認(rèn)知無(wú)線電非正交多址接入隨機(jī)網(wǎng)絡(luò)物理層安全性能分析
doi: 10.11999/JEIT190049
-
陸軍工程大學(xué) 南京 210007
Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network
-
The Army Engineering University of PLA, Nanjing 210007, China
-
摘要:
該文針對(duì)干擾源以及竊聽(tīng)節(jié)點(diǎn)均隨機(jī)分布的通信場(chǎng)景,分析了認(rèn)知無(wú)線電啟發(fā)式非正交多址接入(CR-NOMA)網(wǎng)絡(luò)中次用戶(hù)通信對(duì)的安全通信性能。采用隨機(jī)幾何理論,將竊聽(tīng)節(jié)點(diǎn)和干擾節(jié)點(diǎn)建模為服從特定分布的齊次泊松點(diǎn)過(guò)程(PPP)。首先,在保證主用戶(hù)通信對(duì)通信可靠性的前提下,得到了發(fā)端設(shè)定的功率分配系數(shù),進(jìn)一步得到了次用戶(hù)通信對(duì)的連接中斷概率和安全中斷概率的閉式表達(dá)式。隨后,得到了功率分配系數(shù)隨主用戶(hù)可靠性能約束的變化規(guī)律。最后,研究了次用戶(hù)對(duì)的中斷概率隨著竊聽(tīng)節(jié)點(diǎn)密度、發(fā)端發(fā)送功率的變化情況,結(jié)果表明干擾信號(hào)的增強(qiáng)在降低網(wǎng)絡(luò)可靠性能的同時(shí),換來(lái)了安全性能的提高。仿真結(jié)果驗(yàn)證了理論分析的正確性。
-
關(guān)鍵詞:
- 認(rèn)知無(wú)線電 /
- 物理層安全 /
- 啟發(fā)式非正交多址接入 /
- 隨機(jī)分布 /
- 功率分配
Abstract:This paper analyzes the security communication performance of secondary user communication pairs in Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) networks, where interference sources and eavesdropping nodes are randomly distributed. The stochastic geometry theory is used to model the eavesdropping nodes and the interfering nodes as a homogeneous Poisson Point Processes (PPP). Firstly, to ensure the reliability of the primary user communication pairs, the power allocation coefficient set of the sender is obtained, and the closed expressions of the connection outage probability and the secrecy outage probability of the secondary user are further obtained. Then, the variation of the power distribution coefficient with the constraint of the primary user’s reliability is analyzed. Finally, the relationship between outage probability of secondary user communication pairs and the density of the eavesdropping nodes and the transmission power is studied. The research shows that the enhancement of interfering signal reduces the reliability of the system, but brings about a significant improvement of security performance. The simulation results verify the correctness of the theoretical analysis.
-
YANG Nan, WANG Lifeng, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20–27. doi: 10.1109/MCOM.2015.7081071 MARZBAN M F, KASHEF M, ABDALLAH M, et al. Beamforming and power allocation for physical-layer security in hybrid RF/VLC wireless networks[C]. The 13th International Wireless Communications and Mobile Computing Conference, Valencia, Spain, 2017: 258–263. doi: 10.1109/IWCMC.2017.7986296. WANG Huiming, WANG Chao, NG D W K, et al. Artificial noise assisted secure transmission for distributed antenna systems[J]. IEEE Transactions on Signal Processing, 2016, 64(15): 4050–4064. doi: 10.1109/TSP.2016.2558164 DAI Linglong, WANG Bichai, YUAN Yifei, et al. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends[J]. IEEE Communications Magazine, 2105, 53(9): 74–81. doi: 10.1109/MCOM.2015.7263349 HE Biao, LIU An, YANG Nan, et al. On the design of secure non-orthogonal multiple access systems[J]. IEEE Journal on Selected Areas in Communications, 2017, 35(10): 2196–2206. doi: 10.1109/JSAC.2017.2725698 李釗, 戴曉琴, 陳柯宇, 等. 非正交多址接入下行鏈路用戶(hù)匹配與功率優(yōu)化算法[J]. 