Secrecy Rate Optimization for Cooperative Jamming Relay System with Energy Harvesting Constraints
-
摘要: 研究各有一个源节点、中继节点、目的节点和窃听节点的中继窃听信道模型的保密速率的优化问题。模型中各节点具有能量收集能力,源节点和中继节点采用“储能-发送”模式工作,即先收集能量,再发送数据。中继节点采用协同干扰模式,在源节点进行数据发送时对窃听者进行干扰。首先分析得到中继协同干扰方式下提高保密容量的条件;然后给出以最大化保密速率Rs为目标的吸收比例系数ρ和中继节点发送功率Pr的迭代优化算法。通过对算法性能进行仿真,证明该算法收敛速度快,能有效提高系统的保密传输速率。
-
[1] SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: a tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. [2] DEBBAH M, GAMAL H E, Poor H V, et al. Wireless physical layer security[J]. Eurasip Journal on Wireless Communications and Networking, 2009, 9(1): 313-316. [3] SHANNON C E. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715. [4] WYNER A. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. [5] 曹傧, 段海霞, 朱德利, 等. 协作通信系统中能效优化的中继分配算法[J]. 电子科技大学学报, 2014, 43(6): 807-812. CAO Bin, DUAN Hai-xia, ZHU De-li, et al. Relay assignment aligorithm based on energy efficiency optimization in cooperative communication systems[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(6): 807-812. [6] TEKIN E, YENER A. The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2735-2751. [7] BASSILY R, ULUKUS S. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks[J]. IEEE Transactions on Signal Processing, 2013, 61(6): 1544-1554. [8] XIE Jian-wei, ULUKUS S. Secure degrees of freedom of the Gaussian wiretap channel with helpers[C]//IEEE 50th Annual Allerton Conference on Communication Control and Computing. Monticello, IL: IEEE, 2012: 193-200. [9] LUN Dong, ZHU Han, PETROPULU A P, et al. Cooperative jamming for wireless physical layer security[C]//IEEE 15th Workshop on Statistical Signal Processing. Cardiff: IEEE, 2009: 417-420. [10] HUANG Jing, SWINDLEHURST A L. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884. [11] LIN M, GE JIAN-hua, YANG Ye. An effective secure transmission scheme for AF relay networks with two-hop information leakage[J]. IEEE Communications Letters, 2013, 17(8): 1676-1679. [12] SUDEVALAYAM S, KULKARNI P. Energy harvesting sensor nodes: survey and implications[J]. IEEE Communications Surveys and Tutorials, 2011, 13(3): 443-461. [13] YIN S, ZHANG E, LI J, et al. Throughput optimization for self-powered wireless communications with variable energy harvesting rate[C]//IEEE Wireless Communications and Networking Conference (WCNC). Shanghai: IEEE, 2013: 830-835. [14] HUANG Chuan, ZHANG Rui, CUI Shu-guang. Throughput maximization for the Gaussian relay channel with energy harvesting constraints[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(8): 1469-1479. [15] HUANG Chuan, ZHANG Rui, CUI Shu-guang. Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints[J]. IEEE Transactions on Wireless Communications, 2014, 13(2): 1-14. [16] KRIKIDIS I, TIMOTHEOU S, SASAKI S. RF energy transfer for cooperative networks: data relaying or energy harvesting[J]. IEEE Communications Letters, 2012, 16(11): 1772-1775.
点击查看大图
计量
- 文章访问数: 5095
- HTML全文浏览量: 132
- PDF下载量: 152
- 被引次数: 0