检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:胡阳 杨爽 张明 韦存 王磊[3] 江雪 HU Yang;YANG Shuang;ZHANG Ming;WEI Cun;WANG Lei;JIANG Xue(State Grid Electric Power Research Institute,Nanjing 210003,China;NARI Information&Communication Technology Co.,Ltd.,Nanjing 210003,China;School of Communication and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;School of Internet of Things,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
机构地区:[1]国网电力科学研究院有限公司,江苏南京210003 [2]南京南瑞信息通信科技有限公司,江苏南京210003 [3]南京邮电大学通信与信息工程学院,江苏南京210003 [4]南京邮电大学物联网学院,江苏南京210003
出 处:《无线电工程》2024年第5期1110-1122,共13页Radio Engineering
基 金:国家电网有限公司总部管理科技项目资助(5108-202218280A-2-199-XG);国家自然科学基金(62071255)。
摘 要:第5代(The Fifth-generation,5G)移动通信网络技术飞速发展,同频双工技术是其中一项关键技术。将这项技术运用到设备到设备(Device to Device,D2D)通信系统中,不仅可以提高资源利用率,还能提高系统通信的安全性。然而,非法用户运用全双工技术将对系统的安全性产生巨大的威胁。因此,针对D2D通信系统中存在全双工主动窃听者恶意干扰D2D用户的问题,主要研究基于Stackelberg博弈的对抗全双工恶意窃听者的安全高效功率分配方案。由于合法用户和主动窃听者的行为相互影响、相互干扰,在保证保密速率要求的情况下,分别考虑单链路与多链路的场景,研究以最小化D2D用户消耗功率和最大化窃听效用为目标的最佳功率分配策略。由于D2D用户和恶意窃听者的优化问题不能分开解决,通过将它们之间的交互构建成Stackelberg博弈模型,并基于二分法算法和模拟退火算法进行求解。仿真表明,通过合理的功率分配能够有效对抗全双工恶意窃听者的窃听和干扰,从而实现安全高效通信,满足更高的系统安全性需求。The Fifth-generation(5G)mobile communication network technology is developing rapidly,and the same frequency duplex technology is one of the key technologies.The application of this technology to Device-to-Device(D2D)communication system can not only improve the utilization rate of resources,but also improve the security of system communication.However,the use of full duplex technology by illegal users will pose a huge threat to the security of the system.Therefore,to solve the problem of malicious jamming of D2D users by active full-duplex eavesdroppers in D2D communication systems,a secure and efficient power allocation scheme against malicious full-duplex eavesdroppers based on Stackelberg game is mainly studied.Since the behaviors of legitimate users and active eavesdropper interact and interfere with each other,the scenarios of single link and multi-link respectively are considered,and the optimal power allocation strategy aiming at minimizing the power consumption of D2D users and maximizing the utility of eavesdropping under the condition of ensuring the confidentiality rate is studied.Since the optimization problem of D2D users and malicious eavesdroppers cannot be solved separately,the Stackelberg game model is constructed by the interaction between them,and the solution is based on the dichotomy algorithm and simulated annealing algorithm.Simulation results show that reasonable power allocation can effectively counter the interception and jamming of full-duplex malicious eavesdroppers,so as to achieve secure and efficient communication and meet higher system security requirements.
分 类 号:TN929[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15