Font Size: a A A

Research On Physical Layer Security Technology Based On Hardware Impairments Communication System

Posted on:2021-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:M Y HuangFull Text:PDF
GTID:2518306515470474Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Because of the broadcasting characteristics of wireless electromagnetic wave,wireless communication network is vulnerable to eavesdropping by unauthorized users,so it is very important to ensure the security of communication system.Traditional encryption mechanisms solve this problem by using different encryption algorithms,which puts an additional burden on wireless networks.Based on the new requirement of secure communication,physical layer security(PLS)has been studied.PLS technology is a kind of technology that utilizes the random characteristics of communication equipment and physical channel to establish secure access and secure communication and provide security guarantee for transmission link.Due to the improvement of communication capability,PLS has an important application prospect in fifth generation mobile communication system(5G)high-rate data transmission encryption,5G authentication,enhanced mobile broadband(e MBB)scenario signaling,and business data integrity protection.In actual communication system,however,due to restricted by factors such as cost,volume and power consumption device,wireless system of Radio Frequency(RF)transceiver devices of various types of hardware impairments(HIs),the influence of such as in-phase and quadrature-phase imbalance(IQI),nonlinear power amplifier and phase noise(PN),etc.Although some calibration and compensation algorithms can usually be used to mitigate these damages,some residual hardware impairments(RHIs)still exists due to the inherent time-invariant characteristics of the hardware and imperfect compensation schemes.In addition,due to channel estimation errors(CEEs)and transmission delays,obtaining perfect channel state information(CSI)is a huge challenge or even impossible.In view of this,considering the RHIs and imperfect CSI for the influence of the security of the communication network is of great theoretical and practical significance.This paper mainly analyzes PLS of wireless communication system in the case of RHIs,and studies the security performance of collaborative communication system and the security performance of multi-antenna/multi-relay collaborative network under simultaneous wireless information and power transfer(SWIPT).The main research contents are as follows:Firstly,the security performance of RHIs based single relay cooperative network is studied.By decode-and-forward(DF)agreement,PLS analysis system in two key indicators of performance evaluation,reliability and security,system outage probability(OP)and intercept probability(IP)closed expression is deduced.In order to further analyze the influence of RHIs parameters and system parameters on OP and IP,the asymptotic expression of system OP and the diversity order of system under the condition of high signal-noise-ratio(SNR)are derived.Secondly,the effect of IQI on multi-relay single eavesdropping SWIPT collaboration network PLS was studied.Considering the IQI,the relevant model of relay system based on RHIs was established.Three kinds of relay selection scheme is put forward,namely random relay selection(RRS),suboptimal relay selection(SRS)and the optimal relay selection(ORS),and the source node to the receiver of illegal considering two connection scenarios,namely direct links and link through the relay,and analyzes the relevant system parameters affect the performance of system security.Finally,the reliability and security performance of the system is studied for multi-relay multi-eavesdropping cooperative network with limited energy.In order to make this study more realistic,three non-ideal factors such as nonlinear energy collector,RHIs and CEEs are considered.Among them,both the source node and the relay node are equipped with nonlinear energy collector with limited energy to obtain energy from the nearby power beacon.In order to improve the reliability and security of the system,three representative relay selection strategies are proposed,and two illegal receiver connection modes are considered,i.e.,collusion connection and non-collusion connection.The asymptotic expression and proportional rule of OP with the number of relays are discussed.
Keywords/Search Tags:physical layer security, in-phase and quadrature-phase imbalance, hardware impairment, imperfect channel state information, outage probability, intercept probability
PDF Full Text Request
Related items