首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
由于非正交多址接入(Non-orthogonal Multiple Access,NOMA)能够显著提升系统的频谱资源利用率,在下一代移动通信中得到广泛应用。对NOMA环境下多中继协作网络的最优中继选择方案和系统安全性能进行了分析和讨论,其中包含窃听者仅窃听中继和窃听者同时窃听中继及源节点这2种情况下的系统安全性能表现,并与相同场景下正交多址接入(Orthogonal Multiple Access,OMA)网络进行了对比。最终的理论分析和仿真结果表明,在所提出系统模型中,当信道条件相同时,NOMA网络总能取得相较于OMA网络更好的安全性能,同时随着系统中继节点数目的增多,NOMA网络在物理层安全性能上获得更大的优势。  相似文献   

2.
针对采用无线携能传输(SWIPT)的多中继协作底层认知NOMA网络,提出一种基于NOMA和串行干扰消除协议的两阶段中继选择策略(TSRS).在保护主用户的干扰温度限约束下,次级网络源节点和最优中继均以固定功率分配生成多用户叠加信号向下一跳链路发送,最优中继采用功率分割方案采集能量,只利用从第一跳链路采集到的能量提供解码...  相似文献   

3.
Tuan  Van Phu  Kong  Hyung Yun 《Wireless Networks》2019,25(4):1431-1442

In this paper, we consider the secrecy performance of an energy-harvesting relaying system with Kth best partial relay selection where the communication of a multi-antenna source-destination pair is assisted via single-antenna untrusted relays. To protect confidential source messages from untrusted relays, transmit beamforming and destination jamming signals are used. The relays are energy-constrained nodes that use the power-splitting policy to harvest energy through the wireless signals from both the source and destination. For performance evaluation, closed-form expressions of the secrecy outage probability and average secrecy capacity (ASC) are derived for Nakagami-m fading channels. The analytical results are confirmed via Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as relay location, number of relays, and power splitting ratio, on the secrecy performance. Specifically, the maximum ASC is achieved when the relay is located between the source and destination.

  相似文献   

4.
In this paper, we investigate energy harvesting decode-and-forward relaying non-orthogonal multiple access (NOMA) networks. We study two cases of single relay and multiple relays with partial relay selection strategy. Specifically, one source node wishes to transmit two symbols to two respective destinations directly and via the help of one selected intermediate energy constraint relay node, and the NOMA technique is applied in the transmission of both hops (from source to relay and from relay to destinations). For performance evaluation, we derive the closed-form expressions for the outage probability (OP) at D 1 and D 2 with both cases of single and multiple relays. Our analysis is substantiated via Monte Carlo simulation. The effect of several parameters, such as power allocation factors in both transmissions in two hops, power splitting ratio, energy harvesting efficiency, and the location of relay nodes to the outage performances at the two destinations is investigated.  相似文献   

5.
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.  相似文献   

6.
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; ie, the first scenario is that an eavesdropper overhears signal from the relay while the BS is overheard by eavesdropper in the second scenarios. More specifically, we derive closed‐form expressions for the secure probability metrics when the direct and relay links experience independent Rayleigh fading. There metrics include strictly positive secrecy capacity (SPSC) and the secure outage probability (SOP). Furthermore, secure performance of traditional orthogonal multiple access (OMA) is also provided as further comparison with NOMA counterpart. We analyze the influence of main coefficients such as the target rates and the transmit SNR factors on the secrecy performance. Our results specify that for reasonable selection of such parameters, secrecy performance can be enhanced remarkably. Numerical results are delivered to corroborate the derived results.  相似文献   

