首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 175 毫秒
1.
杨键泉  贺玉成  马梦欢  周林 《信号处理》2021,37(9):1719-1726
本文把非正交多址接入(NOMA)技术与认知网络相结合,提出了一种基于多中继选择的认知NOMA网络模型。考虑了在瑞利衰落信道下,主网络借助次级网络中的全双工中继实现可靠通信,作为回报,次级网络允许接入授权频谱来传输次级信号。中继同时接收主次信号后,采用串行干扰消除技术(SIC)依次解码主次信号,并根据NOMA协议转发信号到主次用户端。推导了在两种中继选择策略下认知NOMA网络中断概率,并通过了蒙特卡罗仿真验证。仿真结果表明,两阶段中继选择策略和全双工技术能有效提高系统中断性能。   相似文献   

2.
研究了瑞利衰落信道下协作非正交多址系统的安全性能。通信过程由一个时隙构成,源节点向中继广播叠加信号,全双工中继使用串行干扰消除技术解码信号协助用户通信。假设存在潜在全双工主动窃听者,窃听者能够从中继处截获信息并同时向用户发送人工噪声进行干扰。基于上述假设,在高信噪比条件下,推导了安全中断概率的近似表达式,分析了各节点传输信噪比与功率分配因子对系统中断概率的影响,分析结果与蒙特卡洛仿真结果吻合。  相似文献   

3.
吴舒婷  贺玉成  张良梅  周林 《信号处理》2022,38(5):1001-1008
该文研究了D2D辅助的协作中继NOMA(DC-NOMA)网络,在中继用户(RU)转发信息的第二时隙,利用RU到蜂窝中心用户(CCU)的D2D通信链路传输新的信号。为了提高传输可靠性,设计了新的信号检测策略,通过完全利用边缘信息消除了用户间的干扰。基于新的信号检测策略,提出了一种两阶段中继选择策略(TSRS)。在满足蜂窝边缘用户(CEU)可靠接收的中继集合中,选择使CCU成功解码概率最大的中继。为了评估所提出的DC-NOMA方案,推导了每个用户的确切中断概率且通过仿真得到验证。仿真结果表明,在高信噪比区域,该文所提出的基于新的信号检测策略的DC-NOMA在TSRS方案下的中断性能优于部分中继选择方案(PRSS)和传统的DC-NOMA。特别地,增大中继数量可有效提高DC-NOMA系统的中断性能。   相似文献   

4.
在存在一个半双工自适应窃听者的通信模型中,分析了采用非正交多址(Non-orthogonal Multiple Access,NOMA)技术合作系统的性能。提出了一种新型的合作NOMA方案,该方案在中继转发时,强用户可充当中继协助转发弱用户信号,而弱用户采用全双工技术向窃听者发送干扰信号,提高了通信链路的安全性和用户的服务质量。合法接收端采用连续干扰消除(SIC)技术,以解码来自叠加信号的各个消息。在已知窃听信道统计信道状态信息(CSI)的情况下,分别推导了2个用户的安全中断概率和中断概率的闭合表达式,并通过Monte-Carlo仿真验证。理论分析和数值模拟结果均表明所提出的NOMA用户合作方案在保密率方面优于非合作方案的性能。  相似文献   

5.
针对采用无线携能传输(SWIPT)的多中继协作底层认知NOMA网络,提出一种基于NOMA和串行干扰消除协议的两阶段中继选择策略(TSRS).在保护主用户的干扰温度限约束下,次级网络源节点和最优中继均以固定功率分配生成多用户叠加信号向下一跳链路发送,最优中继采用功率分割方案采集能量,只利用从第一跳链路采集到的能量提供解码...  相似文献   

6.
随着非正交多址接入(Non-Orthogonal Multiple Access, NOMA)技术的不断发展,协作NOMA (Cooperative Non-Orthogonal Multiple Access, CNOMA)也受到广泛关注.该文研究了由一个基站(Base Station, BS)、一个远端用户和一个近端用户组成的全双工(Full-Duplex, FD)协作NOMA (FD-CNOMA)系统,其中近端用户作为一个FD解码转发中继以传输远端用户的信号.考虑实际情况中存在基站与远端用户有无直接链路两种情况,以及非理想连续干扰消除(Successive Interference Cancellation, SIC)对系统带来的残留干扰问题,该文提出并解决了在该模型下用户的功率分配问题.最后,该文基于此模型给出了中继用户和远端用户的中断概率闭式表达式和遍历速率的近似闭式表达式.理论分析与仿真结果表明,即便存在非理想SIC和自干扰,相对于半双工(Half-Duplex, HD)协作NOMA(HDCNOMA)和NOMA系统而言,FD-CNOMA系统表现出更好的系统性能.同时,非理想...  相似文献   

7.
本文研究了中继选择方案对协作下认知非正交多址(CR-NOMA)网络中断性能的影响,提出了一种两级中继选择方案。第一时隙在保证主用户服务质量的基础上,次级网络源节点向认知中继集群广播叠加信号。第二时隙认知中继提供解码转发服务,协助源节点传输信息。基于上述假设,推导了次级用户中断概率的闭合表达式并给出了分析结果。证明相比于部分中继选择策略,两级中继选择策略可以达到更好的中断性能和更大的分集增益。同时本文的分析结果验证了备选中继节点数目和功率分配因子对系统中断性能的影响,蒙特卡罗仿真验证了理论结果。   相似文献   

8.
针对下行双用户NOMA (Non-Orthogonal Multiple Access)系统模型中存在智能窃听者,该窃听者可以自适应地选择被动窃听或主动干扰工作模式,在不精确了解其干扰水平的情况下,部分NOMA用户很有可能遭遇传输质量下降乃至保密中断,这将对信息安全传输构成严重威胁。另外,由于信道衰落,用户的位置对系统整体性能有很大影响,难以保证距离源节点较远用户的传输质量。为解决上述问题,本文提出了一种新型的两阶段用户协作方案。第一阶段,远用户采用全双工(full-duplex,FD)干扰智能窃听者,第二阶段,近用户可作为一个中继协助源节点转发远用户信号信息,并在接收端采用串行干扰消除(Successive Interference Cancellation, SIC)技术进行解码。使用户间达成合作,提高通信链路安全性和用户服务质量。考虑到系统中不同用户的信息接收速率与通信需求不同之间的相关性,分别推导了遍历安全容量和遍历容量的解析表达式,同时分析了功率分配因子和用户间协作发射功率等因素对性能的影响,并通过Monte-Carlo仿真验证了其正确性。   相似文献   

9.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

10.
蔡静  贺玉成  乔宇航  周林 《信号处理》2019,35(12):2029-2035
把非正交多址接入(NOMA)技术应用到认知网络中,提出基于中继协作的底层认知NOMA系统模型。在瑞利衰落信道下,考虑一个两跳的通信网络,认知中继同时接收来自主网络发射源和次网络发射源的信号,并采用串行干扰消除策略解码转发接收到的信号。次级网络通过为主网络提供中继解码转发服务,获得接入授权频段的机会;主网络通过贡献出授权频段,换取次级网络协作通信的机会,同时获得了优先解码权,保证了主网络通信的可靠性。推导了系统各个接收端的中断概率闭合表达式,并进行了MATLAB仿真。仿真结果表明:采用中继协作可以有效提升认知NOMA网络的中断概率性能。   相似文献   

11.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

12.
In this paper, we consider non-orthogonal multiple access (NOMA) for wireless ad hoc networks over block fading channels where the performance is limited by interference and fading. In order to provide a reasonable performance, we can use re-transmission and interference cancellation techniques. Re-transmission techniques can provide a diversity gain over fading channels, while the successive interference cancellation (SIC) can improve the signal to interference ratio (SIR). Using the information outage probability, we show that the NOMA approach with re-transmissions can perform better than the orthogonal multiple access (OMA) approach with re-transmissions when the signal to noise ratio (SNR) is low. It is also shown that the outage probability of the NOMA with SIC is lower than that of OMA when the rate is sufficiently low where SIC can be facilitated.  相似文献   

13.
Wang  Heng  Wei  Xinyu  Li  Min 《Wireless Personal Communications》2017,97(2):2097-2130

This work proposes a non-orthogonal selection cooperation scheme with interference for multi-source and single destination cooperative networks. In our model, the source nodes can cooperate for one another, i.e., each source node plays the dual role of a source and a relay, thus there is no need for relays. In addition, the source nodes can be continuously transmitted and without dedicated timeslots for cooperative transmissions, which can save system resources and improve spectral efficiency. However, by this way, it will introduce interference with the non-orthogonal transmission mechanism. To overcome this problem, we use general reception scheme in source nodes and successive interference cancellation technology in the destination node, which can reduce the effect of interference effectively. For interference-limited networks, we also derive the theoretical upper bound and lower bound of outage probability of our method. Through the outage probability analysis and comparison, the results show that the spectral efficiency is improved while the system still keeps acceptable transmission reliability.

  相似文献   

14.
This paper analyzes the performance of a cooperative nonorthogonal multiple access (NOMA) in an underlay cognitive radio network aided by an energy harvesting relay. A secondary source transmits signal for two users, where a near user acts as a relay for the far user. The far user applies the selection combining (SC) approach on the signals which were relayed by the near user and received via direct path from the secondary source. We analytically derive the outage probability (OP) of each user separately, the overall system OP, and the throughput of the system. The impact of the power allocation coefficient of NOMA and energy harvesting parameters on outage is indicated. Further, the performance of the network is investigated with imperfection in successive interference cancellation (SIC), maximal ratio combining (MRC) at relay, and Nakagami-m fading. The results derived analytically are supported by simulation in MATLAB.  相似文献   

15.
Non-orthogonal multiple (NOMA) access using successive interference cancellation and cognitive radio are two promising techniques for enhancing the spectrum efficiency and utilization for future wireless communication systems. This paper presents a NOMA-based cooperative hybrid spectrum sharing protocol for cognitive radio networks. A two phase decode-and- forward (DF) relaying scheme in a multi-relay scenario is considered. Each secondary transmitter is grouped into one of the two clusters: a non-cooperative cluster (NCC) and a cooperative cluster (CC). The cluster head (CH) of the CC working as the best DF relay for the primary system is permitted to transmit its own signal superimposed on the primary signal using a NOMA approach in exchange for cooperation. On the other hand, the CH of the NCC transmits in parallel with the primary system satisfying a predefined peak transmit power and peak interference power constraints that guarantee a given primary quality of the service requirement. It is demonstrated that the performances of both the primary and secondary systems increase with the increasing number of secondary nodes. The simulation and theoretical results affirm the efficacy of the proposed protocol compared to the traditional overlay and underlay models in terms of the outage probability and the ergodic capacity.  相似文献   

16.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号