首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.  相似文献   

2.
In this paper, the secrecy performance and power allocation of the signal‐to‐noise ratio‐based hybrid decode–amplify–forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obtained for the relay close‐to‐destination case and minimum for the relay close‐to‐eavesdropper case. Jamming schemes are superior in secrecy rate performance than without jamming schemes. To enhance the secrecy rate further with the optimized relay and jammer powers, invasive weed optimization (IWO) algorithm‐based power allocation is proposed. Here, maximizing the secrecy rate is defined as the cost function for the proposed IWO algorithm‐based power allocation. Comparative study is done over the conventional equal and proposed power allocation schemes for validation. The proposed power allocation scheme proved to be superior. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

3.
In this paper, we investigate the cooperative strategy with total power constraint in decode-and-forward (DF) relaying scenario, in the presence of an eavesdropper. Due to the difference of channel for each source-relay link, not all relay nodes have constructive impacts on the achievable secrecy rate. Besides, the final achieved secrecy rate depends on both source-relay and relay-destination links in DF relaying scenario. Therefore, the principal question here is how to select cooperative strategy among relays with proper power allocation to maximize the secrecy rate. Three strategies are considered in this paper. First, we investigate the cooperative jamming (CJ) strategy, where one relay with achieved target transmission rate is selected as a conventional relay forwarding signal, and remaining relays generate artificial noise via CJ strategy to disrupt the eavesdropper. Two CJ schemes with closed-form solutions, optimal cooperative jamming (OCJ) and null space cooperative jamming (NSCJ), are proposed. With these solutions, the corresponding power allocation is formulated as a geometric programming (GP) problem and solved efficiently by convex programming technique. Then, to exploit the cooperative diversity, we investigate the cooperative relaying (CR) strategy. An iterative algorithm using semi-definite programming (SDP) and GP together with bisection search method is proposed to optimize the cooperative relaying weight and power allocated to the source and relays. Furthermore, to exploit the advantages of both CR and CJ, we propose an adaptive strategy to enhance the security. Simulation results demonstrate that the efficiency of the proposed cooperative strategies in terms of secrecy rate.  相似文献   

4.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes.  相似文献   

5.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

6.
Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved to be zero strictly. For the two-way relaying protocol, the signal-to-noise ratio (SNR) threshold is derived, above which the secrecy rate is non-zero. Defining a parameter, namely mistrust level, and non-zero secrecy rate can be achieved for the one-way relaying protocol in certain range of the mistrust level at high SNR. With a fair total power constraint, no matter how unreliable the relay is, the two-way AF half-duplex relaying protocol is proved to be a better choice under high SNR.  相似文献   

7.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

8.

In this paper, we investigate the impact of channel estimation errors on the physical layer security of an overlaying device-to-device (D2D) wireless network with an amplify-and-forward untrusted relay. An untrusted relay assists D2D communication while may capture the confidential data. Under the practical assumption of imperfect channel state information (ICSI) for the relay-to-receiver D2D link, we take into account optimal power allocation (OPA) problem to maximize the achievable secrecy rate of two different scenarios which are without jamming and with friendly jamming. Based on these OPA solutions, we study the secrecy performance of the two scenarios by driving closed-form expressions for the ergodic secrecy rate (ESR) in Rayleigh fading channel. We also calculate the high signal-to-noise ratio (SNR) slope and high SNR power offset of the optimized scenarios by finding the asymptotic ESR. Numerical results confirm the accuracy of our proposed theoretical analysis. The results also demonstrate that our proposed OPAs enhance the ESR performance compared with other power allocation techniques. Moreover, they show the effect of ICSI on the ESR such that as channel estimation error grows, the ESR performance reduction is occurred.

