English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 2052/17084 (12%)
造訪人次 : 3834035      線上人數 : 798
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    University of Taipei > 理學院 > 資訊科學系 > 期刊論文 >  Item 987654321/15995


    請使用永久網址來引用或連結此文件: http://utaipeir.lib.utaipei.edu.tw/dspace/handle/987654321/15995


    題名: The Capacity Analysis in the Secure Cooperative Communication System
    作者: Chen, Jong-Shin;Yang, Cheng-Ying;楊政穎;Hwang, Min-Shiang
    貢獻者: 臺北市立大學資訊科學系
    關鍵詞: Internet of Things (IoT);Multiple Input Multiple Output (MIMO);Physical Layer Security;Secrecy Capacity;Secure Cooperative Communications;Shannon Third Theorem
    日期: 2017-01
    上傳時間: 2017-07-31 13:35:24 (UTC+8)
    摘要: With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently, the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative communication system. Based on the Shannon third theorem on channel capacity, this work analyzes the secrecy capacity between the source station and the destination station. For a practical situation in the system, the scenario includes multiple source stations, multiple relay stations, multiple destination stations, and eavesdroppers. For the positive secrecy rate consideration, the maximum mutual information between the source station and the destination station and the minimum mutual information between the source station and the eavesdropper should be held. To ensure a secure communication, the derived theoretical solution could be applied to find the optimal relay assignment. Beyond the relay selection, some issues related to the secure cooperative communication are suggested for the future researches in the final.
    關聯: International Journal of Network Security,19(6),P.863-869
    顯示於類別:[資訊科學系] 期刊論文

    文件中的檔案:

    沒有與此文件相關的檔案.



    在uTaipei中所有的資料項目都受到原著作權保護.


    如有問題歡迎與系統管理員聯繫
    02-23113040轉2132
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