首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.

In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of single primary and secondary user, multiple primary and secondary receivers, and multiple eavesdroppers. It is assumed that each user is equipped with single antenna while all the primary and secondary receivers, and eavesdroppers are equipped with multiple antennas. The primary and secondary users transmit their common messages to the respective receivers in the presence of multiple eavesdroppers. A mathematical model is developed to ensure successful reception of confidential information to the primary receivers protecting the activities of eavesdroppers neglecting the effect of interference due to secondary user. In order to analyze the security of the proposed model, closed-form analytical expressions have been derived for the secrecy multicast capacity, the secure outage probability for multicasting and the probability of non-zero secrecy multicast capacity. Analytical results are justified via Monte-Carlo simulations.

  相似文献   

2.
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; ie, the first scenario is that an eavesdropper overhears signal from the relay while the BS is overheard by eavesdropper in the second scenarios. More specifically, we derive closed‐form expressions for the secure probability metrics when the direct and relay links experience independent Rayleigh fading. There metrics include strictly positive secrecy capacity (SPSC) and the secure outage probability (SOP). Furthermore, secure performance of traditional orthogonal multiple access (OMA) is also provided as further comparison with NOMA counterpart. We analyze the influence of main coefficients such as the target rates and the transmit SNR factors on the secrecy performance. Our results specify that for reasonable selection of such parameters, secrecy performance can be enhanced remarkably. Numerical results are delivered to corroborate the derived results.  相似文献   

3.
Performance Analysis of the Dual-Hop Asymmetric Fading Channel   总被引:2,自引:0,他引:2  
In real wireless communication environments, it is highly likely that different channels associated with a relay network could experience different fading phenomena. In this paper, we investigate the end-to-end performance of a dualhop fixed gain relaying system when the source-relay and the relay-destination channels experience Rayleigh/Rician and Rician/Rayleigh fading scenarios respectively. Analytical expressions for the cumulative distribution function of the end-to-end signal-to-noise ratio are derived and used to evaluate the outage probability and the average bit error probability of M-QAM modulations. Numerical and simulation results are presented to illustrate the impact of the Rician factor on the end-toend performance. Furthermore, these results confirm that the system exhibits an improved performance in a Rician/Rayleigh (source-relay link/relay-destination link) environment compared to a Rayleigh/Rician environment.  相似文献   

4.
This paper investigates secure transmission of an integrated satellite‐aerial‐terrestrial network (ISATN), where multiple eavesdroppers (Eves) attempt to overhear the satellite signals cooperatively. The ISATN adopts an unmanned aerial vehicle (UAV) equipped with multiple antennas as a relay with threshold‐based decode‐and‐forward (DF) protocol. By assuming that perfect instantaneous channel state information (CSI) of the satellite‐UAV link and the statistical CSI of the UAV‐user link are available, we first propose a beamforming (BF) scheme for maximizing the achievable secrecy rate (ASR) of the considered network. Then, we derive the analytical expressions of the secrecy outage probability (SOP) and ergodic secrecy rate (ESR) of the considered system with the BF strategy under an assumption that the satellite‐UAV link undergoes the shadowed‐Rician fading, while the UAV‐user link experiences the correlated Rayleigh fading. Finally, numerical results are given to demonstrate the superiority of the proposed BF scheme against zero forcing (ZF) and maximal ratio transmission (MRT) schemes and the validity of the secrecy performance analysis.  相似文献   

5.
We investigate the physical layer security of decode‐and‐forward–relayed free space optics (FSO)/radio frequency (RF) communication system. In this network, the eavesdropper exists after relay node and overhears RF transmission. Further, FSO being a line‐of‐sight transmission is assumed to be secure from eavesdroppers. Here, we have the Gamma‐Gamma (ΓΓ) distribution for FSO link and generalized η?μ distribution for RF link. The security for information transmission to the legitimate user in the presence of an eavesdropper is measured in terms of secrecy capacity and secrecy outage probability. Deriving the probability density function and cumulative distribution function of end‐to‐end signal‐to‐noise ratio, the closed‐form expressions for security parameters are achieved. The numerical analysis of the proposed system is done under the influence of atmospheric turbulence effects and various fading conditions. The results have been verified through simulation.  相似文献   

