DOI QR코드

DOI QR Code

하드웨어왜곡과 불완전한 채널상태정보가 물리계층보안에 미치는 영향

The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security

  • 심규성 (홍익대학교 스마트도시과학경영대학원 정보시스템전공) ;
  • 도 트리 뉴 (홍익대학교 일반대학원 전자전산공학과) ;
  • 안병구 (홍익대학교 컴퓨터정보통신공학과)
  • Shim, Kyusung (Information System, Graduate School of Smart City Science Management, Hongik University) ;
  • Do, Nhu Tri (Dept. of Electronic and Computer Engineering in Graduate School, Hongik University) ;
  • An, Beongku (Dept. of Computer & information Communication Engineering, Hongik University)
  • 투고 : 2016.02.16
  • 심사 : 2016.03.29
  • 발행 : 2016.04.25

초록

물리계층보안은 신호의 물리적 특성을 이용하여 정보를 보호하는 보안 기법이다. 현재 이에 대한 연구가 활발히 진행 중이지만 해결해야할 다음과 같은 문제점들이 존재한다. 도청자는 자신의 존재를 숨기기 위해서 자신의 채널상태정보를 다른 합법적인 노드와 공유하지는 않는다. 그리고 노드가 신호를 전송할 때 하드웨어 왜곡이 발생하지만 많은 연구들은 노드 모델들이 이상적인 것으로 가정을 하고, 하드웨어 왜곡문제를 고려하지 않고 있다. 이와 같은 문제점들을 해결하기 위한 본 논문의 주요한 특징 및 기여도는 다음과 같다. 첫째, 도청자의 채널상태정보를 얻기 위해서 조력자노드를 합법적인 노드주변에 설치하고, 조력자노드의 채널상태정보를 이용하여 노드모델에서 하드웨어 왜곡을 고려한다. 둘째, 제안된 시스템 모델의 인터셉트 확률에 대한 Closed-Form Expression을 제시한다. 제안된 시스템의 성능평가를 위해서 다양한 시뮬레이션를 통하여 제안된 시스템 모델의 물리계층보안에 미치는 영향을 알아본 결과, 불완전한 채널상태정보는 인터셉트 확률에는 영향을 미치지 못한 반면에, 불완전한 노드모델의 경우, 인터셉트 확률, 에르고딕 시크리스 용량과 보안채널용량에 영향을 준다는 것을 보여준다.

Physical layer security is cryptography technique to protect information by using physical nature of signals. Currently, many works on physical layer security have been actively researching while those researching models still have some problems to be solved. Eavesdropper does not share its channel state information with legitimate users to hide its presence. And when node transmits signal, hardware impairments are occurred, whereas many current researches assume that node model is ideal node and does not consider hardware impairments. The main features and contributions of this paper to solve these problems are as follows. First, our proposed system model deploys torch node around legitimate user to obtain channel state information of eavesdropper and considers hardware impairments by using channel state information of torch node. Second, we derive closed-form expression of intercept probability for the proposed system model. The results of the performance evaluation through various simulations to find out the effects on proposed system model in physical layer security show that imperfect channel state information does not effect on intercept probability while imperfect node model effects on intercept probability, Ergodic secrecy capacity and secrecy capacity.

키워드

참고문헌

  1. Shannon, C.E., "Communication theory of secrecy systems," The Bell System Technical Journal, vol.28, no.4, pp.656-715, October 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  2. Wyner, A.D., "The wire-tap channel," The Bell System Technical Journal, vol.54, no.8, pp.1355-1387, October 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. N. T. Do and B. An, "Secure transmission using decode-and-forward protocol for underlay cognitive radio networks," Proc. of IEEE ICUFN2015, pp. 914-918, Sapporo, Japan, July 2015.
  4. K. Shim, N. T. Do, B. An, S. Nam, "Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information," Proc.of ICEIC 2016, Danang, Vietnam, January 2016.
  5. Yulong Zou, Xianbin Wang, Weiming Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE Journal in Selected Areas in Communications, vol.31, no.10, pp.2099-2111, October 2013. https://doi.org/10.1109/JSAC.2013.131011
  6. Vo Nguyen Quoc Bao, Linh-Trung N., Debbah M., "Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers," IEEE Transactions in Wireless Communications, vol.12, no.12, pp.6076-6085, December 2013. https://doi.org/10.1109/TWC.2013.110813.121671
  7. Alotaibi E.R., Hamdi K.A., "Secrecy outage probability of relay networking in multiple destination and eavesdropper scenarios," Proc. of IEEE WCNC2014., pp.2390-2395, April 2014.
  8. Alves, H., Souza, R.D., Debbah, M., Bennis, M., "Performance of Transmit Antenna Selection Physical Layer Security Schemes," IEEE in Signal Processing Letters, vol.19, no.6, pp.372-375, June 2012. https://doi.org/10.1109/LSP.2012.2195490
  9. Y. Choi and D. Kim, "Performance analysis with and without torch node in secure communications," Proc. of ATC2015, Hanoi, Vietnam, October 2015.
  10. Bjornson Emil, Matthaiou Michail, Debbah Merouane, "A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments," IEEE Trans. Communications, vol.61, no.11, pp.4512-4525, November 2013. https://doi.org/10.1109/TCOMM.2013.100913.130282
  11. Harri Holma, Antti Toskala, "LTE for UMTS: Evolution to LTE-Advanced, 2nd Edition," Wiley, 2011.
  12. Suraweera H.A., Smith P.J., Shafi M., "Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge," IEEE Transactions in Vehicular Technology, vol.59, no.4, pp.1811-1822, May 2010. https://doi.org/10.1109/TVT.2010.2043454
  13. I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, "Table of integrals, series and products(7th ed)," Elsevier, 2007.