首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 31 毫秒
1.
对于中继不可信的多中继协同传输模型,主要针对如何构建协同安全系统,即利用人工干扰实现系统安全时的协同策略问题.协同系统构建完成后,又考虑了各中继节点间如何进行功率分配来提高系统安全性问题.分别采用等功率分配与最佳功率分配的方式,分析了不同中继节点分布场景下,最佳中继节点选择.结果表明,采用人工干扰的方式能够保证系统的安全传输,最佳中继的选择能够提高系统的安全性能.  相似文献   

2.
研究节点具备能量收集能力的中继窃听信道保密速率的优化问题,提出一种基于人工噪声协同干扰和节点间能量协同的物理层安全传输策略.各节点采用储能-发送模式工作,即先收集能量,再用于数据传输.中继节点采用放大转发方式,目的节点发送人工噪声进行协同干扰.由于中继节点所需功耗较高,目的节点将用于发送干扰之外的剩余能量转移给中继节点.给出以最大化保密速率为目标函数,优化能量吸收时间比例系数和干扰功率分配因子的两步优化算法.仿真结果表明人工噪声和能量协同的引入能有效提高系统的保密传输速率.  相似文献   

3.
张伟  芮贤义 《信号处理》2018,34(1):114-118
传统的最佳中继选择方案仅参考了合法用户的信道状态信息,在实际的通信系统中由于存在窃听用户而无法保证信息的可靠传输。现有的最佳中继选择方案将窃听用户的信道状态信息纳入考虑后,系统的安全性能得到了一定改善,但是依然采用的是等功率分配。针对放大转发协议,本文在现有最佳中继选择方案的基础上,以降低系统安全中断概率为目标,在系统总功率受限的前提下,根据源节点和中继节点以及中继节点和目的节点间的信道参数引出功率分配因子,对源节点和中继节点间的功率进行适当分配。通过仿真对比,可以发现功率分配能够降低系统的安全中断概率,从而改善系统的安全性能。   相似文献   

4.
本文研究了全双工中继协作下的认知MIMO系统的平均吞吐量最大化问题。与传统的中继协作认知无线电系统不同的是,该系统模型中的双工中继节点既能协助认知用户源节点进行多天线频谱感知以提高频谱检测性能,也能解码转发认知用户源节点的发送信号以获得更大的系统吞吐量。为使系统平均吞吐量最大,首先,本文以认知用户能获得的最大平均频谱空洞被发现的概率为目标,对系统的帧结构进行优化以获得最佳的感知时间,接着对多个发送天线进行优化以选择出最佳的发送天线,并推导出了在总的发送功率和对主用户干扰受限条件下的认知用户源节点和双工中继节点的最佳功率分配方案。最后的仿真结果表明本文提出的系统模型和优化方案相比传统的双工等功率分配方案以及单工功率分配方案能够获得更大的系统平均吞吐量。   相似文献   

5.
针对放大转发双向多中继协同通信系统,提出了一种基于最大化最小双向速率准则的功率分配方案。将功率分配问题分解为用户节点功率分配和中继节点功率分配两部分,首先通过将多中继节点信道等效为单中继节点信道,简化了用户节点功率分配,然后应用矩阵变换实现了分布式的中继节点功率分配,减少了反馈开销,降低了计算复杂度。仿真结果表明,提出的功率分配方案在系统双向可达速率和误码率两方面指标均优于现有双向中继功率分配策略,而且性能增益随着中继数目的增加而提升。  相似文献   

6.
针对认知无线电网络,提出了一种基于组间协作的联合直接传输和协作传输的传输机制,在满足干扰约束和峰值功率约束的情况下,通过分析瑞利衰落环境下放大转发协作单中继系统的性能,研究了中继位置和主用户位置对于系统的最优功率分配和系统吞吐量的影响,并对最优功率分配方案和等功率分配方案的性能进行了比较。仿真结果表明,中继位置和主用户的位置对于系统性能起着关键的作用,最优功率分配方案取得相对于等功率分配方案更优的性能,采用最优功率分配方案时,中继节点位于源节点和目的节点连线的中点且靠近认知用户时的系统性能最优。  相似文献   

7.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

8.
在未来无线通信网络中,协作通信的性能依赖于通信资源的有效分配,比如中继选择和功率控制等.在本文中,我们建议了一个分布式买者和卖者博弈理论框架,以满足用户链路质量需求为基础,解决多用户协作通信中最优化中继选择和功率控制.本文联合考虑了源节点和中继节点的功率分配,进而优化源节点和中继节点的收益.这里提出的方法不仅有助于源节点找到相对位置较好的中继节点以及在源和中继之间进行最优化功率分配从而最小化源节点的支付,而且有助于相互竞争的中继节点提供优化的价格以最大化它们各自的收益.此外,这里的优化价格可以仅由局部信道状态信息和其他节点的能量价格决定.如果获得的中继节点总数增加,全网的能量消耗会更低.  相似文献   

9.
随着无线信道环境的复杂多样,本文引入了协作通信,并探讨了协作通信中的中继节点选择和功率分配两个重要的技术,最后提出了基于中继节点选择和功率分配的联合优化算法。  相似文献   

