首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 359 毫秒
1.
针对基于正交多址接入(Orthogonal Multiple Access,OMA)技术的卫星通信网络资源利用率低的问题,提出了一种基于功率域非正交多址接入(Non-orthogonal Multiple Access,NOMA)技术的上行链路卫星通信方案。该方案在用户随机分布的前提下,利用最大或受限的发送功率同时同频发送信息给卫星节点,并采用串行干扰消除(Successive Interference Cancellation,SIC)方法提取各用户信息。通过构建用户随机位置信息与波束增益关系,分析了用户分布对系统性能的影响。通过仿真验证了基于NOMA技术的卫星上行通信网络在系统遍历容量方面具有的优势,并分析了关键参数对系统性能的影响。  相似文献   

2.
实际收发设备的非理想硬件(RHI,Residual Hardware Impairment)特性会对协作非正交多址接入(NOMA,Non?Orthogonal Multiple Access)系统性能产生重要影响.因此,本文提出了基于RHI的下行链路单窃听多中继协作NOMA系统模型,推导了联合考虑合法链路和窃听链路使目标信噪比最大化(M?LaE?SNR,Maximized SNR for Legiti-mate and Eavesdropping link)中继传输方案下的安全中断概率闭合表达式和渐近表达式.分析和仿真结果表明,所提M?LaE?SNR方案相比其他方案可有效提高用户的安全中断性能,且中继数越多所提方案性能优势越明显;同时RHI使得系统安全传输性能降低,且RHI对性能的影响程度主要与主链路信噪比以及协作中继个数有关;且不同节点处的RHI对系统安全性能造成的影响程度不同.研究结果还证明了用户的安全分集阶数等于中继数量K.  相似文献   

3.
龙恳  谭路垚  王奕  陈兴  王亚领 《电讯技术》2022,62(1):116-122
针对协作非正交多址接入(Non-orthogonal Multiple Access,NOMA)系统中用户充当中继并存在窃听者的场景,提出了一种新型协作干扰传输方案,以提高该系统的安全性.在第一时隙,基站将混合信号进行广播,同时为了干扰窃听者,信道条件较差的用户采用全双工的工作模式,发出协作干扰信号对窃听者进行干扰.在...  相似文献   

4.
高文斌  卢光跃  弥寅 《信号处理》2022,38(3):590-598
针对基于携能同传(Simultaneous Wireless Information and Power Transfer,SWIPT)的协作非正交多址接入(Non-Orthogonal Multiple Access,NOMA)网络,提出了一种存在窃听用户下远端用户能效最大化的多维资源分配方法.在考虑近端用户安全传输...  相似文献   

5.
在后5G时代,作为一种候选方案,非正交多址技术(Non-Orthogonal Multiple Access,NOMA)正在被5G的演进技术标准讨论,该技术可以满足大规模连接和高吞吐量的要求。阐述了NOMA技术的基本原理、技术提案、性能仿真和潜在的研究方向。首先概述了NOMA技术的发展和原理,比较了NOMA相比于正交多址技术(Orthogonal Multiple Access,OMA)的优势;根据NOMA技术在资源块(Resource Block,RB)上复用方式的不同,从比特级和符号级的层面讨论了NOMA技术不同的技术路线。其次着重阐述了NOMA技术的仿真实验,以多用户共享接入(Multi-User Shared Access,MUSA)和稀疏码多址接入技术(Sparse Code Multiple Access,SCMA)为例进行了性能分析。最后给出了NOMA在未来的潜在研究方向,包括与多入多出(Multiple-Input Multiple-Output,MIMO)结合、与认知无线电结合和全双工NOMA等。  相似文献   

6.
在存在一个半双工自适应窃听者的通信模型中,分析了采用非正交多址(Non-orthogonal Multiple Access,NOMA)技术合作系统的性能。提出了一种新型的合作NOMA方案,该方案在中继转发时,强用户可充当中继协助转发弱用户信号,而弱用户采用全双工技术向窃听者发送干扰信号,提高了通信链路的安全性和用户的服务质量。合法接收端采用连续干扰消除(SIC)技术,以解码来自叠加信号的各个消息。在已知窃听信道统计信道状态信息(CSI)的情况下,分别推导了2个用户的安全中断概率和中断概率的闭合表达式,并通过Monte-Carlo仿真验证。理论分析和数值模拟结果均表明所提出的NOMA用户合作方案在保密率方面优于非合作方案的性能。  相似文献   

