期刊文献+

解码转发中继选择系统的安全性能分析 被引量:2

Security performance analysis of DF relay selection systems
原文传递
导出
摘要 本文研究源节点与中继节点发送的信号均能被窃听时,多中继自适应解码转发(decode-andforward,DF)系统的安全性能.根据信道状态信息是否可知,分析最优中继选择(optimal relay selection,ORS)、传统中继选择(conventional relay selection,CRS)和多中继选择(multiple relays selection,MRS)3种方案的安全性能,推导出3种方案安全中断概率的解析表达式.通过渐进性能分析,得到了3种方案的安全分集增益和安全分集阶数.仿真结果验证了理论研究的正确性,并分析得到不同参数对系统安全性能的影响.结果表明多中继场景中,ORS方案对系统的安全性能提升最为明显,3种方案的安全分集阶数相同且均与中继个数有关,窃听信道参数只对系统安全分集增益有影响.最后,给出了系统最佳功率分配方法. In this work, we investigate the security performance of adaptive decode-and-forward cooperative networks when the signals transmitted from source and relay would be wiretapped. Based on whether the channel state information(CSI) of the wiretap link is available or not, optimal relay selection(ORS), conventional relay selection(CRS), and multiple relays selection(MRS) schemes are considered, and the exact closed-form expressions for security outage probability(SOP) are derived. Besides, we obtain the closed-form expressions for the secrecy diversity order and secrecy array gain of the three different selection schemes through asymptotic analysis. Simulations are presented to validate the accuracy of our proposed analytical results and illustrate that ORS is the best scheme. Furthermore, asymptotic analysis reveals that the secrecy diversity order of each scheme is the same and closely related to the number of relays. The impact of the wiretap channels is only reflected in the secrecy array gain. Finally, we determine the optimal power allocation between the source and relay.
出处 《中国科学:信息科学》 CSCD 北大核心 2017年第9期1242-1254,共13页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61471076 61401372) 重庆市教委科学技术研究项目(批准号:KJ1600413) 重庆市基础科学与前沿技术研究项目(批准号:cstc2017jcyjAX0204)资助
关键词 物理层安全 解码转发 中继选择 安全中断概率 功率分配 physical layer security decode-and-forward relay selection security outage probability power allocation
  • 相关文献

参考文献3

二级参考文献36

  • 1Shiu Y S, Chang S Y, Wu H-C, et al. Physical layer security in wireless networks: a tutorial. IEEE Corumun Mag 2011, 18:66 74.
  • 2Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54:1355 1387.
  • 3Gopala P K, Lai L, Gamal H El. On the secrecy capacity of fading channels. IEEE Trans lnf Theory, 2008, 54 4687-4698.
  • 4Sun X, Wang J, Xu W, et al. Performance of secure communications over correlated fading channels. IEEE Sig Process Lett, 2012, 54:479-482.
  • 5Pan G, Tang C, Zhang X, et al. Physical layer security over non-small scale fading channels. IEEE Trans Veh Tech, inpress, doi: 10.1109/TVT.2015.2412140.
  • 6Yang N, Yeoh P L, Elkashlan M et al. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans Commun, 2013, 61:144 154.
  • 7Mo J, Tao M, Liu Y. Relay placement for physical layer security: a secure connection perspective. IEEE Commun Lett, 2012, 16:878 881.
  • 8Yang B, Wang W, Yao B, et al. Destination assisted secret wireless communication with cooperative helpers. IEEE Sig Process Lett, 2013, 20:1030-1033.
  • 9Wang H M, Yin Q, Xia X G. Distributed beamforming for physical-layer security of two-way relay networks. IEEE Tl'ans Sig Process, 2012, 60:3532-3545.
  • 10Deng H, Wang H M, Guo W, et al. Secrecy transmission with a helper: to relay or to jam. IEEE Trans Inf Foren Sec, 2015. 10:293-307.

共引文献9

同被引文献3

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部