首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Secure transmission in wireless networks is a big critical issue due to the broadcast nature of the wireless propagation environment. In this paper, the physical layer security performance in a mixed radio frequency (RF)/free space optical (FSO) system under multiple eavesdroppers is investigated. The RF links and FSO link within the system are assumed to respectively undergo Nakagami-m and Gamma–Gamma fading distributions. The two practical eavesdroppers scenarios considered includes: Colluding and Non-colluding in which their channel state information is unavailable at the source. The closed-form expressions for the lower bound security outage probability and the strictly positive secrecy capacity under both scenarios are derived by utilizing the system end-to-end cumulative distribution function and eavesdroppers’ probability density function. The results show that the increase in the number of eavesdroppers under both scenarios profoundly degrades the system secrecy performance. Moreover, it is demonstrated that both the atmospheric turbulence and pointing errors affect the concerned system secrecy and the impact of RF fading parameters is also presented. The accuracy of the numerical results obtained is validated by Montel-Carol simulations.  相似文献   

2.
A performance analysis of user scheduling schemes for multiuser MIMO systems exploiting the multiuser and antenna diversities over Nakagami-m fading channels is presented. We consider different scheduling schemes including absolute SNR-based scheduling, and normalized SNR-based scheduling schemes for both heterogeneous and homogeneous wireless networks. We derive closed-form expressions for the average spectral efficiency, average bit error rate (BER), and outage probability of the system under study for each scheduling scheme. Using the results obtained from the closed-form analytical expressions, we compare the presented schemes and show their significant advantages.  相似文献   

3.
In this paper, we investigate the secrecy performance of a downlink non-orthogonal multiple access enabled V2V communication system wherein a source vehicle communicates with two authenticated user vehicles, i.e., far user and near user, in the presence of a passive eavesdropper vehicle. Moreover, we formulate two scenarios based on the eavesdropper’s decoding capabilities; (1) Scenario I: when the eavesdropper vehicle has comparable decoding capabilities as with the authorized user vehicles, and (2) Scenario II: when the eavesdropper is entirely capable of perfectly decoding the signals from both authorized user vehicles. For such a system configuration with Scenarios I & II, we deduce the analytical expressions for the secrecy outage probability (SOP) and ergodic secrecy capacity over independent but not necessarily identically distributed double-Rayleigh fading channels. Further, to obtain insights into the secrecy diversity order for the legitimate user vehicles under Scenarios I & II, we present the asymptotic SOP analysis by taking three cases into account; (1) Case 1: when the average transmit signal-to-noise ratio approaches infinity, (2) Case 2: when the average channel gains of the user vehicles tend to infinity with fixed average channel gains corresponding to the eavesdropper, and (3) Case 3: when the average channel gains pertaining to the user vehicles and the eavesdropper tend to infinity. From which, we can infer that the secrecy diversity order of the far user vehicle is zero for Cases 1, 2, & 3, whereas the secrecy diversity order of the near user vehicle is zero for Cases 1 & 3 and one for Case 2, under Scenarios I & II. The numerical and simulation results corroborate our theoretical investigations. Our results demonstrate the impact of transmit power, power allocation factor, channel conditions of legitimate users and eavesdropper on the system’s secrecy performance.  相似文献   

4.
This work investigates the physical layer secrecy performance of a hybrid satellite/unmanned aerial vehicle (HS-UAV) terrestrial non-orthogonal multiple access (NOMA) network, where one satellite source intends to make communication with destination users via a UAV relay using NOMA protocol in the existence of spatially random eavesdroppers. All the destination users randomly distributed on the ground comply with a homogeneous Poisson point process in the basis of stochastic geometry. Adopting Shadowed-Rician fading in satellite-to-UAV and satellite-to-eavesdroppers links while Rayleigh fading in both UAV-to-users and UAV-to-eavesdroppers links, the theoretical expressions for the secrecy outage probability (SOP) of the paired NOMA users are obtained based on the distance-determined path-loss. Also, the asymptotic behaviors of SOP expressions at high signal-to-noise ratio (SNR) regime are analyzed and the system throughputs of the paired NOMA users are examined for gaining further realization of the network. Moreover, numerical results are contrasted with simulation to validate the theoretical analysis. Investigation of this work shows the comparison of SOP performance for the far and near user, pointing out the SOP performance of the network depends on the channel fading, UAV coverage airspace, distribution of eavesdroppers and some other key parameters.  相似文献   

