首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
In this paper, the performance of transmission techniques on the fixed‐gain amplify‐and‐forward–based asymmetric radio frequency/free space optical (RF/FSO) communication system is studied. The RF link and FSO link are, respectively, modeled by the Nakagami‐m and Gamma‐Gamma fading channels under the effect of zero boresight and non‐zero boresight pointing errors subject to heterodyne detection. Maximum ratio transmission (MRT) and orthogonal space‐time block coding (OSTBC) techniques are the transmission scenarios considered at the system source while selection combining is used for reception at the relay and destination for the signal detection. Moreover, a unified cumulative density distribution (CDF) of end‐to‐end signal‐to‐noise ratio is derived for the system. By utilizing this channel statistical CDF, the closed‐form expressions for the outage probability and average bit error rate for the M‐ary phase shift keying modulation are then obtained for the system. The analysis presented illustrates that both the atmospheric turbulence and pointing error significantly degrade the system performance. Based on this, the MRT transmission technique offers a better performance compared with the OSTBC techniques under the same system conditions. The accuracy of the analytical results is verified by Monte‐Carlo simulations.  相似文献   

2.
In this work, an amplify‐and‐forward variable‐gain relayed mixed RF‐FSO system is studied. The considered dual‐hop system consists of a radio frequency (RF) link followed by a free space optical (FSO) channel. The RF link is affected by short‐term multipath fading and long‐term shadowing effects and is assumed to follow the generalized‐K fading distribution that approximates accurately several important distributions often used to model communication channels. The FSO channel experiences fading caused by atmospheric turbulence that is modeled by the gamma‐gamma distribution characterizing moderate and strong turbulence conditions. The FSO channel also suffers path loss and pointing error induced misalignment fading. The performance of the considered system is analyzed under the collective influence of distribution shaping parameters, pointing errors that result in misalignment fading, atmospheric turbulence, and path loss. The moment‐generating function of the Signal power to noise power ratio measured end‐to‐end for this system is derived. The cumulative distribution function for the Signal power to noise power ratio present between the source and destination receiver is also evaluated. Further, we investigate the error and outage performance and the average channel capacity for this system. The analytical expressions in closed form for the outage probability, symbol and bit error rate considering different modulation schemes and channel capacity are also derived. The mathematical expressions obtained are also demonstrated by numerical plots.  相似文献   

3.
In this paper, the secrecy performance and power allocation of the signal‐to‐noise ratio‐based hybrid decode–amplify–forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obtained for the relay close‐to‐destination case and minimum for the relay close‐to‐eavesdropper case. Jamming schemes are superior in secrecy rate performance than without jamming schemes. To enhance the secrecy rate further with the optimized relay and jammer powers, invasive weed optimization (IWO) algorithm‐based power allocation is proposed. Here, maximizing the secrecy rate is defined as the cost function for the proposed IWO algorithm‐based power allocation. Comparative study is done over the conventional equal and proposed power allocation schemes for validation. The proposed power allocation scheme proved to be superior. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

4.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

5.
设计了一种在大气湍流和指向误差影响下的带有能量收集的混合双向RF/FSO中继传输系统。RF信号部分采用能量分割的方式进行能量收集,FSO信号部分则将其信号中的直流电分量所携带的能量收集起来存储在中继器中。其中射频RF链路采用Nakagamim信道衰落模型,自由空间光FSO链路采用Gamma Gamma信道衰落模型。并且计算出了两条链路各自的累积分布函数CDF。采用DF的中继协作方式,并利用Meijei G函数推导出系统中断概率的闭合表达式,最终通过仿真来验证结果的正确性。  相似文献   

6.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

7.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

8.
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal. The proposed scenario can be viable for a secondary safety task force working with a primary regiment, which wishes to transmit the confidential information to the commander while an eavesdropper is trying to intercept the classified information. In the analysis, two novel power allocation methods are considered by assuming perfect and limited feedback channels of the primary network, and for both methods, exact and asymptotic expressions of secrecy outage probability (SOP) are derived for N*Nakagami‐m fading channels which are used to model fading channels such as mobile‐to‐mobile/vehicle‐to‐vehicle communication systems where the nodes are moving into a rich scattering environment. We further verified our analytic results through Monte‐Carlo simulations. It is shown from the numerical results that the cascading degree of the channels has a worsening effect on the secrecy outage performance of the CRN systems.  相似文献   

