首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

In this paper, we investigate physical-layer security performance of the cooperative vehicular relaying networks, wherein the communication from a source vehicle to the destination vehicle is assisted by an amplify-and-forward (AF) relay vehicle in the presence of a passive eavesdropper vehicle. We assume that the communication links between the vehicles experience double-Rayleigh fading. We also consider two AF relaying protocols: (1) fixed gain relaying which requires partial channel state information (CSI), and (2) variable gain relaying which requires full CSI. Specifically, we derive the novel intercept probability and ergodic secrecy capacity expressions for both fixed and variable gain relaying in the presence of double-Rayleigh fading channels. The numerical and simulation results verify our theoretical and analytical findings, and show the impacts of channel conditions and relay and eavesdropper locations on the system secrecy performance.

  相似文献   

2.
杨斌  王文杰  殷勤业 《电子学报》2016,44(2):268-274
中继系统可以增强物理层安全算法的系统性能,这种系统一般包含两阶段的通信过程:从信源到中继节点,在从中继节点到目的节点.通常来说,第一阶段的信息传输缺乏保护,如果窃听者距离信源节点比较近的话,系统性能就无法保证了.该文提出了一种基于混合信号的三阶段的传输方法确保整个传输过程中的保密性能,这样,当窃听者接近信源节点的时候,仍可以保证系统的安全性能.这种方法的优化解是一个复杂的非凸优化问题,该文中建议了一种低复杂度的次优解来解决其中的优化问题.理论分析以及方针结果证明,该方法可以有效确保系统的全过程的安全性能.  相似文献   

3.
徐伟  赵睿  杨裕琳 《信号处理》2019,35(7):1201-1209
针对三节点传输系统,研究了基于时间切换能量采集的全双工放大转发协作中继方案。考虑源和目的地之间存在直达链路,全双工中继节点采用天线选择技术以最小化中继自干扰,目的节点采用最大比合并技术以最大化目的地接收信噪比。在延迟受限传输模式下,推出了自干扰信道增益为常数时系统吞吐量近似闭合表达式。运用最佳目的地选择策略和自适应中继选择策略讨论了系统吞吐量性能。如图4所示,在源发送功率为30 dB时,就系统吞吐量而言,本文算法比其他两种算法分别提高了0.22 bits/s/Hz和0.68 bits/s/Hz。数值分析和蒙特卡洛仿真表明,增加中继个数,增加目的地个数或者增大能量采集效率均能够提升系统吞吐量性能。   相似文献   

4.
Distributed Space-Time Cooperative Systems with Regenerative Relays   总被引:2,自引:0,他引:2  
This paper addresses some of the opportunities and the challenges in the design of multi-hop systems that utilize cooperation with one or two intermediate regenerative relays to provide high-quality communication between a source and a destination. We discuss the limitations of using a distributed Alamouti scheme in the relay channel and the additional complexity required to overcome its loss of diversity. As an alternative to the distributed Alamouti scheme, we propose and analyze two error aware distributed space-time (EADST) systems built around the Alamouti code. First, using a bit error rate based relay selection approach, we design an EADST system with one and two regenerative relays that rely on feedback from the destination and we show that the proposed system improves on the distributed Alamouti scheme. In addition, we prove that the proposed one relay EADST system collects the full diversity of the distributed MISO channel. Second, we introduce an EADST system without feedback in which the relaying energies depend on the error probabilities at the relays. Numerical results show that both EADST systems perform close to the error probability lower bound obtained by considering error-free reception at the relays  相似文献   

5.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

6.
Wireless Personal Communications - In this work, a three-hop wireless relaying model comprising of a single source and destination node, along with two relay nodes and an eavesdropper is...  相似文献   

