认知协作中继通信中的安全机制研究
本文选题:认知协作网络 + 物理层安全 ; 参考:《东南大学》2017年博士论文
【摘要】:认知协作通信技术在提高无线频谱资源利用率的同时,可以有效改善无线通信质量。然而,相关研究发现认知协作通信网络中存在大量的非法通讯行为,如恶意攻击、恶意窃听和数据伪造等。这些非法行为不仅给人们日常生活和社会稳定造成巨大威胁,还给社会造成巨额经济损失。因此,提高无线传输的安全性成为认知协作通信中一个新的关键技术课题,需要引起更多的研究关注。本学位论文深入研究了认知协作通信网络场景下无线传输的安全问题,利用物理层安全技术来提高无线传输的安全性能,主要包括:针对单向解码转发中继通信场景中存在的窃听行为,研究如何提高无线传输的安全性能;针对双向解码转发中继通信场景中存在的窃听行为,研究如何提高无线传输的窃听概率与中断概率性能;针对非理想CSI时单向解码转发中继通信场景中存在的窃听行为,研究如何提高无线传输的安全性能;存在主用户频谱占用情况检测错误时,针对单向放大转发中继通信场景中存在的窃听行为,研究如何提高认知协作网络防窃听的能力。论文的主要研究成果如下:1.针对单向解码转发中继通信场景中存在的窃听行为,提出了一种面向安全速率最大化目标的中继选择方案。该方案从多个中继节点中选出安全速率最大的中继节点,被选择的中继节点会被用于将接收到的信息转发给目的节点。考虑到可能存在多个能成功译码源节点所传输信息的中继节点,进一步提出了一种多中继选择方案。在此方案中,能成功译码源节点所传输信息的中继节点会被全部用于将译码后的信息转发给目的节点。此外,在瑞利衰落信道环境下,分别分析了所提两种方案的零安全容量概率。为了利用传统最大最小中继选择方案与所提两种方案进行性能对比,也分析了该方案的零安全容量概率。分析结果表明,所提两种方案比传统最大最小中继选择方案更有效地对抗窃听节点的恶意窃听。此外,中继节点数目增加时,所提两种方案的零安全容量概率都随之显著降低。2.针对双向解码转发中继通信场景中存在的窃听行为,提出了一种以人工噪声信号为辅助的双向中继选择方案。在所提方案中,源节点被灵活用于传输人工噪声信号,以干扰窃听节点恶意窃听。具体来说,一个源节点在传输信息给中继节点时,另外一个源节点会同时传输人工噪声信号。此外,在瑞利衰落信道环境下,分析了所提方案的窃听概率和中断概率性能。分析结果表明,窃听概率会随着中断概率的降低而增加。与此相反,当中断概率增加时,窃听概率会随之降低。给定中断概率时,所提方案能获得较低的窃听概率。此外,在主信道平均增益与窃听信道平均增益比较低时,所提方案也能够确保认知协作通信网络上无线传输的信息安全。3.针对非理想CSI时单向解码转发中继通信场景中存在的窃听行为,提出了一种结合信道估计误差的中继选择方案。此方案会从多个中继节点中选择瞬时信道容量最大的中继节点,并将被选择的中继节点用于将接收到的源节点信息转发给目的节点。在瑞利衰落信道环境下,为了利用传统直传方案与所提方案进行性能比较,同时分析了所提方案和直传方案的中断概率和窃听概率性能。分析结果表明,无线传输的中断概率要求降低时,窃听概率会随之增加;无线传输的中断概率要求提高时,窃听概率会随之降低。此外给定中断概率时,所提方案能比直传方案取得更低的窃听概率。4.存在主用户频谱占用情况检测错误时,针对单向放大转发中继通信场景中存在的窃听行为,提出了一种基于全局信道状态信息的中继选择方案。在所提方案中,主信道容量与窃听信道容量差最大的中继节点将会被选择用于将接收到的信息转发给目的节点。该方案不仅考虑了主信道的瞬时CSI,还包含了窃听信道的瞬时CSI。考虑到窃听信道的瞬时CSI不容易被获得,进一步提出了基于局部信道状态信息的中继选择方案。此方案只包含了主信道的瞬时CSI。在瑞利衰落信道环境下,分别分析了所提两种方案的零安全容量概率。为了利用传统轮询调度方案进行性能比较,也分析了该方案的零安全容量概率。分析结果表明,所提两种方案都能比传统轮询调度方案更有效地提高无线传输的安全性能。
[Abstract]:Cognitive cooperative communication technology can improve the utilization of radio spectrum resources and improve the quality of wireless communication. However, there are a lot of illegal communication behaviors in the cognitive cooperative communication network, such as malicious attack, malicious eavesdropping, and data forgery. These illegal behaviors not only give people daily life and social stability. Therefore, improving the security of wireless transmission has become a new key technology topic in the cognitive cooperative communication. It needs to attract more attention. This dissertation deeply studies the security problem of wireless transmission in the scene of cognitive cooperative communication network, and uses physical layer security. The whole technology improves the security performance of wireless transmission, mainly including the eavesdropping behavior in the one-way decoding and forwarding relay communication scene, research how to improve the security performance of wireless transmission, and study how to improve the eavesdropping probability and the interruption probability of the wireless transmission by the eavesdropping behavior in the two-way decoded relay communication scene. Performance; in view of the eavesdropping behavior in the non ideal CSI one-way decoding and forwarding relay communication scene, this paper studies how to improve the security performance of the wireless transmission. When the main user's spectrum occupancy detection is wrong, it studies how to improve the cognitive collaboration network anti eavesdropping against the eavesdropping line in the one-way amplifying and forwarding relay communication scene. The main research results of this paper are as follows: 1. in view of the eavesdropping behavior in the one-way decoding and forwarding relay communication scene, a relay selection scheme for maximizing the security rate is proposed. The scheme selects the relay node with the maximum security rate from multiple relay nodes, and the selected relay node will be used to receive the receiver. The incoming information is forwarded to the destination node. A multiple relay selection scheme is proposed, taking into account the relay nodes that may have multiple successful decode source nodes. In this scheme, the relay node that can successfully decode the information transmitted by the source node will be all used to forward the encoded information to the destination node. In the environment of Rayleigh fading channel, the zero security capacity probability of the two proposed schemes is analyzed respectively. In order to