7.
《无线电通信技术》2019,(4):378-384
针对NOMA系统传输模型,提出了基于NOMA通信场景下的多用户调度策略,对非窃听中继和窃听中继2种场景分别进行研究分析,推导计算出2种场景下OMA与NOMA系统安全中断概率数学闭合表达式,并进行对比分析。分析和仿真结果表明通过增加主信道信噪比(SNR)和发送用户数目可以有效提高系统安全性能,分析表明同等情况下基于NOMA系统的安全中断概率总是低于OMA系统,并且这种优势随着主信道SNR的增加、窃听信道SNR的减小而更加显著。  相似文献   

8.
银泽正  杨震  冯友宏 《信号处理》2021,37(5):747-756
针对实际场景中存在的具有上下行双向传输任务的通信系统,本文提出了一种双向中继协作非正交多址接入(NOMA, non-orthogonal multiple access)传输方案,基于解码转发(DF, Decode and Forward)协议研究信号的上行和下行双向传输技术,与现有NOMA方案不同,本方案为近端用户分配较大的功率,利用网络编码(NC, network coding)原理在两个时隙内实现基站和用户之间的双向信息交换。进一步考虑不完美信道状态信息(CSI, Channel State Information)条件,分析系统的传输性能并推导了系统中断概率以及遍历和速率闭合表达式。仿真结果表明,在完美CSI和不完美CSI条件下,相比于现有文献所提方案、单向中继(OWR,One-Way Relay)和正交多址(OMA, Orthogonal Multiple Access)网络,本文所提方案有效降低了系统的传输中断概率,提高了系统的遍历和速率以及系统吞吐量。   相似文献   

9.
非正交多址接入技术(Non-Orthogonal Multiple Access,NOMA)具备高频谱效率和大连接的特性.随着移动数据和用户数量的爆炸式增长,NOMA技术的代表之一——稀疏码多址接入(Sparse Code Multiple Access,SCMA)技术具有愈发重要的研究意义.为了降低SCMA系统的检测...  相似文献   

10.
全双工协作中继转发信号时存在的自干扰现象会降低系统性能.本文考虑存在窃听者的下行非理想自干扰全双工协作中继非正交多址接入(NFCR-E-NOMA,Non-ideal Full Duplex Cooperative Relay in Non-Orthogonal Multiple Access system with Eavesdropper)系统,分别从系统中断概率和系统截获概率的角度分析了全双工协作中继的自干扰因素对于NFCR-E-NOMA系统安全中断性能的影响;推导了系统中断概率和截获概率的闭合表达式.仿真结果表明,全双工中继转发的自干扰因素对系统性能的影响较大,在NFCR-E-NOMA系统中,存在优化的中继转发功率,且在不同的基站发射功率和中继转发功率条件下,功率分配比对系统性能的影响也不同,在实际主链路信道条件允许的情况下,可通过设置较高的数据传输速率来抑制窃听者的截获概率.  相似文献   

11.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

12.
马梦欢  贺玉成  张彦  陈启望 《信号处理》2022,38(10):2155-2163
针对存在多个非共谋窃听者,研究了一种基于全双工中继和两阶段中继选择(TSRS)的非正交多址接入(NOMA)物理层安全通信方案。每个通信过程包含一个传输时隙,系统在每个时隙开始由TSRS策略选择最优中继,所选中继在从源节点接收NOMA叠加信号的同时,向两个目的节点转发上一时隙的再编码叠加信号,两个目的节点采用串行干扰消除(SIC)技术从中继叠加信号中解码获取各自的期望信号。推导了非理想SIC下系统安全中断概率的近似表达式,进行了蒙特卡洛(Monte-Carlo)仿真验证,同时分析了各仿真参数(SIC残余干扰系数、目标安全速率、中继规模等)与系统安全中断概率的关系。理论分析与模拟仿真的结果表明,全双工技术与TSRS的结合方案能有效提升系统的安全中断性能。将该方案应用于实际通信系统设计时,选择合适传输信噪比(SNR)、提高串行干扰消除能力或适当增加中继数量均可实现更好的保密性能。   相似文献   

