CN103227997B - Joint optimization method of safety capacity and energy consumption in wireless relay network - Google Patents

Joint optimization method of safety capacity and energy consumption in wireless relay network Download PDF

Info

Publication number
CN103227997B
CN103227997B CN201310112412.XA CN201310112412A CN103227997B CN 103227997 B CN103227997 B CN 103227997B CN 201310112412 A CN201310112412 A CN 201310112412A CN 103227997 B CN103227997 B CN 103227997B
Authority
CN
China
Prior art keywords
node
energy consumption
function
extreme point
interfering nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310112412.XA
Other languages
Chinese (zh)
Other versions
CN103227997A (en
Inventor
王莉
宋梅
马跃
滕颖蕾
张勇
马鑫
刘洋
魏翼飞
满毅
都晨辉
冯瑞军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201310112412.XA priority Critical patent/CN103227997B/en
Publication of CN103227997A publication Critical patent/CN103227997A/en
Application granted granted Critical
Publication of CN103227997B publication Critical patent/CN103227997B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a joint optimization method of safety capacity and energy consumption in a wireless relay network, and relates to the field of wireless relay network cooperative communication. The method comprises the steps as follows: a safety capacity value from a source node to a destination node is restrained to be SCcon; a minimum energy consumption function of an interference node is obtained by using a beam forming technology according to the SCcon; a minimum energy consumption function of a relay node is obtained according to the SCcon; a minimum energy consumption function Dpower of a system is obtained; a minimum energy consumption value Pmin<ACJ> of the system is obtained at an extreme point of a minimum value of the Dpower, and the restrained safety capacity is released; and an efficiency function RSE of the system energy consumption is calculated. The invention provides a joint optimization strategy of the relay node and the interference node, and an accurate expression of equivalent safety capacity maximization corresponding to the unit energy consumption of the system is obtained, so that each part of energy reaches the maximal usage value, and the problem of balance between the safety and the energy efficiency in the wireless relay network under a single sniffing node is effectively solved.

