首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

2.
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; ie, the first scenario is that an eavesdropper overhears signal from the relay while the BS is overheard by eavesdropper in the second scenarios. More specifically, we derive closed‐form expressions for the secure probability metrics when the direct and relay links experience independent Rayleigh fading. There metrics include strictly positive secrecy capacity (SPSC) and the secure outage probability (SOP). Furthermore, secure performance of traditional orthogonal multiple access (OMA) is also provided as further comparison with NOMA counterpart. We analyze the influence of main coefficients such as the target rates and the transmit SNR factors on the secrecy performance. Our results specify that for reasonable selection of such parameters, secrecy performance can be enhanced remarkably. Numerical results are delivered to corroborate the derived results.  相似文献   

3.
Tuan  Van Phu  Kong  Hyung Yun 《Wireless Networks》2019,25(4):1431-1442

In this paper, we consider the secrecy performance of an energy-harvesting relaying system with Kth best partial relay selection where the communication of a multi-antenna source-destination pair is assisted via single-antenna untrusted relays. To protect confidential source messages from untrusted relays, transmit beamforming and destination jamming signals are used. The relays are energy-constrained nodes that use the power-splitting policy to harvest energy through the wireless signals from both the source and destination. For performance evaluation, closed-form expressions of the secrecy outage probability and average secrecy capacity (ASC) are derived for Nakagami-m fading channels. The analytical results are confirmed via Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as relay location, number of relays, and power splitting ratio, on the secrecy performance. Specifically, the maximum ASC is achieved when the relay is located between the source and destination.

  相似文献   

4.
This paper investigates the secrecy outage probability (SOP) and intercept behavior for the amplify‐and‐forward network over Nakagami‐m fading channels. Relay selection schemes are evaluated. The optimal and suboptimal criterions require the instantaneous and statistical channel state information of the eavesdroppers' channels, respectively. The enhanced 2‐hop criterion needs the additional information of the target secrecy rate for relay selection. Theoretical analysis reveals that the diversity order of the SOP is dominated by the minimum fading figures of the source‐relay and relay‐destination channels, while that of the intercept probability depends on the fading figure of the relay‐destination channel. In the multirelay scenario, the optimal, suboptimal, and enhanced 2‐hop scheme achieve the same diversity orders of the SOP. For the intercept probability, the optimal and second‐hop relay selection schemes provide the same diversity order, while the diversity orders of the suboptimal and enhanced 2‐hop schemes are the same. Simulation results finally substantiate the accuracy of the theoretical analysis.  相似文献   

5.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

6.
In this paper, an energy harvesting relay network over Nakagami-m fading is investigated. In the considered system, the power beacon can provide wireless energy for the source and relays which deploy time-switching-based radio frequency energy harvesting technique. Two relay selection schemes, namely partial relay selection and optimal relay selection, are proposed in order to enhance the system performance. In the former, the source only has the channel state information of the first hop, while in the latter it has the full knowledge of the channel state information. The eavesdropper is able to wiretap to the signal transmitted from the source and the relays. The exact closed-form expressions of secrecy outage probability are derived. The results show that optimal relay selection performs better than partial relay selection. With increasing number of relays, the considered system shows better performance. In addition, the energy harvesting duration has a significant effect on the secrecy outage probability.  相似文献   

7.

In this paper, we investigate physical-layer security performance of the cooperative vehicular relaying networks, wherein the communication from a source vehicle to the destination vehicle is assisted by an amplify-and-forward (AF) relay vehicle in the presence of a passive eavesdropper vehicle. We assume that the communication links between the vehicles experience double-Rayleigh fading. We also consider two AF relaying protocols: (1) fixed gain relaying which requires partial channel state information (CSI), and (2) variable gain relaying which requires full CSI. Specifically, we derive the novel intercept probability and ergodic secrecy capacity expressions for both fixed and variable gain relaying in the presence of double-Rayleigh fading channels. The numerical and simulation results verify our theoretical and analytical findings, and show the impacts of channel conditions and relay and eavesdropper locations on the system secrecy performance.

