LUO Wen-Yu, JIN Liang, HUANG Kai-Zhi. Ill-Posed Theory and Applications for Guaranteeing the Security of Wireless Physical Layer[J]. JOURNAL OF SIGNAL PROCESSING, 2011, 27(11): 1749-1756.
Citation: LUO Wen-Yu, JIN Liang, HUANG Kai-Zhi. Ill-Posed Theory and Applications for Guaranteeing the Security of Wireless Physical Layer[J]. JOURNAL OF SIGNAL PROCESSING, 2011, 27(11): 1749-1756.

Ill-Posed Theory and Applications for Guaranteeing the Security of Wireless Physical Layer

More Information
  • Received Date: May 22, 2011
  • Revised Date: October 19, 2011
  • Published Date: November 24, 2011
  • The Ill-posed security theoretical framework for guaranteeing wireless physical-layer security is proposed in the paper, by introducing the concept of ill-posed. Firstly, the ill-posed security transforms non-unique and instability of solutions into information redundancy, which transforms the original problem into two randomized problems with redundancy combining the theory of perturbation. The framework includes the first kind ill-posed secure theory based on non-unique solutions and the second kind ill-posed secure theory based on instable solutions of an ill-posed problem. The first one utilizes the non-uniqueness of ill-posed problem to introduce redundancy for the transmitted precoding parameters, which is used to randomize transmitted signals for guaranteeing physical-layer security. The second one utilizes the instability of ill-posed problem to introduce redundancy for the transmitted precoding parameters, which can be used to guarantee physical-layer security at a little cost of legitimate users’ performance. Secondly, the security of the proposed framework is measured by using secrecy capacity with imperfect channel statement information. At last, some typical examples are researched under the theoretical framework of ill-posed security. The results reveal that the existing signal processing based physical-layer security methods are all the special cases of the framework.
  • Related Articles

    [1]CHEN Jun, HE Xiaobo, WANG Fei, WANG Jie. LPI Joint Radar and Communication Signal Design Based on FBMC-chirp[J]. JOURNAL OF SIGNAL PROCESSING, 2024, 40(7): 1227-1238. DOI: 10.16798/j.issn.1003-0530.2024.07.005
    [2]WANG Jie, WANG Haijun, ZHANG Xiaoying, ZHAO Haitao, ZHANG Jiao, LIU Xiaoran. Design of Low Latency MAC Protocol Based on Priority and Transmission Probability in UAV Ad-hoc Network[J]. JOURNAL OF SIGNAL PROCESSING, 2024, 40(4): 661-670. DOI: 10.16798/j.issn.1003-0530.2024.04.005
    [3]CHEN Jun, DING Yi, WANG Jie, WANG Fei, ZHOU Jianjiang. High-Maneuvering Multi-Target Tracking Technology with Low Probability of Intercept Based on Multi-Feature Fusion[J]. JOURNAL OF SIGNAL PROCESSING, 2024, 40(2): 280-291. DOI: 10.16798/j.issn.1003-0530.2024.02.006
    [4]ZHANG Guangda, REN Qinghua, FAN Zhikai. Secure Transmission Scheme on Physical Layer in Multi-hop Cooperative Relay Network[J]. JOURNAL OF SIGNAL PROCESSING, 2021, 37(8): 1541-1549. DOI: 10.16798/j.issn.1003-0530.2021.08.022
    [5]WANG Xia, HE Song-Hua, OU Jian-Ping, ZHANG Jun. The LPI Performance Analysis and Comparison of Radar Signals by Cyclic Autocorrelation Method[J]. JOURNAL OF SIGNAL PROCESSING, 2015, 31(3): 328-335.
    [6]BAI Hui-Qing, JIN Liang, ZHONG Zhou, HUANG Kai-Zhi. The Physical Layer Secrecy Coding Method of Hiding Confidential Information using Amplitude Difference of Fading Channel[J]. JOURNAL OF SIGNAL PROCESSING, 2015, 31(1): 17-25.
    [7]ZHU Jian-Dong, FENG Xin-Yang, TANG Jiang, ZHAO Yong-Jun. Detection and Parameter Estimation for STLFMCW signal in New Interception Model Assumption[J]. JOURNAL OF SIGNAL PROCESSING, 2013, 29(6): 697-704.
    [8]TANG Jiang, ZHAO Yong-Jun, ZHU Jian-Dong, HU Qing. FrFT-based Parameter Estimation for PRBC-LFM Signals[J]. JOURNAL OF SIGNAL PROCESSING, 2012, 28(9): 1271-1277.
    [9]CHEN Xian-Qing, WU Le-Nan. LDPC Decoding via SVM Probability Output in EBPSK Demodulator[J]. JOURNAL OF SIGNAL PROCESSING, 2011, 27(9): 1286-1290.
    [10]YAN Wei, CAI Yue-Ming. Performance Analysis of Physical-Layer Network  Coding for Two-Way Relay Channels[J]. JOURNAL OF SIGNAL PROCESSING, 2011, 27(3): 334-339.

Catalog

    Article Metrics

    Article views (638) PDF downloads (1776) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return