6.
In this paper, a detailed theoretical analysis of fading margin in an asynchronous code division multiple access (A-CDMA) system is discussed. Rayleigh and Rician frequency-selective slowly fading channels are considered. Probability distribution and density functions of the probability of error are derived for Rayleigh and Rician fading channels. The fluctuations in the channel capacity are proved to be directly proportional to the signal-to-noise ratio (SNR) variations. Fading margin is calculated for both Rayleigh and Rician fading channels as a function of the probability of error specification and the probability of unsatisfactory operation.  相似文献   

7.
Full duplex (FD) technique has evolved as a viable solution to address the spectrum scarce issue. It has gained research interest for its potential to double the wireless link capacity and enhance spectral efficiency (SE). In this paper, the end-to-end performance of an amplify-and-forward full duplex relay(FDR) in asymmetric Rayleigh–Rician fading channels is explored, unlike the other works that assume symmetric fading conditions in both the links. The asymmetric or mixed fading channels properly model the realistic communication scenarios like satellite/terrestrial wireless communication systems. In this work, we consider that the source-relay link experiences Rayleigh fading and the relay-destination link experiences Rician fading. The novel exact and lower bound closed form analytical expressions for outage probability (OP) and bit error rate (BER) for the considered FD system are derived. Moreover, the effect of severity of fading and the amount of residual self-interference (RSI) on the performance of FDR are also studied. In addition, MC simulations are carried out to validate the results. It is observed that the performance metrics, OP and BER, are highly dependent on the severity of fading and the amount of RSI. Furthermore, it is found that typically at the SNR of 10 dB, an improvement of approximately 27.6% in OP is obtained. Also, our work offers appreciable SNR gain, for example, for a BER of 10−2, an SNR improvement of around 11 dB is achieved. These findings have been compared with the mixed Rayleigh–Rician fading channel conditions considering only half duplex(HD) mode. These parameter metrics are helpful in analyzing the performance of FD in various communication scenarios such as LoS/NLoS conditions and hence pave the way for more realistic FDR.  相似文献   

8.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

9.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

10.

In this paper, we investigate physical-layer security performance of the cooperative vehicular relaying networks, wherein the communication from a source vehicle to the destination vehicle is assisted by an amplify-and-forward (AF) relay vehicle in the presence of a passive eavesdropper vehicle. We assume that the communication links between the vehicles experience double-Rayleigh fading. We also consider two AF relaying protocols: (1) fixed gain relaying which requires partial channel state information (CSI), and (2) variable gain relaying which requires full CSI. Specifically, we derive the novel intercept probability and ergodic secrecy capacity expressions for both fixed and variable gain relaying in the presence of double-Rayleigh fading channels. The numerical and simulation results verify our theoretical and analytical findings, and show the impacts of channel conditions and relay and eavesdropper locations on the system secrecy performance.

  相似文献   

11.
混合衰落信道下选择中继译码转发的性能分析   总被引:1,自引:0,他引:1  
蜂窝中继通信中基站到中继以及中继到移动台可以建模成混合衰落信道,即基站到中继的信道通常经历莱斯衰落,中继到移动台的信道通常经历瑞利衰落。该文研究混合衰落信道下协同通信系统中两跳译码转发方式的性能,首先通过分析推导了基于选择最佳中继的中断概率、误符号率以及误符号率的渐近线的闭式表达式,然后基于误符号率的渐近线给出了一种功率优化方法。蒙特卡洛仿真验证了理论公式,仿真结果显示优化功率分配的性能优于平均功率分配的性能。  相似文献   

12.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

13.
Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.  相似文献   

14.
孙晓惠  尹长川 《电子学报》2014,42(9):1847-1851
本论文利用双变量泊松点过程对无线ad hoc广播网络和非法窃听网络共存的网络场景进行建模,运用随机几何工具,研究了无线ad hoc网络的保密广播传输容量,其定义为未发生窃听中断的广播发送节点密度、广播发送节点的相邻接收节点数量的平均值与保密速率的乘积.针对一般衰落和瑞利衰落信道条件,论文推导了造成保密中断的相邻窃听节点数量的平均值和保密广播传输容量的表达式.分析结果表明,与不存在相关性的网络场景相比,广播网络和窃听网络间的相关性会带来的保密广播传输容量的损失.  相似文献   

