首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
程英  李光球  沈静洁  韦亮 《电信科学》2021,37(9):95-104
针对合谋窃听场景下单天线多中继修改转发(MF)协作无线系统的安全性能较差问题,提出一种合谋窃听场景下联合源节点发送天线选择(TAS)和多中继选择的MF协作物理层安全系统,考虑最优的最大化主信道信噪比(SNR)和次优的最大化源节点-中继节点链路 SNR 两种中继选择方案,推导其安全中断概率(SOP)和遍历安全容量(ESC)的解析表达式。最优或次优中继选择的MF安全中继系统的SOP和ESC的数值计算结果与仿真结果相吻合,验证了上述理论分析的正确性;同时也表明源节点发射天线数和中继节点数越多、窃听节点数越少,最优或次优中继选择的MF安全中继系统的物理层安全性能越好。  相似文献   

2.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

3.
This paper considers a full-duplex (FD) secure transmission scheme with aid of the artificial noise deployed at both transmitter and receiver under imperfect self-interference cancellation. The expressions of secrecy and connection outage probabilities are derived, and hence, the secrecy throughput of the proposed scheme is evaluated. The results show that the performance of the proposed FD scheme outperforms that of conventional half-duplex and FD receiver schemes in terms of the secrecy outage probability. In addition, the proposed FD scheme can achieve high secrecy throughput under various locations of the eavesdropper. Especially when the eavesdropper is located close to the transmitter, the secrecy throughput of the proposed FD scheme is nearly double that of the half-duplex scheme with artificial noise injection while that of the scheme with FD jamming receiver goes to zero.  相似文献   

4.
针对无线网状网中缺少窃听者先验知识不利场景中的安全连接问题,提出了一种结合全双工和协作干扰技术的物理层安全策略。利用全双工通信中的自干扰消除技术和协作干扰技术,提出的安全策略可有效劣化位于信息传播范围内包括潜伏在接收节点附近窃听者的接收性能。为保证信息的安全传输给出了协作干扰节点的选择方法,基于随机几何等数学方法导出了选定路径的安全连接概率表达式。性能分析和仿真结果表明,所提方法与仅基于全双工或协作干扰技术的方法相比,其安全性能有较大提升。  相似文献   

5.
中继辅助终端直通(devicetodevice,D2D)网络通过与蜂窝网络共享频谱提高D2D用户的频谱效率和蜂窝用户(cellular user,CU)的物理层安全性。为进一步改善其性能,可以在基站和D2D链路的中继节点采用天线选择以及在中继节点采用全双工技术。然而,由于存在反馈时延和移动性,用于蜂窝链路和所有D2D链路天线选择的信道状态信息(channelstateinformation,CSI)均可能是过时的,针对该场景下的物理层安全性和可靠性问题,提出一种主动窃听和过时CSI场景下基站和中继节点均采用发射天线选择的全双工中继辅助D2D网络安全模型,推导CU的中断概率、遍历容量、非零安全容量概率、安全中断概率、渐近安全中断概率的解析表达式。数值计算与仿真结果均表明,基站发射天线数、中继干扰天线数越多,CU的安全性能越好;过时的CSI会降低CU的中断性能和安全性能。  相似文献   

6.
针对未来海量用户设备接入的物理层安全(physical layer security,PLS)应用需求,提出了一种组合非正交多址接入(non-orthogonal multiple access,NOMA)、终端直通(device-to-device,D2D)与中继协作的NOMA-D2D协作无线系统PLS模型。该模型由采用发射天线选择(transmit antenna selection,TAS)的基站、分别作为基站和D2D发射端的NOMA远端蜂窝用户、D2D接收端以及被动窃听者组成,其中的D2D发射端承担基站的 NOMA 近端用户和解码转发中继两种角色。利用高斯—切比雪夫正交定理推导两种 TAS 方案下NOMA-D2D协作无线系统的安全中断概率、非零安全容量概率以及渐近安全中断概率的近似表达式。数值计算和仿真实验验证了NOMA-D2D协作无线系统PLS性能分析的准确性;在基站总功率恒定时增大分配给远端蜂窝用户的功率能有效提升NOMA-D2D协作无线系统的PLS性能。  相似文献   

7.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

8.
Cooperative relaying is an effective technique to combat multi-path fading, improves system capacity and enhances the coverage. In this paper, three different types of operations of infrastructure-based multi-antenna cooperative relay network have been investigated. Closed form expressions of outage probability and average error rate for each type of operation have been derived, when the relay and destination perform maximum ratio combining (MRC) of signals. The effect of antennas installed on relay and its placement has also been studied in this work.  相似文献   

9.
研究了多播业务在协作非正交多址接入(non-orthogonal multiple access,NOMA)系统中的应用及其性能。在一个单播和多播混合业务的场景中,多播用户组中选择某个信道状态最好的用户作为中继进行解码转发单播用户的信号,并在中继用户支持全双工的模式下,分析和推导了单播用户的中断概率和平均可达速率的闭式表达式。蒙特卡洛仿真结果和理论推导高度一致,表明提出的协作多播应用可以极大改善单播用户的中断性能,且多播用户的容量性能在中继发射功率不是很高的情况下不会受到影响。  相似文献   

