作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2019, Vol. 45 ›› Issue (12): 147-152. doi: 10.19678/j.issn.1000-3428.0052926

• 安全技术 • 上一篇    下一篇

具有能量收集功能的认知中继网络安全性能分析

徐欣健a,b, 仇润鹤a,b, 蒋学芹a,b   

  1. 东华大学 a. 信息科学与技术学院;b. 数字化纺织服装技术教育部工程研究中心, 上海 201620
  • 收稿日期:2018-10-18 修回日期:2019-01-06 发布日期:2019-01-15
  • 作者简介:徐欣健(1995-),女,硕士研究生,主研方向为认知中继网络安全;仇润鹤、蒋学芹,教授、博士。
  • 基金资助:
    国家自然科学基金面上项目(61671143)。

Security Performance Analysis of Cognitive Relay Networks with Energy Collection Function

XU Xinjiana,b, QIU Runhea,b, JIANG Xueqina,b   

  1. a. School of Information Science and Technology;b. Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai 201620, China
  • Received:2018-10-18 Revised:2019-01-06 Published:2019-01-15

摘要: 为提高认知中继网络在物理层上的安全性能,结合能量采集技术与人工噪声干扰技术,构建一种具有能量收集功能的认知中继网络模型。将认知用户的信号传输过程分为能量收集和信号处理2个时隙,在2个时隙中分别从认知源节点和目的节点处向窃听节点发送人工噪声,以干扰其窃听过程。分析各时隙中链路的信噪比情况,利用信噪比推导出选择最优中继和最小残留自干扰中继时中断概率与窃听概率的闭合表达式。仿真结果表明,相比轮询调度算法与设置干扰节点法,该模型能有效降低认知用户信号传输时的中断概率与窃听概率。

关键词: 物理层安全, 能量收集, 全双工模式, 人工噪声干扰, 中断概率, 窃听概率

Abstract: To improve the physical layer security of cognitive relay networks,this paper puts forward a new model based on the combination of energy harvesting technology and artificial noise jamming technology.We first divide the signal transmission process of cognitive users into two slots:the energy harvesting slot and the signal processing slot.In these two time slots,the cognitive source node and the cognitive destination node are allowed to send artificial noise to the eavesdropping node respectively,so as to interfere the eavesdropping process.Then we analyze the signal-to-noise ratio of each link.By selecting the optimal relay and the minimum residual self-interference relay,we use the signal-to-noise ratio to conduct the closed expressions of the outage probability and intercept probability when different relays are selected.Simulation results verify that the proposed method can effectively reduce the outage probability and intercept probability of cognitive users.

Key words: physical layer security, energy collection, full-duplex mode, artificial noise interference, outage probability, intercept probability

中图分类号: