首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 359 毫秒
1.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

2.
采用数字喷泉码的无线协作中继方案及其性能分析   总被引:3,自引:0,他引:3  
 协作中继传输是无中心节点的无线网络中的重要传输方式.在中继传输中应用数字喷泉码,能降低反馈信息的传输量,并在多个中继节点的情况下明显提高前向传输效率.提出了能量累积方式和信息累积方式两种喷泉中继传输方案,并对源节点至中继节点、中继节点至目的节点的传输性能进行了理论分析和仿真.能量累积方式在降低节点传输功耗上更为有效,而信息累积方式则能明显降低传输时间,并能适应中继节点数量和转发能力的变化,充分利用其转发能力.理论分析和仿真的结果表明,喷泉中继传输的性能明显优于普通中继传输的性能.  相似文献   

3.
基于网络编码的无线网络分布式协作通信机制   总被引:2,自引:2,他引:0       下载免费PDF全文
黄辰  戴彬  王芙蓉  杨军  杨维明 《电子学报》2010,38(10):2302-2308
 本文提出了一种基于无线网络编码的协作通信机制NCCC.无线网络编码能够在取得合作分集的性能增益的同时,降低网络中断概率.分布式中继节点选择算法是NCCC机制的核心,该算法根据即时信道状态,选择执行网络编码操作的最优中继节点.理论和仿真结果证明, NCCC机制可以提高无线网络双向多信源多信宿传输的性能和鲁棒性.  相似文献   

4.
针对无线网状网中缺少窃听者先验知识不利场景中的安全连接问题,提出了一种结合全双工和协作干扰技术的物理层安全策略。利用全双工通信中的自干扰消除技术和协作干扰技术,提出的安全策略可有效劣化位于信息传播范围内包括潜伏在接收节点附近窃听者的接收性能。为保证信息的安全传输给出了协作干扰节点的选择方法,基于随机几何等数学方法导出了选定路径的安全连接概率表达式。性能分析和仿真结果表明,所提方法与仅基于全双工或协作干扰技术的方法相比,其安全性能有较大提升。  相似文献   

5.
研究无线网络中如何利用信道的实时信息(信道幅度)进行机会协作传输及其性能.首先讨论机会协作传输策略;接着从理论上分析不同衰落下机会协作传输的可能性,并给出闭式表达式;然后,分析机会协作传输的功率分配方案以最优化系统性能;最后通过仿真验证性能.仿真结果表明:1)机会协作传输能明显提高性能,而节点间最优功率分配方案则能进一步提高协作传输性能;2)即使协作节点到目的节点的信道统计特性次于源节点到目的节点的信道统计特性,机会协作传输仍能带来明显的性能增益.  相似文献   

6.
为了提高实验室安全预警能力,提出一种基于无线网络监控技术的实验室安全预警系统设计方案。构建实验室安全预警的无线网络监控节点部署模型,采用最短路由协议部署方法进行实验室安全预警的网络传输节点控制,采用全网能量均衡控制方法进行实验室安全预警无线监控网络节点室内定位和信道均衡控制。结合K-邻居节点覆盖方法提高实验室安全预警无线监控的信道均衡性,根据节点的传输功耗特征检测结果实现实验室安全预警无线监控网络节点优化部署和室内定位。结合嵌入式的ARM实现实验室安全预警系统的硬件设计。测试结果表明,采用该方法进行实验室安全预警无线监控网络设计的误码率较低,监控性能较好。  相似文献   

7.
认知无线网络中一种基于放大转发的协作传输策略   总被引:2,自引:0,他引:2  
在不干扰主用户数据传输的条件下,通过次用户间的彼此协作传输,可以使认知无线网络获得明显的空间和时间分集增益,从而改善次用户传输性能。该文针对主次用户共存,主用户交替转移信道忙闲状态的网络环境下,提出了一种基于放大转发的协作传输方案,当主用户存在时机会的使用中继节点转发数据,并且对所提方案的无冲突传输时间进行了理论分析,给出了非协作传输和协作传输模式下的无冲突传输时间的解析表达式,理论分析和仿真结果表明,协作传输方案的无冲突传输时间明显优于非协作传输方案,次用户协作为认知无线网络带来可观的性能增益。  相似文献   

8.
徐鑫  金梁 《信号处理》2017,33(6):836-844
针对NOMA系统中的信息安全传输问题,提出基于协作干扰的物理层安全方案,该方案利用外部协作节点发送干扰信号恶化窃听者的接收性能。本文首先利用泊松点过程对协作节点和窃听者的位置进行安全建模,然后推导了随机协作干扰方案下系统保密中断概率的闭式解,但随机协作干扰方案会同时恶化合法用户的接收信号,性能有限,因此提出一种信道增益受限的协作干扰方案,该方案选择到近端用户和远端用户的瑞利信道因子均小于一定阈值的协作节点发送干扰信号,会对窃听者造成更严重的影响。仿真结果表明,在NOMA系统中采用受限的协作干扰方案能够有效提升系统安全性能。   相似文献   

