首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 718 毫秒
1.
基于相关的瑞利衰落信道,研究安全协作系统的安全中断性能。假定发送端知道全部信道的信道状态信息,系统中存在单个窃听节点以及多个进行协作的中继节点,某个中继节点被选择作为干扰者来发送干扰信号,合法信道与干扰节点到目的节点的信道相关,窃听信道与干扰节点到窃听节点的信道也相关。在此类协作场景中,分析了信道相关性对安全协作系统安全性能的影响,获得了安全中断概率表达式。数值结果表明信道相关对安全协作系统的安全性能存在显著影响。  相似文献   

2.
钱辉  李光球  汪玲波  蔡建辉 《计算机工程》2020,46(2):141-147,153
针对延时发射天线选择(TASD)/正交空时分组码(OSTBC)无线通信系统,基于最小均方误差(MMSE)信道预测器,提出一种系统物理层安全增强方案。将MMSE信道预测方案应用于TASD/OSTBC无线通信系统,构成信道预测发射天线选择(TASP)/OSTBC无线通信系统,并对其推导瑞利块衰落信道上安全中断概率、非零安全容量概率以及渐近安全中断概率的解析表达式。在此基础上,分析主信道收发天线数、窃听者天线数和信道的归一化延时等参数对系统物理层安全性能的影响。数值计算和仿真结果表明,采用TASP可以提高OSTBC编码无线通信系统的物理层安全性能。  相似文献   

3.
We consider a cooperative system consisting of a source node, a destination node, N (N >1) wireless-powered relays, and an eavesdropper. Each relay is assumed to be with a nonlinear energy harvester, in which there exists a saturation threshold, limiting the level of the harvested power. For decode-and-forward and power splitting protocols, the Kth best relay is selected to assist the source-relay-destination transmission. An analytical expression for the secrecy outage probability is derived, and also verified by simulation.  相似文献   

4.
In this paper, the impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is investigated by analyzing critical issues such as the probability characteristics of the legitimate receiver (Bob) and malicious eavesdropper (Eve)’s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability and the average secrecy channel capacity over Rayleigh fading Channel, etc. Unlike the conventional physical layer security schemes, we assume that Bob receives its data from both the relay and the source via cooperative relay, provided that MRC is employed at the receiver. Particularly, compared to the conventional MRC methods, the proposed method is capable of achieving a higher spatial diversity order by performing relay selection, as validated by performing the theoretical analysis as well as numerical simulation. Furthermore, the closed-form expressions in terms of secrecy outage probability and average secrecy capacity are all consistent with the numerical results. Finally, the proposed scheme may be substantially affected by a number of parameters such as the number of relays, the SNR of links and the ratio of main-to-eavesdropper ratio (MER) λME.  相似文献   

5.
In this paper, the transmission of confidential messages through single-input multiple-output (SIMO) independent and identically generalized-K (KG) fading channels is considered, where the eavesdropper overhears the transmission from the transmitter to the receiver. Both the receiver and the eavesdropper are equipped with multiple antennas, and both active and passive eavesdroppings are considered where the channel state information of the eavesdropper’s channel is or is not available at the transmitter. The secrecy performance of SIMO KG systems is investigated. Analytical expressions for secrecy outage probability and average secrecy capacity of SIMO systems are derived via two different methods, in which KG distribution is approximated by the Gamma and mixture Gamma distributions, respectively. Numerical results are presented and verified via the Monte-Carlo simulation.  相似文献   

6.
In this paper, we investigate the physical-layer secrecy outage performance of underlay spectrum sharing systems over Rayleigh and log-normal fading channels in the presence of one eavesdropper. In particular, the secondary transmitter sends data to the legitimate receiver under the constraints of the interference temperature at the primary receiver, while suffering the wiretap from the eavesdropper. Closed-form and approximated expressions are derived for the secrecy outage probability over Rayleigh and log-normal fading channels, respectively. The accuracy of our performance analysis is verified by simulation results.  相似文献   

7.
丁青锋  刘梦霞  连义翀 《计算机应用研究》2020,37(9):2819-2821,2826
研究基于译码转发的全双工中继系统的物理层安全问题。假设系统模型中窃听者与合法用户以及中继之间存在直接链路,考虑在合法用户和中继之间的信道状态信息(channel state information,CSI)是非理想的情况下,通过分析信道估计误差、窃听信道的平均信噪比和残余自干扰对中继系统物理层安全的影响,推导出每个节点端到端瞬时信干噪比和非理想CSI下的保密中断概率表达式。仿真结果表明,信道估计误差、窃听信道的平均信噪比和残余自干扰越小,系统保密中断概率越小,系统安全性能越高;在高信噪比时,残余自干扰对保密中断概率的影响可以忽略不计;同时,全双工中继方案优于传统的半双工中继方案。  相似文献   

