首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 234 毫秒
1.
针对反向散射通信系统信道估计不准、信息容易被窃听等问题,该文提出一种基于用户窃听的多用户-多输入单输出(MU-MISO)反向散射通信系统鲁棒资源分配算法,以提高系统传输鲁棒性与信息安全性。首先,考虑基站最大功率、时间分配、信道不确定性、能量收集和保密率等约束,建立一个MU-MISO的反向散射通信系统鲁棒资源分配问题。其次,基于非线性能量收集模型和有界球形信道不确定性模型,利用变量松弛法和S过程将原NP-hard问题转化为确定性问题,随后利用连续凸近似、半正定松弛与块坐标下降法将其转化为凸优化问题求解。仿真结果表明,与传统非鲁棒算法对比,所提算法具有较高的系统容量和较低的中断概率。  相似文献   

2.
为了解决恶意干扰攻击、窃听和不完美信道状态信息造成的通信质量降低和安全性差等问题,该文提出一种智能反射面(IRS)辅助的抗干扰安全通信系统鲁棒资源分配算法。首先,基于合法用户的最小安全速率约束、最大发射功率约束和IRS相移约束,在非法节点不完美信道状态信息、干扰器波束成形向量未知的情况下,构建了一个联合优化基站的波束成形向量、人工噪声的协方差矩阵和IRS的相移矩阵的鲁棒资源分配问题。其次,为了求解该非凸问题,利用交替优化、Cauchy-Schwarz不等式、连续凸逼近和泰勒级数展开等方法,将原问题转化为易于求解的凸优化问题。仿真结果表明,与传统算法相比所提算法能有效提高系统安全性、降低功率开销、提高抗干扰裕度,且在一定信道误差范围内能够减低约35%的保密中断概率,具有较强的鲁棒性。  相似文献   

3.
针对无人机上行通信链路的窃听攻击,提出一种全双工协同干扰的安全传输策略。方案利用收发双方在数据传输不同阶段的信息差异以及掌握的先验信息特征,向待传输信号注入人工噪声信号,从而使窃听链路形成干扰受限系统。在发射功率、无人机的机动性等约束条件下,建立最大化系统保密速率的联合优化问题,基于交替优化方法和连续凸近似技术将非凸问题转化为两个子问题,并设计了一种迭代优化算法进行求解。仿真结果表明,所提安全传输方案与其他参照方案相比,能够显著提高全双工无人机中继通信系统的保密速率,表现出更好的性能。  相似文献   

4.
晏万才  李方伟  王明月 《电讯技术》2023,63(12):1985-1994
针对多天线无线携能通信系统中能量收集节点作为潜在窃听者的信息安全问题,提出了一种智能反射面(Intelligent Reflecting Surface, IRS)和人工噪声辅助的物理层安全传输方案。首先考虑发射功率、能量收集门限以及IRS单位模约束,以最大化系统安全速率为优化目标,在合法用户直射链路不可用的情况下,联合设计发射端波束赋形矩阵、人工噪声协方差矩阵以及IRS相移矩阵,建模一非线性多变量耦合的非凸优化问题;接着利用均方误差准则等价转换非凸目标函数,并利用连续凸逼近方法(Successive Convex Approximation, SCA)处理非凸的能量收集约束;最后基于交替优化框架,分别用拉格朗日对偶方法和基于价格机制的优化最小化(Majorization-Minimization, MM)算法求解发射端变量和IRS端变量。仿真结果表明,与现有方案相比,所提算法能够在保障能量收集需求的同时大幅度提升系统的安全性能。  相似文献   

5.
该文研究智能反射表面(Intelligent Reflecting Surface, IRS)辅助的多用户下行系统中的物理层安全的优化问题。多个用户之间的信息需要相互保密,每个时隙,非信息传输的目标用户视为窃听者,因此这是一个多窃听者的安全传输系统。由于信道的时变性,基站拥有窃听信道的信道状态信息(Channel State Information, CSI)为与真实的CSI间存在误差的过时信息。在此条件下,以系统最坏情况下的保密速率最大化为目标,对基站发射信息信号和人工噪声波束成形矢量,以及IRS的相移矩阵进行联合优化。原始优化问题为非凸半正定规划问题,利用松弛变量、惩罚函数、Charnes-Cooper变换和交替迭代优化等方法将原问题转化为凸问题并求解。仿真结果显示,相较于基准方案,该文所提出的优化算法能有效提高系统的保密速率。  相似文献   

