協(xié)作頻譜共享網(wǎng)絡中的安全性能分析
發(fā)布時間:2018-06-30 20:27
本文選題:協(xié)作通信 + 頻譜共享 ; 參考:《鄭州大學》2017年碩士論文
【摘要】:協(xié)作分集技術(shù)和頻譜共享技術(shù)的聯(lián)合應用能有效對抗多徑衰落、提高頻譜利用率從而緩解頻譜資源短缺的矛盾,物理層安全技術(shù)可以提高無線通信網(wǎng)絡的傳輸安全性。然而目前研究協(xié)作頻譜共享技術(shù)的相關(guān)文獻大都以信道容量最大化或者頻譜共享策略為研究目標,沒有考慮系統(tǒng)能效和安全傳輸問題;物理層安全方面文獻大都以安全容量最優(yōu)或者總發(fā)射功率最小為研究目標。但是,隨著無線通信領域的迅速發(fā)展,人們希望數(shù)據(jù)傳輸?shù)馗、更安?能量利用效率和系統(tǒng)穩(wěn)定性更高。因此,不同技術(shù)的綜合應用成為時代的必然;诖,本文對協(xié)作頻譜共享機制下系統(tǒng)的安全能效和中斷概率做了相關(guān)研究,具體內(nèi)容包括:1.在本文所提協(xié)作頻譜共享機制中,充當中繼節(jié)點的認知用戶發(fā)射端利用功率分配因子?和1-?將授權(quán)網(wǎng)絡數(shù)據(jù)和認知網(wǎng)絡數(shù)據(jù)疊加后轉(zhuǎn)發(fā)給相應的目的接收端,同時,偽裝成合法用戶的竊聽節(jié)點也接收到疊加信號;诖藱C制,研究了中繼節(jié)點采用譯碼轉(zhuǎn)發(fā)協(xié)議時系統(tǒng)安全能效最優(yōu)的功率分配算法。針對目標函數(shù)非凸問題,利用分式規(guī)劃和DC(Difference of Convex functions)規(guī)劃理論對原問題進行迭代求解。仿真結(jié)果表明,相比保密速率最大化優(yōu)化目標,所提算法能獲得更高的安全能效,但因保密速率和安全能效之間的折中,此時保密速率有一定損失。2.針對上述協(xié)作頻譜共享機制,研究了中繼節(jié)點采用放大轉(zhuǎn)發(fā)協(xié)議、滿足峰值功率和保密速率約束下,系統(tǒng)安全能效最優(yōu)的功率分配算法。聯(lián)合應用分式規(guī)劃、罰函數(shù)、交替搜索和DC規(guī)劃理論將原目標函數(shù)進行等效和逐層分解。仿真結(jié)果對比了所提算法與遍歷算法的性能差距,并驗證了所提算法的收斂性能。分析了節(jié)點位置變化對系統(tǒng)安全能效的影響,并驗證了物理層安全通信網(wǎng)絡中依然存在保密速率和安全能效的折中。3.考慮了授權(quán)網(wǎng)絡以頻譜共享機會作為誘餌竊聽認知網(wǎng)絡機密數(shù)據(jù)的情形。針對授權(quán)用戶發(fā)射端作為竊聽節(jié)點的情形,推導得出了中繼節(jié)點采用譯碼轉(zhuǎn)發(fā)和放大轉(zhuǎn)發(fā)協(xié)議時,授權(quán)網(wǎng)絡的中斷概率和認知網(wǎng)絡安全中斷概率的表達式以及閉式解,分析了功率分配因子取值范圍和對系統(tǒng)中斷概率的影響并通過仿真結(jié)果進行驗證。
[Abstract]:The joint application of cooperative diversity technology and spectrum sharing technology can effectively resist multipath fading, improve spectrum efficiency and alleviate the contradiction of spectrum resource shortage. Physical layer security technology can improve the transmission security of wireless communication network. However, most of the literatures on collaborative spectrum sharing are focused on the channel capacity maximization or spectrum sharing strategy, and do not consider the energy efficiency and secure transmission of the system. Most of the literatures on physical layer security aim at optimal safety capacity or minimum total transmission power. However, with the rapid development of wireless communication, data transmission is expected to be faster, more secure, more efficient and more stable. Therefore, the comprehensive application of different technologies has become an inevitable trend of the times. Based on this, this paper studies the security energy efficiency and interruption probability of the system under the cooperative spectrum sharing mechanism, including: 1. In the cooperative spectrum sharing mechanism proposed in this paper, the cognitive user transmitter which acts as the relay node uses the power allocation factor. And 1? The authorized network data and cognitive network data are superimposed and forwarded to the corresponding destination receiver. At the same time, the eavesdropping nodes disguised as legitimate users also receive the superposition signals. Based on this mechanism, the optimal power allocation algorithm for the system security energy efficiency when the relay node adopts the decoding and forwarding protocol is studied. For the non-convex problem of objective function, the original problem is solved iteratively by fractional programming and DC (difference of Convex functions) programming theory. The simulation results show that the proposed algorithm can achieve higher security energy efficiency than the maximization of the security rate. However, due to the compromise between the security rate and the security energy efficiency, the security rate has a certain loss of .2. Aiming at the cooperative spectrum sharing mechanism, an optimal power allocation algorithm for system security energy efficiency under peak power and secure rate constraints is studied. The relay node adopts amplification and forwarding protocol to satisfy the constraints of peak power and secure rate. By using fractional programming, penalty function, alternating search and DC programming theory, the original objective function is decomposed into different levels. Simulation results compare the performance gap between the proposed algorithm and the ergodic algorithm, and verify the convergence performance of the proposed algorithm. The influence of node location change on system security energy efficiency is analyzed, and the compromise between security rate and security energy efficiency is verified in the physical layer secure communication network. In this paper, we consider that authorized network uses spectrum sharing as bait to eavesdrop on classified data of cognitive network. In view of the situation that the authorized user transmitter acts as the eavesdropping node, the expressions and closed solutions of the outage probability and the cognitive network security interrupt probability of the relay node are derived when the relay node adopts the decoding, forwarding and amplifying forwarding protocols. The range of power allocation factor and its influence on the outage probability of the system are analyzed and verified by simulation results.
【學位授予單位】:鄭州大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TN92
【相似文獻】
相關(guān)期刊論文 前10條
1 胡林;唐倫;陳前斌;李實秋;;認知無線網(wǎng)絡中基于博弈的頻譜共享[J];計算機應用研究;2009年12期
2 張晶;朱洪波;;混合式頻譜共享系統(tǒng)功率分配研究[J];電子與信息學報;2010年11期
3 王磊;鄭寶玉;崔景伍;岳文靜;;認知無線網(wǎng)絡中一種新的頻譜共享方法[J];信號處理;2011年07期
4 湯海冰;胡志剛;;認知無線網(wǎng)絡空閑頻譜共享的競爭與合作定價[J];系統(tǒng)工程與電子技術(shù);2013年01期
5 周惟風;朱琦;;基于拍賣理論和補償激勵的頻譜共享新算法[J];通信學報;2011年10期
6 羅麗平;;改進的協(xié)作頻譜共享方案[J];計算機工程與應用;2011年30期
7 劉悅;翁麗萍;;授權(quán)的頻譜共享技術(shù)[J];電信網(wǎng)技術(shù);2013年09期
8 李婷婷;陳志奎;劉e,
本文編號:2086751
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2086751.html
最近更新
教材專著