首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

2.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

3.
A communication network that consists of a transmitter, a legitimate receiver, an eavesdropper and several friendly helpers is considered. Both the transmitter and the helpers are equipped with multiple antennas while the legitimate receiver or the eavesdropper has one antenna. The transmitter and the helpers have the channel state information to the legitimate receiver. The channels to the eavesdropper are partially known and modeled with uncertainty ellipsoids. The transmitter applies maximum ratio transmission to the legitimate receiver. The helpers generate interference to degrade the receiving performance of the eavesdropper. The transmit power of the helpers is optimized with the worst-case secrecy rate requirement as the Quality of Service constraint. Based on robust convex optimization, a centralized optimization problem is developed for the helpers to generate interference efficiently with minimum total transmit power. A distributed algorithm is developed which scales well with a large number of helpers.  相似文献   

4.
针对由一个发射者、一个合法接收者和一个非法接收者组成的单用户多输入多输出(MIMO,Multiple Input Multiple Output)窃听信道,研究了未知非法接收者任何信息的前提下,实现可信通信的人为干扰机制,给出了设计人为干扰的两种方式和高效的预编码算法。该算法增强了信号传播的方向性,同时最大化了人为干扰对非法接收者的影响。仿真结果表明,采用该算法的人为干扰在满足合法接收者所要求的最低信干噪声比(SINR,Signal to Interference Plus Noise Ratio)的同时,极大地降低了非法接收者的SINR。  相似文献   

5.
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal. The proposed scenario can be viable for a secondary safety task force working with a primary regiment, which wishes to transmit the confidential information to the commander while an eavesdropper is trying to intercept the classified information. In the analysis, two novel power allocation methods are considered by assuming perfect and limited feedback channels of the primary network, and for both methods, exact and asymptotic expressions of secrecy outage probability (SOP) are derived for N*Nakagami‐m fading channels which are used to model fading channels such as mobile‐to‐mobile/vehicle‐to‐vehicle communication systems where the nodes are moving into a rich scattering environment. We further verified our analytic results through Monte‐Carlo simulations. It is shown from the numerical results that the cascading degree of the channels has a worsening effect on the secrecy outage performance of the CRN systems.  相似文献   

6.
该文在同频全双工技术快速发展的背景下,针对物理层安全研究中波束成形技术的高复杂度和发端天线选择(TAS)技术的低性能,提出一种联合发端天线选择和收端人工噪声(AN)的物理层安全传输方法TAS-rAN。首先,有多根天线的发端,利用天线选择技术,选取能使合法接收方接收信噪比最大的天线发送保密消息;其次,有同频全双工能力的收端,在接收到消息的同时,发送人工噪声来扰乱窃听方对保密消息的窃听。在Nakagami-m信道下,推导了安全中断概率的闭合表达式,并基于此,得到非零安全容量的概率表达式;通过渐进安全中断概率的推导,得到TAS-rAN方法的安全分集度。仿真结果表明,与已有的TAS-single和TAS-Alamouti方法相比,TAS-rAN安全方法具有较强的稳定性,且能提供更优的安全性能。  相似文献   

7.
Cognitive radio network is an emerging solution to deal with spectrum scarcity and to utilize the radio spectrum in opportunistic and efficient manner. Secure data transmission is one of the important issues in these kind of networks. This work studies the secrecy outage performance of a multiple-input multiple-output underlay cognitive wiretap radio network system over Rayleigh fading channel with delayed channel state information. This work considers that the secondary transmitter is equipped with multiple antennas and confidential information is transmitted from to multiantenna receiver in the presence of multiantenna eavesdropper. Further, the transmit antenna selection scheme is considered at secondary transmitter to reduce the complexity of antenna selection and to make it more practicable. To improve the quality of signal, this work considers maximal ratio combining (MRC) at secondary receiver, while selection combining and MRC techniques are utilized at the eavesdropper. The closed form expression for exact, asymptotic, and intercept secrecy outage probability has been derived, and the simulation is done for the validation of analytical results. The derived results reveal deterioration of channel secrecy performance with outdated channel state information, and the eavesdropper with outdated channel state information has also an adverse effect. Moreover, the diversity order that can be achieved in underlay cognitive radio network with outdated channel state information is unity.  相似文献   

