TY - GEN
T1 - A power allocation scheme for physical layer security based on large-scale fading
AU - Fan, Ye
AU - Liao, Xuewen
AU - Gao, Zhenzhen
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/1
Y1 - 2015/12/1
N2 - This paper investigates a four-node wiretap network including one source (S), one relay (R), one legitimate receiver (D) and one eavesdropper (E) with cooperative jamming in a two-hop relay transmission. In the first phase, S transmits an useful signal to R while D transmits an interference signal with the purpose of confounding the eavesdropper. In the second phase, R broadcasts the mixture signal together to D. In this paper, based on large-scale fading, we propose two system models named One-link Wiretap Model and Three-link Wiretap Model to distinguish the receiving links at E. Then, a power allocation scheme is proposed to maximize the average secrecy capacity through two-dimension optimization. Meanwhile, we solve the optimization problem by two different methods called IBO and IAO. Simulation results show that the proposed power allocation strategy can achieve a higher average secrecy capacity than the reference scheme RJPA (Rate-optimal jamming power allocation) in the two models. Besides, a larger security range can be obtained by the proposed scheme.
AB - This paper investigates a four-node wiretap network including one source (S), one relay (R), one legitimate receiver (D) and one eavesdropper (E) with cooperative jamming in a two-hop relay transmission. In the first phase, S transmits an useful signal to R while D transmits an interference signal with the purpose of confounding the eavesdropper. In the second phase, R broadcasts the mixture signal together to D. In this paper, based on large-scale fading, we propose two system models named One-link Wiretap Model and Three-link Wiretap Model to distinguish the receiving links at E. Then, a power allocation scheme is proposed to maximize the average secrecy capacity through two-dimension optimization. Meanwhile, we solve the optimization problem by two different methods called IBO and IAO. Simulation results show that the proposed power allocation strategy can achieve a higher average secrecy capacity than the reference scheme RJPA (Rate-optimal jamming power allocation) in the two models. Besides, a larger security range can be obtained by the proposed scheme.
UR - http://www.scopus.com/inward/record.url?scp=84958044060&partnerID=8YFLogxK
U2 - 10.1109/PIMRC.2015.7343377
DO - 10.1109/PIMRC.2015.7343377
M3 - 会议稿件
AN - SCOPUS:84958044060
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
SP - 640
EP - 644
BT - 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015
Y2 - 30 August 2015 through 2 September 2015
ER -