A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

نویسندگان

  • H. Behroozi Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran.
  • M. R. Mosavi Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.
  • N. Okati Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran.
چکیده مقاله:

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization (PSO), Bee Algorithm (BA), Tabu Search (TS), Simulated Annealing (SA) and Teaching-Learning-Based Optimization (TLBO). They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM) as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks

In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF) full-duplex relay (FDR) networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC) case, where the self-interference signal at each FDR is c...

متن کامل

A Heuristic Approach to Distributed Generation Source Allocation for Electrical Power Distribution Systems

The recent trends in electrical power distribution system operation and management are aimed at improving system conditions in order to render good service to the customer. The reforms in distribution sector have given major scope for employment of distributed generation (DG) resources which will boost the system performance. This paper proposes a heuristic technique for allocation of distribut...

متن کامل

Analysis of Different Cryptosystems Using Meta-heuristic Techniques

With the increasing usage of internet, the need of securing the information is also getting more important. The most widely used technique to make the information secure is cryptography. Cryptanalysis is a method to break the unreadable cipher text without having the key. This paper describes a method of deciphering encrypted messages of Vigenere cipher cryptosystems, Simple substitution crypto...

متن کامل

Meta-heuristic Techniques for Dynamic Channel Allocation (DCA) in Mobile Cellular Networks

The scarcity of radio channel is the main bottleneck in the enhancement of system capacity while maintaining quality of service in mobile cellular networks. A channel allocation scheme which can adapt the varying load of a network may help to overcome that bottleneck to some extent. Thus, dynamic channel allocation (DCA) is an important problem in the mobile cellular networks. In this paper, we...

متن کامل

Improved meta-heuristic techniques for simultaneous capacitor and DG allocation in radial distribution networks

The active and reactive power flow in distribution networks can be effectively controlled by optimally placing Shunt Capacitors (SCs) and Distributed Generators (DGs). This paper presents improved versions of three evolutionary or swarm-based search algorithms, namely, Improved Genetic Algorithm (IGA), Improved Particle Swarm Optimization (IPSO) and Improved Cat Swarm Optimization (ICSO) to eff...

متن کامل

a meta-heuristic approach for the eldsp in flexible flow lines: the power-of-two policy

in this paper, the problem of lot sizing, scheduling and delivery of several items in a two-stage supply chain over a finite planning horizon is studied. single supplier via a flexible flow line production system (ffl) produces several items and delivers them directly to an assembly facility. based on basic period (bp) strategy, a new mixed zero-one nonlinear programming model has been develope...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 13  شماره 4

صفحات  310- 317

تاریخ انتشار 2017-12

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023