首页> 外文学位 >Optimal power allocation and secrecy capacity of the full-duplex amplify-and-forward wire-tap relay channel under residual self-interference.
【24h】

Optimal power allocation and secrecy capacity of the full-duplex amplify-and-forward wire-tap relay channel under residual self-interference.

机译:剩余自干扰下全双工放大转发窃听中继信道的最优功率分配和保密容量。

获取原文
获取原文并翻译 | 示例

摘要

Due to the broadcast nature of wireless channels, security and privacy are of utmost concern for future wireless technologies. However, securely transferring confidential information over a wireless network in the presence of adversaries still remains a challenging task. As one of the most important aspects of wireless communication security, Physical Layer (PHY) security has started gaining research attention in the past few years. In wireless PHY security, the breakthrough idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from a source to an intended destination while trying to keep this message confidential from passive eavesdroppers. Unlike cryptographic methods, no computational constraints are placed on the eavesdroppers. Benefiting from information-theoretic studies in cooperative relaying communications, relaying strategies have also recently received considerable attention in the context of PHY security over wireless networks. Specifically, in wireless PHY security, relay nodes can be used as trusted nodes to support a secured transmission from a source to a destination in the presence of one or more eavesdroppers. This thesis studies a wireless relay network in which a source node wants to communicate securely to a destination node in the presence of an eavesdropper under the aid of an amplify-and-forward (AF) relay operating in full-duplex (FD) mode for further security enhancement. The focus is on the optimal power allocation (PA) schemes to maximize the secrecy rate in different wireless environments.;The first part of the thesis considers the problem of optimizing the PA at the source node and the relay node to achieve the secrecy capacity for slowly varying fading channels. Under this consideration, the optimal PA problem is shown to be quasi-concave. As such, the globally optimal power allocation solution exists, and it is unique. A simple bisection method for root finding can then be used to obtain the optimal PA scheme. To further provide an insight on the solutions, the method of dominant balance is applied to analyze the secrecy capacity and PA schemes in different high power regions. It is then demonstrated that full PA at the relay is only needed when the power at the relay is sufficiently small compared to the power at the source. Comparison with half-duplex (HD) relaying also shows that FD relaying can achieve a significantly higher secrecy capacity.;In the second part of the thesis, the study is extended to ergodic fading channels where the channel gains are assumed to be available at the receivers but not the transmitters. Due to the presence of fading, analysis on secrecy rate are normally very challenging because of the lack of an insightful method to calculate secrecy rate in closed-form. To this end, a novel method to calculate the expectation of an exponentially distributed random variable is first proposed. By exploiting this calculation, the ergodic secrecy rate of the system can be then established in closed-form. The optimal PA scheme and the corresponding secrecy capacity are then studied. Numerical results also reveal the superiority of FD over HD relaying in ergodic fading.
机译:由于无线信道的广播特性,安全性和隐私对于未来的无线技术至关重要。但是,在存在对手的情况下通过无线网络安全地传输机密信息仍然是一项艰巨的任务。作为无线通信安全最重要的方面之一,物理层(PHY)安全性在过去几年中已开始引起研究关注。在无线PHY安全性中,突破性的想法是利用诸如衰落或噪声之类的无线通道的特性,将消息从源传输到预期的目的地,同时试图使该消息不被被动的窃听者保密。与加密方法不同,窃听者没有任何计算约束。得益于协作中继通信中的信息理论研究,中继策略最近在无线网络上的PHY安全性方面也受到了相当大的关注。具体而言,在无线PHY安全性中,可以将中继节点用作受信节点,以在存在一个或多个窃听者的情况下支持从源到目的地的安全传输。本论文研究了一种无线中继网络,其中源节点希望在以全双工(FD)模式工作的放大转发(AF)中继的帮助下,在存在窃听者的情况下安全地与目标节点通信。进一步增强安全性。重点是在不同无线环境中最大化保密率的最优功率分配(PA)方案。本文的第一部分考虑了优化源节点和中继节点上的PA以实现保密能力的问题。逐渐变化的衰落通道。在这种考虑下,最佳功率放大器问题被​​证明是准凹的。这样,存在全局最优功率分配解决方案,并且它是唯一的。然后可以使用简单的二分法进行寻根,以获得最佳的PA方案。为了进一步提供解决方案的见解,将主导平衡法用于分析不同高功率区域中的保密容量和PA方案。然后证明,仅当继电器处的功率与电源处的功率相比足够小时,才需要继电器处的全功率放大器。与半双工(HD)中继的比较还表明FD中继可以实现更高的保密容量。在论文的第二部分,研究扩展到遍历衰落信道,其中假定信道增益在信道上可用。接收器,但不包括发射器。由于存在衰落,对保密率的分析通常是非常具有挑战性的,因为缺乏一种有见地的方法来计算封闭形式的保密率。为此,首先提出了一种计算指数分布随机变量期望值的新方法。通过利用此计算,可以以封闭形式确定系统的遍历保密率。然后研究了最佳的PA方案和相应的保密能力。数值结果还表明,在遍历衰落中,FD优于HD中继。

著录项

  • 作者

    Dang, Cuong.;

  • 作者单位

    The University of Akron.;

  • 授予单位 The University of Akron.;
  • 学科 Electrical engineering.
  • 学位 M.S.
  • 年度 2015
  • 页码 82 p.
  • 总页数 82
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:52:20

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号