7.
This letter studies the joint effects of imperfect channel state information (CSI) and co-channel interference (CCI) on a dual-hop variable gain amplify-and-forward (AF) relay network with beamforming. The source and destination are both equipped with multiple antenna, while the relay has a single antenna. Specifically, the analytical expressions for the outage probability and average symbol error rate of the considered AF relaying are derived. Moreover, the asymptotic analysis at high SNR is also presented to reveal the diversity order and array gain of the relay system. Finally, computer simulations are given to confirm the validity of the proposed theoretical analysis and quantify the combined influence of imperfect CSI and CCI on the system performance.  相似文献   

8.
Node localization in wireless networks is crucial for supporting advanced location-based services and improving the performance of network algorithms such as routing schemes. In this paper, we study the fundamental limits for time delay based location estimation in cooperative relay networks. The theoretical limits are investigated by obtaining Cramer–Rao Lower Bound (CRLB) expressions for the unknown source location under different relaying strategies when the location of the destination is known and unknown. More specifically, the effects of amplify-and-forward and decode-and-forward relaying strategies on the location estimation accuracy are studied. Furthermore, the CRLB expressions are derived for the cases where the location of only source as well as both source and destination nodes are unknown considering the relays as reference nodes. In addition, the effects of the node topology on the location estimation accuracy of the source node are investigated. The results reveal that the relaying strategy at relay nodes, the number of relays, and the node topology can have significant impacts on the location accuracy of the source node. Additionally, knowing the location of the destination node is crucial for achieving accurate source localization in cooperative relay networks.  相似文献   

9.
任婷洁  李光球  程英 《电信科学》2019,35(8):111-119
为了考察使用多中继选择与多用户选择的放大转发(AF)中继系统的物理层安全性能,推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量概率和安全中断概率的精确表达式以及在高信噪比下的渐近安全中断概率解析表达式。AF中继系统的非零安全容量概率和安全中断概率的数值计算和仿真结果相吻合,验证了以上理论分析的正确性;分析结果表明,其安全分集增益为源节点发射天线数、最优中继节点接收天线数、中继节点数的三者乘积与最优中继节点发射天线数、最优用户接收天线数、用户数三者乘积之间的最小值,且与窃听信道无关。  相似文献   

10.
本文研究了高斯正交中继窃听信道,中继节点同时作为窃听者的情况,源节点同中继节点和目的节点在信道1上传输信号,中继节点同目的节点在信道2上传输信号,信道1和信道2在频率上是正交的。通过分析,在总的信道资源受限的情况下,通过优化功率及信道带宽获得最大的安全速率。本文给出了在高斯正交信道下,当只考虑功率或带宽时,存在唯一的功率或带宽使得安全速率达到最大,并且通过仿真结果说明了采用最优资源分配可得到比等资源分配更大的安全速率。  相似文献   

11.

In this paper, the issue of secrecy capacity of wireless powered massive MIMO dual hop relay system with a single antenna eavesdropper having non ideal hardware is addressed. The relay harvests energy in a proportionate manner and passes it to destination through beamforming with classical decode and forward relaying protocol. The relay has no channel state information (CSI) of passive eavesdropper but has CSI of the legitimate channel. The work presented in this paper focuses on the analysis of the difference in system performance with ideal and non ideal hardware, bounded by strict outage probability. The performance (in terms of secrecy outage capacity) is studied with hardware impairments (HWIs) defined for all network elements, i.e., source, relay, destination and passive eavesdropper. It is also observed that compared to ideal hardware, there is significant degradation in performance due to HWIs.

