首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 156 毫秒
1.
研究了瑞利衰落信道下协作非正交多址系统的安全性能。通信过程由一个时隙构成,源节点向中继广播叠加信号,全双工中继使用串行干扰消除技术解码信号协助用户通信。假设存在潜在全双工主动窃听者,窃听者能够从中继处截获信息并同时向用户发送人工噪声进行干扰。基于上述假设,在高信噪比条件下,推导了安全中断概率的近似表达式,分析了各节点传输信噪比与功率分配因子对系统中断概率的影响,分析结果与蒙特卡洛仿真结果吻合。  相似文献   

2.
该文研究了衰落信道中基于译码-转发的多中继合作分集系统的功率分配问题。假设源节点有完全的信道状态信息,在总功率一定的条件下,以最小化系统的中断(outage)概率为目标,给出了如何选择中继节点以及如何在源节点和所选中继节点之间进行功率分配的算法。通过在任何时候最大化系统的瞬时容量来最小化系统的中断概率。仿真结果表明,该文提出的算法性能优于平均分配功率时系统的性能。  相似文献   

3.
基于译码-转发的多中继合作分集系统的功率分配   总被引:1,自引:0,他引:1  
该文研究了衰落信道中基于译码-转发的多中继合作分集系统的功率分配问题。假设源节点有完全的信道状态信息,在总功率一定的条件下,以最小化系统的中断(outage)概率为目标,给出了如何选择中继节点以及如何在源节点和所选中继节点之间进行功率分配的算法。通过在任何时候最大化系统的瞬时容量来最小化系统的中断概率。仿真结果表明,该文提出的算法性能优于平均分配功率时系统的性能。  相似文献   

4.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

5.
程英  李光球  沈静洁  韦亮 《电信科学》2021,37(9):95-104
针对合谋窃听场景下单天线多中继修改转发(MF)协作无线系统的安全性能较差问题,提出一种合谋窃听场景下联合源节点发送天线选择(TAS)和多中继选择的MF协作物理层安全系统,考虑最优的最大化主信道信噪比(SNR)和次优的最大化源节点-中继节点链路 SNR 两种中继选择方案,推导其安全中断概率(SOP)和遍历安全容量(ESC)的解析表达式。最优或次优中继选择的MF安全中继系统的SOP和ESC的数值计算结果与仿真结果相吻合,验证了上述理论分析的正确性;同时也表明源节点发射天线数和中继节点数越多、窃听节点数越少,最优或次优中继选择的MF安全中继系统的物理层安全性能越好。  相似文献   

6.
杨炜伟  陈剑  陈德川 《电子学报》2019,47(8):1792-1796
射频能量采集技术为能量受限无线通信系统提供了一种有效的能量供给方式.假设能量受限中继节点具有射频能量采集能力,本文设计了中继非可信情况下的物理层安全传输方案,配置多天线的源节点采用发送天线选择策略来增强中继节点的能量采集性能,目的节点发送人工干扰来抑制非可信中继对保密信息的窃听.在瑞利块衰落信道条件下研究了所提方案的物理层安全性能,推导了系统安全中断概率、连接中断概率和安全吞吐量的闭式表达式.计算机仿真验证了理论推导的正确性,揭示了各系统参数对物理层安全性能的影响关系.  相似文献   

7.
针对瑞利衰落信道下双向多中继协作通信系统,为了降低中断概率,提出了一种基于最小化中断概率的中继选择策略和功率分配方案。首先联合考虑两条链路的中继节点处信噪比和信道增益实现双链路中继选择,然后推导出一种新的最优中继下双向放大转发协作中断概率的近似表达式上界,并利用凸优化求解得到使中断概率最小的最优功率分配解。仿真结果表明,与现有策略相比,提出的策略能够明显降低系统中断概率和误码率,显著提高系统性能。  相似文献   

8.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

9.
孙立悦  赵晓晖  虢明 《通信学报》2013,34(10):10-91
研究了功率受限情况下多中继协作通信网络的中继选择和功率优化问题。在AF网络中,提出了一种低复杂度中继选择与功率分配算法,其目标是在总功率一定的条件下使系统的中断概率最小。本算法对源节点和所有潜在中继节点进行功率分配,结合当前信噪比选择最优的中继集合,通过最速下降法求出使系统中断概率最低的功率分配因子。该算法不需要知道大量瞬时信道信息、不需要系统在等功率条件下进行中继选择,只需求得中继节点排列矩阵便可根据当前信噪比自适应获得最优中继节点集合。仿真结果表明,在相同条件下,该算法明显优于不同中继节点集合下几种算法的中断性能,并且与传统的SAF及AAF算法相比,有效降低了中断概率,提升了系统性能和功率效率。  相似文献   

