首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper considers a coded cooperative relaying scheme in which all successfully decoded signals from multiple sources are simultaneously forwarded by a multi‐antenna relay to a common multi‐antenna destination to increase bandwidth efficiency. Iterative decoding with hard interference cancellation is used at destination to recover user information. By using orthogonal transmission from sources to avoid their mutual interference, the multi‐antenna relay offers receive space diversity that greatly enhances the decoding performance at the relay. This makes the source‐relay transmission more robust, less sensitive to the source‐relay link SNR, and hence increases the contribution of the relay in cooperative transmission. Simulation results show that the proposed scheme significantly outperforms direct transmission under the same transmit power and bandwidth efficiency. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

2.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

3.
In this paper, we examine the uplink of a cooperative CDMA network, where users cooperate by relaying each other's messages to the base station. When spreading waveforms are not orthogonal, multiple access interference (MAI) exists at the relays and the destination, causing cooperative diversity gains to diminish. To address this issue, we adopt the multiuser detection (MUD) technique to mitigate MAI in achieving the full advantages of cooperation. Specifically, the relay-assisted decorrelating multiuser detector (RAD-MUD) is proposed to separate interfering signals at the destination with the help of preceding at the relays along with pre-whitening at the destination. Unlike the conventional zero-forcing (ZF) precoder or the decorrelating MUD, the proposed RAD-MUD experiences neither power expansion at the relays nor noise amplification at the destination. Three cooperative transmission strategies are considered on top of RAD-MUD; namely, transmit beamforming, selective relaying and distributed space-time coding. Since the reliability of each source-relay and/or relay-destination links are different, relay transmissions are weighted accordingly in our schemes to further combat MAI. The advantages of RAD-MUD over ZF precoding and other existing cooperative MUD schemes are shown through computer simulations.  相似文献   

4.
宋沈煜  陈文 《信息技术》2012,(4):92-95,100
研究表明,协作中继选择能提高无线中继网络的鲁棒性和能效。文中研究一个多接入中继信道,包含2个信源,N个中继和1个信宿。中继节点为半双工,对两个信源的信号采用非再生的网络编码。考虑直接链路,基于最佳最差信道、最佳信噪比和最佳调和平均选择,提出新的选择策略。仿真结果表明其在性能上优于原有策略。  相似文献   

5.
Cooperative communication is an ongoing research area which lies on the basic idea of transmission of information from the transmitter to the receiver with the assistance of a virtual array of relay nodes in between, which will eventually provide the spatial diversity. This paper deals with the resource allocation (bandwidth in this case) among multiple users (source‐ destination pairs) in a cooperative communication environment along with the relay selection when there are multiple relay nodes to assist the transmitting nodes to pass on their data signal to respective receivers. A multi‐user, multi‐relay system model is considered here on which Amplify‐and‐Forward relaying scheme is applied. The bandwidth allocation and relay selection are done based on the Stackelberg game according to which transmitting nodes are treated as purchasers and relaying nodes are treated as vendors. By this planned approach, the transmitting nodes can discover the relays at comparatively better positions and can purchase the optimal bandwidth from those helping relays. By this approach, the relays which are competing with each other can increase their own utilities by demanding the optimal prices and the multiple users which are competing with each other can maximize their own utilities by demanding the optimal bandwidths. Distributed relay selection scheme is applied here which does not require precise information of channel state information as opposed to Centralized scheme and it gives comparable results, too.  相似文献   

6.
谭星  赵睿  王聪  袁毅 《信号处理》2017,33(5):734-740
研究了一种非可信放大转发中继与全双工目的节点相结合的传输模型。为提升系统安全性能,提出了全双工目的节点干扰(full duplex-destination based jamming,FD-DBJ)策略。同时结合半双工目的节点干扰策略以及放大转发中继策略对比分析系统安全性能。在瑞利衰落信道下,通过合理的近似分析推导出三种策略遍历安全容量的近似闭合表达式。分析与仿真结果显示,在高信噪比下,理论分析曲线与蒙特卡洛仿真结果基本吻合,并对三种策略的性能进行对比,凸显出FD-DBJ策略的性能优越性。并分析了FD-DBJ传输策略的最优功率分配因子。   相似文献   

