協(xié)作頻譜共享網(wǎng)絡(luò)中的安全性能分析
發(fā)布時間:2018-06-30 20:27
本文選題:協(xié)作通信 + 頻譜共享; 參考:《鄭州大學(xué)》2017年碩士論文
【摘要】:協(xié)作分集技術(shù)和頻譜共享技術(shù)的聯(lián)合應(yīng)用能有效對抗多徑衰落、提高頻譜利用率從而緩解頻譜資源短缺的矛盾,物理層安全技術(shù)可以提高無線通信網(wǎng)絡(luò)的傳輸安全性。然而目前研究協(xié)作頻譜共享技術(shù)的相關(guān)文獻(xiàn)大都以信道容量最大化或者頻譜共享策略為研究目標(biāo),沒有考慮系統(tǒng)能效和安全傳輸問題;物理層安全方面文獻(xiàn)大都以安全容量最優(yōu)或者總發(fā)射功率最小為研究目標(biāo)。但是,隨著無線通信領(lǐng)域的迅速發(fā)展,人們希望數(shù)據(jù)傳輸?shù)馗臁⒏踩?能量利用效率和系統(tǒng)穩(wěn)定性更高。因此,不同技術(shù)的綜合應(yīng)用成為時代的必然;诖,本文對協(xié)作頻譜共享機(jī)制下系統(tǒng)的安全能效和中斷概率做了相關(guān)研究,具體內(nèi)容包括:1.在本文所提協(xié)作頻譜共享機(jī)制中,充當(dāng)中繼節(jié)點(diǎn)的認(rèn)知用戶發(fā)射端利用功率分配因子?和1-?將授權(quán)網(wǎng)絡(luò)數(shù)據(jù)和認(rèn)知網(wǎng)絡(luò)數(shù)據(jù)疊加后轉(zhuǎn)發(fā)給相應(yīng)的目的接收端,同時,偽裝成合法用戶的竊聽節(jié)點(diǎn)也接收到疊加信號;诖藱C(jī)制,研究了中繼節(jié)點(diǎn)采用譯碼轉(zhuǎn)發(fā)協(xié)議時系統(tǒng)安全能效最優(yōu)的功率分配算法。針對目標(biāo)函數(shù)非凸問題,利用分式規(guī)劃和DC(Difference of Convex functions)規(guī)劃理論對原問題進(jìn)行迭代求解。仿真結(jié)果表明,相比保密速率最大化優(yōu)化目標(biāo),所提算法能獲得更高的安全能效,但因保密速率和安全能效之間的折中,此時保密速率有一定損失。2.針對上述協(xié)作頻譜共享機(jī)制,研究了中繼節(jié)點(diǎn)采用放大轉(zhuǎn)發(fā)協(xié)議、滿足峰值功率和保密速率約束下,系統(tǒng)安全能效最優(yōu)的功率分配算法。聯(lián)合應(yīng)用分式規(guī)劃、罰函數(shù)、交替搜索和DC規(guī)劃理論將原目標(biāo)函數(shù)進(jìn)行等效和逐層分解。仿真結(jié)果對比了所提算法與遍歷算法的性能差距,并驗(yàn)證了所提算法的收斂性能。分析了節(jié)點(diǎn)位置變化對系統(tǒng)安全能效的影響,并驗(yàn)證了物理層安全通信網(wǎng)絡(luò)中依然存在保密速率和安全能效的折中。3.考慮了授權(quán)網(wǎng)絡(luò)以頻譜共享機(jī)會作為誘餌竊聽認(rèn)知網(wǎng)絡(luò)機(jī)密數(shù)據(jù)的情形。針對授權(quán)用戶發(fā)射端作為竊聽節(jié)點(diǎn)的情形,推導(dǎo)得出了中繼節(jié)點(diǎn)采用譯碼轉(zhuǎn)發(fā)和放大轉(zhuǎn)發(fā)協(xié)議時,授權(quán)網(wǎng)絡(luò)的中斷概率和認(rèn)知網(wǎng)絡(luò)安全中斷概率的表達(dá)式以及閉式解,分析了功率分配因子取值范圍和對系統(tǒng)中斷概率的影響并通過仿真結(jié)果進(jìn)行驗(yàn)證。
[Abstract]:The joint application of cooperative diversity technology and spectrum sharing technology can effectively resist multipath fading, improve spectrum efficiency and alleviate the contradiction of spectrum resource shortage. Physical layer security technology can improve the transmission security of wireless communication network. However, most of the literatures on collaborative spectrum sharing are focused on the channel capacity maximization or spectrum sharing strategy, and do not consider the energy efficiency and secure transmission of the system. Most of the literatures on physical layer security aim at optimal safety capacity or minimum total transmission power. However, with the rapid development of wireless communication, data transmission is expected to be faster, more secure, more efficient and more stable. Therefore, the comprehensive application of different technologies has become an inevitable trend of the times. Based on this, this paper studies the security energy efficiency and interruption probability of the system under the cooperative spectrum sharing mechanism, including: 1. In the cooperative spectrum sharing mechanism proposed in this paper, the cognitive user transmitter which acts as the relay node uses the power allocation factor. And 1? The authorized network data and cognitive network data are