首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
This paper evaluates the secrecy performance for the amplify‐and‐forward (AF) protocol with partial relay selection (PRS) schemes in the scenario of multiple independent but not necessarily identically distributed eavesdroppers. The secrecy performances of the first‐hop and second‐hop PRS schemes are revisited. Given the secrecy data rate, an efficient PRS scheme is presented, which selects the relay based on the instantaneous channel state information (CSI) of either the first or second hop according to the statistical CSI of two hops. The proposed PRS scheme provides the trade‐off between the two‐hop and one‐hop PRS criteria. Results show that the secrecy outage probability (SOP) performance of the proposed scheme is close to that of the conventional opportunistic relaying in the medium main‐to‐eavesdropper ratio (MER) regions. As for the intercept probability, the second‐hop scheme achieves the highest diversity order among PRS schemes and its performance depends on the overall eavesdroppers' behavior not on individual effects of the specific relay. The proposed criterion also outperforms the first‐hop PRS scheme. Simulation results finally substantiate the accuracy of the theoretical analysis.  相似文献   

2.
On the Secrecy Capacity of Fading Channels   总被引:1,自引:0,他引:1  
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.   相似文献   

3.

Most of the non-linear transceivers, which are based on Tomlinson-Harashima (TH) precoding and have been proposed in the literature for two-way relay systems, assume perfect channel state information (CSI). In this paper, a novel and robust TH precoding scheme has been investigated for two-way relay systems, with multiple antennas at the transceiver and relay nodes. We assume imperfect CSI and the channel uncertainty is bounded by a spherical region. The minimum mean square error at the destinations is used as the design criterion and we develop an iterative method to solve this nonconvex problem to obtain TH precoding matrices at the transmitter, linear precoding matrix at the relay and linear equalizer at the destination nodes, where each subproblem is convex. Simulations are provided to evaluate the performance and to validate the efficiency of the proposed scheme.

  相似文献   

4.

In this paper, we investigate physical-layer security performance of the cooperative vehicular relaying networks, wherein the communication from a source vehicle to the destination vehicle is assisted by an amplify-and-forward (AF) relay vehicle in the presence of a passive eavesdropper vehicle. We assume that the communication links between the vehicles experience double-Rayleigh fading. We also consider two AF relaying protocols: (1) fixed gain relaying which requires partial channel state information (CSI), and (2) variable gain relaying which requires full CSI. Specifically, we derive the novel intercept probability and ergodic secrecy capacity expressions for both fixed and variable gain relaying in the presence of double-Rayleigh fading channels. The numerical and simulation results verify our theoretical and analytical findings, and show the impacts of channel conditions and relay and eavesdropper locations on the system secrecy performance.

  相似文献   

5.
Precoding techniques can be introduced into multi‐relay systems due to the similarity between cooperative communication systems and traditional multi‐input–multi‐output (MIMO) systems. In this paper, a channel state information (CSI) feedback scheme based on the zero‐forcing (ZF) relaying protocol is proposed at first, where the information of relaying channel and noise related to each relay node can be compressed into two positive real parameters. Then, based on the proposed feedback scheme, the singular‐vector‐based local temporal precoder is presented at the source node through two continuous transmitted vectors, which is termed as distributed spatial–temporal precoding (DSTP). Moreover, various spatial data rates can be conveniently supported by DSTP. Based on the analysis on DSTP, it is better that the number of data streams is not larger than the number of antennas equipped at the source node. The unitary DSTP with the proposed feedback scheme outperforms not only the close‐loop direct transmission but also the simple ZF relaying method. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

6.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

7.
Cooperative communication is one of the fastest growing research areas of today. It can efficiently mitigate the effect of shadowing and fading with the help of relays and proper relay selection technique. In this paper, a novel relay selection scheme combined with artificial noise (AN) is devised to enhance the secrecy of cooperative networks with amplify‐and‐forward scheme, over Rayleigh fading channels in the presence of a passive eavesdropper. The probability of path selection of ant colony optimization algorithm is used for selecting the best relay with high end‐to‐end signal‐to‐noise ratio. The probability of choosing a path depends on the significance of channel gain (G) and fading coefficients (h). The proposed algorithm finds the best relay in the following wireless scenarios: when (i) both channel gain and fading coefficients are significant; (ii) only fading coefficients are significant; and (iii) only channel gain is significant. Because the direct links between source and destination and source and eavesdropper are considered, AN along with the information is sent by both the source and the selected relay. The performance is evaluated based on secrecy rate (Rs); for the relays randomly placed between the source and destination and for different eavesdropper's location. The results show that the proposed relay selection scheme achieves better secrecy for different wireless scenarios compared with traditional schemes. With the help of AN, the secrecy rate can be made positive even when the eavesdropper lies near to source.  相似文献   

8.