10.
任婷洁  李光球  程英 《电信科学》2019,35(8):111-119
为了考察使用多中继选择与多用户选择的放大转发(AF)中继系统的物理层安全性能,推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量概率和安全中断概率的精确表达式以及在高信噪比下的渐近安全中断概率解析表达式。AF中继系统的非零安全容量概率和安全中断概率的数值计算和仿真结果相吻合,验证了以上理论分析的正确性;分析结果表明,其安全分集增益为源节点发射天线数、最优中继节点接收天线数、中继节点数的三者乘积与最优中继节点发射天线数、最优用户接收天线数、用户数三者乘积之间的最小值,且与窃听信道无关。  相似文献   

11.
丁长文  杨霖  李高祥 《电子学报》2017,45(5):1124-1129
为了实现双向中继系统在满足传输速率要求时的最小功率消耗,基于功率分割中继协议,在完美和非完美的信道估计两种不同的情况下,提出了能量收集双向中继网络的高能效联合中继选择和功率分配算法,得到了两个信源的最优功率分配和中继节点最优的能量收集比例.仿真结果表明,信道估计误差会增加系统的功率消耗;与传统双向中继比较发现,能量收集双向中继能够实现更少的系统功率消耗.  相似文献   

12.
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work.  相似文献   

13.
The performance in cooperative communication depends on careful resource allocation such as relay selection and power control, but the traditional centralized resource allocation requires precise measurements of channel state information (CSI). In this paper, we propose a distributed game-theoretical framework over multiuser cooperative communication networks to achieve optimal relay selection and power allocation without knowledge of CSI. A two-level Stackelberg game is employed to jointly consider the benefits of the source node and the relay nodes in which the source node is modeled as a buyer and the relay nodes are modeled as sellers, respectively. The proposed approach not only helps the source find the relays at relatively better locations and "buy” an optimal amount of power from the relays, but also helps the competing relays maximize their own utilities by asking the optimal prices. The game is proved to converge to a unique optimal equilibrium. Moreover, the proposed resource allocation scheme with the distributed game can achieve comparable performance to that employing centralized schemes.  相似文献   

14.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

15.
The outage probability (OP) performance of transmit antenna selection (TAS) in a decode-and-forward relaying mobile-to-mobile system with relay selection over N-Nakagami fading channels is investigated. Exact closed-form expressions for the OP of two TAS schemes are derived, and the optimal power allocation optimisation problem is formulated. The OP performance is evaluated via Monte Carlo simulation to verify the analysis. The results obtained show that the optimal TAS scheme has better performance than the suboptimal TAS scheme, but the performance gap between these techniques decreases as the number of source antennas increases.  相似文献   

16.
This article studies a secure communication of a simultaneous wireless information and power transfer system in which an energy-constrained untrusted relay, which harvests energy from the wireless signals, helps the communication between the source and destination and is able to decode the source’s confidential signal. Additionally, the source’s confidential signal is also overheard by a passive eavesdropper. To create positive secrecy capacity, a destination-assisted jamming signal that is completely cancelled at the destination is adopted. Moreover, the jamming signal is also exploited as an additional energy source. To evaluate the secrecy performance, analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity are derived. Moreover, a high-power approximation for the SOP is presented. The accuracy of the analytical results is verified by Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as the energy-harvesting efficiency, secrecy rate threshold, power-splitting ratio, transmit powers, and locations of the relay and eavesdropper, on the secrecy performance.  相似文献   

17.
In this paper, we investigate the performance of a multiuser wireless relay network with each of its nodes equipped with N antennas and transmit beamforming at its source and relay, where multiuser diversity (MD) is exploited to further improve the system performance. In the first part of this paper, by deriving the approximate error performance expression for a single‐relay MD system without the direct link, we obtain the maximum diversity order achievable by the CSI‐assisted amplify‐and‐forward (CAF) protocol. Then, by taking the direct link into consideration, we propose a sub‐optimal transmit beamforming scheme and show the performance loss is very small. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

18.
In this paper, we study end-to-end performance of transmit antenna selection (TAS) and maximal ratio combining (MRC) in dual hop amplify-and-forward relay network in flat and asymmetric Nakagami-m fading channels. In the network, source and destination communicate by the help of single relay and source-destination link is not available. Source and destination are equipped with multiple antennas, and relay is equipped with single antenna. TAS and MRC are used for transmission at the source and reception at the destination, respectively. The relay simply amplifies and forwards the signal sent by the source to the destination by using channel state information (CSI) based gain or fixed gain. By considering relay location, for CSI based and fixed relay gains, we derive closed-form cumulative distribution function, moments and moment generating function of end-to-end signal-to-noise ratio, and closed-form symbol error probability expression. Moreover, asymptotical outage probability and symbol error probability expressions are also derived for both CSI based and fixed gains to obtain diversity order of the network. Analytical results are validated by the Monte Carlo simulations. Results show that diversity order is minimum of products of fading parameter and number of antennas at the end in each hop. In addition, for optimum performance the relay must be closer to the source when the diversity order of the first hop is smaller than or equal to that of the second hop.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号