Description

The combined optimization method of safe capacity and energy ezpenditure in wireless relay network
Technical field
The present invention relates to the collaboration communication field of wireless relay network, be specifically related to the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network.
Background technology
In current wireless relay network, the energy of via node is limited often, and so guaranteeing when predicting data flow that every a energy consumed can both be made the best use of everything will be a necessity and thing highly significant.
At present, the broadcast characteristic of wireless relay network makes safe transmission day by day obtain to pay close attention to widely.Conventional physical safety theory knowledge tells us, under tapping channel existent condition, if think safe transmission information, so just must ensure the channel status that the channel status between source node and destination node is better than source node and eavesdrops between node.Existing be all going the signal to noise ratio improving destination node place to reduce the signal to noise ratio eavesdropping Nodes with maximum effort for the means of linking secure between raising wireless network source node and destination node in essence simultaneously.Amplification forwarding strategy, decoding forwarding strategy and cooperation jamming exposure area is extended based on this.
Current wireless junction network safety, the research of energy-conservation aspect, because in source node and destination node link, the transmission of signal needs the cause relying on energy, although also relate to source node and destination node link safety capacity and the consumption of system self-energy all simultaneously, but be only usually the maximum of the link safety capacity between source node and destination node of deriving of going down in the condition of the transmitting power of restraint joint, or derive under constraint safe capacity is the condition of certain value and calculate the minimum power of configuration node, rarely has case safe capacity and system capacity consumption simultaneously being carried out studying under unconfined condition.And the existing theoretical research for safe capacity is propose cooperation scheme under single property node (via node or interfering nodes) mostly, and it is maximum that such way can not fully make the effect of intermediate node perform to.In addition, the relay selection scheme of the existing factor of consideration safe capacity and energy ezpenditure simultaneously just analyzes the impact of Different factor weights proportioning for final performance, and does not provide both balanced definite solutions.
Therefore, for above deficiency, the invention provides the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network.
Summary of the invention
(1) technical problem solved
For the deficiencies in the prior art, the invention provides the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network, topological structure for wireless relay network provides the strategy of via node and interfering nodes combined optimization, and provide the maximized accurate expression of equivalent safe capacity corresponding to system unit energy ezpenditure based on this strategy, make every a energy can obtain maximum use value.
(2) technical scheme
For realizing above object, the present invention is achieved by the following technical programs:
A combined optimization method for safe capacity and energy ezpenditure in wireless relay network, comprises following steps:
S1, source node is constrained to definite value SC to destination node safe capacity value con;
S2, according to described SC conadopt beam forming technique to obtain interfering nodes minimal energy consumption function simultaneously, namely comprise function || w j|| 2 min; According to described SC conobtain via node minimal energy consumption function, namely comprise function || w r|| 2 min;
S3, the interfering nodes minimal energy consumption function that step S2 is obtained || w j|| 2 minwith via node minimal energy consumption function || w r|| 2 minsummation, obtains system minimal energy consumption function D power; According to comprising system minimal energy consumption function D powercalculate and make D powerobtain minimum value time corresponding extreme point
S4, extreme point according to S3 substitute into D powerthe energy ezpenditure minimum value that the system that calculates is total
Wherein, step S2 adopts beam forming technique, makes with wherein w jfor interfering nodes launches the weight vector of interference signal, H jefor interfering nodes is to the channel gain matrix of eavesdropping node, H jdfor the channel gain matrix between interfering nodes to destination node.
Preferably, in step S2 by solving interfering nodes minimal energy consumption function under definite value and condition of orthogonal constraints || w j|| 2 min,
Calculate interfering nodes minimal energy consumption function, namely comprise function || wj|| 2 minformula be:
Wherein, w jfor interfering nodes launches the weight vector of interference signal, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h jdfor interfering nodes is to the channel gains vector of destination node.
Preferably, obtain via node minimal energy consumption function by eigenvalue method in step S2, namely comprise function || w r|| 2 min;
Calculate via node minimal energy consumption function, namely comprise function || w r|| 2 minformula be:
Wherein, w rfor the weight vector that via node transmits, λ ofor best eigenvalue, P sfor the transmitting power of source node, h srfor source node is to the channel gains vector of via node.
Preferably, system minimal energy consumption function D in step S3 powerexpression formula is:
Wherein, λ ofor best eigenvalue, P sfor the transmitting power of source node, h srfor source node is to the channel gains vector of via node, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h jdfor interfering nodes is to the channel gains vector of destination node.
Preferably, it is characterized in that calculating extreme point in step S3 process be: to described D powerwith for independent variable asks first derivative, namely
Obtain the set of extreme point calculate described set in each extreme point place D powersecond dervative, if namely second dervative is greater than zero:
Then the extreme point of correspondence is included into set in; If set P 2inside only have an extreme point, this extreme point is defined as if set P 2interior more than one extreme point, then substitute into system minimal energy consumption function D respectively power, obtain making D by comparing powerobtain the extreme point of minimum value, the extreme point of this minimum value is defined as
Preferably, it is characterized in that the minimum value calculating system capacity consumption in step S5 for:
Wherein, λ ofor || w r|| 2 minbest eigenvalue corresponding in solution procedure, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h jdfor interfering nodes is to the channel gains vector of destination node.
Preferably, it is characterized in that, after step S4, also comprise S5, the safe capacity retrained in release steps S1, calculate the efficiency function R of ratio as system energy consumption of the total energy ezpenditure minimum value of system in described safe capacity and step S4 sE.
Preferably, it is characterized in that, calculate the efficiency function R of described system energy consumption sEexpression formula is:
Wherein, λ ofor make D powerobtain the characteristic value corresponding to extreme point of minimum value, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h idfor interfering nodes is to the channel gains vector of destination node.
(3) beneficial effect
The method that the present invention is consumed by combined optimization safe capacity and system capacity, efficiently solves the equilibrium problem of fail safe and energy efficiency in wireless relay network under single eavesdropping node.Meanwhile, based on beam forming technique, selected interfering nodes set self-energy distribution makes the safe capacity of link between source node and destination node be improved.
Accompanying drawing explanation
The flow chart of the combined optimization method of safe capacity and energy ezpenditure in figure l, wireless relay network;
The another kind of flow chart of the combined optimization method of safe capacity and energy ezpenditure in Fig. 2, wireless relay network;
Fig. 3, amplification forwarding are held concurrently to cooperate and are disturbed (ACJ) tactful scene schematic diagram;
The changing trend diagram that the safe capacity that under Fig. 4, AF strategy, via node and destination node chain increases with energy ezpenditure;
The changing trend diagram that the safe capacity that under Fig. 5, CJ strategy, via node and destination node chain increases with energy ezpenditure;
The changing trend diagram that the safe capacity that under Fig. 6, ACJ strategy, via node and destination node chain increases with energy ezpenditure;
In Fig. 7, simulation process, AF, CJ, ACJ three strategy contrast tendency chart;
Efficiency function (the R of Fig. 8, system energy consumption sE) emulation tendency chart;
Description of symbols: r sfor source node, r efor eavesdropping node, r dfor the purpose of node, V rfor selected set of relay nodes, V jfor selected interfering nodes set.
Embodiment
The present invention is on the basis of two kinds of existing coordination strategies (amplification forwarding (AF) strategy and cooperation interference (CJ) strategy), for the feature of current wireless junction network, from practicality and the angle how maximizing raising internet security, the amplification forwarding of proposition is held concurrently to cooperate and is disturbed (ACJ) strategy.Shown in the scene schematic diagram 3 of this strategy:
Wherein, r s, r e, r dbe respectively source node, eavesdropping node and destination node, and V rand V jbe respectively selected set of relay nodes and selected interfering nodes set.Via node and interfering nodes cooperation send useful information and noise interferences respectively to destination node and eavesdropping node simultaneously.
As shown in Figure 2, source node r swill to destination node r dsend message, but near destination node, have eavesdropping node r e, in the process that eavesdropping node can transmit in message, message is eavesdropped.In order to ensure r swith r dbetween communication quality and fail safe, r scan select by set of relay nodes r rncome indirectly to r dsend message, meanwhile, in order to improve r s-r dthe safe capacity of link, node set r jmeavesdropping behavior as interfering nodes set pair eavesdropping node is disturbed.
(1) tactful to AF, that CJ is tactful and ACJ is tactful process is analyzed respectively.
1) amplification forwarding (AF) Policy description:
In AF strategy, we know that the process sending interfere information to destination node when source node can be divided into two stages.
Stage one: information broadcasting is sent to destination node and via node by source node.
Stage two: via node by signal amplification forwarding to destination node.
At via node forwarding messages in the process of destination node, via node noise and useful message is together forwarded give destination node.The expression formula formula (1) that we just can obtain the message that destination node receives like this is:
Wherein, P sfor the transmitting power of source node, for the multiplication factor of via node place signal, P 1for total transmitting power of via node.And n rfor the noise signal that via node receives from source node, it obeys multiple Gaussian Profile CN (0, σ 2), x is the information that source node sends, n drepresent the additive white Gaussian noise signal at destination node place, h abfor a-b channel gains vector, w rfor set of relay nodes internal power distributes weight vector, for the conjugate transpose symbol of vector, diag () is structure diagonal matrix function.
Consider when two exist following relation with dimensional vector m and n:
diag(m)n=diag(n)m
Then, formula (1) can be rewritten as again:
Wherein () tfor transpose of a matrix symbol.
Similarly, the signal that we can obtain that listener-in receives is:
Wherein, n erepresent the additive white Gaussian noise signal at destination node place.
Although under this policy, by selecting suitable weight w rthe safe capacity linked between via node with destination node can be made to reach level that one meets basic security demand, but such height of but not our expection.
2) cooperation interference (CJ) Policy description:
In CJ strategy, source node and destination node can direct communications, and the role that the node of centre serves as interfering nodes sends interference signal to destination node and eavesdropping node simultaneously, but due under network condition current relative to selected interfering nodes, between interfering nodes and eavesdropping node, the state of channel is better than the state of channel between interfering nodes and destination node.Now, the signal expression that destination node place receives is:
Wherein () *for complex conjugate symbol, z represents the interference signal that interfering nodes sends, w jfor interfering nodes set internal power distributes weight vector, P sfor the transmitting power of source node, P 2for the transmitting power of interfering nodes.
And eavesdropping reception at Node to signal can be expressed as:
3) coordination strategy proposed in the present invention is AF strategy and the combining of CJ strategy, that is: amplification forwarding cooperation interference (ACJ) of holding concurrently is tactful, 1 analyzes by reference to the accompanying drawings.Consider that the distance of source node and destination node may be distant, in scheme, we suppose can not directly communicate between source node and destination node.ACJ strategy has two stages:
At first stage, source node sends information to selected via node;
At second stage, except the information (comprising noise and useful information) that via node receives to destination node transmission from source node, interfering nodes chosen in both candidate nodes is simultaneously to destination node and eavesdropping node transmission interference signal.
Under ACJ strategy, the signal that destination node receives is:
Eavesdropping reception at Node to signal be:
Below to the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network proposed by the invention, describe in detail in conjunction with the accompanying drawings and embodiments.As shown in Figure l:
S1, source node is constrained to definite value SC to destination node safe capacity value con.
SC=SC con
Wherein, SC confor definite value.
S2, according to described SC conadopt beam forming technique to obtain interfering nodes minimal energy consumption function simultaneously, namely comprise function || w j|| 2 min; According to described SC conobtain via node minimal energy consumption function, namely comprise function || w r|| 2 min.
Wherein adopt beam forming technique, make standing grain mouth wherein w jfor interfering nodes launches the weight vector of interference signal, H jefor interfering nodes is to the channel gain matrix of eavesdropping node, H jdfor the channel gain matrix between interfering nodes to destination node.
Also namely, interfering nodes place energy ezpenditure Solve problems can be described as:
min||w j|| 2
Calculating comprises function || wj|| 2 minformula be:
Wherein, w jfor interfering nodes launches the weight vector of interference signal, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h jdfor interfering nodes is to the channel gains vector of destination node.
Solving of via node minimal energy consumption can be expressed as:
min||w r|| 2
Here,
We suppose ξ >0 and for positive definite matrix (as ξ < 0 and during for negative definite matrix, conclusion is consistent).We have
&lambda; w r = R ~ w r
Equation both sides are multiplied by simultaneously can obtain:
Then above-mentionedly to make minimum problem is just converted into and makes minimum problem.Assuming that λ ofor maximum characteristic value (as ξ <0 and during for negative definite matrix, λ obe taken as minimum characteristic value), what we calculated comprises function || w r|| 2 minformula be:
Wherein, w rfor the weight vector that via node transmits, λ ofor the best eigenvalue selected.
S3, the interfering nodes minimal energy consumption function that step S2 is obtained || w j|| 2 minwith via node minimal energy consumption function || w r|| 2 minsummation, obtains system minimal energy consumption function D power; According to comprising system minimal energy consumption function D powercalculate and make D powerobtain minimum value time corresponding extreme point
We obtain system minimal energy consumption function:
Here our supposition obtains time corresponding for wherein, extreme point is calculated process be: to described D powerwith for independent variable asks first derivative, namely
Obtain the set of extreme point calculate described set in each extreme point place D powersecond dervative, if namely second dervative is greater than zero:
Then the extreme point of correspondence is included into set in; If set P 2inside only have an extreme point, this extreme point is defined as if set P 2interior more than one extreme point, then substitute into D respectively power, obtain making D by comparing powerobtain the extreme point of minimum value, the extreme point of this minimum value is defined as
S4, extreme point according to S3 substitute into D powerthe energy ezpenditure minimum value that the system that calculates is total
Calculating comprises the total energy ezpenditure minimum value of system expression formula be:
Wherein, λ ofor || w r|| 2 mincorresponding best eigenvalue, det () is determinant of a matrix, for the transpose conjugate of vector, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h idfor interfering nodes is to the channel gains vector of destination node, P sfor the transmitting power of source node, h srfor source node is to the channel gains vector of via node.
As entering a kind of optimization to the present embodiment, as shown in Figure 2: above-described embodiment also comprises step below:
The safe capacity retrained in S5, release steps S1, calculates the efficiency function R of ratio as system energy consumption of the total energy ezpenditure minimum value of system in described safe capacity and step S4 sE.
System energy efficiency function R sEexpression formula is:
Wherein, λ ofor make D powerobtain the characteristic value corresponding to extreme point of minimum value.
(2) analyze by reference to the accompanying drawings the present invention respectively for AF strategy, CJ is tactful and ACJ is tactful has carried out simulation comparison.
In ACJ strategy, the Received signal strength that we obtain destination node place is:
Wherein, P sfor the transmitting power of source node, h srfor source node is to the channel gains vector of via node, w rfor via node power allocation vector, w jfor interfering nodes power allocation vector, h rdfor via node is to the channel gains vector of destination node, n dfor the purpose of the additive white Gaussian noise of Nodes.
The Received signal strength of eavesdropping Nodes is:
Wherein, n efor eavesdropping the additive white Gaussian noise of Nodes.
So the peak transfer rate that we obtain on source node and destination node link is:
Wherein,
for via node place power amplification multiple, P sfor the transmitting power of source node.
Source node to the peak transfer rate of eavesdropping node link is:
So the safe capacity that we obtain that source node chains to destination node is:
SC sd ACJ = max { R sd - R se , 0 }
So the maximization Solve problems of safe capacity can be expressed as under ACJ strategy:
Subject to
Wherein, P cfor the gross power consumed in network, P 1for the transmitting power of via node, P 2for the transmitting power of interfering nodes.
Under AF strategy, the signal that destination node place receives is:
Eavesdropping reception at Node to signal be:
Under AF strategy, safe capacity can be expressed as:
Then its maximization Solve problems can be expressed as:
Subject to
Wherein, P cfor the gross power consumed in network, P 3for the transmitting power of via node.
