首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

2.
针对单输入多输出认知无线电网络,研究了瑞利衰落信道下采用最大比合并时保密中断性能。在所研究的系统中,次用户发射机发送机密信息给另一个次用户接收机,次用户接收机配备多个天线并且采用最大比例合并多个接收信号。同时,拥有多个天线窃听者也采用最大比合并方案偷听次用户发射机和次用户接收机之间传送的信息。频谱共享下次用户发射机工作时必须保证主用户的服务质量。推导了保密中断概率的精确表达式,分析了系统保密中断概率渐近性能。仿真结果验证了分析的正确性。  相似文献   

3.
王松青  许晓明  高瞻  杨炜伟  蔡跃明 《信号处理》2014,30(11):1267-1274
协同中继传输不仅能改善认知用户的传输可靠性,而且也能增强认知用户物理层安全性。针对Underlay模式下多中继协同频谱共享认知无线网络,本文设计了基于选择译码转发和分布式迫零波束成形(SDF-DZFB)的物理层安全传输方案,其中,假设存在单个被动窃听节点窃听中继节点的发送信号,在认知用户发送端同时考虑峰值干扰温度约束和最大发射功率约束,中继和认知用户目的端都受到主用户干扰。在此情况下,分析了认知用户发送端分别到目的端(称为主链路)和到窃听节点(称为窃听链路)的等效信干噪比的统计特性,进而推导出系统安全中断概率性能的闭式表达式。为了揭示所提物理层安全传输方案的安全分集度性能,本文进一步分析了高信噪比条件下安全中断概率的渐近表达式。计算机仿真验证了本文的理论分析结果。   相似文献   

4.
Recently, cooperative relaying techniques have been integrated into spectrum‐sharing systems in an effort to yield higher spectral efficiency. Many investigations on such systems have assumed that the channel state information between the secondary transmitter and primary receiver used to calculate the maximum allowable transmit secondary user transmit power to limit the interference is known to be perfect. However, because of feedback delay from the primary receiver or the time‐varying properties of the channel, the channel information may be outdated, which is an important scenario to cognitive radio systems. In this paper, we investigate the impact of outdated channel state information for relay selection on the performance of partial relay selection with amplify and forward in underlay spectrum‐sharing systems. We begin by deriving a closed‐form expression for the outage probability of the secondary network in a Rayleigh fading channel along with peak received interference power constraint and maximum allowable secondary user transmit power. We also provide a closed‐form expression for the average bit‐error rate of the underlying system. Moreover, we present asymptotic expressions for both the outage probability and average bit‐error rate in the high signal‐to‐noise ratio regime that reveal practical insights on the achievable diversity gain. Finally, we confirm our results through comparisons with computer simulations. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

5.
Efficient spectrum utilization is a promising technique for a prolonged unused radio frequency (RF) spectrum in a wireless network. In this paper, an adaptive spectrum sharing cognitive radio (CR) network has been proposed consisting of a primary user (PU) and secondary user transmitter (SU ? Tx) that communicates with secondary user receiver (SU ? Rx) via multiantenna‐based proactive decode‐and‐forward (DF) relay selection scheme. In our model, strategically an adaptable joint venture on underlay/overlay protocol is defined based on channel occupancy using spectrum sensing technique. Here, secondary transmitters (i.e., source transmitter) continuously sense the PU activities by energy detector and can simultaneously transmit to secondary receivers. Depending on sensing result secondary transmitters automatically switches in underlay mode if PU is active otherwise operates in overlay mode. The advantage of this scheme is that the joint mode of transmission allows the SUs to maximize their transmission rate. The outage performance at SU ? Rx and closed‐form expressions of joint underlay/overlay protocol has been evaluated. The power control policies at different transmitter nodes are taken care of. With the same diversity order, a trade‐off between multiantenna and multirelay is shown. This comparison shows improvement in outage behavior when the count in relays surpasses the number of antennas. Finally, the analytical model of smart efficient spectrum utilization without harming license users in CR is validated by MATLAB simulation.  相似文献   

