首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.  相似文献   

2.
无线供电技术是延长无线网络节点寿命的有效方案。该文研究一个由基站和多个分簇用户组成的无线供电混合多址接入系统。系统的传输分为两个阶段。在第1阶段,基站向用户广播能量;在第2阶段,用户向基站传输信息。用户簇和用户簇之间采用时分多址接入,分时传输;同一簇内多个用户采用非正交多址接入,同时传输。该文研究联合优化系统的各阶段的传输时间、基站的发射功率、用户的发射功率等资源,分别以优化网络频谱效率和用户簇之间的公平性为目的,提出最大化网络吞吐量和最大化用户簇的最小吞吐量的联合资源分配算法。研究结果表明所提的两种算法分别能有效提高系统的频谱效率和保证用户簇之间的公平性。  相似文献   

3.
In this paper, a wireless powered communication network (WPCN) consisting of a hybrid access point (H‐AP) and multiple user equipment (UE), all of which operate in full‐duplex (FD), is described. We first propose a transceiver structure that enables FD operation of each UE to simultaneously receive energy in the downlink (DL) and transmit information in the uplink (UL). We then provide an energy usage model in the proposed UE transceiver that accounts for the energy leakage from the transmit chain to the receive chain. It is shown that the throughput of an FD WPCN using the proposed FD UE (FD‐WPCN‐FD) can be maximized by optimal allocation of the UL transmission time to the UE by solving a convex optimization problem. Simulation results reveal that the use of the proposed FD UE efficiently improves the throughput of a WPCN with a practical self‐interference cancellation capability at the H‐AP. Compared to the WPCN with FD H‐AP and half‐duplex (HD) UE, FD‐WPCN‐FD achieved an 18% throughput gain. In addition, the throughput of FD‐WPCN‐FD was shown to be 25% greater than that of WPCN in which an H‐AP and UE operated in HD.  相似文献   

4.
In Next-Generation (NG) hybrid wireless networks, Mobile-Controlled Handover (MCHO) is expected to be employed as the handover control mechanism, in contrast to Network-Controlled Handover (NCHO) used in homogeneous wireless networks. As more independent network operators get involved in providing Internet access, roaming mobile users would have to deal with complex trust relationships between heterogeneous network domains. The state-of-the-art handover approaches just take into account Quality of Service (QoS), but ignore the complexities arising from the coexistence of multiple network operators in the NG networks. The existence of a complex trust relationship between networks may lead to unnecessary handover attempts in service roaming. In this regard, this paper introduces a novel approach of dynamically retrieving network trust information, and using it in MCHO. We show how network trust information can be utilised to obtain a 35% reduction in handover delay, meanwhile retain QoS in a handover. The proposed scheme does not need bulk storage in mobile handsets, and can react to changes to network topology and trust relationships dynamically. Analytical results are provided to demonstrate how roaming mobile users make more intelligent and reliable handover if implementing the proposed handover approach in a multi-operator and multi-technology environment.  相似文献   

5.
Wireless Personal Communications - Distributed Denial-Of-Service (DDoS) attacks are one of the all the more difficult security issues on the Internet today. They can without much of a stretch,...  相似文献   

6.
在能量受限的通信系统中,能量效率是衡量系统性能的关键指标.本文研究由一个基站和多个分簇用户组成的无线供电混合非正交多址接入系统.在该网络中,基站通过无线能量传输方式给用户供能,用户则利用收集到的能量向基站传输各自的信息.为降低基站的接收解码复杂度,用户采用分簇的方式进行信息传输:簇间用户的信息传输采用时分多址方式,而簇内用户的信息传输采用非正交多址方式.通过联合分配能量传输与信息传输的时间长度以及控制基站和用户的发射功率来实现网络能量效率的最大化.由于涉及的优化问题是非凸的,本文先通过寻找问题最优解的结构,然后根据分式规划理论,提出了一种新的迭代资源分配算法来求解该问题.仿真结果表明,与"吞吐量最大化策略"和 "固定时间分配策略"两种基准策略相比,所提出的算法显著提高了网络的能量效率.  相似文献   

