• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全

Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.

作者信息

Hayajneh Maymoona, Gulliver Thomas Aaron

机构信息

Department of Electrical and Computer Engineering, University of Victoria, P.O. Box 1700, STN CSC, Victoria, BC V8W 2Y2, Canada.

出版信息

Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.

DOI:10.3390/e25010122
PMID:36673263
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9858454/
Abstract

In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals. Time switching is employed at the relay to harvest energy and obtain user information. A friendly jammer is utilized to hinder the eavesdropping from wiretapping the information signal. The eavesdropper employs maximal ratio combining and selection combining to improve the signal-to-noise ratio of the wiretapped signals. Geometric programming (GP) is used to maximize the secrecy capacity of the system by jointly optimizing the time switching ratio of the relay and transmit power of the two users and jammer. The impact of imperfect channel state information at the eavesdropper for the links between the eavesdropper and the other nodes is determined. Further, the secrecy capacity when the jamming signal is not perfectly cancelled at the relay is examined. The secrecy capacity is shown to be greater with a jammer compared to the case without a jammer. The effect of the relay, jammer, and eavesdropper locations on the secrecy capacity is also studied. It is shown that the secrecy capacity is greatest when the relay is at the midpoint between the users. The closer the jammer is to the eavesdropper, the higher the secrecy capacity as the shorter distance decreases the signal-to-noise ratio of the jammer.

摘要

本文研究了存在被动窃听者时双向中继通信的安全性。两个用户通过一个仅依靠能量收集来放大和转发接收到的信号的中继进行通信。中继采用时间切换来收集能量并获取用户信息。利用一个友好干扰器来阻止窃听者窃听信息信号。窃听者采用最大比合并和选择合并来提高窃听信号的信噪比。通过联合优化中继的时间切换比以及两个用户和干扰器的发射功率,使用几何规划(GP)来最大化系统的保密容量。确定了窃听者处信道状态信息不完善对窃听者与其他节点之间链路的影响。此外,还研究了干扰信号在中继处未被完美消除时的保密容量。结果表明,与没有干扰器的情况相比,有干扰器时保密容量更大。还研究了中继、干扰器和窃听者位置对保密容量的影响。结果表明,当中继位于用户之间的中点时,保密容量最大。干扰器离窃听者越近,保密容量越高,因为较短的距离会降低干扰器的信噪比。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/51fdaa525b3d/entropy-25-00122-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/929128265fc6/entropy-25-00122-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/a1f5d525e0c3/entropy-25-00122-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/6c3609dee5ac/entropy-25-00122-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/efc14599675b/entropy-25-00122-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/1e5084afff1c/entropy-25-00122-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/266d9fcafe64/entropy-25-00122-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/209059c0f241/entropy-25-00122-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/685ac2e6c834/entropy-25-00122-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/9d2fa6d0be08/entropy-25-00122-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/582df9cfa4d5/entropy-25-00122-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/169b4ba9299f/entropy-25-00122-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/51fdaa525b3d/entropy-25-00122-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/929128265fc6/entropy-25-00122-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/a1f5d525e0c3/entropy-25-00122-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/6c3609dee5ac/entropy-25-00122-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/efc14599675b/entropy-25-00122-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/1e5084afff1c/entropy-25-00122-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/266d9fcafe64/entropy-25-00122-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/209059c0f241/entropy-25-00122-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/685ac2e6c834/entropy-25-00122-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/9d2fa6d0be08/entropy-25-00122-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/582df9cfa4d5/entropy-25-00122-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/169b4ba9299f/entropy-25-00122-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b99e/9858454/51fdaa525b3d/entropy-25-00122-g012.jpg

相似文献

1
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全
Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.
2
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.基于选择式放大转发与协作干扰的无线传感器网络安全多用户通信
Sensors (Basel). 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908.
3
Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming.协作 SWIPT NOMA 系统中非线性能量收集和友好干扰下的安全通信。
Sensors (Basel). 2020 Feb 14;20(4):1047. doi: 10.3390/s20041047.
4
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer.具有能量收集干扰器的覆盖式认知无线电网络的保密性能最大化。
Sensors (Basel). 2021 Dec 8;21(24):8198. doi: 10.3390/s21248198.
5
A Study of Physical Layer Security in SWIPT-Based Decode-and-Forward Relay Networks with Dynamic Power Splitting.基于动态功率分配的同时进行无线信息与能量传输的解码转发中继网络中的物理层安全研究
Sensors (Basel). 2021 Aug 24;21(17):5692. doi: 10.3390/s21175692.
6
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.两用户同时进行无线信息与能量传输传感器网络协作迫零干扰的安全传输
Sensors (Basel). 2018 Jan 24;18(2):331. doi: 10.3390/s18020331.
7
Simultaneous Wireless Information and Power Transfer in Multi-User OFDMA Networks with Physical Secrecy.具有物理层保密的多用户正交频分多址网络中的同时无线信息与能量传输
Sensors (Basel). 2022 May 18;22(10):3814. doi: 10.3390/s22103814.
8
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks.在非可信中继网络中,用于无线信息和功率同时传输的安全传输方法。
Sensors (Basel). 2018 Dec 26;19(1):76. doi: 10.3390/s19010076.
9
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.存在干扰辅助窃听者情况下的高斯多用户窃听信道
Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.
10
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks.基于能量收集的认知无线电网络中物理层安全增强的深度强化学习。
Sensors (Basel). 2023 Jan 10;23(2):807. doi: 10.3390/s23020807.