用户名: 密码: 验证码:
无线能量采集技术下的全双工中继系统安全性能分析
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Security Performance Analysis of Full Duplex Relay System With Wireless Energy Harvesting
  • 作者:吴奇 ; 刘菁 ; 赵睿 ; 聂志巧 ; 李元健
  • 英文作者:WU Qi;LIU Jinghua;ZHAO Rui;NIE Zhiqiao;LI Yuanjian;College of Information Science and Engineering, Huaqiao University;Xiamen Key Laboratory of Mobile Multimedia Communications, Huaqiao University;
  • 关键词:物理层安全 ; 能量采集 ; 协作通信 ; 马尔科夫链 ; 遍历可达安全速率
  • 英文关键词:physical layer security;;energy harvesting;;cooperative communication;;Markov chain;;ergodic average secrecy rate
  • 中文刊名:HQDB
  • 英文刊名:Journal of Huaqiao University(Natural Science)
  • 机构:华侨大学信息科学与工程学院;华侨大学厦门市移动多媒体重点实验室;
  • 出版日期:2019-05-20
  • 出版单位:华侨大学学报(自然科学版)
  • 年:2019
  • 期:v.40;No.167
  • 基金:国家自然科学基金资助项目(61401165);; 福建省自然科学基金资助项目(2015J01262);; 华侨大学研究生科研创新能力培育计划资助项目(1611301040)
  • 语种:中文;
  • 页:HQDB201903017
  • 页数:9
  • CN:03
  • ISSN:35-1079/N
  • 分类号:116-124
摘要
为提升基于无线能量采集技术的全双工中继安全网络系统的安全性能,提出全双工中继干扰窃听者的策略.为干扰窃听者窃听有用信息,在第一时隙,中继发送人工噪声干扰窃听者;在第二时隙,中继在转发有用信息的同时,信源发送人工噪声干扰窃听者.在瑞利衰落信道下,通过合理的近似分析,推导出遍历可达安全速率(EASR)的表达式.分析与仿真结果表明:理论分析曲线与蒙特卡洛仿真结果基本吻合;对模型进行不同参数的性能对比,显示出所提系统在不同情况下具有性能优越性.
        A full-duplex relay secure transmission model is investigated based on wireless energy harvesting technology. In order to improve the security performance of the system, a strategy of interfering eavesdroppers with full-duplex relay nodes is proposed. In order to preventing eavesdrop useful information for eavesdroppers, in the first time slot, the relay sends artificial noise to disturb the eavesdropper. In the second time slot, the relay sends useful information while the source sends artificial noise to disturb the eavesdropper. Under the rayleigh fading channel, an expression of ergodic achievable secrecy rate(EASR) is deduced through reasonable approximate analysis. The analysis and simulation results show that the theoretical analysis curves are in good agreement with the Monte Carlo simulation results, and the performance comparison of the model under different parameter settings shows the performance superiority of the strategy in different situations.
引文
[1] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Forensics and Security,2008,54(6):2515-2534.DOI:10.1109/TIT.2008.921908.
    [2] WYNER A D.The wire-tap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.DOI:10.1002/j.1538-7305.1975.tb02040.x.
    [3] ZHAO Rui,HUANG Yongming,WANG Wei,et al.Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming[J].IEEE Transactions on Wireless Communications,2016,15(4):2537-2551.DOI:10.1109/TWC.2015.2504526.
    [4] LI Yuanjian,ZHAO Rui,TAN Xing,et al.Secrecy performance analysis of artificial noise aided precoding in full-duplex relay systems[C]//IEEE Global Communications Conference.Singapore:IEEE Press,2017:214-218.DOI:10.1109/GLOCOM.2017.8254504.
    [5] ZHAO Rui,YUAN Yi,FAN Lisheng,et al.Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-m fading channels[J].IEEE Transactions on Communications,2017,65(2):549-563.DOI:10.1109/TCOMM.2016.2618793.
    [6] ZHAO Rui,LIN Hongxin,HE Yucheng,et al.Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI[J].IEEE Transactions on Communications,2018,66(2):546-559.DOI:10.1109/TCO MM.2017.2747554.
    [7] 沈振汉,黄华灿.B3G小区间干扰抑制技术[J].华侨大学学报(自然科学版),2011,32(2):165-168.DOI:10.11830/ISSN.1000-5013.2011.02.0165.
    [8] LI Chunguo,LIU Peng,ZOU Chao,et al.Spectral-efficient cellular communications with coexistent one-and two-hop transmissions[J].IEEE Transactions on Vehicular Technology,2016,65(8):6765-6772.DOI:10.1109/TVT.2015.2472456.
    [9] DONG Lun,HAN Zhu,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.DOI:10.1109/TSP.2009.2038412.