7.
谢天怡  吕斌  杨真真 《信号处理》2018,34(1):98-106
为了改善次发射机的性能,本文在衬底式(Underlay)认知无线能量通信网络(Cognitive Wireless Powered Communication Networks, CWPCNs)中提出了一种新的网络模型,该网络含有一个主发射机和两个由次发射机和次接收机组成的次用户对。次发射机可工作在反向散射通信(Backscatter Communication, BackCom)和收集再传输(Harvest-then-transmit, HTT)两种协议下。针对提高次网络的系统容量,根据收集的能量是否可以驱动次发射机工作,本文考虑了三种场景并针对每种场景设计了最优的时间分配方案。仿真结果表明,相比于单独利用BackCom或HTT协议以及协作式CWPCN,本文提出的新方法性能更佳。   相似文献   

8.
9.
In modern wireless communication systems, power control plays a fundamental role for efficient resource utilization, in particular in the systems where the users share the same bandwidth at the same time. In such systems, in fact, many users transmit over the same radio channel using the same frequency band and time slots so that the signal of an individual user becomes interference for the other users. Hence the transmission power levels need to be smartly manipulated so as to achieve an adequate quality of service for as many users as possible and, thus, an efficient network utilization. Conventional power control algorithms adopt the Signal-to-Interference-plus-Noise Ratio (SINR) as controlled variable and neglect the important effects of the manipulated control variables (transmission powers) and of the retransmission mechanism on the queueing dynamics. In this paper, we pursue a different queue-based approach which takes into account the queueing dynamics and adopts the queue size as controlled variable. In particular, a novel queue-based power control algorithm with low on-line computational burden is proposed and its performance is evaluated both theoretically and via simulation experiments.  相似文献   

10.
A fundamental problem that confronts wireless networks are localization, mobility maintenance and number of neighbors required to maintain the connectivity. To overcome this problem and achieve a better quality of service, a self stability model is introduced, named as localized tree model which includes min and max routing methods. This work is based on node degree, neighbor’s information and coverage area. Based on the mobility requirements of the network, dynamic structures are formed with minimum control load and complexity. Main objective of the research is to obtain the network parameters from the connectivity analysis. The performance of the proposed approach is witnessed by analyzing the parameters like scalability, packet delivery ratio and connectivity efficiency.  相似文献   

11.
Wang  Xinjie  Li  Enyu  Yang  Guang  Wu  Zeju  Fan  Lisheng 《Wireless Personal Communications》2020,111(2):867-881
Wireless Personal Communications - In this paper, we investigate the wireless powered multi-user multi-relay communication network, in which only relay nodes need energy harvesting with power...  相似文献   

12.
Wireless Personal Communications - There was a typo in the second author’s name in the original article. The correct name is S. Karthik, as listed here. The original article has been corrected.  相似文献   

13.
In this paper, we propose an efficient MAC protocol: the throughput maximized MAC protocol (TM-MAC), inspired by the availability that a number of ultrawideband (UWB) transmission parameters can be tuned to better match the requirements of data flow. In TM-MAC, we implement a concurrent multiuser access scheme instead of a mutual exclusion method such as TDMA and random access. For multiuser interference, we establish a model to adaptively adjust the data transmission rate to generate the expected signal to interference noise ratio (SINR) at the receiver side for reliable communications. We also analyze the relationship among the theoretical maximum channel capacity, achievable maximum channel capacity, and data transmission rate. According to network topology, TM-MAC redivides each piconet into several subsets in which communication pairs can make communication simultaneously and achieve the maximum throughput using the highest data rate. In subset formation, we propose a general analytical framework that captures the unique characteristics of shared wireless channel and throughput variance, as well as allows the modeling of a large class of systemwide throughput maximization via the specification of the per-link utilization function. For algorithm essential parameters design, we consider the influence of traffic type on the system performance. Heavy tailed distribution, compared to Poisson distribution for most existing work, is exploited to accurately model the real traffic to achieve the adaptation of our algorithm. Simulation results show that our algorithm can maximize throughput to achieve short latency.  相似文献   

