高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

放大转发中继网络中绿色的物理层安全通信技术

王东 李永成 白铂 王满喜

王东, 李永成, 白铂, 王满喜. 放大转发中继网络中绿色的物理层安全通信技术[J]. 电子与信息学报, 2016, 38(4): 841-847. doi: 10.11999/JEIT150695
引用本文: 王东, 李永成, 白铂, 王满喜. 放大转发中继网络中绿色的物理层安全通信技术[J]. 电子与信息学报, 2016, 38(4): 841-847. doi: 10.11999/JEIT150695
WANG Dong, LI Yongcheng, BAI Bo, WANG Manxi. Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks[J]. Journal of Electronics and Information Technology, 2016, 38(4): 841-847. doi: 10.11999/JEIT150695
Citation: WANG Dong, LI Yongcheng, BAI Bo, WANG Manxi. Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks[J]. Journal of Electronics and Information Technology, 2016, 38(4): 841-847. doi: 10.11999/JEIT150695

放大转发中继网络中绿色的物理层安全通信技术

doi: 10.11999/JEIT150695
基金项目: 

CEMEE国家重点实验室开放课题基金(CEMEE2015 K0204B)

Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks

Funds: 

The Open Project Foundation of CEMEE State Key Laboratory (CEMEE2015K0204B)

  • 摘要: 该文基于物理层安全理论,针对能量受限的无线中继网络提出一种绿色的保密通信方案。该方案在节点功率约束和系统最小目标保密速率要求下,通过最优功率控制实现系统的安全能效最大化,并基于分式规划、对偶分解和DC(Difference of Convex functions)规划理论提出了一种迭代的功率分配算法。通过仿真比较,能效优化可以显著提升系统的安全能效,然而相对于保密速率最大化会有一定保密速率损失,这是由于能效和保密之间存在固有的折中。但是,能效优化的保密速率仍然大于发送总功率最小化的保密速率。
  • 黄开枝, 洪颖, 罗文宇, 等. 基于演化博弈机制的物理层安全协作方法[J]. 电子与信息学报, 2015, 37(1): 193-199. doi: 10.11999/JEIT140309.
    HUANG Kaizhi, HONG Ying, LUO Wenyu, et al. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics Information Technology, 2015, 37(1): 193-199. doi: 10.11999/JEIT140309.
    LIU J, DAI H, and CHEN W. Delay optimal scheduling for energy harvesting based communications[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(3): 452-466. doi: 10.1109/JSAC.2015.2391972.
    CHEN W, DAI L, LETAIEF K B, et al. A unified cross-layer framework for resource allocation in cooperative networks[J]. IEEE Transactions on Wireless Communications, 2008, 7(8): 3000-3012. doi: 10.1109/TWC. 2008.060831.
    黄高勇, 方旭明, 陈煜. 基于速率约束的OFDM中继链路能效最优资源分配策略[J]. 电子与信息学报, 2014, 36(9): 2104-2110. doi: 10.3724/SP.J.1146.2013.01661.
    HUANG Gaoyong, FANG Xuming, and CHEN Yu. Resource allocation for energy efficiency maximization based on rate constrains in OFDM DF relay link[J]. Journal of Electronics Information Technology, 2014, 36(9): 2104-2110. doi: 10.3724/SP.J.1146.2013.01661.
    LI J, PETROPULU A P, and WEBER S. On cooperative relaying schemes for wireless physical layer security[J]. IEEE Transaction on Signal Processing, 2011, 59(10): 4985-4996. doi: 10.1109/TSP.2011.2159598.
    DEHGHAN M, GOECKEL D L, GHADERI M, et al. Energy efficiency of cooperative jamming strategies in secure wireless networks[J]. IEEE Transactions on Wireless Communications, 2012, 11(9): 3025-3029. doi: 10.1109/ TWC.2012.070912.110789.
    EL-HALABI M, LIU T, and GEORGHIADES C N. Secrecy capacity per unit cost[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1909-1920. doi: 10.1109/ JSAC.2013.130922.
    NG D W K, LO E S, and SCHOBER R. Energy-efficient resource allocation for secure OFDMA systems[J]. IEEE Transactions on Vehicular Technology, 2012, 61(6): 2572-2585. doi: 10.1109/TVT.2012.2199145.
    COMANICIU C, POOR H V, and ZHANG R. An information theoretic framework for energy efficient secrecy [C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, British Columbia, Canada, 2013: 2906-2910.
    CHEN W. CAO-SIR: Channel aware ordered successive relaying[J]. IEEE Transactions on Wireless Communications, 2014, 13(12): 6513-6527. doi: 10.1109/TWC.2014.2363453.
    LIU J, CHEN W, ZHANG Y, et al. A utility maximization framework for fair and efficient multicasting in multicarrier wireless cellular networks[J]. IEEE/ACM Transactions on Networking, 2013, 21(1): 110-120. doi: 10.1109/TNET. 2012.2192747.
    EKREM E and ULUKUS S. Capacity-equivocation region of the Gaussian MIMO wiretap channel[J]. IEEE Transactions on Information Theory, 2012, 58(9): 5699-5710. doi: 10.1109/ TIT.2012.2204534.
    KHODAKARAMI H and LAHOUTI F. Link adaptation with untrusted relay assignment: design and performance analysis[J]. IEEE Transactions on Communications, 2013, 61(12): 4874-4883. doi: 10.1109/TCOMM.2013.111513. 120888.
    LIU J, CHEN W, CAO Z, et al. Cooperative beamforming for cognitive radio networks: A cross-layer design[J]. IEEE Transactions on Communications, 2012, 60(5): 1420-1431. doi: 10.1109/TCOMM.2012.031712.100284A.
    CHEN W, LETAIEF K B, and CAO Z. Buffer-aware network coding for wireless networks[J]. IEEE/ACM Transactions on Networking, 2012, 20(5): 1389-1401. doi: 10.1109/TNET. 2011.2176958.
    LIU J, CHEN W, CAO Z, et al. Delay optimal scheduling for cognitive radios with cooperative beamforming: A structured matrix-geometric method[J]. IEEE Transactions on Mobile Computing, 2012, 11(8): 1412-1423. doi: 10.1109/TMC. 2011.153.
    DINKELBACH W. On nonlinear fractional programming[J]. Management Science, 1967, 13(7): 492-498.
    PALOMAR D P and CHIANG M. A tutorial on decomposition methods for network utility maximization[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(8): 1439-1451. doi: 10.1109/JSAC.2006.879350.
    AN L T H and TAO P D. The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems[J]. Annals of Operations Research, 2005, 133(1/4): 23-46.
    NGO D T, KHAKUREL S, and LE-NGOC T. Joint subchannel assignment and power allocation for OFDMA femtocell networks[J]. IEEE Transactions on Wireless Communications, 2014, 13(1): 342-355. doi: 10.1109/TWC. 2013.111313.130645.
    RICHTER S, JONES C, and MORARI M. Computational complexity certification for real-time MPC with input constraints based on the fast gradient method[J]. IEEE Transactions on Automatic Control, 2012, 57(6): 1391-1403. doi: 10.1109/TAC.2011.2176389.
  • 加载中
计量
  • 文章访问数:  786
  • HTML全文浏览量:  54
  • PDF下载量:  667
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-06-08
  • 修回日期:  2015-12-25
  • 刊出日期:  2016-04-19

目录

    /

    返回文章
    返回

    官方微信,欢迎关注