首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 19 毫秒
1.
In this paper, we study the cooperative communication of a cognitive underlay network by utilizing the diversity of multiple spectrum bands. In particular, we assume that the transmission power of the secondary user (SU) is subject to different joint constraints, such as peak interference power of the multiple primary users (PUs), peak transmission power of the SU, outage tolerate interference, and outage probability threshold. Accordingly, two power allocation schemes are considered on the basis of the minimum interference channel from the SU to the PU and the channel state information of the primary user link. Furthermore, the SU can select one of the three transmission modes following the channel state conditions, namely as cellular, device-to-device, or switching mode, to transmit the signal to the secondary user receiver. Given this setting, two power allocation schemes over a spectrum band selection strategy are derived. In addition, closed-form expressions for the outage probability of three modes are also obtained to evaluate the performance of the secondary network. Most importantly, a closed-form expression for the peak interference power level of the PU, which is considered as one of the most important parameters to control the SU’s transmission power, is derived by investigating the relation of two considered power allocation schemes in the practise. Finally, numerical examples show that the outage performance of secondary network in the switching mode outperforms the one of the cellular and device-to-device (D2D) mode for all considered power allocation schemes.  相似文献   

2.
Secure transmission in wireless networks is a big critical issue due to the broadcast nature of the wireless propagation environment. In this paper, the physical layer security performance in a mixed radio frequency (RF)/free space optical (FSO) system under multiple eavesdroppers is investigated. The RF links and FSO link within the system are assumed to respectively undergo Nakagami-m and Gamma–Gamma fading distributions. The two practical eavesdroppers scenarios considered includes: Colluding and Non-colluding in which their channel state information is unavailable at the source. The closed-form expressions for the lower bound security outage probability and the strictly positive secrecy capacity under both scenarios are derived by utilizing the system end-to-end cumulative distribution function and eavesdroppers’ probability density function. The results show that the increase in the number of eavesdroppers under both scenarios profoundly degrades the system secrecy performance. Moreover, it is demonstrated that both the atmospheric turbulence and pointing errors affect the concerned system secrecy and the impact of RF fading parameters is also presented. The accuracy of the numerical results obtained is validated by Montel-Carol simulations.  相似文献   

3.
In this paper, we investigate a multiple users cooperative overlay cognitive radio non-orthogonal multiple access (CR-NOMA) network in the presence of imperfect successive interference cancellation (SIC) and imperfect channel state information (CSI). In the context of cellular network, cell-center cognitive secondary users act as relays to assist transmission from the primary user (PU) transmitter to the cell-edge PU receiver via NOMA. According to the received signals between the primary transmitter and multiple cognitive secondary center users, the best cell-center cognitive SU with the maximum signal to noise ratio (SNR) is selected to transmit the PU’s signals and its own signal to cell-edge users through NOMA principle. Then, the PU cell-edge user combine the signals received from direct transmission in the first phase and relay transmission from the best cell-center cognitive SU in the second phase by selection combining (SC). To measure the performance of the system quantitatively, we derive the end-to-end outage probability and capacity for the primary and secondary networks by taking the imperfect SIC and CSI into consideration. Finally, the performance analysis is validated by the simulations, and show that serious interference caused by imperfect SIC and (or) imperfect CSI reduce the system performance.  相似文献   

4.
This paper investigates a reconfigurable intelligent surface (RIS)-aided underlay cognitive radio (CR) multiple-input multiple-output (MIMO) wiretap channel where the secondary transmitter (ST) communicates with primary user (PU) and secondary user (SU) in the absence of the eavesdropper’s (Eve’s) channel state information (CSI). To enhance the secrecy performance in CR MIMO wiretap channel, the power of useful signal is minimized at ST, and then the residual power is further utilized to design artificial noise (AN) based on statistical CSI at ST. Specifically, we first optimize the transmit covariance matrix at ST and the diagonal phase-shifting matrix at RIS jointly leveraging large-system approximation results. Then the power allocation for SU is optimized to obtain the minimum transmit power of useful information at ST. Besides, we further design AN with the residual power by aligning it into the null space of the SU channel and thus avert the harmful effects of AN to improve the secure communication quality of SU. Finally, through numerical simulations, we illustrate the effectiveness of the proposed algorithm and validate the existence of a trade-off between the quality-of-service (QoS) at SU and secrecy rate.  相似文献   