14.
Currently, there is a trend towards the implementation of industrial communication systems using wireless networks. However, keeping up with the timing constraints of real-time traffic in wireless environments is a hard task. The main reason is that real-time devices must share the same communication medium with timing unconstrained devices. The VTP-CSMA architecture has been proposed to deal with this problem. It considers an unified wireless system in one frequency band, where the communication bandwidth is shared by real-time and non-real-time communicating devices. The proposed architecture is based on a virtual token passing (VTP) procedure that circulates a virtual token among real-time devices. This virtual token is complemented by an underlying traffic separation mechanism that prioritizes the real-time traffic over the non-real-time traffic. This is one of the most innovative aspects of the proposed architecture, as most part of real-time communication approaches are not able to handle timing unconstrained traffic sharing the same communication medium. A ring management procedure for the VTP-CSMA architecture is also proposed, allowing real-time stations to adequately join/leave the virtual ring.  相似文献   

15.

In recent years, cloud computing provides a spectacular platform for numerous users with persistent and alternative varying requirements. In the cloud environment, security and service availability are the two most significant factors during the data encryption process. For providing optimal service availability, it is necessary to establish a load balancing technique that is capable of balancing the request from diverse nodes present in the cloud. This paper aims in establishing a dynamic load balancing technique using the APMG approach. Here in this paper, we integrated adaptive neuro-fuzzy interference system-polynomial neural network as well as memory-based grey wolf optimization algorithm for optimal load balancing. The memory-based grey wolf optimization algorithm is employed to enhance the precision of ANFIS-PNN and to maximize the locations of the membership functions respectively. Also, two significant factors namely the turnaround time and CPU utilization involved in optimal load balancing scheme are evaluated. Finally, the performance evaluation of the proposed MG-ANFIS based dynamic load balancing approach is compared with various other load balancing approaches to determine the system performances.

  相似文献   

16.
Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data.  相似文献   

17.
Z-MAC: A Hybrid MAC for Wireless Sensor Networks   总被引:4,自引:0,他引:4  
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses. Like CSMA, Z-MAC achieves high channel utilization and low latency under low contention and like TDMA, achieves high channel utilization under high contention and reduces collision among two-hop neighbors at a low cost. A distinctive feature of Z-MAC is that its performance is robust to synchronization errors, slot assignment failures, and time-varying channel conditions; in the worst case, its performance always falls back to that of CSMA. Z-MAC is implemented in TinyOS.  相似文献   

18.
19.
A Novel Approach for Physical Layer Cryptography in Wireless Networks   总被引:1,自引:1,他引:0  
Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret is normally mandatory in order to decide the encryption (algorithm or code or key) of the information stream. It is usual to exchange this common a priori knowledge by using a “secure” channel. Nowadays a secure wireless channel is not possible. In fact normally the common a priori knowledge is already established (but this is not secure) or by using a non-radio channel (that implies a waste of time and resource). The information is encrypted by means of a private key that must be known by both the transmitter and the receiver. One of the main weak point about security is the private key exchanging interval. The key cannot be public and cannot be known a priori. The problem is how to exchange this private key through a totally secure wireless channel. This contribution deals with the review of the main physical layer techniques for encrypting the information and the proposal of a new physical layer technique ensuring secure communication in a full wireless environment. The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. The probability of error/detection is analytically derived for the legal users and for the third unwanted listener (passive or active attacker). Both the case of passive and active attacks have also been implemented and simulated by using Matlab-Simulink software. The analytical results have been compared to the simulated ones. All the results show that the performance of the proposed scheme yields the advantage of intrinsic security, i.e., the mutual information cannot be physically demodulated (passive attack) or denied (active attack) by a third terminal.  相似文献   

20.
谈振辉 《世界电信》1996,9(1):20-23
本文简要介绍了无线个人通信网,主要讨论了无线个人通信网的频谱分配、移动管理、呼叫和流量控制、智能网结构、网络规划和设计等技术问题。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号