期刊文献+

基于AF策略的高斯正交不信任中继信道的最优资源分配

Bandwidth and power allocatioon for AF strategy in Gaussian orthogonal untrusted relay channel
下载PDF
导出
摘要 本文研究了高斯正交中继窃听信道,中继节点同时作为窃听者的情况,源节点同中继节点和目的节点在信道1上传输信号,中继节点同目的节点在信道2上传输信号,信道1和信道2在频率上是正交的。通过分析,在总的信道资源受限的情况下,通过优化功率及信道带宽获得最大的安全速率。本文给出了在高斯正交信道下,当只考虑功率或带宽时,存在唯一的功率或带宽使得安全速率达到最大,并且通过仿真结果说明了采用最优资源分配可得到比等资源分配更大的安全速率。 The gaussian orthogonal untrusted relayr channel is investigated. We assume that there is an eavesdropper at the relay node who has access everything that the relay node knows.The source node transmits signals with the relay node and the destination node in channel 1, the relay node transmits signals with destination node in channel 2, channel 1 and channel 2 are orthogonal. The achievable secrecy rate is derived based on analyzing the gaussian orthogonal untrusted relay channel. Under the limit of the total channel resource, the maximum of the achievable secrecy rate is obtained through optimizing the resource aUocation.In the Gaussian orthogonal untrused relay channel, there exists a unique optimum bandwidth or power to achieve the maximum secrecy rate and a higher secrecy rate can be achieved using the optimal resource allocation strategy than the maximum resource allocation strategy.
作者 郁章菊
出处 《电子测试》 2012年第6期39-42,共4页 Electronic Test
关键词 窃听信道 安全速率 资源分配 不信任中继 wiretap channel secrecy rate resource allocation untrusted relay
  • 相关文献

参考文献13

  • 1C. E. Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal,1949, 28(4):656-715.
  • 2T. Cover,A. E. Gamal.Capacity theorems for the relay channel[J].IEEE Transactions on Information Theory, 1979,25(5):572-584.
  • 3A.D.Wyner.The wire-tap channel[J].Bell System Technical Journal,1975,54(8): 1355-1387.
  • 4I. Csiszar ,J. korner.Broadcast channels with confidential messages[J].IEEE Transactions on Information Theory, 1978,24(4):451-456.
  • 5L. Lai,H. E1 Gamal.The relay-eavesdropper channel: Cooperation for secrecy[J].IEEE Transactions on Information Theory, 2008,54(9):4005-4019.
  • 6X.He,A.Yener.Cooperalion with an untrusted relay: A secrecy perspective[J].IEEE Transactions on Information Theory,2010,56(8):3807-3827.
  • 7A.E1 Gamal,S.Zahedi.Capacity of a class of relay channels with orthogonal components[J] IEEE Transactions on Information Theory,2005,51( 5):1815-1817.
  • 8Y.Kim.Capacity of a class of deterministic relay channels[J].IEEE Transactions on Information Theory,2008,54(3): 1328-1329.
  • 9X.He,A.Yener. On the equivocation region of relay channels with orthogonal components[J] IEEE Transactions on Information Theory archive,2010,56(8):3807-3827.
  • 10V.Aggarwal,L.Sankar,A.R.Calderbank,H.V Poor.Secrecy capacity of a class of orthogonal relay eavesdropper channels[J].EURASIP Journal on Wireless Communications and Networking, 2009.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部