基于攜能通信的非信任雙向中繼網(wǎng)絡(luò)安全傳輸方案
doi: 10.11999/JEIT200069
-
1.
重慶大學(xué)微電子與通信工程學(xué)院 重慶 400044
-
2.
重慶大學(xué)通信與測控中心 重慶 400044
-
3.
空天地網(wǎng)絡(luò)互連與信息融合重慶市重點實驗室 重慶 400044
Security Transmission Scheme for Two-way Untrusted Relay Networks Based on Simultaneous Wireless Information and Power Transfer
-
1.
School of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China
-
2.
Center of Communication and Tracking Telemetry Command, Chongqing University, Chongqing 400044, China
-
3.
Chongqing Key Laboratory of Space Information Network and Intelligent Information Fusion, Chongqing 400044, China
-
摘要:
針對非信任雙向中繼網(wǎng)絡(luò)的能量受限和信息安全問題,該文提出一種基于無線攜能通信(SWIPT)與人工噪聲輔助的物理層安全傳輸方案。該方案中的非信任中繼采用功率分割(PS)策略輔助合法用戶進(jìn)行保密通信,而全雙工干擾機(jī)在進(jìn)行能量采集的同時發(fā)送人工噪聲以確保系統(tǒng)安全。以最大化系統(tǒng)保密性能為目標(biāo),優(yōu)化了中繼的PS因子,推導(dǎo)了保密和速率的解析式及高信噪比條件下最佳PS因子的閉式解。特別針對非理想信道狀態(tài)信息的情況,分析了信道估計誤差對系統(tǒng)保密性能的影響。仿真結(jié)果驗證了理論推導(dǎo)的正確性,并證明了所提的基于PS策略的干擾機(jī)協(xié)同傳輸方案相比采用時間切換(TS)策略或目的節(jié)點協(xié)同干擾的方案具有更優(yōu)的保密性能。
Abstract:The physical-layer security transmission scheme based on Simultaneous Wireless Information and Power Transfer (SWIPT) and artificial noise-aided is proposed to solve the energy-constrained and information security issues upon the two-way untrusted relay networks. The Power Splitting (PS) strategy is adopted by the untrusted relay to assist the confidential communication, where a full-duplex jammer is assigned to send the artificial noise while harvesting energy, to ensure the system security. The PS factor is optimized to maximize the secrecy performance, and then the closed-form expressions of the secrecy sum-rate and optimal PS ratio are derived in the high signal-to-noise ratio regime. Besides, the impacts of the channel estimation error on the system security are analyzed for the imperfect channel state information. Simulation results validate the correctness of the theoretical derivation and demonstrate that the proposed transmission scheme based on PS strategy and friendly jammer outperforms that based on the Time Switching (TS) strategy or destination-aided jamming.
-
RAMEZANI P, ZENG Yong, and JAMALIPOUR A. Optimal resource allocation for multiuser internet of things network with single wireless-powered relay[J]. IEEE Internet of Things Journal, 2019, 6(2): 3132–3142. doi: 10.1109/JIOT.2018.2879373 KIM J B, LIM J, and CIOFFI J M. Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015, 14(7): 3866–3876. doi: 10.1109/TWC.2015.2413784 洪濤, 張更新. 人工噪聲輔助的物理層安全信號峰均功率比減低算法[J]. 電子與信息學(xué)報, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739HONG Tao and ZHANG Gengxin. Peak-to-average power ratio reduction algorithm of artificial-noise-aided secure signal[J]. Journal of Electronics &Information Technology, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739 Lü Lu, CHEN Jian, YANG Long, et al. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation[J]. IET Communications, 2017, 11(3): 393–399. doi: 10.1049/iet-com.2016.0355 KALAMKAR S S and BANERJEE A. Secure communication via a wireless energy harvesting untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2017, 66(3): 2199–2213. doi: 10.1109/TVT.2016.2572960 ZHANG Rongqing, SONG Lingyang, HAN Zhu, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693–3704. doi: 10.1109/TVT.2012.2209692 KUHESTANI A, MOHAMMADI A, and YEOH P L. Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer[J]. IEEE Transactions on Communications, 2018, 66(6): 2671–2684. doi: 10.1109/TCOMM.2018.2802951 VARSHNEY L R. Transporting information and energy simultaneously[C]. 2018 IEEE International Symposium on Information Theory, Toronto, Canada, 2008: 1612–1616. doi: 10.1109/ISIT.2008.4595260. 張波, 黃開枝. 異構(gòu)攜能通信網(wǎng)絡(luò)中基于人工噪聲輔助的魯棒安全傳輸方案[J]. 電子與信息學(xué)報, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269ZHANG Bo and HUANG Kaizhi. Robust secure transmission scheme based on artificial noise-aided for heterogeneous networks with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269 LEE K, HONG J P, CHOI H H, et al. Wireless-powered two-way relaying protocols for optimizing physical layer security[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 162–174. doi: 10.1109/TIFS.2018.2847452 GUPTA V, KALAMKAR S S, and BANERJEE A. On secure communication using RF energy harvesting two-way untrusted relay[C]. 2018 IEEE Global Communications Conference, Singapore, 2017: 1–7. doi: 10.1109/GLOCOM.2017.8254194. MAMAGHANI M T, KUHESTANI A, and WONG K K. Secure two-way transmission via wireless-powered untrusted relay and external jammer[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9): 8451–8465. doi: 10.1109/TVT.2018.2848648 HUANG Jing and SWINDLEHURST A L. Joint transmit design and node selection for one-way and two-way untrusted relay channels[C]. 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, USA, 2013: 1555–1559. doi: 10.1109/ACSSC.2013.6810558. LI Quanzhong, ZHANG Qi, and QIN Jiayin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478–487. doi: 10.1109/TCOMM.2014.011014.130437 -