首页> 外文OA文献 >Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
【2h】

Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers

机译:在存在随机放置的窃听者的情况下针对下行链路传输的保密中断分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna selection (TAS) to enhance secrecy performance. We compare the cases where the receiving user equipment (UE) operates in half-duplex (HD) mode and full-duplex (FD) mode. In the latter case, the UE simultaneously receives the intended downlink message and transmits a jamming signal to strengthen secrecy. We investigate two models of (semi)passive eavesdropping: (1) EDs act independently and (2) EDs collude to intercept the transmitted message. For both of these models, we obtain expressions for the secrecy outage probability in the downlink for HD and FD UE operation. The expressions for HD systems have very accurate approximate or exact forms in terms of elementary and/or special functions for all path loss exponents. Those related to the FD systems have exact integral forms for general path loss exponents, while exact closed forms are given for specific exponents. A closed-form approximation is also derived for the FD case with colluding EDs. The resulting analysis shows that the reduction in the secrecy outage probability is logarithmic in the number of antennas used for TAS and identifies conditions under which HD operation should be used instead of FD jamming at the UE. These performance trends and exact relations between system parameters can be used to develop adaptive power allocation and duplex operation methods in practice. Examples of such techniques are alluded to herein.
机译:我们在假设基站采用发射天线选择(TAS)来提高保密性能的前提下,对具有空间(Poisson)分布式窃听者(ED)的无线网络在下行链路中的保密中断概率进行了分析。我们比较了接收用户设备(UE)在半双工(HD)模式和全双工(FD)模式下运行的情况。在后一种情况下,UE同时接收预期的下行链路消息并发送干扰信号以增强保密性。我们研究了(半)被动窃听的两种模型:(1)ED独立起作用;(2)ED串通以截取传输的消息。对于这两种模型,我们都获得了HD和FD UE操作在下行链路中的保密中断概率的表达式。对于所有路径损耗指数,HD系统的表达式在基本和/或特殊函数方面具有非常准确的近似或精确形式。与FD系统相关的那些对于一般路径损耗指数具有精确的积分形式,而对于特定的指数则具有精确的封闭形式。对于具有共通的ED的FD情况,也可以得出一个封闭形式的近似值。结果分析表明,保密中断概率的减少与用于TAS的天线数量成对数关系,并确定了应使用HD操作代替UE FD干扰的条件。这些性能趋势和系统参数之间的精确关系可在实践中用于开发自适应功率分配和双工操作方法。这种技术的示例在本文中被提及。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号