[1]吴奇,刘菁华,赵睿,等.无线能量采集技术下的全双工中继系统安全性能分析[J].华侨大学学报(自然科学版),2019,40(3):390-398.[doi:10.11830/ISSN.1000-5013.201801066]
 WU Qi,LIU Jinghua,ZHAO Rui,et al.Security Performance Analysis of Full Duplex Relay System With Wireless Energy Harvesting[J].Journal of Huaqiao University(Natural Science),2019,40(3):390-398.[doi:10.11830/ISSN.1000-5013.201801066]
点击复制

无线能量采集技术下的全双工中继系统安全性能分析()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第40卷
期数:
2019年第3期
页码:
390-398
栏目:
出版日期:
2019-05-20

文章信息/Info

Title:
Security Performance Analysis of Full Duplex Relay System With Wireless Energy Harvesting
文章编号:
1000-5013(2019)03-0390-09
作者:
吴奇12 刘菁华1 赵睿12 聂志巧12 李元健12
1. 华侨大学 信息科学与工程学院, 福建 厦门 361021;2. 华侨大学 厦门市移动多媒体重点实验室, 福建 厦门 361021
Author(s):
WU Qi12 LIU Jinghua1 ZHAO Rui12 NIE Zhiqiao12 LI Yuanjian12
1. College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China2. Xiamen Key Laboratory of Mobile Multimedia Communications, Huaqiao University, Xiamen 361021, China
关键词:
物理层安全 能量采集 协作通信 马尔科夫链 遍历可达安全速率
Keywords:
physical layer security energy harvesting cooperative communication Markov chain ergodic average secrecy rate
分类号:
TN92
DOI:
10.11830/ISSN.1000-5013.201801066
文献标志码:
A
摘要:
为提升基于无线能量采集技术的全双工中继安全网络系统的安全性能,提出全双工中继干扰窃听者的策略.为干扰窃听者窃听有用信息,在第一时隙,中继发送人工噪声干扰窃听者;在第二时隙,中继在转发有用信息的同时,信源发送人工噪声干扰窃听者.在瑞利衰落信道下,通过合理的近似分析,推导出遍历可达安全速率(EASR)的表达式.分析与仿真结果表明:理论分析曲线与蒙特卡洛仿真结果基本吻合;对模型进行不同参数的性能对比,显示出所提系统在不同情况下具有性能优越性.
Abstract:
A full-duplex relay secure transmission model is investigated based on wireless energy harvesting technology. In order to improve the security performance of the system, a strategy of interfering eavesdroppers with full-duplex relay nodes is proposed. In order to preventing eavesdrop useful information for eavesdroppers, in the first time slot, the relay sends artificial noise to disturb the eavesdropper. In the second time slot, the relay sends useful information while the source sends artificial noise to disturb the eavesdropper. Under the rayleigh fading channel, an expression of ergodic achievable secrecy rate(EASR)is deduced through reasonable approximate analysis. The analysis and simulation results show that the theoretical analysis curves are in good agreement with the Monte Carlo simulation results, and the performance comparison of the model under different parameter settings shows the performance superiority of the strategy in different situations.

参考文献/References:

