当前位置: X-MOL 学术Phys. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Legitimate eavesdropping of wireless powered suspicious communication networks with a monitoring power station
Physical Communication ( IF 2.0 ) Pub Date : 2020-06-06 , DOI: 10.1016/j.phycom.2020.101142
Ding Xu

This paper investigates the legitimate eavesdropping of a wireless powered suspicious communication network. The considered network consists of a wireless powered suspicious transmitter, a suspicious receiver, and a power station. The power station is assumed to be also a monitor to legitimately eavesdrop the suspicious communication with the help from a wireless powered jammer. The problem for maximizing the average eavesdropping rate under the minimum suspicious communication rate constraint and the transmit power constraint at the monitor is investigated, where the time allocation for energy transferring and information transmission, and the power controls of the monitoring power station and the jammer are jointly optimized. By using the Lagrange duality method and exploring the particular problem structure, the closed-form optimal solution is derived. Some valuable insights are also obtained from the optimal solution. Extensive simulations are provided to confirm the superiority of the proposed optimal solution compared to various benchmark algorithms.



中文翻译:

使用监视电站合法窃听无线可疑通信网络

本文研究了无线可疑通信网络的合法窃听。所考虑的网络由无线可疑发射机,可疑接收机和电站组成。假设该电站还是一个监视器,可以在无线干扰器的帮助下合法地窃听可疑通信。研究了在最小可疑通信速率约束和监视器上的发射功率约束下最大化平均窃听率的问题,其中能量传输和信息传输的时间分配以及监视电站和干扰器的功率控制为共同优化。通过使用拉格朗日对偶方法并探索特定的问题结构,得出封闭形式的最优解。从最佳解决方案中也可以获得一些有价值的见解。提供了广泛的仿真,以证实与各种基准算法相比,所提出的最佳解决方案的优越性。

更新日期:2020-06-06
down
wechat
bug