  相似文献   

12.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

13.
Polar codes represent an emerging class of error-correcting codes with power to approach the capacity of the physically degraded relay channel and relevant coding schemes have been proposed in the literature. This paper aims to design new cooperative decode-and-forward (DF) polar coding schemes for half-duplex two-relay channel based on the Plotkin’s construction illustrating their performances gain. In these schemes, we consider the use of time-division process in transmission. The source node transmits its polar-coded information to both relays and the destination nodes during the first time slot. Each relay node receives the data from the source and processes it using the DF protocol. For the second transmission period, each relay first decodes the source signal then after reconstruction of the information reduction matrix based on the multilevel characteristics of polar codes, the extracted data at each relay are recoded using another polar code and transmitted to the destination. At destination node, the signals received from each relay and source nodes are processed by using multi-joint successive cancellation decoding for retrieving the original information bits. We demonstrate via simulation results that by carefully constructed polarisation matrix at each relay node, we can achieve the theoretical capacity in the half-duplex relay channel.  相似文献   

14.
In this paper, the exact analysis of a multihop multibranch (MHMB) relaying network is investigated wherein each relay can operate in amplify‐and‐forward (AF) or decode‐and‐forward (DF) modes depending upon the decoding result of its received signal. If a relay decodes the received signal correctly, it works in DF mode; otherwise, the relay operates in AF mode. Therefore, we name such relaying network as hybrid amplify‐and‐forward and decode‐and‐forward (hybrid AF/DF) relaying network. We first investigate the signal transmission from source to destination node via n number of relays in a hybrid AF/DF MHMB mode. Then, we obtained the statistical features and analyze the end‐to‐end signal‐to‐noise ratio (SNR). Finally, a comprehensive performance analysis is conducted by using maximal ratio combining (MRC) scheme at the destination node. For comparison, we also obtained the results using selection combining (SC) scheme at the destination node. To the best of our knowledge, very few works in the literature have considered a general system model of MHMB relaying network wherein each relay can operate in AF or DF modes, that is, a hybrid AF/DF relaying network. Accordingly, the analysis of our system model is not only novel and exact, but also is comprehensive and can be employed in the future works.  相似文献   

15.
郎非  王保云  邓志祥 《信号处理》2012,28(7):1021-1028
多址接入中继信道是含有多个接入节点、1个中继节点和1个目的接收节点的无线多用户信道,同时考虑接入节点之间能够接收彼此含噪的广义反馈信息,此种模型存在于接入节点之间协作通信能力较差的多跳无线网络和无线传感器网络。论文给出了带有此种广义反馈的离散无记忆多址接入中继信道的可达速率区域,并将这一结果推广到高斯信道。提出一个新的编码方案,主要基于速率划分和译码前传策略,并通过采用分组Markov叠加编码建立各接入源节点之间以及源节点和中继节点之间的协作通信,在可达性证明中还采用规则编码和反向译码策略。结果表明,在离散无记忆信道环境下可达速率区域相比较以往结果更具一般性,在高斯信道环境下可达速率区域被扩展。  相似文献   

16.
In this paper, we investigate the cooperative strategy with total power constraint in decode-and-forward (DF) relaying scenario, in the presence of an eavesdropper. Due to the difference of channel for each source-relay link, not all relay nodes have constructive impacts on the achievable secrecy rate. Besides, the final achieved secrecy rate depends on both source-relay and relay-destination links in DF relaying scenario. Therefore, the principal question here is how to select cooperative strategy among relays with proper power allocation to maximize the secrecy rate. Three strategies are considered in this paper. First, we investigate the cooperative jamming (CJ) strategy, where one relay with achieved target transmission rate is selected as a conventional relay forwarding signal, and remaining relays generate artificial noise via CJ strategy to disrupt the eavesdropper. Two CJ schemes with closed-form solutions, optimal cooperative jamming (OCJ) and null space cooperative jamming (NSCJ), are proposed. With these solutions, the corresponding power allocation is formulated as a geometric programming (GP) problem and solved efficiently by convex programming technique. Then, to exploit the cooperative diversity, we investigate the cooperative relaying (CR) strategy. An iterative algorithm using semi-definite programming (SDP) and GP together with bisection search method is proposed to optimize the cooperative relaying weight and power allocated to the source and relays. Furthermore, to exploit the advantages of both CR and CJ, we propose an adaptive strategy to enhance the security. Simulation results demonstrate that the efficiency of the proposed cooperative strategies in terms of secrecy rate.  相似文献   