Under CJ strategy, the signal that destination node receives is:
Eavesdropping reception at Node to signal be:
Safe capacity under CJ strategy can be expressed as:
Its maximization solves and can be expressed as:
Subject t0
Wherein, P cfor the gross power consumed in network, P 4for the transmitting power of interfering nodes.
The present invention respectively for AF strategy, CJ is tactful and ACJ is tactful emulates, wherein D aF=[S rdl, S rd2, S rel, S re2] be via node position vector, and D cJ=[S jd1, S jd2, S je1, S je2] be interfering nodes position vector, as S rdlrepresent the distance of first via node to destination node, S ie1represent the distance of first interfering nodes to eavesdropping node.The channel fading model adopted in emulation is P d=PHd , wherein H=1, α=3.5, d are the distance between node, and P is transmitted power, P dfor received power.Simulation result is as follows:
1, in AF strategy, we consider following three kinds of situations respectively:
(1) D aF=[7,8,11,12], the via node distance destination node selected by representative is comparatively near, is the situation having more advantage concerning destination node;
(2) D aF=[7,11,8,12], although represent now destination node still have some superiority, advantage is existing to decline;
(3) D aF=[7,10,7,11], the via node selected by representative now only can ensure that destination node has advantage slightly relative to eavesdropping node.
As shown in Figure 4, simulation result shows, under AF strategy, via node and this safe capacity chained of destination node present the trend increased progressively along with the increase of energy ezpenditure.This meets our expection, because the growth of energy ezpenditure is mainly in order to improve the signal to noise ratio at destination node place, the signal to noise ratio at destination node place adds the increase that destination node will certainly be caused can to obtain transmission rate, finally brings the increase of safe capacity on link.
2, in CJ strategy, we consider following three kinds of situations respectively:
(1) D cJ=[11,12,7,8], the interfering nodes distance eavesdropping node selected by representative is comparatively near, and be very disadvantageous situation concerning eavesdropping node, such interfering nodes will be more strong for the interference of eavesdropping node;
(2) D cJ=[8,12,7,11], the interference of the interfering nodes selected by representative now to eavesdropping node declines to some extent;
(3) D cJ=[7,11,7,10], the now selected interfering nodes of representative, while guarantee does not affect destination node place information transmission, is also very faint to the interference of eavesdropping node, and in other words now destination node only has advantage slightly relative to eavesdropping node.
As shown in Figure 5, this simulation result shows, the safe capacity under CJ strategy between via node and destination node on link is also along with the increase of system capacity consumption increases.This is also the expection meeting us, because the energy increased is mainly in order to disturb the eavesdropping behavior of eavesdropping node, cause the signal to noise ratio of eavesdropping Nodes sharply to worsen, thus reduce its obtainable transmission rate, and then bring the increase of safe capacity on whole link.Just, compared with AF strategy, the lifting of the safe capacity that CJ strategy obtains is not very large.
3, in ACJ strategy, we consider following three kinds of situations respectively:
(1) D aF=[7,8,11,12], D cJ=[11,12,7,8], the interfering nodes distance eavesdropping node selected by representative is comparatively near, be very disadvantageous situation, and selected via node distance destination node is comparatively near, is have more advantage concerning destination node concerning eavesdropping node;
(2) D aF=[7,11,8,12], D cJ=[8,12,7,11], the interference of the interfering nodes selected by representative now to eavesdropping node declines to some extent, although the via node simultaneously still has some superiority to destination node, advantage is existing to decline;
(3) D aF=[7,10,7,11], D cJ=[7,11,7,10], the interfering nodes that representative is now selected and via node only can ensure that destination node has advantage slightly relative to eavesdropping node.
As shown in Figure 6, in this simulation result figure, except the most obvious safe capacity to increase progressively with system capacity consumption and except the trend that increases progressively, clearly, under ACJ strategy, on via node and destination node link, the lifting of safe capacity is very significant.This is also meet our analysis and expection completely, because ACJ strategy incorporates the advantage of AF strategy and CJ strategy, and played just right, also by increasing the signal to noise ratio interference strength of interfering nodes being reduced to eavesdropping Nodes as far as possible while increasing the signal to noise ratio at destination node place by the energy increasing useful signal, so on link, safe capacity just can ensure to obtain maximum improving.
4, AF, CJ, ACJ three strategy contrast
In the simulation, choose the safe capacity of three kinds of strategies under respective best case respectively and contrast, namely
1. AF strategy: D aF=[7,8,11,12] are CJ strategy 2.: D cJ=[11,12,7,8]
3. ACJ strategy: D aF=[7,8,11,12], D cJ=[11,12,7,8]
As shown in Figure 7, in order to contrast, in emulation, suppose that the energy consumed under three kinds of situations is the same.
5, system energy consumption efficiency function (R sE) emulation
As shown in Figure 8, this simulation result is vividly presenting of safe capacity and energy ezpenditure dynamic conditioning result, and result shows that the combined optimization of safe capacity and energy ezpenditure is not a dull process.Based on R above sEdefinition, R sEbe defined as the equivalent maximum safe capacity that per-unit system energy ezpenditure is corresponding, it is the expression of system energy consumption efficiency, and simulation result shows that it exists a maximum (S 0, R 0), if that is S 0reach the requirement of safe capacity, so now (S 0, R 0) be exactly optimum solution.If S 0the safe capacity not reaching link requires so to require the maximum of looking in interval in interval with regard to needing at the safe capacity of setting.In sum, the combined optimization solution that under safe capacity requirement, always existence one is optimum is being met.
Above execution mode is only for illustration of the present invention; and be not limitation of the present invention; the those of ordinary skill of relevant technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all equivalent technical schemes also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (6)

