Joint Optimization for Energy Consumption and Secrecy Capacity in Wireless Cooperative Networks

被引:0
作者
Wang, Li [1 ]
Zhang, Xi [2 ]
Ma, Xin [1 ]
Song, Mei [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Work Safety Intelligent Monitorin, Sch Elect Engn, Beijing 100088, Peoples R China
[2] Texas A&M Univ, Dept Elect & Comp Engn, Network & Informat Syst Lab, College Stn, TX 77843 USA
来源
2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) | 2013年
基金
中国国家自然科学基金;
关键词
Wireless cooperative networks; secrecy capacity; energy consumption; energy allocation; CHANNELS; POWER;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a novel amplify-and-forward with cooperative-jamming (ACJ) scheme. In order to make a balance between secrecy capacity (SC) and energy consumption, we use R S E which is defined as the maximum equivalent SC for each unit of energy consumption to evaluate the performance of wireless communications. This paper shows that although SC increases with energy consumption, R S E is not a monotone increasing function. That is to say, when energy consumption exceeds a specific value, the efficiency of each unit of the energy consumed decreases in aspects of the security. In this paper, we not only study the variation tendency of SC changing along with energy consumption, but also use the eigenvalue method to derive a precise equation of R S E. Moreover, simulation results also demonstrate that our model performs quite well in terms of lowering energy consumption to the least, while guaranteeing the security requirements in wireless cooperative networks.
引用
收藏
页码:941 / 946
页数:6
相关论文
共 11 条
  • [1] Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
  • [2] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [3] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [4] Secure Wireless Communications via Cooperation
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1132 - +
  • [5] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [6] Quality-of-service driven power and rate adaptation for multichannel communications over wireless links
    Tang, Jia
    Zhang, Xi
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (12) : 4349 - 4360
  • [7] The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    Tekin, Ender
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2735 - 2751
  • [8] Wang L, 2012, IEEE GLOB COMM CONF, P5663, DOI 10.1109/GLOCOM.2012.6504023
  • [9] Wang L, 2011, CHINA COMMUN, V8, P76
  • [10] WIRE-TAP CHANNEL
    WYNER, AD
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1975, 54 (08): : 1355 - 1387