论文标题
在合作认知无线电网络中积极窃听的能源效率
Energy Efficiency for Proactive Eavesdropping in Cooperative Cognitive Radio Networks
论文作者
论文摘要
本文研究了合作认知无线电(CR)网络中遥远的主动窃听系统。具体而言,放大和前向(AF)全双工(FD)二级发射器有助于将接收的信号从可疑用户传递到合法的监视器,以进行无线信息监视。作为回报,授予二级发射器以共享属于可疑用户自己的信息传输的频谱。为了改善窃听,传输的辅助用户的信号也可以用作堵塞信号,以缓和可疑链接的数据速率。我们考虑两种情况,即,在次级发射机处的不可忽略的处理延迟(NNPD)和可忽略不计的处理延迟(NPD)。我们的目标是通过共同优化二级发射器处的AF继电器矩阵和预编码向量,以及在监视器处的接收器组合向量,但要受到二级用户的最大功率约束和二级用户的最小数据速度需求的最大功率约束。我们还保证,窃听链接的可实现数据速率应不少于可疑链接的有效监视。由于公式化的NEE最大化问题的非跨性别性,我们分别开发出有效的路径遵循算法和可靠的交替优化方法(AO)方法作为完美和不完美的通道状态信息(CSI)条件下的解决方案。我们还分析了所提出的方案的收敛性和计算复杂性。提供数值结果以验证我们提出的方案的有效性。
This paper investigates a distant proactive eavesdropping system in cooperative cognitive radio (CR) networks. Specifically, an amplify-and-forward (AF) full-duplex (FD) secondary transmitter assists to relay the received signal from suspicious users to legitimate monitor for wireless information surveillance. In return, the secondary transmitter is granted to share the spectrum belonging to the suspicious users for its own information transmission. To improve the eavesdropping, the transmitted secondary user's signal can also be used as a jamming signal to moderate the data rate of the suspicious link. We consider two cases, i.e., non-negligible processing delay (NNPD) and negligible processing delay (NPD) at secondary transmitter. Our target is to maximize network energy efficiency (NEE) via jointly optimizing the AF relay matrix and precoding vector at the secondary transmitter, as well as the receiver combining vector at monitor, subject to the maximum power constraint at the secondary transmitter and minimum data rate requirement of the secondary user. We also guarantee that the achievable data rate of the eavesdropping link should be no less than that of the suspicious link for efficient surveillance. Due to the non-convexity of the formulated NEE maximization problem, we develop an efficient path-following algorithm and a robust alternating optimization (AO) method as solutions under perfect and imperfect channel state information (CSI) conditions, respectively. We also analyze the convergence and computational complexity of the proposed schemes. Numerical results are provided to validate the effectiveness of our proposed schemes.