Advanced Search
Volume 38 Issue 9
Sep.  2016
Turn off MathJax
Article Contents
Qunsheng LI, Yan ZHAO, Lei KOU, Jinda WANG. An Affine Projection Algorithm with Multi-scale Kernels Learning[J]. Journal of Electronics & Information Technology, 2020, 42(4): 924-931. doi: 10.11999/JEIT190023
Citation: LEI Weijia, YANG Xiaoyan, JIANG Xue, XIE Xianzhong. Secrecy Rate Optimization for Single Antenna Two-hop Relay System in Energy-saving-then-transmitting Mode[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2233-2240. doi: 10.11999/JEIJ151371

Secrecy Rate Optimization for Single Antenna Two-hop Relay System in Energy-saving-then-transmitting Mode

doi: 10.11999/JEIJ151371
Funds:

The National Natural Science Foundation of China (61471076, 61301123), The Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), The Special Fund of Chongqing Key Laboratory

  • Received Date: 2015-12-08
  • Rev Recd Date: 2016-05-10
  • Publish Date: 2016-09-19
  • A physical layer security transmission protocol in a two-hop relay system is studied. All nodes are equipped with an antenna and have the ability of energy harvesting. There are direct links between the source node and the eavesdropper as well as the relay node and the eavesdropper. Each transmission time slot is divided into two stages, which are respectively used for energy harvesting and data transmitting. The energy harvested is used to send data. The amplify-and-forward protocol is adopted, and the destination node sends artificial noise to protect the information transmitted in the first and second hop. To maximize the secrecy rate, iterative algorithm is used to optimize two variables of the time for energy harvesting and the power of artificial noise. Simulation results show that the optimization algorithm is accurate and the cooperative jamming can effectively improve the secrecy rate. Considering that eavesdropper can intercept the information transmitted in the two hops, the proposed scheme is more practical and can solve a complicate optimization problem.
  • MUKHERJEE A, FAKOORIAN S, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys Tutorials, 2014, 16(3): 1550-1573. doi: 10.1109/SURV.2014. 012314.00178.
    BASSILY R, EKREM E, HE X, et al. Cooperative security at the physical layer: A summary of recent advances[J]. IEEE Signal Processing Magazine, 2013, 30(5): 16-28. doi: 10.1109/ MSP.2013.2260875.
    GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189. doi: 10.1109/TWC.2008.060848.
    HAN B, LI J, SU J S, et al. Secrecy capacity optimization via cooperative relaying and jamming for WANETs[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(4): 1117-1128. doi: 10.1109/TPDS.2014.2316155.
    PARK K H, WANG T, and ALOUINI M S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1741-1750. doi: 10.1109/JSAC. 2013.130908.
    HAGGSTROM F, GUSTAFSSON J, and DELSING J. Energy harvesting technologies for wireless sensors in rotating environments[C]. IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, 2014: 1-4. doi: 10.1109/ETFA.2014.7005364.
    VALENTA C R and DURGIN G D. Harvesting wireless power: survey of energy-harvester conversion efficiency in far-field, wireless power transfer Systems[J]. IEEE Microwave Magezine, 2014, 15(4): 108-120. doi: 10.1109/MMM.2014. 2309499.
    LI Q, MA W K, and SO A M C. Robust artificial noise-aided transmit optimization for achieving secrecy and energy harvesting[C]. IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), Florence, 2014: 1596-1600. doi: 10.1109/ICASSP.2014.6853867.
    LEONARD E D. Introduction to the Theory of Algebraic Equations[M]. New York: Rough Draft Printing, 1988: 67-72.
    范盛金. 一元三次方程的新求根公式与新判别式[J]. 海南师范学院学报(自然科学版), 1989, 2(2): 91-98.
    FAN S J. A new extracting formula and a new distinguishing means on the one variable cubic equation[J]. Journal of Hainan Normal University (Natural Science), 1989, 2(2): 91-98.
    ZHU F, GAO F, ZHANG T, et al. Physical-layer security for full-duplex communications with self-interference mitigation [J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 329-340. doi: 10.1109/TWC.2015.2472527.
  • Cited by

    Periodical cited type(5)

    1. 陈怡,谢金凤,徐千淞,刘彦鹏. 一种非高斯脉冲干扰下的混合线性和非线性自适应滤波算法研究. 信息记录材料. 2022(03): 205-207 .
    2. 火元莲,王丹凤,龙小强,连培君,齐永锋. 非高斯冲激干扰下基于Softplus函数的核自适应滤波算法. 物理学报. 2021(02): 415-421 .
    3. 卢明飞,彭思愿,陈霸东. 最大互相关熵多凸组合自适应滤波算法. 电子与信息学报. 2021(02): 263-269 . 本站查看
    4. 樊宽刚,邱海云. 基于Sigmoid框架的非负最小均方算法. 电子与信息学报. 2021(02): 349-355 . 本站查看
    5. 赵知劲,陈思佳. 基于高斯核显性映射的核归一化解相关仿射投影P范数算法. 电子与信息学报. 2020(08): 1896-1901 . 本站查看

    Other cited types(7)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1235) PDF downloads(421) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return