مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 10 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه IEEE |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks |
ترجمه عنوان مقاله | قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری |
فرمت مقاله انگلیسی | |
رشته های مرتبط | فناوری اطلاعات و فناوری اطلاعات و ارتباطات |
گرایش های مرتبط | دیتا، شبکه های کامپیوتری، رایانش امن |
دانشگاه | School of Computer Science and Educational Software – Guangzhou University – China |
کلمات کلیدی | خوشه های رله، قرار دادن کش ترکیبی (HCP)، امنیت لایه فیزیکی، احتمالات وقفه امنیتی، ظرفیت امنیت متوسط |
کد محصول | E5662 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
I. INTRODUCTION
The issues of security have taken on an increasingly important role in wireless communication networks. Traditionally, cryptographic technologies are used to secure the communications, and a cipher system for the information theoretic analysis of cryptography was first proposed by Shannon in [1]. In [2], a theoretic foundation for physical layer security framework is proposed. In this paper, Wyner introduced a wiretap channel model, showed that secure communication is feasible without cryptography technology as long as the eavesdropper’s channel is worse than the legitimate user’s channel. From Wyner’s wiretap channel model, the authors extended to study the secrecy capacity over Gaussian channel in [3]. The average secrecy capacity and secrecy outage probability in Rayleigh fading channels have been studied in [4]. To enhance the secrecy performance of wireless communications, relay and jammer selection techniques have been used in [5]–[13]. Specifically, the relaying techniques for enhancing the physical layer security have been studied in [5] and [9]. In [10] and [11], the optimal relay selection schemes based on AF and DF have been presented to improve wireless security and prevent eavesdropping attacks. The idea that selecting jammer sends intentional interference to jam the eavesdroppers has been studied in [7] and [12]. In addition, the works about the secrecy performance analysis have been studied in [14]–[20]. Specifically, the secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels has been well studied in [16]. The works of roundrobin scheduling, optimal user scheduling and suboptimal user scheduling schemes to protect the CUsCBS transmissions against the eavesdropping attacks have been presented in [17]. In [20], the authors presented the work about the transmit antenna selection for physical layer security of a MIMO system. And the other work of MIMO has been studied in [21]. Moreover, the work of joint user and relay selection algorithm for cooperative non-orthogonal multiple access networks has been studied in [22]. |