7.
In this paper, we investigate the cooperative strategy with total power constraint in decode-and-forward (DF) relaying scenario, in the presence of an eavesdropper. Due to the difference of channel for each source-relay link, not all relay nodes have constructive impacts on the achievable secrecy rate. Besides, the final achieved secrecy rate depends on both source-relay and relay-destination links in DF relaying scenario. Therefore, the principal question here is how to select cooperative strategy among relays with proper power allocation to maximize the secrecy rate. Three strategies are considered in this paper. First, we investigate the cooperative jamming (CJ) strategy, where one relay with achieved target transmission rate is selected as a conventional relay forwarding signal, and remaining relays generate artificial noise via CJ strategy to disrupt the eavesdropper. Two CJ schemes with closed-form solutions, optimal cooperative jamming (OCJ) and null space cooperative jamming (NSCJ), are proposed. With these solutions, the corresponding power allocation is formulated as a geometric programming (GP) problem and solved efficiently by convex programming technique. Then, to exploit the cooperative diversity, we investigate the cooperative relaying (CR) strategy. An iterative algorithm using semi-definite programming (SDP) and GP together with bisection search method is proposed to optimize the cooperative relaying weight and power allocated to the source and relays. Furthermore, to exploit the advantages of both CR and CJ, we propose an adaptive strategy to enhance the security. Simulation results demonstrate that the efficiency of the proposed cooperative strategies in terms of secrecy rate.  相似文献   

8.
This paper studies an energy harvesting (EH) based cooperative relaying system, where two half-duplex relays operate with EH and alternately amplify and forward source data to the destination. When one relay joins in the cooperative data transmission, the other relay will harvest wireless energy by overhearing the transmissions from both the source and the transmitting relay. Both the time-switching and power-splitting architectures are considered for the EH and data reception at relays. Since the EH can be implicitly performed by each relay through listening the ongoing transmissions, more energy can be harvested for the cooperative data transmission. The outage probability and throughput of the proposed scheme are derived. Simulation results are provided to verify the correctness of our theoretical analysis and show that our scheme can significantly outperform the single-relay system in terms of throughput.  相似文献   

9.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

10.
马梦欢  贺玉成  张彦  陈启望 《信号处理》2022,38(10):2155-2163
针对存在多个非共谋窃听者,研究了一种基于全双工中继和两阶段中继选择(TSRS)的非正交多址接入(NOMA)物理层安全通信方案。每个通信过程包含一个传输时隙,系统在每个时隙开始由TSRS策略选择最优中继,所选中继在从源节点接收NOMA叠加信号的同时,向两个目的节点转发上一时隙的再编码叠加信号,两个目的节点采用串行干扰消除(SIC)技术从中继叠加信号中解码获取各自的期望信号。推导了非理想SIC下系统安全中断概率的近似表达式,进行了蒙特卡洛(Monte-Carlo)仿真验证,同时分析了各仿真参数(SIC残余干扰系数、目标安全速率、中继规模等)与系统安全中断概率的关系。理论分析与模拟仿真的结果表明,全双工技术与TSRS的结合方案能有效提升系统的安全中断性能。将该方案应用于实际通信系统设计时,选择合适传输信噪比(SNR)、提高串行干扰消除能力或适当增加中继数量均可实现更好的保密性能。  相似文献   

11.
吴舒婷  贺玉成  张良梅  周林 《信号处理》2022,38(5):1001-1008
该文研究了D2D辅助的协作中继NOMA(DC-NOMA)网络,在中继用户(RU)转发信息的第二时隙,利用RU到蜂窝中心用户(CCU)的D2D通信链路传输新的信号。为了提高传输可靠性,设计了新的信号检测策略,通过完全利用边缘信息消除了用户间的干扰。基于新的信号检测策略,提出了一种两阶段中继选择策略(TSRS)。在满足蜂窝边缘用户(CEU)可靠接收的中继集合中,选择使CCU成功解码概率最大的中继。为了评估所提出的DC-NOMA方案,推导了每个用户的确切中断概率且通过仿真得到验证。仿真结果表明,在高信噪比区域,该文所提出的基于新的信号检测策略的DC-NOMA在TSRS方案下的中断性能优于部分中继选择方案(PRSS)和传统的DC-NOMA。特别地,增大中继数量可有效提高DC-NOMA系统的中断性能。   相似文献   

12.
邓单  周雯 《电子学报》2017,45(7):1593-1600
该文研究在不可信解码转发无线中继网络中,基于用户选择的安全通信策略与性能分析.根据直接链路与中继链路的信道增益,本文提出三种不同的选择准则以提升系统的安全性;文章推导了三种选择准则下安全截断概率的闭式解析表达式及渐近表达式.根据渐近表达式和数值仿真结果可知,次优准则可以达到与最优准则几乎相同的系统安全性能.同时部分选择准则也能达到全分集增益性能.  相似文献   

13.
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.  相似文献   

14.
This paper proposes an adaptive multi-node incremental relaying technique in cooperative communications with amplify-and-forward (AF) relays. In order to reduce the excessive burden of MRC with all diversity paths at the destination node, the destination node decides if it combines signals over the first Ν(< Κ) time slots/frames or over all of the Κ times slots, where Κis the number of relay nodes. Our analytical and simulation results show that the proposed adaptive multi-node incremental relaying outperforms the conventional MRC in terms of outage probability in AF based cooperative communications since the proposed scheme effectively reduces the spectral efficiency loss. Our asymptotic analysis also shows that the proposed adaptive multi-node incremental relaying achieves full diversity order Κ+ 1.  相似文献   