8.
Cognitive heterogeneous cellular networks (CHCNs) are emerging as a promising approach to next-generation wireless communications owing to their seamless coverage and high network throughput. In this paper, we describe our reliance on multi-antenna technology and a secrecy transmission protocol to ensure the reliability and security of downlink underlay CHCNs. First, we introduce a two-tier CHCN model using a stochastic geometry framework, and derive the probability distribution of the indicator function for a secrecy transmission scheme. We then investigate the connection outage probability, secrecy outage probability (SOP), and transmission SOP of both primary and cognitive users under a secrecy guard scheme and a threshold-based scheme. Furthermore, we reveal some insights into the secrecy performance by properly setting the predetermined access threshold and the radius of detection region for the secrecy transmission scheme. Finally, simulation results are provided to show the influence of the antenna system, eavesdropper density, predetermined access threshold, and radius of the detection region on the reliability and security performance of a CHCN.  相似文献   

9.
This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer. In a single-input multipleoutput (SIMO) wiretap channel, a source transmits confidential messages to the destination equipped with M antennas using the MRC/SC scheme to process the received multiple signals. An eavesdropper equipped with N antennas also adopts the MRC/SC scheme to promote successful eavesdropping. We derive the exact and asymptotic closed-form expressions for the ergodic secrecy capacity (ESC) in two cases: (1) MRC with weighting errors, and (2) SC with outdated CSI. Moreover, two important indicators, namely high signal-to-noise ratio (SNR) slope and high SNR power offset, which govern ESC at the high SNR region, are derived. Finally, simulations are conducted to validate the accuracy of our proposed analytical models. Results indicate that ESC rises with the increase of the number of antennas and the received SNR at the destination, and fades with the increase of those at the eavesdropper. Another finding is that the high SNR slope is constant, while the high SNR power offset is correlated with the number of antennas at both the destination and the eavesdropper.  相似文献   

10.
陈刘伟  梁俊  朱巍  张衡阳  王轶 《计算机应用》2015,35(5):1234-1237
针对卫星信道的衰落特性和阴影效应,分析了一种星地协作系统(HSTCS),并通过对陆地卫星移动通信(LMS)信道进行分析得到其中断概率的闭环表达方法.在源节点(卫星)到目的节点(地面终端)间采用解码前传(DF)模式,目的节点将来自卫星和信噪比最大的中继节点的信号进行合并,并通过Matlab进行仿真.仿真结果表明,同直接传输相比,该系统能够通过获得分集增益,有效提高系统中断性能.  相似文献   

11.
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M ≥ 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with N (N ≥ 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.  相似文献   

12.
针对部分信道特征(授权信道特征存在估计误差且窃听信道特征未知)下的物理层安全传输问题,结合人工噪声和安全编码,提出了一种实用的物理层安全编码方法。多天线发射机采用波束成型传输信号时添加与授权信道特征正交的人工噪声,利用交织LDPC码缩小安全距离,在授权信道SNR约束下求最小私密中断概率,实现功率优化分配,尽可能使窃听信道保持低SNR高BER,授权信道保持高SNR低BER,从而实现物理层安全传输。仿真结果表明,在授权信道SNR约束下,本方法可以实现较低的私密中断概率。  相似文献   

13.
This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate: (1) the generalized match-and-forward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF). In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers’ performance.  相似文献   

14.
本文研究了认知非正交多址接入(NOMA)网络中联合考虑主用户服务质量(QoS)约束和安全约束下次用户物理层安全传输.该网络中采用认知功率分配策略,优先保障主用户的QoS和安全性能.在此功率分配方案下,推导得出了次用户连接中断概率(COP)和安全中断概率(SOP)的闭式表达式,揭示了系统参数配置对次用户传输可靠性和安全性的影响关系,以及安全性-可靠性之间的折衷关系.仿真结果表明,较强的主用户安全约束恶化了次用户的安全性能,但是提升了次用户的安全-可靠折衷性能.  相似文献   

15.
针对多天线选择方案提高物理层安全的研究中信道已知条件的设定过于理想这一问题,提出利用导频信号估计主信道并进行多天线选择的方案。首先,接收端发送导频信号供发射端进行主信道估计;然后发射端利用估计的信道状态信息选出多根天线并进行功率分配;最后推导所提方案的保密容量并设计仿真实例。结果表明,所提方案在估计误差条件下达成了低信噪比时的非零保密容量,且接收方误码率随信噪比增大急剧减小至10-4,而窃听方的误码率保持较高,验证了所提方案的有效性和可行性。  相似文献   

