首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
吕铄  嵇建波 《电讯技术》2024,64(1):139-148
分析了认知无线电(Cognitive Radio,CR)非正交多址(Non-orthogonal Multiple Access,NOMA)网络中的物理层安全性能。考虑到现有窃听者,支持NOMA的CR通过Nakagami-m信道以解码转发协作模式传输数据。为了分析CR-NOMA物理层安全性能,通过连接中断概率和安全中断概率的闭式表达式来评估CR-NOMA的安全性能。此外,通过蒙特卡罗模拟仿真以验证推导出的分析结果,并深入分析了参数对系统性能的影响。  相似文献   

2.
本文研究了中继选择方案对协作下认知非正交多址(CR-NOMA)网络中断性能的影响,提出了一种两级中继选择方案。第一时隙在保证主用户服务质量的基础上,次级网络源节点向认知中继集群广播叠加信号。第二时隙认知中继提供解码转发服务,协助源节点传输信息。基于上述假设,推导了次级用户中断概率的闭合表达式并给出了分析结果。证明相比于部分中继选择策略,两级中继选择策略可以达到更好的中断性能和更大的分集增益。同时本文的分析结果验证了备选中继节点数目和功率分配因子对系统中断性能的影响,蒙特卡罗仿真验证了理论结果。   相似文献   

3.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

4.
基于非正交多址接入(NOMA,Non-Orthogonal Multiple Access)的认知无线电(CR,Cognitive Radio)网络物理层传输面临主用户干扰和第三方窃听双重干扰威胁.本文提出利用空时编码(STBC,Space Time Block Coding)技术提高认知用户物理层安全性能,推导了任意认知用户的安全中断概率闭合表达式.通过蒙特卡洛仿真进行验证,结果表明,所提STBC-CR-NOMA相比未采用STBC编码方案的CR-NOMA可以明显提高用户的安全中断概率,且随着认知发射功率的增大,近端用户安全中断性能提高越大,而远端用户安全中断性能提升受认知基站发射功率的影响较小.仿真结果还表明,通过调整功率分配系数对远端用户和近端用户的安全中断性能影响不同.  相似文献   

5.
Cognitive radio network is an emerging solution to deal with spectrum scarcity and to utilize the radio spectrum in opportunistic and efficient manner. Secure data transmission is one of the important issues in these kind of networks. This work studies the secrecy outage performance of a multiple-input multiple-output underlay cognitive wiretap radio network system over Rayleigh fading channel with delayed channel state information. This work considers that the secondary transmitter is equipped with multiple antennas and confidential information is transmitted from to multiantenna receiver in the presence of multiantenna eavesdropper. Further, the transmit antenna selection scheme is considered at secondary transmitter to reduce the complexity of antenna selection and to make it more practicable. To improve the quality of signal, this work considers maximal ratio combining (MRC) at secondary receiver, while selection combining and MRC techniques are utilized at the eavesdropper. The closed form expression for exact, asymptotic, and intercept secrecy outage probability has been derived, and the simulation is done for the validation of analytical results. The derived results reveal deterioration of channel secrecy performance with outdated channel state information, and the eavesdropper with outdated channel state information has also an adverse effect. Moreover, the diversity order that can be achieved in underlay cognitive radio network with outdated channel state information is unity.  相似文献   

6.
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal. The proposed scenario can be viable for a secondary safety task force working with a primary regiment, which wishes to transmit the confidential information to the commander while an eavesdropper is trying to intercept the classified information. In the analysis, two novel power allocation methods are considered by assuming perfect and limited feedback channels of the primary network, and for both methods, exact and asymptotic expressions of secrecy outage probability (SOP) are derived for N*Nakagami‐m fading channels which are used to model fading channels such as mobile‐to‐mobile/vehicle‐to‐vehicle communication systems where the nodes are moving into a rich scattering environment. We further verified our analytic results through Monte‐Carlo simulations. It is shown from the numerical results that the cascading degree of the channels has a worsening effect on the secrecy outage performance of the CRN systems.  相似文献   