compare the performance of the traditional maximum minimum relay selection scheme with the two proposed schemes, the zero security capacity probability of the proposed scheme is also analyzed. The analysis results show that the two proposed schemes are compared with the traditional maximum and minimum relay selection. The case is more effective against the malicious eavesdropping of the eavesdropping node. In addition, when the number of relay nodes is increased, the zero security capacity probability of the two proposed schemes significantly reduces the eavesdropping behavior of the.2. for the two-way decoding and forwarding relay communication scene. A two-way relay selection scheme is proposed with the assistance of artificial noise signals. In the scheme, the source nodes are flexibly used to transmit artificial noise signals to interfere with the malicious eavesdropping of the eavesdropping nodes. In particular, a source node transmits artificial noise at the same time when transmitting information to the relay node. In addition, the hacking probability and the interruption probability of the proposed scheme are analyzed in the Rayleigh fading channel environment. The analysis results show that the probability of eavesdropping will increase with the decrease of the interruption probability. On the contrary, when the probability of interruption increases, the probability of eavesdropping will be reduced. The proposed scheme can obtain a lower probability of eavesdropping when given a given interruption probability. In addition, the proposed scheme can also be proposed when the average gain of the main channel is lower than the average gain of the eavesdropping channel. In order to ensure that the information security of the wireless transmission on the cognitive cooperative communication network is directed against the eavesdropping behavior in the one-way decoding and forwarding relay communication scene with non ideal CSI, a relay selection scheme combining the channel estimation error is proposed. This scheme selects the relay node with the maximum instantaneous channel capacity from multiple relay nodes, and will be.3.. The selected relay node is used to transmit the received source node information to the destination node. In the Rayleigh fading channel environment, in order to compare the performance of the traditional direct transmission scheme with the proposed scheme, the interruption probability and the eavesdropping probability performance of the proposed scheme and the direct transmission scheme are analyzed. The analysis results show that the interruption probability of the wireless transmission is presented. When the rate of rate is reduced, the probability of eavesdropping will increase, and the probability of eavesdropping will be reduced when the interrupt probability of wireless transmission is raised. In addition, the proposed scheme can obtain a lower probability of eavesdropping than the direct transmission scheme. When there is a detection error in the frequency occupancy of the main user, the.4. has a one-way amplification of the relay communication scene. A relay selection scheme based on the global channel state information is proposed. In the proposed scheme, the relay node with the maximum capacity of the main channel capacity and the capacity difference of the eavesdropping channel will be selected to forward the received information to the destination node. The scheme not only takes into account the instantaneous CSI of the main channel, but also contains the eavesdropping. The instantaneous CSI. of the channel is not easily obtained when the instantaneous CSI of the eavesdropping channel is not easy to be obtained. The relay selection scheme based on the local channel state information is further proposed. This scheme only contains the instantaneous CSI. of the main channel in the Rayleigh fading channel environment, and analyzes the zero security capacity probability of the proposed two schemes respectively. The performance of the scheduling scheme is compared and the zero security capacity probability of the scheme is analyzed. The analysis results show that the two proposed schemes can improve the security performance of the wireless transmission more effectively than the traditional polling scheduling scheme.