8.
常玉晴  芮贤义 《信号处理》2020,36(10):1784-1788
在无线通信系统的实际传输中,当窃听用户距离合法接受者足够近,或者位于合法接收机信号的无线电波路径上时,就会出现主信道与窃听信道相关的场景。为此我们考虑一个多输入单输出,并且存在单天线被动窃听者的无线通信系统,研究了当基站采用最大比技术发射技术发送信号时,相关对系统性能的影响。推导了安全中断概率与平均安全容量的闭合表达式。数值仿真结果表明:(1)当主信道的信道质量高于窃听信道时,较低的相关对系统安全中断概率性能影响不大,然而强相关却能够带来更低的安全中断概率;(2)该相关对系统平均安全容量始终是有害的,且随着相关程度的增强,最大比发射技术相对于天线选择的优势逐渐变小。   相似文献   

9.
This correspondence presents a signal processing based alternate approach for simulating the flat fading narrowband wireless channels for the antenna array receivers under the time-varying environment, in which the discrete disk of scatterers is incorporated around the mobile wireless transmitter to model the spreading of azimuth. The disk-type cluster of scatterers continuously changes due to the movement of the mobile wireless transmitter. Under this time-varying environment, each scatterer, at the successive stages of the disk, is correlated with the scatterers at the preceding stages of the disk using the second-order autoregressive process AR(2). At the receiver, one signal waveform is associated with each element of the antenna array taking into account the spread in azimuth of the received signal. The correlation of the fading waveforms generated by using the presented paradigm is compared with the expected analytical correlation results, which clearly manifests that the simulation results are consistent with the findings based on Jakes’ model. Moreover, the presented discrete disk-type cluster of scatterers fading model may be used to generate/simulate the variable diameter ring-type cluster of scatterers fading paradigm. The proposed channel model may play a significant role in the emerging field of wireless signal processing for the latest mobile communication systems.  相似文献   

10.

This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model alternately the multicast/ eavesdropper and eavesdropper/ multicast channels as such mixed fading scenarios are often encountered in cellular communication where only one link (either multicast or eavesdropper) undergo a line-of-sight propagation path. At first, we derive the probability density functions for the single-input-multiple-output multicast scenarios and then the secrecy analysis is carried out by obtaining closed-form expressions for the performance matrices such as the probability of non-zero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting. The derived expressions are beneficial to investigate how the antenna diversity can combat the detrimental impact of fading as well as the number of multicast users and eavesdroppers, and improve the secrecy level to the acceptable limit. Moreover, the best secure scenario in terms of the secrecy parameters is obtained when the multicast channels undergo Rician fading whereas the eavesdropper channels experience Rayleigh fading. Finally, the analytical expressions are justified via the Monte-Carlo simulations.

  相似文献   

11.
System capacity and antenna placement play crucial roles in wireless communication systems, and they are of great value to network planning. In this paper, we are motivated to analyze the system capacity and optimize the antenna placement in distributed antenna systems. This paper establishes a composite channel model which takes path loss, lognormal shadowing and Rayleigh fading into consideration. To reduce the computational complexity, an approximate theoretical expression of system capacity is derived with selective transmission at the transmitter and maximal ratio combining at the receiver. An antenna placement optimization problem is formulated, and then a genetic algorithm (GA) based searching scheme is proposed to solve the proposed optimization problem. The computational complexity analysis indicates that the proposed GA-based searching scheme is computationally efficient in terms of both running time and storage space. Numerical results show that the approximate theoretical expression of system capacity can provide a very good approximation to the simulation results, and the proposed GA-based searching scheme for solving the antenna placement optimization problem can consistently offer a large capacity gain over other existing schemes.  相似文献   