  相似文献   

8.
In this article, the presence of multi-hop relaying, eavesdropper and co-channel interference (CCI) in the same system model is investigated. Specifically, the effect of CCI on a secured multi-hop relaying network is studied, in which the source communicates with the destination via multi-relay-hopping under the presence of an eavesdropper and CCI at each node. The optimal relay at each cluster is selected to help forward the message from the source to the destination. We apply two relay selection approaches to such a system model, i.e. the optimal relay is chosen based on (1) the maximum channel gain from the transmitter to all relays in the desired cluster and (2) the minimum channel gain from the eavesdropper to all relays in each cluster. For the performance evaluation and comparison, we derived the exact closed form of the secrecy outage probability of the two approaches. That analysis is verified by Monte Carlo simulation. Finally, the effects of the number of hops, the transmit power at the source, relays and the external sources, the distance between the external sources and each node in the system, and the location of the eavesdropper are presented and discussed.  相似文献   

9.
杨斌  王文杰  殷勤业 《电子学报》2016,44(2):268-274
中继系统可以增强物理层安全算法的系统性能,这种系统一般包含两阶段的通信过程:从信源到中继节点,在从中继节点到目的节点.通常来说,第一阶段的信息传输缺乏保护,如果窃听者距离信源节点比较近的话,系统性能就无法保证了.该文提出了一种基于混合信号的三阶段的传输方法确保整个传输过程中的保密性能,这样,当窃听者接近信源节点的时候,仍可以保证系统的安全性能.这种方法的优化解是一个复杂的非凸优化问题,该文中建议了一种低复杂度的次优解来解决其中的优化问题.理论分析以及方针结果证明,该方法可以有效确保系统的全过程的安全性能.  相似文献   

10.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

11.
任婷洁  李光球  程英 《电信科学》2019,35(8):111-119
为了考察使用多中继选择与多用户选择的放大转发(AF)中继系统的物理层安全性能,推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量概率和安全中断概率的精确表达式以及在高信噪比下的渐近安全中断概率解析表达式。AF中继系统的非零安全容量概率和安全中断概率的数值计算和仿真结果相吻合,验证了以上理论分析的正确性;分析结果表明,其安全分集增益为源节点发射天线数、最优中继节点接收天线数、中继节点数的三者乘积与最优中继节点发射天线数、最优用户接收天线数、用户数三者乘积之间的最小值,且与窃听信道无关。  相似文献   

12.

In this paper, the issue of secrecy capacity of wireless powered massive MIMO dual hop relay system with a single antenna eavesdropper having non ideal hardware is addressed. The relay harvests energy in a proportionate manner and passes it to destination through beamforming with classical decode and forward relaying protocol. The relay has no channel state information (CSI) of passive eavesdropper but has CSI of the legitimate channel. The work presented in this paper focuses on the analysis of the difference in system performance with ideal and non ideal hardware, bounded by strict outage probability. The performance (in terms of secrecy outage capacity) is studied with hardware impairments (HWIs) defined for all network elements, i.e., source, relay, destination and passive eavesdropper. It is also observed that compared to ideal hardware, there is significant degradation in performance due to HWIs.

  相似文献   

13.
In this paper, secrecy performance of a cognitive two-way denoise-and-forward relaying network consisting of two primary user (PT and PD) nodes, two secondary source (SA and SB) nodes, multiple secondary relay (\({\textit{SR}}_i\)) nodes and an eavesdropper (E) node is considered, where SA and SB exchange their messages with the help of one of the relays using a two-way relaying scheme. The eavesdropper tries to wiretap the information transmitted between SA and SB. To improve secrecy performance of the network, two relay selection schemes called maximum sum rate and maximum secrecy capacity based relay selection (MSRRS and MSCRS) are proposed and analyzed in terms of intercept probability. It is proved that the MSRRS and MSCRS schemes have the same secrecy performance. Two parameters called average number gain and average cost gain are proposed to show the performance of the proposed relay selection schemes. Numerical results demonstrated that with 10 relay nodes, the proposed relay selection schemes can achieve, respectively, 3.7 dB and 1.9 dB’s improvements in terms of the reduced intercept probability and the enhanced secrecy capacity compared to the traditional round-robin scheme.  相似文献   

14.
Cooperative diversity systems have recently been proposed as a way to form virtual antenna schemes without utilizing collocated multiple antennas. In this paper, we consider the Nth best opportunistic amplify‐and‐forward (AF) cooperative diversity systems. The AF type can be regarded as one on the basis of modified channel state information. Wireless channels between any pair of nodes (i.e., direct and dual hop links) are assumed quasi‐static independent and nonidentically distributed (INID) Rayleigh fading. The best opportunistic AF (OAF) scheme requires two phases of transmission. During the first phase, the source node transmits a signal to all relays and the destination. In the second phase, the best relay is only selected on the basis of highest signal‐to‐noise ratio (SNR) scheme to forward the source signal to the destination. Therefore, the indirect link (i.e., source‐selected relay destination) can give the highest received SNR. However, the best relay selection cannot be available so that we might choose the second, third, or generally the Nth best relay. In this paper, we derive the approximated outage probability and channel capacity for the Nth best OAF relay systems over INID Rayleigh fading channels. At first, the indirect link's received SNR is approximated as harmonic mean upper bound. With this information, we obtain the given relay's Nth best selection probability as the closed form. Finally, both outage probability and channel capacity are derived as the closed forms. Simulation results are finally presented to validate the analysis. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