1. the combined optimization method of safe capacity and energy ezpenditure in wireless relay network, is characterized in that, comprise following steps:
S1, source node is constrained to definite value SC to destination node safe capacity value con;
S2, according to described SC conadopt beam forming technique to obtain interfering nodes minimal energy consumption function simultaneously, namely comprise function || w j|| 2 min; According to described SC conobtain via node minimal energy consumption function, namely comprise function || w r|| 2 min;
Adopt beam forming technique, make with
Wherein, w jfor interfering nodes launches the weight vector of interference signal, w rfor the weight vector that via node transmits, for the transpose conjugate of vector, H jefor interfering nodes is to the channel gain matrix of eavesdropping node, H jdfor the channel gain matrix between interfering nodes to destination node;
S3, the interfering nodes minimal energy consumption function that step S2 is obtained || w j|| 2 minwith via node minimal energy consumption function || w r|| 2 minsummation, obtains system minimal energy consumption function D power; According to system minimal energy consumption function D powercalculate and make D powerobtain minimum value time corresponding extreme point
S4, extreme point according to S3 substitute into D powerthe energy ezpenditure minimum value that the system that calculates is total
Under definite value and condition of orthogonal constraints, interfering nodes minimal energy consumption function is solved in step S2 || w j|| 2 min,
Calculate interfering nodes minimal energy consumption function, namely comprise function || w j|| 2 minformula be:
Wherein, for determinant of a matrix, h jefor interfering nodes is to the channel gains vector of eavesdropping node, h jdfor interfering nodes is to the channel gains vector of destination node;
Obtain via node minimal energy consumption function by eigenvalue method in step S2, namely comprise function || w r|| 2 min;
Calculate via node minimal energy consumption function, namely comprise function || w r|| 2 minformula be:
Wherein, λ ofor best eigenvalue, P sfor the transmitting power of source node, h srfor source node is to the channel gains vector of via node.
2. the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network as claimed in claim 1, is characterized in that, system minimal energy consumption function D in step S3 powerexpression formula is:
3. the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network described in claim 2, is characterized in that calculating extreme point in step S3 process be: to described D powerwith for independent variable asks first derivative, namely
Obtain the set of extreme point calculate described set in each extreme point place D powersecond dervative, if namely second dervative is greater than zero:
Then the extreme point of correspondence is included into set in; If set P 2inside only have an extreme point, this extreme point is defined as if set P 2interior more than one extreme point, then substitute into system minimal energy consumption function D respectively power, obtain making D by comparing powerobtain the extreme point of minimum value, the extreme point of this minimum value is defined as
4. the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network according to claim 1, is characterized in that calculating in step S4 the minimum value that system capacity consumes for:
5. the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network as claimed in claim 1, it is characterized in that, also S5 is comprised after step S4, the safe capacity retrained in release steps S1, calculates the efficiency function R of ratio as system energy consumption of the total energy ezpenditure minimum value of system in described safe capacity and step S4 sE.
6. the combined optimization method of safe capacity and energy ezpenditure in a kind of wireless relay network as claimed in claim 5, is characterized in that, calculate the efficiency function R of described system energy consumption sEexpression formula is:
CN201310112412.XA 2013-04-02 2013-04-02 Joint optimization method of safety capacity and energy consumption in wireless relay network Active CN103227997B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310112412.XA CN103227997B (en) 2013-04-02 2013-04-02 Joint optimization method of safety capacity and energy consumption in wireless relay network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310112412.XA CN103227997B (en) 2013-04-02 2013-04-02 Joint optimization method of safety capacity and energy consumption in wireless relay network

