基于解码转发协议的认知中继网络物理层安全研究与应用
[Abstract]:The cooperative communication network and cognitive radio are combined into a new cognitive relay network, which can not only achieve spectrum sharing, improve spectrum efficiency, but also widen the wireless coverage area and achieve hierarchical gain. In cooperative communication, decoding and forwarding technology is one of the important means to transmit signals. In addition, in order to ensure the reliability of the data transmission, the physical layer is used to provide the transmission path to the terminal equipment in the communication system. However, due to the openness and broadcast of wireless communication, information transmission is vulnerable to eavesdropping and interference. Therefore, it is of great significance to study the security performance of cognitive relay networks in the physical layer under decoding and forwarding protocols. In this paper, the security performance of three different decoding and forwarding cognitive relay network systems is studied, and the practical application of the network model is analyzed based on the common cell communication environment. Some results obtained are as follows: firstly, the security performance of the system under the maximum relay selection scheme is studied in two-hop multi-relay decoding and forwarding cognitive networks. Specifically, considering the existence of direct link, the selective combining technique is used in the signal receiver. In addition, when all transmitting nodes transmit signals, their transmission power is interfered with by authorized users. Every transmission of information can be eavesdropped by eavesdroppers. Considering that all channels experience Rayleigh weakness, the probability of security outage and non-zero security capacity are obtained. Furthermore, the asymptotic expression of the security interruption probability in high SNR is obtained to evaluate the security performance of the system. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results can be used to optimize and design relay selection schemes in cognitive relay networks. Secondly, in multi-hop decoding forwarding cognitive relay networks, the security performance of the system is based on the consideration that the main channel transmitting node is multiple antennas and the eavesdropper is a single antenna. In particular, the transmission power is affected by the interference temperature of the cognitive user receiver when the relay transmits information with a single antenna, and the selection and combination technique is used at the multiple receiving antennas of the relay and the signal receiver. Moreover, eavesdroppers can eavesdrop on every hop of information. In multi-hop system, the whole system will be interrupted as long as any one-hop information transmission is interrupted. It is considered that all channels experience Nakagami-m debilitating, and the same primary channel, eavesdropping channel, and interference channel are independent and distributed. The security interrupt probability of the system is derived. The effects of relay number antenna number and Nakagami-m attenuation factor on the system security interrupt probability and the influence of relay number and antenna number on the non-zero safe capacity probability are analyzed. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results can be used to optimize the applications of multi-hop transmission schemes in cognitive relay networks. Finally, the performance of the system in the presence of co-channel interference is studied by considering that both relay and multiple users are affected by co-channel interference at the same time. In particular, the opportunistic user selects the best user. All transmit nodes are equipped with a single antenna, and the transmit power is affected by the interference of the authorized user receiver when transmitting the signal. Considering that all channels are subjected to Rayleigh debilitating, the closed form of the security interrupt probability is derived under the system model. The accuracy of the analysis is obtained by comparing the numerical results with the simulation results. The results are helpful to the optimization and design of cognitive relay networks with cochannel interference.
【学位授予单位】:扬州大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN925
【相似文献】
相关期刊论文 前10条
1 惠擑;李维勤;吴亚丽;;有限反馈机会中继通信系统的中断概率性能[J];电子与信息学报;2012年08期
2 洪浩;肖立民;闫阳;王京;;译码转发认知双向中继网络的中断概率[J];清华大学学报(自然科学版);2013年11期
3 赵诗琴;杜荣;李剑;李生红;;基于干扰建模的通信中断概率分析[J];计算机工程;2013年07期
4 王俊波;王金元;林敏;陈明;;分布式天线系统中的系统上行中断概率分析[J];电子与信息学报;2011年05期
5 孙立悦;赵晓晖;虢明;;基于中断概率的协作通信中继选择与功率分配算法[J];通信学报;2013年10期
6 嵇建波;唐晓辉;;认知选择协同分集任意信噪比中断概率的分析[J];电讯技术;2009年07期
7 洪路峰;杨晓非;刘占军;;基于中断概率的协作伙伴选择策略[J];广东通信技术;2010年02期
8 刘磊;汤滟;;无线传感网两种中继选择策略的中断概率分析[J];现代电子技术;2010年21期
9 季彦呈;葛建华;李靖;师晓晔;;增强型编码双向中继方案及中断概率分析[J];电子与信息学报;2011年01期
10 冉杰;王羽莹;;两跳单节点选择增量中继系统及其中断概率研究[J];现代电信科技;2011年12期
相关会议论文 前3条
1 罗会平;覃团发;刘家锋;;基于自适应协作发送协议的中断概率分析[A];中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集(下册)[C];2008年
2 蔡跃明;杨炜伟;王智林;;基于中继选择的差分放大转发传输系统性能分析[A];2010年通信理论与信号处理学术年会论文集[C];2010年
3 燕锋;许波;沈连丰;;基于TD-SCDMA的Ad hoc网络性能分析[A];中国通信学会第五届学术年会论文集[C];2008年
相关博士学位论文 前10条
1 胡雨佳;多天线选择系统保密中断概率研究[D];北京邮电大学;2015年
2 周佳;多天线双向中继网络传输性能研究[D];北京邮电大学;2015年
3 张沉思;高效低复杂度的双向放大转发中继传输技术研究[D];西安电子科技大学;2015年
4 苏玉萍;无线中继通信系统的可达速率区域及中断性能研究[D];西安电子科技大学;2015年
5 倪艺洋;基于移动中继的端到端传输技术与性能研究[D];南京邮电大学;2016年
6 袁福;协作认知中继网络中的资源管理及中断概率研究[D];国防科学技术大学;2013年
7 杜冠瑶;无线协作中继网络的资源分配和信息能量同传技术的研究[D];北京交通大学;2015年
8 吉晓东;多用户协作通信中的双向中继技术研究[D];南京邮电大学;2012年
9 刘阳;基于中继协作的认知无线网络资源管理研究[D];北京邮电大学;2012年
10 代泽洋;认知无线网络中的协作传输技术研究[D];电子科技大学;2013年
相关硕士学位论文 前10条
1 张融;认知中继网络的性能分析[D];西安电子科技大学;2014年
2 许悦;基于干扰管理的家庭基站资源分配算法研究[D];南京邮电大学;2015年
3 魏素盼;LTE网络下D2D通信系统干扰抑制技术的研究[D];兰州理工大学;2016年
4 程腾飞;多带蜂窝网中D2D中继通信的中断性能研究[D];南京邮电大学;2016年
5 陈蕾;衰落环境下无线认知中继网络传输性能与物理层安全研究[D];扬州大学;2016年
6 李延;基于中断概率的无线协作中继选择算法研究[D];河北大学;2016年
7 余洋;基于压缩转发协议的全双工无线中继网络性能分析[D];重庆大学;2016年
8 钱涛;平流层协同通信系统译码转发中断性能分析[D];国防科学技术大学;2014年
9 黄少松;协作中继通信系统的性能及能量收集技术的研究[D];西安电子科技大学;2015年
10 蒋静;协作通信中继协议及最优中继选择策略研究[D];杭州电子科技大学;2016年
,本文编号:2403911
本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2403911.html