15.
In cooperative communications, multiple relays between a source and a destination can increase the diversity gain. Because all the nodes must use orthogonal channels, multiple‐relay cooperation becomes spectrally inefficient. Therefore, a bestrelay selection scheme was recently proposed. In this paper, we analyzed the performance of this scheme for a system with the relays operating in amplify‐and‐forward mode over identical Nakagami‐m channels using an exact source–relay–destination signal‐to‐noise ratio (SNR).We derived accurate closed‐form expressions for various system parameters including the probability density function of end‐to‐end SNR, the average output SNR, the bit error probability, and the channel capacity. The analytical results were verified through Monte Carlo simulations. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

16.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

17.
Half‐duplex amplify‐and‐forward (AF) transmissions may result in insufficient use of degrees of freedom if they always use the cooperative mode regardless of the fading states. In this paper, we investigate the conditions under which cooperation offers better performance and the corresponding optimal power allocation during cooperation. Specifically, we first derive an expression of ergodic capacity and its upper bound for an AF cooperative communication system with n relay nodes. Secondly, we propose a novel quasi‐optimal power allocation (QOPA) scheme to maximize the upper bound of the derived ergodic capacity. For the QOPA scheme, the cooperative mode is only adopted when the channel gain of source‐to‐destination is worse than that of relay‐to‐destination. Moreover, we analyze the performance of the system with QOPA scheme when the relay moves, which is based on the random direction model, in a single‐relay wireless network. For a multi‐relay AF network, we compare the ergodic capacity and symbol error rate, corresponding to the proposed QOPA and equal power allocation schemes, respectively. Extensive simulations were conducted to validate analytical results, showing that both ergodic capacity and symbol error rate of the system with QOPA scheme are better than those of the system with equal power allocation scheme in a multi‐relay AF network. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

18.
Distributed Adaptive Power Allocation for Wireless Relay Networks   总被引:4,自引:0,他引:4  
In this paper, we consider a 2-hop wireless diversity relay network. We explore transmit power allocation among the source and relays to maximize the received signal to noise ratio (SNR) at the destination. We consider two relay protocols, "amplify and forward" (AAF) and "decode and forward" (DAF) and design the respective power allocations for both uneeded and coded systems. For a 2-hop relay system with one relay node, we derive a closed-form power allocation solution and, based on it, we propose a relay activation condition. If and only if the fading channel coefficients satisfy this condition, the relay transmits the signals to the destination; otherwise, the relay will stay in the idle state. For a system with more than one relay node, general closed-form power allocation solutions based on an exact SNR expression are difficult to derive; we hence, calculate a SNR upper bound and derive a sub-optimum power allocation solution based on this bound. The simulation results show that for a 2-hop diversity relay channel with one relay node the proposed adaptive power allocation (APA) scheme yields about 1- 2 dB SNR gains compared to the equal power allocation. This SNR gain increases monotonically as the number of relays increases  相似文献   

19.
雷维嘉  王娟兵  谢显中 《电子学报》2018,46(12):2878-2887
研究大规模多输入多输出中继网络中的多用户物理层安全传输方案.系统模型中假设窃听节点与源节点和中继节点间都有直接链路,窃听节点可以接收到源节点和中继发送的信号.在不能获得窃听者信道状态信息的情况下,大规模MIMO中继采用简单的最大比合并/最大比发射信号处理方案,并配合中继零空间人工噪声和目的端的协作干扰实现多用户的信息安全传输.对保密速率及其在中继天线数无限增长时的渐近值进行了理论分析,并进行仿真.仿真结果显示系统的保密和速率随中继天线数的增长而增长,最终趋于理论渐近上界值.仿真结果也表明即使窃听节点具有多用户间干扰消除能力,并能同时拦截源节点和中继发送的信号,采用本文的方案仍然能获得可观保密速率.  相似文献   

20.
In this paper, a decode-and-forward cooperative interference-limited multiple relay network is considered. An efficient relay selection strategy and its performance analysis are proposed, where only the relay nodes are affected by multiple interferences. In the proposed relay selection scheme, the selected relay is not always used, depending on the power of interferences and the channel state information of all links, while the direct path between source and destination is always used. For analytical tractability the distribution of interference-limited channel is approximated as an exponential distribution with high accuracy. Analysis of cooperative networks with interference-limited relays can be performed using the approximate exponential distribution by the same methods which have been used without interferences. We derive the bit error probability and outage probability of the proposed opportunistic max-min relay selection (OMRS) scheme in independent non-identically distributed Rayleigh fading channels. Numerical results present the superiority of OMRS over the conventional relay selection scheme which always uses the selected relay path. The exactness of the approximate analysis for interference-limited relays is also shown in numerical results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号