期刊文献+

不确定信道的双向中继通信系统波束成形设计 被引量:1

Design of Beamforming in Two-way Relay Network with Imperfect CSI
下载PDF
导出
摘要 本文主要针对双向中继通信系统进行研究:此系统中所有节点均是单天线,两个信源通过多个中继进行信息交换。并且系统中存在单个窃听者分两个阶段分别窃听信源以及中继转发的信号后联合解码。为了提高信源发送信号的质量以及降低窃听者窃听信号的效率,本文提出了极小化中继发送功率的优化模型。由于窃听者信道部分已知,该模型总结为鲁棒性优化问题。我们对约束条件进行放缩,形成了一个二次约束二次优化问题,并利用半正定松弛、秩一分解定理等方法将优化模型转化为半正定优化问题,从而求得原问题的解。数值模拟结果验证了本文提出的算法的有效性。 This paper considers a two-way relay network where two source nodes exchange messages through several relays and each node has a single antenna. In the network, there exists a single-antenna eavesdropper who eavesdrops messages from the two source nodes and relays. In order to improve the quality of service of the two us-ers and reduce the probability of the eavesdropper to decode the signals, we propose a model to minimize the total relay transmit power. Since the channel state information (CSI) of the eavesdropper is imperfectly known, the model is summarized as a robust optimization problem. After we tighten the constraints and eliminate the parameters with uncertainty, it becomes a quadratic constrained quadratic programming problem. Then we use the semi-definite re-laxation method and rank one decomposition theorem to solve the problem. Finally, the optimal solution of the tightened problem is obtained. Simulation results imply that the proposed algorithm is efficient.
作者 刘克 艾文宝
机构地区 北京邮电大学
出处 《软件》 2017年第10期18-22,共5页 Software
基金 中国国家自然科学基金(11471052 11771056 11401039 91630202)
关键词 双向中继通信系统 半正定优化 物理层安全 二次约束二次优化 Two-way relay network Semi-infinite programming Physical layer security Quadratic constrained quadratic programming
  • 相关文献

参考文献5

二级参考文献60

  • 1Nichols R, Lekkas P. Wireless Security: Models, Threats, and Solutions [M]. 3ED. McGraw-Hill Professional, 2004.
  • 2Wyner A. The wire-tap channel [J]. Bell Syst Tech J, 1975, 54(8): 1355-1387.
  • 3Csiszar I, Korner J. Broadcast channels with confidential messages [J]. IEEE Trans Inf Theory, 1978, 24(3) : 339- 348.
  • 4Cheong S, Hellman M. The gaussian wire-tap channel[J]. IEEE Trans. Inf. Theory, 1978, 24(4) : 451 - 456.
  • 5Li Z, Yates R, Trappe W. Secrecy capacity of independent parallel channels [C]// Proc 44th Annu Allerton Conf. House Illinois: IEEE Press, 2006:841 -848.
  • 6Liang Y, Poor H. Secure communication over fading channels [J]. IEEE Trans Inf Theory, 2008, 54(6) : 2470 - 2492.
  • 7Shafiee S, Ulukus S. Achievable rates in Gaussian MISO channels with secrecy constraints [C]//Proc IEEE Int Symposium on Information Theory. Nice, France: IEEE Press, 2007:2466-2470.
  • 8Liu T, Shamai (Shitz) S. A note on the secrecy capacity of the multiple-antenna wiretap channel [J]. IEEE Trans lnf Theory, 2009, 55(6) : 2547 -2553.
  • 9Goel S, Negi R. Guaranteeing secrecy using artificial noise [J]. IEEE Trans Wireless Commun, 2008, 7(6): 2180- 2189.
  • 10QIN Haohao, SUN Yin, Chang T H, et al. Power allocation and artificial noise design for wiretap OFDM with arbitrary inputs. [J/OL]. http: //ss-mcsp. riit. tsinghua, edu. cn/chenx/puh/TWC2, pdf.

共引文献17

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部