研究課題/領域番号 |
18H03235
|
研究機関 | 公立はこだて未来大学 |
研究代表者 |
JIANG Xiaohong 公立はこだて未来大学, システム情報科学部, 教授 (00345654)
|
研究分担者 |
稲村 浩 公立はこだて未来大学, システム情報科学部, 教授 (20780232)
福士 将 山口大学, 大学院創成科学研究科, 准教授 (50345659)
|
研究期間 (年度) |
2018-04-01 – 2021-03-31
|
キーワード | covert communication / secrecy capacity / physical layer security |
研究実績の概要 |
1.We studied covert communication in a two-way two-hop wireless system, proposed covertness strategies to resist the warden's detection and further derived the scaling law results for the covert throughput capacity. 2. We considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate. 3. We considered covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates subject to a given transmission outage constraint. 4. We studied covert communication in a relay system operating in either full-duplex or half-duplex mode, and derived the corresponding end-to-end covert capacity with the amplify-and-forward relaying. 5. We also explored the related physical layer authentication (PLA) problem for covert communications, and proposed a PLA scheme based on channel impulse response and multipath delay in dual-hop wireless network.
|
現在までの達成度 (区分) |
現在までの達成度 (区分)
2: おおむね順調に進展している
理由
We studied covert communication in two-hop relay system, proposed several covertness strategies and further derived the scaling law results for the covert throughput capacity. We also explored effects of full-duplex or half-duplex mode on covert communication in such relay system, and derived the corresponding covert capacity results. We further studied covert communication in a multiple relay system, proposed two relay selection schemes and derived the exact expressions for the achievable rates. Finally, we considered the covert wireless communication against both eavesdropping and transmission detection, formulated an optimization problem regarding the covertness secrecy rate, and also proposed a power allocation strategy for the maximization of covertness secrecy rate. The related physical layer authentication (PLA) problem for covert communications was also explored, and a PLA scheme was proposed for authentication in two-hop wireless systems. Two journal papers have been submitted, and five journal papers are now under preparation.
|
今後の研究の推進方策 |
1. SC/Delay/Detection-Probability (DP) Tradeoff: We will explore the SC/delay tradeoff of CWC and derive the corresponding delay-constrained CWC SC. Regarding the SC/DP tradeoff, the recent results indicate that by allowing some DP of the warden we can greatly increase the SC of CWC. Based on this study and available work on CWC SC analysis, we will further explore the SC/DP tradeoff and corresponding DP-constrained SC. Finally, for a flexible SC/delay/DP tradeoff, we will develop a new CWC scheme by combining relay selection used for delay control and transmit power allocation used for DP control. 2.SC Enhancement/Optimization: The cooperative jamming, routing, relay/link selection and artificial noise serve as the crucial security techniques for the enhancement of CWC SC. We explored the joint use of cooperative jamming and opportunistic relay selection for enhancing the secrecy performance of wireless networks. Based on these works and our works on cooperative jamming, secure routing,link/relay selection and artificial noise, we will explore the joint designs of these security techniques for the enhancement of CWC SC. Notice that power control is a crucial issue that can significantly affect the CWC SC. We will further explore the CWC SC optimization with the consideration of power constraint, for which a Nonlinear Integer Program-based optimization framework and an iterative searching algorithm will be developed.
|