5.
6.
In this paper, an underlay spectrum-sharing system with Alamouti orthogonal space–time block coding (OSTBC) is considered to analyze and evaluate the physical layer security (PLS) performance of the cognitive radio system under a practical scenario with spatially correlated transmit antennas. It is assumed that there exists a passive eavesdropper and the cognitive channel and the wiretap channel follow Rayleigh fading distribution. To investigate and study the PLS performance of the cognitive system, first closed-form expressions are derived for three PLS metrics, namely: the probability of strictly-positive secrecy capacity (PSPSC), the secrecy outage probability (SOP), and the average secrecy capacity (ASC). Then numerical results obtained from the derived closed-form expressions are presented and validated by the computer simulations, to study the effects of spatial correlation on the PLS performance of the considered cognitive radio system under different parameters. It is shown that increasing the SNR of the cognitive system (Alice-to-Bob) channel yields an improvement in the PLS of the cognitive system. Moreover, a smaller value of the eavesdropping (Alice-to-Eve) channel SNR always leads to a better PLS for the cognitive system. It is also observed that the spatial correlation related to Alice-to-Bob channel degrades the PLS, and the spatial correlation related to Alice-to-Eve channel has less impact on the PLS performance.  相似文献   

7.
A cooperative protocol for wireless mesh networks is proposed in this paper. The protocol implements both on-demand relaying and a selection of the best relay terminal so only one terminal is relaying the source message when cooperation is needed. Two additional features are also proposed. The best relay is selected with a splitting algorithm. This approach allows fast relay selection within less than three time-slots, on average. Moreover, a pre-selection of relay candidates is performed prior to the splitting algorithm. Only terminals that are able to improve the direct path are pre-selected. So efficient cooperation is now guaranteed. We prove that this approach is optimal in terms of diversity-multiplexing trade-off. The protocol has been designed in the context of Nakagami-m fading channels. Simulation results show that the performance of the splitting algorithm does not depend on channel statistics.  相似文献   

8.
It is known that for a slow fading Gaussian wiretap channel without channel state information at the transmitter and with statistically independent fading channels, the outage probability of any given target secrecy rate is non-zero, in general. This implies that the so-called zero-outage secrecy capacity (ZOSC) is zero and we cannot transmit at any positive data rate reliably and confidentially. When the fading legitimate and eavesdropper channels are statistically dependent, this conclusion changes significantly. Our work shows that there exist dependency structures for which positive zero-outage secrecy rates (ZOSR) are achievable. In this paper, we are interested in the characterization of these dependency structures and we study the system parameters in terms of the number of observations at legitimate receiver and eavesdropper as well as average channel gains for which positive ZOSR are achieved. First, we consider the setting that there are two paths from the transmitter to the legitimate receiver and one path to the eavesdropper. We show that by introducing a proper dependence structure among the fading gains of the three paths, we can achieve a zero secrecy outage probability (SOP) for some positive secrecy rate. In this way, we can achieve a non-zero ZOSR. We conjecture that the proposed dependency structure achieves maximum ZOSR. To better understand the underlying dependence structure, we further consider the case where the channel gains are from finite alphabets and systematically and globally solve the ZOSC. In addition, we apply the rearrangement algorithm to solve the ZOSR for continuous channel gains. The results indicate that the legitimate link must have an advantage in terms of the number of antennas and average channel gains to obtain positive ZOSR. The results motivate further studies into the optimal dependency structures.  相似文献   

9.
As an important part of the intelligent transportation system (ITS), vehicular networks can provide drivers and passengers with more comfortable and convenient services such as efficient traffic management and infotainment. However, the security threats on data exchanges over vehicular networks have become increasingly severe. Different from conventional cryptographic technologies, the application of physical layer security (PLS) to vehicular networks has been investigated to prevent the security of exchanging data from the eavesdropper and measure precisely the leaked information to the eavesdropper, due to its low complexity and communication overhead. In this work, we are concerned with the PLS of cooperative vehicular networks consisting of a source vehicle, a destination vehicle, an eavesdropping vehicle and a cooperative jamming vehicle. First, to improve the secrecy performance, the cooperative jamming helper emits jamming signals to degrade the eavesdropping channel without harming the legitimate channel. Then, based on the Rayleigh fading channel models and the traffic models, the closed-form expressions of the secrecy outage probability (SOP) and the average secrecy capacity (ASC) of the considered vehicular networks are derived, which deliver more implications of various system parameters on SOP and ASC performances and can be computed without simulations at a lower complexity. Second, a definition of the optimal jamming vehicle is introduced and then the cooperative jamming vehicle selection strategy is presented. The existence of the optimal jamming vehicle is measured in probability, which is explored analytically. Third, the optimal power allocation that maximizes the secrecy capacity is found analytically for the source vehicle and the cooperative jamming helper. Finally, simulations are also presented to demonstrate the validation of these analytical results and confirm the advantages of the cooperative jamming strategy and the optimal power allocation. From the numerical results, more observations on the effects of the main system parameters on secrecy performances are obtained, which provides some useful guides for practice.  相似文献   

