Khattabi and M M Matalgah, Performance Analysis of Multiple-Relay AF Cooperative Systems Over Rayleigh Time-Selective Fading Channels With 129 Imperfect Channel Estimation, IEEE Transactions on Vehicular Technologyogy, vol 65, pp 427-434, 2016 [89] H V Khuong, Exact outage analysis of modified partial relay selection in coop-erative cognitive networks under channel estimate errors, IET Communications., vol 10, no 2, pp 219 226, 2016 [90] J Laneman, D Tse, and G W Wornell, Cooperative diversity in wireless networks: Efficient protocols and outage behavior , IEEE Transactions Information Theory, vol 50, no 12, pp 3062 3080, 2004 [91] J H Lee, Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems, IEEE Communications Letters, vol 19, pp 525-528, 2015 [92] S Leung-Yan-Cheong and M Hellman, "The gaussian wire-tap channel," IEEE Transactions Information Theory, vol 24, pp 451 456, 1978 [93] W Li, C Chunyan, J X Ma, and S Mei, "Cluster-based cooperative jamming in wireless multi-hop networks," IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp 169-174, 2013 [94] Y Liang, H Poor, and S Shamai, Secure communication over fading channels, IEEE Transactions Information Theory, vol 54, pp 2470 2492, 2008 [95] Y Liu, J Li, and A Petropulu, Destination assisted cooperative jamming for wireless physical layer security, IEEE Transactions on Information Forensics and Security, vol 8, no 4, pp 682 694, 2013 [96] L Liu, R Zhang, and K.-C Chua, "Wireless information and power transfer: a dynamic power splitting approach," IEEE Transactions on Communication, vol 61, pp 3990-4001, 2013 [97] Y Liu, L Wang, T T Duy, M Elkashlan, and T Duong, Relay selection for security enhancement in cognitive relay networks, IEEE Wireless Communication Letter, vol 4, no 1, pp 46 49, 2015 [98] D Lun, H Zhu, A P Petropulu, and H V Poor, "Amplify-and-forward based cooperation for secure wireless communications," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2613-2616, 2009 [99] M Mirzaee and S Akhlaghi, "On the secrecy capacity of cooperative wiretap channel," Iran Workshop on Communication and Information Theory (IWCIT), pp 1-6, 2013 130 [100] J Mitola, Cognitive radio: Model-based competence for software radios, 1999 [101] J Mitola and G Q Maguire Jr., Cognitive radio: Making software radios more personal, IEEE Personal Communication, 6(4):13 18, 1999 [102] J Mo, M Tao, and Y Liu, Relay placement for physical layer security: A secure connection perspective, IEEE Communication Letter, vol 16, no 6, pp 878 881, 2012 [103] S Mousavifar, Y Liu, C Leung, M Elkashlan, and T Duong, Wireless energy harvesting and spectrum sharing in cognitive radio, IEEE Vehicular Technology Conference (VTC Fall), pp 5, 2014 [104] N Nguyen Hong, V N Q Bao, T Nguyen Linh, and M Debbah, "Relay selection in two-way relaying networks with the presence of hardware impairment at relay transceiver," International Conference on Advanced Technologyogies for Communications (ATC), pp 616-620, 2014 [105] A Nasir, X Zhou, S Durrani, and R Kennedy, Throughput and ergodic capacity of wireless energy harvesting based df relaying network, IEEE International Conference Communication (ICC), pp 4066 4071, 2014 [106] A Nasir, X Zhou, S Durrani, and R Kennedy, Relaying protocols for wireless energy harvesting and information processing, IEEE Transactions Communica-tion, vol 12, no 7, pp 3622 3636, 2013 [107] W Nien-En and L Hsueh-Jyh, "Effect of Feedback Delay on Secure Cooperative Networks with Joint Relay and Jammer Selection," IEEE Wireless Communica-tion Letter, vol 2, pp 415-418, 2013 [108] E Nosrati, X Wang, A Khabbazibasmenj and A M Akhtar, Secrecy Enhance- ment via Cooperative Relays in Multi-Hop Communication Systems, IEEE 83rd Vehicular Technologyogy Conference (VTC Spring), pp 1-6, 2016 [109] A Papoulis and S U Pillai, Probability, random variables, and stochastic pro-cesses, 4th ed Boston: McGraw-Hill, 2002 [110] P Parada and R Blahut, Secrecy capacity of SIMO and slow fading channels, IEEE IEEE International Symposium on Information Theory, pp 2152 2155, 2005 [111] P C Pinto, J Barros, and M Z Win, "Secure Communication in Stochastic Wireless Networks: Maximum Rate and Collusion," IEEE Transactions on Information Forensics and Security, vol 7, pp 139-147, 2012 131 [112] H V Poor, L Sankar, V Aggarwal, and A R Calderbank, "Information secrecy from multiple eavesdroppers in orthogonal relay channels," IEEE International Symposium on Information Theory (ISIT), pp 2607-2611, 2009 [113] R M Radaydeh, Impact of delayed arbitrary transmit antenna selection on the performance of rectangular QAM with receive MRC in fading channels, IEEE Communication Letter, vol 13, no 6, pp 390 392, 2009 [114] H Sakran, O Nasr, M Shokair, E S El-Rabaie, and A A El-Azm, "Proposed relay selection scheme for physical layer security in Cognitive Radio networks," Wireless Communications and Mobile Compututing Conference (IWCMC), 2012 8th International, pp 1052-1056, 2012 [115] A Salem and K A Hamdi, "Wireless Power Transfer in Two-Way AF Relaying Networks," IEEE Global Communications Conference (Globecom), pp 1-6, 2016 [116] A Salem, K A Hamdi and K M Rabie, "Physical Layer Security With RF Energy Harvesting in AF Multi-Antenna Relaying Networks," IEEE Transactions on Communications, vol 64, no 7, pp 3025-3038, 2016 [117] M Z I Sarkar and T Ratnarajah, "Secure wireless multicasting through Nakagami-m fading MISO channel," Conference Record of the Forty Fifth Asilo-mar Conference on Signals, Systems and Computers (ASILOMAR), pp 300-304, 2011 [118] M Z I Sarkar and T Ratnarajah, Secrecy capacity and secure outage per- formance for rayleigh fading SIMO channel, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 1900 1903, 2011 [119] M Z I Sarkar and T Ratnarajah, "Secure Communications through Rayleigh Fading SIMO Channel with Multiple Eavesdroppers," IEEE International Conference on Communication (ICC), 2010, pp 1-5, 2010 [120] M Z I Sarkar and T Ratnarajah, "On the Secrecy Mutual Information of Nakagami-m Fading SIMO Channel," IEEE International Conference on Com-munication (ICC) 2010, pp 1-5, 2010 [121] M Z I Sarkar and T Ratnarajah, "Secure Communication through Nakagami-m Fading MISO Channel," IEEE International Conference on Communication (ICC), pp 1-5, 2011 [122] M Z I Sarkar, T Ratnarajah, and M Sellathurai, "Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers," 132 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers, pp 829-833, 2009 [123] M Sarkar, I Zahurul, and T Ratnarajah, "Bounds on the secrecy capacity with diversity combining techniques," IEEE Wireless Communication and Networking Conference (WCNC), pp 2847-2851, 2012 [124] B Schneier, Description of a new variable-length key, 64-bit block cipher (Blow-fish), vol 809, pp 191 204, 1994 [125] B Schneier, Applied cryptography: Protocols, algorithms, and source code in C, Wiley, 1996 [126] M Schwartz, W Bennett, and S Stein, "Communication systems and techniques," Wiley-IEEE Press, 1995 [127] C Shahriar, M L Pan, M Lichtman, T C Clancy, R McGwier, R Tandon, S Sodagari, and J H Reed, PHY-layer resiliency in OFDM communications: A tutorial, IEEE Communication Surveys Tutorials, vol 17, pp 292 314, 2015 [128] C E Shannon, Communication theory of secrecy systems , The Bell System Technical Journal, vol 28, no 4, pp 656-715, 1949 [129] R K Sharma and D B Rawat, Advances on security threats and countermeasures for cognitive radio networks: A survey, IEEE Communication Surveys Tutorials, vol 17, pp 1023 1043, 2015 [130] K Shim, N T Do, B An and S Y Nam, Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information, International Conference on Electronics, Information, and Communications (ICEIC), pp 1-4, 2016 [131] Takayuki Shimizu, Hisato Iwai and Hideichi Sasaoka, Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems, IEEE Transactions on In-formation Forensics and Security, vol 6, pp 650-660, 2011 [132] Y S Shiu, S Y Chang, H.