7.
马梦欢  贺玉成  张彦  陈启望 《信号处理》2022,38(10):2155-2163
针对存在多个非共谋窃听者,研究了一种基于全双工中继和两阶段中继选择(TSRS)的非正交多址接入(NOMA)物理层安全通信方案。每个通信过程包含一个传输时隙,系统在每个时隙开始由TSRS策略选择最优中继,所选中继在从源节点接收NOMA叠加信号的同时,向两个目的节点转发上一时隙的再编码叠加信号,两个目的节点采用串行干扰消除(SIC)技术从中继叠加信号中解码获取各自的期望信号。推导了非理想SIC下系统安全中断概率的近似表达式,进行了蒙特卡洛(Monte-Carlo)仿真验证,同时分析了各仿真参数(SIC残余干扰系数、目标安全速率、中继规模等)与系统安全中断概率的关系。理论分析与模拟仿真的结果表明,全双工技术与TSRS的结合方案能有效提升系统的安全中断性能。将该方案应用于实际通信系统设计时,选择合适传输信噪比(SNR)、提高串行干扰消除能力或适当增加中继数量均可实现更好的保密性能。  相似文献   

8.
The time switching‐based relaying (TSR) scheme is considered in energy harvesting protocol to implement with its advantage to nonorthogonal multiple access (NOMA) system. In particular, decode‐and‐forward (DF) mode is proposed to employ in relay to forward signal to serve two far NOMA users. There are two main metrics including outage probability and ergodic rate, which are derived in exact expressions with respect to varying performance under impacts of energy harvesting fractions. To evaluate system performance, outage event and related capacity are illustrated, and we tailor performance gap among two NOMA users and such gap can be controlled by selecting of appropriate power allocation factors assigned for each user to obtain optimal performance. By examining node arrangement, target rates and varying transmit signal to noise ratio (SNR), it can be further achieved performance in several situations of such NOMA. As important result, the considered NOMA system outperforms than the conventional multiple access scheme, and this expected result is confirmed in numerical result and theoretical results. We also explore impacts of transmit power at source, noise power, the other key parameters of energy harvesting scheme to exhibit outage, and ergodic performance. Simulation results are presented to corroborate the proposed methodology.  相似文献   

9.
This paper analyzes the performance of a cooperative nonorthogonal multiple access (NOMA) in an underlay cognitive radio network aided by an energy harvesting relay. A secondary source transmits signal for two users, where a near user acts as a relay for the far user. The far user applies the selection combining (SC) approach on the signals which were relayed by the near user and received via direct path from the secondary source. We analytically derive the outage probability (OP) of each user separately, the overall system OP, and the throughput of the system. The impact of the power allocation coefficient of NOMA and energy harvesting parameters on outage is indicated. Further, the performance of the network is investigated with imperfection in successive interference cancellation (SIC), maximal ratio combining (MRC) at relay, and Nakagami-m fading. The results derived analytically are supported by simulation in MATLAB.  相似文献   

10.
Cooperative communication is an ongoing research area which lies on the basic idea of transmission of information from the transmitter to the receiver with the assistance of a virtual array of relay nodes in between, which will eventually provide the spatial diversity. This paper deals with the resource allocation (bandwidth in this case) among multiple users (source‐ destination pairs) in a cooperative communication environment along with the relay selection when there are multiple relay nodes to assist the transmitting nodes to pass on their data signal to respective receivers. A multi‐user, multi‐relay system model is considered here on which Amplify‐and‐Forward relaying scheme is applied. The bandwidth allocation and relay selection are done based on the Stackelberg game according to which transmitting nodes are treated as purchasers and relaying nodes are treated as vendors. By this planned approach, the transmitting nodes can discover the relays at comparatively better positions and can purchase the optimal bandwidth from those helping relays. By this approach, the relays which are competing with each other can increase their own utilities by demanding the optimal prices and the multiple users which are competing with each other can maximize their own utilities by demanding the optimal bandwidths. Distributed relay selection scheme is applied here which does not require precise information of channel state information as opposed to Centralized scheme and it gives comparable results, too.  相似文献   