5.
We propose a mixture-Gaussian model for a cognitive radio channel to analyze the interplay between the interference in the system and the degrees-of-freedom (DOF), i.e., the average number of channel uses per transmission frame, used by the secondary user (SU) for communications in the long run. In contrast to the conventional studies, we assume that the SU receiver (SU-RX) does not precisely know whether the primary-user (PU) transmitter is on or off. Due to this assumption the resulting interference channel is mixture-Gaussian. Our objective is to find the optimal sensing threshold and sensing time for the signal detector used by the SU transmitter (SU-TX). Our formulation of the optimization problem reflects the trade-off between SU-TX’s DOF for communications and that for detection. Both the DOFs affect PU’s interference to SU, and SU’s interference to PU. The latter interference causes PU performance degradation, which is kept within tolerable range as a constraint. As a further contribution, we define interference regimes for SU performance on the basis of PU transmission power level. We also address the scenario when PU receiver uses the nearest neighbor decoding while wrongly anticipating that the channel is Gaussian. Finally, we demonstrate that even if SU-TX’s signal detector performs suboptimally, SU can still achieve the optimal detector’s performance in the high interference regime by adjusting the sensing parameters.  相似文献   

6.
This work investigates the physical layer secrecy performance of a hybrid satellite/unmanned aerial vehicle (HS-UAV) terrestrial non-orthogonal multiple access (NOMA) network, where one satellite source intends to make communication with destination users via a UAV relay using NOMA protocol in the existence of spatially random eavesdroppers. All the destination users randomly distributed on the ground comply with a homogeneous Poisson point process in the basis of stochastic geometry. Adopting Shadowed-Rician fading in satellite-to-UAV and satellite-to-eavesdroppers links while Rayleigh fading in both UAV-to-users and UAV-to-eavesdroppers links, the theoretical expressions for the secrecy outage probability (SOP) of the paired NOMA users are obtained based on the distance-determined path-loss. Also, the asymptotic behaviors of SOP expressions at high signal-to-noise ratio (SNR) regime are analyzed and the system throughputs of the paired NOMA users are examined for gaining further realization of the network. Moreover, numerical results are contrasted with simulation to validate the theoretical analysis. Investigation of this work shows the comparison of SOP performance for the far and near user, pointing out the SOP performance of the network depends on the channel fading, UAV coverage airspace, distribution of eavesdroppers and some other key parameters.  相似文献   

7.
Inspired by the promising potential of re-configurable intelligent surface (RIS)-aided transmission in achieving the vision of 6th Generation (6G) network, we analyze the security model for a vehicular-to-infrastructure (V2I) network by considering multiple RISs (M-RIS) on buildings to act as passive relays at fixed distances from a source. In addition, multiple eavesdroppers are presented in the vicinity of the intended destination. Our aim is to enhance the secrecy capacity (SC) and to minimize secrecy outage probability (SOP) in presence of multiple eavesdroppers with the help of M-RIS in V2I communications. We propose a key-less physical layer security using beam-forming by exploiting M-RIS. The proposed approach assumes the concept of detecting eavesdroppers before the information can be transmitted via beam-forming by utilizing M-RIS. The results reveal that with consideration of M-RIS and beam-forming, the achievable SC and SOP performance is significantly improved while imposing minimum power consumption and fewer RIS reflectors.  相似文献   

8.
In this work, we present a new concept called “transmission interval” in a hybrid overlay/underlay cognitive radio network. A transmission interval consists of a sequence of time slots during which the secondary user (SU) transmits its data using the optimal mode based on its current state. After the transmission interval ends, the SU has to choose between staying idle for a single time slot to save energy for future possible transmission, transmitting using the underlay mode without sensing to optimize the usage of the limited amount of available energy, or sensing the channel and transmitting using either overlay or underlay mode depending on the primary user (PU) state. The energy harvesting technology is also considered in the presence of multiple PUs and multiple SUs. For the SU network, a sequential decision problem is formulated using the mixed observable Markov decision process to determine the optimal sensing energy and the optimal transmission interval length that maximize the SU network throughput and minimize both the consumed energy and the interference to the PUs. Numerical results show that applying the transmission interval concept increases the SU network throughput and decreases the interference to the PUs compared to conventional models. Moreover, adding the action of underlay transmission without sensing increases the SU network throughput.  相似文献   