-C Wu, S.-H Huang, and H.-H Chen, Physical layer security in wireless networks: A tutorial, IEEE Wireless Communication, vol 18, pp 66 74, 2011 [133] P N Son and H Y Kong, Exact outage analysis of energy harvesting underlay cooperative cognitive networks, IEICE Transactions Communication, vol E98-B, no 4, pp 661 672, 2015 133 [134] S Suganya, P Shanmugapriya, and T R Priyadharshini, "Improving security in two-way relay networks by optimal relay and jammer selection," International Conference on Emerging Trends in Computing, Communication and NanoTech-nologyogy (ICE-CCN), pp 276-281, 2013 [135] H A Suraweera, M Soysa, C Tellambura, and H K Garg, Performance analysis of partial relay selection with feedback delay, IEEE Signal Processding Letter, vol 17, no 6, pp 531 534, Jun 2010 [136] T Duong, T T Duy, M Elkashlan, N Tran, and O Dobre, Secured ooperative cognitive radio networks with relay selection, IEEE Global Communication Conference (Globecom), pp 3074 3079, 2014 [137] T Q Duong, D Tran Trung, M Elkashlan, N H Tran, and O A Dobre, "Secured cooperative cognitive radio networks with relay selection," IEEE Global Communications Conference (Globecom), pp 3074-3079, 2014 [138] T Q Duong, D Benevides da Costa, M Elkashlan, and V N Q Bao, Cogni-tive amplify-and-forward relay networks over Nakagami-m fading, IEEE Transactions on Vehicular Technologyogy, vol 61, no 5, pp 2368 2374, 2012 [139] T T Tran, V N Q Bao, V Dinh Thanh, and T Q Duong, Performance anal-ysis and optimal relay position of cognitive spectrum-sharing dual-hop decode-andforward networks, Processding of International Conference on Computing, Management and Telecommunications (ComManTel), pp 269 273, 2013 [140] T Tran and H Kong, CSI-secured orthogonal jamming method for wireless physical layer security, IEEE Communication Letter, vol 18, no 5, pp 841 844, 2014 [141] T Xuan, X Zhengyuan, and Z Ghassemlooy, "Outage probability of multihop free space optical communications over nakagami fading channels," Network and Optical Communications (NOC), European Conference on and Optical Cabling and Infrastructure, pp 199-202, 2013 [142] X Tang, M Alouini, and A Goldsmith, Effect of channel estimation error on M-QAM BER performance in rayleigh fading, IEEE Transactions Communication, vol 47, no 12, pp 1856 1864, 1999 [143] D Tse and P Viswanath, "Fundamentals of wireless communication", Cambridge university press, 2005 134 [144] J Wang, J Chen, H Duan, H Ba, and J Wu, Jammer selection for secure two- way DF relay communications with imperfect CSI, International Conference on Advanced Communication Technologyogy (ICACT), pp 300 303, 2014 [145] Z Wang, Z Chen, L Luo, Z Hu, B Xia, and H Liu, Outage analysis of cognitive relay networks with energy harvesting and information transfer, IEEE International Conference Communication (ICC), pp 4348 4353, 2014 [146] P Wang, G Yu, and Z Zhang, "On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers," IEEE International Symposium on Information Theory (ISIT), pp 1301-1305, 2007 [147] C Wang, H.-M Wang, and X.