Publications (2)

Publication Number Publication Date
CN103227997A CN103227997A (en) 2013-07-31
CN103227997B true CN103227997B (en) 2015-07-15

Family

ID=48838214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310112412.XA Active CN103227997B (en) 2013-04-02 2013-04-02 Joint optimization method of safety capacity and energy consumption in wireless relay network

Country Status (1)

Country Link
CN (1) CN103227997B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105848195A (en) * 2016-03-18 2016-08-10 华南理工大学 Cooperation congestion strategy method based on near-end gradient algorithm

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238B (en) * 2014-03-14 2018-04-24 北京邮电大学 A kind of motivational techniques for the cooperation interference for realizing safety of physical layer
CN104486105B (en) * 2014-12-05 2018-04-20 广东省电信规划设计院有限公司 Transmission network business collocation method and system
CN104540124B (en) * 2014-12-19 2018-05-01 山东大学 A kind of more relaying safety of physical layer methods of known eavesdropping end channel information
CN105050136B (en) * 2015-06-03 2018-08-14 重庆邮电大学 Light wirelessly mixes the adaptive delay perception power-economizing method of broadband access network
CN105142199B (en) * 2015-07-23 2018-11-09 扬州大学 A kind of relay selection method based on thresholding and maximization safe capacity
CN106332259B (en) * 2016-10-11 2019-02-26 西北工业大学 A kind of bilateral relay network increases the optimal power allocation method of safe energy efficiency
CN106376073B (en) * 2016-10-11 2019-01-18 西北工业大学 A kind of optimal power allocation method in insincere junction network
CN107040982B (en) * 2017-03-31 2019-10-01 南京邮电大学 A kind of user's scheduling and power distribution combined optimization method towards unmanned plane junction network
CN107484246B (en) * 2017-09-08 2021-08-17 哈尔滨工业大学深圳研究生院 Resource allocation method, system and storage medium based on cooperative interference
CN107819738B (en) * 2017-09-22 2020-05-12 北京邮电大学 Physical layer safety control method based on power distribution in full-duplex relay system
CN110365393B (en) * 2019-07-04 2021-05-11 西安科技大学 Two-hop wireless relay network capacity calculation method and model