9.
In this paper, we evaluate the secrecy performance of an intelligent reflecting surface (IRS)-assisted device-to-device (D2D) communication in spectrum-shared cellular networks. To this end, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the asymptotic SOP in the presence of multiple eavesdroppers. In the continue, in order to dynamically access the spectrum band of the licensed users, we define the optimization problem of secrecy spectrum resource allocation to minimize the SOP as a mixed-integer linear programming (MILP) problem. Then, the globally optimal solutions to this problem are obtained by using the Hungarian algorithm. Numerical analyses show that increasing the reflective elements of IRS can improve the secrecy performance.  相似文献   

10.
This paper investigates the secure transmission for simultaneous wireless information and power transfer (SWIPT) in the cell-free massive multiple-input multiple-output (MIMO) system. To develop green communication, legitimate users harvest energy by the hybrid time switching (TS) and power splitting (PS) strategy in the downlink phase, and the harvested energy can provide power to send uplink pilot sequences for the next time slot. By in-built batteries, the active eavesdropper can send the same pilots with the wiretapped user, which results in undesirable correlations between the channel estimates. Under these scenarios, we derive the closed-form expressions of average harvested energy and achievable rates, and propose an iterative power control (PC) scheme based on max–min fairness algorithm with energy and secrecy constraints (MMF-ESC). This scheme can ensure the uniform good services for all users preserving the distributed architecture advantage of cell-free networks, while meeting the requirements of energy harvested by legitimate users and network security against active eavesdroppers. Besides, continuous approximation, bisection and path tracking are jointly applied to cope with the high-complexity and non-convex optimization. Numerical results demonstrate that MMF-ESC PC scheme can effectively increase the achievable rate and the average harvested energy of each user, and decrease the eavesdropping rate below the threshold. Moreover, the results also reveal that PS strategy is superior in harvesting energy in terms of more stringent network requirements for average achievable rates or security.  相似文献   

11.
Motivated by recent developments in heterogeneous cellular networks and physical-layer security, we aim to characterize the fundamental limits of secure communication in networks. Based on a general model in which both transmitters and receivers are randomly scattered in space, we model the locations of K-tier base stations, users, and potential eavesdroppers as independent two-dimensional Poisson point processes. Using the proposed model, we analyze the achievable secrecy rates for an arbitrarily located mobile user. Assuming that the cell selection is based on achievable-secrecy-rate threshold, we obtain approximations for: (a) secrecy coverage probability and (b) average secrecy load per tier. We also investigate how the network performance is affected by secrecy rate threshold, eavesdropper density, and different access strategies are analyzed, respectively. Finally, our theoretical claims are confirmed by the numerical results.  相似文献   

12.
In this paper, we investigate the secrecy performance of a downlink non-orthogonal multiple access enabled V2V communication system wherein a source vehicle communicates with two authenticated user vehicles, i.e., far user and near user, in the presence of a passive eavesdropper vehicle. Moreover, we formulate two scenarios based on the eavesdropper’s decoding capabilities; (1) Scenario I: when the eavesdropper vehicle has comparable decoding capabilities as with the authorized user vehicles, and (2) Scenario II: when the eavesdropper is entirely capable of perfectly decoding the signals from both authorized user vehicles. For such a system configuration with Scenarios I & II, we deduce the analytical expressions for the secrecy outage probability (SOP) and ergodic secrecy capacity over independent but not necessarily identically distributed double-Rayleigh fading channels. Further, to obtain insights into the secrecy diversity order for the legitimate user vehicles under Scenarios I & II, we present the asymptotic SOP analysis by taking three cases into account; (1) Case 1: when the average transmit signal-to-noise ratio approaches infinity, (2) Case 2: when the average channel gains of the user vehicles tend to infinity with fixed average channel gains corresponding to the eavesdropper, and (3) Case 3: when the average channel gains pertaining to the user vehicles and the eavesdropper tend to infinity. From which, we can infer that the secrecy diversity order of the far user vehicle is zero for Cases 1, 2, & 3, whereas the secrecy diversity order of the near user vehicle is zero for Cases 1 & 3 and one for Case 2, under Scenarios I & II. The numerical and simulation results corroborate our theoretical investigations. Our results demonstrate the impact of transmit power, power allocation factor, channel conditions of legitimate users and eavesdropper on the system’s secrecy performance.  相似文献   