10.
王俊波  曹哲  陈明  焦媛 《电子学报》2011,39(7):1663-1667
在无线通信网中,高效的功率分配可显著降低资源消耗、获得更好的服务质量、并减少网络内干扰.本文以无线并行中继协作通信系统为背景,在目的节点目标信噪比的约束条件下,对如何最小化中继链路中各通信节点的发射功率进行了研究.文章首先建立了无线中继协作通信系统模型,推导出了无线中继协作通信系统中信噪比的表达式.接着,文章将功率分配...  相似文献   

11.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

12.
The performance in cooperative communication depends on careful resource allocation such as relay selection and power control, but the traditional centralized resource allocation requires precise measurements of channel state information (CSI). In this paper, we propose a distributed game-theoretical framework over multiuser cooperative communication networks to achieve optimal relay selection and power allocation without knowledge of CSI. A two-level Stackelberg game is employed to jointly consider the benefits of the source node and the relay nodes in which the source node is modeled as a buyer and the relay nodes are modeled as sellers, respectively. The proposed approach not only helps the source find the relays at relatively better locations and "buy” an optimal amount of power from the relays, but also helps the competing relays maximize their own utilities by asking the optimal prices. The game is proved to converge to a unique optimal equilibrium. Moreover, the proposed resource allocation scheme with the distributed game can achieve comparable performance to that employing centralized schemes.  相似文献   

13.
孙立悦  赵晓晖  虢明 《通信学报》2013,34(10):10-91
研究了功率受限情况下多中继协作通信网络的中继选择和功率优化问题。在AF网络中,提出了一种低复杂度中继选择与功率分配算法,其目标是在总功率一定的条件下使系统的中断概率最小。本算法对源节点和所有潜在中继节点进行功率分配,结合当前信噪比选择最优的中继集合,通过最速下降法求出使系统中断概率最低的功率分配因子。该算法不需要知道大量瞬时信道信息、不需要系统在等功率条件下进行中继选择,只需求得中继节点排列矩阵便可根据当前信噪比自适应获得最优中继节点集合。仿真结果表明,在相同条件下,该算法明显优于不同中继节点集合下几种算法的中断性能,并且与传统的SAF及AAF算法相比,有效降低了中断概率,提升了系统性能和功率效率。  相似文献   

14.
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.  相似文献   

15.
基于信道统计特性的中继选择算法   总被引:2,自引:0,他引:2  
该文提出了一种在非再生协作网络中,基于信道统计特性的最优中继选择方法。首先在等功率条件下,根据信道统计特性,定义一个等效信道增益的参数,该参数反映了中继节点在协作过程中两个阶段的信道特性。然后提出一种基于该参数的降序排列的中继选择方法。该方法在不同的信噪比范围内,选择不同的节点集合,使得系统的吞吐率中断概率最小。分析表明该选择方法的分集增益阶数能达到N+1,N为中继节点数目。仿真结果表明这种中继选择算法的中断概率性能优于其他算法。该方法进一步与功率分配相结合,构成了一种低复杂度的次优的中继选择方法。仿真结果表明这种次优算法能够取得和穷举算法相似的性能。  相似文献   

16.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   

17.
In this paper, a scheme that exploits cooperative diversity of multiple relays to provide physical layer security against an eavesdropping attack is concerned. Relay‐based cognitive radio network (CRN) faces issues multiple issues other than the same as faced by conventional wireless communications. If the nodes in a CRN are able to harvest energy and then spend less energy than the total energy available, we can ensure a perpetual lifetime for the network. In this paper, an energy‐constrained CRN is considered where relay nodes are able to harvest energy. A cooperative diversity‐based relay and subchannel‐selection algorithm is proposed, which selects a relay and a subchannel to achieve the maximum secrecy rate while keeping the energy consumed under a certain limit. A transmission power factor is also selected by the algorithm, which ensures long‐term operation of the network. The power allocation problem at the selected relay and at the source also satisfies the maximum‐interference constraint with the primary user (PU). The proposed scheme is compared with a variant of the proposed scheme where the relays are assumed to have an infinite battery capacity (so maximum transmission power is available in every time slot) and is compared with a scheme that uses jamming for physical layer security. The simulation results show that the infinite battery‐capacity scheme outperforms the jamming‐based physical layer security scheme, thus validating that cooperative diversity‐based schemes are suitable to use when channel conditions are better employed, instead of jamming for physical layer security.  相似文献   

18.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

19.
张海洋  王保云  邓志祥 《信号处理》2013,29(8):1064-1070
为了提高MIMO窃听信道的可达安全速率,提出了基于广义奇异值分解的合作干扰策略。该策略中源节点和辅助节点同时采用基于广义奇异值分解的波束形成技术,源节点发送消息信号,辅助节点发送独立于消息信号的噪声信号,噪声信号对目的节点和窃听节点都产生干扰。此外设计了源节点和辅助节点采用合作干扰策略时的联合最优功率分配算法。该算法可以实现源节点和辅助节点在总功率受限时的可达安全速率最大化。仿真结果表明,与现有的非合作最优功率分配算法相比,本文提出的合作干扰策略在大信噪比时可以显著提高系统的可达安全速率。   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号