Wireless physical-layer security model based on perturbation theory and sensitivity analysis

Many typical models had been proposed for wireless physical-layer security, which have some disadvantages and limitations in theoretical analysis or implementation respectively. Considering these shortages brought about by the existing works, a physical-layer security model used in frequency selecti...

Full description

Saved in:
Bibliographic Details
Main Authors: Hong-quan WEI, Wen-yu LUO, Ju-long LAN, Hong-chang CHEN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#:10.3969/j.issn.1000-436X.2013.06.024
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850211850628628480
author Hong-quan WEI
Wen-yu LUO
Ju-long LAN
Hong-chang CHEN
author_facet Hong-quan WEI
Wen-yu LUO
Ju-long LAN
Hong-chang CHEN
author_sort Hong-quan WEI
collection DOAJ
description Many typical models had been proposed for wireless physical-layer security, which have some disadvantages and limitations in theoretical analysis or implementation respectively. Considering these shortages brought about by the existing works, a physical-layer security model used in frequency selective fading channel based on perturbation theory was proposed. The proposed model finds a tradeoff between the availability and the security of the practical system by adjusting the threshold of perturbation. At last, the validity and feasibility are illustrated by the sensitivity analysis and application example.
format Article
id doaj-art-b08632f36b4f4de8a60e2dca7872eeaa
institution OA Journals
issn 1000-436X
language zho
publishDate 2013-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b08632f36b4f4de8a60e2dca7872eeaa2025-08-20T02:09:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-06-013420120659673239Wireless physical-layer security model based on perturbation theory and sensitivity analysisHong-quan WEIWen-yu LUOJu-long LANHong-chang CHENMany typical models had been proposed for wireless physical-layer security, which have some disadvantages and limitations in theoretical analysis or implementation respectively. Considering these shortages brought about by the existing works, a physical-layer security model used in frequency selective fading channel based on perturbation theory was proposed. The proposed model finds a tradeoff between the availability and the security of the practical system by adjusting the threshold of perturbation. At last, the validity and feasibility are illustrated by the sensitivity analysis and application example.http://www.joconline.com.cn/thesisDetails#:10.3969/j.issn.1000-436X.2013.06.024security model;wireless communication;low probability of interception;sensitivity analysis
spellingShingle Hong-quan WEI
Wen-yu LUO
Ju-long LAN
Hong-chang CHEN
Wireless physical-layer security model based on perturbation theory and sensitivity analysis
Tongxin xuebao
security model;wireless communication;low probability of interception;sensitivity analysis
title Wireless physical-layer security model based on perturbation theory and sensitivity analysis
title_full Wireless physical-layer security model based on perturbation theory and sensitivity analysis
title_fullStr Wireless physical-layer security model based on perturbation theory and sensitivity analysis
title_full_unstemmed Wireless physical-layer security model based on perturbation theory and sensitivity analysis
title_short Wireless physical-layer security model based on perturbation theory and sensitivity analysis
title_sort wireless physical layer security model based on perturbation theory and sensitivity analysis
topic security model;wireless communication;low probability of interception;sensitivity analysis
url http://www.joconline.com.cn/thesisDetails#:10.3969/j.issn.1000-436X.2013.06.024
work_keys_str_mv AT hongquanwei wirelessphysicallayersecuritymodelbasedonperturbationtheoryandsensitivityanalysis
AT wenyuluo wirelessphysicallayersecuritymodelbasedonperturbationtheoryandsensitivityanalysis
AT julonglan wirelessphysicallayersecuritymodelbasedonperturbationtheoryandsensitivityanalysis
AT hongchangchen wirelessphysicallayersecuritymodelbasedonperturbationtheoryandsensitivityanalysis