首页> 外文期刊>IEEE transactions on information forensics and security >Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
【24h】

Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios

机译:非正交多路访问中的安全中继:受信任和不受信任的方案

获取原文
获取原文并翻译 | 示例
           

摘要

A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes are proposed and analyzed for that matter: cooperative jamming, decode-and-forward, and amplify-and-forward. For each scheme, secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay and combine them to decode their messages. In the second mode, termed the active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. It is shown that the best relaying scheme highly depends on the system parameters, in particular the distances between the nodes, and also on the part of the secrecy rate region at which the system is to operate.
机译:考虑了下行链路单输入单输出非正交多址设置,其中基站(BS)在不安全环境的两种可能情况下与两个合法用户通信:存在外部窃听者和通过不可信中继进行通信。对于第一种情况,采用了多个受信任的协作半双工中继来协助BS的传输并保护其从外部窃听者的信号。为此,提出并分析了各种中继方案:协作干扰,解码转发和放大转发。对于每种方案,在中继器处设计安全的波束成形信号,以使可达到的保密率区域最大化。对于第二种情况,对于不受信任的中继,在两种不同的操作模式下,为两种不同的中继方案(压缩转发和放大转发)得出了可实现的保密率区域。在第一种模式(称为被动用户模式)中,用户从BS和不受信任的中继接收信号,并将它们组合以解码其消息。在称为活动用户模式的第二种模式中,用户与BS的传输同时发送协作干扰信号,以进一步混淆中继。着眼于半双工节点,用户在干扰中继时(即,在活动时)不能接收BS的信号,而仅依靠中继转发给它们的信号。结果表明,最佳的中继方案在很大程度上取决于系统参数,尤其是节点之间的距离,还取决于系统要运行的保密速率区域的一部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号