9.
刘云  刘凯  曾峰 《通信学报》2011,(8):183-190
提出了一种适于无线网络的基于优先级竞争的协作媒质接入控制(PBC-CMAC)协议。该协议首先由源节点根据本地中继信息表选择2个最佳候选中继节点,以反映缩短传输时间程度的中继效率值区分优先级,并在CRTS分组中宣布。被选择的候选节点通过侦听源节点与目的节点交换的控制分组,可得到即时的相关速率信息,并结合自身优先级无冲突竞争成为最终的中继节点。该协议可以从所有可能的中继节点中快速、无冲突地选择出适于当前信道质量状态的最佳中继节点进行协作传输,提高了中继节点选择的成功率和协作效率,改善了网络接入性能。仿真结果表明,与IEEE 802.11 RTS/CTS和CoopMAC协议相比,PBC-CMAC协议有效提高了无线网络的多址性能。  相似文献   

10.
程英  李光球  沈静洁  韦亮 《电信科学》2021,37(9):95-104
针对合谋窃听场景下单天线多中继修改转发(MF)协作无线系统的安全性能较差问题,提出一种合谋窃听场景下联合源节点发送天线选择(TAS)和多中继选择的MF协作物理层安全系统,考虑最优的最大化主信道信噪比(SNR)和次优的最大化源节点-中继节点链路 SNR 两种中继选择方案,推导其安全中断概率(SOP)和遍历安全容量(ESC)的解析表达式。最优或次优中继选择的MF安全中继系统的SOP和ESC的数值计算结果与仿真结果相吻合,验证了上述理论分析的正确性;同时也表明源节点发射天线数和中继节点数越多、窃听节点数越少,最优或次优中继选择的MF安全中继系统的物理层安全性能越好。  相似文献   

11.
在协同自适应解码转发中继系统中,该文针对Nakagami-m衰落信道,研究了基于多天线低复杂度的机会式传输策略的物理层安全性能。为充分利用天线分集增益提升系统安全性能,发送节点均采用发送天线选择策略,接收节点均采用最大比合并策略。推导了系统安全中断概率的闭合表达式,并进一步提供了渐近性能分析,得到了系统的安全分集阶数。仿真结果验证了理论分析的正确性,并揭示了各系统参数对机会式传输方案的安全性能的影响。结果表明,通过增加合法节点的天线数和增大合法信道的Nakagami衰落信道参数可显著提升系统安全性能。  相似文献   

12.
Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.  相似文献   

13.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

14.
Fu  Xiaomei  Li  Jialun  Chang  Shuai 《Wireless Networks》2020,26(5):3069-3081

Cooperative relaying is an effective technology to improve the secrecy capacity of physical-layer (PHY) security. Multiple relays can help further exploit the spatial diversity of cooperative networks. In power-limited networks, relay selection scheme is crucial important for it determines whether the optimal relay combination can be selected. This paper studies the problem of multi-relay selection in amplify-and-forward compressed sensing (AF-CS) networks, in which relays help all sources amplify and forward the signal, and the transmission matrix is used as the measurement matrix to encrypt the information. A self-organizing algorithm based on stochastic learning automata (SLA) is proposed for the AF-CS network to look for the best relay combination in a self-learning and self-optimizing way, and named “learning-based multi-relay selection algorithm” (L-MRS). In L-MRS, the destination node is self-optimizing to select the best state autonomously, and relays are self-organizing to decide whether to join the cooperation or not according to the environment feedback. Simulation studies verify the L-MRS’s is able to select the optimal relay-combination in a very stable way, and can get higher secrecy capacity compared with the coalition formation game method.

  相似文献   

15.
孙晓惠  尹长川 《电子学报》2014,42(9):1847-1851
本论文利用双变量泊松点过程对无线ad hoc广播网络和非法窃听网络共存的网络场景进行建模,运用随机几何工具,研究了无线ad hoc网络的保密广播传输容量,其定义为未发生窃听中断的广播发送节点密度、广播发送节点的相邻接收节点数量的平均值与保密速率的乘积.针对一般衰落和瑞利衰落信道条件,论文推导了造成保密中断的相邻窃听节点数量的平均值和保密广播传输容量的表达式.分析结果表明,与不存在相关性的网络场景相比,广播网络和窃听网络间的相关性会带来的保密广播传输容量的损失.  相似文献   

16.
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.  相似文献   

17.
To alleviate the spectrum shortage problem and security threats in heterogeneous network (HetNet),multi-antenna full-duplex relay was introduced for communication between femto base station (FBS) and legitimate user.With the aid of multi-antenna full-duplex relay in FBS network,the secrecy performance of HetNets could be improved.Under a stochastic geometry framework,the fundamental analysis model to evaluate the secrecy performance in multi-antenna full-duplex relay aided HetNet was set up.To be specific,the exact expressions for the secrecy outage probability of the typical user,serving relays and HetNet were derived respectively.Then,based on the theoretical analyses and simulation results,the influences of transmit power and antenna number of both macro base station and FBS on secrecy performance in HetNet were examined.Finally,the results show that introducing multi-antenna full-duplex relay for FBS networks improves the secrecy performance of HetNet.  相似文献   

18.
In this paper, the secrecy performance and power allocation of the signal‐to‐noise ratio‐based hybrid decode–amplify–forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obtained for the relay close‐to‐destination case and minimum for the relay close‐to‐eavesdropper case. Jamming schemes are superior in secrecy rate performance than without jamming schemes. To enhance the secrecy rate further with the optimized relay and jammer powers, invasive weed optimization (IWO) algorithm‐based power allocation is proposed. Here, maximizing the secrecy rate is defined as the cost function for the proposed IWO algorithm‐based power allocation. Comparative study is done over the conventional equal and proposed power allocation schemes for validation. The proposed power allocation scheme proved to be superior. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号