Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning

نویسندگان

چکیده

This paper investigates the physical layer security (PLS) design of an untrusted relaying network where source node coexists with a multi-antenna eavesdropper (Eve). While communication relies on untrustworthy relay nodes to increase reliability, we aim protect confidentiality information against combined eavesdropping attacks performed by both and Eve. Considering hardware impairments (HIs), total power budget constraint for whole individual at each node, this presents novel approach jointly optimize beamformer transmit powers aiming maximizing average secrecy rate (ASR). To safeguard first cooperative phase, destination-aided jamming (DACJ) is employed, while second adjusted. The resultant optimization problem non-convex, suboptimal solution obtained through sequential parametric convex approximation (SPCA) method. In order prevent any failure due infeasibility, propose iterative initialization algorithm find feasible initial point original instead arbitrary point, as in conventional SPCA. satisfy low-latency one main key performance indicators (KPI) required beyond 5G (B5G) communications, computationally efficient data-driven developed exploiting deep learning model evaluate proposed scheme computational burden significantly reduced. Simulation results assess effect different system parameters ASR well effectiveness large-scale cases.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy Rate Maximization under Improved Relay Selection with Different Coding Schemes for Cooperative Wireless Network

Wireless communications system strategies are required that be dependent on the impending of the physical (PHY) layer to consent a transmitter-receiver pair communicate securely in the attendance of one or additional eavesdroppers. Communication is accomplished with the help of numerous trusted relays, via the amplify-and-forward (AF) or decode-and-forward (DF) protocol, and presumptuous knowle...

متن کامل

Secrecy in Untrusted Networks

We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies and security protocols over distributed, mobile infrastructures, and aims to stand to ambients as the spi calculus stands to π. We present a type system that separates trusted and untrusted data and code, while allowi...

متن کامل

Sum-Rate Maximization With Minimum Power Consumption for MIMO DF Two-Way Relaying— Part II: Network Optimization

In Part II of this two-part paper, a sum-rate-maximizing power allocation with minimum power consumption is derived for multiple-input multiple-output (MIMO) decode-and-forward (DF) two-way relaying (TWR) in a network optimization scenario. In this scenario, the relay and the source nodes jointly optimize their power allocation strategies to achieve network optimality. Unlike the relay optimiza...

متن کامل

Sum rate maximization for multi-cell downlink OFDMA with subcarrier pair-based opportunistic DF relaying

This paper considers multi-cell decode-and-forward (DF) relay-aided orthogonal frequency division multi-access (OFDMA) downlink systems, in which all sources and relays are coordinated by a central controller for resource allocation (RA). The improved subcarrier pair-based opportunistic DF relaying protocol proposed and studied in the IEEE International Conference on Communications, Beijing, 37...

متن کامل

Distributed algorithms for sum rate maximization in multi-cell downlink OFDMA with opportunistic DF relaying

This paper considers a multi-cell orthogonal frequency division multiple access (OFDMA) downlink systemwith several decode-and-forward (DF) relay stations (RSs) aiding the base station (BS) transmissions. The problem considered is the maximization of the system sum rate with a total power constraint in each cell. An iterative semi-distributed resource allocation (RA) algorithm is first proposed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Communication

سال: 2021

ISSN: ['1876-3219', '1874-4907']

DOI: https://doi.org/10.1016/j.phycom.2021.101476