首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 156 毫秒
1.
本文研究了高斯MISO窃听信道的可达保密速率问题.系统模型包括一个发送者,一个接收者和一个窃听者.发送者将发送功率分成两部分,一部分功率发送信号,一部分功率发送人工干扰信号.推导出了采用人工干扰时的系统可达保密速率公式,并通过优化信号功率和噪声功率的比例,最大化可达保密速率.仿真结果验证了本文提出的人工干扰策略的有效性.  相似文献   

2.
该文研究节点具有能量收集能力的两跳中继系统的物理层安全传输方案。考虑窃听节点与源和中继节点间都有直接链路的情况。每个数据传输时隙分为能量收集和数据传输两个阶段,各节点用收集的能量发送信号。中继采用放大转发方式,目的节点发送人工噪声进行协作干扰,保护在两跳传输中传输的保密信息。以最大化保密速率为目标,采用迭代算法优化能量吸收和数据传输两阶段的时间分配比例系数和协作干扰功率分配因子。仿真结果表明优化算法准确,优化后的协作干扰方案能显著提高系统的保密传输速率。由于考虑了窃听节点在两跳传输中都能接收到信号的可能性,文中方案更贴近实际,并解决了一个复杂的优化问题。  相似文献   

3.
研究节点具备能量收集能力的中继窃听信道保密速率的优化问题,提出一种基于人工噪声协同干扰和节点间能量协同的物理层安全传输策略.各节点采用储能-发送模式工作,即先收集能量,再用于数据传输.中继节点采用放大转发方式,目的节点发送人工噪声进行协同干扰.由于中继节点所需功耗较高,目的节点将用于发送干扰之外的剩余能量转移给中继节点.给出以最大化保密速率为目标函数,优化能量吸收时间比例系数和干扰功率分配因子的两步优化算法.仿真结果表明人工噪声和能量协同的引入能有效提高系统的保密传输速率.  相似文献   

4.
雷维嘉  王娟兵  谢显中 《电子学报》2018,46(12):2878-2887
研究大规模多输入多输出中继网络中的多用户物理层安全传输方案.系统模型中假设窃听节点与源节点和中继节点间都有直接链路,窃听节点可以接收到源节点和中继发送的信号.在不能获得窃听者信道状态信息的情况下,大规模MIMO中继采用简单的最大比合并/最大比发射信号处理方案,并配合中继零空间人工噪声和目的端的协作干扰实现多用户的信息安全传输.对保密速率及其在中继天线数无限增长时的渐近值进行了理论分析,并进行仿真.仿真结果显示系统的保密和速率随中继天线数的增长而增长,最终趋于理论渐近上界值.仿真结果也表明即使窃听节点具有多用户间干扰消除能力,并能同时拦截源节点和中继发送的信号,采用本文的方案仍然能获得可观保密速率.  相似文献   

5.
张海洋  王保云  邓志祥 《信号处理》2013,29(8):1064-1070
为了提高MIMO窃听信道的可达安全速率,提出了基于广义奇异值分解的合作干扰策略。该策略中源节点和辅助节点同时采用基于广义奇异值分解的波束形成技术,源节点发送消息信号,辅助节点发送独立于消息信号的噪声信号,噪声信号对目的节点和窃听节点都产生干扰。此外设计了源节点和辅助节点采用合作干扰策略时的联合最优功率分配算法。该算法可以实现源节点和辅助节点在总功率受限时的可达安全速率最大化。仿真结果表明,与现有的非合作最优功率分配算法相比,本文提出的合作干扰策略在大信噪比时可以显著提高系统的可达安全速率。   相似文献   

6.
在包含中继节点的D2D(Device-to-Device)系统中,针对蜂窝链路与D2D链路同时受窃听的问题,提出一种基于链路间干扰辅助的中继D2D系统安全通信方法.首先,确定蜂窝链路与D2D链路上下行发送模式;然后,在基站与中继节点的发送信号中添加人工噪声,协作干扰窃听者;最后,对基站功率分配与D2D功率控制进行了优化,以实现不同类型链路间干扰辅助保障系统安全.仿真结果表明,所提出的安全通信方法在保密速率方面比SVD(Singular Value Decomposition)与ZF(Zero-Forcing)预编码方法提高了1.5bit/s/Hz.  相似文献   