6.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

7.
A communication network that consists of a transmitter, a legitimate receiver, an eavesdropper and several friendly helpers is considered. Both the transmitter and the helpers are equipped with multiple antennas while the legitimate receiver or the eavesdropper has one antenna. The transmitter and the helpers have the channel state information to the legitimate receiver. The channels to the eavesdropper are partially known and modeled with uncertainty ellipsoids. The transmitter applies maximum ratio transmission to the legitimate receiver. The helpers generate interference to degrade the receiving performance of the eavesdropper. The transmit power of the helpers is optimized with the worst-case secrecy rate requirement as the Quality of Service constraint. Based on robust convex optimization, a centralized optimization problem is developed for the helpers to generate interference efficiently with minimum total transmit power. A distributed algorithm is developed which scales well with a large number of helpers.  相似文献   

8.
This paper considers a full-duplex (FD) secure transmission scheme with aid of the artificial noise deployed at both transmitter and receiver under imperfect self-interference cancellation. The expressions of secrecy and connection outage probabilities are derived, and hence, the secrecy throughput of the proposed scheme is evaluated. The results show that the performance of the proposed FD scheme outperforms that of conventional half-duplex and FD receiver schemes in terms of the secrecy outage probability. In addition, the proposed FD scheme can achieve high secrecy throughput under various locations of the eavesdropper. Especially when the eavesdropper is located close to the transmitter, the secrecy throughput of the proposed FD scheme is nearly double that of the half-duplex scheme with artificial noise injection while that of the scheme with FD jamming receiver goes to zero.  相似文献   

9.
该文在同频全双工技术快速发展的背景下,针对物理层安全研究中波束成形技术的高复杂度和发端天线选择(TAS)技术的低性能,提出一种联合发端天线选择和收端人工噪声(AN)的物理层安全传输方法TAS-rAN。首先,有多根天线的发端,利用天线选择技术,选取能使合法接收方接收信噪比最大的天线发送保密消息;其次,有同频全双工能力的收端,在接收到消息的同时,发送人工噪声来扰乱窃听方对保密消息的窃听。在Nakagami-m信道下,推导了安全中断概率的闭合表达式,并基于此,得到非零安全容量的概率表达式;通过渐进安全中断概率的推导,得到TAS-rAN方法的安全分集度。仿真结果表明,与已有的TAS-single和TAS-Alamouti方法相比,TAS-rAN安全方法具有较强的稳定性,且能提供更优的安全性能。  相似文献   

10.
This work presents theoretical analysis on security performance for relay selections based on either statistical or instantaneous channel state information (CSI) of the eavesdropper (CSI-E) channels in a decode-and-forward relaying network. By considering security constraints, we have derived exact expressions for the average secrecy rate and the secrecy outage probability. Moreover, analytical expressions of the false secrecy probability are derived for the suboptimal relay selection based on statistical CSI-E, which are used as the constrained functions of new selection metrics. Furthermore, our work achieves a better tradeoff between the outage probability and the false secrecy probability. The accuracy of our performance analysis is verified by simulation results.  相似文献   

11.
In this paper, an energy harvesting relay network over Nakagami-m fading is investigated. In the considered system, the power beacon can provide wireless energy for the source and relays which deploy time-switching-based radio frequency energy harvesting technique. Two relay selection schemes, namely partial relay selection and optimal relay selection, are proposed in order to enhance the system performance. In the former, the source only has the channel state information of the first hop, while in the latter it has the full knowledge of the channel state information. The eavesdropper is able to wiretap to the signal transmitted from the source and the relays. The exact closed-form expressions of secrecy outage probability are derived. The results show that optimal relay selection performs better than partial relay selection. With increasing number of relays, the considered system shows better performance. In addition, the energy harvesting duration has a significant effect on the secrecy outage probability.  相似文献   

12.

In this paper, the issue of secrecy capacity of wireless powered massive MIMO dual hop relay system with a single antenna eavesdropper having non ideal hardware is addressed. The relay harvests energy in a proportionate manner and passes it to destination through beamforming with classical decode and forward relaying protocol. The relay has no channel state information (CSI) of passive eavesdropper but has CSI of the legitimate channel. The work presented in this paper focuses on the analysis of the difference in system performance with ideal and non ideal hardware, bounded by strict outage probability. The performance (in terms of secrecy outage capacity) is studied with hardware impairments (HWIs) defined for all network elements, i.e., source, relay, destination and passive eavesdropper. It is also observed that compared to ideal hardware, there is significant degradation in performance due to HWIs.

