期刊文献+

具有功率分配因子的不可信中继系统的中断性能和遍历保密容量 被引量:2

Outage Performance and Ergodic Secrecy Capacity for Untrusted Relay Networks with Power Allocation Factor
下载PDF
导出
摘要 基于不存在直接链路的具有不可信中继的三节点系统,本文在协作干扰模型中引入功率分配因子,对两种放大转发因子下系统的中断概率和遍历保密容量进行了计算及对比分析。首先,系统采用平均放大因子,推导出其保密中断概率;然后,在引入同样功率分配因子的基础上,系统改用自适应瞬时放大因子,得出保密中断概率的下界;为了对比,本文接着给出了系统两种情况下的遍历保密容量;最后,仿真验证了中断概率和遍历保密容量计算的准确性,数值仿真表明引入功率分配因子可减小系统的中断概率和提高系统的遍历保密容量,瞬时放大因子下系统性能较平均放大因子下更好。 In the practical communication systems,relay can't be completely trusted,so the research on untrusted relay is very necessary. Based on the three-node untrusted relay networks without the direct link,this papper aimed to introduce the power allocation factor in the cooperative interference model,and calculate and analyze the outage probability and ergodic secrecy capacity of the system on two kinds of amplifying coefficients. We first derived the secrecy outage probability on the average amplifying coefficient. Subsequently,on the basis of the same power allocation factor,the adaptive instantaneous amplifying coefficient was used and the lower bound of the secrecy outage probability was derived. For comparison purposes,we gave the ergodic secrecy capacity of the system. Finally,the simulation results confirmed that the derived outage probability and ergodic secrecy capacity was exact,numerical simulations show that the introduction of power allocation factor can reduce the outage probability and improve the ergodic secrecy capacity of the system,the performance of the system on the instantaneous amplifying coefficient is better than the average amplifying coefficient.
出处 《信号处理》 CSCD 北大核心 2014年第11期1349-1356,共8页 Journal of Signal Processing
基金 国家自然科学基金(61471076 61271259 61301123) 长江学者和创新团队发展计划(IRT1299) 重庆市科委重点实验室专项经费
关键词 不可信中继 基于目的端干扰 功率分配 中断性能 遍历保密容量 untrusted relay detination-based jamming(DBJ) power allocation outage performance ergodic secrecy capacity(ESC)
  • 相关文献

参考文献32

  • 1Shiu Y S, Chang S Y, Wu H C, et al. Physical layer se- curity in wireless networks : A tutorial [ J ]. IEEE Wire- less Communications, 2011, 10(2) : 66-74. 被引量:1
  • 2Hong Y W P, Lan P C, Kuo C C J. Enhancing physical- layer secrecy in multiantenna wireless systems: An over- view of signal processing approaches [ J ]. IEEE Signal Processing Magazine, 2013, 30 (3) : 29-40. 被引量:1
  • 3Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28(4) : 656-715. 被引量:1
  • 4Wyner A D. The wire-tap channel[J]. Bell System Tech- nical Journal, 1975, 54(8) : 1355-1387. 被引量:1
  • 5Csixzar I, Komer J. Broadcast channels with confidential messages[ J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348. 被引量:1
  • 6Leung-Yan-Cheong S K, Hellman M E. The Gaussian wiretap channel [ J ]. IEEE Transactions on Information Theory, 1978, 24(4) : 451-456. 被引量:1
  • 7Gopala P K, Lai L, Garnal H E. On the secrecy capacity of fading channels [ J ]. IEEE Transactions on Information Theory, 2008, 54(10): 4687-4698. 被引量:1
  • 8Li Z, Yates R, Trappe W. Achieving secret communication for fast rayleigh fading channels [ J ]. IEEE Transactions on Wireless Communications, 2010, 9 (9) : 2792-2799. 被引量:1
  • 9Jeon H, Kim N, Choi J, et al. Bounds on secrecy capac- ity over correlated ergodic fading channels at high SNR [J]. IEEE Transactions on Information Theory, 2011, 57(4) : 1975-1983. 被引量:1
  • 10Khisti A, Womell G W. Secure transmission with multi- ple antennas I: The MISOME wire-tap channel[ J]. IEEE Transactions on Information Theory, 2010, 56 ( 7 ) : 3088- 3104. 被引量:1

二级参考文献15

  • 1A. D. Wyner,The wiretap channel [ J ] , Bell Syst. Tech. J, 1975,54 : 1355-1387. 被引量:1
  • 2I. Csiszar and J. Korner, " Broadcast channels with confi- dential messages [ J ] , IEEE Trans. Inform. Theory, vol. IT-24, no. 3, May 1978 : 339-348. 被引量:1
  • 3F. Oggier and B. Hassibi, The secrecy capacity of the MI- MO wiretap channel[ C], in IEEE Int. Symp. Informa- tion Theory (ISIT) ,Toronto, ON, Canada,2008:524-528. 被引量:1
  • 4Y. Liang, H. V. Poor, and S. Shamai (Shitz) , Secure com- munication over fading channels [ J ] , IEEE Transactions on Information Theory, Jun, 2008,54 ( 6 ) : 2470-2492. 被引量:1
  • 5S. Goel and R. Neg, Guaranteeing Secrecy using Artificial Noise[ J ] ,IEEE TRANSACTIONS ON WIRELESS COM- MUNICATIONS ,2008,7:2180-2189. 被引量:1
  • 6W. C. Liao, T. H. Chang, W. K. Ma, et al. , Joint transmit beamforming and artificial noise design for QoS discrimi- nation in wireless downlink [ C ], presented at the IC- ASSP,2010. 被引量:1
  • 7Q. Haohao, C. Xiang, S. Yin, et al. , Optimal Power Alloca- tion for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications [ C ], in Communications Workshops ( ICC), 2011 IEEE International Conference on,2011:1-5. 被引量:1
  • 8M. Ghogho and A. Swami, Physical-layer secrecy of MI-MO communications in the presence of a Poisson random field of eavesdroppers [ C ], presented at the IEEE ICC Workshop on Physical Layer Security ,2011. 被引量:1
  • 9L. Wei-Cheng, C. Tsung-Hui, M. Wing-Kin, etal ,QoS- Based Transmit Beamforming in the Presence of Eaves- droppers: An Optimized Artificial-Noise-Aided Approach [ J ] , Signal Processing, IEEE Transactions on,2011,59 : 1202-1216. 被引量:1
  • 10M. Jainy, J. I. Choiy, T. M. Kim, et al. , Practical, Real- time, Full Duplex Wireless [ C ], presented at the Mobi- Corn, Las Vegas, Nevada,USA. ,2011. 被引量:1

共引文献15

同被引文献7

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部