天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

多天線中繼系統(tǒng)中的可靠傳輸技術(shù)研究

發(fā)布時(shí)間:2019-06-09 19:45
【摘要】:中繼技術(shù)的興起與發(fā)展極大改善了通信網(wǎng)絡(luò)的覆蓋能力。而多輸入多輸出(Multiple Input Multiple Output, MIMO)技術(shù)與中繼技術(shù)的結(jié)合則有望推動(dòng)中繼實(shí)現(xiàn)更高頻譜利用率、更高傳輸可靠性。本文主要研究多天線中繼系統(tǒng)中的可靠傳輸技術(shù),旨在優(yōu)化中繼系統(tǒng)中信息傳輸?shù)恼`碼性能以及安全性能。研究?jī)?nèi)容主要涵蓋兩個(gè)方面:1)以對(duì)抗系統(tǒng)噪聲信道衰落等客觀干擾為主要目的的分集技術(shù);2)以對(duì)抗主觀攻擊為主要目的的安全通信技術(shù)。在分集技術(shù)方面,本文重點(diǎn)研究了具備全分集性能的低復(fù)雜度接收機(jī)設(shè)計(jì)、以及傳輸方案設(shè)計(jì)。在安全通信方面,本文重點(diǎn)研究了依靠物理層信號(hào)的攻擊檢測(cè)技術(shù)。本文的創(chuàng)新點(diǎn)歸納如下: 第一,本文提出了一種針對(duì)MPSK調(diào)制的物理層網(wǎng)絡(luò)編碼(Physical-layer Coding, PNC)專屬檢測(cè)技術(shù)。該技術(shù)能夠從物理層的接收信號(hào)中直接提取多進(jìn)制移相鍵控(M-ary phase-shift keying, MPSK) MPSK調(diào)制下的網(wǎng)絡(luò)編碼符號(hào)而不需要經(jīng)過(guò)分別檢測(cè)再編碼的過(guò)程,因此降低了運(yùn)算復(fù)雜度。該技術(shù)的主要技術(shù)手段是計(jì)算接收信號(hào)的內(nèi)積或者外積,從而使網(wǎng)絡(luò)編碼符號(hào)內(nèi)含在內(nèi)積或外積中。本文繼而提出了一種基于內(nèi)積或外積的最大似然檢測(cè)算法來(lái)提取出網(wǎng)絡(luò)編碼符號(hào)。最后,仿真表明基于外積的最大似然檢測(cè)器取得了全分集性能。 第二,本文提出了基于符號(hào)的物理層網(wǎng)絡(luò)編碼(Symbol-based Physical-layer Coding, SPNC)傳輸技術(shù)。SPNC技術(shù)主要面向MPSK調(diào)制,在信息檢測(cè)的最終環(huán)節(jié)采取PNC專屬檢測(cè)技術(shù),因此具備PNC專屬檢測(cè)器的低復(fù)雜度優(yōu)勢(shì)。SPNC技術(shù)同時(shí)能在更寬泛的應(yīng)用條件下獲得全分集增益。具體而言,本文提出了基于天線選擇的SPNC方案(Antenna selection based SPNC, AS-SPNC)和基于信號(hào)合并的SPNC方案(Signal-combination based SPNC, SC-SPNC)。理論分析不僅證明兩種方案都可以獲得全分集增益,同時(shí)表明在使用SPNC技術(shù)時(shí),多天線中繼系統(tǒng)可以等效為一個(gè)點(diǎn)對(duì)點(diǎn)的單入多出系統(tǒng)(Single Input Multiple Output, SIMO),并且,AS-SPNC方案和SC-SPNC方案可以分別視作這一等效系統(tǒng)中的AS和最大比合并方案(Maximal Ratio Combining, MRC)。本文給出了所提方案的誤碼率表達(dá)式,并且理論分析和仿真結(jié)果一致。最后,本文將所提SPNC技術(shù)擴(kuò)展到MQAM調(diào)制的系統(tǒng)中,進(jìn)一步深入了SPNC技術(shù)的研究和應(yīng)用。 第三,本文針對(duì)多中繼網(wǎng)絡(luò)提出了一種相位旋轉(zhuǎn)(Phase Rota-tion, PR)輔助的中繼選擇技術(shù),該技術(shù)旨在優(yōu)化端到端的符號(hào)錯(cuò)誤率。所提PR技術(shù)能夠使MaxMin選擇準(zhǔn)則在采用解碼轉(zhuǎn)發(fā)(Decode-and-Forward, DF)模式的雙向中繼網(wǎng)絡(luò)中獲取全分集增益。本文所提PR技術(shù)可以控制最小判決距離使其無(wú)法趨向任意小的數(shù)值,從而改善誤碼性能,進(jìn)而允許MaxMin中繼選擇技術(shù)獲得全分集增益。同時(shí),本文給出性能分析,分析結(jié)果不僅驗(yàn)證了所提方案的全分集性能,而且說(shuō)明了所提方案還可以改善系統(tǒng)的陣列增益。值得注意的是相比現(xiàn)有文獻(xiàn)中基于DF的設(shè)計(jì)方案,本文所提方案允許更靈活的中繼天線配置。另外,為了避免實(shí)際應(yīng)用中的反饋開銷,本文還提出了一種基于PR的符號(hào)拓展方案,在該方案中源節(jié)點(diǎn)無(wú)需反饋信道信息同樣可以采用PR技術(shù)輔助MaxMin準(zhǔn)則獲取全分集增益。 第四,本文研究了可靠邊信息缺失下的物理層攻擊檢測(cè)技術(shù)。該技術(shù)旨在使信宿節(jié)點(diǎn)在沒(méi)有可靠邊信息輔助時(shí)也能夠檢測(cè)中繼節(jié)點(diǎn)是否如實(shí)履行轉(zhuǎn)發(fā)職責(zé)。圍繞這一目標(biāo),本文將中繼系統(tǒng)劃分為攻擊可檢測(cè)系統(tǒng)以及攻擊不可檢測(cè)系統(tǒng)。并通過(guò)理論分析證明了在攻擊可檢測(cè)系統(tǒng)中,一定存在漸進(jìn)無(wú)差錯(cuò)檢測(cè)子使信宿節(jié)點(diǎn)僅依靠物理層接收信號(hào)就能夠掌握中繼的行為信息,而這樣的無(wú)差錯(cuò)檢測(cè)子在攻擊不可檢測(cè)系統(tǒng)中一定不存在。本文繼而提出了判定中繼系統(tǒng)是否屬于攻擊可檢測(cè)系統(tǒng)的實(shí)際驗(yàn)證算法,并通過(guò)所提驗(yàn)證算法進(jìn)一步指出許多典型的中繼系統(tǒng)都屬于攻擊可檢測(cè)系統(tǒng)。同時(shí),本文還提出了可靠邊信息缺失下的惡意中繼定位算法,理論分析表明該算法同樣具有漸進(jìn)無(wú)差錯(cuò)性能。值得注意的是本文所提的無(wú)差錯(cuò)檢測(cè)算法都無(wú)需依靠密鑰、先驗(yàn)參考序列等可靠邊信息的輔助,因此相比現(xiàn)有的、基于密鑰或者網(wǎng)絡(luò)協(xié)議的檢測(cè)算法,本文所提算法具有更高的傳輸效率。