15.
Underlay mechanism allows concurrent communications of primary users and secondary users in cognitive radio networks (CRNs), causing mutual interference between them. However, current literature neglects primary interference or considers it as Gaussian noise. In addition, artificial noise, which is intentionally generated to interfere eavesdroppers, can improve security performance of CRNs. This paper analyzes security performance of CRNs, accounting for artificial noise and considering primary interference as non-Gaussian noise, under maximum transmit power constraint, interference power constraint, and Rayleigh fading channels. The security performance is evaluated through proposed exact expressions of secrecy outage probability, non-zero achievable secrecy rate probability, and intercept probability, which are verified by Monte-Carlo simulations. Various results demonstrate that CRNs suffer security performance saturation in the range of large maximum transmit power or large maximum interference power, and primary interference significantly deteriorates security performance while artificial noise is useful in enhancing this performance.  相似文献   

16.
In this paper, we consider the problem of spectrum sensing based on energy detection method in cognitive radio over wireless communication channels when users experiences fading and nonfading effects. The closed-form analytical expressions for the detection probability are derived over nonfading additive white Gaussian noise channel, Rayleigh, Rician and Nakagami-m fading channels. The detection probability involving Marcum-Q function is replaced by closed-form expression. The probability distribution function of fading channels is used to obtain the expressions for detection probability. The new derived numerical results are simulated under various parameters.  相似文献   

17.
In this paper, we present analytical bit-error probability expressions of an asynchronous fast frequency-hopped multiple-access system over fading channels with multiple-access interference modeled as alpha-stable noise. Various diversity-combining receivers over both Rician fading and Rayleigh fading channels are analyzed based on the Fourier-Bessel series. Numerical results under various environments show that the two non-linear diversity-combining methods significantly outperform the linear-combining receiver  相似文献   

18.
This paper derives the average bit error probability (BEP) of differential quaternary phase shift keying (DQPSK) with postdetection equal gain combining (EGC) diversity reception over independent and arbitrarily correlated fading channels. First, using the associated Legendre functions, the average BEP of DQPSK is analyzed over independent Rayleigh, Nakagami-m, and Rician fading channels. Finite-series closed-form expressions for the average BEP of DQPSK over L-branch independent Rayleigh and Nakagami-m fading channels (for integer Lm) are presented. Besides, a finite-series closed-form expression is given for the average BEP of differential binary phase shift keying (DBPSK) with EGC over independent Rician fading channels. Second, an alternative approach is propounded to study the performance of DQPSK over arbitrarily correlated Nakagami-m and Rician fading channels. Relatively simple BEP expressions in terms of a finite sum of a finite-range integral are proposed. Moreover, the penalty in signal to noise ratio (SNR) due to arbitrarily correlated channel fading is also investigated. Finally, the accuracy of the results is verified by computer simulation.  相似文献   

19.
任婷洁  李光球  程英 《电信科学》2019,35(8):111-119
为了考察使用多中继选择与多用户选择的放大转发(AF)中继系统的物理层安全性能,推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量概率和安全中断概率的精确表达式以及在高信噪比下的渐近安全中断概率解析表达式。AF中继系统的非零安全容量概率和安全中断概率的数值计算和仿真结果相吻合,验证了以上理论分析的正确性;分析结果表明,其安全分集增益为源节点发射天线数、最优中继节点接收天线数、中继节点数的三者乘积与最优中继节点发射天线数、最优用户接收天线数、用户数三者乘积之间的最小值,且与窃听信道无关。  相似文献   

20.
Exact, closed-form, error probability expressions for noncoherent M-ary frequency-shift-keying (MFSK) systems that employ postdetection equal-gain diversity over Rayleigh, Rician, and Nakagami-m channels are derived using a Laplace derivative formula. Both independent and generically correlated fading cases are considered. For independent fading, closed-form solutions are also derived for both Nakagami-q fading (either with identical or dissimilar fading statistics) and mixed fading cases. Previous results are shown to be specific instances of our general expressions. In addition, a concise, derivative formula is derived for calculating the bit error rate of square-law detected multichannel binary differential phase-shift-keying (DPSK) signals. All of these expressions are applicable in many cases of practical interest and provide accurate predictions of the performance of both binary and M-ary orthogonal signaling over generalized fading channels with arbitrary parameters.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号