首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we investigate the problem of secure communication for a scenario, which consists of one pair of source‐destination nodes and one untrusted relay. The source communicates with the destination via the help of energy harvesting–aware untrusted relay, which acts as the helper to forward the source information to the destination; however, the relay also acts as the unintended user to eavesdrop the source information. To keep the source information confidential from untrusted relay, the destination‐assisted jamming technique is deployed. We evaluate the impact of energy harvesting protocols on such a secure communication scenario through the proposed energy transfer protocols, namely, source‐based energy harvesting protocol and maximum energy harvesting protocol. To evaluate the secrecy performance of these proposed schemes, we derive analytical expressions for two important performance metrics including intercept probability and strictly positive secrecy capacity. The numerical analysis reveals the different trade‐off between secure performance and relevant system parameters (i.e., power splitting ratio, time switching ratio, energy conversion efficiency, transmit signal‐to‐noise ratio, and relay location). Simulation results are also provided to demonstrate the accuracy of the developed analytical expression.  相似文献   

2.
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s-1·Hz-1in secrecy rate can be observed.  相似文献   

3.
Tuan  Van Phu  Kong  Hyung Yun 《Wireless Networks》2019,25(4):1431-1442

In this paper, we consider the secrecy performance of an energy-harvesting relaying system with Kth best partial relay selection where the communication of a multi-antenna source-destination pair is assisted via single-antenna untrusted relays. To protect confidential source messages from untrusted relays, transmit beamforming and destination jamming signals are used. The relays are energy-constrained nodes that use the power-splitting policy to harvest energy through the wireless signals from both the source and destination. For performance evaluation, closed-form expressions of the secrecy outage probability and average secrecy capacity (ASC) are derived for Nakagami-m fading channels. The analytical results are confirmed via Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as relay location, number of relays, and power splitting ratio, on the secrecy performance. Specifically, the maximum ASC is achieved when the relay is located between the source and destination.

  相似文献   

4.
程英  李光球  沈静洁  韦亮 《电信科学》2021,37(9):95-104
针对合谋窃听场景下单天线多中继修改转发(MF)协作无线系统的安全性能较差问题,提出一种合谋窃听场景下联合源节点发送天线选择(TAS)和多中继选择的MF协作物理层安全系统,考虑最优的最大化主信道信噪比(SNR)和次优的最大化源节点-中继节点链路 SNR 两种中继选择方案,推导其安全中断概率(SOP)和遍历安全容量(ESC)的解析表达式。最优或次优中继选择的MF安全中继系统的SOP和ESC的数值计算结果与仿真结果相吻合,验证了上述理论分析的正确性;同时也表明源节点发射天线数和中继节点数越多、窃听节点数越少,最优或次优中继选择的MF安全中继系统的物理层安全性能越好。  相似文献   

5.
With careful calculation of signal forwarding weights, relay nodes can be used to work collaboratively to enhance downlink transmission performance by forming a virtual multiple‐input multiple‐output beamforming system. Although collaborative relay beamforming schemes for single user have been widely investigated for cellular systems in previous literatures, there are few studies on the relay beamforming for multiusers. In this paper, we study the collaborative downlink signal transmission with multiple amplify‐and‐forward relay nodes for multiusers in cellular systems. We propose two new algorithms to determine the beamforming weights with the same objective of minimizing power consumption of the relay nodes. In the first algorithm, we aim to guarantee the received signal‐to‐noise ratio at multiusers for the relay beamforming with orthogonal channels. We prove that the solution obtained by a semidefinite relaxation technology is optimal. In the second algorithm, we propose an iterative algorithm that jointly selects the base station antennas and optimizes the relay beamforming weights to reach the target signal‐to‐interference‐and‐noise ratio at multiusers with nonorthogonal channels. Numerical results validate our theoretical analysis and demonstrate that the proposed optimal schemes can effectively reduce the relay power consumption compared with several other beamforming approaches. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

6.

