Nakagami信道下MIMO解碼轉(zhuǎn)發(fā)中繼系統(tǒng)的安全性能分析
doi: 10.11999/JEIT151236
-
2.
(華僑大學(xué)廈門(mén)市移動(dòng)多媒體通信重點(diǎn)實(shí)驗(yàn)室 廈門(mén) 361021)
國(guó)家自然科學(xué)基金(61401165, 61362018, 61302095),福建省自然科學(xué)基金(2015J01262, 2014J01243),福建省科技創(chuàng)新平臺(tái)建設(shè)項(xiàng)目(2012H2002)
Secrecy Performance Analysis of MIMO Decode-and-forward Relay Systems in Nakagami Channels
-
2.
(Ximen Key Laboratory of Mobile Multimedia Communications, Huaqiao University, Xiamen 361021, China)
The National Natural Science Foundation of China (61401165, 61362018, 61302095), The Natural Science Foundation of Fujian Province (2015J01262, 2014J01243), Science and Technology Innovation Platform Funds of Fujian Province (2012H2002)
-
摘要: 在協(xié)同自適應(yīng)解碼轉(zhuǎn)發(fā)中繼系統(tǒng)中,該文針對(duì)Nakagami-m衰落信道,研究了基于多天線低復(fù)雜度的機(jī)會(huì)式傳輸策略的物理層安全性能。為充分利用天線分集增益提升系統(tǒng)安全性能,發(fā)送節(jié)點(diǎn)均采用發(fā)送天線選擇策略,接收節(jié)點(diǎn)均采用最大比合并策略。推導(dǎo)了系統(tǒng)安全中斷概率的閉合表達(dá)式,并進(jìn)一步提供了漸近性能分析,得到了系統(tǒng)的安全分集階數(shù)。仿真結(jié)果驗(yàn)證了理論分析的正確性,并揭示了各系統(tǒng)參數(shù)對(duì)機(jī)會(huì)式傳輸方案的安全性能的影響。結(jié)果表明,通過(guò)增加合法節(jié)點(diǎn)的天線數(shù)和增大合法信道的Nakagami衰落信道參數(shù)可顯著提升系統(tǒng)安全性能。
-
關(guān)鍵詞:
- 無(wú)線通信 /
- 物理層安全 /
- 自適應(yīng)解碼轉(zhuǎn)發(fā) /
- Nakagami-m衰落信道 /
- 安全中斷概率
Abstract: The physical layer security performances of low-complexity opportunistic transmission strategy based on multiple antenna are investigated for cooperative adaptive decode-and-forward relaying system in Nakagami-m fading channels. To fully utilize the antenna diversity gain to improve the system security performance, the transmitting nodes apply the transmit antenna selection strategy, and the receiving nodes apply the maximal ratio combining strategy. The closed-form expressions of secrecy outage probability are derived, the asymptotic analysis of secrecy performance is further provided, and the secrecy diversity order are also obtained. Simulation results verify the correctness of theoretical analysis and identify the effects of several system parameters on the secrecy performance of the opportunistic transmission strategy. It is shown that the system secrecy performance can be greatly improved by increasing the number of antennas at the legitimate nodes and increasing the Nakagami fading channel parameters of legitimate channels. -
WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. LAI L and El GAMAL H. Cooperative secrecy: the relay- eavesdropper channel[C]. Proceedings of IEEE International Symposium on Information Theory, Nice, 2007: 931-935. doi: 10.1109/ISIT.2007.4557343. SHRESTHA A P and KWAK K S. Secure opportunistic scheduling with transmit antenna selection[C]. Proceedings of IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), London, 2013: 461-465. doi: 10.1109/PIMRC.2013.6666180. LANEMAN J N, TSE D N C, and WORNELL G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080. doi: 10.1109/TIT.2004. 838089. WANG L, ELKASHLAN M, HUANG J, et al. Secure transmission with antenna selection in MIMO Nakagami-m fading channels[J]. IEEE Transactions on Wireless Communications, 2014, 13(11): 6054-6067. doi: 10.1109/ TWC.2014.2359877. YEOH P L, ELKASHLAN M, DUONG T Q, et al. Transmit antenna selection for interference management in cognitive relay networks[J]. IEEE Transactions on Vehicular Technology, 2014, 63(7): 3250-3262. doi: 10.1109/TVT.2014. 2298387. YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transactions on Communications, 2013, 61(1): 144-154. doi: 10.1109/TCOMM.2012.12.110670. YANG N, ELKASHLAN M, YEOH P L, et al. Multiuser MIMO relay networks in Nakagami-m fading channels[J]. IEEE Transactions on Communications, 2012, 60(11): 3298-3310. doi: 10.1109/TCOMM.2012.081412.110463. DUONG T Q, BAO V N Q, and ZEPERNICK H J. On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels[J]. IEEE Communications Letters, 2009, 13(3): 172-174. doi: 10.1109/LCOMM.2009. 081858. IKKI S S and AHMED M H. Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection[J]. IEEE Transactions on Communications, 2010, 58(1): 68-72. doi: 10.1109/TCOMM. 2010.01.080080. HUANG J and SWINDLEHURST A L. Cooperative jamming for secure communications in MIMO relay networks [J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884. doi: 10.1109/TSP.2011.2161295. CHEN X, LEI L, ZHANG H, et al. Large-scale MIMO relaying techniques for physical layer security: AF or DF?[J]. IEEE Transactions on Wireless Communications, 2015, 14(9): 5135-5146. doi: 10.1109/TWC.2015.2433291. ALVES H, BRANTE G, SOUZA R D, et al. On the performance of secure full-duplex relaying under composite fading channels[J]. IEEE Signal Processing Letters, 2015, 22(7): 867-870. doi: 10.1109/LSP.2014.2374994. ZOU Y, WANG X, and SHEN W. Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(10): 2099-2111. doi: 10.1109/JSAC.2013.131011. WU N E and LI H J. Effect of feedback delay on secure cooperative networks with joint relay and jammer selection[J]. IEEE Wireless Communications Letters, 2013, 2(4): 415-418. doi: 10.1109/WCL.2013.051513.130110. GRADSHTEYN I S and RYZHIK I M. Table of Integrals, Series, and Products[M]. New York: Academic Press, 2007: 1-1161. -
計(jì)量
- 文章訪問(wèn)數(shù): 1366
- HTML全文瀏覽量: 125
- PDF下載量: 475
- 被引次數(shù): 0