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333368A (en) * 2011-06-13 2012-01-25 西安交通大学 Nonlinear amplification-retransmission optimal power allocation method
CN102611488A (en) * 2012-03-30 2012-07-25 山东大学 Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333368A (en) * 2011-06-13 2012-01-25 西安交通大学 Nonlinear amplification-retransmission optimal power allocation method
CN102611488A (en) * 2012-03-30 2012-07-25 山东大学 Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Novel Security-Oriented Cooperative Scheme for Wireless;Li Wang等;《Global Communications Conference (GLOBECOM), 2012 IEEE》;20121207;第4344-4349页 *
Transmit Power Minimization Under Secrecy Capacity;Jiangyuan Li等;《Statistical Signal Processing, 2009. SSP "09. IEEE/SP 15th Workshop on》;20090903;第217-220页 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105848195A (en) * 2016-03-18 2016-08-10 华南理工大学 Cooperation congestion strategy method based on near-end gradient algorithm
CN105848195B (en) * 2016-03-18 2019-10-18 华南理工大学 A kind of cooperation congestion policies method based on proximal end gradient algorithm

Also Published As

Publication number Publication date
CN103227997A (en) 2013-07-31

Similar Documents

Publication Publication Date Title
CN103227997B (en) Joint optimization method of safety capacity and energy consumption in wireless relay network
Chen et al. Distributed power splitting for SWIPT in relay interference channels using game theory
Ding et al. Distributed beamforming and power allocation for cooperative networks
CN106304112B (en) A kind of cellular network energy efficiency optimization method based on relay cooperative
CN105120503B (en) A kind of high energy efficiency node cooperation transmission method in wireless sensor network
CN107124245A (en) Full duplex one-way junction self-interference suppressing method based on combined transceiving beam forming
Khan et al. Multiobjective optimization of uplink NOMA-enabled vehicle-to-infrastructure communication
Li et al. Energy efficiency of proactive cooperative eavesdropping over multiple suspicious communication links
CN103415077A (en) United relay selection and power distribution method and system
CN104579443A (en) Linear pre-coding method based on multi-cell coordination Massive MIMO system
Li et al. Joint transceiver optimization for wireless information and energy transfer in nonregenerative MIMO relay systems
Liu et al. Improving network capacity scaling law in ultra-dense small cell networks
Wang et al. Cooperative MIMO-OFDM-based exposure-path prevention over 3D clustered wireless camera sensor networks
US8976888B2 (en) Method for uplink multi-user cooperation communication
Nangir et al. Comparison of the MRT and ZF precoding in Massive MIMO systems from Energy Efficiency viewpoint
Saki et al. A comprehensive access point placement for IoT data transmission through train-wayside communications in multi-environment based rail networks
Ofori-Amanfo et al. Multi-hop MIMO relaying based on simultaneous wireless information and power transfer
Ji et al. Adaptive power control for asymmetric two-way amplify-and-forward relaying with individual power constraints
Ji et al. Energy efficiency based cooperative communication in wireless sensor networks
Louie et al. Spatial multiplexing with MMSE receivers in ad hoc networks
Tang et al. Cooperative spectrum sharing in spectrum domain with discrete time energy harvesting for primary user
CN114285504B (en) Large-scale wireless energy supply backscattering communication network transmission performance research method
CN105188123B (en) Relay process and power control combined optimization method for bilateral relay network
CN104811947B (en) A kind of heterogeneous network capacity estimation method and system
Kartlak et al. Joint multiple relay selection and power optimization in two-way relay networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant