• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

具有物理层安全的下行链路云无线接入网络的鲁棒功率优化

Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security.

作者信息

Zhang Yijia, Liu Ruiying

机构信息

School of Information Science and Technology, Zhejiang Sci-Tech University, Hangzhou 310018, China.

College of Mechanical and Electrical Engineering, Jiaxing University, Jiaxing 314001, China.

出版信息

Entropy (Basel). 2020 Feb 17;22(2):223. doi: 10.3390/e22020223.

DOI:10.3390/e22020223
PMID:33285997
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7516656/
Abstract

Since the cloud radio access network (C-RAN) transmits information signals by jointly transmission, the multiple copies of information signals might be eavesdropped on. Therefore, this paper studies the resource allocation algorithm for secure energy optimization in a downlink C-RAN, via jointly designing base station (BS) mode, beamforming and artificial noise (AN) given imperfect channel state information (CSI) of information receivers (IRs) and eavesdrop receivers (ERs). The considered resource allocation design problem is formulated as a nonlinear programming problem of power minimization under the quality of service (QoS) for each IR, the power constraint for each BS, and the physical layer security (PLS) constraints for each ER. To solve this non-trivial problem, we first adopt smooth ℓ 0 -norm approximation and propose a general iterative difference of convex (IDC) algorithm with provable convergence for a difference of convex programming problem. Then, a three-stage algorithm is proposed to solve the original problem, which firstly apply the iterative difference of convex programming with semi-definite relaxation (SDR) technique to provide a roughly (approximately) sparse solution, and then improve the sparsity of the solutions using a deflation based post processing method. The effectiveness of the proposed algorithm is validated with extensive simulations for power minimization in secure downlink C-RANs.

摘要

由于云无线接入网络(C-RAN)通过联合传输来发送信息信号,信息信号的多个副本可能会被窃听。因此,本文研究了在下行C-RAN中用于安全能量优化的资源分配算法,通过在信息接收器(IR)和窃听接收器(ER)的信道状态信息(CSI)不完善的情况下,联合设计基站(BS)模式、波束成形和人工噪声(AN)。所考虑的资源分配设计问题被表述为一个非线性规划问题,即在每个IR的服务质量(QoS)、每个BS的功率约束以及每个ER的物理层安全(PLS)约束下的功率最小化问题。为了解决这个具有挑战性的问题,我们首先采用光滑ℓ0范数近似,并针对凸规划问题的差值提出了一种具有可证明收敛性的通用迭代凸差(IDC)算法。然后,提出了一种三阶段算法来解决原始问题,该算法首先应用带有半定松弛(SDR)技术的迭代凸差规划来提供一个大致(近似)稀疏的解,然后使用基于收缩的后处理方法来提高解的稀疏性。通过在安全下行C-RAN中进行广泛的功率最小化仿真,验证了所提算法的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/47bd5c68d2b6/entropy-22-00223-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/11c76a24a334/entropy-22-00223-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/479f9530f1d0/entropy-22-00223-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/ce6789e6fd38/entropy-22-00223-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/365b19644dba/entropy-22-00223-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/0a013c1d9532/entropy-22-00223-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/2be3c56a2591/entropy-22-00223-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/47bd5c68d2b6/entropy-22-00223-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/11c76a24a334/entropy-22-00223-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/479f9530f1d0/entropy-22-00223-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/ce6789e6fd38/entropy-22-00223-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/365b19644dba/entropy-22-00223-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/0a013c1d9532/entropy-22-00223-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/2be3c56a2591/entropy-22-00223-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a43/7516656/47bd5c68d2b6/entropy-22-00223-g007.jpg

相似文献

1
Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security.具有物理层安全的下行链路云无线接入网络的鲁棒功率优化
Entropy (Basel). 2020 Feb 17;22(2):223. doi: 10.3390/e22020223.
2
Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model.基于非线性能量收集模型的安全 V2X 下行链路系统的无线信息和功率传输的鲁棒波束成形设计。
Sensors (Basel). 2018 Sep 30;18(10):3294. doi: 10.3390/s18103294.
3
Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI.使用非正交多址接入(NOMA)和设备到设备(D2D)通信且信道状态信息(CSI)不完善的高能效安全全双工同时无线信息与能量传输(SWIPT)
Sensors (Basel). 2020 Sep 21;20(18):5395. doi: 10.3390/s20185395.
4
Energy Efficiency Optimization for Downlink Cloud RAN with Limited Fronthaul Capacity.有限前传容量下的下行链路云无线接入网能效优化
Sensors (Basel). 2017 Jun 26;17(7):1498. doi: 10.3390/s17071498.
5
Worst-Case Energy Efficiency Maximization in a 5G Massive MIMO-NOMA System.5G大规模MIMO-NOMA系统中的最坏情况能量效率最大化
Sensors (Basel). 2017 Sep 18;17(9):2139. doi: 10.3390/s17092139.
6
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.CIoT网络中用于安全通信的最坏情况协作干扰
Sensors (Basel). 2016 Mar 7;16(3):339. doi: 10.3390/s16030339.
7
Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission.智能反射面辅助的安全多输入单输出认知无线电传输
Sensors (Basel). 2020 Jun 19;20(12):3480. doi: 10.3390/s20123480.
8
Group Sparse Precoding for Cloud-RAN with Multiple User Antennas.具有多用户天线的云无线接入网的分组稀疏预编码
Entropy (Basel). 2018 Feb 23;20(2):144. doi: 10.3390/e20020144.
9
Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission.大规模MIMO安全组播传输中的能效优化
Entropy (Basel). 2020 Oct 12;22(10):1145. doi: 10.3390/e22101145.
10
Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System.用于联合智能交通系统(ITS)和智能反射面(IRS)赋能系统的加权和保密速率最大化
Entropy (Basel). 2023 Jul 24;25(7):1102. doi: 10.3390/e25071102.

本文引用的文献

1
The concave-convex procedure.凹凸操作法
Neural Comput. 2003 Apr;15(4):915-36. doi: 10.1162/08997660360581958.