English  |  正體中文  |  简体中文  |  Items with full text/Total items : 92958/108462 (86%)
Visitors : 20425435      Online Users : 219
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/108622

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/108622

    Title: The Capacity Analysis in the Secure Cooperative Communication System
    Authors: 黃明祥;J. S. Chen;Jong-Shin Chen;C. Y. Yang;Cheng-Ying Yang
    Contributors: 資訊工程學系
    Date: 2017-11
    Issue Date: 2017-12-08 14:48:08 (UTC+8)
    Abstract: With the characteristic of spatial diversity and low cost,
    cooperative system is a tendency for the future communications.
    In the wireless communication system, there
    exist degradation factors such as signal fading, multipath
    transmission, signal inferences, bandwidth limitation and
    so on. In addition to these degradation factors, the wireless
    transmission is not a secure environment. The information
    might be leaked during the transmission. Currently,
    the issues of privacy and security have become increasingly
    important for the mobile users. Traditionally,
    the security scheme is applied to the higher network layer.
    Encryption can be complex and difficult without infrastructure.
    It is not suitable to apply to the equipment with
    low computing resources, such as Internet of Things (IoT)
    application. Within information theoretic security characterizes
    the fundamental ability of the physical layer to
    provide a secure transmission. Hence, this work concentrates
    on the secure cooperative communication system.
    Based on the Shannon third theorem on channel capacity,
    this work analyzes the secrecy capacity between the
    source station and the destination station. For a practical
    situation in the system, the scenario includes multiple
    source stations, multiple relay stations, multiple destination
    stations, and eavesdroppers. For the positive secrecy
    rate consideration, the maximum mutual information between
    the source station and the destination station and
    the minimum mutual information between the source station
    and the eavesdropper should be held. To ensure
    a secure communication, the derived theoretical solution
    could be applied to find the optimal relay assignment. Beyond
    the relay selection, some issues related to the secure
    cooperative communication are suggested for the future
    researches in the final.
    Relation: International Journal of Network Security
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback