计算机科学 ›› 2017, Vol. 44 ›› Issue (9): 172-177.doi: 10.11896/j.issn.1002-137X.2017.09.033

• 信息安全 • 上一篇    下一篇

一种全双工认知中继网络中实现能量高效的安全传输方法

张培,张建明,王良民   

  1. 江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(61272074,U1405255)资助

Design for Improving Energy-efficiency and Ensuring Physical-layer Security in Full-duplex Cognitive Relay Networks

ZHANG Pei, ZHANG Jian-ming and WANG Liang-min   

  • Online:2018-11-13 Published:2018-11-13

摘要: 在“绿色”安全通信背景下,提出了一种保证同时同频全双工认知中继网络物理层安全、不影响主用户性能且能量高效的中继簇功率分配方案,该网络包含两个认知源节点、多个认知中继节点、多个主用户节点以及多个主用户窃听节点。在考虑了自干扰消除率以及中继转发信息的公平性的基础上,分别针对中继节点选择放大转发与译码转发策略的情形,设计协作波束成形向量及人工噪声矩阵,并通过一种结合半定松弛技术的爬山算法来获取最优解。仿真结果与理论分析表明了方案的有效性与合理性,同时表明选择放大转发策略能够获取更高的总能量效率。

关键词: 绿色通信,物理层安全,认知中继网络,能量效率,同时同频全双工,半定松弛

Abstract: Under the “green” and secure communication background,we studied the co-time co-frequency full-duplex cognitive relay networks consisting of two secondary source nodes,multiple cognitive relay nodes,multiple primary nodes and multiple primary eavesdroppers.To improve the total energy efficiency on the premise of ensuring the physical-layer security and the primary node’s performance whether the selection relay protocol is the amplify-and-forward or decode-and-forward,we proposed the power allocation schemes to obtain a cooperative beamforming coefficient and an artificial noise matrix after taking both self-cancellation and forwarding fairness into consideration.It is mainly optimized by the “hill climbing” algorithm that combines the semidefinite relaxation (SDR) technology.Simulation results and theoretical analysis show the effectiveness and rationality of our scheme.Moreover,the choice of amplify-and-forward relay protocol contributes to the higher total energy efficiency.

Key words: Green communication,Physical-layer security,Cognitive relay networks,Energy-efficiency,Co-time co-frequency full-duplex,SDR

[1] CHEN Y,ZHANG S,XU S,et al.Fundamental trade-offs on green wireless networks[J].IEEE Communications Magazine,2011,49(6):30-37.
[2] NOSRATINIA A,HUNTER T E,Hedayat A.Cooperative com-munication in wireless networks[J].IEEE Communications Magazine,2004,42(10):74-80.
[3] HAYKIN S.Cognitive radio:brain-empowered wireless communications[J].IEEE Journal on Selected Areas in Communications,2005,23(2):201-220.
[4] ZHANG D D,WANG X,ZHANG Z S.Key techniques research on full duplex wireless communications[J].Science in China Series F:Information Science,2014,4(8):951-964.(in Chinese) 张丹丹,王兴,张中山.全双工通信关键技术研究[J].中国科学:信息科学,2014,4(8):951-964.
[5] COVER T,GAMAL A E L.Capacity theorems for the relay channel[J].IEEE Transactions on Information Theory,1979,25(5):572-584.
[6] WANG Q H,WANG H M,YIN Q Y.Distributed beamforming for multi-relay cognitive radio systems[J].Science in China Series F:Information Sciences,2014,44(8):980-992.(in Chinese) 王群欢,王慧明,殷勤业.认知无线电系统中的多中继分布式波束成形方法[J].中国科学:信息科学,2014,44(8):980-992.
[7] LI Y,SUN L,ZHAO C,et al.A digital self-interference cancellation algorithm based on spectral estimation in co-time co-frequency full duplex system[C]∥2015 10th International Confe-rence on Computer Science & Education (ICCSE).IEEE,2015:412-415.
[8] MUKHERJEE A,FAKOORIAN S A A,HUANG J,et al.Principles of physical layer security in multiuser wireless networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(3):1550-1573.
[9] LI L,HUANG C,CHEN Z.Cooperative secrecy beamforming in wiretap interference channels[J].IEEE Signal Processing Letters,2015,22(12):2435-2439.
[10] GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[11] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure decode-and-forward two-way relay networks[C]∥IEEE International Conference Proc.of communications (ICC).2011.
[12] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure two-way relay networks[J].IEEE Transactions on Information Forensics and Security,2012,7(1):310-320.
[13] FRAGKIADAKIS A G,TRAGOS E Z,A SKOXYLAKIS I G.A survey on security threats and detection techniques in cognitive radio networks[J].IEEE Communications Surveys & Tutorials,2013,15(1):428-445.
[14] PEI Y,LIANG Y C,ZHANG L,et al.Secure communicationover MISO cognitive radio channels[J].IEEE Transactions on Wireless Communications,2010,9(4):1494-1502.
[15] PEI Y,LIANG Y C,TEH K C,et al.Secure communication in multiantenna cognitive radio networks with imperfect channel state information[J].IEEE Transactions on Signal Processing,2011,59(4):1683-1693.
[16] WANG C,WANG H M.On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1814-1827.
[17] ALAVI F,SAEEDI H.Radio resource allocation to providephysical layer security in relay-assisted cognitive radio networks[J].IET Communications,2015,9(17):2124-2130.
[18] ZOU Y,ZHU J,YANG L,et al.Securing physical-layer communications for cognitive radio networks[J].IEEE Communications Magazine,2015,53(9):48-54.
[19] ZHU F,YAO M.Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming[J].IEEE Tran-sactions on Vehicular Technology,2016,65(3):1835-1841.
[20] LUO Z Q,MA W,SO A M C,et al.Semidefinite relaxation of quadratic optimization problems[J].IEEE Signal Processing Magazine,2010,27(3):20.
[21] GRANT M,BOYD S,YE Y.CVX:Matlab software for disci-plined convex programming[J].Golbal Optimization,2008:155-210.
[22] SIDIROPOULOS N D,DAVIDSON T N,L UO Z Q.Transmit beamforming for physical-layer multicasting[J].IEEE Transactions on Signal Processing,2006,54(6):2239-2251.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!