    [10] CHEN Gaojie,GONG Yu,JONATHON A C.Physical layer network security in the full-duplex relay system[J].IEEE Transactions on Information Forensics and Security,2015,10(3):574-583.DOI:10.1109/TIFS.2015.2390136.
    [11] SURAWEERA H A,KRIKIDIS I,ZHENG Gan,et al.Low-complexity end-to-end performance optimization in MIMO full-duplex relay systems[J].IEEE Transactions on Wireless Communications,2014,13(2):913-927.DOI:10.1109/TWC.2013.122313.130608.
    [12] RIIHONEN T,WERNER S,WICHMAN R.Mitigation of loopback self-interference in full-duplex MIMO relays[J].IEEE Transaction on Signal Processing,2011,59(12):5983-5993.DOI:10.1109/TSP.2011.2164910.
    [13] XU Jie,ZHANG Rui.Throughput optimal policies for energy harvesting wireless transmitters with non-ideal circuit power[J].IEEE Journal on Selected Areas in Communications,2014,32(2):322-332.DOI:10.1109/JSAC.2014.141212.
    [14] LUO Shixin,ZHANG Rui,LIM T J.Optimal save-then-transmit protocol for energy harvesting wireless transmitters[J].IEEE Transactions on Wireless Communications,2013,12(3):1196-1207.DOI:10.1109/TWC.2013.0 12413.120488.
    [15] ZHONG Caijun,SURAWEERA H A,ZHENG Gan,et al.Wireless information and power transfer with full duplex relaying[J].IEEE Transactions on Communications,2014,62(10):3447-3461.DOI:10.1109/TCOMM.2014.2357 423.
    [16] XING Hong,LIU Liang,ZHANG Rui.Secrecy wireless information and power transfer in fading wiretap channel[J].IEEE Transactions on Vehicular Technology,2016,65(1):180-190.DOI:10.1109/TVT.2015.2395725.
    [17] YING Bi,HE Chen.Accumulate and jam:Towards secure communication via a wireless-powered full-duplex jammer[J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1538-1550.DOI:10.1109/JSTSP.2016.2600523.
    [18] LIU Hongwu,KIM K J,KWAK K S,et al.Power splitting-based SWIPT with decode-and-forward full-duplex relaying[J].IEEE Transactions on Wireless Communications,2016,15(11):7561-7577.DOI:10.1109/TWC.2016.2604801.
    [19] KRIKIDIS I,CHARALAMBOUS T,THOMPSON J S.Buffer-aided relay selection for cooperative diversity systems without delay constraints[J].IEEE Transactions on Wireless Communications,2012,11(5):1957-1967.DOI:10.1109/TWC.2012.032712.111970.
    [20] GRADSHTEYN I S,RYZHIK I M.Table of integrals,series,and products[M].New York:Academic Press,2007.
    [21] RECKTENWALD G W.Numerical methods with MATLAB:Implementation and application[M].United States:Prentice Hall,2000.
    [22] LI Yuanjian,ZHAO Rui,WANG Yi,et al.Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications[J].IEEE Access,2018,6(7):44107-44119.DOI:10.1109/ACCESS.2018.2851598.
    [23] LI Yuanjian,ZHAO Rui,FAN Lisheng,et al.Antenna mode switching for full-duplex destination-based jamming secure transmission[J].IEEE Access,2018,6(1):9442-9453.DOI:10.1109/ACCESS.2018.2791638.
    [24] TAN Xing,ZHAO Rui,LI Yuanjian.Large-scale antennas analysis of untrusted relay system with cooperative jamming[C]//International Conference on Network and Service Management,IEEE Computer Society.Tokyo:IEEE Press,2017:26-30.DOI:10.23919/CNSM.2017.8256012.
    [25] NIE Zhiqiao,ZHAO Rui,LI Yuanjian,et al.A full-duplex SWIPT relaying protocol based on discrete energy state[C]//IEEE 20th International Symposium on Wireless Personal Multimedia Communications.Bali:IEEE Press,2017:500-505.DOI:10.1109/ WPMC.2017.8301864.
    [26] LI Chunguo,WANG Jue,ZHENG Fuchun,et al.Overhearing based cooperation for two-cell network with asymmetric uplink-downlink traffics[J].IEEE Transactions on Signal and Information Processing over Networks,2016,2(3):350-361.DOI:10.1109/TSIPN.2016.2549179.
    [27] LI Chunguo,HYUN J Y,SUN Fan,et al.Multiuser overhearing for cooperative two-way multiantenna relays[J].IEEE Transactions on Vehicular Technology,2016,65(5):3796-3802.DOI:10.1109/TVT.2015.2441879.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700