TY - JOUR
T1 - A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
TT -
JF - IUST
JO - IUST
VL - 13
IS - 4
UR - http://ijeee.iust.ac.ir/article-1-981-en.html
Y1 - 2017
SP - 310
EP - 317
KW - Physical Layer Security
KW - Cooperation
KW - Wireless Network
KW - Power Allocation
KW - Secrecy Rate
KW - Meta-Heuristic.
N2 - Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA), Partial Swarm Optimization (PSO), Bee Algorithm (BA), Tabu Search (TS), Simulated Annealing (SA) and Teaching-Learning-Based Optimization (TLBO). They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM) as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.
M3 10.22068/IJEEE.13.4.310
ER -