首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The security in cognitive radio networks (CRNs) has been attracting continuously growing attention due to the open and dynamic nature of cognitive radio architecture. In this paper, we propose new relay selection schemes to improve the physical layer security in CRNs. A trusted decode-and-forward relay is selected to help the secondary user (SU) transmission and improve the secrecy rate in the presence of multiple eavesdroppers and multiple primary users (PUs). The secrecy rate of the SU is characterized under both its own transmit power constraint as well as a set of interference power constraints imposed at each PU, in order to preserve its quality of service. The performance of the proposed schemes is analyzed in terms of the achievable secrecy rate and the intercept probability. Closed form expressions for the asymptotic intercept probability at high source-relays channel variances are also derived. Moreover, new derivations of some existing traditional schemes are presented and compared. The performance comparison of the proposed schemes with the schemes proposed in the literature reveals the superior of the proposed schemes.  相似文献   

2.
Do-Dac  Thiem  Ho-Van  Khuong 《Wireless Networks》2021,27(3):1561-1572

Energy harvesting has lately been of particular attention to researchers. In addition, cognitive radio networks (CRNs) are recognized as an attainable measure for the problem of radio spectrum shortage in next generation radio access. A combination of these two technologies, which forms energy harvesting CRNs (EHCRNs), allows wireless communication terminals to prolong their operation time in limited spectrum scenarios. Nonetheless, that CRNs create opportunities for secondary users to access primary users’ spectrum induces vulnerability of message security. So far, security capability analysis of EHCRNs has been limited to Rayleigh fading whilst Nakagami-m fading is more common than Rayleigh fading and better reflects distinct fading severity degrees in practical scenarios. Accordingly, this paper firstly offers the precise security capability analysis of EHCRNs under interference power constraint, Nakagami-m fading, maximum transmit power constraint, and primary interference. Then, the offered analysis is ratified by computer simulations. Ultimately, multiple results reveal that the security capability is considerably improved with smaller primary interference and lower required security threshold. Moreover, the security capability is significantly impacted by channel severity and is optimized with appropriate selection of time percentage.

  相似文献   

3.
Resource allocation under spectrum sensing based dynamic spectrum sharing strategy is a critically important issue for cognitive radio networks (CRNs), because they need to not only satisfy the interference constraint caused to the primary users (PUs), but also meet the quality-of-service (QoS) requirements for the secondary users (SUs). In this paper, we develop the optimal spectrum sensing based resource allocation scheme for the delay QoS constrained CRNs. Specifically, we aim at maximizing the maximum constant arrival rate of the SU that can be supported by the time-varying service process subject to the given statistical delay QoS constraint. In our derived power allocation scheme, not only the average transmit and interference power constraints are considered, but also the impact of the PUs?? transmission to the CRNs and the PUs?? spectrum-occupancy probability are taken into consideration. Moreover, the spectrum sensing errors are also taken into consideration. Simulation results show that, (1) the effective capacity of the secondary link decreases when the statistical delay QoS constraint becomes stringent; (2) given the QoS constraint, the effective capacity of the secondary link varies with the interference power constraint and the SNR of the primary link.  相似文献   

4.
In cognitive radio networks (CRNs), the primary users (PUs) and secondary users (SUs) will interfere with each other, which may severely degrade the performances of both primary and secondary transmissions. In this paper, we propose a two‐phase cognitive transmission (TCT) protocol for secondary spectrum access in CRNs, aiming at improving the secondary transmission performance while guaranteeing the quality‐of‐service (QoS) of primary transmissions. In TCT protocol, SUs gain the opportunities to access the licensed spectrum through assisting primary transmissions using superposition coding (SC), where SUs limit their transmit power to satisfy a given primary QoS requirement and also employ interference cancelation technique to mitigate the interference from PUs. Under the constraint of satisfying a required primary outage probability, we derive the closed‐form expressions of secondary outage probabilities over Rayleigh fading channels for proposed TCT protocol. Numerical and simulation results reveal that, with a guaranteed primary outage probability, TCT achieves better secondary transmission performance than traditional case. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