6.
尹沛桐  李欢  叶迎晖  卢光跃 《电讯技术》2024,64(7):1140-1146
针对双站反向散射通信(Backscatter Communication,BackCom)网络易遭受恶意窃听的问题,提出了隐蔽双站BackCom网络。推导了窃听者检测错误概率和BackCom传输中断概率来刻画其信息传输的隐蔽性与可靠性,并提出一种方法在满足隐蔽性约束下来进一步提高系统的传输性能。利用统计信道状态信息,在高信噪比条件下依次推导窃听者检测错误概率BackCom中断概率的闭合表达式。通过联合优化窃听者的检测阈值和BackCom发射机的反射系数,构建一个BackCom传输中断概率最小化的非凸多维资源分配问题。为了解决该非凸问题,采用块坐标下降法(Block Coordinate Descent,BCD)将其分解为两个子问题。在此基础上,深入分析子问题的结构特性并利用目标函数关于反射系数的单调递减特性设计一种基于BCD的迭代算法,以此求解转换问题。仿真结果验证了分析结果的正确性并且所提方案能够提升基准方案的性能,当传输速率为0.1 Mb/s时,系统的中断概率能够降低至10-2;对于较大传输速率,系统的中断概率仍保持在10-1以下。  相似文献   

7.
为提升无线网络频谱利用率和增强信息传输的安全性,针对下行多载波非正交多址接入安全通信系统,提出了一种基于安全和速率最大化的稳健性资源分配算法.首先,设计人工噪声(AN)预编码矢量与合法用户信道正交,消除人工噪声对合法传输的影响.然后,考虑每个用户最小速率约束、基站最大功率约束,基于窃听信道不确定性建立AN预编码、下行数...  相似文献   

8.
研究采用两个智能反射平面保障无线携能通信系统信息传输的物理层安全。通过联合优化两个智能反射平面的反射波束成形和基站的发射波束成形以最大化系统的总信息传输速率,同时满足基站的发射功率约束、能量收集用户的最小能量收集约束与最大窃听速率约束,以及智能反射平面反射系数的模一约束。由于存在两个智能反射平面之间的反射链路,所构建优化问题的优化变量高度耦合,难以直接求解。提出一种基于交替优化、半正定松弛和连续凸逼近的算法求问题的次优解。仿真结果表明,与现有的基准方案相比,所提算法能在保证信息传输安全和满足能量传输要求的情况下大幅提高系统的总数据速率。  相似文献   

9.
为了克服阴影衰落和障碍物阻挡的影响,智能反射面(IRS)已经成为一种提高无线通信系统能量效率(EE)和降低硬件成本的有效技术。然而,传统无线资源分配(RA)算法忽略了系统收发机硬件损伤(HIs)的影响,由于放大器非线性、相位噪声的影响使得接收信号失真,从而使得这类算法的系统性能下降。为解决该问题,通过考虑收发机的硬件损伤和网络窃听者的影响,该文研究基于硬件损伤的IRS辅助安全通信系统能效优化问题。首先,基于基站的最大发射功率约束和用户的最小安全速率约束,建立一个含硬件损伤的能效最大资源优化问题。其次,采用辅助变量替换、半正定松弛以及Dinkelbach等方法,将原非凸问题转化为凸问题进行求解。最后,数值仿真结果表明,该算法与传统资源分配算法相比,合法用户的平均中断概率降低了43.5%,该算法中系统的安全能效提高了8.3%,因此,该算法具有较好的抗硬件损伤性和安全性。  相似文献   

10.
袁小扣  朱江 《信号处理》2021,37(3):437-446
针对时间反演系统中多个窃听者随机分布的物理层安全传输问题,提出一种安全吞吐量优化方案,该方案基于人工噪声辅助时间反演的多输入单输出(MISO)传输.首先,利用随机几何理论推导连接中断概率和安全中断概率的闭合表达式分别表征系统的可靠性和安全性;然后,综合考虑系统的可靠性和安全性,提出最大化安全吞吐量的优化方案;最后,仿真...  相似文献   

11.
A heterogeneous network with simultaneous wireless information and power transfer under the stochastic channel state information (CSI) error was considered.In this network,to guarantee the security and reliability of information and energy transmission,an artificial noise (AN)-aided robust secure information and power transmission scheme was proposed.By jointly designing the downlink information beamforming and AN matrix of macrocell base station and femtocell base stations,the eavesdroppers were jammed and the energy receiving performance of system was improved simultaneously.The problem of maximizing the energy receiving performance was modeled under the constraints on the base station power,the outage probability of information transfer and confidential information eavesdropped.Due to the probabilistic and rank-one constraints,this problem was non-convex.To obtain the solution,the original problem was first transformed into an equivalent form,which was easy to process.Then,the Bernstein-type inequality and the Large-deviation inequality was utilized to transform the outage probability limits into convex linear matrix inequalities,respectively.Finally,the rank-one beamforming constraints were processed with quadratic equality constraint procedure.Simulation results show that the proposed scheme has higher energy receiving performance and feasible performance in comparison with compared schemes,which validates the effectiveness and the robustness of our proposed scheme.  相似文献   

