跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/03/20 07:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:宋卉萱
研究生(外文):Hui-Xuan Song
論文名稱:有竊聽者存在的合作式系統之中繼點選擇和功率分配
論文名稱(外文):Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers
指導教授:王藏億
指導教授(外文):Tsang-Yi Charlie Wang
學位類別:碩士
校院名稱:國立中山大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:33
中文關鍵詞:物理層安全合作式網路中繼點選擇中斷機率解碼後傳輸
外文關鍵詞:outage probabilitydecode- and-forwardrelay selectioncooperated networkphysical-layer security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:112
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在一個存在著竊聽者的合作式通訊系統當中, 我們採用干擾訊
號的方式去改進系統的物理層安全性。 我們所考慮的系統中
,中繼點傳送訊號的方式是以解碼後傳輸為方式。 另外,在
我們的系統假設中,傳輸端到接收端沒有直接的傳輸路徑, 因
此傳輸訊號均需要透過中繼點的輔助。 因為在合作式網路中
,中繼點有許多個且每個中繼點傳輸路徑的通道增益不同, 因此
,本論文考慮選擇最佳中繼傳輸路徑使得中斷機率最小。最
後,本論文則進一步分析我們提出的方法中所得到的中斷機
率值。本論文並使用電腦模擬去驗證我們的中斷機率分析且
確認我們提出方法的有效性。
In this thesis, a scheme using jamming signal is adopted to improve the physical-
layer security of a decode-and- forward cooperated relay network in the presence of
eavesdroppers. In addition, it is assumed that there is no direct link between the
source and the destination. As a result, the data transmission from the source to the
destination is all through the relay links. Since there exists many relays in the
cooperated network and each relay link has a different channel gain, this thesis
considers an optimization problem, in which the outage probability of the
cooperated system is minimized by selecting a best relay link. This thesis then
analyzes the outage probability using the proposed relay selection scheme. Finally,
this thesis then conducts computer simulations to verify the analyzed outrage
probability and confirm the validity of the proposed method.
1序論1
1.1背景以及研究動機1
1.2文獻回顧3
1.3研究方法4
1.4論文架構4
2系統模型6
2.1解碼後傳輸合作式系統模型6
2.2功率分配8
2.3中繼點選擇10
2.4中斷機率分析11
3 結果和分析14
3.1模擬一14
3.2模擬二18
3.3模擬三21
4結論23
[參考文獻24]
[1] A. D. Wyner, ”The wire-tap channel,” Bell System Techical Journal, vol. 54, no. 8, pp.
1355-1387, 1975.
[2] S. K. Leung-Yan-Cheong and M. E. Hellman, ”The Gaussian wiretap channel,” IEEE
Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978.
[3] L. Dong, H. Yousefi’zadeh and H. Jafarkhani, ”Cooperative Jamming and Power Allocation
for Wireless Relay Networks in Presence of Eavesdropper,” IEEE International Conference
on Communication, Kyoto, Japan, June. 2011.
[4] Z. Ding, K. K. Leung, D. L. Goeckel and D. Towsley, ”Opportunistic Relaying for Se-
crecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions
on Wireless Communications, vol. 10, no. 6, pp. 1725-1729, April. 2011.
[5] Y. Liu, J. Li and A. P. Petropulu, ”Destination Assisted Cooperative Jamming forWireless
Physical-Layer Security,” IEEE Trans. Inf. Forensics Secure, vol. 8, no. 4, pp. 682-694,
Feb. 2013.
[6] K. H. Park, T. Wang and M. S. Alouini, ”On the Jamming Power Allocation for Secure
Amplify-and-Forward Relaying via Cooperative Jamming,” IEEE Journal on Selected Areas
in Communications, vol. 31, no. 9, pp. 1741-1750, Aug. 2013.
[7] L. Dong, Z. Han and A. P. Petropulu, ”Improving Wireless Physical Layer Security via
Cooperating Relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-
1888, Dec. 2009.
[8] J. Li, A. P. Petropulu and S. Weber, ”On Cooperative Relaying Schemes for Wireless
Physical Layer Security,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp.
4985-4997, Oct. 2011.
[9] H. Deng, H. M. Wang and W. Guo, ”Secrecy Transmission With a Helper: To Relay or
to Jam,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, Feb.
2015.
[10] Y. Zou, X. Wang and W. Shen, ”Optimal Relay Selection for Physical-Layer Security in
Cooperative Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol.
31, no. 10, Sep. 2013.
[11] S. Ghose and R. Bose, ”Outage optimal relay selection strategy using destination-based
jamming for secure communication in amplify-and-forward relay networks,” IEEE workshop
on Statistical Signal Processing, Aug. 2014.
[12] X. Ding, T. Song, Y. Zou and X. Chen, ”Intercept probability analysis of relay selection
for wireless communications in the presence of multiple eavesdroppers,” IEEE Wireless
Communications and Networking Conference, Apr. 2016.
[13] D. K. Sarker, M. Z. I. Sarkar and M. S. Anower, ”Wireless security in selection decode-and-
forward relay networks,” IEEE Electrical, Computer and Telecommunication Engineering,
Dec. 2016.
[14] C. Dang, L. J. Rodriguez and N. Tran, ”On Secrecy Rate and Optimal Power Allocation
of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel,” IEEE Transactions
on Vehicular Technology, vol. 66, no. 9, pp. 3887-3899, Aug. 2016.
[15] X. Wu and L. L. Xie, ”On the Optimal Compressions in the Compress-and-Forward Relay
Schemes,” IEEE Transactions on Information Theory , vol. 59, no. 5, pp. 2613-2628, Feb.
2013.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