9.
现有针对异构蜂窝网多点协作安全传输的研究集中于增强主信道质量以提升安全性,然而多基站协作又使基站和窃听者之间的平均距离变近,网络的安全性受限于距离协作基站较近的窃听者。针对该问题,该文提出一种基于安全保护域的增强型多点协作传输机制。然后,理论分析了用户的连接中断概率、安全中断概率以及安全吞吐量。进一步,以最大化安全吞吐量为目标,优化协作微基站的发射功率以及有用信息功率分配比例系数。仿真结果表明,相比于传统的多点协作安全传输机制,在存在严重安全威胁(窃听者密度较大)的场景下,所提机制可以实现非零系统安全吞吐量;在存在较小安全威胁(窃听者密度较小)的场景下,系统安全吞吐量最大可提升76.1%。  相似文献   

10.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

11.
This paper investigates secure transmission of an integrated satellite‐aerial‐terrestrial network (ISATN), where multiple eavesdroppers (Eves) attempt to overhear the satellite signals cooperatively. The ISATN adopts an unmanned aerial vehicle (UAV) equipped with multiple antennas as a relay with threshold‐based decode‐and‐forward (DF) protocol. By assuming that perfect instantaneous channel state information (CSI) of the satellite‐UAV link and the statistical CSI of the UAV‐user link are available, we first propose a beamforming (BF) scheme for maximizing the achievable secrecy rate (ASR) of the considered network. Then, we derive the analytical expressions of the secrecy outage probability (SOP) and ergodic secrecy rate (ESR) of the considered system with the BF strategy under an assumption that the satellite‐UAV link undergoes the shadowed‐Rician fading, while the UAV‐user link experiences the correlated Rayleigh fading. Finally, numerical results are given to demonstrate the superiority of the proposed BF scheme against zero forcing (ZF) and maximal ratio transmission (MRT) schemes and the validity of the secrecy performance analysis.  相似文献   

12.
This paper deals with the use of jamming transmission for secure amplify‐and‐forward‐based relay networks with total power constraints. An approach that the source and the relay use some of their available power to transmit jamming signals in order to create interference at the eavesdropper is investigated. Assume that the relay and destination have an a priori knowledge of the jamming signals. A power allocation policy that defines how the available power is distributed between the message signal and that of the jamming signal is presented. The results show that the proposed approach can increase the secrecy level and that a positive secrecy rate can be achieved even when the eavesdropper may be near the source. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

13.
在包含中继节点的D2D(Device-to-Device)系统中,针对蜂窝链路与D2D链路同时受窃听的问题,提出一种基于链路间干扰辅助的中继D2D系统安全通信方法.首先,确定蜂窝链路与D2D链路上下行发送模式;然后,在基站与中继节点的发送信号中添加人工噪声,协作干扰窃听者;最后,对基站功率分配与D2D功率控制进行了优化,以实现不同类型链路间干扰辅助保障系统安全.仿真结果表明,所提出的安全通信方法在保密速率方面比SVD(Singular Value Decomposition)与ZF(Zero-Forcing)预编码方法提高了1.5bit/s/Hz.  相似文献   

14.
Due to the rapid development of satellite laser communication technology, free-space optical (FSO) links present a promising alternative to traditional radio frequency (RF) links. In this paper, taking the influence of weather factors into consideration, we investigate the performance of the hybrid FSO/RF links where the feeder link operates in the FSO band and the user link operates in the hybrid FSO/RF band. Specifically, the FSO feeder link is modeled by the gamma–gamma distribution in the presence of beam wander and pointing error, and the detection method adopts either the intensity modulation with direct intensity (IM/DD) or heterodyne detection. The RF user link is assumed to follow the shadowed Rician model. In addition, in order to improve the transmission rate of the link under the time-varying satellite–terrestrial channel, a rate adaptation scheme is proposed. The performance of the system under study is evaluated in terms of the outage probability, average bit error rate (BER), and average transmission rate. Our results provide some important insights, for example, (1) due to the constraints of the feeder link and weather factors, there is an upper limit on the outage performance and bit error rate of the hybrid link; (2) the adaptive transmission strategy can significantly improve the transmission rate of the link compared with traditional design.  相似文献   

15.
This paper considers a full-duplex (FD) secure transmission scheme with aid of the artificial noise deployed at both transmitter and receiver under imperfect self-interference cancellation. The expressions of secrecy and connection outage probabilities are derived, and hence, the secrecy throughput of the proposed scheme is evaluated. The results show that the performance of the proposed FD scheme outperforms that of conventional half-duplex and FD receiver schemes in terms of the secrecy outage probability. In addition, the proposed FD scheme can achieve high secrecy throughput under various locations of the eavesdropper. Especially when the eavesdropper is located close to the transmitter, the secrecy throughput of the proposed FD scheme is nearly double that of the half-duplex scheme with artificial noise injection while that of the scheme with FD jamming receiver goes to zero.  相似文献   

