Responsive image
博碩士論文 etd-0621117-094936 詳細資訊
Title page for etd-0621117-094936
論文名稱
Title
有竊聽者存在的合作式系統之中繼點選擇和功率分配
Using Relay selection and Power allocation for Cooperative system in Presence of Eavesdroppers
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
33
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2017-06-13
繳交日期
Date of Submission
2017-07-21
關鍵字
Keywords
中斷機率、中繼點選擇、合作式網路、物理層安全、解碼後傳輸
physical-layer security, cooperated network, relay selection, decode- and-forward, outage probability
統計
Statistics
本論文已被瀏覽 5725 次,被下載 22
The thesis/dissertation has been browsed 5725 times, has been downloaded 22 times.
中文摘要
在一個存在著竊聽者的合作式通訊系統當中, 我們採用干擾訊
號的方式去改進系統的物理層安全性。 我們所考慮的系統中
,中繼點傳送訊號的方式是以解碼後傳輸為方式。 另外,在
我們的系統假設中,傳輸端到接收端沒有直接的傳輸路徑, 因
此傳輸訊號均需要透過中繼點的輔助。 因為在合作式網路中
,中繼點有許多個且每個中繼點傳輸路徑的通道增益不同, 因此
,本論文考慮選擇最佳中繼傳輸路徑使得中斷機率最小。最
後,本論文則進一步分析我們提出的方法中所得到的中斷機
率值。本論文並使用電腦模擬去驗證我們的中斷機率分析且
確認我們提出方法的有效性。
Abstract
In this thesis, a scheme using jamming signal is adopted to improve the physical-
layer security of a decode-and- forward cooperated relay network in the presence of
eavesdroppers. In addition, it is assumed that there is no direct link between the
source and the destination. As a result, the data transmission from the source to the
destination is all through the relay links. Since there exists many relays in the
cooperated network and each relay link has a different channel gain, this thesis
considers an optimization problem, in which the outage probability of the
cooperated system is minimized by selecting a best relay link. This thesis then
analyzes the outage probability using the proposed relay selection scheme. Finally,
this thesis then conducts computer simulations to verify the analyzed outrage
probability and confirm the validity of the proposed method.
目次 Table of Contents
1序論1
1.1背景以及研究動機1
1.2文獻回顧3
1.3研究方法4
1.4論文架構4
2系統模型6
2.1解碼後傳輸合作式系統模型6
2.2功率分配8
2.3中繼點選擇10
2.4中斷機率分析11
3 結果和分析14
3.1模擬一14
3.2模擬二18
3.3模擬三21
4結論23
[參考文獻24]
參考文獻 References
[1] A. D. Wyner, ”The wire-tap channel,” Bell System Techical Journal, vol. 54, no. 8, pp.
1355-1387, 1975.
[2] S. K. Leung-Yan-Cheong and M. E. Hellman, ”The Gaussian wiretap channel,” IEEE
Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978.
[3] L. Dong, H. Yousefi’zadeh and H. Jafarkhani, ”Cooperative Jamming and Power Allocation
for Wireless Relay Networks in Presence of Eavesdropper,” IEEE International Conference
on Communication, Kyoto, Japan, June. 2011.
[4] Z. Ding, K. K. Leung, D. L. Goeckel and D. Towsley, ”Opportunistic Relaying for Se-
crecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions
on Wireless Communications, vol. 10, no. 6, pp. 1725-1729, April. 2011.
[5] Y. Liu, J. Li and A. P. Petropulu, ”Destination Assisted Cooperative Jamming forWireless
Physical-Layer Security,” IEEE Trans. Inf. Forensics Secure, vol. 8, no. 4, pp. 682-694,
Feb. 2013.
[6] K. H. Park, T. Wang and M. S. Alouini, ”On the Jamming Power Allocation for Secure
Amplify-and-Forward Relaying via Cooperative Jamming,” IEEE Journal on Selected Areas
in Communications, vol. 31, no. 9, pp. 1741-1750, Aug. 2013.
[7] L. Dong, Z. Han and A. P. Petropulu, ”Improving Wireless Physical Layer Security via
Cooperating Relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-
1888, Dec. 2009.
[8] J. Li, A. P. Petropulu and S. Weber, ”On Cooperative Relaying Schemes for Wireless
Physical Layer Security,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp.
4985-4997, Oct. 2011.
[9] H. Deng, H. M. Wang and W. Guo, ”Secrecy Transmission With a Helper: To Relay or
to Jam,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, Feb.
2015.
[10] Y. Zou, X. Wang and W. Shen, ”Optimal Relay Selection for Physical-Layer Security in
Cooperative Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol.
31, no. 10, Sep. 2013.
[11] S. Ghose and R. Bose, ”Outage optimal relay selection strategy using destination-based
jamming for secure communication in amplify-and-forward relay networks,” IEEE workshop
on Statistical Signal Processing, Aug. 2014.
[12] X. Ding, T. Song, Y. Zou and X. Chen, ”Intercept probability analysis of relay selection
for wireless communications in the presence of multiple eavesdroppers,” IEEE Wireless
Communications and Networking Conference, Apr. 2016.
[13] D. K. Sarker, M. Z. I. Sarkar and M. S. Anower, ”Wireless security in selection decode-and-
forward relay networks,” IEEE Electrical, Computer and Telecommunication Engineering,
Dec. 2016.
[14] C. Dang, L. J. Rodriguez and N. Tran, ”On Secrecy Rate and Optimal Power Allocation
of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel,” IEEE Transactions
on Vehicular Technology, vol. 66, no. 9, pp. 3887-3899, Aug. 2016.
[15] X. Wu and L. L. Xie, ”On the Optimal Compressions in the Compress-and-Forward Relay
Schemes,” IEEE Transactions on Information Theory , vol. 59, no. 5, pp. 2613-2628, Feb.
2013.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code