13.
从物理层安全的角度出发,在含有协作中继的通信网络中,通过选择最优中继来传递信息可有效提升系统性能。讨论了在含有多个单天线窃听用户的多中继通信系统中对最优中继的选择方案,并对系统采用放大转发(amplify-and-forward,AF)协议和解码转发(decode-and-forward,DF)协议这两种不同的情况分别进行了讨论和比较,同时还对比了不含中继的直接传输情况。理论分析和仿真结果表明,最优中继选择方案可有效保障系统的安全性能。  相似文献   

14.
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.  相似文献   

15.
Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered,in the presence of the link from source to destination.A best relay selection scheme based on multieavesdropper’s cooperation was proposed,and the outage probability and the intercept probability was deduced under both schemes without relay and with best relay.Then,the security and reliability influenced by different relay selection schemes were analyzed.The simulation results show that the achievable channel capacity at the destination node and the system outage probability are directly affected by different relay selection scheme.Lower system outage probability can be achieved by the proposed scheme,and the system outage probability and intercept probability are both decreased with the increase of the number of relays.The intercept probability increases with the increase of the number of eavesdroppers,which,however,can be reduced by increasing the number of relays to ensure the main link’s reliable transmission.  相似文献   

16.
针对采用无线携能传输(SWIPT)的多中继协作底层认知NOMA网络,提出一种基于NOMA和串行干扰消除协议的两阶段中继选择策略(TSRS),次级网络源节点和所选中继采用相同的功率分配生成多用户叠加信号,中继只利用采集能量提供解码转发服务。推导了用户中断概率的闭合表达式,进行了蒙特卡洛仿真验证,分析了功率分配因子、能量分裂参数、干扰温度限和中继数量等系统参数对中断性能的影响。仿真结果表明,所提方案可显著提升协作系统中断性能。   相似文献   

17.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

18.
The authentication error in two-hop wire-less networks is considered without knowledge of eaves-dropper channels and location. The wireless information-theoretic security has attracted considerable attention re-cently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However it is unrealistic in the wireless environment. Error is always existing in the node authentication process. Best of our knowledge, there are no works focus on solving this problem in the information-theoretic security. This paper presents a eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eaves-droppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclu-sions for authentication error: 1) The impersonate nodes are chosen as relay is the dominant factor of the transmit-ted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tol-erated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.  相似文献   

19.
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; ie, the first scenario is that an eavesdropper overhears signal from the relay while the BS is overheard by eavesdropper in the second scenarios. More specifically, we derive closed‐form expressions for the secure probability metrics when the direct and relay links experience independent Rayleigh fading. There metrics include strictly positive secrecy capacity (SPSC) and the secure outage probability (SOP). Furthermore, secure performance of traditional orthogonal multiple access (OMA) is also provided as further comparison with NOMA counterpart. We analyze the influence of main coefficients such as the target rates and the transmit SNR factors on the secrecy performance. Our results specify that for reasonable selection of such parameters, secrecy performance can be enhanced remarkably. Numerical results are delivered to corroborate the derived results.  相似文献   

20.

Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal multiple access (NOMA) methods are analyzed under presence of multiple eavesdroppers. A channel state information of both the considered system and eavesdroppers is assumed to be outdated and eavesdroppers eavesdrop information signals independently. A closed-form of secure outage probability (SOP), secrecy throughput of every user is derived to evaluate the secrecy performance, and the mathematical analysis approach is verified by the Monte-Carlo simulation. Furthermore, the Golden-Section Search algorithm is proposed to find the maximum of the secrecy throughput of the considered FD-NOMA system. Numerical results indicate that there exists the SOP floor in the considered system and it is constrained by the channel gain of near user. Moreover, there is the optimal signal to interference plus noise ratio value which minimizes the SOP of the system regardless of the number of eavesdroppers. In comparison with half-duplex NOMA model, the SOP of FD-NOMA model is better.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号