【学位授予单位】:东南大学
【学位级别】:博士
【学位授予年份】:2017
【分类号】:TN918;TN92
【相似文献】
相关期刊论文 前10条
1 王旭;肖金超;;第二十四章 工业无线网络中继节点部署问题研究[J];仪器仪表标准化与计量;2010年06期
2 蔡融文;孙恩昌;张延华;;一种改进的中继节点选择方案[J];中国电子科学研究院学报;2013年01期
3 刘洪;任术波;项海格;;中继节点随机均匀分布的机会中继[J];信号处理;2011年04期
4 王翥;魏德宝;;贪婪寻优算法在中继节点布局中的应用[J];仪表技术与传感器;2011年05期
5 曾斌;魏军;姚路;;传感器网络中继节点扩展部署的优化算法研究[J];通信学报;2012年04期
6 江帆;王本超;;中继蜂窝网中基于负载均衡的中继节点选择算法[J];电讯技术;2011年10期
7 陈纯锴;谢红;;改进的协作中继节点选择策略[J];哈尔滨工程大学学报;2012年02期
8 赵海;彭海霞;朱剑;李大舟;;基于组确认机制的车联网中最佳中继节点的选择[J];东北大学学报(自然科学版);2013年01期
9 黄健文;倪卫明;;一种通过加入中继节点以修复大面积网络损坏的能量均衡算法[J];微型电脑应用;2013年04期
10 周涛;邢凯;刘刚;谷天波;黄刘生;;利用协作通信的中继节点放置问题研究[J];小型微型计算机系统;2013年11期
相关会议论文 前4条
1 李雷;付东阳;李艳辉;;基于中继节点的无线传感器网络分簇路由算法[A];2009年通信理论与信号处理学术年会论文集[C];2009年
2 王翥;佟晓筠;王玲;魏德宝;;贪婪寻优算法在WSN中继节点布局中的应用[A];第九届全国信息获取与处理学术会议论文集Ⅰ[C];2011年
3 刘家锋;覃团发;罗建中;;基于协作通信的中继节点数与编码速率对中断概率的影响分析[A];2009年中国高校通信类院系学术研讨会论文集[C];2009年
4 苏亮;;无线协作中继技术综述[A];四川省通信学会2012年学术年会论文集[C];2012年
相关博士学位论文 前10条
1 曹傧;协作通信中的中继节点选取和传输机制研究[D];电子科技大学;2014年
2 苗婷莛;高效率中继技术的研究[D];北京邮电大学;2015年
3 王秀峰;车联网中V2V多跳广播关键技术研究[D];哈尔滨工业大学;2015年
4 丁晓进;认知协作中继通信中的安全机制研究[D];东南大学;2017年
5 刘刚;无线协作网络的中继节点选择问题研究[D];中国科学技术大学;2013年
6 佘家驹;信号空间对齐在双向中继网络中的研究[D];北京邮电大学;2013年
7 陈智勇;无线双向中继网络的研究[D];北京邮电大学;2011年
8 刘毅;未来移动通信系统中的协作传输技术研究[D];北京邮电大学;2010年
9 胡洁;无线网络的中继选择策略研究[D];华南理工大学;2012年
10 黄双林;无线协作中继策略和资源分配方法研究[D];华中科技大学;2012年
相关硕士学位论文 前10条
1 林达广;无线传感器网络最小中继节点布置问题研究[D];深圳大学;2015年
2 周小欢;避免隐藏节点带宽冲突的中继节点选择研究[D];华中师范大学;2015年
3 胡少领;基于动态门限的中继节点选择算法研究[D];哈尔滨工业大学;2015年
4 王乔翊;认知无线网络多中继虚拟MIMO传输技术研究[D];北京邮电大学;2015年
5 张云婷;协作通信中继选择方案设计与分析[D];南京邮电大学;2015年
6 潘燕杰;基于OFDM的全双工协作网络资源分配方法研究[D];浙江大学;2016年
7 刘琨;基于能量效率的无线网络协作通信技术研究[D];东南大学;2015年
8 李爱丽;稀疏机会网络中固定中继节点部署策略研究[D];内蒙古大学;2016年
9 乐人铭;基于协同通信的自适应中继节点选择算法研究[D];云南大学;2016年
10 吴德恩;传感网中分区的连通优化研究[D];江南大学;2016年
,本文编号:1924019
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/1924019.html