5.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

6.
王松青  许晓明  高瞻  杨炜伟  蔡跃明 《信号处理》2014,30(11):1267-1274
协同中继传输不仅能改善认知用户的传输可靠性,而且也能增强认知用户物理层安全性。针对Underlay模式下多中继协同频谱共享认知无线网络,本文设计了基于选择译码转发和分布式迫零波束成形(SDF-DZFB)的物理层安全传输方案,其中,假设存在单个被动窃听节点窃听中继节点的发送信号,在认知用户发送端同时考虑峰值干扰温度约束和最大发射功率约束,中继和认知用户目的端都受到主用户干扰。在此情况下,分析了认知用户发送端分别到目的端(称为主链路)和到窃听节点(称为窃听链路)的等效信干噪比的统计特性,进而推导出系统安全中断概率性能的闭式表达式。为了揭示所提物理层安全传输方案的安全分集度性能,本文进一步分析了高信噪比条件下安全中断概率的渐近表达式。计算机仿真验证了本文的理论分析结果。   相似文献   

7.
Most resource allocation algorithms are based on interference power constraint in cognitive radio networks.Instead of using conventional primary user interference constraint,we give a new criterion called allowable signal to interference plus noise ratio(SINR) loss constraint in cognitive transmission to protect primary users.Considering power allocation problem for cognitive users over flat fading channels,in order to maximize throughput of cognitive users subject to the allowable SINR loss constraint and maximum transmit power for each cognitive user,we propose a new power allocation algorithm.The comparison of computer simulation between our proposed algorithm and the algorithm based on interference power constraint is provided to show that it gets more throughput and provides stability to cognitive radio networks.  相似文献   

8.
An artificial noise strategy is proposed for amplify‐and‐forward bi‐directional relay network where the eavesdropper can wiretap the relay channels in both hops. Artificial noise is used to confuse the eavesdropper and improve its secrecy. Specifically, the source and the relay are allowed to split their available transmit power into 2 parts: a useful information portion and a jamming portion to transmit a jamming signal. The mathematical model is established for 2‐way relay network with an eavesdropper. The secrecy rate achieved by using artificial jamming is derived from the above model. The optimal power allocation with individual power constraint is obtained via sequential quadratic programming to maximize the secrecy sum rate, and 2 special cases are investigated. Furthermore, the benchmark is provided for the purpose of performance comparison. Simulation results show that the proposed strategy can significantly improve the secrecy sum rate by using artificial noise to jam the eavesdropper.  相似文献   

9.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

10.
The two main constraints on the transmit power allocation of the secondary service in a spectrum sharing scheme are the received interference threshold at the primary receiver, and the maximum transmit power of the secondary user. We obtain a critical system parameter which relates these two constraints and enables the system designer to eliminate the interference threshold constraint by adjusting the maximum transmit power of the secondary users. Eliminating the interference threshold constraint significantly reduces the system complexity by making the power allocation of the secondary service independent from the channel state information between the secondary transmitter and the primary receiver; thus removes the need for signaling between primary and secondary systems.  相似文献   

11.
Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.  相似文献   

12.
A communication network that consists of a transmitter, a legitimate receiver, an eavesdropper and several friendly helpers is considered. Both the transmitter and the helpers are equipped with multiple antennas while the legitimate receiver or the eavesdropper has one antenna. The transmitter and the helpers have the channel state information to the legitimate receiver. The channels to the eavesdropper are partially known and modeled with uncertainty ellipsoids. The transmitter applies maximum ratio transmission to the legitimate receiver. The helpers generate interference to degrade the receiving performance of the eavesdropper. The transmit power of the helpers is optimized with the worst-case secrecy rate requirement as the Quality of Service constraint. Based on robust convex optimization, a centralized optimization problem is developed for the helpers to generate interference efficiently with minimum total transmit power. A distributed algorithm is developed which scales well with a large number of helpers.  相似文献   

13.