7.
针对未来海量用户设备接入的物理层安全(physical layer security,PLS)应用需求,提出了一种组合非正交多址接入(non-orthogonal multiple access,NOMA)、终端直通(device-to-device,D2D)与中继协作的NOMA-D2D协作无线系统PLS模型。该模型由采用发射天线选择(transmit antenna selection,TAS)的基站、分别作为基站和D2D发射端的NOMA远端蜂窝用户、D2D接收端以及被动窃听者组成,其中的D2D发射端承担基站的 NOMA 近端用户和解码转发中继两种角色。利用高斯—切比雪夫正交定理推导两种 TAS 方案下NOMA-D2D协作无线系统的安全中断概率、非零安全容量概率以及渐近安全中断概率的近似表达式。数值计算和仿真实验验证了NOMA-D2D协作无线系统PLS性能分析的准确性;在基站总功率恒定时增大分配给远端蜂窝用户的功率能有效提升NOMA-D2D协作无线系统的PLS性能。  相似文献   

8.
The cognitive radio technology was applied to non-orthogonal multiple access (NOMA) cooperative multicast system,the feasibility of using users as relays was studied,and a two-level cooperative transmission scheme with parameterized multicast candidate sets was proposed.Specifically,the scheme first selected the candidate set according to the cardinality q,and then selected the best forwarding node based on the channel gain between the primary users and the candidate secondary users.Simulation results show that,through the reasonable selection of the cardinality q,the proposed scheme can greatly reduce the diversity gain of the secondary users while simultaneously increasing the diversity gain of the primary users.In NOMA cooperative multicast scenario composed of N multicast users,the proposed scheme can increase the diversity gain of the primary users from 2 to min(N-q+2,q+1) to meet their reliability requirements.  相似文献   

9.
研究了瑞利衰落信道下协作非正交多址系统的安全性能。通信过程由一个时隙构成,源节点向中继广播叠加信号,全双工中继使用串行干扰消除技术解码信号协助用户通信。假设存在潜在全双工主动窃听者,窃听者能够从中继处截获信息并同时向用户发送人工噪声进行干扰。基于上述假设,在高信噪比条件下,推导了安全中断概率的近似表达式,分析了各节点传输信噪比与功率分配因子对系统中断概率的影响,分析结果与蒙特卡洛仿真结果吻合。  相似文献   

10.
龙恳  谭路垚  王奕  陈兴  王亚领 《电讯技术》2022,62(1):116-122
针对协作非正交多址接入(Non-orthogonal Multiple Access,NOMA)系统中用户充当中继并存在窃听者的场景,提出了一种新型协作干扰传输方案,以提高该系统的安全性.在第一时隙,基站将混合信号进行广播,同时为了干扰窃听者,信道条件较差的用户采用全双工的工作模式,发出协作干扰信号对窃听者进行干扰.在...  相似文献   

11.
This paper presents a cooperative spectrum sharing protocol using non‐orthogonal multiple access in cognitive radio networks. A 2‐phase protocol comprising of a primary transmitter‐receiver pair and a secondary transmitter‐receiver pair is considered. In the proposed protocol, 3 data symbols can be transmitted during the 2 phases; this is unlike the traditional decode‐and‐forward relaying where 1 data symbol can be transmitted and the conventional superposition coding–based overlay spectrum sharing and the cooperative relaying system using non‐orthogonal multiple access where 2 data symbols can be transmitted, under a single‐relay scenario. We have investigated performance of our proposed protocol in terms of ergodic sum capacity and outage probability along with analytical derivations over independent Rayleigh fading channels. We also compared our proposed protocol with the traditional decode‐and‐forward relaying, conventional superposition coding–based overlay spectrum sharing, and the cooperative relaying system using non‐orthogonal multiple access schemes to demonstrate efficacy of the proposed protocol. The simulation and analytical results are presented to confirm efficiency of the proposed spectrum sharing protocol.  相似文献   

12.
This paper analyzes the performance of a cooperative nonorthogonal multiple access (NOMA) in an underlay cognitive radio network aided by an energy harvesting relay. A secondary source transmits signal for two users, where a near user acts as a relay for the far user. The far user applies the selection combining (SC) approach on the signals which were relayed by the near user and received via direct path from the secondary source. We analytically derive the outage probability (OP) of each user separately, the overall system OP, and the throughput of the system. The impact of the power allocation coefficient of NOMA and energy harvesting parameters on outage is indicated. Further, the performance of the network is investigated with imperfection in successive interference cancellation (SIC), maximal ratio combining (MRC) at relay, and Nakagami-m fading. The results derived analytically are supported by simulation in MATLAB.  相似文献   

