Physical layer security strategies for downlink heterogeneous cloud radio access networks

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:tananhua252
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Cloud radio access networks(C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units(RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals’ secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance. Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals’ secrecy transmission capacity performances, where the closed-form expressions are derived. transmission capacity performance limits on di fferent system parameters. The presented security strategies show a significant enhancement on the secrecy performance.
其他文献
学生是学习的主体,是学习的主人.在高中数学学习中,唯有激活学生的主体意识,深度挖掘学生的内在潜能,才能真正达成数学教学的最优化.为此,我们数学教师在实施数学教学时,要在
高中数学高效课堂的构建是新课程标准对于高中数学教学提出的要求,作为高中数学教师,要认真学习新课程标准的相关要求,改善自身的教学理念和教学方式,提升高中数学课堂教学的
胶州湾适于多种经济鱼类、甲壳类和软体动物的繁殖和生长。作者用四年多时间对胶州湾渔业资源增殖进行了研究,基本模清了主要经济鱼类和虾类等无脊椎动物在胶州湾内外的栖息环
高中数学是高中生学习中最重要的学科之一.新课程实施以来,众多的良好教学模式得到广泛应用.笔者结合教学实践,就高中数学教学中的翻转课堂应用展开探讨.
“学情”是指来自学习者自身的影响其学习效果的一切因素的总和.它包括学生的知识经验、心理特点、成长规律、行为方式、思维方法、兴趣爱好等诸多方面.可见,学情分析与学生
期刊
《读者来信》是《宁波日报》1980年复刊之初就设置的一个专版,每周一期。这个专版至今已发到680多期,成为该报时间最长的专版之一,并在历年举办的读者最喜爱的专版专栏评选
《数学新课程标准2011版》明确提出“四基”,即:“获得适应社会生活和进一步发展所必需的基础知识、基本技能、基本思想、基本活动经验”.因此,数学活动经验被赋予更加丰富的
期刊
高效课堂是我们每个一线老师梦寐以求的.作为一名教师,要想全面提高教学质量,打造高效课堂,除了必须依据最新的数学课程标准做出合理的课程教学计划和安排外还要注意创设生动
期刊