In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of single primary and secondary user, multiple primary and secondary receivers, and multiple eavesdroppers. It is assumed that each user is equipped with single antenna while all the primary and secondary receivers, and eavesdroppers are equipped with multiple antennas. The primary and secondary users transmit their common messages to the respective receivers in the presence of multiple eavesdroppers. A mathematical model is developed to ensure successful reception of confidential information to the primary receivers protecting the activities of eavesdroppers neglecting the effect of interference due to secondary user. In order to analyze the security of the proposed model, closed-form analytical expressions have been derived for the secrecy multicast capacity, the secure outage probability for multicasting and the probability of non-zero secrecy multicast capacity. Analytical results are justified via Monte-Carlo simulations.

  相似文献   

14.
Since the nature of mobility and unreliability in wireless communication system may degrade the communication performance, robustness is one of the main concerns in cognitive radio networks (CRNs). In CRNs, the existing power control algorithms based on the assumption of exact system information may not guarantee the communication requirements due to the parameter uncertainties in real system. In this paper, we propose a robust distributed power control algorithm for underlay CRNs. The novelty in our paper is that we consider all possible parameter uncertainties: channel uncertainty and interference uncertainty. Our objective is to maximize the total throughput of secondary users while channel gain and interference plus noise are uncertain. According to the robust optimization theory, uncertain parameters are modeled by additive uncertainties with bounded errors. Through the worst case principle, we transform the robust power control problem into a deterministic optimization one, which is solved by using Lagrange dual decomposition method. Numerical simulation results show that the proposed algorithm can satisfy the QoS requirements of both secondary users and primary users for all uncertainty realizations.  相似文献   

15.
面向物联网业务中的低时延需求,将短包通信(SPC)和非正交多址接入(NOMA)技术相结合,针对存在窃听者的情况研究多用户NOMA系统中的安全传输问题。以最大化弱用户的安全吞吐量为目标,考虑用户译码错误概率约束、总功率约束和功率分配约束,提出了一种低复杂度的功率分配方案实现系统安全传输。为解决复杂的目标函数和不可靠的串行干扰消除(SIC)技术带来的问题,首先证明约束条件在取得最优解时的紧约束性,在最大译码错误概率约束下,对功率约束进行转化和计算,得到强用户发射功率范围,推导出基站向强用户的发射功率搜索集;然后利用一维搜索算法对功率进行分配,实现弱用户吞吐量最大化。仿真结果证明,所提方案可有效提高系统中弱用户的安全吞吐量。  相似文献   

16.
杨炜伟  陈剑  陈德川 《电子学报》2019,47(8):1792-1796
射频能量采集技术为能量受限无线通信系统提供了一种有效的能量供给方式.假设能量受限中继节点具有射频能量采集能力,本文设计了中继非可信情况下的物理层安全传输方案,配置多天线的源节点采用发送天线选择策略来增强中继节点的能量采集性能,目的节点发送人工干扰来抑制非可信中继对保密信息的窃听.在瑞利块衰落信道条件下研究了所提方案的物理层安全性能,推导了系统安全中断概率、连接中断概率和安全吞吐量的闭式表达式.计算机仿真验证了理论推导的正确性,揭示了各系统参数对物理层安全性能的影响关系.  相似文献   

