As the first stage of the quantum Internet,quantum key distribution(QKD)networks hold the promise of providing long-term security for diverse users.Most existing QKD networks have been constructed based on independent...As the first stage of the quantum Internet,quantum key distribution(QKD)networks hold the promise of providing long-term security for diverse users.Most existing QKD networks have been constructed based on independent QKD protocols,and they commonly rely on the deployment of single-protocol trusted relay chains for long reach.Driven by the evolution of QKD protocols,large-scale QKD networking is expected to migrate from a single-protocol to a multi-protocol paradigm,during which some useful evolutionary elements for the later stages of the quantum Internet may be incorporated.In this work,we delve into a pivotal technique for large-scale QKD networking,namely,multi-protocol relay chaining.A multi-protocol relay chain is established by connecting a set of trusted/untrusted relays relying on multiple QKD protocols between a pair of QKD nodes.The structures of diverse multi-protocol relay chains are described,based on which the associated model is formulated and the policies are defined for the deployment of multi-protocol relay chains.Furthermore,we propose three multi-protocol relay chaining heuristics.Numerical simulations indicate that the designed heuristics can effectively reduce the number of trusted relays deployed and enhance the average security level versus the commonly used single-protocol trusted relay chaining methods on backbone network topologies.展开更多
This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer(SWIPT)-based multi-relay network with a direct link.To achieve high throughput in the network,a novel protocol is first developed,in w...This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer(SWIPT)-based multi-relay network with a direct link.To achieve high throughput in the network,a novel protocol is first developed,in which the network can switch between a direct transmission mode and a Single-Relay-Selection-based Cooperative Transmission(SRS-CT)mode that employs dynamic decode-and-forward relaying accomplished with Rateless Codes(RCs).Then,under this protocol,an optimization problem is formulated to jointly optimize the network operation mode and the resource allocation in the SRS-CT mode.The formulated problem is difficult to solve because not only does the noncausal Channel State Information(CSI)cause the problem to be stochastic,but also the energy state evolution at each relay is complicated by network operation mode decision and resource allocation.Assuming that noncausal CSI is available,the stochastic optimization issue is first to be addressed by solving an involved deterministic optimization problem via dynamic programming,where the complicated energy state evolution issue is addressed by a layered optimization method.Then,based on a finite-state Markov channel model and assuming that CSI statistical properties are known,the stochastic optimization problem is solved by extending the result derived for the noncausal CSI case to the causal CSI case.Finally,a myopic strategy is proposed to achieve a tradeoff between complexity and performance without the knowledge of CSI statistical properties.The simulation results verify that our proposed SRS-and-RC-based design can achieve a maximum of approximately 40%throughput gain over a simple SRS-and-RC-based baseline scheme in SWIPT-based multi-relay networks.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e...Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.展开更多
Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and t...Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.展开更多
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl...To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.展开更多
To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous infor...To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.展开更多
In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a tr...In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, we propose a Multiple Access Broadcasting (MABC) two-way relaying scheme for cognitive networks. The two transceivers transmit their data towards the relays and then relays retransmit the processed form of signal towards the receiver. Our aim is to design the beamforming coefficients to maximize quality of service (QoS) for the secondary network while satisfying tolerable interference constraint for the primary network. We show that this approach yields a closed-form solution. Our simulation results show that the maximum achievable SINR improved while the tolerable interference temperature becomes not strict for primary receiver.展开更多
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is ...In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.展开更多
Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization ma...Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization matrices at destinations are jointly optimised.To overcome the challenginglimitations introduced by individual powerconstraints,a Semi-Definite Relaxation(SDR)called element-wise relaxation is proposed,which can transform the original optimizationproblem into a standard convex optimizationproblem.In this research,two-way relaying isunderstood from a pure signal processing perspective which can potentially simplify thetheoretical analysis.Finally,simulation resultsare used for assessing the performance advantage of the proposed algorithm.展开更多
In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs T...In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR...To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.展开更多
In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided ...In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.展开更多
In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify ...In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations.展开更多
This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an S...This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.展开更多
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relay...In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.展开更多
In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm...In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.展开更多