7.
针对窃听方发送恶意导频干扰破坏系统安全性能的问题,本文将研究场景扩展到三节点MIMO(Multple-Input Multiple-Output)网络,首先分析存在恶意导频干扰时最小二乘和最小均方误差准则下的信道估计结果,并推导基于人工噪声的系统安全速率公式,得出当窃听方到达发送方的导频干扰功率大于合法接收方达到的功率时,安全速率值只能为零.然后,进一步分别研究半双工窃听方和全双工窃听方场景下的最优功率分配方案.最后,通过数值仿真分析窃听者位置、窃听者类型和干扰功率等因素对安全性能的影响.  相似文献   

8.
为保证MIMO异构网络面临多天线主动窃听时的安全性,该文提出一种基于人工噪声的抗主动窃听者的鲁棒安全传输方案。首先,考虑窃听者发送上行导频干扰的情形,研究了其发送的上行导频干扰对合法用户信道估计的影响。随后,基于信道估计结果对宏基站、微基站的下行数据与噪声信号的预编码矩阵进行设计,并推导了此种情形下系统安全速率的表达式。然后,以系统安全速率最大化为目标对基站的下行数据与噪声信号的发送功率进行优化设计,并提出一种基于1维线性搜索的求解方法。进一步地,考虑窃听者在发送上行导频干扰后,继而发送噪声干扰用户下行通信的情形,提出一种基于离散零和博弈方法来获取最优的发送功率设计。仿真结果验证了所提方案的安全性和鲁棒性。  相似文献   

9.
针对无人机上行通信链路的窃听攻击,提出一种全双工协同干扰的安全传输策略。方案利用收发双方在数据传输不同阶段的信息差异以及掌握的先验信息特征,向待传输信号注入人工噪声信号,从而使窃听链路形成干扰受限系统。在发射功率、无人机的机动性等约束条件下,建立最大化系统保密速率的联合优化问题,基于交替优化方法和连续凸近似技术将非凸问题转化为两个子问题,并设计了一种迭代优化算法进行求解。仿真结果表明,所提安全传输方案与其他参照方案相比,能够显著提高全双工无人机中继通信系统的保密速率,表现出更好的性能。  相似文献   

10.
该文基于物理层安全理论,针对能量受限的无线中继网络提出一种绿色的保密通信方案。该方案在节点功率约束和系统最小目标保密速率要求下,通过最优功率控制实现系统的安全能效最大化,并基于分式规划、对偶分解和DC(Difference of Convex functions)规划理论提出了一种迭代的功率分配算法。通过仿真比较,能效优化可以显著提升系统的安全能效,然而相对于保密速率最大化会有一定保密速率损失,这是由于能效和保密之间存在固有的折中。但是,能效优化的保密速率仍然大于发送总功率最小化的保密速率。  相似文献   

11.
The design of precoding matrices was studied in the multiple input multiple output (MIMO) full-duplex two-way security communication system where legitimate nodes transmit the confidential information accompanied by the artificial noise while receiving information.For the scenario where the perfect channel state information (CSI) of legitimate channels and eavesdropping channels was available,the difference of concave/convex (DC) programming was used to optimize the precoding matrices of the information signal and the artificial noise for the maximization of the secrecy sum rate.For the scenario where the CSI was imperfect,the channels were modeled by using worst-case criterion and the weighted minimum mean square error algorithm was used to get the robust precoding matrices of the information signal and the artificial noise.The simulation results prove that the proposed algorithm can effectively promote the secrecy sum rate of the system.  相似文献   

12.
In this paper, we investigate the secrecy sum rate optimization problem for a multiple‐input single‐output (MISO) nonorthogonal multiple access (NOMA) system with orthogonal space‐time block codes (OSTBC). This system consists of a transmitter, two users, and a potential eavesdropper. The transmitter sends information by orthogonal space‐time block codes. The transmitter's precoder and the power allocation scheme are designed to maximize achievable secrecy sum rate subject to the power constraint at the transmitter and the minimum transmission rate requirement of the weak user. We consider two cases of the eavesdropper's channel condition to obtain positive secrecy sum rate. The first case is the eavesdropper's equivalent channel is the weakest, and the other is the eavesdropper's equivalent channel between the strong user and weak user. For the former case, we employ the constrained concave convex procedure (CCCP)‐based iterative algorithm with one‐dimensional search. While for the latter, we adopt the method of alternating optimization (AO) between precoder and power allocation. We solve a semidefinite programming to optimize the precoder and drive a closed‐form expression of power allocation. The simulation results obtained by our method demonstrate the superiority of our proposed scheme.  相似文献   

