检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:韩影 冀保峰[1,2] 程琳 王晓波 HAN Ying;JI Bao-feng;CHENG Lin;WANG Xiao-bo(Henan University of Science and Technology,Luoyang Henan 471023,China;University of Electronic Science and Technology of China,Chengdu Sichuan 611731,China;State Grid Anhui Training Center,Hefei Anhui 230022,China;Anhui Electrical Engineering Professional Technique College,Hefei Anhui 230051,China)
机构地区:[1]河南科技大学,河南洛阳471023 [2]电子科技大学,四川成都611731 [3]国网安徽省电力有限公司培训中心,安徽合肥230022 [4]安徽电气工程职业技术学院,安徽合肥230051
出 处:《计算机仿真》2022年第2期153-160,347,共9页Computer Simulation
基 金:国家十三五装备预研基金(6140311030207);国家自然科学基金(61801170,61901241,61671144);中国博士后科学基金资助(2018M633351);中科学LAGEO基金(LAGEO-2019-2);河南省高校科技创新人才培养计划(20HASTIT022,17HASTIT025);2018年西藏自治区教育科学“十三五”重大项目(XZJKY201803);河南省青年骨干教师(2018GGJS049)。
摘 要:针对无线通信大规模窃听系统,研究了多中继协作传输的保密性能,其中合法用户配置多天线,源端、中继和窃听者均配置单天线。基于信噪比最大化的中继选择策略,合法用户采用最大比合并技术进行信号的接收,以获得合法链路的最大信噪比。在大规模窃听和合法用户多天线系统模型中,采用函数分析法,推导了基于信噪比最大化中继选择策略的Nakagami-m衰落信道下系统保密中断概率和非零保密容量概率的闭合表达式。仿真了保密系统窃听/中继个数,信道参数以及目的端天线数等系统参数对保密中断概率和非零保密容量概率的影响,结果证明了理论分析的正确性,提升了合法用户的隐私安全。Aiming at wireless communication multiple eavesdropping systems, the confidentiality performance of multi-relay cooperative transmission has been studied. Among them, legal users are equipped with multiple antennas, and the source, relays and eavesdroppers are all equipped with single antennas. Based on the relay selection strategy that maximizes the signal-to-noise ratio(SNR),legal users use the maximum ratio combining technique to receive the signal to obtain the maximum signal-to-noise ratio of the legal link. In the multi-eavesdropper and multi-antenna model of legitimate users, the function analysis method was used to derive the closed expressions of the system secrecy outage probability(SOP) and non-zero secrecy capacity probability under Nakagami-m fading channels based on the SNR maximization relay selection strategy. The effects of system parameters such as the number of eavesdropping/relays in the security system, channel parameters and the number of destination antennas on the SOP and non-zerosecrecy capacity probability were simulated. The results prove the correctness of the theoretical analysis and enhance the privacy and security of legitimate users.
分 类 号:TN925[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.142.187.179