  相似文献   

9.
针对下行双用户NOMA (Non-Orthogonal Multiple Access)系统模型中存在智能窃听者,该窃听者可以自适应地选择被动窃听或主动干扰工作模式,在不精确了解其干扰水平的情况下,部分NOMA用户很有可能遭遇传输质量下降乃至保密中断,这将对信息安全传输构成严重威胁。另外,由于信道衰落,用户的位置对系统整体性能有很大影响,难以保证距离源节点较远用户的传输质量。为解决上述问题,本文提出了一种新型的两阶段用户协作方案。第一阶段,远用户采用全双工(full-duplex,FD)干扰智能窃听者,第二阶段,近用户可作为一个中继协助源节点转发远用户信号信息,并在接收端采用串行干扰消除(Successive Interference Cancellation, SIC)技术进行解码。使用户间达成合作,提高通信链路安全性和用户服务质量。考虑到系统中不同用户的信息接收速率与通信需求不同之间的相关性,分别推导了遍历安全容量和遍历容量的解析表达式,同时分析了功率分配因子和用户间协作发射功率等因素对性能的影响,并通过Monte-Carlo仿真验证了其正确性。   相似文献   

10.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

11.
Relay beamforming techniques have been shown to significantly enhance the sum capacity of a multiuser cooperative wireless network through the optimization of the relay weights, where concurrent communications of multiple source-destination pairs are achieved via spatial multiplexing. Further optimization of the transmit power allocation over the source nodes is expected to improve the network throughput as well. In this paper, we maximize the sum capacity of a multiuser cooperative wireless network through the joint optimization of power allocation among source nodes and relay beamforming weights across the relay nodes. We consider a two-hop cooperative wireless network, consisting of single-antenna nodes, in which multiple concurrent links are relayed by a number of cooperative nodes. When a large number of relay nodes are available, the channels of different source-destination pairs can be orthogonalized, yielding enhanced sum network capacity. Such cooperative advantage is particularly significant in high signal-to-noise ratio (SNR) regime, in which the capacity follows a logarithm law with the SNR, whereas exploiting spatial multiplexing of multiple links yields capacity increment linear to the number of users. However, the capacity performance is compromised when the input SNR is low and/or when the number of relay nodes is limited. Joint optimization of source power allocation and relay beamforming is important when the input SNR and/or the number of relay nodes are moderate or the wireless channels experience different channel variances. In these cases, joint optimization of source power and distributed beamforming weights achieves significant capacity increment over both source selection and equal source power spatial multiplexing schemes. With consideration of the needs to deliver data from each source node, we further examine the optimization of global sum capacity in the presence of individual capacity requirements by maximizing sum capacity of the network subject to a minimum capacity constraint over each individual user.  相似文献   

12.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

13.
This paper assumes two users and a two‐way relay network with the combination of 2×2 multi‐input multi‐output (MIMO) and nonorthogonal multiple access (NOMA). To achieve network reliability without sacrificing network throughput, network‐coded MIMO‐NOMA schemes with convolutional, Reed‐Solomon (RS), and turbo codes are applied. Messages from two users at the relay node are network‐coded and combined in NOMA scheme. Interleaved differential encoding with redundancy (R‐RIDE) scheme is proposed together with MIMO‐NOMA system. Quadrature phase‐shift keying (QPSK) modulation technique is used. Bit error rate (BER) versus signal‐to‐noise ratio (SNR) (dB) and average mutual information (AMI) (bps/Hz) versus SNR (dB) in NOMA and MIMO‐NOMA schemes are evaluated and presented. From the simulated results, the combination of MIMO‐NOMA system with the proposed R‐RIDE‐Turbo network‐coded scheme in two‐way relay networks has better BER and higher AMI performance than conventional coded NOMA system. Furthermore, R‐RIDE‐Turbo scheme in MIMO‐NOMA system outperforms the other coded schemes in both MIMO‐NOMA and NOMA systems.  相似文献   

14.
针对未来海量用户设备接入的物理层安全(physical layer security,PLS)应用需求,提出了一种组合非正交多址接入(non-orthogonal multiple access,NOMA)、终端直通(device-to-device,D2D)与中继协作的NOMA-D2D协作无线系统PLS模型。该模型由采用发射天线选择(transmit antenna selection,TAS)的基站、分别作为基站和D2D发射端的NOMA远端蜂窝用户、D2D接收端以及被动窃听者组成,其中的D2D发射端承担基站的 NOMA 近端用户和解码转发中继两种角色。利用高斯—切比雪夫正交定理推导两种 TAS 方案下NOMA-D2D协作无线系统的安全中断概率、非零安全容量概率以及渐近安全中断概率的近似表达式。数值计算和仿真实验验证了NOMA-D2D协作无线系统PLS性能分析的准确性;在基站总功率恒定时增大分配给远端蜂窝用户的功率能有效提升NOMA-D2D协作无线系统的PLS性能。  相似文献   