13.
Cognitive radio (CR) technology seems to be a promising candidate for solving the radio frequency (RF) spectrum occupancy problem. CRs strive to utilize the white holes in the RF spectrum in an opportunistic manner. Because interference is an inherent and a very critical design parameter for all sorts of wireless communication systems, many of the recently emerging wireless technologies prefer smaller size coverage with reduced transmit power in order to decrease interference. Prominent examples of short-range communication systems trying to achieve low interference power levels are CR relays in CR networks and femtocells in next generation wireless networks (NGWNs). It is clear that a comprehensive interference model including mobility is essential especially in elaborating the performance of such short-range communication scenarios. Therefore, in this study, a physical layer interference model in a mobile radio communication environment is investigated by taking into account all of the basic propagation mechanisms such as large- and small-scale fading under a generic single primary user (PU) and single secondary user (SU) scenario. Both one-dimensional (1D) and two-dimensional (2D) random walk models are incorporated into the physical layer signal model. The analysis and corresponding numerical results are given along with the relevant discussions.  相似文献   

14.
In this paper, we propose an optimization framework to determine the distribution of power and bits/channel use to secondary users in a competitive cognitive radio networks. The objectives of the optimization framework are to minimize total transmission power, maximize total bits/channel use and also to maintain quality of service. An upper bound on probability of bit error and lower bound on bits/channel use requirement of secondary users are considered as quality of service. The optimization problem is also constrained by total power budget across channels for a user. Simulating the framework in a centralized manner shows that more transmit power is required to allocate in a channel with higher noise power. However, allocation of bits/channel use is directly proportional to signal to interference plus noise power ratio. The proposed framework is more capable of supporting high bits/channel use requirement than existing resource allocation framework. We also develop the game theoretic user based distributed approach of the proposed framework. We see that user based distributed solution also follows centralized solution.  相似文献   

15.
16.
Multicast hybrid precoding reaches a compromise among hardware complexity, transmission performance and wireless resource efficiency in massive MIMO systems. However, system security is extremely challenging with the appearance of eavesdroppers. Physical layer security (PLS) is a relatively effective approach to improve transmission and security performance for multicast massive MIMO wiretap systems. In this paper, we consider a transmitter with massive antennas transmits the secret signal to many legitimate users with multiple-antenna, while eavesdroppers attempt to eavesdrop the information. A fractional problem aims at maximizing sum secrecy rate is proposed to optimize secure hybrid precoding in multicast massive MIMO wiretap system. Because the proposed optimized model is an intractable non-convex problem, we equivalently transform the original problem into two suboptimal problems to separately optimize the secure analog precoding and secure digital precoding. Secure analog precoding is achieved by applying singular value decomposition (SVD) of secure channel. Then, employing semidefinite program (SDP), secure digital precoding with fixed secure analog precoding is obtained to ensure quality of service (QoS) of legitimate users and limit QoS of eavesdroppers. Complexity of the proposed SVD-SDP algorithm related to the number of transmitting antennas squared is lower compared with that of constant modulus precoding algorithm (CMPA) which is in connection with that number cubed. Simulation results illustrate that SVD-SDP algorithm brings higher sum secrecy rate than those of CMPA and SVD-SVD algorithm.  相似文献   

