首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 171 毫秒
1.
程英  李光球  沈静洁  韦亮 《电信科学》2021,37(9):95-104
针对合谋窃听场景下单天线多中继修改转发(MF)协作无线系统的安全性能较差问题,提出一种合谋窃听场景下联合源节点发送天线选择(TAS)和多中继选择的MF协作物理层安全系统,考虑最优的最大化主信道信噪比(SNR)和次优的最大化源节点-中继节点链路 SNR 两种中继选择方案,推导其安全中断概率(SOP)和遍历安全容量(ESC)的解析表达式。最优或次优中继选择的MF安全中继系统的SOP和ESC的数值计算结果与仿真结果相吻合,验证了上述理论分析的正确性;同时也表明源节点发射天线数和中继节点数越多、窃听节点数越少,最优或次优中继选择的MF安全中继系统的物理层安全性能越好。  相似文献   

2.
针对未来海量用户设备接入的物理层安全(physical layer security,PLS)应用需求,提出了一种组合非正交多址接入(non-orthogonal multiple access,NOMA)、终端直通(device-to-device,D2D)与中继协作的NOMA-D2D协作无线系统PLS模型。该模型由采用发射天线选择(transmit antenna selection,TAS)的基站、分别作为基站和D2D发射端的NOMA远端蜂窝用户、D2D接收端以及被动窃听者组成,其中的D2D发射端承担基站的 NOMA 近端用户和解码转发中继两种角色。利用高斯—切比雪夫正交定理推导两种 TAS 方案下NOMA-D2D协作无线系统的安全中断概率、非零安全容量概率以及渐近安全中断概率的近似表达式。数值计算和仿真实验验证了NOMA-D2D协作无线系统PLS性能分析的准确性;在基站总功率恒定时增大分配给远端蜂窝用户的功率能有效提升NOMA-D2D协作无线系统的PLS性能。  相似文献   

3.
在LTE系统中引入设备直传(D2D)通信技术,会因为D2D用户复用蜂窝用户资源进行通信而产生同频干扰.在现有的干扰协调与资源分配研究中,都需要基站获取各个通信链路的信道状态信息(CSI),但这样无疑会增加基站的信令负担.为减小干扰与基站的信令负担,提出了一种基于用户中断概率的干扰协调与资源分配算法,首先在保证蜂窝用户正常通信的情况下,通过限制D2D用户到基站间的距离来降低干扰;其次通过遍历所有蜂窝用户的频谱资源,选择能使D2D用户的总中断概率最低的频谱资源进行复用.仿真结果表明,所提算法能够在保证蜂窝用户正常通信的情况下,明显降低D2D用户的平均中断概率,同时还能够降低基站信令负担.  相似文献   

4.
任婷洁  李光球  程英 《电信科学》2019,35(8):111-119
为了考察使用多中继选择与多用户选择的放大转发(AF)中继系统的物理层安全性能,推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量概率和安全中断概率的精确表达式以及在高信噪比下的渐近安全中断概率解析表达式。AF中继系统的非零安全容量概率和安全中断概率的数值计算和仿真结果相吻合,验证了以上理论分析的正确性;分析结果表明,其安全分集增益为源节点发射天线数、最优中继节点接收天线数、中继节点数的三者乘积与最优中继节点发射天线数、最优用户接收天线数、用户数三者乘积之间的最小值,且与窃听信道无关。  相似文献   

5.
在D2D通信系统与蜂窝网络共存的场景下,引入中继节点可有效提高D2D链路的吞吐量和D2D用户对蜂窝用户的干扰。文中基于译码转发模式,结合跨层协作通信的思想,提出了一种基于物理层和数据链路层的跨层中继选择算法。该算法结合物理层的信道状态信息和数据链路层的队列状态信息,两个参数进行最优中继节点的选择。并最终通过仿真验证表明,基于跨层中继选择算法可提高通信系统的吞吐量,同时降低了通信系统的平均时延和数据包错误率。  相似文献   

6.
顾闻 《电信快报》2013,(2):40-43
主要研究D2D(终端直通)系统与蜂窝网络共存时,D2D到基站的中继选择问题。引入考虑路径损耗及衰落的系统架构,导出选择D2D中继的距离范围。在此基础上对两种基本中继选择算法的中断概率进行推导和分析。提出负载转移的最优中继选择算法,旨在降低中继选择时的中断概率,提高系统整体性能。仿真结果说明提出的LTBRS(负载转移最优中继选择)算法比传统的最优中继选择和随机中继选择性能更优。  相似文献   