[1] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Forensics and Security,2008,54(6):2515-2534.DOI:10.1109/TIT.2008.921908.
[2] WYNER A D.The wire-tap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.DOI:10.1002/j.1538-7305.1975.tb02040.x.
[3] ZHAO Rui,HUANG Yongming,WANG Wei,et al.Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming[J].IEEE Transactions on Wireless Communications,2016,15(4):2537-2551.DOI:10.1109/TWC.2015.2504526.
[4] LI Yuanjian,ZHAO Rui,TAN Xing,et al.Secrecy performance analysis of artificial noise aided precoding in full-duplex relay systems[C]//IEEE Global Communications Conference.Singapore:IEEE Press,2017:214-218.DOI:10.1109/GLOCOM.2017.8254504.
[5] ZHAO Rui,YUAN Yi,FAN Lisheng,et al.Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-m fading channels[J].IEEE Transactions on Communications,2017,65(2):549-563.DOI:10.1109/TCOMM.2016.2618793.
[6] ZHAO Rui,LIN Hongxin,HE Yucheng,et al.Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI[J].IEEE Transactions on Communications,2018,66(2):546-559.DOI:10.1109/TCO MM.2017.2747554.
[7] 沈振汉,黄华灿.B3G小区间干扰抑制技术[J].华侨大学学报(自然科学版),2011,32(2):165-168.DOI:10.11830/ISSN.1000-5013.2011.02.0165.
[8] LI Chunguo,LIU Peng,ZOU Chao,et al.Spectral-efficient cellular communications with coexistent one-and two-hop transmissions[J].IEEE Transactions on Vehicular Technology,2016,65(8):6765-6772.DOI:10.1109/TVT.2015.2472456.
[9] DONG Lun,HAN Zhu,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.DOI:10.1109/TSP.2009.2038412.
[10] CHEN Gaojie,GONG Yu,JONATHON A C.Physical layer network security in the full-duplex relay system[J].IEEE Transactions on Information Forensics and Security,2015,10(3):574-583.DOI:10.1109/TIFS.2015.2390136.
[11] SURAWEERA H A,KRIKIDIS I,ZHENG Gan,et al.Low-complexity end-to-end performance optimization in MIMO full-duplex relay systems[J].IEEE Transactions on Wireless Communications,2014,13(2):913-927.DOI:10.1109/TWC.2013.122313.130608.
[12] RIIHONEN T,WERNER S,WICHMAN R.Mitigation of loopback self-interference in full-duplex MIMO relays[J].IEEE Transaction on Signal Processing,2011,59(12):5983-5993.DOI:10.1109/TSP.2011.2164910.
[13] XU Jie,ZHANG Rui.Throughput optimal policies for energy harvesting wireless transmitters with non-ideal circuit power[J].IEEE Journal on Selected Areas in Communications,2014,32(2):322-332.DOI:10.1109/JSAC.2014.141212.
[14] LUO Shixin,ZHANG Rui,LIM T J.Optimal save-then-transmit protocol for energy harvesting wireless transmitters[J].IEEE Transactions on Wireless Communications,2013,12(3):1196-1207.DOI:10.1109/TWC.2013.0 12413.120488.
[15] ZHONG Caijun,SURAWEERA H A,ZHENG Gan,et al.Wireless information and power transfer with full duplex relaying[J].IEEE Transactions on Communications,2014,62(10):3447-3461.DOI:10.1109/TCOMM.2014.2357 423.
[16] XING Hong,LIU Liang,ZHANG Rui.Secrecy wireless information and power transfer in fading wiretap channel[J].IEEE Transactions on Vehicular Technology,2016,65(1):180-190.DOI:10.1109/TVT.2015.2395725.
[17] YING Bi,HE Chen.Accumulate and jam: Towards secure communication via a wireless-powered full-duplex jammer[J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1538-1550.DOI:10.1109/JSTSP.2016.2600523.
[18] LIU Hongwu,KIM K J,KWAK K S,et al.Power splitting-based SWIPT with decode-and-forward full-duplex relaying[J].IEEE Transactions on Wireless Communications,2016,15(11):7561-7577.DOI:10.1109/TWC.2016.2604801.
[19] KRIKIDIS I,CHARALAMBOUS T,THOMPSON J S.Buffer-aided relay selection for cooperative diversity systems without delay constraints[J].IEEE Transactions on Wireless Communications,2012,11(5):1957-1967.DOI:10.1109/TWC.2012.032712.111970.
[20] GRADSHTEYN I S,RYZHIK I M.Table of integrals, series, and products[M].New York:Academic Press,2007.
[21] RECKTENWALD G W.Numerical methods with MATLAB: Implementation and application[M].United States:Prentice Hall,2000.
[22] LI Yuanjian,ZHAO Rui,WANG Yi,et al.Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications[J].IEEE Access,2018,6(7):44107-44119.DOI:10.1109/ACCESS.2018.2851598.
[23] LI Yuanjian,ZHAO Rui,FAN Lisheng,et al.Antenna mode switching for full-duplex destination-based jamming secure transmission[J].IEEE Access,2018,6(1):9442-9453.DOI:10.1109/ACCESS.2018.2791638.
[24] TAN Xing,ZHAO Rui,LI Yuanjian.Large-scale antennas analysis of untrusted relay system with cooperative jamming[C]//International Conference on Network and Service Management, IEEE Computer Society.Tokyo:IEEE Press,2017:26-30.DOI:10.23919/CNSM. 2017.8256012.
[25] NIE Zhiqiao,ZHAO Rui,LI Yuanjian,et al.A full-duplex SWIPT relaying protocol based on discrete energy state[C]//IEEE 20th International Symposium on Wireless Personal Multimedia Communications.Bali:IEEE Press,2017:500-505.DOI:10.1109/ WPMC.2017.8301864.
[26] LI Chunguo,WANG Jue,ZHENG Fuchun,et al.Overhearing based cooperation for two-cell network with asymmetric uplink-downlink traffics[J].IEEE Transactions on Signal and Information Processing over Networks,2016,2(3):350-361.DOI:10.1109/TSIPN.2016.2549179.
[27] LI Chunguo,HYUN J Y,SUN Fan,et al.Multiuser overhearing for cooperative two-way multiantenna relays[J].IEEE Transactions on Vehicular Technology,2016,65(5):3796-3802.DOI:10.1109/TVT.2015.2441879.

备注/Memo

备注/Memo:
收稿日期: 2018-01-26
通信作者: 刘菁华(1980-),女,讲师,主要从事通信信号处理的研究.E-mail:jinghualiu2017@126.com.
基金项目: 国家自然科学基金资助项目(61401165); 福建省自然科学基金资助项目(2015J01262); 华侨大学研究生科研创新能力培育计划资助项目(1611301040)
更新日期/Last Update: 2019-05-20