全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

能量收集协同干扰中继系统保密速率优化
Secrecy Rate Optimization for Cooperative Jamming Relay System with Energy Harvesting Constraints

DOI: 10.3969/j.issn.1001-0548.2015.06.001

Keywords: 协同干扰,聋中继,能量收集,中继窃听信道,储能-发送,保密速率

Full-Text   Cite this paper   Add to My Lib

Abstract:

研究各有一个源节点、中继节点、目的节点和窃听节点的中继窃听信道模型的保密速率的优化问题。模型中各节点具有能量收集能力,源节点和中继节点采用“储能-发送”模式工作,即先收集能量,再发送数据。中继节点采用协同干扰模式,在源节点进行数据发送时对窃听者进行干扰。首先分析得到中继协同干扰方式下提高保密容量的条件;然后给出以最大化保密速率Rs为目标的吸收比例系数ρ和中继节点发送功率Pr的迭代优化算法。通过对算法性能进行仿真,证明该算法收敛速度快,能有效提高系统的保密传输速率。

References

[1]  WYNER A. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
[2]  BASSILY R, ULUKUS S. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks[J]. IEEE Transactions on Signal Processing, 2013, 61(6): 1544-1554.
[3]  XIE Jian-wei, ULUKUS S. Secure degrees of freedom of the Gaussian wiretap channel with helpers[C]//IEEE 50th Annual Allerton Conference on Communication Control and Computing. Monticello, IL: IEEE, 2012: 193-200.
[4]  SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: a tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
[5]  DEBBAH M, GAMAL H E, Poor H V, et al. Wireless physical layer security[J]. Eurasip Journal on Wireless Communications and Networking, 2009, 9(1): 313-316.
[6]  曹傧, 段海霞, 朱德利, 等. 协作通信系统中能效优化的中继分配算法[J]. 电子科技大学学报, 2014, 43(6): 807-812. CAO Bin, DUAN Hai-xia, ZHU De-li, et al. Relay assignment aligorithm based on energy efficiency optimization in cooperative communication systems[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(6): 807-812.
[7]  TEKIN E, YENER A. The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2735-2751.
[8]  HUANG Jing, SWINDLEHURST A L. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
[9]  LIN M, GE JIAN-hua, YANG Ye. An effective secure transmission scheme for AF relay networks with two-hop information leakage[J]. IEEE Communications Letters, 2013, 17(8): 1676-1679.
[10]  SUDEVALAYAM S, KULKARNI P. Energy harvesting sensor nodes: survey and implications[J]. IEEE Communications Surveys and Tutorials, 2011, 13(3): 443-461.
[11]  HUANG Chuan, ZHANG Rui, CUI Shu-guang. Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints[J]. IEEE Transactions on Wireless Communications, 2014, 13(2): 1-14.
[12]  SHANNON C E. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715.
[13]  LUN Dong, ZHU Han, PETROPULU A P, et al. Cooperative jamming for wireless physical layer security[C]//IEEE 15th Workshop on Statistical Signal Processing. Cardiff: IEEE, 2009: 417-420.
[14]  YIN S, ZHANG E, LI J, et al. Throughput optimization for self-powered wireless communications with variable energy harvesting rate[C]//IEEE Wireless Communications and Networking Conference (WCNC). Shanghai: IEEE, 2013: 830-835.
[15]  HUANG Chuan, ZHANG Rui, CUI Shu-guang. Throughput maximization for the Gaussian relay channel with energy harvesting constraints[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(8): 1469-1479.
[16]  KRIKIDIS I, TIMOTHEOU S, SASAKI S. RF energy transfer for cooperative networks: data relaying or energy harvesting[J]. IEEE Communications Letters, 2012, 16(11): 1772-1775.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133