16.
This paper analyzes the performance of clustered decode-and-forward multi-hop relaying (CDFMR) wireless Rayleigh fading networks, and sheds light on their design principles for energy and spectral efficiency. The focus is on a general performance analysis (over all SNR range) of heterogeneous wireless networks with possibly different numbers of relays in clusters of various separations. For clustered multi-hop relaying systems, hop-by-hop routing is known as an efficient decentralized routing algorithm which selects the best relay node in each hop using local channel state information. In this article, we combine hop-by-hop routing and cooperative diversity in CDFMR systems, and we derive (i) a closed-form expression for the probability distribution of the end-to-end SNR at the destination node; (ii) the system symbol error rate (SER) performance for a wide class of modulation schemes; and (iii) exact analytical expressions for the system ergodic capacity, the outage probability and the achievable probability of the SNR (power) gain. We also provide simple analytical asymptotic expressions for SER and the outage probability in high SNR regime. Numerical results are provided to validate the correctness of the presented analyses.  相似文献   

17.
In this paper, we develop and analyze an energy efficient ARQ (automatic repeat request) initialized transmit diversity protocol for cooperative communications. Medium access control (MAC) layer packet retransmission limit (similar to aShortRetryLimit or aLongRetryLimit [802.11–1997]) has been used as an actuator for transmit cooperative diversity initialization. We take the channel state information (CSI) as a function of retransmission tries and the number of retransmission tries is modeled as a random variable. Relays close to the source node are chosen for the transmit cooperation. Closed form expressions are obtained for symbol error rate (SER), outage capacity and outage probability for the proposed scheme in shadowed fading channels. This cooperative scheme achieves lower signal-to-noise ratio (SNR), stumpy outage probability, higher bandwidth, and transmit energy efficiencies for desired average symbol error rate (ASER) than the preceding ARQ based cooperative protocols. Finally, the results of computer simulations are included to demonstrate the efficacy of the proposed scheme and to verify the accuracy of the analytical expressions. Supported by the National Natral Science Foundation of China (Grant No. 60602058), the National High Technology Research and Development Program of China (Grant No. 2006AA01Z257)  相似文献   

18.
主要研究了瑞利衰落信道下基于放大转发策略的双向中继系统的中断性能及分集性能。首先利用信源节点信噪比间的关系和调和不等式对信噪比的范围进行优化,得到新的中断概率下界,仿真结果表明Monte Carlo仿真得到的中断概率接近新得到的中断概率下界;同时证明了多中继存在时,基于最大最小互信息准则的双向中继系统仍然取得全分集增益且能够优化中断概率下界。  相似文献   

19.
We investigate the problem of resource allocation in a downlink orthogonal frequency-division multiple access (OFDMA) broadband network with an eavesdropper under the condition that both legitimate users and the eavesdropper are with imperfect channel state information (CSI). We consider three kinds of imperfect CSI: (1) noise and channel estimation errors, (2) feedback delay and channel prediction, and (3) limited feedback channel capacity, where quantized CSI is studied using rate-distortion theory because it can be used to establish an informationtheoretic lower bound on the capacity of the feedback channel. The problem is formulated as joint power and subcarrier allocation to optimize the maximum-minimum (max-min) fairness criterion over the users’ secrecy rate. The problem considered is a mixed integer nonlinear programming problem. To reduce the complexity, we propose a two-step suboptimal algorithm that separately performs power and subcarrier allocation. For a given subcarrier assignment, optimal power allocation is achieved by developing an algorithm of polynomial computational complexity. Numerical results show that our proposed algorithm can approximate the optimal solution.  相似文献   

20.
Consider a two-way amplify-and-forward (AF) relay network where two legitimate nodes communicate through a relay in the presence of an eavesdropper. Assuming full duplexity at the legitimate nodes and the relay, a robust artificial noise (AN)-aided AF scheme is proposed to maximize the worst-case sum secrecy rate under imperfect channel state information (CSI) of the eavesdropper. This robust sum secrecy rate maximization (SSRM) problem is formulated as a max-min semi-infinite problem and is tackled by the semidefinite relaxation (SDR) method. In particular, we first convert the max-min semi-infinite problem into a maximization problem with a finite number of constraints. Then, an efficient two-block alternating difference-of-concave (DC) programming approach is proposed to iteratively solve the SDR problem, with one of the blocks computed in closed form. In addition, a specific robust rank-one solution construction procedure is presented to extract a feasible solution for the original robust SSRM problem from the SDR solution. The efficacy of the proposed method is demonstrated by numerical simulations.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号