15.
Performance of cooperative relaying employing infrastructure based fixed relays having multiple antennas has been investigated. Employing MGF based approach, closed form expression for outage probability and bit error rate performance of BPSK signal have been derived, when relay and destination are assumed to perform MRC combining of the signals. The effect of relay placement on the system performance has also been studied under different path loss conditions.  相似文献   

16.
Using full‐duplex relaying in device‐to‐device (D2D) communication, spectrum efficiency can be further improved as compared with traditional half‐duplex relaying. Due to the increasing demands for more system capacities and higher data rate, a throughput‐guaranteed and power‐aware relay selection mechanism is essential so that services can be successfully accomplished within tolerable power consumption. It is also imperative to prevent cellular users from interfering and preserve resources for more users at the same time. In current paper, we proposed an efficient relay selection scheme with subchannel reusing. Using the nonconflict group discovery algorithm, firstly, we divided D2D pairs into different groups based on the neighbor lists of all the devices. The D2D pairs in the same group were considered nonconflictive. By building a matrix that represents the power consumption of D2D transmission peers through relays, we proposed a group‐oriented relay selection scheme based on the Hungarian method allowing subchannel reuse over relay‐assisted D2D networks. Applying this mechanism, different D2D pairs are able to transmit messages at the same subchannel, whenever they are in the same group. Better throughput and spectrum usage than currently available relay selection schemes without subchannel reusing can be obtained. Particularly, more D2D pairs in high dense networks can be accommodated, and spectrum resources can be better preserved. The simulation results showed that our proposed mechanism can improve the total throughput by up to 35% as compared with an existing relay selection scheme without subchannel reusing, called as PRS‐D2D, when most D2D pairs are in a few groups.  相似文献   

17.
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work.  相似文献   

18.
For conventional subcarrier pairing schemes in cooperative orthogonal frequency division multiplexing amplify and forward multi-relay networks, to avoid interference, each subcarrier pair (SP) is assigned to only one relay. Over a specific subcarrier, the destination receives signals transmitted from only one relay. In our subcarrier pairing scheme, we assign each SP to all the relays. Thus, over a specific subcarrier, the destination receives signals transmitted from all the relays. Since it is assumed that there exists the direct link from the source to the destination, we assume that the source also transmits signals during the second time slot for the direct transmission mode. We propose an enhanced joint subcarrier pairing and power allocation optimization scheme which maximizes the transmission rate subject to total network power constraint. The problem is simplified and solved by using dual method. It is shown from simulation results that our proposed scheme outperforms the other schemes.  相似文献   

19.
Wireless networks suffer from battery discharging specially in cooperative communications when multiple relays have an important role but they are energy constrained. To overcome this problem, energy harvesting from radio frequency signals is applied to charge the node battery. These intermediate nodes have the ability to harvest energy from the source signal and use the energy harvested to transmit information to the destination. In fact, the node tries to harvest energy and then transmit the data to destination. Division of energy harvesting and data transmission can be done in two algorithms: time-switching-based relaying protocol and power-splitting-based relaying protocol. These two algorithms also can be applied in delay-limited and delay-tolerant transmission systems. The previous works have assumed a single relay for energy harvesting, but in this article, the proposed method is concentrated on improving the outage probability and throughput by using multiple antennas in each relay node instead of using single antenna. According to our simulation results, when using multi-antenna relays, ability of energy harvesting is increased and thus system performance will be improved to great extent. Maximum ratio combining scheme has been used when the destination chooses the best signal of relays and antennas satisfying the required signal-to-noise ratio.  相似文献   

20.
Fu  Xiaomei  Li  Jialun  Chang  Shuai 《Wireless Networks》2020,26(5):3069-3081

Cooperative relaying is an effective technology to improve the secrecy capacity of physical-layer (PHY) security. Multiple relays can help further exploit the spatial diversity of cooperative networks. In power-limited networks, relay selection scheme is crucial important for it determines whether the optimal relay combination can be selected. This paper studies the problem of multi-relay selection in amplify-and-forward compressed sensing (AF-CS) networks, in which relays help all sources amplify and forward the signal, and the transmission matrix is used as the measurement matrix to encrypt the information. A self-organizing algorithm based on stochastic learning automata (SLA) is proposed for the AF-CS network to look for the best relay combination in a self-learning and self-optimizing way, and named “learning-based multi-relay selection algorithm” (L-MRS). In L-MRS, the destination node is self-optimizing to select the best state autonomously, and relays are self-organizing to decide whether to join the cooperation or not according to the environment feedback. Simulation studies verify the L-MRS’s is able to select the optimal relay-combination in a very stable way, and can get higher secrecy capacity compared with the coalition formation game method.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号