CLC number: TN92
On-line Access: 2023-02-27
Received: 2022-05-05
Revision Accepted: 2023-02-27
Crosschecked: 2022-10-10
Cited: 0
Clicked: 1264
Citations: Bibtex RefMan EndNote GB/T7714
Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI. On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2200188 @article{title="On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things", %0 Journal Article TY - JOUR
衬底式安全工业物联网中的协作MIMO优化研究1北京理工大学信息与电子学院,中国北京市,100081 2中国信息通信研究院,中国北京市,100191 3中国人民解放军军事科学院,中国北京市,100091 摘要:本文研究协作多输入多输出(cooperative multi-input multi-output,C-MIMO)系统中的物理层安全技术,该技术可以被用于主次用户共存的衬底式认知无线电网络,并通过提高次级C-MIMO接收机的安全速率同时减少对主用户的干扰来实现上述安全通信范式。该通信模型尤其适合应用于基于非授权频谱的工业互联网安全传输场景,可以实现频谱效率和安全速率的有效平衡和折衷。为此,我们提出一种特征空间自适应预编码(eigenspace-adaptive precoding, EAP)方法,并给出在单站发射功率约束和干扰功率约束下的安全速率优化问题。通过将原始优化问题分解为预编码特征空间选择和功率分配两个子问题,来实现安全预编码器的设计,其中,特征空间由发射机根据主用户和次级用户的信道条件进行自适应选择。此外,本文针对海量设备、大维天线系统提出一种简化的EAP方法,该方法充分利用大维天线的空间自由度来降低安全预编码优化的复杂度。仿真结果表明,在自适应选择的特征空间中传输信号和人工噪声,C-MIMO系统可以完全消除保密中断概率,获得相比固定特征空间预编码方案更高的安全速率。此外,针对大维C-MIMO提出的简化EAP方法可以显著提高安全速率。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Akhyar F, Lin CY, Muchtar K, et al., 2019. High efficient single-stage steel surface defect detection. Proc 16th IEEE Int Conf on Advanced Video and Signal Based Surveillance, p.1-4. [2]Ben-Tal A, Nemirovski A, 2001. Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications. Springer, Philadelphia, USA. [3]Bloch MR, Laneman JN, 2013. Strong secrecy from channel resolvability. IEEE Trans Inform Theory, 59(12):8077-8098. [4]Borges PVK, Izquierdo E, 2010. A probabilistic approach for vision-based fire detection in videos. IEEE Trans Circ Syst Video Technol, 20(5):721-731. [5]Chen LW, Chen CR, Chen DE, 2017. VIPS: a video-based indoor positioning system with centimeter-grade accuracy for the IoT. Proc IEEE Int Conf on Pervasive Computing and Communications Workshops, p.63-65. [6]Chettri L, Bera R, 2020. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Int Things J, 7(1):16-32. [7]Chiurtu N, Rimoldi B, Telatar E, 2001. On the capacity of multi-antenna Gaussian channels. Proc IEEE Int Symp on Information Theory, p.53-57. [8]Csiszar I, Körner J, 1978. Broadcast channels with confidential messages. IEEE Trans Inform Theory, 24(3):339-348. [9]Deng YS, Wang LF, Zaidi SAR, et al., 2016. Artificial-noise aided secure transmission in large scale spectrum sharing networks. IEEE Trans Commun, 64(5):2116-2129. [10]Fang B, Qian ZP, Shao W, et al., 2016. Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans Veh Technol, 65(8):6753-6758. [11]Goel S, Negi R, 2008. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 7(6):2180-2189. [12]Hampel G, Li C, Li JY, 2019. 5G ultra-reliable low-latency communications in factory automation leveraging licensed and unlicensed bands. IEEE Commun Mag, 57(5):117-123. [13]He X, Yener A, 2014. MIMO wiretap channels with unknown and varying eavesdropper channel states. IEEE Trans Inform Theory, 60(11):6844-6869. [14]Hořejší P, Novikov K, Šimon M, 2020. A smart factory in a smart city: virtual and augmented reality in a smart assembly line. IEEE Access, 8:94330-94340. [15]Horst R, Tuy H, 1996. Global Optimization (3rd Ed.). Springer, Berlin, Heidelberg, Germany. [16]Hu TT, Xiong J, Ma DT, et al., 2018. Optimal and robust AN-aided precoding design for cognitive MIMOME wiretap channels. Proc IEEE/CIC Int Conf on Communications in China, p.500-505. [17]Hussain T, Muhammad K, Del Ser J, et al., 2020. Intelligent embedded vision for summarization of multiview videos in IIoT. IEEE Trans Ind Inform, 16(4):2592-2602. [18]Lin PH, Lai SH, Lin SC, et al., 2013. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J Sel Areas Commun, 31(9):1728-1740. [19]Lu X, Petrov V, Moltchanov D, et al., 2019. 5G-U: conceptualizing integrated utilization of licensed and unlicensed spectrum for future IoT. IEEE Commun Mag, 57(7):92-98. [20]Nguyen DC, Ding M, Pathirana PN, et al., 2022. 6G Internet of Things: a comprehensive survey. IEEE Int Things J, 9(1):359-383. [21]Ozgur A, Leveque O, Tse D, 2013. Spatial degrees of freedom of large distributed MIMO systems and wireless ad hoc networks. IEEE J Sel Areas Commun, 31(2):202-214. [22]Pei YY, Liang YC, Zhang L, et al., 2010. Secure communication over MISO cognitive radio channels. IEEE Trans Wirel Commun, 9(4):1494-1502. [23]Rajashekar R, Hanzo L, 2017. Iterative matrix decomposition aided block diagonalization for mm-wave multi- user MIMO systems. IEEE Trans Wirel Commun, 16(3):1372-1384. [24]Sibomana L, Tran H, Zepernick HJ, 2015. On physical layer security for cognitive radio networks with primary user interference. Proc IEEE Military Communications Conf, p.281-286. [25]Simon SH, Moustakas AL, Marinelli L, 2006. Capacity and character expansions: moment-generating function and other exact results for MIMO correlated channels. IEEE Trans Inform Theory, 52(12):5336-5351. [26]Sternberg S, 1995. Group Theory and Physics. Cambridge University Press, Cambridge, UK. [27]Wang HM, Wang C, Ng DWK, et al., 2016. Artificial noise assisted secure transmission for distributed antenna systems. IEEE Trans Signal Process, 64(15):4050-4064. [28]Wyner AD, 1975. The wire-tap channel. Bell Syst Techn J, 54(8):1355-1387. [29]Zhang X, Zhou XY, McKay MR, 2013. On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. IEEE Trans Veh Technol, 62(5):2170-2181. [30]Zheng TX, Wang HM, Yuan JH, et al., 2015. Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers. IEEE Trans Commun, 63(11):4347-4362. [31]Zheng Z, Haas ZJ, 2017. On the performance of reconfigurable distributed MIMO in mobile networks. IEEE Trans Commun, 65(4):1609-1622. [32]Zheng Z, Haas ZJ, Kieburg M, 2019. Secrecy rate of cooperative MIMO in the presence of a location constrained eavesdropper. IEEE Trans Commun, 67(2):1356-1370. [33]Zhou XY, McKay MR, 2010. Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans Veh Technol, 59(8):3831-3842. [34]Zhu FC, Yao ML, 2016. Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Trans Veh Technol, 65(3):1835-1841. [35]Zhu Y, Zhou YK, Patel S, et al., 2013. Artificial noise generated in MIMO scenario: optimal power design. IEEE Signal Process Lett, 20(10):964-967. Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>