混合RF-FSO下链SWIPT系统的保密中断分析

0 下载量 143 浏览量 更新于2024-08-28 收藏 1.57MB PDF 举报
"Secrecy Outage Analysis of Mixed RF-FSO Downlink SWIPT Systems - IEEETRANSACTIONSONCOMMUNICATIONS, VOL.66, NO.12, DECEMBER2018 - 研究论文" 本文是关于混合射频-自由空间光(FSO)下行链路同时无线信息和功率传输系统(SWIPT)的安全性分析,特别是在秘密中断概率(SOP)方面的研究。混合RF-FSO系统结合了射频(RF)通信的灵活性和自由空间光通信(FSO)的高带宽潜力,用于提供信息传输和能量采集。 首先,文章指出FSO链路和所有RF链路分别经历独立且同分布的Gamma-Gamma衰落和Nakagami-m衰落。 Gamma-Gamma模型通常用于描述大气湍流对FSO信号的影响,而Nakagami-m模型则适用于RF信道的多径衰落。这两种因素都会显著影响系统的传输性能。 点错误是FSO通信中的一个关键问题,因为它会导致信号质量下降,进而影响整体系统性能。作者分析了点错误如何与大气湍流一起影响系统的安全性。此外,检测技术的选择也会影响信息传输的效率和安全性,因此在系统设计中也是一个重要因素。 路径损耗是无线通信中普遍存在的问题,它会随着传播距离的增加而增加,从而降低信号强度。在SWIPT系统中,路径损耗不仅影响信息接收,还影响能量接收,因此在分析SOP时必须考虑这一因素。 文章中,作者推导出了SOP的封闭形式表达式,以及当中继和合法接收器的信噪比趋近于无穷大时的渐近SOP结果。这些结果对于理解和优化系统性能至关重要,特别是当需要在确保通信安全的同时最大化能量效率时。 为了验证理论分析的准确性,进行了蒙特卡洛仿真。这些模拟结果证实了所提出的分析方法能准确地预测系统在各种条件下的SOP行为,从而为系统设计提供了可靠的参考。 这篇研究论文深入探讨了混合RF-FSO系统在SWIPT场景下如何应对各种信道条件,包括衰落、点误差、路径损耗和能量收集,以及它们如何影响系统的秘密性能。通过提供SOP的精确表达式和渐近分析,该工作为提高此类系统的安全性提供了理论基础和实用指导。

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.

2023-06-13 上传