17.
周明  贾向东  邓鹏飞 《信号处理》2015,31(5):559-569
文章首先对Underlay 认知-中继协作(cognitive radio relay cooperation, CR-RC)系统信源和中继的功率分配问题进行了研究,获得了Underlay CR-RC系统信源、中继独立功率分配(independent power allocation, IPA)和联合功率分配(joint power allocation, JPA)方案,并给出了基于IPA和JPA的CR-RC系统的中断概率和各态历经容量的封闭解析解;其次通过对Underlay CR-RC系统中断性能的比较分析,提出了高频谱效率、高能量效率的混合Interweave-Underlay CR-RC方案。在该方案中,定义了主、从用户中断概率约束,充分考虑了主、从系统的服务质量(quality of service, QoS),当即使从用户的发射功率为零,主系统的QoS仍不能满足时,从用户以最大功率发送信号,无需考虑其对主用户的影响;当由于很强的主用户干扰,使得从用户的QoS不能得到满足时,从用户不再发射信号,发信功率为零;当主、从系统的QoS能够同时满足时,以Underlay模式工作。   相似文献   

18.
Recently, cooperative relaying techniques have been integrated into spectrum‐sharing systems in an effort to yield higher spectral efficiency. Many investigations on such systems have assumed that the channel state information between the secondary transmitter and primary receiver used to calculate the maximum allowable transmit secondary user transmit power to limit the interference is known to be perfect. However, because of feedback delay from the primary receiver or the time‐varying properties of the channel, the channel information may be outdated, which is an important scenario to cognitive radio systems. In this paper, we investigate the impact of outdated channel state information for relay selection on the performance of partial relay selection with amplify and forward in underlay spectrum‐sharing systems. We begin by deriving a closed‐form expression for the outage probability of the secondary network in a Rayleigh fading channel along with peak received interference power constraint and maximum allowable secondary user transmit power. We also provide a closed‐form expression for the average bit‐error rate of the underlying system. Moreover, we present asymptotic expressions for both the outage probability and average bit‐error rate in the high signal‐to‐noise ratio regime that reveal practical insights on the achievable diversity gain. Finally, we confirm our results through comparisons with computer simulations. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

19.
This paper considers cooperative non‐orthogonal multiple access (NOMA) scheme in an underlay cognitive radio (CR) network. A single‐cell downlink cooperative NOMA system has been considered for the secondary network, consisting of a base station (BS) and two secondary users, ie, a far user and a near user. The BS employs NOMA signaling to send messages for the two secondary users where the near user is enabled to act as a half‐duplex decode‐and‐forward (DF) relay for the far user. We derive exact expressions for the outage probability experienced by both the users and the outage probability of the secondary system assuming the links to experience independent, nonidentically distributed Rayleigh fading. Further, we analyze the ergodic rates of both the users and the ergodic sum rate of the secondary network. The maximum transmit power constraint of the secondary nodes and the tolerable interference power constraint at the primary receiver are considered for the analysis. Further, the interference caused by the primary transmitter (PT) on the secondary network is also considered for the analysis. The performance of the proposed CR NOMA network has been observed to be significantly better than a CR network that uses conventional orthogonal multiple access (OMA) scheme. The analytical results are validated by extensive simulation studies.  相似文献   

20.
晏万才  李方伟  王明月 《电讯技术》2023,63(12):1985-1994
针对多天线无线携能通信系统中能量收集节点作为潜在窃听者的信息安全问题,提出了一种智能反射面(Intelligent Reflecting Surface, IRS)和人工噪声辅助的物理层安全传输方案。首先考虑发射功率、能量收集门限以及IRS单位模约束,以最大化系统安全速率为优化目标,在合法用户直射链路不可用的情况下,联合设计发射端波束赋形矩阵、人工噪声协方差矩阵以及IRS相移矩阵,建模一非线性多变量耦合的非凸优化问题;接着利用均方误差准则等价转换非凸目标函数,并利用连续凸逼近方法(Successive Convex Approximation, SCA)处理非凸的能量收集约束;最后基于交替优化框架,分别用拉格朗日对偶方法和基于价格机制的优化最小化(Majorization-Minimization, MM)算法求解发射端变量和IRS端变量。仿真结果表明,与现有方案相比,所提算法能够在保障能量收集需求的同时大幅度提升系统的安全性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号