11.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

12.
In this paper, we study an asymmetric two‐way relaying network where two source nodes intend to exchange information with the help of multiple relay nodes. A hybrid time‐division broadcast relaying scheme with joint relay selection (RS) and power allocation (PA) is proposed to realize energy‐efficient transmission. Our scheme is based on the asymmetric level of the two source nodes’ target signal‐to‐noise ratio indexes to minimize the total power consumed by the relay nodes. An optimization model with joint RS and PA is studied here to guarantee hybrid relaying transmissions. Next, with the aid of our proposed intelligent optimization algorithm, which combines a genetic algorithm and a simulated annealing algorithm, the formulated optimization model can be effectively solved. Theoretical analyses and numerical results verify that our proposed hybrid relaying scheme can substantially reduce the total power consumption of relays under a traffic asymmetric scenario; meanwhile, the proposed intelligent optimization algorithm can eventually converge to a better solution.  相似文献   

13.
This paper investigates the effect of hardware impairments (HIs) and imperfect channel state information (ICSI) on a SWIPT-assisted adaptive nonorthogonal multiple access (NOMA)/orthogonal multiple access (OMA) system over independent and nonidentical Rayleigh fading channels. In the NOMA mode, the energy-constrained near users act as a relay to improve the performance for the far users. The OMA transmission mode is adopted to avoid a complete outage when NOMA is infeasible. The best user selection scheme is considered to maximize the energy harvested and avoid error propagation. To characterize the performance of the proposed systems, closed-form and asymptotic expressions of the outage probability for both near and far users are studied. Moreover, exact and approximate expressions of the ergodic rate for near and far users are investigated. Simulation results are provided to verify our theoretical analysis and confirm the superiority of the proposed NOMA/OMA scheme in comparison with the conventional NOMA and OMA protocol with/without HIs and ICSI.  相似文献   

14.
杨键泉  贺玉成  马梦欢  周林 《信号处理》2021,37(9):1719-1726
本文把非正交多址接入(NOMA)技术与认知网络相结合,提出了一种基于多中继选择的认知NOMA网络模型。考虑了在瑞利衰落信道下,主网络借助次级网络中的全双工中继实现可靠通信,作为回报,次级网络允许接入授权频谱来传输次级信号。中继同时接收主次信号后,采用串行干扰消除技术(SIC)依次解码主次信号,并根据NOMA协议转发信号到主次用户端。推导了在两种中继选择策略下认知NOMA网络中断概率,并通过了蒙特卡罗仿真验证。仿真结果表明,两阶段中继选择策略和全双工技术能有效提高系统中断性能。   相似文献   

15.
由于信道情况差的中继对协作贡献小,且消耗额外的能量,基于某种标准选择出一个或者多个好的中继参加协作,可以提高协同通信系统性能,所以中继选择是协同通信系统的研究热点。针对一个发送端、接收端及每个中继都配置单根天线的无线中继网络,在假设发送方不知道信道信息而接收方已知全部信道信息前提下,本文提出了中继未知任何信道信息时的中继选择方案。首先提出基于信噪比最大的单中继选择方案,推导了单中继选择的成对错误概率表达式;其次提出基于中继排序方法的多中继选择方案,推导了选择2个中继的成对错误概率的下界;最后给出了仿真结果。理论与仿真结果都表明,中继未知任何信道信息的情况下,选择2个中继参加协作的系统错误概率却高于单中继选择。   相似文献   

16.
Wireless networks suffer from battery discharging specially in cooperative communications when multiple relays have an important role but they are energy constrained. To overcome this problem, energy harvesting from radio frequency signals is applied to charge the node battery. These intermediate nodes have the ability to harvest energy from the source signal and use the energy harvested to transmit information to the destination. In fact, the node tries to harvest energy and then transmit the data to destination. Division of energy harvesting and data transmission can be done in two algorithms: time-switching-based relaying protocol and power-splitting-based relaying protocol. These two algorithms also can be applied in delay-limited and delay-tolerant transmission systems. The previous works have assumed a single relay for energy harvesting, but in this article, the proposed method is concentrated on improving the outage probability and throughput by using multiple antennas in each relay node instead of using single antenna. According to our simulation results, when using multi-antenna relays, ability of energy harvesting is increased and thus system performance will be improved to great extent. Maximum ratio combining scheme has been used when the destination chooses the best signal of relays and antennas satisfying the required signal-to-noise ratio.  相似文献   

