首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 140 毫秒
1.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

2.
在存在一个半双工自适应窃听者的通信模型中,分析了采用非正交多址(Non-orthogonal Multiple Access,NOMA)技术合作系统的性能。提出了一种新型的合作NOMA方案,该方案在中继转发时,强用户可充当中继协助转发弱用户信号,而弱用户采用全双工技术向窃听者发送干扰信号,提高了通信链路的安全性和用户的服务质量。合法接收端采用连续干扰消除(SIC)技术,以解码来自叠加信号的各个消息。在已知窃听信道统计信道状态信息(CSI)的情况下,分别推导了2个用户的安全中断概率和中断概率的闭合表达式,并通过Monte-Carlo仿真验证。理论分析和数值模拟结果均表明所提出的NOMA用户合作方案在保密率方面优于非合作方案的性能。  相似文献   

3.
龙恳  谭路垚  王奕  陈兴  王亚领 《电讯技术》2022,62(1):116-122
针对协作非正交多址接入(Non-orthogonal Multiple Access,NOMA)系统中用户充当中继并存在窃听者的场景,提出了一种新型协作干扰传输方案,以提高该系统的安全性.在第一时隙,基站将混合信号进行广播,同时为了干扰窃听者,信道条件较差的用户采用全双工的工作模式,发出协作干扰信号对窃听者进行干扰.在...  相似文献   

4.
由于非正交多址接入(Non-orthogonal Multiple Access,NOMA)能够显著提升系统的频谱资源利用率,在下一代移动通信中得到广泛应用。对NOMA环境下多中继协作网络的最优中继选择方案和系统安全性能进行了分析和讨论,其中包含窃听者仅窃听中继和窃听者同时窃听中继及源节点这2种情况下的系统安全性能表现,并与相同场景下正交多址接入(Orthogonal Multiple Access,OMA)网络进行了对比。最终的理论分析和仿真结果表明,在所提出系统模型中,当信道条件相同时,NOMA网络总能取得相较于OMA网络更好的安全性能,同时随着系统中继节点数目的增多,NOMA网络在物理层安全性能上获得更大的优势。  相似文献   

5.
针对下行双用户NOMA (Non-Orthogonal Multiple Access)系统模型中存在智能窃听者,该窃听者可以自适应地选择被动窃听或主动干扰工作模式,在不精确了解其干扰水平的情况下,部分NOMA用户很有可能遭遇传输质量下降乃至保密中断,这将对信息安全传输构成严重威胁。另外,由于信道衰落,用户的位置对系统整体性能有很大影响,难以保证距离源节点较远用户的传输质量。为解决上述问题,本文提出了一种新型的两阶段用户协作方案。第一阶段,远用户采用全双工(full-duplex,FD)干扰智能窃听者,第二阶段,近用户可作为一个中继协助源节点转发远用户信号信息,并在接收端采用串行干扰消除(Successive Interference Cancellation, SIC)技术进行解码。使用户间达成合作,提高通信链路安全性和用户服务质量。考虑到系统中不同用户的信息接收速率与通信需求不同之间的相关性,分别推导了遍历安全容量和遍历容量的解析表达式,同时分析了功率分配因子和用户间协作发射功率等因素对性能的影响,并通过Monte-Carlo仿真验证了其正确性。   相似文献   

6.
《无线电通信技术》2018,(3):224-229
物理层安全作为一种密钥缺省的安全方案,逐渐成为信息安全和无线通信两个领域的交叉热点,其主要利用物理层传输资源保证合法接收者正常通信,同时抑制窃听信道通信。针对这一特点,提出了基于无线通信网络中窃听用户多天线、发送端多用户调度,合法接收端选择最好用户的模型,这时窃听用户进行随机选择,分析这种情况下主信道信噪比、窃听信道信噪比、安全传输速率以及窃听用户天线数目对系统安全性能的影响。仿真结果表明,窃听信道多天线时中断概率增加,即降低了系统的安全性能,但增加发送端用户数目、降低窃听信道信噪比、增加主信道信噪比可以显著提高系统的安全速率。同时证明,这种方案同随机选择发送用户相比较,切实提高了系统的安全性能。  相似文献   