12.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

13.
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.  相似文献   

14.
针对能量收集认知无线网络中的多跳中继传输问题,该文构建了一种新的具有主网络干扰的功率信标(PB)辅助能量收集认知多跳中继网络模型,并提出单向传输方案。在干扰链路统计信道状态信息场景下,推导了次网络精确和渐近总中断概率闭合式。针对精确总中断概率表达式的复杂性和非凸性,采用自适应混沌粒子群优化(ACPSO)算法对次网络总中断性能进行优化。仿真结果表明,PB功率、干扰约束、次网络跳数、能量收集比率、主接收端数目和信道容量阈值等参数对中断性能影响显著,所提算法能快速和有效地对网络中断性能进行优化。  相似文献   

15.
This paper considers a cognitive radio–assisted wireless information and power transfer system consisting of multipair of transceiver in primary network and 2‐hop relaying link in secondary network. In this investigation, a decoded‐and‐forward–assisted relay node and power splitting protocol are deployed to obtain ability of wireless energy transfer. The relay node harvests energy from the radio frequency signals of the secondary transmitter and primary transmitters in data transmission to the destination by reusing the licensed spectrum resource. We propose 2 policies for wireless power transfer at the relay, namely, (1) multisource power transfer and (2) single‐source power transfer. To evaluate performance under energy harvesting regime, we derive the closed‐form outage probability expressions and achievable throughput of the secondary network in delay‐limited transmission mode. In addition, we investigate the impact of various system parameters including number of primary transceivers, primary outage threshold, and position arrangement of nodes in primary transceivers on the outage performance of the proposed scheme. Furthermore, we evaluate the system energy efficiency to show trade‐off metric of energy consumption and throughput. Performance results are presented to validate our theoretical derivation and illustrate the impacts of various system parameters. An important result is that the secondary network is more beneficial than harmful from the primary interference under power constraint and reasonable node location arrangement.  相似文献   

16.
为提高基于非正交多址接入(NOMA)的移动边缘计算(MEC)系统中计算任务部分卸载时的安全性,该文在存在窃听者情况下研究MEC网络的物理层安全,采用保密中断概率来衡量计算卸载的保密性能,考虑发射功率约束、本地任务计算约束和保密中断概率约束,同时引入能耗权重因子以平衡传输能耗和计算能耗,最终实现系统能耗加权和最小。在满足两个用户优先级情况下,为降低系统开销,提出一种联合任务卸载和资源分配机制,通过基于二分搜索的迭代优化算法寻求问题变换后的最优解,并获得最优的任务卸载和功率分配。仿真结果表明,所提算法可有效降低系统能耗。  相似文献   

17.
This paper considers a multiuser multiple‐input single‐output (MISO) broadcasting system with simultaneous wireless information and power transfer (SWIPT), which consists of one information receiver (IR) and several energy harvesting receivers (ERs) which are capable of eavesdropping the legitimate signals. For reducing cost and hardware complexity, transmit antenna selection (TAS) is applied in the transmitter. We aim to maximize the achievable secrecy rate under the individual energy harvesting constraint at the ERs and the transmit power constraint at the transmitter by jointly optimizing TAS, transmit beamforming, and artificial noise (AN). The joint optimization problem is a non‐convex mixed integer programming problem. We apply variable replacements to decouple the variable couplings and relax and approach the binary constraint by the difference of two convex constraints. Afterwards, penalty method and constrained concave convex procedure (CCCP) are applied to transform the relaxed problem into a sequence of semi‐definiteness programming (SDP) problems. Simulation results shows that our proposed joint optimization scheme is superior over existing non‐joint optimization schemes. This paper studies the joint transmit antenna selection (TAS), transmit beamforming, and artificial noise (AN) optimization in a multiple‐input multiple‐output (MISO) wiretap system with simultaneous wireless information and power transfer (SWIPT). The joint optimization problem is nonconvex and we propose a penalty method based scheme to solve it. The simulation results show that our joint optimization scheme is superior to other non‐joint optimization schemes.  相似文献   

18.
利用可重构智能表面(Reconfigurable Intelligent Surface, RIS)辅助无线发射机,可提高多用户无线网络的安全传输能力。在非理想信道状态信息(Channel State Information, CSI)下提出了鲁棒波束形成优化方法来提高系统对抗干扰和窃听攻击的能力。具体地,使用RIS辅助发射机,对RIS的相位波束形成和基站的传输功率进行联合优化,在分别满足有界CSI的最坏情况速率约束和统计CSI的速率中断概率约束来最小化系统的总传输功率。由于存在CSI误差,针对有界CSI和统计CSI误差约束,分别利用S-procedure来松弛保密速率约束和大偏差不等式(Large Deviation Inequality, LDI)来松弛保密速率中断概率约束。仿真结果表明,相比于无源反射法和传统波束形成方案,该方法可分别降低约88%和93%总传输功率,同时提高约15 dBm和12 dBm的干扰容限。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号