10.
11.
12.
13.
Wireless channels suffer from short term fading and shadowing simultaneously. While simple models of short term fading are based on the Nakagami-m distribution, short term fading can also be described as a cascading process allowing the modeling of wireless channels having worse fading than what exists in Nakagami-m channels. Shadowing, on the other hand, has been traditionally modeled as a lognormal process, making the analysis of shadowed fading channels cumbersome. Taking note of the fact that the lognormal density arises out of a multiplicative process, it was shown that shadowing can also be modeled as a cascading process. Utilizing such a vision of shadowing, this work provides an overview of a unified cascaded approach to model wireless channels when short term fading and shadowing are simultaneously present. The degradation in such shadowed fading channels is estimated in terms of error rates and outage probabilities. Results are compared to those of the exact model based on lognormal density as well as random number simulation. Analysis demonstrates that error rates and outage probabilities obtained using the exact model (lognormal model for shadowing) agree very well with those obtained through the composite cascaded model as well as random number simulations.  相似文献   

14.
15.
In this paper, the probability of fade is performed for the airborne laser communication systems considering both the atmospheric and aero-optic effects. The atmospheric fluctuation is characterized by the exponentiated Weibull (EW) fading channel. The novel analytical expression is derived for probability of fade according to Meijer’s G function. The probability of fade is demonstrated to the simulation data with the Gamma–Gamma and log-normal distributions. The probability of fade is obtained for different flight altitudes and propagation distances. The probability of fade is analyzed in the airborne laser communication systems under the effect of aperture averaging in weak-to-strong turbulence regime. Results suggest that the proposed EW model is valid in airborne laser communication with high altitude, especially in the lower values of the irradiance under atmospheric turbulence and aero-optics effect. The fading of outage performance can be effectively mitigated by aperture averaging. Furthermore, this work is helpful for the compensate technique of system performance on airborne optical communication system.  相似文献   

16.
17.
信道容量是通信系统能够达到的最大传输速率,是衡量通信系统通信能力的重要指标之一。在建立了光多输入多输出(MIMO)的信道模型之后,结合脉冲位置调制(PPM)分析了光MIMO系统的平均容量和中断容量;在无背景辐射的条件下,分别推导出了有无衰落时光MIMO平均容量封闭形式的近似表达式。在相同发射功率和传输带宽条件下,得到了光MIMO技术能成倍提高现有系统信道容量的结论。通过Monte Carlo仿真实验进一步证明了理论的正确性。  相似文献   

18.
19.
In this paper, we address several optimization problems in satellite optical communications. We show that the inter-satellite links with swaying transmitters can be described as an equivalent fading model. We further indicate that the instantaneous signal-to-noise ratio follows the reciprocal Pareto distribution. Then we conduct the analysis on several performance metrics such as the first and second moments of signal-to-noise ratio, the amount of fading, as well as the outage probability. Based on these metrics, we establish optimization models and provide the corresponding solutions.  相似文献   

20.
In this paper, we mainly investigate the outage performance of serial and parallel relay-assisted underwater wireless optical communication (UWOC) systems based on a newly proposed aggregated underwater fading model. In order to overcome the deficiency of the traditional underwater weak turbulence models, that is, they could not accurately fit the measured data in the laboratory, the generalized gamma distribution (GGD) which has been verified by a series of experiments is chosen for the first time to characterize the weak oceanic turbulence. Then, we establish a new receiving signal model which has integrated the implicit path loss plus multipath propagation effect shown by fading free impulse response (FFIR), GGD weak oceanic turbulence, and nonzero boresight pointing errors. Next, we deduce the closed-form expression of the probability density function (PDF) of the hybrid fading considering GGD weak turbulence and nonzero boresight errors based on the new receiving signal model above through double-exponential Taylor expansion and higher transcendental Whittaker function. Finally, the analytical expressions of the outage probabilities for point-to-point (P2P) link, serial and parallel relay-assisted UWOC systems are further derived respectively under the proposed aggregated channel. Numerical simulations are also provided to validate the accuracy of the theoretical formulae derived above, and to show the effects of the key system parameters on the outage performance of relaying UWOC systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号