首页> 外文期刊>Fortschritte der Physik >Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications
【24h】

Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications

机译:无线动力安全通信中的最低保密吞吐量最大化

获取原文
获取原文并翻译 | 示例
       

摘要

This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through energy beamforming, and then, the legitimate users transmit their data to the information access point (IAP) by time-division multiple access. Since an eavesdropper intercepts users' uplink information, the EAP creates artificial noise to cripple the interception capability of the eavesdropper. For providing a secrecy throughput balancing across different legitimate users, we aim to maximize the minimum secrecy throughput of all users via time allocation, energy beamforming, and artificial noise design. To this end, a low-complexity two-stage algorithm is proposed. In the first stage, without taking into account the eavesdropper's wiretapping, we design time allocation and energy beamforming by solving the problem of minimum throughput maximization, which is convex and can be easily solved. In the second stage, two easily implementable strategies are proposed for artificial noise design so as to strengthen the noise power at the eavesdropper and simultaneously reduce the noise power at the IAP. Simulation results show that the performance of the proposed approach is close to the upper bound and not sensitive to scenario settings, which confirms the effectiveness of the proposed method.
机译:本文研究了无线动力安全通信网络(WPSCN),其中合法用户没有恒定的能量供应,并且需要无线供电用于信息发送。在WPSCN中采用了收获 - 发射协议,即通过能量波束形成,能源接入点(EAP)首先将能量传送到合法用户,然后,合法用户将其数据传输到信息接入点(IAP)时分多次访问。由于窃听者拦截用户的上行链路信息,因此EAP创造了人造噪声来捕获窃听器的拦截能力。为了提供不同合法用户的保密吞吐量平衡,我们的目标是通过时间分配,能量波束成形和人工噪声设计来最大限度地提高所有用户的最低保密吞吐量。为此,提出了一种低复杂性的两阶段算法。在第一阶段,不考虑窃听者的窃听,我们通过解决最小吞吐量最大化的问题来设计时间分配和能量波束成形,这是凸起的并且可以容易地解决。在第二阶段,提出了两种易于可实现的策略,用于人工噪声设计,以便加强窃听器处的噪声功率,同时降低IAP的噪声功率。仿真结果表明,所提出的方法的性能接近上限,对情景设置不敏感,这证实了所提出的方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号