7.
针对D2D蜂窝系统通信安全性受资源限制的问题,考虑到蜂窝链路和D2D链路的同频干扰能够为两者带来安全增益,基于此,提出一种基于安全中断概率的D2D用户接入策略。首先理论分析了蜂窝用户和D2D用户的安全中断概率,并给出了基于安全中断概率最小化的D2D用户功率优化算法。在上述分析的基础上,选择安全中断概率最小的D2D用户接入复用蜂窝用户的无线资源,同时提高D2D通信链路和蜂窝上行链路的安全性。最后,仿真结果证明了所提算法的有效性。  相似文献   

8.
在包含中继节点的D2D(Device-to-Device)系统中,针对蜂窝链路与D2D链路同时受窃听的问题,提出一种基于链路间干扰辅助的中继D2D系统安全通信方法.首先,确定蜂窝链路与D2D链路上下行发送模式;然后,在基站与中继节点的发送信号中添加人工噪声,协作干扰窃听者;最后,对基站功率分配与D2D功率控制进行了优化,以实现不同类型链路间干扰辅助保障系统安全.仿真结果表明,所提出的安全通信方法在保密速率方面比SVD(Singular Value Decomposition)与ZF(Zero-Forcing)预编码方法提高了1.5bit/s/Hz.  相似文献   

9.
张广大  任清华  樊志凯 《信号处理》2021,37(8):1541-1549
针对多跳中继传输系统的信息安全传输问题,提出了一种基于全双工模式下多节点协作干扰(FD-MCJ)的物理层安全传输方案。该方案利用通信网络中的中继节点发送干扰信号恶化窃听节点的接收性能,同时中继节点根据信道状态信息(Channel State Information, CSI)自适应的选择两种情况下的安全传输方案。本文首先利用泊松点过程对窃听节点位置进行安全建模;然后,根据CSI可用程度,给出不同的安全传输具体方案,在考虑系统的跳数、天线间自干扰以及发射功率和干扰功率等因素下,推导FD-MCJ方案下系统保密中断概率的闭式解;最后,数值分析和蒙特卡洛仿真表明,理论推导的正确性以及多跳中继系统中采用全双工多节点协作干扰方案能够有效提升系统安全性能。   相似文献   

10.
在蜂窝网络中,采用全双工传输的设备直通(D2D)通信可以共享蜂窝通信的信道资源,提升频谱利用率和系统吞吐量.针对单对全双工D2D用户复用单个蜂窝用户的上行信道资源时,用户之间会产生同频干扰的问题,提出了一种低复杂度的功率控制算法.该算法在保证全双工D2D用户和蜂窝用户(CU)的服务质量(QoS)的前提下,最大化全双工D2D链路的吞吐量.仿真结果表明,该算法能够提高全双工D2D链路的吞吐量;全双工D2D链路吞吐量取决于蜂窝用户的QoS要求、相对距离以及自干扰消除数量的限制.  相似文献   

11.
宋康  冀保峰  李春国  李世党  杨绿溪 《信号处理》2015,31(11):1404-1410
本文研究了蜂窝直通通信(Device-to-Device,D2D)系统中基站端多天线选择问题,即在基站传输过程中选择多于一根天线进行传输。借助于次序统计的相关结论,本文分析了该D2D系统的整体性能。本文首先针对基站内的激活用户和D2D用户分别推导了概率密度函数和累积密度函数,进而得到了D2D系统的整体中断概率。基于推导结果,本文提出了一种基于服务质量(Quality of Service,QoS)约束的多天线选择方案来进一步提高基站端的能效,其中所需的天线数根据QoS约束和发送信噪比来确定。论文最后通过仿真验证了所做推导的正确性,以及展示了本文所提方案相对于最优天线选择的优势。   相似文献   

12.
In this paper, end‐to‐end performance of transmit antenna selection (TAS) and generalized selection combining (GSC) is studied in a dual‐hop amplify‐and‐forward relay network over flat Rayleigh fading channels. In the system, source and destination equipped with multiple antennas, communicate by the help of single relay equipped with single antenna. Source‐destination link is not available. TAS is used for transmission at the source, and GSC is used for reception at the destination. By considering the relay location and the presence of error in feedback channel from the relay to the source, we derive closed‐form outage probability, moment generating function and moments of end‐to‐end signal‐to‐noise ratio, and closed‐form symbol error probability (SEP) expressions for channel state information (CSI)‐based and fixed relay gains. The diversity order and array gain of the network are obtained for both CSI‐based and fixed relay gains by deriving asymptotical outage probability and SEP expressions. The analytical results are validated by the Monte Carlo simulations. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

