基于解碼轉(zhuǎn)發(fā)協(xié)議的認(rèn)知中繼網(wǎng)絡(luò)物理層安全研究與應(yīng)用
[Abstract]:The cooperative communication network and cognitive radio are combined into a new cognitive relay network, which can not only achieve spectrum sharing, improve spectrum efficiency, but also widen the wireless coverage area and achieve hierarchical gain. In cooperative communication, decoding and forwarding technology is one of the important means to transmit signals. In addition, in order to ensure the reliability of the data transmission, the physical layer is used to provide the transmission path to the terminal equipment in the communication system. However, due to the openness and broadcast of wireless communication, information transmission is vulnerable to eavesdropping and interference. Therefore, it is of great significance to study the security performance of cognitive relay networks in the physical layer under decoding and forwarding protocols. In this paper, the security performance of three different decoding and forwarding cognitive relay network systems is studied, and the practical application of the network model is analyzed based on the common cell communication environment. Some results obtained are as follows: firstly, the security performance of the system under the maximum relay selection scheme is studied in two-hop multi-relay decoding and forwarding cognitive networks. Specifically, considering the existence of direct link, the selective combining technique is used in the signal receiver. In addition, when all transmitting nodes transmit signals, their transmission power is interfered with by authorized users. Every transmission of information can be eavesdropped by eavesdroppers. Considering that all channels experience Rayleigh weakness, the probability of security outage and non-zero security capacity are obtained. Furthermore, the asymptotic expression of the security interruption probability in high SNR is obtained to evaluate the security performance of the system. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results can be used to optimize and design relay selection schemes in cognitive relay networks. Secondly, in multi-hop decoding forwarding cognitive relay networks, the security performance of the system is based on the consideration that the main channel transmitting node is multiple antennas and the eavesdropper is a single antenna. In particular, the transmission power is affected by the interference temperature of the cognitive user receiver when the relay transmits information with a single antenna, and the selection and combination technique is used at the multiple receiving antennas of the relay and the signal receiver. Moreover, eavesdroppers can eavesdrop on every hop of information. In multi-hop system, the whole system will be interrupted as long as any one-hop information transmission is interrupted. It is considered that all channels experience Nakagami-m debilitating, and the same primary channel, eavesdropping channel, and interference channel are independent and distributed. The security interrupt probability of the system is derived. The effects of relay number antenna number and Nakagami-m attenuation factor on the system security interrupt probability and the influence of relay number and antenna number on the non-zero safe capacity probability are analyzed. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results can be used to optimize the applications of multi-hop transmission schemes in cognitive relay networks. Finally, the performance of the system in the presence of co-channel interference is studied by considering that both relay and multiple users are affected by co-channel interference at the same time. In particular, the opportunistic user selects the best user. All transmit nodes are equipped with a single antenna, and the transmit power is affected by the interference of the authorized user receiver when transmitting the signal. Considering that all channels are subjected to Rayleigh debilitating, the closed form of the security interrupt probability is derived under the system model. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results are helpful to the optimization and design of cognitive relay networks with cochannel interference.
【學(xué)位授予單位】:揚(yáng)州大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TN925
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 惠擑;李維勤;吳亞麗;;有限反饋機(jī)會(huì)中繼通信系統(tǒng)的中斷概率性能[J];電子與信息學(xué)報(bào);2012年08期
2 洪浩;肖立民;閆陽(yáng);王京;;譯碼轉(zhuǎn)發(fā)認(rèn)知雙向中繼網(wǎng)絡(luò)的中斷概率[J];清華大學(xué)學(xué)報(bào)(自然科學(xué)版);2013年11期
3 趙詩(shī)琴;杜榮;李劍;李生紅;;基于干擾建模的通信中斷概率分析[J];計(jì)算機(jī)工程;2013年07期
4 王俊波;王金元;林敏;陳明;;分布式天線系統(tǒng)中的系統(tǒng)上行中斷概率分析[J];電子與信息學(xué)報(bào);2011年05期
5 孫立悅;趙曉暉;虢明;;基于中斷概率的協(xié)作通信中繼選擇與功率分配算法[J];通信學(xué)報(bào);2013年10期
6 嵇建波;唐曉輝;;認(rèn)知選擇協(xié)同分集任意信噪比中斷概率的分析[J];電訊技術(shù);2009年07期
7 洪路峰;楊曉非;劉占軍;;基于中斷概率的協(xié)作伙伴選擇策略[J];廣東通信技術(shù);2010年02期
8 劉磊;湯滟;;無(wú)線傳感網(wǎng)兩種中繼選擇策略的中斷概率分析[J];現(xiàn)代電子技術(shù);2010年21期
9 季彥呈;葛建華;李靖;師曉曄;;增強(qiáng)型編碼雙向中繼方案及中斷概率分析[J];電子與信息學(xué)報(bào);2011年01期
10 冉杰;王羽瑩;;兩跳單節(jié)點(diǎn)選擇增量中繼系統(tǒng)及其中斷概率研究[J];現(xiàn)代電信科技;2011年12期
相關(guān)會(huì)議論文 前3條
1 羅會(huì)平;覃團(tuán)發(fā);劉家鋒;;基于自適應(yīng)協(xié)作發(fā)送協(xié)議的中斷概率分析[A];中國(guó)電子學(xué)會(huì)第十五屆信息論學(xué)術(shù)年會(huì)暨第一屆全國(guó)網(wǎng)絡(luò)編碼學(xué)術(shù)年會(huì)論文集(下冊(cè))[C];2008年
2 蔡躍明;楊煒偉;王智林;;基于中繼選擇的差分放大轉(zhuǎn)發(fā)傳輸系統(tǒng)性能分析[A];2010年通信理論與信號(hào)處理學(xué)術(shù)年會(huì)論文集[C];2010年
3 燕鋒;許波;沈連豐;;基于TD-SCDMA的Ad hoc網(wǎng)絡(luò)性能分析[A];中國(guó)通信學(xué)會(huì)第五屆學(xué)術(shù)年會(huì)論文集[C];2008年
相關(guān)博士學(xué)位論文 前10條
1 胡雨佳;多天線選擇系統(tǒng)保密中斷概率研究[D];北京郵電大學(xué);2015年
2 周佳;多天線雙向中繼網(wǎng)絡(luò)傳輸性能研究[D];北京郵電大學(xué);2015年
3 張沉思;高效低復(fù)雜度的雙向放大轉(zhuǎn)發(fā)中繼傳輸技術(shù)研究[D];西安電子科技大學(xué);2015年
4 蘇玉萍;無(wú)線中繼通信系統(tǒng)的可達(dá)速率區(qū)域及中斷性能研究[D];西安電子科技大學(xué);2015年
5 倪藝洋;基于移動(dòng)中繼的端到端傳輸技術(shù)與性能研究[D];南京郵電大學(xué);2016年
6 袁福;協(xié)作認(rèn)知中繼網(wǎng)絡(luò)中的資源管理及中斷概率研究[D];國(guó)防科學(xué)技術(shù)大學(xué);2013年
7 杜冠瑤;無(wú)線協(xié)作中繼網(wǎng)絡(luò)的資源分配和信息能量同傳技術(shù)的研究[D];北京交通大學(xué);2015年
8 吉曉東;多用戶(hù)協(xié)作通信中的雙向中繼技術(shù)研究[D];南京郵電大學(xué);2012年
9 劉陽(yáng);基于中繼協(xié)作的認(rèn)知無(wú)線網(wǎng)絡(luò)資源管理研究[D];北京郵電大學(xué);2012年
10 代澤洋;認(rèn)知無(wú)線網(wǎng)絡(luò)中的協(xié)作傳輸技術(shù)研究[D];電子科技大學(xué);2013年
相關(guān)碩士學(xué)位論文 前10條
1 張融;認(rèn)知中繼網(wǎng)絡(luò)的性能分析[D];西安電子科技大學(xué);2014年
2 許悅;基于干擾管理的家庭基站資源分配算法研究[D];南京郵電大學(xué);2015年
3 魏素盼;LTE網(wǎng)絡(luò)下D2D通信系統(tǒng)干擾抑制技術(shù)的研究[D];蘭州理工大學(xué);2016年
4 程騰飛;多帶蜂窩網(wǎng)中D2D中繼通信的中斷性能研究[D];南京郵電大學(xué);2016年
5 陳蕾;衰落環(huán)境下無(wú)線認(rèn)知中繼網(wǎng)絡(luò)傳輸性能與物理層安全研究[D];揚(yáng)州大學(xué);2016年
6 李延;基于中斷概率的無(wú)線協(xié)作中繼選擇算法研究[D];河北大學(xué);2016年
7 余洋;基于壓縮轉(zhuǎn)發(fā)協(xié)議的全雙工無(wú)線中繼網(wǎng)絡(luò)性能分析[D];重慶大學(xué);2016年
8 錢(qián)濤;平流層協(xié)同通信系統(tǒng)譯碼轉(zhuǎn)發(fā)中斷性能分析[D];國(guó)防科學(xué)技術(shù)大學(xué);2014年
9 黃少松;協(xié)作中繼通信系統(tǒng)的性能及能量收集技術(shù)的研究[D];西安電子科技大學(xué);2015年
10 蔣靜;協(xié)作通信中繼協(xié)議及最優(yōu)中繼選擇策略研究[D];杭州電子科技大學(xué);2016年
,本文編號(hào):2403911
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2403911.html