首页> 外文期刊>IEEE Transactions on Communications >Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework
【24h】

Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework

机译:面向安全的多通道全双工通信的分布式电源优化:变分不等式框架

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we consider the physical layer security issue for the multi-channel full-duplex (FD) communications in the presence of eavesdroppers. There co-exist multiple FD pairs, where the two users in each pair perform bi-directional transmissions. The secure communication is then challenged by the users’ self-interference, external interference from other pairs, and threats from the eavesdroppers. We investigate the problem from a distributed perspective and formulate the problem as a non-cooperative game, where each user optimizes their power allocation over the channels to maximize their own secrecy rate. Confirming the existence of the Nash equilibrium, we introduce an equivalent variational inequality (VI) formulation to derive the sufficient condition for the equilibrium to be unique. We then develop the iterative security-aware water-filling (ISWF) algorithm that can be implemented at each individual user in a distributed manner and prove that the condition for the unique equilibrium also claims the convergence of ISWF algorithm. Furthermore, we extend our formulation to the heterogeneous cases that there co-exist FD and half-duplex users with different security requirements in the networks, and demonstrate that they can all be covered as special cases under our formulated VI framework. Finally, we present simulation results to validate our theoretical findings.
机译:在本文中,我们考虑存在窃听者的情况下多通道全双工(FD)通信的物理层安全性问题。多个FD对共存,其中每个对中的两个用户执行双向传输。然后,用户的自我干扰,来自其他对的外部干扰以及窃听者的威胁都会挑战安全通信。我们从分布式的角度调查问题,并将问题表述为非合作游戏,其中每个用户在渠道上优化其功率分配,以最大化其自身的保密率。确认存在纳什均衡,我们引入了一个等效的变分不等式(VI)公式,以得出使该均衡唯一的充分条件。然后,我们开发了可以在每个用户上以分布式方式实施的迭代式安全感知注水(ISWF)算法,并证明了唯一平衡的条件也要求ISWF算法具有收敛性。此外,我们将公式扩展到网络中FD和半双工用户共存且具有不同安全性要求的异构情况,并证明在我们制定的VI框架下它们都可以作为特殊情况涵盖。最后,我们给出仿真结果以验证我们的理论发现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号