RT - Journal Article
T1 - A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
JF - IUST
YR - 2017
JO - IUST
VO - 13
IS - 4
UR - http://ijeee.iust.ac.ir/article-1-981-en.html
SP - 310
EP - 317
K1 - Physical Layer Security
K1 - Cooperation
K1 - Wireless Network
K1 - Power Allocation
K1 - Secrecy Rate
K1 - Meta-Heuristic.
AB - Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization (PSO), Bee Algorithm (BA), Tabu Search (TS), Simulated Annealing (SA) and Teaching-Learning-Based Optimization (TLBO). They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM) as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.
LA eng
UL http://ijeee.iust.ac.ir/article-1-981-en.html
M3 10.22068/IJEEE.13.4.310
ER -