Font Size: a A A

Research On Physical Layer Security Performance Of Jamming Behavior

Posted on:2013-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:X D YuanFull Text:PDF
GTID:2268330392970174Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Communication has close relationship with our life, and it processes from cabletransition into the wireless transition. Most of the wireless communication system stilluses the traditional password system, namely the key encryption. Nowadays, thecommunication system is more and more based on the physical layer security toguarantee the secure communication in the legal main channel. At the same time, thissecurity mechanism can also reduce the error probability of the physical channel. Themobile communication system uses broadcast transmission technology. Because ofthe character of broadcast and openness, the transmission environment is bad. Whenthe signal goes through the wireless channel, there will be a serious decline with thesignal at the receiving node. In order to guarantee the quality of transmission,effective measures must be taken against the decline. Cooperation communication is akind of technology to fight the channel fading, and it is widely used in the wirelessmobile communication.This paper takes the four-node communication model as research object: asending node, a receiving node, a wiretap node and a relay jammer. This paper studiesfriendly jammer behavior and malicious jammer behavior. Different jammingbehavior and different jamming modes will cause different influence on the system.This paper takes channel security capacity, channel outage probability, etc as researchobject. Besides, game theory is also makes its contribution.This paper is different from most of the previous research. In addition to theresearch of jamming behavior on system safety performance, the jammer’s position isalso discussed. There are areas where the jammer can influence the physical layersecurity performance efficiently. In addition, there are behavior-insensitive areas inthe system.
Keywords/Search Tags:physical layer security, wiretap channel, jamming behavior, secrecy capacity, outage probability
PDF Full Text Request
Related items