قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری / Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : IEEE
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط فناوری اطلاعات و فناوری اطلاعات و ارتباطات
گرایش های مرتبط دیتا، شبکه های کامپیوتری، رایانش امن
مجله
دانشگاه School of Computer Science and Educational Software – Guangzhou University – China

منتشر شده در نشریه IEEE

Description

I. INTRODUCTION The issues of security have taken on an increasingly important role in wireless communication networks. Traditionally, cryptographic technologies are used to secure the communications, and a cipher system for the information theoretic analysis of cryptography was first proposed by Shannon in [1]. In [2], a theoretic foundation for physical layer security framework is proposed. In this paper, Wyner introduced a wiretap channel model, showed that secure communication is feasible without cryptography technology as long as the eavesdropper’s channel is worse than the legitimate user’s channel. From Wyner’s wiretap channel model, the authors extended to study the secrecy capacity over Gaussian channel in [3]. The average secrecy capacity and secrecy outage probability in Rayleigh fading channels have been studied in [4]. To enhance the secrecy performance of wireless communications, relay and jammer selection techniques have been used in [5]–[13]. Specifically, the relaying techniques for enhancing the physical layer security have been studied in [5] and [9]. In [10] and [11], the optimal relay selection schemes based on AF and DF have been presented to improve wireless security and prevent eavesdropping attacks. The idea that selecting jammer sends intentional interference to jam the eavesdroppers has been studied in [7] and [12]. In addition, the works about the secrecy performance analysis have been studied in [14]–[20]. Specifically, the secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels has been well studied in [16]. The works of roundrobin scheduling, optimal user scheduling and suboptimal user scheduling schemes to protect the CUsCBS transmissions against the eavesdropping attacks have been presented in [17]. In [20], the authors presented the work about the transmit antenna selection for physical layer security of a MIMO system. And the other work of MIMO has been studied in [21]. Moreover, the work of joint user and relay selection algorithm for cooperative non-orthogonal multiple access networks has been studied in [22].
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری