首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 125 毫秒
1.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

2.
对多输入多输出(MIMO)相关衰落信道上宽带码分多址接入(WCDMA)的安全性能进行评估,一种省时高效的解决方案是理论分析法。推导了相关 Nakagami 衰落信道上采用空时分组码和二维瑞克接收机(2D-Rake)的 WCDMA 系统的非零安全容量概率和安全中断概率的精确解析表达式。利用上述表达式,可以快速地评估收发天线数、天线相关系数、Nakagami衰落系数、平均路径衰减系数等参数对WCDMA系统安全性能造成的影响。数值计算和仿真结果相吻合,证明了以上理论分析的正确性。推导了WCDMA系统渐近安全中断概率的解析表达式。结果表明,WCDMA 系统的安全分集增益为主信道各个可分离路径上的分集增益之和,与窃听信道无关;对于恒定多径强度轮廓的同分布Nakagami衰落信道,WCDMA系统的安全分集增益为主信道的收/发天线数、多径个数以及Nakagami衰落系数四者之积。  相似文献   

3.
根据Alamouti最大似然译码方法,给出了在正交空时分组码传输的衰落信道条件下接收机输出瞬时信噪比的一般表达式,分析了瑞利衰落信道条件下引入正交空时分组码的多天线系统的符号差错性能,研究表明采用正交空时码传输信号,增加发送天线数量和接收天线数量都可以得到更大的分集增益;在接受天线数量一定的情况下,增加发送天线的数量可以带来更大的分集增益,但当发送天线数量增加到一定程度后,再增加发送天线数量就不能带来明显的分集改善了。  相似文献   

4.
杨炜伟  陈剑  陈德川 《电子学报》2019,47(8):1792-1796
射频能量采集技术为能量受限无线通信系统提供了一种有效的能量供给方式.假设能量受限中继节点具有射频能量采集能力,本文设计了中继非可信情况下的物理层安全传输方案,配置多天线的源节点采用发送天线选择策略来增强中继节点的能量采集性能,目的节点发送人工干扰来抑制非可信中继对保密信息的窃听.在瑞利块衰落信道条件下研究了所提方案的物理层安全性能,推导了系统安全中断概率、连接中断概率和安全吞吐量的闭式表达式.计算机仿真验证了理论推导的正确性,揭示了各系统参数对物理层安全性能的影响关系.  相似文献   

5.
侯晓赟  黄庭金  朱艳  范伟 《信号处理》2014,30(11):1263-1266
针对未来多天线通信系统的安全问题,提出了一种增强无线物理层安全的传输策略。该策略基于发射天线的选择以及人工噪声,并采用Alamouti编码。它可以使发射机和接收机以较低的复杂度代价提高合法信道的分集增益,同时有效干扰窃听信道,使通信系统获得更高的安全容量。对系统安全容量、天线数量、以及信息信号与人工噪声之间的功率分配等问题进行了研究,仿真结果表明,该传输策略能够有效地增强物理层安全。   相似文献   

6.
张燕  岳殿武 《电讯技术》2015,55(1):7-12
针对空间调制(SM)技术存在的缺欠,提出了具有天线选择和中继选择的空间调制系统方案。首先在多输入多输出(MIMO)信道模型下,通过对发送端天线选择,将拥有最佳信道状态的天线选出进行SM,打破SM技术对发送端天线数的限制,并提升采用高阶调制的SM分集性能。然后进一步将此思想引入协作通信网络,结合传感器网络的分级观念,提出采用中继选择和空间调制的中继传输协议,并通过仿真观察系统分集性能的改善。仿真结果表明,上述中继传输协议不仅能提升系统性能,而且使系统配置更加灵活。  相似文献   