17.
We consider a two-way relay network where the Amplify-and-Forward (AF) protocol is adopted by all relays in this paper. The network consists of two multi-antenna source nodes and multiple distributed single-antenna relays. Two opportunistic relaying schemes are proposed to efficiently utilize the antennas of the source nodes and the relay nodes. In the first scheme, the best relay is selected out by a max-min-max criterion before transmitting. After that, at each source, only the antenna with the largest channel gain between itself and the best relay is activated to transmit and receive signals with full power. In the second scheme, assisted by the best relay which is selected by the typical max-min criterion, both source nodes use all their antennas to exchange data, and match filter beamforming techniques are employed at both source nodes. Further analyses show that all schemes can achieve the full diversity order, and the conclusions are not only mathematically demonstrated but numerically illustrated. System performance comparisons are carried out by numerical methods in terms of rate sum and outage probability, respectively. The beamforming assisted scheme can be found to be superior to the antenna selection scheme when accurate Channel State Information (CSI) is available at the transmitters. Otherwise, the latter is very suitable.  相似文献   

18.
针对下行双用户NOMA (Non-Orthogonal Multiple Access)系统模型中存在智能窃听者,该窃听者可以自适应地选择被动窃听或主动干扰工作模式,在不精确了解其干扰水平的情况下,部分NOMA用户很有可能遭遇传输质量下降乃至保密中断,这将对信息安全传输构成严重威胁。另外,由于信道衰落,用户的位置对系统整体性能有很大影响,难以保证距离源节点较远用户的传输质量。为解决上述问题,本文提出了一种新型的两阶段用户协作方案。第一阶段,远用户采用全双工(full-duplex,FD)干扰智能窃听者,第二阶段,近用户可作为一个中继协助源节点转发远用户信号信息,并在接收端采用串行干扰消除(Successive Interference Cancellation, SIC)技术进行解码。使用户间达成合作,提高通信链路安全性和用户服务质量。考虑到系统中不同用户的信息接收速率与通信需求不同之间的相关性,分别推导了遍历安全容量和遍历容量的解析表达式,同时分析了功率分配因子和用户间协作发射功率等因素对性能的影响,并通过Monte-Carlo仿真验证了其正确性。   相似文献   

19.
汪烈军 《通信技术》2010,43(12):94-96
提出了一种放大转发网络中的中继选择方案,假设目的节点配置多个天线,源节点和所有中继节点都配置单个天线,方案选择一组中继同时在相同的频带上放大转发接收到的源节点信息以最大化接收信噪比。与只择一个最优中继的方案相比,方案在保持满分集阶数的情况下获得了更高的中断容量和更优的误符号率性能。与只选择一个最优中继的方案相比,在0.000 01的误符号率水平上,少需要发射功率1.6 dB。  相似文献   

20.
This paper investigates an optimization of the conventional relay selection for multirelay environments. In contrast with previously reported selection schemes, where a selected relay accesses the channel in a dedicated cooperative slot, the proposed scheme recovers the bandwidth loss of the half-duplex constraint by allowing two relays to simultaneously access the channels. Based on an appropriate dirty-paper coding (DPC) technique among relays, the proposed scheme enables a relay to establish communication with the destination at the same time that another relay forwards the data from the source. It is proven that the interplay between relay selection and the superposition DPC weight factor provides a tradeoff between relaying and new data performance. Hence, an appropriate codesign of the superposition DPC parameter and opportunistic relay selection can achieve efficient communication for the new data without affecting the relaying performance. The proposed scheme is compared with conventional relaying approaches, and its enhancements are provided through theoretical studies and numerical results.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号