16.
Distributed precoding has provento be capable of enhancing the secrecy capacity of the multi‐relay wiretap system. An iterative distributed precoding and channel state information (CSI) sharing scheme can be used to reduce the CSI overhead at each relay node. However, in practical applications, the CSI of each relay node cannot be perfectly known to themselves, especially that of the relay‐eavesdropper channels. Thus, partial CSI for the relay‐eavesdropper links is assumed, and the corresponding distributed precoding and CSI sharing schemes are investigated. Under the assumption that the average value of the relay‐eavesdropper channel is known at each relay node, an extended iterative distributed precoding and CSI sharing scheme is proposed. Simulation results demonstrate that with the increase of the power ratio of the constant part to the random part of the relay‐eavesdropper channels, the proposed scheme with partial CSI performs increasingly close to the one with perfect CSI in secrecy capacity. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

17.
This paper investigates the performance of a dual-hop mixed relay system with radio frequency (RF) and free-space optics (FSO) communication under the effect of pointing error (PE) and atmospheric turbulence (AT). This paper considers a system where RF and FSO links are cascaded. The RF link is modeled by Nakagami-m fading, and the FSO link is modeled as gamma–gamma (G-G) fading channel. Both the channel models use orthogonal frequency division multiplexing (OFDM) with M-ary quadrature amplitude modulation (QAM). The expressions for probability density function, cumulative distribution function, signal-to-noise ratio, and ergodic capacity are derived. The moment generating function (MGF) of fading and the bit error rate (BER) of the OFDM-based M-ary QAM scheme is derived in terms of Meijer's G-function. It has been observed that, in fixed gain relay systems, the modulation scheme's BER is dominated by the SNR of the RF link. While in a variable gain relay system, the turbulence conditions of the FSO system affect the SNR and the BER of the modulation method. The feasibility of heterodyne detection and intensity modulation direct detection (IM/DD) is analyzed in terms of outage probability and ergodic capacity. The results can be used to choose the optimal modulation order and relay system for QAM-OFDM-based optical wireless systems.  相似文献   

18.
杨炜伟  陈剑  陈德川 《电子学报》2019,47(8):1792-1796
射频能量采集技术为能量受限无线通信系统提供了一种有效的能量供给方式.假设能量受限中继节点具有射频能量采集能力,本文设计了中继非可信情况下的物理层安全传输方案,配置多天线的源节点采用发送天线选择策略来增强中继节点的能量采集性能,目的节点发送人工干扰来抑制非可信中继对保密信息的窃听.在瑞利块衰落信道条件下研究了所提方案的物理层安全性能,推导了系统安全中断概率、连接中断概率和安全吞吐量的闭式表达式.计算机仿真验证了理论推导的正确性,揭示了各系统参数对物理层安全性能的影响关系.  相似文献   

19.

This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model alternately the multicast/ eavesdropper and eavesdropper/ multicast channels as such mixed fading scenarios are often encountered in cellular communication where only one link (either multicast or eavesdropper) undergo a line-of-sight propagation path. At first, we derive the probability density functions for the single-input-multiple-output multicast scenarios and then the secrecy analysis is carried out by obtaining closed-form expressions for the performance matrices such as the probability of non-zero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting. The derived expressions are beneficial to investigate how the antenna diversity can combat the detrimental impact of fading as well as the number of multicast users and eavesdroppers, and improve the secrecy level to the acceptable limit. Moreover, the best secure scenario in terms of the secrecy parameters is obtained when the multicast channels undergo Rician fading whereas the eavesdropper channels experience Rayleigh fading. Finally, the analytical expressions are justified via the Monte-Carlo simulations.

  相似文献   

20.
In this paper, we carry out the performance analysis of relay selection in decode-and-forward (DF)-based mixed radio frequency/free-space optical (RF/FSO) system. We consider two relay selection schemes, namely max-select and distributed switch and stay, and compare their performance with the system having all relays active. The selected DF relay decodes the received RF signal from source and converts it into an optical signal using the subcarrier intensity modulation scheme for transmission over FSO links. The RF links follow generalized \(\eta -\mu \) distribution, while the FSO links are subjected to pointing errors and are assumed to follow gamma–gamma distribution. Novel analytical expressions for cumulative density function and the moment generating function of the equivalent end-to-end signal-to-noise ratio are derived. Capitalizing on the derived statistics, we provide the new closed-form expressions of the outage probability for different relay selection schemes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号