13.
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station.  相似文献   

14.
In this paper, we study end-to-end performance of transmit antenna selection (TAS) and maximal ratio combining (MRC) in dual hop amplify-and-forward relay network in flat and asymmetric Nakagami-m fading channels. In the network, source and destination communicate by the help of single relay and source-destination link is not available. Source and destination are equipped with multiple antennas, and relay is equipped with single antenna. TAS and MRC are used for transmission at the source and reception at the destination, respectively. The relay simply amplifies and forwards the signal sent by the source to the destination by using channel state information (CSI) based gain or fixed gain. By considering relay location, for CSI based and fixed relay gains, we derive closed-form cumulative distribution function, moments and moment generating function of end-to-end signal-to-noise ratio, and closed-form symbol error probability expression. Moreover, asymptotical outage probability and symbol error probability expressions are also derived for both CSI based and fixed gains to obtain diversity order of the network. Analytical results are validated by the Monte Carlo simulations. Results show that diversity order is minimum of products of fading parameter and number of antennas at the end in each hop. In addition, for optimum performance the relay must be closer to the source when the diversity order of the first hop is smaller than or equal to that of the second hop.  相似文献   

15.
To alleviate the spectrum shortage problem and security threats in heterogeneous network (HetNet),multi-antenna full-duplex relay was introduced for communication between femto base station (FBS) and legitimate user.With the aid of multi-antenna full-duplex relay in FBS network,the secrecy performance of HetNets could be improved.Under a stochastic geometry framework,the fundamental analysis model to evaluate the secrecy performance in multi-antenna full-duplex relay aided HetNet was set up.To be specific,the exact expressions for the secrecy outage probability of the typical user,serving relays and HetNet were derived respectively.Then,based on the theoretical analyses and simulation results,the influences of transmit power and antenna number of both macro base station and FBS on secrecy performance in HetNet were examined.Finally,the results show that introducing multi-antenna full-duplex relay for FBS networks improves the secrecy performance of HetNet.  相似文献   

16.
In this paper, we examine a half‐duplex cooperative multiple‐input multiple‐output non‐orthogonal multiple access system with imperfect channel state information (CSI) and successive interference cancelation. The base station (BS) and mobile users with multi‐antenna communicate by the assistance of a CSI based or fixed gain amplify‐and‐forward (AF) relay with a single antenna. The diversity schemes, transmit antenna selection, and maximal ratio combining are applied at the BS and mobile users, respectively. We study the system performance in terms of outage probability (OP) and ergodic sum‐rate. Accordingly, the exact OP expressions are first derived jointly for the CSI based and fixed gain AF relay cases in Nakagami‐m fading channels. Next, the corresponding lower and upper bound expressions of the OP are obtained. The high signal‐to‐noise ratio analyses are also carried out to demonstrate the error floor value resulted in the practical case and achievable diversity order and array gain in the ideal case. Moreover, the lower and upper bounds of the ergodic sum‐rate expressions are derived together for the CSI based and fixed gain AF relay cases. Finally, the Monte‐Carlo simulations are used to verify the correctness of the analytical results.  相似文献   

17.
林鸿鑫  赵睿  贺玉成  袁毅 《信号处理》2016,32(7):810-818
在 Nakagami m衰落信道下,目的端和窃听者采用最大比合并策略,本文研究了在机会式自适应解码转发中继选择安全协作系统中的安全性能。由于实际信道中的反馈延迟,最优的合法中继选择基于合法信道反馈的过时信道状态信息。为了评价机会式中继选择在改善安全性能上的表现,分别推导了准确的正安全容量概率和准确的安全中断概率闭合表达式。此外,针对两种不同情况, 推导了形式简单的渐近表达式,并明确给出安全分集阶数和安全阵列增益。理论分析和数值仿真表明,增加中继个数和目的节点的天线数能够改善安全中断概率的性能表现,且在信道状态信息过时的条件下,系统的安全分集阶数与中继数无关。   相似文献   

18.
This letter studies the performance of uplink cross layer design for multi-antenna systems with outdated channel state information (CSI). We consider a multi-user system with one base station (with n/sub R/ receive antennas) and K mobile users (each with single transmit antenna). The multi-user physical layer is modeled based on information theoretical framework and the cross layer design can be cast as an optimization problem. In view of the high computation complexity in the optimal solution, we propose a low complexity genetic algorithm as suboptimal solution. We found that with outdated CSI, there is significant degradation in the spatial multiplexing and multi-user diversity gain due to potential packet transmission outage as well as misscheduling. To address the poor performance in the presence of outdated CSI, we propose two simple but effective empirical solutions, namely the rate quantization and rate discounting, to tackle the packet outage problem. For instance, it is well-known that rate quantization imposes system capacity loss in systems with perfect CSI. However, we found that rate quantization can enhance the robustness of system capacity with respect to outdated CSI.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号