12.
针对多用户MIMO窃听信道,提出了在未知非法接收者任何信息的前提下,实现可信通信的基于消息块的人为干扰和预编码算法,并且在实现可信通信"可信性"的同时,考虑了"有效性"和"效率"问题。人为干扰仅干扰非法接收者,而不对合法接收者产生任何影响。预编码算法是已有的用于消除多用户干扰的"迫零"方式与基于SVD分解的线性预编码方式的结合。与基于单消息符号的预编码方式相比,提高了可信通信的效率。仿真结果表明,其进一步降低了非法接收者的SINR,并提高了多用户MIMO系统的通信容量。  相似文献   

13.
In this paper we consider the use of multiple antennas for wireless communication over fading channels.The fading we consider is quasi-static flat Rayleigh fading. For such a scenario optimal SNR schemes are derived when the transmitter knows the channel and when the transmitter does not know the channel. But in both cases the receiver has to estimate the channel. When the SNR during channel estimation is reasonably high we derive expressions to show the impact of channel estimation errors on SNR.  相似文献   

14.
Vehicular communications are receiving considerable attention due to the introduction of the intelligent transportation system (ITS) concept, enabling smart and intelligent driving technologies and applications. To design, evaluate and optimize ITS applications and services oriented to improve vehicular safety, but also non-safety applications based on wireless systems, the knowledge of the propagation channel is vital. In particular, the mean path loss is one of the most important parameters used in the link budget, being a measure of the channel quality and limiting the maximum allowed distance between the transmitter (Tx) and the receiver (Rx). From a narrowband vehicular-to-vehicular (V2V) channel measurement campaign carried out at 5.9 GHz in three different urban environments characterized by high traffic density, this paper analyzes the path loss in terms of the Tx-Rx separation distance and fading statistics. Based on a linear slope model, values for the path loss exponent and the standard deviation of shadowing are reported. We have evaluated the packet error rate (PER) and the maximum achievable Tx-Rx separation distance for a PER threshold level of 10 % according to the digital short-range communications (DSRC) specifications. The results reported here can be incorporated in an easy way to vehicular networks (VANETs) simulators in order to develop, evaluate and validate new protocols and systems architecture configurations under realistic propagation conditions.  相似文献   

15.
Mobile‐to‐mobile (M‐to‐M) communications are expected to play a crucial role in future wireless systems and networks. In this paper, we consider M‐to‐M multiple‐input multiple‐output (MIMO) maximal ratio combining system and assess its performance in spatially correlated channels. The analysis assumes double‐correlated Rayleigh‐and‐Lognormal fading channels and is performed in terms of average symbol error probability, outage probability, and ergodic capacity. To obtain the receive and transmit spatial correlation functions needed for the performance analysis, we used a three‐dimensional (3D) M‐to‐M MIMO channel model, which takes into account the effects of fast fading and shadowing. The expressions for the considered metrics are derived as a function of the average signal‐to‐noise ratio per receive antenna in closed‐form and are further approximated using the recursive adaptive Simpson quadrature method. Numerical results are provided to show the effects of system parameters, such as distance between antenna elements, maximum elevation angle of scatterers, orientation angle of antenna array in the xy plane, angle between the xy plane and the antenna array orientation, and degree of scattering in the xy plane, on the system performance. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

16.
A channel‐estimate‐based frequency‐domain equalization (CE‐FDE) scheme for wireless broadband single‐carrier communications over time‐varying frequency‐selective fading channels is proposed. Adaptive updating of the FDE coefficients are based on the timely estimate of channel impulse response (CIR) to avoid error propagation that is a major source of performance degradation in adaptive equalizers using least mean square (LMS) or recursive least square (RLS) algorithms. Various time‐domain and frequency‐domain techniques for initial channel estimation and adaptive updating are discussed and evaluated in terms of performance and complexity. Performance of uncoded and coded systems using the proposed CE‐FDE with diversity combining in different time‐varying, multi‐path fading channels is evaluated. Analytical and simulation results show the good performance of the proposed scheme suitable for broadband wireless communications. For channels with high‐Doppler frequency, diversity combining substantially improves the system performance. For channels with sparse multi‐path propagation, a tap‐selection strategy used with the CE‐FDE systems can significantly reduce the complexity without sacrificing the performance. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

