A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Authors

  • H. Behroozi Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran.
  • M. R. Mosavi Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.
  • N. Okati Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.
Abstract:

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization (PSO), Bee Algorithm (BA), Tabu Search (TS), Simulated Annealing (SA) and Teaching-Learning-Based Optimization (TLBO). They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM) as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks

In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF) full-duplex relay (FDR) networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC) case, where the self-interference signal at each FDR is c...

full text

A Heuristic Approach to Distributed Generation Source Allocation for Electrical Power Distribution Systems

The recent trends in electrical power distribution system operation and management are aimed at improving system conditions in order to render good service to the customer. The reforms in distribution sector have given major scope for employment of distributed generation (DG) resources which will boost the system performance. This paper proposes a heuristic technique for allocation of distribut...

full text

Analysis of Different Cryptosystems Using Meta-heuristic Techniques

With the increasing usage of internet, the need of securing the information is also getting more important. The most widely used technique to make the information secure is cryptography. Cryptanalysis is a method to break the unreadable cipher text without having the key. This paper describes a method of deciphering encrypted messages of Vigenere cipher cryptosystems, Simple substitution crypto...

full text

Meta-heuristic Techniques for Dynamic Channel Allocation (DCA) in Mobile Cellular Networks

The scarcity of radio channel is the main bottleneck in the enhancement of system capacity while maintaining quality of service in mobile cellular networks. A channel allocation scheme which can adapt the varying load of a network may help to overcome that bottleneck to some extent. Thus, dynamic channel allocation (DCA) is an important problem in the mobile cellular networks. In this paper, we...

full text

Improved meta-heuristic techniques for simultaneous capacitor and DG allocation in radial distribution networks

The active and reactive power flow in distribution networks can be effectively controlled by optimally placing Shunt Capacitors (SCs) and Distributed Generators (DGs). This paper presents improved versions of three evolutionary or swarm-based search algorithms, namely, Improved Genetic Algorithm (IGA), Improved Particle Swarm Optimization (IPSO) and Improved Cat Swarm Optimization (ICSO) to eff...

full text

a meta-heuristic approach for the eldsp in flexible flow lines: the power-of-two policy

in this paper, the problem of lot sizing, scheduling and delivery of several items in a two-stage supply chain over a finite planning horizon is studied. single supplier via a flexible flow line production system (ffl) produces several items and delivers them directly to an assembly facility. based on basic period (bp) strategy, a new mixed zero-one nonlinear programming model has been develope...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 13  issue 4

pages  310- 317

publication date 2017-12

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023