This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit po...This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit power constraint strategies at the secondary network are proposed to investigate the performance of the secondary network. In the case of combined power constraint,the maximum tolerable interference power on the primary network and the maximum transmit power at the secondary network are considered. Closed-form lower bound and its asymptotic expression for the outage probability (OP) are achieved. Utilizing the above results,average symbol error probability (ABEP) at high signal-to-noise ratios (SNRs) are also derived. In order to further study the performance of dual-hop cognitive AF relaying networks,the Closed-form lower bounds and asymptotic expressions for OP with single power constraint of the tolerable interference on the primary network is also obtained. Both analytical and simulation are employed to validate the accuracy of the theoretical analysis. The results show that the secondary network obtains a better performance when higher power constraint is employed.展开更多
In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. T...In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. The operation of this network is considered in conjunction with the convention- al decode-and-forward (DF) and incremental DF (IDF) protocols. For the conventional DF protocol, it is assumed that there is no direct link between the secondary transmitter (S) and the secondary destination (D), while (for both protocols) after harvesting energy, the relay node (R) always helps to forward the resulting signal to D. However, for the IDF protocol, R assists in relaying S's information to D only when the direct communication between S and D has failed. Furthermore, for both DF and IDF protocols, we assume there is no power supply for R, and R harvests energy from the transmitted signal of S. We derive exact ana- lytical expressions for the outage probability at D in DF and IDF protocols, respectively, in terms of the bivariate Meijer's G-function. Performance evaluation results obtained by means of Monte-Carlo simulations are also provided and have validated the correctness of the oroDosed analysis.展开更多
基金supported in part by the National Natural Science Foundation of China(Grant Nos.62201276,62350001,U22B2026,and 62471248)Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701)+1 种基金the Key R&D Program(Industry Foresight and Key Core Technologies)of Jiangsu Province(Grant No.BE2022071)Natural Science Research of Jiangsu Higher Education Institutions of China(Grant No.22KJB510007)。
文摘As the first stage of the quantum Internet,quantum key distribution(QKD)networks hold the promise of providing long-term security for diverse users.Most existing QKD networks have been constructed based on independent QKD protocols,and they commonly rely on the deployment of single-protocol trusted relay chains for long reach.Driven by the evolution of QKD protocols,large-scale QKD networking is expected to migrate from a single-protocol to a multi-protocol paradigm,during which some useful evolutionary elements for the later stages of the quantum Internet may be incorporated.In this work,we delve into a pivotal technique for large-scale QKD networking,namely,multi-protocol relay chaining.A multi-protocol relay chain is established by connecting a set of trusted/untrusted relays relying on multiple QKD protocols between a pair of QKD nodes.The structures of diverse multi-protocol relay chains are described,based on which the associated model is formulated and the policies are defined for the deployment of multi-protocol relay chains.Furthermore,we propose three multi-protocol relay chaining heuristics.Numerical simulations indicate that the designed heuristics can effectively reduce the number of trusted relays deployed and enhance the average security level versus the commonly used single-protocol trusted relay chaining methods on backbone network topologies.
基金supported in part by the National Natural Science Foundation of China under Grant 61872098 and Grant 61902084the Natural Science Foundation of Guangdong Province under Grant 2017A030313363.
文摘This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer(SWIPT)-based multi-relay network with a direct link.To achieve high throughput in the network,a novel protocol is first developed,in which the network can switch between a direct transmission mode and a Single-Relay-Selection-based Cooperative Transmission(SRS-CT)mode that employs dynamic decode-and-forward relaying accomplished with Rateless Codes(RCs).Then,under this protocol,an optimization problem is formulated to jointly optimize the network operation mode and the resource allocation in the SRS-CT mode.The formulated problem is difficult to solve because not only does the noncausal Channel State Information(CSI)cause the problem to be stochastic,but also the energy state evolution at each relay is complicated by network operation mode decision and resource allocation.Assuming that noncausal CSI is available,the stochastic optimization issue is first to be addressed by solving an involved deterministic optimization problem via dynamic programming,where the complicated energy state evolution issue is addressed by a layered optimization method.Then,based on a finite-state Markov channel model and assuming that CSI statistical properties are known,the stochastic optimization problem is solved by extending the result derived for the noncausal CSI case to the causal CSI case.Finally,a myopic strategy is proposed to achieve a tradeoff between complexity and performance without the knowledge of CSI statistical properties.The simulation results verify that our proposed SRS-and-RC-based design can achieve a maximum of approximately 40%throughput gain over a simple SRS-and-RC-based baseline scheme in SWIPT-based multi-relay networks.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
基金the National Natural Science Foundation of China under Grants 62001517 and 61971474the Beijing Nova Program under Grant Z201100006820121.
文摘Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.
基金supported by the National Science Foundation of China (NO.61271240, 61671253)
文摘Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.
文摘To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.
基金supported in part by the National Nature Science Foundation of China under Grant 61473066 and Grant 61601109the Fundamental Research Funds for the Central Universities under Grant No.N152305001the Natural Science Foundation of Hebei Province under Grant F2017501039.
文摘To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.
文摘In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, we propose a Multiple Access Broadcasting (MABC) two-way relaying scheme for cognitive networks. The two transceivers transmit their data towards the relays and then relays retransmit the processed form of signal towards the receiver. Our aim is to design the beamforming coefficients to maximize quality of service (QoS) for the secondary network while satisfying tolerable interference constraint for the primary network. We show that this approach yields a closed-form solution. Our simulation results show that the maximum achievable SINR improved while the tolerable interference temperature becomes not strict for primary receiver.
文摘In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.