In this paper, we investigate the impact of channel estimation errors on the physical layer security of an overlaying device-to-device (D2D) wireless network with an amplify-and-forward untrusted relay. An untrusted relay assists D2D communication while may capture the confidential data. Under the practical assumption of imperfect channel state information (ICSI) for the relay-to-receiver D2D link, we take into account optimal power allocation (OPA) problem to maximize the achievable secrecy rate of two different scenarios which are without jamming and with friendly jamming. Based on these OPA solutions, we study the secrecy performance of the two scenarios by driving closed-form expressions for the ergodic secrecy rate (ESR) in Rayleigh fading channel. We also calculate the high signal-to-noise ratio (SNR) slope and high SNR power offset of the optimized scenarios by finding the asymptotic ESR. Numerical results confirm the accuracy of our proposed theoretical analysis. The results also demonstrate that our proposed OPAs enhance the ESR performance compared with other power allocation techniques. Moreover, they show the effect of ICSI on the ESR such that as channel estimation error grows, the ESR performance reduction is occurred.

  相似文献   

7.
In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. The relays are equipped with multiple antennas that receive the source signals and transmit them to the destination nodes. We develop two iterative relay beamforming algorithms that can be applied in real-time. In both algorithms, the relay beamforming matrices are jointly designed by minimizing the received power at all the destination nodes while preserving the desired signal at each destination. The first algorithm requires the existence of a local processing center that computes the beamforming coefficients of all the relays. In the second algorithm, each relay can compute its beamforming coefficients locally with the help of some common information that is broadcasted from the other relays. This is achieved at the expense of enforcing the desired signal preservation constraints non-cooperatively. We provide two extensions of the proposed algorithms that allow the relays to control their transmission power and to modify the quality of service provided to different sources. Simulation results are presented validating the ability of the proposed algorithms to perform their beamforming tasks efficiently and to track rapid changes in the operating environment.  相似文献   

8.
Relay beamforming techniques have been shown to significantly enhance the sum capacity of a multiuser cooperative wireless network through the optimization of the relay weights, where concurrent communications of multiple source-destination pairs are achieved via spatial multiplexing. Further optimization of the transmit power allocation over the source nodes is expected to improve the network throughput as well. In this paper, we maximize the sum capacity of a multiuser cooperative wireless network through the joint optimization of power allocation among source nodes and relay beamforming weights across the relay nodes. We consider a two-hop cooperative wireless network, consisting of single-antenna nodes, in which multiple concurrent links are relayed by a number of cooperative nodes. When a large number of relay nodes are available, the channels of different source-destination pairs can be orthogonalized, yielding enhanced sum network capacity. Such cooperative advantage is particularly significant in high signal-to-noise ratio (SNR) regime, in which the capacity follows a logarithm law with the SNR, whereas exploiting spatial multiplexing of multiple links yields capacity increment linear to the number of users. However, the capacity performance is compromised when the input SNR is low and/or when the number of relay nodes is limited. Joint optimization of source power allocation and relay beamforming is important when the input SNR and/or the number of relay nodes are moderate or the wireless channels experience different channel variances. In these cases, joint optimization of source power and distributed beamforming weights achieves significant capacity increment over both source selection and equal source power spatial multiplexing schemes. With consideration of the needs to deliver data from each source node, we further examine the optimization of global sum capacity in the presence of individual capacity requirements by maximizing sum capacity of the network subject to a minimum capacity constraint over each individual user.  相似文献   

9.
本文针对两跳无线物联通信系统,对中继节点利用收集的能量采用功率分流法进行能量收集和信息传输算法进行了设计,其中算法设计是基于能效最大化的优化准则,能效函数定义为瞬时吞吐量与硬件电路总功耗的比值,中继节点利用源节点发送的信号进行能量收集,考虑EARTH计划中实际的功率转换效率和硬件电路损耗的功耗因子,推导了中继协同的无线物联系统能量收集和信息传输的最优功率分配方案的解析解,由于优化问题是非凸问题,为了解决该问题,本文利用高信噪比近似法并通过拉格朗日算法和Lambert W函数获得了优化问题的最优解,数值仿真验证了所提方案的正确性和有效性。   相似文献   