10.
We investigate the physical layer security of decode‐and‐forward–relayed free space optics (FSO)/radio frequency (RF) communication system. In this network, the eavesdropper exists after relay node and overhears RF transmission. Further, FSO being a line‐of‐sight transmission is assumed to be secure from eavesdroppers. Here, we have the Gamma‐Gamma (ΓΓ) distribution for FSO link and generalized η?μ distribution for RF link. The security for information transmission to the legitimate user in the presence of an eavesdropper is measured in terms of secrecy capacity and secrecy outage probability. Deriving the probability density function and cumulative distribution function of end‐to‐end signal‐to‐noise ratio, the closed‐form expressions for security parameters are achieved. The numerical analysis of the proposed system is done under the influence of atmospheric turbulence effects and various fading conditions. The results have been verified through simulation.  相似文献   

11.
从物理层安全的角度出发,在含有协作中继的通信网络中,通过选择最优中继来传递信息可有效提升系统性能。讨论了在含有多个单天线窃听用户的多中继通信系统中对最优中继的选择方案,并对系统采用放大转发(amplify-and-forward,AF)协议和解码转发(decode-and-forward,DF)协议这两种不同的情况分别进行了讨论和比较,同时还对比了不含中继的直接传输情况。理论分析和仿真结果表明,最优中继选择方案可有效保障系统的安全性能。  相似文献   

12.
Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.  相似文献   

13.
吴亚峰  赵睿  贺玉成  谢维波 《电子学报》2015,43(11):2247-2254
在基于有限反馈获得部分信道状态信息的条件下,研究了放大转发非可信中继系统的物理层安全传输技术.通过目的节点发送人工噪声干扰信息,使系统获得了正安全容量.推导了安全中断概率和传输中断概率的闭合表达式,分析了反馈比特数对系统安全性和可靠性的影响,进而提出了能同时兼顾系统安全性和可靠性的最优反馈比特数的自适应选择方案.  相似文献   

14.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

15.
龙恳  谭路垚  王奕  陈兴  王亚领 《电讯技术》2022,62(1):116-122
针对协作非正交多址接入(Non-orthogonal Multiple Access,NOMA)系统中用户充当中继并存在窃听者的场景,提出了一种新型协作干扰传输方案,以提高该系统的安全性.在第一时隙,基站将混合信号进行广播,同时为了干扰窃听者,信道条件较差的用户采用全双工的工作模式,发出协作干扰信号对窃听者进行干扰.在...  相似文献   

16.
吕铄  嵇建波 《电讯技术》2024,64(1):139-148
分析了认知无线电(Cognitive Radio,CR)非正交多址(Non-orthogonal Multiple Access,NOMA)网络中的物理层安全性能。考虑到现有窃听者,支持NOMA的CR通过Nakagami-m信道以解码转发协作模式传输数据。为了分析CR-NOMA物理层安全性能,通过连接中断概率和安全中断概率的闭式表达式来评估CR-NOMA的安全性能。此外,通过蒙特卡罗模拟仿真以验证推导出的分析结果,并深入分析了参数对系统性能的影响。  相似文献   

17.
研究了Nakagami信道中联合网络编码和双向协作中继选择的中断与平均误码率的性能,基于3个时隙的网络编码方案提出了一种最小化较差用户误码率的协作中继选择策略。在Nakagami信道下,从双向通信的角度,通过理论分析得出其中断概率和平均误码率的解析式和渐近式,同时推导了无协作中继选择时网络编码的中断概率和平均误码率解析式。通过理论分析发现,当Nakagami信道衰落参数降低时,联合网络编码的协作中继选择方案相对于无协作中继选择时的性能增益将逐渐升高。数值仿真实验结果表明,所提策略的平均误码率性能要显著高于无协作中继选择时的网络编码性能。  相似文献   

18.
The broadcast nature of communications in wireless communication networks makes it vulnerable to some attacks, particularly eavesdrop attack. Hence, information security can have a key role to protect privacy and avoid identity theft in these networks, especially in distributed networks. In the wireless systems, the signal propagation is affected by path loss, slow fading (shadowing), and fast fading (multi‐path fading). As we know, there is a correlation between communication channels in the real radio environments. This correlation is defined by the correlation between their shadowing and/or multipath fading factors. So when there are several channels in the wireless systems, there is certainly a correlation between the channels. In this paper, we assume that the transmitter knows the full channel state information (CSI), it means the transmitter knows both the channel gains of the illegitimate (ie, eavesdropper) and the legitimate receivers and study the performance of secure communications of single‐input single‐output (SISO) systems consisting of single antenna devices, in the presence of a single antenna passive eavesdropper over correlated slow fading channels, where the main (transmitter to legitimate receiver) and eavesdropper (transmitter to illegitimate receiver) channels are correlated. Finally, we present numerical results and verify the accuracy of our analysis by Monte‐Carlo simulations.  相似文献   

19.
Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.  相似文献   

20.
全双工协作中继转发信号时存在的自干扰现象会降低系统性能.本文考虑存在窃听者的下行非理想自干扰全双工协作中继非正交多址接入(NFCR-E-NOMA,Non-ideal Full Duplex Cooperative Relay in Non-Orthogonal Multiple Access system with Eavesdropper)系统,分别从系统中断概率和系统截获概率的角度分析了全双工协作中继的自干扰因素对于NFCR-E-NOMA系统安全中断性能的影响;推导了系统中断概率和截获概率的闭合表达式.仿真结果表明,全双工中继转发的自干扰因素对系统性能的影响较大,在NFCR-E-NOMA系统中,存在优化的中继转发功率,且在不同的基站发射功率和中继转发功率条件下,功率分配比对系统性能的影响也不同,在实际主链路信道条件允许的情况下,可通过设置较高的数据传输速率来抑制窃听者的截获概率.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号