In this paper, the issue of secrecy capacity of wireless powered massive MIMO dual hop relay system with a single antenna eavesdropper having non ideal hardware is addressed. The relay harvests energy in a proportionate manner and passes it to destination through beamforming with classical decode and forward relaying protocol. The relay has no channel state information (CSI) of passive eavesdropper but has CSI of the legitimate channel. The work presented in this paper focuses on the analysis of the difference in system performance with ideal and non ideal hardware, bounded by strict outage probability. The performance (in terms of secrecy outage capacity) is studied with hardware impairments (HWIs) defined for all network elements, i.e., source, relay, destination and passive eavesdropper. It is also observed that compared to ideal hardware, there is significant degradation in performance due to HWIs.

  相似文献   

9.
In this paper, we consider secure communications of one source‐destination pair in the presence of one eavesdropper, when full‐duplex decode‐and‐forward cooperative relays operate to enhance physical layer security. While the conventional half‐duplex relay receives the signal from the source and forwards the re‐encoded signal to the destination in two separated time slots, the full‐duplex relay (FDR) performs the transmission and reception at the same time, which can ideally double the secrecy capacity. However, because of the simultaneous transmission and reception, each FDR suffers from both its own self‐interference and the interference from the other cooperative FDRs. When the conventional cooperative relaying schemes are used in full‐duplex relaying, it is obviously expected that the self‐interference signals cause severe degradation of the secrecy capacity. Here, we propose an iterative transmit power allocation and relay beamforming weight design scheme for cooperative FDRs to enhance the secrecy rate as well as suppress the self‐interference signals. Numerical results present that the FDRs with the proposed scheme significantly improve the secrecy rate compared with the conventional half‐duplex relays. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

10.
在空间相关的莱斯衰落信道模型下,针对多用户MIMO(Multiple-Input Multiple-Output)系统潜在的多用户分集增益和空间分集增益,该文提出了一种基于部分信道信息的多用户预编码与调度算法。结合部分瞬时信道信息和统计信息,利用约束最大似然估计对各用户信道矢量进行估计,然后利用估计的各用户信道调度多个用户进行预编码。仿真结果表明,该方案以较少的反馈开销,获得了较大的性能增益。  相似文献   

11.
何宪文  李智忠  姜斌  杨刚 《信号处理》2019,35(10):1634-1640
双向中继网络在提高频谱效率的同时会引入额外的自干扰,本文针对放大转发(AF)模式下双向多输入多输出(MIMO)中继网络中的自干扰抵消问题,从消除信道估计误差引入的剩余自干扰着手,提出一种采用信道独立预编码的盲干扰抵消(BIC)方案。新方案在源节点对信息进行行空间预编码,从而构建不依赖于MIMO信道矩阵的期望信号子空间和自干扰子空间,实现未知信道状态下自干扰抵消和期望信号分离,从而消除非理想信道估计带来的剩余自干扰信号。在此基础上,以最大化有效信噪比为目标设计最佳预编码,通过推导可达和速率的闭合表达式,分析不同方案下信道估计误差对可达和速率的影响。仿真结果表明,新方案在不同的信道估计误差下,能够实现完美自干扰消除,其检测性能和容量均优于基于信道估计的自干扰消除方案。   相似文献   

12.
雷维嘉  王娟兵  谢显中 《电子学报》2018,46(12):2878-2887
研究大规模多输入多输出中继网络中的多用户物理层安全传输方案.系统模型中假设窃听节点与源节点和中继节点间都有直接链路,窃听节点可以接收到源节点和中继发送的信号.在不能获得窃听者信道状态信息的情况下,大规模MIMO中继采用简单的最大比合并/最大比发射信号处理方案,并配合中继零空间人工噪声和目的端的协作干扰实现多用户的信息安全传输.对保密速率及其在中继天线数无限增长时的渐近值进行了理论分析,并进行仿真.仿真结果显示系统的保密和速率随中继天线数的增长而增长,最终趋于理论渐近上界值.仿真结果也表明即使窃听节点具有多用户间干扰消除能力,并能同时拦截源节点和中继发送的信号,采用本文的方案仍然能获得可观保密速率.  相似文献   

13.
We investigate the problem of precoding optimization in an amplify‐and‐forward multiple‐input‐multiple‐output relay system. Most reported works on this problem focus chiefly on the design of relay precoder without simultaneously optimizing the direct link. In this paper, we propose a method for joint source/relay precoder design, taking both direct and relay links into account. Our design is based on maximizing the mutual information (MI) under limited transmission power constraints at the source and relay, respectively. We first formulate a constrained optimization problem before relaxing the original cost function for tractability and derive a MI lower bound. This elaborate bound can asymptotically approach the exact expression of MI in an iterative fashion. In contrast to previous strategies, we then prove that the optimal structure of the source and relay precoders jointly convert the multiple‐input‐multiple‐output relay channel into a bank of single‐input‐single‐output relay channels without having to assume a beamforming structure to simplify the derivation. Specifically, the linear precoding design problem degenerates into power loading among multiple single‐input‐single‐output relay channels. Applying standard Lagrange technique results in a scalar convex optimization, and it can be readily solved by iterative water filling. Numerical examples demonstrate that the proposed scheme, either exploiting partial or full channel state information, significantly outperforms the existing methods. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