7.
《无线电通信技术》2018,(3):224-229
物理层安全作为一种密钥缺省的安全方案,逐渐成为信息安全和无线通信两个领域的交叉热点,其主要利用物理层传输资源保证合法接收者正常通信,同时抑制窃听信道通信。针对这一特点,提出了基于无线通信网络中窃听用户多天线、发送端多用户调度,合法接收端选择最好用户的模型,这时窃听用户进行随机选择,分析这种情况下主信道信噪比、窃听信道信噪比、安全传输速率以及窃听用户天线数目对系统安全性能的影响。仿真结果表明,窃听信道多天线时中断概率增加,即降低了系统的安全性能,但增加发送端用户数目、降低窃听信道信噪比、增加主信道信噪比可以显著提高系统的安全速率。同时证明,这种方案同随机选择发送用户相比较,切实提高了系统的安全性能。  相似文献   

8.
针对窃听节点随机分布的MISO系统通信场景,该文分析了智能反射面(IRS)辅助下的安全通信性能。采用随机几何理论,将窃听节点建模为均匀泊松点过程(PPP)。合法发送节点采用天线选择策略,选择最优链路发射信号,并部署智能反射面实时调控反射相移增强链路质量,然后以传输安全中断概率为性能指标,推导了其闭式表达式,分析了反射单元数量、发射天线数量等参数对中断概率的影响,最后给出了最大化安全性能的参数选择策略。仿真结果验证了理论分析的正确性,并表明部署反射面可以在低能耗下提升安全性能。  相似文献   

9.
由于无线传输环境的复杂性,使得接收端必须采用抗信道衰落的技术,分集技术就是抗信道衰落的最有效措施之一。本文介绍了SIMO系统3种常见分集合并方式的基本原理及合并准则,分析了分集接收天线数与系统性能及系统复杂度之间的关系,并在瑞利衰落信道中采用16-QAM调制的情况下,对3种分集技术的误码率性能进行了仿真。结果表明MRC性能最好,EGC性能稍差,SC性能较差。但3种合并技术的算法复杂度正好相反,在实际应用中可根据需要进行折衷。  相似文献   

10.
针对多天线无线携能单用户多入多出(Multiple-Input Multiple-Output,MIMO)系统,在能量塔采用时隙切换方案的基础上,考虑信源采用最大比传输、接收方采用选择合并方案、窃听方采用最大比合并方案情况,针对窃听信道的信道状态信息已知和未知的情况,分别推导出系统安全中断概率、窃听概率和遍历安全容量的理论表达式,并通过蒙特卡洛仿真验证了理论表达式的准确性。结果表明,多天线在窃听信道平均信噪比较低的场景下对系统安全性能的提升更为显著;时隙切换因子、发送端能量转换效率的提高对系统窃听概率的降低无贡献,但能降低系统安全中断概率或提高系统遍历安全容量。  相似文献   

11.

This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers is trying to overhear the secret transmission. Our key contribution is to prevent this malicious attack of the illegitimate receivers. Rayleigh/ Rician mixed fading channels are considered to model alternately the multicast/ eavesdropper and eavesdropper/ multicast channels as such mixed fading scenarios are often encountered in cellular communication where only one link (either multicast or eavesdropper) undergo a line-of-sight propagation path. At first, we derive the probability density functions for the single-input-multiple-output multicast scenarios and then the secrecy analysis is carried out by obtaining closed-form expressions for the performance matrices such as the probability of non-zero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting. The derived expressions are beneficial to investigate how the antenna diversity can combat the detrimental impact of fading as well as the number of multicast users and eavesdroppers, and improve the secrecy level to the acceptable limit. Moreover, the best secure scenario in terms of the secrecy parameters is obtained when the multicast channels undergo Rician fading whereas the eavesdropper channels experience Rayleigh fading. Finally, the analytical expressions are justified via the Monte-Carlo simulations.

  相似文献   

12.
Broadband wireless communication users for 5G networks are primarily implemented in a complicated environment; the complex environment of time-varying multi-path propagation characteristics will seriously affect the performance of communication. One of the core technologies to overcome this problem is to introduce the environment adaptive technique—time reversal in the wireless link. Further, the problem of a Wiretap Channel in physical layer security research has become a popular research topic in recent years. To resolve the physical layer wiretap channel and multi-path fading problems in wireless channels, a novel concept of combining time reversal technology with physical layer security technology is proposed. In this paper, a physical layer secure transmission scheme based on the joint time reversal technique and artificial noise at the sending end is proposed for the wireless multi-path channel. First, in a typical wiretap channel model, the time reversal technique is used to improve the security of the information transmission process by using the properties of spatial and temporal focusing. Second, as the information is easily eavesdropped near the focus point, artificial noise is added to the sending end to disrupt the eavesdropping capability of the eavesdropper. Finally, due to the complexity of the multi-path channels, the influence of the antenna correlation on the system security performance is considered. Compared with the existing physical layer security schemes, theoretical analysis and simulation results show that the proposed scheme has a higher secrecy signal-to-noise ratio, a higher rate of secrecy, and a lower bit error rate of legitimate user.  相似文献   

13.
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as untrusted nodes in some certain circumstances.Based on this,to enhance the secrecy performance of untrusted relay systems,a novel full-duplex destination jamming (FDJ) scheme was proposed in the Rayleigh fading channel.In order to maximize the system’s secrecy capacity,a switchable split-optimal antenna selection (OAS) scheme was proposed for a multiple-antenna destination,the power allocation optimization scheme between the source and destination was designed,and the corresponding closed-form expressions of secrecy performance were given.In the large-scale antennas analysis,the closed-form expressions of the ergodic achievable secrecy rate and the optimal power allocation factor of instantaneous secrecy capacity for the FDJ-OAS scheme were derived.Furthermore,based on different asymptotic cases,the asymptotic analyses of secrecy outage probability for the FDJ-OAS scheme were significantly analyzed.Simulation results show that the analytical curves match well with the Monte-Carlo simulation results.It is concluded that the diversity order of the FDJ-OAS scheme is proportional to the number of antennas and antenna diversity can be achieved,which reveals the advantages of the proposed FDJ-OAS scheme.  相似文献   

14.
孙晓惠  尹长川 《电子学报》2014,42(9):1847-1851
本论文利用双变量泊松点过程对无线ad hoc广播网络和非法窃听网络共存的网络场景进行建模,运用随机几何工具,研究了无线ad hoc网络的保密广播传输容量,其定义为未发生窃听中断的广播发送节点密度、广播发送节点的相邻接收节点数量的平均值与保密速率的乘积.针对一般衰落和瑞利衰落信道条件,论文推导了造成保密中断的相邻窃听节点数量的平均值和保密广播传输容量的表达式.分析结果表明,与不存在相关性的网络场景相比,广播网络和窃听网络间的相关性会带来的保密广播传输容量的损失.  相似文献   

15.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

16.
We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information and null space Artificial Noise (AN) while receiving information. Because the Channel State Information (CSI) of the eavesdropper is unavailable, we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint. As a result, the power of AN is maximized within the limit of total power, so the interception capability of the eavesdropper is suppressed as much as possible. Since self-interference cannot be completely eliminated, the optimization process of one legitimate node depends on the optimization result of the other. By substituting self-interference power in the secrecy rate formula with its average value, the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes. Then, the Water-Filling Algorithm (WFA) and bisection algorithm are used to get the optimal covariance matrices of the signal. Furthermore, we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme. The simulation results show that the theoretical derivation is correct, and the actual achievable rate is very close to the target rate, which means that the approximation in the optimization is feasible. The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved.  相似文献   

17.
We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all receivers are to obtain a common message; and 2) each receiver is to obtain an independent message. Moreover, two models are considered: parallel channels and fast-fading channels. For the case of reversely degraded parallel channels, one eavesdropper, and an arbitrary number of legitimate receivers, we determine the secrecy capacity for transmitting a common message, and the secrecy sum-capacity for transmitting independent messages. For the case of fast-fading channels, we assume that the channel state information of the legitimate receivers is known to all the terminals, while that of the eavesdropper is known only to itself. We show that, using a suitable binning strategy, a common message can be reliably and securely transmitted at a rate independent of the number of receivers. We also show that a simple opportunistic transmission strategy is optimal for the reliable and secure transmission of independent messages in the limit of large number of receivers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号