[Abstract]:The rise and development of the relay technology greatly improves the coverage ability of the communication network. The combination of multiple input multiple output (MIMO) and relay technology is expected to push the relay to achieve higher frequency spectrum utilization and higher transmission reliability. This paper mainly studies the reliable transmission technology in multi-antenna relay system, which is to optimize the error performance and safety performance of the information transmission in the relay system. The content of the research mainly covers two aspects:1) the diversity technology which is the main purpose of the objective interference such as the fading of the system noise channel and the like;2) the security communication technology aiming at the main purpose of resisting the subjective attack. In terms of diversity technology, this paper focuses on the design of low-complexity receiver with full-diversity performance and the transmission scheme design. In the aspect of secure communication, this paper focuses on the attack detection technology that relies on the physical layer signal. The innovation points of this paper are summarized as follows: First, a physical-layer coding (PNC)-specific detection technique for MPSK modulation is presented in this paper. The technique can directly extract the network coded symbols under the M-ary phase-shift keying (MPSK) MPSK modulation from the received signal of the physical layer without the need of the process of separately detecting and re-encoding, thus reducing the complexity of the operation. the main technical means of the technique is to calculate the inner product or the outer product of the received signal, so that the network coding symbol is contained in the inner product or the outer product In this paper, a maximum likelihood detection algorithm based on internal product or external product is presented to extract the network code. Finally, the simulation shows that the maximum likelihood detector based on the outer product has obtained the complete diversity. In this paper, the symbol-based physical-layer coding (SPNC) transmission is proposed in this paper. The SPNC technology is mainly for MPSK modulation, and the PNC-specific detection technology is adopted in the final part of the information detection, so it has the low complexity of the PNC-specific detector. Degree advantage. The SPNC technology can be used at the same time to obtain a full score under the broader application conditions In this paper, an antenna-based SPNC program (AS-SPNC) and a signal-based SPNC (Signal-combining based SPNC, SC-SP) scheme are proposed in this paper. The theoretical analysis not only proves that both schemes can obtain the full diversity gain, but also shows that the multi-antenna relay system can be equivalent to a point-to-point single-input multiple-output system (SIMO) when the SPNC technology is used. and the AS-SPNC scheme and the SC-SPNC scheme may be considered as the AS and the maximum ratio merging scheme in this equivalent system, respectively (Maxime Ratio combining, M The error rate expression of the proposed scheme is given in this paper, and the theoretical analysis and the simulation are presented. In