14.
该文研究节点具有能量收集能力的两跳中继系统的物理层安全传输方案。考虑窃听节点与源和中继节点间都有直接链路的情况。每个数据传输时隙分为能量收集和数据传输两个阶段,各节点用收集的能量发送信号。中继采用放大转发方式,目的节点发送人工噪声进行协作干扰,保护在两跳传输中传输的保密信息。以最大化保密速率为目标,采用迭代算法优化能量吸收和数据传输两阶段的时间分配比例系数和协作干扰功率分配因子。仿真结果表明优化算法准确,优化后的协作干扰方案能显著提高系统的保密传输速率。由于考虑了窃听节点在两跳传输中都能接收到信号的可能性,文中方案更贴近实际,并解决了一个复杂的优化问题。  相似文献   

15.
This paper studies the precoder design for a 3-node non-generative MIMO relay channel, taking the direct link transmission into consideration. We first look into the scenario where precoding is only performed at the relay. Our analytical approach enables a relay precoding design to achieve better ergodic capacity than the precoding design to achieve a lower bound of the capacity reported in earlier works. We next propose an iterative algorithm to perform joint precoding design at both the source and the relay. To reduce the computation complexity of the iterative algorithm, a two-step algorithm is then developed. Our numerical results show that under some circumstances, capacity gain can be achieved by performing precoding at both the source and the relay compared to the case where precoding is performed at the relay only. The efficiency of the proposed two-step algorithm is verified since it achieves roughly identical capacity as the iterative joint precoding scheme.  相似文献   

16.
杨斌  王文杰  殷勤业 《电子学报》2016,44(2):268-274
中继系统可以增强物理层安全算法的系统性能,这种系统一般包含两阶段的通信过程:从信源到中继节点,在从中继节点到目的节点.通常来说,第一阶段的信息传输缺乏保护,如果窃听者距离信源节点比较近的话,系统性能就无法保证了.该文提出了一种基于混合信号的三阶段的传输方法确保整个传输过程中的保密性能,这样,当窃听者接近信源节点的时候,仍可以保证系统的安全性能.这种方法的优化解是一个复杂的非凸优化问题,该文中建议了一种低复杂度的次优解来解决其中的优化问题.理论分析以及方针结果证明,该方法可以有效确保系统的全过程的安全性能.  相似文献   

17.
This work presents theoretical analysis on security performance for relay selections based on either statistical or instantaneous channel state information (CSI) of the eavesdropper (CSI-E) channels in a decode-and-forward relaying network. By considering security constraints, we have derived exact expressions for the average secrecy rate and the secrecy outage probability. Moreover, analytical expressions of the false secrecy probability are derived for the suboptimal relay selection based on statistical CSI-E, which are used as the constrained functions of new selection metrics. Furthermore, our work achieves a better tradeoff between the outage probability and the false secrecy probability. The accuracy of our performance analysis is verified by simulation results.  相似文献   

18.
An artificial noise strategy is proposed for amplify‐and‐forward bi‐directional relay network where the eavesdropper can wiretap the relay channels in both hops. Artificial noise is used to confuse the eavesdropper and improve its secrecy. Specifically, the source and the relay are allowed to split their available transmit power into 2 parts: a useful information portion and a jamming portion to transmit a jamming signal. The mathematical model is established for 2‐way relay network with an eavesdropper. The secrecy rate achieved by using artificial jamming is derived from the above model. The optimal power allocation with individual power constraint is obtained via sequential quadratic programming to maximize the secrecy sum rate, and 2 special cases are investigated. Furthermore, the benchmark is provided for the purpose of performance comparison. Simulation results show that the proposed strategy can significantly improve the secrecy sum rate by using artificial noise to jam the eavesdropper.  相似文献   

19.
本文研究了高斯正交中继窃听信道,中继节点同时作为窃听者的情况,源节点同中继节点和目的节点在信道1上传输信号,中继节点同目的节点在信道2上传输信号,信道1和信道2在频率上是正交的。通过分析,在总的信道资源受限的情况下,通过优化功率及信道带宽获得最大的安全速率。本文给出了在高斯正交信道下,当只考虑功率或带宽时,存在唯一的功率或带宽使得安全速率达到最大,并且通过仿真结果说明了采用最优资源分配可得到比等资源分配更大的安全速率。  相似文献   

20.
This paper considers cooperative power allocation with the use of partial channel state information (CSI) in a multi‐user dual‐hop relay system with multiple antennas. The end‐to‐end capacity can be improved by dynamically allocating the transmit power of the base station and relay according to co‐channel interference caused by the adjacent relays. The proposed scheme allocates the transmit power in association with the eigenvalues and angle difference between the eigenvectors of transmit correlation matrices of the desired and interference channel. It is shown by means of upper‐bound analysis that the end‐to‐end capacity of the proposed scheme can be maximized in highly correlated channel environments when the principal eigenvectors of transmit correlation matrices of the desired and interference channel are orthogonal to each other. It is also shown that the proposed scheme is robust to the channel estimation error. Finally, the performance of the proposed scheme is verified by the computer simulation. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号