10.
Distributed Adaptive Power Allocation for Wireless Relay Networks   总被引:4,自引:0,他引:4  
In this paper, we consider a 2-hop wireless diversity relay network. We explore transmit power allocation among the source and relays to maximize the received signal to noise ratio (SNR) at the destination. We consider two relay protocols, "amplify and forward" (AAF) and "decode and forward" (DAF) and design the respective power allocations for both uneeded and coded systems. For a 2-hop relay system with one relay node, we derive a closed-form power allocation solution and, based on it, we propose a relay activation condition. If and only if the fading channel coefficients satisfy this condition, the relay transmits the signals to the destination; otherwise, the relay will stay in the idle state. For a system with more than one relay node, general closed-form power allocation solutions based on an exact SNR expression are difficult to derive; we hence, calculate a SNR upper bound and derive a sub-optimum power allocation solution based on this bound. The simulation results show that for a 2-hop diversity relay channel with one relay node the proposed adaptive power allocation (APA) scheme yields about 1- 2 dB SNR gains compared to the equal power allocation. This SNR gain increases monotonically as the number of relays increases  相似文献   

11.
Multiple Peer-to-Peer Communications Using a Network of Relays   总被引:1,自引:0,他引:1  
We consider an ad hoc wireless network consisting of d source-destination pairs communicating, in a pairwise manner, via R relaying nodes. The relay nodes wish to cooperate, through a decentralized beamforming algorithm, in order to establish all the communication links from each source to its respective destination. Our communication strategy consists of two steps. In the first step, all sources transmit their signals simultaneously. As a result, each relay receives a noisy faded mixture of all source signals. In the second step, each relay transmits an amplitude- and phase-adjusted version of its received signal. That is each relay multiply its received signal by a complex coefficient and retransmits the so-obtained signal. Our goal is to obtain these complex coefficients (beamforming weights) through minimization of the total relay transmit power while the signal-to-interference-plus-noise ratio (SINR) at the destinations are guaranteed to be above certain predefined thresholds. Although such a power minimization problem is not convex, we use semidefinite relaxation to turn this problem into a semidefinite programming (SDP) problem. Therefore, we can efficiently solve the SDP problem using interior point methods. Our numerical examples reveal that for high network data rates, our space division multiplexing scheme requires significantly less total relay transmit power compared to other orthogonal multiplexing schemes, such as time-division multiple access schemes.  相似文献   

12.
针对放大转发中继系统中转发信息易被窃听者截获的问题,提出了在中继节点处采用人工噪声辅助的安全波束成形方法。该方法以系统的安全速率最大化(SRM, secrecy rate maximization)为目标,在中继节点的总功率和单个天线功率受限情况下,联合设计最优的中继波束成形矩阵和人工噪声协方差矩阵。由于该SRM问题非凸,设计了双层优化算法,其中采用一维搜索解决外层优化问题,采用半定松弛及内点法解决内层优化问题。理论推导证明,内层优化问题总存在秩为1的最优解,即所采用的松弛技术是紧的。仿真结果表明所提的方法可以显著提高系统的安全性能。  相似文献   

13.
Power Allocation Schemes for Amplify-and-Forward MIMO-OFDM Relay Links   总被引:4,自引:0,他引:4  
We consider a two-hop MIMO-OFDM communication scheme with a source, an amplify-and-forward relay, and a destination. We examine the possibilities of power allocation (PA) over the subchannels in frequency and space domains to maximize the instantaneous rate of this link if channel state information at the transmitter (CSIT) is available. We consider two approaches: (i) separate optimization of the source or the relay PA with individual per node transmit power constraints and (ii) joint optimization of the source and the relay PA with joint transmit power constraint. We provide the optimal PA at the source (or the relay) with a node transmit power constraint that maximizes the instantaneous rate for a given relay (or source) PA. Furthermore, we show that repeating this separate optimization of the source and the relay PA alternately converges and improves the achievable rate of the considered link. Since the joint optimization of the source and the relay PA is analytically not tractable we use a high SNR approximation of the SNR at the destination. This approximation leads to rates which are quite tight to the optimum.  相似文献   

14.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

15.
This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO) broadcast wiretap system designs in slow fading channel environment. We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance. To overcome the complexity of this model, a novel optimization scheme using semiclosed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secu...  相似文献   

16.
Binyue Liu 《ETRI Journal》2014,36(4):625-634
This paper studies a dual‐hop multiple‐access relay network where two independent source nodes transmit information to a common destination node with the aid of multiple single‐antenna amplify‐and‐forward relays. Each relay node is subject to an individual power constraint. We focus on the design of distributed beamforming schemes for the relays to support the transmission rate requirements of the two sources. To this end, we first characterize the achievable rate region for this network via solving a sequence of corner point optimization problems proposed in this paper. We also develop several low‐complexity suboptimal schemes in closed form. Two inner bounds of the achievable rate region are theoretically shown to be approximately optimal in two special scenarios. Finally, numerical results demonstrate the effectiveness of our proposed approaches.  相似文献   

17.
In this paper, we consider multihop multiple access (MAC) and broadcast channels (BC) where communication takes place with the assistance of relays that amplify and forward (AF) their received signals. For a two-hop parallel AF relay MAC, assuming a sum power constraint across all relays we characterize optimal relay amplification factors and the resulting optimal rate regions. We find the maximum sum rate and the maximum rate for each user in closed form and express the optimal rate pair (R1, R2) that maximizes mu1R1+mu2R2 as the solution of a pair of simultaneous equations. We find that the parallel AF relay MAC with total transmit power of the two users P1+P2=P and total relay power PR is the dual of the parallel AF relay BC where the MAC source nodes become the BC destination nodes, the MAC destination node becomes the BC source node, the dual BC source transmit power is PR and the total transmit power of the AF relays is P. The duality means that the rate region of the AF relay MAC with a sum power constraint P on the transmitters is the same as that of the dual BC. The duality relationship is found to be useful in characterizing the rate region of the AF relay BC as the union of MAC rate regions. The duality is established for distributed multiple antenna AF relay nodes and multiple (more than 2) hops as well.  相似文献   

18.
针对多用户多中继场景下协作通信系统的中继选择问题,提出了一种基于混合智能算法的协作中继选择新方法。不同于现有的为每个源节点分配一个中继节点的中继选择方法,新方法建立了为每个源节点分配一个或多个中继节点的优化模型,以最大化多用户多中继协作系统的最小接收信噪比为优化目标,采用结合了模拟退火与遗传算法的混合智能算法来搜寻中继选择问题的最优解。仿真结果表明,所提方法可显著提高目的端的接收信噪比,且算法具有较强的全局搜索和快速寻优能力。  相似文献   

19.
研究了一种能量受限的非可信中继与多用户分集技术相结合的两跳链路安全网络通信模型。为提升系统安全性能,本文采用混合时间-功率分配中继(time-power splitting-based relaying, TPSR)协议,并结合机会调度策略(opportunistic scheduling strategy, OSS)从多用户分集网络中选择一个最佳目的节点作为信息接收端。基于随机选择(random selection, RS)策略,该文中利用低复杂度的高斯Q函数分析系统的安全性能以及在协作中继上进行能量采集活动不中断的条件下推导了系统的遍历安全速率(ergodic secrecy rate, ESR)的近似闭合表达式。此外,将提出的OSS与RS通信方案下性能进行对比,证明本文所提出的OSS更适用于分布式多用户选择网络。   相似文献   

20.
韩帅  王金明  孟维晓  徐赛  李静涛 《信号处理》2022,38(9):1872-1880
近些年来,人们一直在开发可重构智能表面(Reconfigurable Intelligent Surface,RIS),它是一种由许多无源反射器组成的低成本结构,可以自由地改变每个元素的反射系数,并重新配置无线传输环境以改变入射信号的传播。由于具有若干新型和独特的优势,RIS应用场景广泛,关于其在物理层安全中应用的研究蓬勃发展。与此同时,物理层安全研究中窃听者的信道状态信息(Channel State Information,CSI)一直是人们讨论的热点,实际通信场景中窃听CSI通常是不易获取或未知的。因此本文考虑了一个更接近现实的情况,即针对窃听CSI未知的场景,考虑存在一个合法接收者以及多个非法窃听者,从功率分配的角度出发,结合波束成形,设计一种多RIS辅助的人工噪声与功率分配方案,通过对基站波束成形矩阵和RIS反射系数的交替优化,并应用二分法,使得在合法接收用户信号质量不变的前提下,降低基站处发送保密信息至合法用户所需的功率,降低其接收信号的信干噪比,进而提高系统的保密容量。同时考虑到了多个RIS协作辅助保密通信不一定最优,并可能增加系统优化的复杂度,设计了多个RIS的选择方案,...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号