superimposed and forwarded to the corresponding destination receiver. At the same time, the eavesdropping nodes disguised as legitimate users also receive the superposition signals. Based on this mechanism, the optimal power allocation algorithm for the system security energy efficiency when the relay node adopts the decoding and forwarding protocol is studied. For the non-convex problem of objective function, the original problem is solved iteratively by fractional programming and DC (difference of Convex functions) programming theory. The simulation results show that the proposed algorithm can achieve higher security energy efficiency than the maximization of the security rate. However, due to the compromise between the security rate and the security energy efficiency, the security rate has a certain loss of .2. Aiming at the cooperative spectrum sharing mechanism, an optimal power allocation algorithm for system security energy efficiency under peak power and secure rate constraints is studied. The relay node adopts amplification and forwarding protocol to satisfy the constraints of peak power and secure rate. By using fractional programming, penalty function, alternating search and DC programming theory, the original objective function is decomposed into different levels. Simulation results compare the performance gap between the proposed algorithm and the ergodic algorithm, and verify the convergence performance of the proposed algorithm. The influence of node location change on system security energy efficiency is analyzed, and the compromise between security rate and security energy efficiency is verified in the physical layer secure communication network. In this paper, we consider that authorized network uses spectrum sharing as bait to eavesdrop on classified data of cognitive network. In view of the situation that the authorized user transmitter acts as the eavesdropping node, the expressions and closed solutions of the outage probability and the cognitive network security interrupt probability of the relay node are derived when the relay node adopts the decoding, forwarding and amplifying forwarding protocols. The range of power allocation factor and its influence on the outage probability of the system are analyzed and verified by simulation results.
【學(xué)位授予單位】:鄭州大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TN92
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 胡林;唐倫;陳前斌;李實(shí)秋;;認(rèn)知無線網(wǎng)絡(luò)中基于博弈的頻譜共享[J];計算機(jī)應(yīng)用研究;2009年12期
2 張晶;朱洪波;;混合式頻譜共享系統(tǒng)功率分配研究[J];電子與信息學(xué)報;2010年11期
3 王磊;鄭寶玉;崔景伍;岳文靜;;認(rèn)知無線網(wǎng)絡(luò)中一種新的頻譜共享方法[J];信號處理;2011年07期
4 湯海冰;胡志剛;;認(rèn)知無線網(wǎng)絡(luò)空閑頻譜共享的競爭與合作定價[J];系統(tǒng)工程與電子技術(shù);2013年01期
5 周惟風(fēng);朱琦;;基于拍賣理論和補(bǔ)償激勵的頻譜共享新算法[J];通信學(xué)報;2011年10期
6 羅麗平;;改進(jìn)的協(xié)作頻譜共享方案[J];計算機(jī)工程與應(yīng)用;2011年30期
7 劉悅;翁麗萍;;授權(quán)的頻譜共享技術(shù)[J];電信網(wǎng)技術(shù);2013年09期
8 李婷婷;陳志奎;劉e,
本文編號:2086751
本文鏈接:http://www.sikaile.net/shoufeilunwen/xixikjs/2086751.html
最近更新
教材專著