15.
We consider a multiuser two-way relay network where multiple pairs of users exchange information with the assistance of a relay node, using orthogonal channels per pair. For a variety of two-way relaying mechanisms, such as decodeand- forward (DF), amplify-and-forward (AF) and compress-andforward (CF), we investigate the problem of optimally allocating relay?s power among the user pairs it assists such that an arbitrary weighted sum rate of all users is maximized, and solve the problem as one or a set of convex problems for each relaying scheme. Numerical results are presented to demonstrate the performance of the optimum relay power allocation as well as the comparison among different two-way relaying schemes.  相似文献   

16.
张海洋  王保云  邓志祥 《信号处理》2013,29(8):1064-1070
为了提高MIMO窃听信道的可达安全速率,提出了基于广义奇异值分解的合作干扰策略。该策略中源节点和辅助节点同时采用基于广义奇异值分解的波束形成技术,源节点发送消息信号,辅助节点发送独立于消息信号的噪声信号,噪声信号对目的节点和窃听节点都产生干扰。此外设计了源节点和辅助节点采用合作干扰策略时的联合最优功率分配算法。该算法可以实现源节点和辅助节点在总功率受限时的可达安全速率最大化。仿真结果表明,与现有的非合作最优功率分配算法相比,本文提出的合作干扰策略在大信噪比时可以显著提高系统的可达安全速率。   相似文献   

17.
研究节点具备能量收集能力的中继窃听信道保密速率的优化问题,提出一种基于人工噪声协同干扰和节点间能量协同的物理层安全传输策略.各节点采用储能-发送模式工作,即先收集能量,再用于数据传输.中继节点采用放大转发方式,目的节点发送人工噪声进行协同干扰.由于中继节点所需功耗较高,目的节点将用于发送干扰之外的剩余能量转移给中继节点.给出以最大化保密速率为目标函数,优化能量吸收时间比例系数和干扰功率分配因子的两步优化算法.仿真结果表明人工噪声和能量协同的引入能有效提高系统的保密传输速率.  相似文献   

18.
In this paper, a scheme that exploits cooperative diversity of multiple relays to provide physical layer security against an eavesdropping attack is concerned. Relay‐based cognitive radio network (CRN) faces issues multiple issues other than the same as faced by conventional wireless communications. If the nodes in a CRN are able to harvest energy and then spend less energy than the total energy available, we can ensure a perpetual lifetime for the network. In this paper, an energy‐constrained CRN is considered where relay nodes are able to harvest energy. A cooperative diversity‐based relay and subchannel‐selection algorithm is proposed, which selects a relay and a subchannel to achieve the maximum secrecy rate while keeping the energy consumed under a certain limit. A transmission power factor is also selected by the algorithm, which ensures long‐term operation of the network. The power allocation problem at the selected relay and at the source also satisfies the maximum‐interference constraint with the primary user (PU). The proposed scheme is compared with a variant of the proposed scheme where the relays are assumed to have an infinite battery capacity (so maximum transmission power is available in every time slot) and is compared with a scheme that uses jamming for physical layer security. The simulation results show that the infinite battery‐capacity scheme outperforms the jamming‐based physical layer security scheme, thus validating that cooperative diversity‐based schemes are suitable to use when channel conditions are better employed, instead of jamming for physical layer security.  相似文献   

19.
The time switching‐based relaying (TSR) scheme is considered in energy harvesting protocol to implement with its advantage to nonorthogonal multiple access (NOMA) system. In particular, decode‐and‐forward (DF) mode is proposed to employ in relay to forward signal to serve two far NOMA users. There are two main metrics including outage probability and ergodic rate, which are derived in exact expressions with respect to varying performance under impacts of energy harvesting fractions. To evaluate system performance, outage event and related capacity are illustrated, and we tailor performance gap among two NOMA users and such gap can be controlled by selecting of appropriate power allocation factors assigned for each user to obtain optimal performance. By examining node arrangement, target rates and varying transmit signal to noise ratio (SNR), it can be further achieved performance in several situations of such NOMA. As important result, the considered NOMA system outperforms than the conventional multiple access scheme, and this expected result is confirmed in numerical result and theoretical results. We also explore impacts of transmit power at source, noise power, the other key parameters of energy harvesting scheme to exhibit outage, and ergodic performance. Simulation results are presented to corroborate the proposed methodology.  相似文献   

20.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号