17.
朱江  王雁  杨甜 《物理学报》2018,67(5):50201-050201
宽带无线通信用户大多处在复杂的环境中,其时变多径传播和开放特性将严重影响通信系统的性能.针对物理层安全研究中的窃听信道问题,提出了一种适用于宽带无线多径信道的联合时间反演技术和发端人工噪声的物理层安全传输机制.首先,在一个典型窃听信道模型中采用时间反演技术,利用其时空聚焦性来提高信息在传输过程中的安全性;其次,由于时间反演的时空聚焦性,信息在聚焦点附近容易被窃听,通过在发送端加入人工噪声来扰乱窃听用户对保密信息的窃听,由于合法用户采用零空间人工噪声法,人工噪声对合法用户没有影响.理论分析和仿真结果表明,与已有物理层安全机制相比,所提机制可以有效地提高系统的保密信干噪比和可达保密速率,降低合法用户的误比特率,系统的保密性能得到提升.  相似文献   

18.
As an important part of the intelligent transportation system (ITS), vehicular networks can provide drivers and passengers with more comfortable and convenient services such as efficient traffic management and infotainment. However, the security threats on data exchanges over vehicular networks have become increasingly severe. Different from conventional cryptographic technologies, the application of physical layer security (PLS) to vehicular networks has been investigated to prevent the security of exchanging data from the eavesdropper and measure precisely the leaked information to the eavesdropper, due to its low complexity and communication overhead. In this work, we are concerned with the PLS of cooperative vehicular networks consisting of a source vehicle, a destination vehicle, an eavesdropping vehicle and a cooperative jamming vehicle. First, to improve the secrecy performance, the cooperative jamming helper emits jamming signals to degrade the eavesdropping channel without harming the legitimate channel. Then, based on the Rayleigh fading channel models and the traffic models, the closed-form expressions of the secrecy outage probability (SOP) and the average secrecy capacity (ASC) of the considered vehicular networks are derived, which deliver more implications of various system parameters on SOP and ASC performances and can be computed without simulations at a lower complexity. Second, a definition of the optimal jamming vehicle is introduced and then the cooperative jamming vehicle selection strategy is presented. The existence of the optimal jamming vehicle is measured in probability, which is explored analytically. Third, the optimal power allocation that maximizes the secrecy capacity is found analytically for the source vehicle and the cooperative jamming helper. Finally, simulations are also presented to demonstrate the validation of these analytical results and confirm the advantages of the cooperative jamming strategy and the optimal power allocation. From the numerical results, more observations on the effects of the main system parameters on secrecy performances are obtained, which provides some useful guides for practice.  相似文献   

19.
Since the sensing power consumption of cooperative spectrum sensing (CSS) will decrease the throughput of secondary users (SU) in cognitive radio (CR), a joint optimal model of fair CSS and transmission is proposed in this paper, which can compensate the sensing overhead of cooperative SUs. The model uses the periodic listen-before-transmission method, where each SU is assigned a portion of channel bandwidth, when the primary user (PU) is estimated to be free by the coordinator. Then, a joint optimization problem of local sensing time, number of cooperative SUs, transmission bandwidth and power is formulated, which can compensate the sensing overhead of cooperative SUs appropriately through choosing suitable compensating parameter. The proposed optimization problem can be solved by the Polyblock algorithm. Simulation results show that compared with the traditional model, the total system throughput of the fairness cooperation model decreases slightly, but the total throughput of the cooperative SUs improves obviously.  相似文献   

20.
With the vigorous development of today’s wireless communication industry, the Internet of Vehicles (IoV), as one of its application scenarios, has received extensive attention from researchers. Ensuring the security of information transmission is one of the many problems to be solved in the IoV system. To fit the actual scene, this paper considers the impacts of both the channel characteristics of Nakagami-m fading and the distribution of the vehicles’ positions in the real road scenario of the IoV. According to the random distribution characteristics of vehicle terminal position, a system model with a transmitter base station, a legitimate vehicle terminal, and an eavesdropper is established. The approximate and asymptotic analytical expressions of the secrecy outage probability over the Nakagami-m fading channels are derived. Finally, the correctness of the proposed analysis models established in this paper is verified by Monte Carlo simulation and numerical analysis. The secrecy outage performance and the influencing factors of the considered model in the Nakagami-m fading environment are discussed and analyzed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号