首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 156 毫秒
1.
本文研究了多天线放大转发双向中继系统中在满足源节点信噪比要求条件下最小化系统总功率的波束设计问题。该问题是非凸优化问题,为了有效求解该问题,采用分层优化方法将原问题分解成发送波束成形向量优化、接收波束成形向量优化和中继波束成形矩阵优化三类子问题。发送/接收波束成形向量通过求解Rayleigh商最小化问题来获得。中继波束成形矩阵优化问题通过半正定松弛方法转化成半正定优化问题来求解。在求解这三类优化问题的基础上,提出了一种迭代波束成形算法,并采用单调有界序列定理证明了所提算法的收敛性。计算机仿真表明:所提算法经过若干次迭代即可收敛到稳定点;相比于已有算法,本文算法能显著降低系统总功率。   相似文献   

2.
该文研究频率选择性信道中多用户点对点分布式中继网络波束形成技术。为了均衡源节点与中继节点以及中继节点与目标节点之间的频率选择性信道,该文提出的波束形成技术在中继节点上采用有限长响应滤波器和滤波而后转发的中继数据传输方法,以最小化中继节点的发射总功率为目标,同时满足所有目标节点的服务质量(QoS)。该波束形成优化问题的直接形式由于其非凸性而难以求得最优解。该文采用半定松弛(SDP)方法将其近似为凸优化问题,进而可以用内点法高效快速求解。仿真结果表明,相较于传统的放大而后转发的波束形成技术,所提波束形成方法能有效提高频率选择性信道中多用户中继网络的性能。  相似文献   

3.
本文主要研究了基于最小化均方误差和准则的MIMO放大转发双向中继信道中的波束成形向量(矩阵)的设计.我们分别在集中式与分布式两种应用环境中提出了一套解决方案.在集中式方案中,多个中继之间完全协作,因此将多个单天线中继等效成一个多天线的中继节点,设计了基于所有中继天线的总功率控制的波束成形向量(矩阵).在分布式方案中,中继节点之间无协作,分别设计了基于所有中继总功率控制波束成形向量(矩阵)和基于单个中继功率控制的波束成形向量(矩阵).仿真表明,通过波束成形设计,可以显著提高通信节点平均误码率.由于中继节点之间的完全协作,集中式方案要优于分布式方案.但是,由于中继结构简单,分布式方案更易于在实践中应用.  相似文献   

4.
该文研究存在多个相互勾结的单天线窃听者的多中继传输系统中,采用零空间人工噪声和放大转发的中继波束赋形的物理层安全传输方案。在中继窃听端的信道状态信息不准确的情况下,基于半定规划理论,对中继的波束赋形加权矩阵和人工噪声协方差矩阵进行联合优化,有效减少相互勾结的多个窃听者所获得的信息量,显著提高系统保密容量,是一种具有良好鲁棒性的物理层安全传输方案。仿真结果显示方案具有良好的性能。  相似文献   

5.
研究节点具备能量收集能力的中继窃听信道保密速率的优化问题,提出一种基于人工噪声协同干扰和节点间能量协同的物理层安全传输策略.各节点采用储能-发送模式工作,即先收集能量,再用于数据传输.中继节点采用放大转发方式,目的节点发送人工噪声进行协同干扰.由于中继节点所需功耗较高,目的节点将用于发送干扰之外的剩余能量转移给中继节点.给出以最大化保密速率为目标函数,优化能量吸收时间比例系数和干扰功率分配因子的两步优化算法.仿真结果表明人工噪声和能量协同的引入能有效提高系统的保密传输速率.  相似文献   

6.
毫米波混合波束成形结构受到日益广泛的认可,但缺乏以安全性为着眼点的混合波束成形算法研究,特别是当窃听者具有多用户译码能力时,系统安全性能无法得到保障。针对上述问题,该文基于人工噪声辅助的思想提出一种毫米波下行多用户系统安全混合波束成形算法。首先,将混合波束成形矩阵的模拟部分和数字部分解耦合独立求解,在充分考虑信道特性的基础上,通过最大化用户接收信号能量和迫零思想分别设计有用信号的模拟和数字波束成形矩阵;然后,通过SVD分解设计人工噪声的基带数字预编码矩阵,将人工噪声置于合法用户零空间。仿真结果表明,人工噪声辅助的安全混合波束成形算法有效解决了存在具有多用户译码能力窃听者时系统的安全问题。  相似文献   