the end, the SPNC technology is extended to the system of MQAM modulation, and the research of the SPNC technology is further studied. Third, this paper presents a phase rotation (PR)-assisted relay selection technique for multi-relay networks, which is designed to optimize the end-to-end The proposed PR technique enables the MaxMin selection criterion to be obtained in a two-way relay network using the Decode-and-Forward (DF) mode The PR technique proposed in this paper can control the minimum decision distance so that it can't tend to any small value, so as to improve the error code performance and to allow the MaxMin relay selection technique to be obtained. At the same time, the performance analysis is given in this paper. The analysis result not only verifies the full diversity performance of the proposed scheme, but also shows that the proposed scheme can also improve the system. It is worth noting that the scheme proposed in this paper is allowed to be more flexible as compared to the DF-based design in the existing literature. In addition, in order to avoid the feedback overhead in the practical application, a symbol expansion scheme based on PR is also proposed in this paper. In this scheme, the source node does not need the feedback channel information, and can also be obtained by using the PR technique to support the MaxMin criterion. Fourth, this paper studies the physics of the loss of reliable edge information the technique is to enable the sink node to detect if the relay node, for example, In this paper, the relay system is divided into the attack detection system and the attack. By means of the theory analysis, it is proved that there is a gradual error-free detection in the attack detection system, so that the sink node can master the behavior information of the relay only by means of the physical layer receiving signal, and the error-free detection sub-system can not be detected by the attack. In this paper, an actual verification algorithm for determining whether the relay system belongs to an attack detection system is presented, and many typical relay systems are further pointed out by the proposed verification algorithm. In addition, a malicious relay location algorithm under the absence of reliable edge information is presented in this paper, and the theoretical analysis shows that the algorithm has the same function. It is worth noting that the error-free detection algorithm proposed in this paper does not need to rely on the aid of reliable edge information such as the key, the prior reference sequence and so on. Therefore, compared with the existing detection algorithm based on the key or the network protocol, the proposed algorithm has the advantages of
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN92

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 趙國(guó)群,馬新武,王廣春,趙新海;鍛造過(guò)程最優(yōu)化預(yù)成形設(shè)計(jì)系統(tǒng)的開發(fā)研究[J];鍛壓機(jī)械;1999年04期

,

本文編號(hào):2495845

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2495845.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶65dae***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com