儲(chǔ)能-發(fā)送模式的單天線兩跳中繼系統(tǒng)保密速率的優(yōu)化
doi: 10.11999/JEIJ151371 cstr: 32379.14.JEIJ151371
國(guó)家自然科學(xué)基金(61471076, 61301123),長(zhǎng)江學(xué)者和創(chuàng)新團(tuán)隊(duì)發(fā)展計(jì)劃(IRT1299),重慶市重點(diǎn)實(shí)驗(yàn)室專項(xiàng)經(jīng)費(fèi)
Secrecy Rate Optimization for Single Antenna Two-hop Relay System in Energy-saving-then-transmitting Mode
The National Natural Science Foundation of China (61471076, 61301123), The Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), The Special Fund of Chongqing Key Laboratory
-
摘要: 該文研究節(jié)點(diǎn)具有能量收集能力的兩跳中繼系統(tǒng)的物理層安全傳輸方案??紤]竊聽節(jié)點(diǎn)與源和中繼節(jié)點(diǎn)間都有直接鏈路的情況。每個(gè)數(shù)據(jù)傳輸時(shí)隙分為能量收集和數(shù)據(jù)傳輸兩個(gè)階段,各節(jié)點(diǎn)用收集的能量發(fā)送信號(hào)。中繼采用放大轉(zhuǎn)發(fā)方式,目的節(jié)點(diǎn)發(fā)送人工噪聲進(jìn)行協(xié)作干擾,保護(hù)在兩跳傳輸中傳輸?shù)谋C苄畔?。以最大化保密速率為目?biāo),采用迭代算法優(yōu)化能量吸收和數(shù)據(jù)傳輸兩階段的時(shí)間分配比例系數(shù)和協(xié)作干擾功率分配因子。仿真結(jié)果表明優(yōu)化算法準(zhǔn)確,優(yōu)化后的協(xié)作干擾方案能顯著提高系統(tǒng)的保密傳輸速率。由于考慮了竊聽節(jié)點(diǎn)在兩跳傳輸中都能接收到信號(hào)的可能性,文中方案更貼近實(shí)際,并解決了一個(gè)復(fù)雜的優(yōu)化問(wèn)題。
-
關(guān)鍵詞:
- 保密速率 /
- 能量收集 /
- 儲(chǔ)能-發(fā)送 /
- 協(xié)作干擾 /
- 中繼
Abstract: A physical layer security transmission protocol in a two-hop relay system is studied. All nodes are equipped with an antenna and have the ability of energy harvesting. There are direct links between the source node and the eavesdropper as well as the relay node and the eavesdropper. Each transmission time slot is divided into two stages, which are respectively used for energy harvesting and data transmitting. The energy harvested is used to send data. The amplify-and-forward protocol is adopted, and the destination node sends artificial noise to protect the information transmitted in the first and second hop. To maximize the secrecy rate, iterative algorithm is used to optimize two variables of the time for energy harvesting and the power of artificial noise. Simulation results show that the optimization algorithm is accurate and the cooperative jamming can effectively improve the secrecy rate. Considering that eavesdropper can intercept the information transmitted in the two hops, the proposed scheme is more practical and can solve a complicate optimization problem.-
Key words:
- Secrecy rate /
- Energy harvesting /
- Save-then-transmit /
- Cooperative jamming /
- Relay
-
MUKHERJEE A, FAKOORIAN S, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys Tutorials, 2014, 16(3): 1550-1573. doi: 10.1109/SURV.2014. 012314.00178. BASSILY R, EKREM E, HE X, et al. Cooperative security at the physical layer: A summary of recent advances[J]. IEEE Signal Processing Magazine, 2013, 30(5): 16-28. doi: 10.1109/ MSP.2013.2260875. GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189. doi: 10.1109/TWC.2008.060848. HAN B, LI J, SU J S, et al. Secrecy capacity optimization via cooperative relaying and jamming for WANETs[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(4): 1117-1128. doi: 10.1109/TPDS.2014.2316155. PARK K H, WANG T, and ALOUINI M S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1741-1750. doi: 10.1109/JSAC. 2013.130908. HAGGSTROM F, GUSTAFSSON J, and DELSING J. Energy harvesting technologies for wireless sensors in rotating environments[C]. IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, 2014: 1-4. doi: 10.1109/ETFA.2014.7005364. VALENTA C R and DURGIN G D. Harvesting wireless power: survey of energy-harvester conversion efficiency in far-field, wireless power transfer Systems[J]. IEEE Microwave Magezine, 2014, 15(4): 108-120. doi: 10.1109/MMM.2014. 2309499. LI Q, MA W K, and SO A M C. Robust artificial noise-aided transmit optimization for achieving secrecy and energy harvesting[C]. IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), Florence, 2014: 1596-1600. doi: 10.1109/ICASSP.2014.6853867. LEONARD E D. Introduction to the Theory of Algebraic Equations[M]. New York: Rough Draft Printing, 1988: 67-72. 范盛金. 一元三次方程的新求根公式與新判別式[J]. 海南師范學(xué)院學(xué)報(bào)(自然科學(xué)版), 1989, 2(2): 91-98. FAN S J. A new extracting formula and a new distinguishing means on the one variable cubic equation[J]. Journal of Hainan Normal University (Natural Science), 1989, 2(2): 91-98. ZHU F, GAO F, ZHANG T, et al. Physical-layer security for full-duplex communications with self-interference mitigation [J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 329-340. doi: 10.1109/TWC.2015.2472527. -
計(jì)量
- 文章訪問(wèn)數(shù): 1254
- HTML全文瀏覽量: 125
- PDF下載量: 423
- 被引次數(shù): 0