7.
赵耀环  谢梦非  尚勇 《电子学报》2015,43(4):791-794
本文提出了一种以协同干扰为基础,结合了最优中继选择和功率分配的物理层安全方案.该方案针对分布式天线的场景,从中间节点中选择一个最佳的节点作为中继,剩余的其他节点作为协同干扰节点.中继节点使用放大转发策略.本文同时提出了协同干扰节点的波束成形算法.另外,我们还推导出了中继节点和协同干扰节点之间的功率分配的闭式解.最后,本文还给出了相关的仿真结果,证实了新提出的方案比传统方案能获得更高的安全容量.  相似文献   

8.
双向中继网络的波束成形设计大都基于对称信道的假设。该文考虑非对称信道的情况,通过合理设计波束成形因子,使得系统在中继总功率约束下,其和速率最大化。为解决此非凸的最优化问题,首先提出了一种基于分支定界(branch-and-bound)思想的优化算法,并证明了该算法可获得全局最优解。然后提出了一种次优算法,该算法假设次优解为两个已知向量的线性组合,因而求解次优解只需优化两个实数系数,具有较低的复杂度。仿真表明,分支定界算法性能优于现有其他算法;次优算法相对于分支定界算法有一定的性能损失,但是在节点数较小或中继节点平均功率较低时,次优算法优于其他现有算法。  相似文献   

9.
针对单用户对双向中继系统中的功率分配问题,提出了一种基于梯度下降法的功率分配方案。该方案在总功率约束的条件下,以最大化和速率为目标函数,通过对中继波束成形矩阵和功率分配矩阵的反复迭代,求解出局部最优的功率分配和中继波束成形矩阵。仿真结果表明:提出方案的误码性能相比于等功率分配有明显提高,在误码率为10-2时,可获得2.5d B~3 d B的信噪比增益;同时,在中高信噪比下,相比于等功率分配,该方案可获得0.3(bit/s)/Hz~0.5(bit/s)/Hz的和速率增益。  相似文献   

10.
该文研究节点具有能量收集能力的两跳中继系统的物理层安全传输方案。考虑窃听节点与源和中继节点间都有直接链路的情况。每个数据传输时隙分为能量收集和数据传输两个阶段,各节点用收集的能量发送信号。中继采用放大转发方式,目的节点发送人工噪声进行协作干扰,保护在两跳传输中传输的保密信息。以最大化保密速率为目标,采用迭代算法优化能量吸收和数据传输两阶段的时间分配比例系数和协作干扰功率分配因子。仿真结果表明优化算法准确,优化后的协作干扰方案能显著提高系统的保密传输速率。由于考虑了窃听节点在两跳传输中都能接收到信号的可能性,文中方案更贴近实际,并解决了一个复杂的优化问题。  相似文献   

11.
张立健  金梁  罗文宇 《通信学报》2015,36(11):41-51
针对多用户多输入单输出(MISO, multiple-input single-output)干扰信道中保密信息泄露问题,提出了理想信道状态信息(CSI, channel state information)下的安全协同波束成形(SCB, secure coordinated beamforming)方案和非理想CSI下的顽健安全协同波束成形(RSCB, robust secure coordinated beamforming)方案。对于理想CSI情况,联合设计最优的协同波束成形向量,最大化最小安全速率。采用半定松弛(SDR, semidefinite relaxation)技术和连续的凸估计(SCA, successive convex approximation)算法得到原始非凸问题的局部最优解。进一步,将该框架扩展到信道向量和信道协方差矩阵存在确定误差的情况,提出的RSCB方案能够最大化最差情况的安全速率。仿真结果验证了所提方案的有效性和顽健性。  相似文献   

12.
In this paper, we consider a two‐way relay network consisted of two sources and multiple relays in the presence of an eavesdropper, where the cooperative beamforming strategy is applied to exploit the cooperative diversity to support the secure communication as illustrated in Figure 1. Naturally, we are interested in the beamforming strategy and power allocation to maximize the achievable sum secrecy rate. However, the corresponding problem is equivalent to solve a product of three correlated generalized Rayleigh quotients problem and difficult to solve in general. Because of the openness of wireless medium, the information rate leakage to the eavesdropper cannot be canceled perfectly. To some extent, ‘almost perfect secrecy’, where the rate leakage to the eavesdropper is limited, is more interesting from the practical point of view. In this case, we concern ourself mainly the achievable rate region for general case where the rate at the eavesdropper is regarded as the measurement of secrecy level. Two beamforming approaches, optimal beamforming and null space beamforming, are applied to investigate the achievable rate region with total power constraint and the rate constraint at the eavesdropper, which can be obtained by solving a sequence of the weighted sum inverse‐signal‐to‐noise‐ratio minimization (WSISM) problem. Because of the non‐convexity of WSISM problem, an alternating iteration algorithm is proposed to optimize the relay beamforming vector and two sources' transmit power, where two subproblems need to be solved in each iteration. Meanwhile, we provide the convergence analysis of proposed algorithm. Through the numerical simulations, we verify the effectiveness of proposed algorithm. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

13.
晏万才  李方伟  王明月 《电讯技术》2023,63(12):1985-1994
针对多天线无线携能通信系统中能量收集节点作为潜在窃听者的信息安全问题,提出了一种智能反射面(Intelligent Reflecting Surface, IRS)和人工噪声辅助的物理层安全传输方案。首先考虑发射功率、能量收集门限以及IRS单位模约束,以最大化系统安全速率为优化目标,在合法用户直射链路不可用的情况下,联合设计发射端波束赋形矩阵、人工噪声协方差矩阵以及IRS相移矩阵,建模一非线性多变量耦合的非凸优化问题;接着利用均方误差准则等价转换非凸目标函数,并利用连续凸逼近方法(Successive Convex Approximation, SCA)处理非凸的能量收集约束;最后基于交替优化框架,分别用拉格朗日对偶方法和基于价格机制的优化最小化(Majorization-Minimization, MM)算法求解发射端变量和IRS端变量。仿真结果表明,与现有方案相比,所提算法能够在保障能量收集需求的同时大幅度提升系统的安全性能。  相似文献   

14.
为满足绿色万物互联的智能信号处理部署和物理层安全的新要求,针对基于智能反射面辅助的无线携能通信物联网系统中可持续能量供应紧缺问题,提出了一种安全波束成形设计方法。考虑保密速率、发射功率和IRS反射相移约束,以最大化能量采集器采集功率为目标,联合优化基站发射波束成形矩阵和干扰机协方差矩阵以及IRS相移,将优化问题建模为具有二次型约束的非凸二次型规划问题。利用松弛变量、半定松弛法、辅助变量和序列参数凸逼近法将非凸的二次型问题转化为等价的凸问题,并提出一种交替迭代优化算法获取原问题的可行解。仿真结果表明,所提算法能够快速收敛,且与基准方案相比能有效地提升性能。  相似文献   

15.
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s-1·Hz-1in secrecy rate can be observed.  相似文献   

16.
The maximization problem of secure energy efficiency (EE) in decode-and-forward relay networks was investigated considering the power and energy constraints in physical-layer secure transmission.An iterative algorithm for power allocation was proposed based on fractional programming and DC (difference of convex functions) programming.This algorithm jointly allocated power for source and relay nodes to achieve energy-efficient secure transmission,subject to the peak power constraint of each node and the minimum secrecy rate requirement of the system.Simulation results demonstrate that the propose algorithm can improve the secure EE significantly compared with the conventional secrecy rate maximization strategy.  相似文献   

17.
An artificial noise strategy is proposed for amplify‐and‐forward bi‐directional relay network where the eavesdropper can wiretap the relay channels in both hops. Artificial noise is used to confuse the eavesdropper and improve its secrecy. Specifically, the source and the relay are allowed to split their available transmit power into 2 parts: a useful information portion and a jamming portion to transmit a jamming signal. The mathematical model is established for 2‐way relay network with an eavesdropper. The secrecy rate achieved by using artificial jamming is derived from the above model. The optimal power allocation with individual power constraint is obtained via sequential quadratic programming to maximize the secrecy sum rate, and 2 special cases are investigated. Furthermore, the benchmark is provided for the purpose of performance comparison. Simulation results show that the proposed strategy can significantly improve the secrecy sum rate by using artificial noise to jam the eavesdropper.  相似文献   

18.
For the security transmission of artificial noise with finite alphabet inputs in secure spatial modulation system,an antenna selection algorithm based on cut-off rate (COR) was proposed.Considering that it was difficult to obtain the closed-form expression of the secrecy rate,the problem of maximizing the secrecy rate into that of maximizing the COR was converted by the algorithm.Meanwhile,in order to reduce the complexity,the COR algorithm was optimized by expanding the matrix norm in columns,which was corresponding to the problem of antenna combination.Finally,the artificial noise vector was mapped in the legitimate channel space to optimize secrecy rate,which only interferes with eavesdropper.The simulation results show that the proposed algorithm based on COR is superior to the leakage-based algorithm and the maximum secrecy rate algorithm,and has lower complexity.  相似文献   

19.
This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO) broadcast wiretap system designs in slow fading channel environment. We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance. To overcome the complexity of this model, a novel optimization scheme using semiclosed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secu...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号