7.
针对无线多播系统同时存在内、外部窃听者的复杂情况,提出随机化干扰的物理层多播安全传输算法。该算法基于收发天线构成信道的代数空间进行设计:一方面在内部窃听者的信道代数空间方向上不发送信息,另一方面在合法用户信道的正交方向上引入随机干扰信号。这样直接使得内部窃听者接收的信号受到能量削减的同时,非合法用户受到随机化干扰,最终实现了物理层多播信息的安全传输。理论分析和仿真结果表明,算法可同时保证系统内、外部窃听者极高的误码率,从而无法获取信息。  相似文献   

8.
在物理层安全中,可以通过抑制窃听者信道估计的准确性间接提高合法接收者和窃听者间的接收信号质量差距,从而提高信号传输安全性.给出一种基于友好干扰者协助的区别信道估计机制,该方案借助于友好干扰者发送人工噪声来干扰窃听者的信道估计过程.进一步,基于窃听者的信道估计误差最大化给出了训练序列和人工噪声之间的最优功率分配,更好地抑制了窃听者信道估计的质量.仿真结果表明,新方法能有效地抑制窃听者信道估计的性能,提高合法接收者和窃听者间的接收信号质量差距.  相似文献   

9.
针对无线网状网中缺少窃听者先验知识不利场景中的安全连接问题,提出了一种结合全双工和协作干扰技术的物理层安全策略。利用全双工通信中的自干扰消除技术和协作干扰技术,提出的安全策略可有效劣化位于信息传播范围内包括潜伏在接收节点附近窃听者的接收性能。为保证信息的安全传输给出了协作干扰节点的选择方法,基于随机几何等数学方法导出了选定路径的安全连接概率表达式。性能分析和仿真结果表明,所提方法与仅基于全双工或协作干扰技术的方法相比,其安全性能有较大提升。  相似文献   

10.
在无线通信系统中,用户与窃听中继协作将导致信息泄露,为保证自身通信安全需向协作干扰者支付报酬购买干扰功率,导致自身效益降低。为了在安全通信的同时提高用户效益,提出一种基于斯塔克伯格的联合中继和干扰的功率分配机制。在窃听中继协作转发、空闲用户协作干扰的场景下,建立三方博弈的斯塔克伯格博弈模型:将通信用户建模为功率购买者,窃听中继和空闲用户建模为功率出售者,有效刻画了安全与效益的折中关系。仿真结果表明,所提联合功率分配方案会在数次迭代后收敛到所有节点收益最大值,同时也是发送方通信安全容量的最大值,比中继全功率发送时提高了0.2(bit·s~(-1))·Hz~(-1),提高用户安全性能。  相似文献   

11.
Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.  相似文献   

12.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   

13.
针对无线网络存在安全威胁和能量受限的问题,该文研究了基于ST(Save-then-Transmit)协议的能量收集型高斯窃听信道的安全通信。首先,对系统安全速率最大化进行研究;其次,为进一步提高系统安全速率,给出了协作抗干扰方案,并讨论了该方案提高安全速率的充分必要条件,且提出了该方案下安全速率的迭代优化算法;最后,给出了一种复杂度低的单辅助端的选择方案。仿真结果表明,第1种优化方案明显提高了系统的安全速率;第2种协作抗干扰方案可进一步提高系统的安全速率且收敛速度较快;当原能量收集型高斯窃听信道不能进行安全通信时,协作抗干扰方案可在一定条件下实现安全传输。  相似文献   

14.
As demand for highly reliable data transmission in wireless networks has increased rapidly, cooperative communication technology has attracted a great deal of attention. In cooperative communication, some nodes, called eavesdroppers, illegally receive information that is intended for other communication links at the physical layer because of the broadcast characteristics of the wireless environment. Hence, Physical Layer Security is proposed to secure the communication link between two nodes against access by the eavesdroppers. In this paper, we propose and analyze the performance of decode-and-forward schemes with the best relay selection under Physical Layer Security with two operation protocols: first, only cooperative communication, and second, a combination of direct transmission and cooperative communication (the incremental protocol). In these schemes, a source transmits data to a destination with the assistance of relays, and the source-destination link is eavesdropped by one other node. The best relay is chosen in these proposals based on the maximum Signal-to-Noise ratio from the relays to the destination, and satisfies the secure communication conditions. The performance of each system is evaluated by the exact outage probability of the data rate over Rayleigh fading channels. Monte-Carlo results are presented to verify the theoretical analysis and are compared with a direct transmission scheme under Physical Layer Security and compared with each other.  相似文献   

15.
传统协同分集通过使网络中各单天线用户共享彼此天线,形成虚拟多天线阵列来实现空间分集,使得体积和功耗受限的网络终端也能获得分集增益,然而这并没有将信道编码和空时编码结合起来以使系统得到编码增益。为了能够获得编码增益来进一步改善系统性能,本文提出了一种基于信道编码和分布式空时分组码级联方式下的两用户协同分集方案,并且在准静态的瑞利衰落信道下对系统误码性能进行了理论推导和系统仿真,给出了误比特率的上限解析表达式。在协同用户间信道存在噪声的情况下,我们分别对CRC-DSTBC和CC-DSTBC级联下的发射方案进行了性能分析和系统仿真。仿真结果表明:即使协同用户间的信道存在噪声,本文所提出的协同分集方案与传统协同分集相比,不但获得了分集增益,同时也得到了编码增益,系统误比特率大大降低,从而显著提高了系统性能,并且这也和理论分析相吻合。  相似文献   

16.
Zhang  Yuanyu  Shen  Yulong  Jiang  Xiaohong 《Wireless Networks》2019,25(7):4077-4095

This paper investigates the physical layer security-based secure communication in a finite Poisson network with social friendships among nodes, for which a social friendship-based cooperative jamming scheme is proposed. The jamming scheme consists of a Local Friendship Circle (LFC) and a Long-range Friendship Annulus (LFA), where all legitimate nodes in the LFC serve as jammers, but the legitimate nodes in the LFA are selected as jammers through three location-based policies. To understand both the security and reliability performances of the proposed scheme, we first derive analytical expressions for the transmission outage probability and determine both the upper and lower bounds on the secrecy outage probability, given the basic Laplace transform of the sum interference at any location in the network. With the help of the tools from stochastic geometry, we then provide general expressions for the above Laplace transform under all path loss scenarios as well as closed-form Laplace transform results under two typical path loss cases, such that the overall outage performances of the proposed scheme can be depicted. Finally, we present extensive numerical results to validate our theoretical analysis and also to illustrate the impacts of the friendship-based cooperative jamming on the network performances.

  相似文献   

17.

Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal multiple access (NOMA) methods are analyzed under presence of multiple eavesdroppers. A channel state information of both the considered system and eavesdroppers is assumed to be outdated and eavesdroppers eavesdrop information signals independently. A closed-form of secure outage probability (SOP), secrecy throughput of every user is derived to evaluate the secrecy performance, and the mathematical analysis approach is verified by the Monte-Carlo simulation. Furthermore, the Golden-Section Search algorithm is proposed to find the maximum of the secrecy throughput of the considered FD-NOMA system. Numerical results indicate that there exists the SOP floor in the considered system and it is constrained by the channel gain of near user. Moreover, there is the optimal signal to interference plus noise ratio value which minimizes the SOP of the system regardless of the number of eavesdroppers. In comparison with half-duplex NOMA model, the SOP of FD-NOMA model is better.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号