電子與信息學(xué)報(bào), 2017, 39(8): 1804–1811. doi: 10.11999/JEIT161197LI Zhao, DAI Xiaoqin, CHEN Keyu, et al. User matching and power optimization algorithm for downlink NOMA[J]. Journal of Electronics &Information Technology, 2017, 39(8): 1804–1811. doi: 10.11999/JEIT161197 CHANDWANI N, JAIN A, and VYAVAHARE P D. Throughput comparison for cognitive radio network under various conditions of primary user and channel noise signals[C]. 2015 Radio and Antenna Days of the Indian Ocean, Belle Mare, 2015: 1–2. doi: 10.1109/RADIO.2015.7323379. CICIO?LU M, CICIO?LU S, and ?ALHAN A. Performance analysis of software-defined network approach for wireless cognitive radio networks[C]. The 26th Signal Processing and Communications Applications Conference, Izmir, Turkey, 2018: 1–4. doi: 10.1109/SIU.2018.8404691. DING Zhiguo, FAN Pingzhi, and POOR H V. Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions[J]. IEEE Transactions on Vehicular Technology, 2016, 65(8): 6010–6023. doi: 10.1109/TVT.2015.2480766 LIU Yuanwei, DING Zhiguo, ELKASHLAN M, et al. Nonorthogonal multiple access in large-scale underlay cognitive radio networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(12): 10152–10157. doi: 10.1109/TVT.2016.2524694 Lü Lu, CHEN Jian, and NI Qiang. Cooperative non-orthogonal multiple access in cognitive radio[J]. IEEE Communications Letters, 2016, 20(10): 2059–2062. doi: 10.1109/LCOMM.2016.2596763 ARZYKULOV S, TSIFTSIS T A, NAURYZBAYEV G, et al. Outage performance of cooperative underlay CR-NOMA with imperfect CSI[J]. IEEE Communications Letters, 2019, 23(1): 176–179. doi: 10.1109/LCOMM.2018.2878730 CHEN Yingyang, WANG Li, and JIAO Bingli. Cooperative multicast non-orthogonal multiple access in cognitive radio[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6. Lü Lu, CHEN Jian, NI Qiang, et al. Design of cooperative non-orthogonal multicast cognitive multiple access for 5G systems: User scheduling and performance analysis[J]. IEEE Transactions on Communications, 2017, 65(6): 2641–2656. doi: 10.1109/TCOMM.2017.2677942 WANG Huiming, WANG Chao, ZHENG Tongxing, et al. Impact of artificial noise on cellular networks: A stochastic geometry approach[J]. IEEE Transactions on Wireless Communications, 2016, 15(11): 7390–7404. doi: 10.1109/TWC.2016.2601903 HU Xiang, ZHANG Xing, HUANG Haozhou, et al. Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers[C]. The 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Valencia, Spain, 2016: 1–6. doi: 10.1109/PIMRC.2016.7794918. CHEN Hui, TAO Xiaofeng, LI Na, et al. Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6. doi: 10.1109/ICC.2017.7996465. DENG Yansha, WANG Lifeng, ELKASHLAN M, et al. Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1128–1138. doi: 10.1109/TIFS.2016.2516917 CAI Yueming, XU Xiaoming, and YANG Weiwei. Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise[J]. IET Communications, 2016, 10(15): 1904–1913. doi: 10.1049/iet-com.2016.0117 黃開(kāi)枝, 王兵, 許曉明, 等. 基于安全保護(hù)域的增強(qiáng)型多點(diǎn)協(xié)作傳輸機(jī)制[J]. 電子與信息學(xué)報(bào), 2018, 40(1): 108–115. doi: 10.11999/JEIT170478HUANG Kaizhi, WANG Bing, XU Xiaoming, et al. An enhanced coordinated multipoint transmission policy based on secrecy guard zone[J]. Journal of Electronics &Information Technology, 2018, 40(1): 108–115. doi: 10.11999/JEIT170478 -