17.
Cooperative communication is an ongoing research area which lies on the basic idea of transmission of information from the transmitter to the receiver with the assistance of a virtual array of relay nodes in between, which will eventually provide the spatial diversity. This paper deals with the resource allocation (bandwidth in this case) among multiple users (source‐ destination pairs) in a cooperative communication environment along with the relay selection when there are multiple relay nodes to assist the transmitting nodes to pass on their data signal to respective receivers. A multi‐user, multi‐relay system model is considered here on which Amplify‐and‐Forward relaying scheme is applied. The bandwidth allocation and relay selection are done based on the Stackelberg game according to which transmitting nodes are treated as purchasers and relaying nodes are treated as vendors. By this planned approach, the transmitting nodes can discover the relays at comparatively better positions and can purchase the optimal bandwidth from those helping relays. By this approach, the relays which are competing with each other can increase their own utilities by demanding the optimal prices and the multiple users which are competing with each other can maximize their own utilities by demanding the optimal bandwidths. Distributed relay selection scheme is applied here which does not require precise information of channel state information as opposed to Centralized scheme and it gives comparable results, too.  相似文献   

18.
Wireless networks contain an inherent distributed spatial diversity that can be exploited by relays. Relay networks can take advantage of the broadcast-oriented nature of wireless transmission, but require more radio resource to transmit data for their multi-hop traits. Fortunately, incremental relaying technique, which can choose direct or multi-hop transmission adaptively, can efficiently utilize resource. In this article, the incremental transmission with amplify-and-forward (AF) relays is focused on. A practical hybrid-automatic retransmission request (HARQ) protocol is designed, and the related optimal relay selection strategy is proposed. To analyze the cooperative diversity of system with the proposed protocol, the capacity lower bound is deduced. Simulation and analytical results indicate that by adopting the optimal relay selection strategy, the system with the proposed HARQ protocol can achieve an order of cooperative diversity that equals the aggregated number of the relay and source nodes.  相似文献   

19.
Wireless networks suffer from battery discharging specially in cooperative communications when multiple relays have an important role but they are energy constrained. To overcome this problem, energy harvesting from radio frequency signals is applied to charge the node battery. These intermediate nodes have the ability to harvest energy from the source signal and use the energy harvested to transmit information to the destination. In fact, the node tries to harvest energy and then transmit the data to destination. Division of energy harvesting and data transmission can be done in two algorithms: time-switching-based relaying protocol and power-splitting-based relaying protocol. These two algorithms also can be applied in delay-limited and delay-tolerant transmission systems. The previous works have assumed a single relay for energy harvesting, but in this article, the proposed method is concentrated on improving the outage probability and throughput by using multiple antennas in each relay node instead of using single antenna. According to our simulation results, when using multi-antenna relays, ability of energy harvesting is increased and thus system performance will be improved to great extent. Maximum ratio combining scheme has been used when the destination chooses the best signal of relays and antennas satisfying the required signal-to-noise ratio.  相似文献   

20.
IEEE 802.15.4 has emerged as a popular standard for short range wireless sensor networks used in industrial, military, health, and environmental sectors. The limited lifetime of such networks is one of the critical design challenges. This paper examines the how relaying through intermediate sensor nodes can enhance the lifetime of an 802.15.4 network. In particular, novel energy consumption models for both AF and DF relays have been developed. Different relay gain scaling mechanisms and forwarding strategies under each of the relay categories were also considered and their energy efficiencies were compared. For every relaying protocol, it was found that there exists an optimum location where energy saving is maximum and this location is not necessarily different for different modes. In summary, it has been observed that the optimum location for AF relays is the equidistant point from source and destination. In contrast, the optimal location for DF relays is closer to source. The effect of different PHY level (outage probability, path loss) and MAC level parameters (frame length) on the energy efficiency are also studied.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号