13.
We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information and null space Artificial Noise (AN) while receiving information. Because the Channel State Information (CSI) of the eavesdropper is unavailable, we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint. As a result, the power of AN is maximized within the limit of total power, so the interception capability of the eavesdropper is suppressed as much as possible. Since self-interference cannot be completely eliminated, the optimization process of one legitimate node depends on the optimization result of the other. By substituting self-interference power in the secrecy rate formula with its average value, the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes. Then, the Water-Filling Algorithm (WFA) and bisection algorithm are used to get the optimal covariance matrices of the signal. Furthermore, we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme. The simulation results show that the theoretical derivation is correct, and the actual achievable rate is very close to the target rate, which means that the approximation in the optimization is feasible. The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved.  相似文献   

14.
康小磊  季新生  黄开枝 《通信学报》2015,36(10):149-156
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added artificial noise(AN)in cellular user’s signal as well as designed beam vectors of the desired signal and artificial noise to maximize system secrecy rate.In the end,a joint optimization scheme based on the fairness constraint was introduced to optimize beam vectors of the desired signal,the power allocation for BS’s information signal and AN and the D2D power control.Simulation results show that the system ergodic secrecy rate can be improved 2.7 bit·s?1·Hz?1more than the schemes based on SVD and zero-forcing at most.  相似文献   

15.
An artificial noise strategy is proposed for amplify‐and‐forward bi‐directional relay network where the eavesdropper can wiretap the relay channels in both hops. Artificial noise is used to confuse the eavesdropper and improve its secrecy. Specifically, the source and the relay are allowed to split their available transmit power into 2 parts: a useful information portion and a jamming portion to transmit a jamming signal. The mathematical model is established for 2‐way relay network with an eavesdropper. The secrecy rate achieved by using artificial jamming is derived from the above model. The optimal power allocation with individual power constraint is obtained via sequential quadratic programming to maximize the secrecy sum rate, and 2 special cases are investigated. Furthermore, the benchmark is provided for the purpose of performance comparison. Simulation results show that the proposed strategy can significantly improve the secrecy sum rate by using artificial noise to jam the eavesdropper.  相似文献   

16.
Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.  相似文献   

17.
多用户MIMO系统最优发送策略研究   总被引:3,自引:3,他引:0  
研究一个收发双方都采用多天线的K用户MIMO系统的前向链路的几种最优发送策略.利用矢量广播信道和矢量多接入信道之间的对偶性交换两类信道的发送协方差矩阵以达到快速优化;分析了在各用户功率受限时总的信道容量最大的算法;研究在假定基站采用理想的线性多用户MMSE接收时的最优发送.在总功率受限时通过调整各用户的协方差矩阵实现平均标准MSE最优,采用自适应功率分配可以进一步优化MSE.分析最优化问题与KKT条件的关系,通过迭代计算单用户平均最小均方误差,利用内点法计算互协方差矩阵优化问题.  相似文献   

18.
侯晓赟  黄庭金  朱艳  范伟 《信号处理》2014,30(11):1263-1266
针对未来多天线通信系统的安全问题,提出了一种增强无线物理层安全的传输策略。该策略基于发射天线的选择以及人工噪声,并采用Alamouti编码。它可以使发射机和接收机以较低的复杂度代价提高合法信道的分集增益,同时有效干扰窃听信道,使通信系统获得更高的安全容量。对系统安全容量、天线数量、以及信息信号与人工噪声之间的功率分配等问题进行了研究,仿真结果表明,该传输策略能够有效地增强物理层安全。   相似文献   

19.
韩帅  王金明  孟维晓  徐赛  李静涛 《信号处理》2022,38(9):1872-1880
近些年来,人们一直在开发可重构智能表面(Reconfigurable Intelligent Surface,RIS),它是一种由许多无源反射器组成的低成本结构,可以自由地改变每个元素的反射系数,并重新配置无线传输环境以改变入射信号的传播。由于具有若干新型和独特的优势,RIS应用场景广泛,关于其在物理层安全中应用的研究蓬勃发展。与此同时,物理层安全研究中窃听者的信道状态信息(Channel State Information,CSI)一直是人们讨论的热点,实际通信场景中窃听CSI通常是不易获取或未知的。因此本文考虑了一个更接近现实的情况,即针对窃听CSI未知的场景,考虑存在一个合法接收者以及多个非法窃听者,从功率分配的角度出发,结合波束成形,设计一种多RIS辅助的人工噪声与功率分配方案,通过对基站波束成形矩阵和RIS反射系数的交替优化,并应用二分法,使得在合法接收用户信号质量不变的前提下,降低基站处发送保密信息至合法用户所需的功率,降低其接收信号的信干噪比,进而提高系统的保密容量。同时考虑到了多个RIS协作辅助保密通信不一定最优,并可能增加系统优化的复杂度,设计了多个RIS的选择方案,...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号