협력중계 시스템에서의 물리계층 보안 기술

  • Published : 2014.01.31

Abstract

최근 물리계층 보안에 대한 관심이 높아지면서 이를 이동통신시스템에 적용하기 위한 다양한 연구가 이루어지고 있다. 또한 차세대 이동통신의 중요한 기술적 요소로 각광받고 있는 협력중계 기술을 기반으로 물리계층 보안을 극대화하기 위한 다양한 방식이 개발된 바 있다. 본고에서는 협력중계 시스템에서의 다양한 물리계층 보안 확보 기법을 소개하고 각각의 성능을 비교한다.

Keywords

References

  1. C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  2. A. Wyner, "Wire-tap channel," Bell Syst. Technical J., vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008. https://doi.org/10.1109/TIT.2008.928272
  4. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-2010, Mar. 2010. https://doi.org/10.1109/TSP.2009.2038412
  5. G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. https://doi.org/10.1109/TSP.2010.2092774
  6. J. Zhang and M. Gursoy, "Relay beamforming strategies for physical-layer security," in Proc. CISS, Mar. 2010, pp. 1-6.
  7. R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Dec. 2010.
  8. A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, June 2010, p. 1.
  9. A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011. https://doi.org/10.1109/TSP.2010.2078810
  10. I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints,"IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010. https://doi.org/10.1049/iet-com.2009.0634
  11. I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009. https://doi.org/10.1109/TWC.2009.090323
  12. J. Kim, A. Ikhlef, and R. Schober, "Combined relay selection and cooperative Beamforming for physical layer security," J. Commun. Netw., vol. 14, no. 14, Aug. 2012.
  13. G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.