期刊文献+

对抗全双工主动窃听的安全高效D2D通信策略

Secure and Efficient D2D Communication Strategy Against Full-duplex Active Eavesdropping
下载PDF
导出
摘要 第5代(The Fifth-generation,5G)移动通信网络技术飞速发展,同频双工技术是其中一项关键技术。将这项技术运用到设备到设备(Device to Device,D2D)通信系统中,不仅可以提高资源利用率,还能提高系统通信的安全性。然而,非法用户运用全双工技术将对系统的安全性产生巨大的威胁。因此,针对D2D通信系统中存在全双工主动窃听者恶意干扰D2D用户的问题,主要研究基于Stackelberg博弈的对抗全双工恶意窃听者的安全高效功率分配方案。由于合法用户和主动窃听者的行为相互影响、相互干扰,在保证保密速率要求的情况下,分别考虑单链路与多链路的场景,研究以最小化D2D用户消耗功率和最大化窃听效用为目标的最佳功率分配策略。由于D2D用户和恶意窃听者的优化问题不能分开解决,通过将它们之间的交互构建成Stackelberg博弈模型,并基于二分法算法和模拟退火算法进行求解。仿真表明,通过合理的功率分配能够有效对抗全双工恶意窃听者的窃听和干扰,从而实现安全高效通信,满足更高的系统安全性需求。 The Fifth-generation(5G)mobile communication network technology is developing rapidly,and the same frequency duplex technology is one of the key technologies.The application of this technology to Device-to-Device(D2D)communication system can not only improve the utilization rate of resources,but also improve the security of system communication.However,the use of full duplex technology by illegal users will pose a huge threat to the security of the system.Therefore,to solve the problem of malicious jamming of D2D users by active full-duplex eavesdroppers in D2D communication systems,a secure and efficient power allocation scheme against malicious full-duplex eavesdroppers based on Stackelberg game is mainly studied.Since the behaviors of legitimate users and active eavesdropper interact and interfere with each other,the scenarios of single link and multi-link respectively are considered,and the optimal power allocation strategy aiming at minimizing the power consumption of D2D users and maximizing the utility of eavesdropping under the condition of ensuring the confidentiality rate is studied.Since the optimization problem of D2D users and malicious eavesdroppers cannot be solved separately,the Stackelberg game model is constructed by the interaction between them,and the solution is based on the dichotomy algorithm and simulated annealing algorithm.Simulation results show that reasonable power allocation can effectively counter the interception and jamming of full-duplex malicious eavesdroppers,so as to achieve secure and efficient communication and meet higher system security requirements.
作者 胡阳 杨爽 张明 韦存 王磊 江雪 HU Yang;YANG Shuang;ZHANG Ming;WEI Cun;WANG Lei;JIANG Xue(State Grid Electric Power Research Institute,Nanjing 210003,China;NARI Information&Communication Technology Co.,Ltd.,Nanjing 210003,China;School of Communication and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;School of Internet of Things,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
出处 《无线电工程》 2024年第5期1110-1122,共13页 Radio Engineering
基金 国家电网有限公司总部管理科技项目资助(5108-202218280A-2-199-XG) 国家自然科学基金(62071255)。
关键词 物理层安全 设备到设备 全双工 physical layer security D2D full-duplex
  • 相关文献

参考文献1

二级参考文献2

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部