-G Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Transactions Wireless Communication, vol 14, no 2, pp 589 605, 2015 [148] W Webb, On using white space spectrum, IEEE Communication Magazine, vol 50, no 8, pp 145 151, 2012 [149] A D Wyner, The wire-tap channel, Bell System Technical Journal, vol 54, no 8, pp 1355 1367, 1975 [150] H Xiang and A Yener, "End-to-End Secure Multi-Hop Communication with Untrusted Relays," IEEE Transactions on Wireless Communication, vol 12, pp 1-11, 2013 [151] W Xinjie, Z Hao, T Q Duong, M Elkashlan, and V N Q Bao, "Secure Cooperative Communication with Nth Best Relay Selection," IEEE 79th Vehicular Technology Conference (VTC Spring), pp 1-5, 2014 [152] Z Xinlin, M Matthaiou, E Bjornson, M Coldrey, and M Debbah, "On the MIMO capacity with residual transceiver hardware impairments," IEEE International Conference on Communication (ICC), pp 5299-5305, 2014 [153] H Xing, Z Chu, Z Ding, and A Nallanathan, Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks, IEEE Global Com-munication Conference (Globecom), pp 3145 3150, 2014 [154] W Xu and X Dong, Optimized one-way relaying strategy with outdated CSI quantization for spatial multiplexing, IEEE Transactions Signal Processing, vol 60, no 8, pp 4458 4464, 2012 135 [155] H Yamamoto, Coding theorem for secret sharing communication systems with two noisy channels, IEEE Transactions Information Theory, vol 35, pp 572 578, 1989 [156] H Yamamoto, A coding theorem for secret sharing communication systems with two Gaussian wiretap channels, IEEE Transactions Information Theory, vol 37, pp 634 638, May 1991 [157] L Yingbin, A Somekh-Baruch, H V Poor, S Shamai, and S Verdu, "Capacity of Cognitive Interference Channels With and Without Secrecy," IEEE Transactions on Information Theory, vol 55, pp 604-619, 2009 [158] P Yiyang, L Ying-Chang, T Kah Chan, and L Kwok Hung, Secure communication in multiantenna cognitive radio networks with imperfect channel state in-formation, IEEE Transactions Signal Processding, vol 59, no 4, pp 1683 1693, 2011 [159] L Yuanwei, W Lifeng, T T Duy, M Elkashlan, and T Q Duong, "Relay Selection for Security Enhancement in Cognitive Relay Networks," IEEE Wireless Communication Letter, vol 4, pp 46-49, 2015 [160] Z Yulong, W Xianbin, and S Weiming, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE Journal on Selected Areas in Communication, vol 31, pp 2099-2111, 2013 [161] M Zhang and Y Liu, "Energy Harvesting for Physical-Layer Security in OFDMA Networks," IEEE Transactions on Information Forensics and Security, vol 11, no 1, pp 154-162, 2016 [162] T X Zheng and H M Wang, Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers, IEEE Transactions on Vehicular Technologyogy, vol 99, pp 1-7, 2016 [163] B Zhong and Z Zhang, "Secure Full-duplex Two-way Relaying Networks with Optimal Relay Selection," IEEE Communications Letters, vol PP, no 99 pp 1-1, 2017 [164] X Zhou, R Zhang, and C K Ho, "Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff," IEEE Transactions on Commu-nication, vol 61, pp 4754-4767, 2013 136 [165] H Zhu, N Marina, M Debbah, and A Hjorungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," International Conference on Game Theory for Networks (GameNets), pp 287-294, 2009 [166] Cisco, Visual Networking Index, White paper, Feb 2015 [Online] Available: www.Cisco.com [167] Cognitive Radio Technologyogy: http://www.ofcom.org.uk/research/Technologyogy/ /cogradmain.pdf [168] http://integrals.wolfram.com/index.jsp ... Chữỡng TÊNG QUAN V— THỈNG TIN VỈ TUY˜N V€ ƒM BƒO AN TON THặNG TIN é LẻP VT Lị 1.1 BÊo mêt thổng tin hằ thống thổng tin vổ tuyán Cũng vợi vĐn à thữớng gp bÊo mêt, hằ thèng thỉng tin vỉ tuy¸n cán ph£i... [149], Wyner ¢ kh£o s¡t mởt hằ thống thổng tin vổ tuyán vợi mởt kảnh truyÃn rới rÔc khổng nhợ cõ sỹ hiằn diằn cừa mởt nút nghe ln Wyner  chựng minh rơng an to n thæng tin ho n to n câ thº Ôt... dửng, hằ thống thổng tin vổ tuyán thữớng xuyản ời mợi, tứ cĂc hằ thống thổng tin di ởng thá hằ thự nhĐt (1G) ch truyÃn tẵn hiằn tữỡng tỹ, cung cĐp dch vử thoÔi, hằ thống thổng tin di ëng th¸ h»

Ngày đăng: 04/10/2019, 15:18

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan