首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 140 毫秒
1.
该文研究节点具有能量收集能力的两跳中继系统的物理层安全传输方案。考虑窃听节点与源和中继节点间都有直接链路的情况。每个数据传输时隙分为能量收集和数据传输两个阶段,各节点用收集的能量发送信号。中继采用放大转发方式,目的节点发送人工噪声进行协作干扰,保护在两跳传输中传输的保密信息。以最大化保密速率为目标,采用迭代算法优化能量吸收和数据传输两阶段的时间分配比例系数和协作干扰功率分配因子。仿真结果表明优化算法准确,优化后的协作干扰方案能显著提高系统的保密传输速率。由于考虑了窃听节点在两跳传输中都能接收到信号的可能性,文中方案更贴近实际,并解决了一个复杂的优化问题。  相似文献   

2.
针对源节点和中继节点均采用收集能量供电的放大转发中继网络,考虑两个目的节点之间信息相互保密的场景,该文提出最大化长期时间平均保密速率的源节点和中继节点发送功率联合优化算法.由于能量到达和信道状态是随机过程,该问题是一个随机优化问题.利用Lyapunov优化框架将电池操作和能量使用约束下的长期优化问题转化为每时隙的"虚队列漂移加惩罚"最小化问题,并求解.仿真结果显示该文提出的算法在长期平均保密速率上相较于对比算法具有显著的优势,同时算法仅依赖于当前的电池状态和信道状态信息做出决策,是一种实用的、低复杂度的算法.  相似文献   

3.
本文针对两跳无线物联通信系统,对中继节点利用收集的能量采用功率分流法进行能量收集和信息传输算法进行了设计,其中算法设计是基于能效最大化的优化准则,能效函数定义为瞬时吞吐量与硬件电路总功耗的比值,中继节点利用源节点发送的信号进行能量收集,考虑EARTH计划中实际的功率转换效率和硬件电路损耗的功耗因子,推导了中继协同的无线物联系统能量收集和信息传输的最优功率分配方案的解析解,由于优化问题是非凸问题,为了解决该问题,本文利用高信噪比近似法并通过拉格朗日算法和Lambert W函数获得了优化问题的最优解,数值仿真验证了所提方案的正确性和有效性。   相似文献   

4.
针对源节点和中继节点均采用收集能量供电的放大转发中继网络,考虑两个目的节点之间信息相互保密的场景,该文提出最大化长期时间平均保密速率的源节点和中继节点发送功率联合优化算法。由于能量到达和信道状态是随机过程,该问题是一个随机优化问题。利用Lyapunov优化框架将电池操作和能量使用约束下的长期优化问题转化为每时隙的“虚队列漂移加惩罚”最小化问题,并求解。仿真结果显示该文提出的算法在长期平均保密速率上相较于对比算法具有显著的优势,同时算法仅依赖于当前的电池状态和信道状态信息做出决策,是一种实用的、低复杂度的算法。  相似文献   

5.
杨炜伟  陈剑  陈德川 《电子学报》2019,47(8):1792-1796
射频能量采集技术为能量受限无线通信系统提供了一种有效的能量供给方式.假设能量受限中继节点具有射频能量采集能力,本文设计了中继非可信情况下的物理层安全传输方案,配置多天线的源节点采用发送天线选择策略来增强中继节点的能量采集性能,目的节点发送人工干扰来抑制非可信中继对保密信息的窃听.在瑞利块衰落信道条件下研究了所提方案的物理层安全性能,推导了系统安全中断概率、连接中断概率和安全吞吐量的闭式表达式.计算机仿真验证了理论推导的正确性,揭示了各系统参数对物理层安全性能的影响关系.  相似文献   

6.
雷维嘉  王娟兵  谢显中 《电子学报》2018,46(12):2878-2887
研究大规模多输入多输出中继网络中的多用户物理层安全传输方案.系统模型中假设窃听节点与源节点和中继节点间都有直接链路,窃听节点可以接收到源节点和中继发送的信号.在不能获得窃听者信道状态信息的情况下,大规模MIMO中继采用简单的最大比合并/最大比发射信号处理方案,并配合中继零空间人工噪声和目的端的协作干扰实现多用户的信息安全传输.对保密速率及其在中继天线数无限增长时的渐近值进行了理论分析,并进行仿真.仿真结果显示系统的保密和速率随中继天线数的增长而增长,最终趋于理论渐近上界值.仿真结果也表明即使窃听节点具有多用户间干扰消除能力,并能同时拦截源节点和中继发送的信号,采用本文的方案仍然能获得可观保密速率.  相似文献   

7.
针对非信任双向中继网络的能量受限和信息安全问题,该文提出一种基于无线携能通信(SWIPT)与人工噪声辅助的物理层安全传输方案。该方案中的非信任中继采用功率分割(PS)策略辅助合法用户进行保密通信,而全双工干扰机在进行能量采集的同时发送人工噪声以确保系统安全。以最大化系统保密性能为目标,优化了中继的PS因子,推导了保密和速率的解析式及高信噪比条件下最佳PS因子的闭式解。特别针对非理想信道状态信息的情况,分析了信道估计误差对系统保密性能的影响。仿真结果验证了理论推导的正确性,并证明了所提的基于PS策略的干扰机协同传输方案相比采用时间切换(TS)策略或目的节点协同干扰的方案具有更优的保密性能。  相似文献   

8.
本文研究了高斯MISO窃听信道的可达保密速率问题.系统模型包括一个发送者,一个接收者和一个窃听者.发送者将发送功率分成两部分,一部分功率发送信号,一部分功率发送人工干扰信号.推导出了采用人工干扰时的系统可达保密速率公式,并通过优化信号功率和噪声功率的比例,最大化可达保密速率.仿真结果验证了本文提出的人工干扰策略的有效性.  相似文献   

9.
针对传统中继协作网络传感器节点能量受限导致信息传输延迟较高的问题,将短包通信(SPC)和能量收集技术相结合,构建了一种双跳中继无线传感器网络模型。网络中源节点和中继均需从专用能量基站收集射频信号能量以保证信息的持续传输,中继采用半双工解码转发协议将源节点发送的状态更新信息以短包形式传递到目的节点,利用中继选择策略与最大比合并技术提出了基于时效性的最早部分中继选择方案。考虑该网络信息的新鲜度,首先,分析了SPC传输性能,推导了中继和目的节点处的平均包错误率。其次,利用顺序统计量描述了源节点到中继端数据包的重传次数,基于更新过程理论推导了网络的平均信息年龄(AoI)表达式,并采用梯度下降方法优化了影响网络平均AoI的部分参数。最后,仿真分析结果表明,优化中继数量和数据包长度可以有效提高网络信息新鲜度,同时,通过对比优化部分参数得到的最优值与贪婪方法得到的最小化平均AoI理论值,可以验证部分中继协作方案在双跳状态更新网络中的可行性。   相似文献   

10.
雷维嘉  周洋 《电子学报》2020,48(6):1041-1051
研究多入多出(Multiple Input Multiple Output,MIMO)同时同频全双工双向通信系统中,合法节点在接收信息的同时向对方发送保密信息,并发送零空间人工噪声干扰窃听节点的物理层安全方案的优化问题.针对窃听信道状态信息仅统计分布已知,且存在残余自干扰的情况,首先推导出系统平均保密和速率的闭合表达式,进一步给出其下界.在此基础上,以最大化系统该下界为目标,对两节点的信息信号与人工噪声的功率分配因子、信息信号的功率分配矩阵进行联合优化.采用迭代的方法进行优化,每轮迭代中,先固定前者,优化后者,再固定后者,优化前者.使用DC(Difference of Concave/Convex,DC)规划优化信息信号功率分配矩阵,使用遗传算法优化信息信号与人工噪声的功率分配因子.对所提方案进行了仿真验证,证明理论推导正确,优化算法能有效地提高系统的平均保密和速率.  相似文献   

11.
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.  相似文献   

12.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

13.
In this paper, a scheme that exploits cooperative diversity of multiple relays to provide physical layer security against an eavesdropping attack is concerned. Relay‐based cognitive radio network (CRN) faces issues multiple issues other than the same as faced by conventional wireless communications. If the nodes in a CRN are able to harvest energy and then spend less energy than the total energy available, we can ensure a perpetual lifetime for the network. In this paper, an energy‐constrained CRN is considered where relay nodes are able to harvest energy. A cooperative diversity‐based relay and subchannel‐selection algorithm is proposed, which selects a relay and a subchannel to achieve the maximum secrecy rate while keeping the energy consumed under a certain limit. A transmission power factor is also selected by the algorithm, which ensures long‐term operation of the network. The power allocation problem at the selected relay and at the source also satisfies the maximum‐interference constraint with the primary user (PU). The proposed scheme is compared with a variant of the proposed scheme where the relays are assumed to have an infinite battery capacity (so maximum transmission power is available in every time slot) and is compared with a scheme that uses jamming for physical layer security. The simulation results show that the infinite battery‐capacity scheme outperforms the jamming‐based physical layer security scheme, thus validating that cooperative diversity‐based schemes are suitable to use when channel conditions are better employed, instead of jamming for physical layer security.  相似文献   

14.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

15.
In this paper, we investigate the problem of secure communication for a scenario, which consists of one pair of source‐destination nodes and one untrusted relay. The source communicates with the destination via the help of energy harvesting–aware untrusted relay, which acts as the helper to forward the source information to the destination; however, the relay also acts as the unintended user to eavesdrop the source information. To keep the source information confidential from untrusted relay, the destination‐assisted jamming technique is deployed. We evaluate the impact of energy harvesting protocols on such a secure communication scenario through the proposed energy transfer protocols, namely, source‐based energy harvesting protocol and maximum energy harvesting protocol. To evaluate the secrecy performance of these proposed schemes, we derive analytical expressions for two important performance metrics including intercept probability and strictly positive secrecy capacity. The numerical analysis reveals the different trade‐off between secure performance and relevant system parameters (i.e., power splitting ratio, time switching ratio, energy conversion efficiency, transmit signal‐to‐noise ratio, and relay location). Simulation results are also provided to demonstrate the accuracy of the developed analytical expression.  相似文献   

16.
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work.  相似文献   

17.
In this paper, the secrecy performance and power allocation of the signal‐to‐noise ratio‐based hybrid decode–amplify–forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obtained for the relay close‐to‐destination case and minimum for the relay close‐to‐eavesdropper case. Jamming schemes are superior in secrecy rate performance than without jamming schemes. To enhance the secrecy rate further with the optimized relay and jammer powers, invasive weed optimization (IWO) algorithm‐based power allocation is proposed. Here, maximizing the secrecy rate is defined as the cost function for the proposed IWO algorithm‐based power allocation. Comparative study is done over the conventional equal and proposed power allocation schemes for validation. The proposed power allocation scheme proved to be superior. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

18.
This article studies a secure communication of a simultaneous wireless information and power transfer system in which an energy-constrained untrusted relay, which harvests energy from the wireless signals, helps the communication between the source and destination and is able to decode the source’s confidential signal. Additionally, the source’s confidential signal is also overheard by a passive eavesdropper. To create positive secrecy capacity, a destination-assisted jamming signal that is completely cancelled at the destination is adopted. Moreover, the jamming signal is also exploited as an additional energy source. To evaluate the secrecy performance, analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity are derived. Moreover, a high-power approximation for the SOP is presented. The accuracy of the analytical results is verified by Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as the energy-harvesting efficiency, secrecy rate threshold, power-splitting ratio, transmit powers, and locations of the relay and eavesdropper, on the secrecy performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号