17.
Joint antenna selection and link adaptation for MIMO systems   总被引:4,自引:0,他引:4  
Multi-input multi-output (MIMO) systems, with multiple antennas at both the transmitter and the receiver, are anticipated to be widely employed in future wireless networks due to their predicted tremendous system capacity. To protect the transmitted data against random channel impairment, it is desirable to consider link adaptation, such as rate adaptation and power control, to improve the system performance and guarantee certain quality of service. Based on the observation that link adaptation and antenna selection problems are often coupled, we propose a joint antenna subset selection and link adaptation study for MIMO systems. After the formulation of the multidimensional joint optimization problem, the main contribution of this paper lies in the design of efficient algorithms approaching the optimal solution for both uncorrelated and correlated MIMO channels. Specifically, we propose one simplified antenna selection and link adaptation rule based on the expected optimal number of active antennas for uncorrelated MIMO with Rayleigh fading and one for correlated MIMO channels only based on the slowly varying channel correlation information. Our proposed algorithms are verified through numerical results, demonstrating significant gains over traditional MIMO signaling, while feasible for practical implementation.  相似文献   

18.
Secure communications in a multiple input multiple output (MIMO) system in which the eavesdropper's channel is inherently superior to that of the legitimate receiver is described. Both the legitimate receiver and the eavesdropper are assumed to have equal knowledge and comparable computational capabilities and there is no "secret key" known only to the legitimate receiver. The combination of artificial noise added at the transmitter, parallelization of the legitimate channel using the singular value decomposition, and low density parity check (LDPC) codes can overcome the superiority of the eavesdropper's channel and enable secure communications. The effectiveness of the method is greater for larger numbers of antennas and larger modulation constellations.  相似文献   

19.
Multiple‐input multiple‐output (MIMO) transmission techniques constitute an important technology in modern wireless communication. Hence, performance analysis methods for such systems are of considerable interest. This paper considers first the average pairwise error probability for uncoded MIMO systems employing maximum likelihood detection over a composite Rayleigh‐Lognormal fading channel with spatial correlation. It provides general results, applicable also to a wider class of shadowing models, concerning asymptotical diversity gains and shows that they are not changed by such shadowing. Then, analytical evaluation techniques for bit‐error‐rate (BER) over composite Rayleigh‐Lognormal fading channels, based on the truncated union bound and the transfer function, are considered. Furthermore, these techniques are modified for applications over spatially correlated channels. This paper shows that such performance evaluation techniques provide good approximations to BER of spatially uncorrelated MIMO systems and also in the presence of moderate spatial correlation, over Rayleigh‐Lognormal fading channels. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

20.
Transmitter precoding in synchronous multiuser communications   总被引:1,自引:0,他引:1  
A synchronous multiuser system operating in an additive white Gaussian noise channel, with or without multipath fading, is considered. It is shown that when either a conventional single user receiver or the RAKE receiver is employed, both multiple access and intersymbol interference can be eliminated by means of a suitable transmitter precoding scheme. Transmitter precoding represents a linear transformation of transmitted signals, such that the mean squared errors at all receivers are minimized. Precoding, with both conventional single user receiver and with the RAKE receiver, results in near-far resistant performance and outperforms considerably the respective schemes without precoding. The crucial assumption, in the multipath case, is that the transmitter knows the multipath characteristics of all channels and that channel dynamics are sufficiently slow so that multipath profiles remain essentially constant over the block of precoded bits  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号