13.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

14.
Two novel spectrum access schemes, a hybrid spectrum access scheme (HSAS) and a modified HSAS combining underlay mode and overlay mode, are proposed for a relay based cognitive radio (CR) network. The CR employs the underlay mode with imperfect channel state information of the interfering link between CR transmitter and primary user receiver if primary user is sensed to be present else it employs overlay mode. In both the schemes, transmission of CR is assisted by relay working in amplify and forward scheme by maintaining interference below an interference threshold in underlay mode and a collision constraint in overlay mode. In HSAS, CR transmits either in underlay mode or in overlay mode only during the transmission slot of a detection cycle, whereas in modified HSAS, the CR transmits for the entire frame including the sensing time. The outage probability of CR user is considered as the performance metric. Novel expressions of outage probability for both the schemes have been developed. Impact of several sensing parameters such as sensing time, correlation coefficient, and tolerable interference threshold has been investigated. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

15.
当MISO(Multi Input Single Output)系统存在的加性人工噪声服从一般分布时,系统保密容量讨论难度较大。为推导一般意义多天线系统下的保密容量,引入了信道等效特征的概念。利用信道特征阐明了人工噪声方法的物理概念,并推导出了具有普适性的人工噪声方法保密容量上下限,进一步结合熵功率,推导出AWGN信道下的保密容量解析式。理论分析和仿真得出,通过人工噪声可使平均保密容量增大,从而提高MISO系统的安全性。  相似文献   

16.
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

17.
Joint impact of sensing time and signal power raise factor is studied for an improved energy detector–based energy harvesting cooperative cognitive radio network. All the cognitive radio nodes harvest energy either from radio frequency resources or from non–radio frequency resources. The probability density function of harvested energy from both the sources is exponentially distributed. Novel theoretical expressions for harvested energy and throughput are derived. Impact of several sensing parameters and a device constraint on the outage is studied. Optimal values of sensing time and signal power raise factor parameter pair are estimated for maximum harvested energy and maximum throughput. Energy efficiency of the network is also evaluated, and impact of sensing time on it is indicated.  相似文献   

18.
This research presents a unified performance analysis methodology for the power domains of uplink non-orthogonal multiple access (NOMA) system consisting of a base station and an arbitrary number of users over Rayleigh fading channels. The study derives exact closed-form expressions for key performance metrics, such as outage probability (OP), symbol error rate (SER), outage capacity (OC), average channel capacity (AVC), and amount of fading, using binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) modulations. The analysis encompasses all necessary channel parameters for evaluating the performance of an uplink NOMA system. The theoretical and simulation results completely supported one another. Furthermore, the results were compared with experiments in the literature using similar parameters. The proposed system was determined to increase performance by 40% for OP, 62% for SER, and 4.74 times for AVC at SNR = 20 dB. Finally, this study introduced exact solutions that can significantly accelerate NOMA systems analysis by exploiting the information in the existing database for analytical design processes in communications theory.  相似文献   

19.
Consider a multi‐user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami‐m fading. The interference channel between the secondary users (SUs) and the primary users is assumed to have Rayleigh fading. A power allocation based on the instantaneous channel state information is derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the moment‐generating function, outage performance, symbol error rate performance, and the ergodic capacity are derived. Numerical results corroborate the derived analytical results. The performance is also studied in the asymptotic regimes, and the generalized diversity gain of this scheduling scheme is derived. It is shown that when the interference channel is deeply faded and the peak transmit power constraint is relaxed, the scheduling scheme achieves full diversity and that increasing the number of primary users does not impact the diversity order. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

20.
In this paper, we investigate the secrecy performance of a cooperative cognitive radio network (CCRN) considering a single energy harvesting (EH) half‐duplex amplify and forward (AF) relay and an eavesdropper (EAV). Power is allocated to each node under cognitive constraints. Because of the absence of a direct wireless link, secondary source (SS) communicates with secondary destination (SD) in two time slots. The SD and the SS broadcast jamming signal to confuse the EAV in the first and in the second time slots, respectively. The relay harvests energy in the first time slot and amplifies and forwards the signal to SD in the second time slot. The EAV employs maximal ratio combining scheme to extract the information. We evaluate the performance in terms of secrecy outage probability (SOP) of the proposed CCRN. The approximate expression of SOP is obtained in integration form. Improvement in SOP is expected for the proposed CCRN because of the use of jamming signals. The secrecy performance of CCRN improves with increase in primary transmit power, peak transmit power of secondary nodes, channel mean power, and energy conversion efficiency but degrades with increase in threshold outage rate of primary receiver and threshold secrecy rate. A MATLAB‐based simulation framework has been developed to validate the analytical work.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号