• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

存在干扰辅助窃听者情况下的高斯多用户窃听信道

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.

作者信息

Chou Rémi A, Yener Aylin

机构信息

Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260, USA.

Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USA.

出版信息

Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.

DOI:10.3390/e24111595
PMID:36359685
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9689472/
Abstract

This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject to a given power constraint and shares her jamming signal with the eavesdropper. Four such models are considered: (i) the Gaussian point-to-point wiretap channel; (ii) the Gaussian multiple-access wiretap channel; (iii) the Gaussian broadcast wiretap channel; and (iv) the Gaussian symmetric interference wiretap channel. The use of pre-shared randomness between the legitimate users is not allowed in our models. Inner and outer bounds are derived for these four models. For (i), the secrecy capacity is obtained. For (ii) and (iv) under a degraded setup, the optimal secrecy sum-rate is characterized. Finally, for (iii), ranges of model parameter values for which the inner and outer bounds coincide are identified.

摘要

本文考虑了存在窃听者和恶意干扰器情况下的安全通信。假设干扰器不知道合法发射机发出的通信信号,但可以在给定功率约束下采用任何干扰策略,并与窃听者共享其干扰信号。考虑了四种这样的模型:(i)高斯点对点窃听信道;(ii)高斯多址窃听信道;(iii)高斯广播窃听信道;以及(iv)高斯对称干扰窃听信道。在我们的模型中不允许合法用户之间使用预共享随机性。推导了这四种模型的内界和外界。对于(i),得到了保密容量。对于(ii)和(iv)在降级设置下,刻画了最优保密和速率。最后,对于(iii),确定了内界和外界重合的模型参数值范围。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/166f775a62e1/entropy-24-01595-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/25a5e0c96ff8/entropy-24-01595-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/1ecd81d82843/entropy-24-01595-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/1d5809c2d93f/entropy-24-01595-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/12716e62669c/entropy-24-01595-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/166f775a62e1/entropy-24-01595-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/25a5e0c96ff8/entropy-24-01595-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/1ecd81d82843/entropy-24-01595-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/1d5809c2d93f/entropy-24-01595-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/12716e62669c/entropy-24-01595-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1588/9689472/166f775a62e1/entropy-24-01595-g005.jpg

相似文献

1
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.存在干扰辅助窃听者情况下的高斯多用户窃听信道
Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.
2
Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN.一类 WBAN 擦除窃听信道的保密容量。
Sensors (Basel). 2018 Nov 26;18(12):4135. doi: 10.3390/s18124135.
3
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.具有外部窃听者和反馈的加性高斯白噪声多址接入信道的保密容量区域
Entropy (Basel). 2023 Sep 15;25(9):1339. doi: 10.3390/e25091339.
4
On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels.关于相关衰落窃听信道的零中断保密容量
Entropy (Basel). 2022 Jan 8;24(1):99. doi: 10.3390/e24010099.
5
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全
Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.
6
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.基于选择式放大转发与协作干扰的无线传感器网络安全多用户通信
Sensors (Basel). 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908.
7
Polar Coding for Confidential Broadcasting.用于保密广播的极化编码
Entropy (Basel). 2020 Jan 27;22(2):149. doi: 10.3390/e22020149.
8
Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution.幅度受限向量高斯窃听信道:保密容量可达输入分布的性质
Entropy (Basel). 2023 Apr 30;25(5):741. doi: 10.3390/e25050741.
9
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels.关于窃听衰落信道上信息论保密性能分析通用工具的综述。
EURASIP J Wirel Commun Netw. 2021;2021(1):194. doi: 10.1186/s13638-021-02065-4. Epub 2021 Dec 4.
10
Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel.物理层安全:多天线窃听信道的信道探测结果
Entropy (Basel). 2023 Sep 29;25(10):1397. doi: 10.3390/e25101397.

引用本文的文献

1
Information Theoretic Methods for Future Communication Systems.面向未来通信系统的信息论方法。
Entropy (Basel). 2023 Feb 21;25(3):392. doi: 10.3390/e25030392.