检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张丽娟[1] 刘志宏[1] 张洪波[1] 曾勇[1] 马建峰[1]
机构地区:[1]西安电子科技大学网络信息安全学院,陕西西安710071
出 处:《通信学报》2017年第2期183-195,共13页Journal on Communications
基 金:国家重点研发计划基金资助项目(No.2016YFB0800601);国家自然科学基金资助项目(No.U1405255)~~
摘 要:安全通信图(iS-Graph)的安全性能通过增加可控干扰以降低窃听者的信号与干扰比(SIR)来实现。研究无线网络中机密信息的传输,网络中合法节点在协作干扰节点的帮助下实现安全通信,在此基础上提出一种干扰协助的安全通信图,即jS-Graph。同时,研究了jS-Graph的安全属性,提出使用多个独立的干扰节点来干扰窃听者。为应对窃听者靠近发送者或接收者的难题,使用一种协作干扰策略来干扰源节点或目标节点附近的窃听者。结果表明,如果采用协作干扰,无线通信的机密性得以增强。Secrecy capacity of intrinsically secure communication graph(iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.8