基金supported in part by EricssonNational Science and Technology Major Project under Grant No.2010ZX03003-003-03+2 种基金Sino-Swedish IMT-Advanced and Beyond Cooperative Program under Grant No.2008DFA11780National Natural Science Foundation of China under Grant No.61101130the Excellent Young Scholar Research Funding of Beijing Institute of Technology under Grant No.2013CX04038
文摘Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization matrices at destinations are jointly optimised.To overcome the challenginglimitations introduced by individual powerconstraints,a Semi-Definite Relaxation(SDR)called element-wise relaxation is proposed,which can transform the original optimizationproblem into a standard convex optimizationproblem.In this research,two-way relaying isunderstood from a pure signal processing perspective which can potentially simplify thetheoretical analysis.Finally,simulation resultsare used for assessing the performance advantage of the proposed algorithm.
基金National Natural Science Foundation of China (61871241, 61771263)Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX18-2422)+3 种基金Six Categories Talent Peak of Jiangsu Province (KTHY-039)Science and Technology Program of Nantong (JC2018127, JC2018129, GY22017013)Stereoscopic Coverage Communication Network Verification Platform for China Sea (PCL2018KP002)Open Research Fund of Nantong University-Nantong Joint Research Center for Intelligent Information Technology (KFKT2017A05, KFKT2017B02)
文摘In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.
基金supported in part by the National Natural Science Foundation of China under Grant No.61871032in part by Chinese Ministry of Education-China Mobile Communication Corporation Research Fund under Grant MCM20170101in part by the Open Research Fund of Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education (Guilin University of Electronic Technology) under Grant CRKL190204
文摘To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.
基金supported by the State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University under Grant No.RCS2012ZT008the National Key Basic Research Program of China(973Program)under Grant No.2012CB316100(2)+1 种基金the National Natural Science Foundation of China under Grants No.61201203,No.61171064the Fundamental Research Funds for the Central Universities under Grant No.2012JBM030
文摘In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.
基金This work was supported by College of Engineering and Technology,the American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations.
基金supported by the National Natural Science Foundation of China ( No . 61602034 )the Beijing Natural Science Foundation (No. 4162049)+2 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University (No. 2014D03)the Fundamental Research Funds for the Central Universities Beijing Jiaotong University (No. 2016JBM015)the NationalHigh Technology Research and Development Program of China (863 Program) (No. 2015AA015702)
文摘This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.
基金supported in part by the National Natural Science Foundation of China under Grant 61901379in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2019JQ-253+1 种基金in part by the open research fund of National Mobile Communications Research Laboratory, Southeast University under Grant 2020D04in part by the Fundamental Research Funds for the Central Universities (No. 31020180QD095, 3102018QD096, and G2018QY0308)
文摘In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.
基金supported by the National Natural Science Foundation of China under Grant No.61101248the Equipment Advance Research Projectof"Twelfth Five-Year"Plan under Grant No.51306040202And this work has been performed in the Project"Advanced Communication Research Program(ACRP)"supported by the Directorate of Research and Development,Defense Science and Technology Agency,Singapore under Grant No.DSOCL04020
文摘In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.
基金National Natural Science Foundation of China(No.61461024)
文摘This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit power constraint strategies at the secondary network are proposed to investigate the performance of the secondary network. In the case of combined power constraint,the maximum tolerable interference power on the primary network and the maximum transmit power at the secondary network are considered. Closed-form lower bound and its asymptotic expression for the outage probability (OP) are achieved. Utilizing the above results,average symbol error probability (ABEP) at high signal-to-noise ratios (SNRs) are also derived. In order to further study the performance of dual-hop cognitive AF relaying networks,the Closed-form lower bounds and asymptotic expressions for OP with single power constraint of the tolerable interference on the primary network is also obtained. Both analytical and simulation are employed to validate the accuracy of the theoretical analysis. The results show that the secondary network obtains a better performance when higher power constraint is employed.
基金supported in part by the National Natural Science Foundation of China(Grant No.61472343)China Postdoctoral Science Foundation(Grant No.2014M56074)
文摘In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. The operation of this network is considered in conjunction with the convention- al decode-and-forward (DF) and incremental DF (IDF) protocols. For the conventional DF protocol, it is assumed that there is no direct link between the secondary transmitter (S) and the secondary destination (D), while (for both protocols) after harvesting energy, the relay node (R) always helps to forward the resulting signal to D. However, for the IDF protocol, R assists in relaying S's information to D only when the direct communication between S and D has failed. Furthermore, for both DF and IDF protocols, we assume there is no power supply for R, and R harvests energy from the transmitted signal of S. We derive exact ana- lytical expressions for the outage probability at D in DF and IDF protocols, respectively, in terms of the bivariate Meijer's G-function. Performance evaluation results obtained by means of Monte-Carlo simulations are also provided and have validated the correctness of the oroDosed analysis.