  相似文献   

13.
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal. The proposed scenario can be viable for a secondary safety task force working with a primary regiment, which wishes to transmit the confidential information to the commander while an eavesdropper is trying to intercept the classified information. In the analysis, two novel power allocation methods are considered by assuming perfect and limited feedback channels of the primary network, and for both methods, exact and asymptotic expressions of secrecy outage probability (SOP) are derived for N*Nakagami‐m fading channels which are used to model fading channels such as mobile‐to‐mobile/vehicle‐to‐vehicle communication systems where the nodes are moving into a rich scattering environment. We further verified our analytic results through Monte‐Carlo simulations. It is shown from the numerical results that the cascading degree of the channels has a worsening effect on the secrecy outage performance of the CRN systems.  相似文献   

14.
常玉晴  芮贤义 《信号处理》2020,36(10):1784-1788
在无线通信系统的实际传输中,当窃听用户距离合法接受者足够近,或者位于合法接收机信号的无线电波路径上时,就会出现主信道与窃听信道相关的场景。为此我们考虑一个多输入单输出,并且存在单天线被动窃听者的无线通信系统,研究了当基站采用最大比技术发射技术发送信号时,相关对系统性能的影响。推导了安全中断概率与平均安全容量的闭合表达式。数值仿真结果表明:(1)当主信道的信道质量高于窃听信道时,较低的相关对系统安全中断概率性能影响不大,然而强相关却能够带来更低的安全中断概率;(2)该相关对系统平均安全容量始终是有害的,且随着相关程度的增强,最大比发射技术相对于天线选择的优势逐渐变小。   相似文献   

15.
中继辅助终端直通(devicetodevice,D2D)网络通过与蜂窝网络共享频谱提高D2D用户的频谱效率和蜂窝用户(cellular user,CU)的物理层安全性。为进一步改善其性能,可以在基站和D2D链路的中继节点采用天线选择以及在中继节点采用全双工技术。然而,由于存在反馈时延和移动性,用于蜂窝链路和所有D2D链路天线选择的信道状态信息(channelstateinformation,CSI)均可能是过时的,针对该场景下的物理层安全性和可靠性问题,提出一种主动窃听和过时CSI场景下基站和中继节点均采用发射天线选择的全双工中继辅助D2D网络安全模型,推导CU的中断概率、遍历容量、非零安全容量概率、安全中断概率、渐近安全中断概率的解析表达式。数值计算与仿真结果均表明,基站发射天线数、中继干扰天线数越多,CU的安全性能越好;过时的CSI会降低CU的中断性能和安全性能。  相似文献   

16.
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work.  相似文献   

17.
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate. We show that, for this channel, Gaussian signalling in the form of beam-forming is optimal, and no pre-processing of information is necessary.   相似文献   

18.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

19.
针对全双工中继系统的安全问题,提出一种基于协作干扰的物理层安全混合传输协议.系统根据自身信道状态信息,自适应地选择基于中继节点与信源节点轮流发送干扰(RSCJ)协议或基于中继节点与目的节点轮流发送干扰(RDCJ)协议中安全容量相对较高的协议进行信息的传输.在全双工节点自干扰因素被抑制的条件下,给出了系统的传输协议选择策略,并理论推导了采用RSCJ或RDCJ传输协议下系统的安全中断概率表达式.仿真结果表明,利用所提的混合安全传输协议可以显著提高全双工中继系统的安全中断性能,与传统未利用协作干扰的传输机制相比,具有明显的安全性能优势.  相似文献   

20.
针对未来海量用户设备接入的物理层安全(physical layer security,PLS)应用需求,提出了一种组合非正交多址接入(non-orthogonal multiple access,NOMA)、终端直通(device-to-device,D2D)与中继协作的NOMA-D2D协作无线系统PLS模型。该模型由采用发射天线选择(transmit antenna selection,TAS)的基站、分别作为基站和D2D发射端的NOMA远端蜂窝用户、D2D接收端以及被动窃听者组成,其中的D2D发射端承担基站的 NOMA 近端用户和解码转发中继两种角色。利用高斯—切比雪夫正交定理推导两种 TAS 方案下NOMA-D2D协作无线系统的安全中断概率、非零安全容量概率以及渐近安全中断概率的近似表达式。数值计算和仿真实验验证了NOMA-D2D协作无线系统PLS性能分析的准确性;在基站总功率恒定时增大分配给远端蜂窝用户的功率能有效提升NOMA-D2D协作无线系统的PLS性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号