CN104936251B - A kind of security cooperation relay selection method and system based on optimal power allocation - Google Patents
A kind of security cooperation relay selection method and system based on optimal power allocation Download PDFInfo
- Publication number
- CN104936251B CN104936251B CN201510209007.9A CN201510209007A CN104936251B CN 104936251 B CN104936251 B CN 104936251B CN 201510209007 A CN201510209007 A CN 201510209007A CN 104936251 B CN104936251 B CN 104936251B
- Authority
- CN
- China
- Prior art keywords
- node
- relay
- relay node
- eavesdropping
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/22—Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The relay node of energy decoding success source node signal in security cooperation communication system is included in set of relay nodes Θ by the present invention relates to a kind of security cooperation relay selection method and system based on optimal power allocation, including step S1;Step S2, measure and calculate the relay node i in set of relay nodes Θ to the destination node waveform parameter of the link under Nakagami m channelsWaveform parameters of the relay node i to each link for eavesdropping node under Nakagami m channelsSignal-to-noise ratio mean values of the relay node i to the link of the destination nodeMean power parameters of the relay node i to each link for eavesdropping node under Nakagami m channelsAnd the noise power at each eavesdropping nodeStep S3 is calculated and is chosen data forwarding relay node k;The present invention devises the security cooperation relay selection method based on optimal user power distribution, has innovation and application value, suitable for communication scenes of the channel in the case of unstable, and is suitable for a variety of fading channels.
Description
Technical field
The present invention relates to mobile communication technology field more particularly to a kind of security cooperation relayings based on optimal power allocation
Selection method and system.
Background technology
Although relay cooperative technology brings many facilities to human communication, since the opening of its propagation channel makes
Safe transmission problem also becomes more and more prominent.Traditional secrecy means by key and add using contemporary cryptology as theoretical foundation
Information is encrypted in close algorithm.But Encryption Algorithm be not can not crack completely, as long as listener-in obtain it is enough bright
Text, so that it may break a code in the method using exhaustive attack, in addition secret key may also can be leaked, so this secure fashion
Encounter prodigious challenge.In contrast to this, physical layer information safe practice fully relies on the inherent characteristic of physical layer, such as channel
Fading characteristic and noise have higher reliability to realize secret communication.
The research of relay selection scheme based on safety of physical layer technology has attracted the concern of academia gradually in recent years,
There are related algorithm and scheme to be designed and propose.For example the instant messages of tapping channel are utilized under conditions of being limited with secrecy
Or the opportunistic relay selection scheme that average information is set up, the instant letter of the legal link of this kind of Scheme Choice and eavesdropping link
Make an uproar than the ratio between maximum or legal link Instant SNR and the signal-to-noise ratio variance of eavesdropping link maximum that relaying of ratio
Carry out forwarding information.Or a kind of relay selection scheme with interfering nodes, the program forward source to save after node in selecting
While point information, an interfering nodes is also selected specially to send artificial interference, to reduce the communication quality of eavesdropping link.
Relevant method is also many, although the problem of safety of physical layer is made in consideration in these schemes, they are not all examined
Influence of the power distribution to relay selection in the case of considering under power limited.Therefore, the security cooperation under optimal power allocation is studied
Relay selection is very important.
Invention content
The technical problems to be solved by the invention provide a kind of security cooperation relay selection side based on optimal power allocation
Method and system.
The technical solution that the present invention solves above-mentioned technical problem is as follows:In a kind of security cooperation based on optimal power allocation
After selection method, include the following steps:
The relay node of energy decoding success source node signal in security cooperation communication system is included in relay node by step S1
Set Θ;The security cooperation communication system includes a source node, a destination node, N number of relay node and R eavesdropping section
Point, the security cooperation communication system use Nakagami-m channels, it is assumed that can relaying of the decoding success from source node signal
Node is M, then M≤N, M, N and R are the integer more than zero;
Step S2, measures and calculates required parameter, and required parameter includes the relay node i in the set of relay nodes Θ
To waveform parameter of the link under Nakagami-m channels of the destination nodeChains of the relay node i to eavesdropping node j
Waveform parameter of the road under Nakagami-m channelsSignal-to-noise ratio mean values of the relay node i to the link of the destination nodeMean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsAnd eavesdropping section
Noise power at point jThe wherein described relay node i indicates i-th of relay node in set of relay nodes Θ, and i
≤ M, eavesdropping node j indicate j-th of eavesdropping node, and j≤R, i and j are the integer more than zero;
Step S3 is calculated according to the result of calculation of step S2 and is chosen data forwarding relay node k, the data forwarding
Relay node k is to carry out the relay node k of data relay forwarding, and the relay node k indicates kth in set of relay nodes Θ
A relay node, k are the integer and k≤M more than zero.
Based on the above technical solution, the present invention can also be improved as follows.
Further, in step S1, the eavesdropping node is except the source node, the relay node and the purpose section
Other nodes except point, the eavesdropping node do not receive the direct link signal from the source node, the eavesdropping section
Point can only intercept the signal from the relay node, the source node, the destination node, the relay node and described
Eavesdropping node configures pilot channel.
Further, in step S3, the corresponding relay node k to be selected of each eavesdropping node is calculatedj, kjIndicate jth
The corresponding relay node to be selected of a eavesdropping node;Wherein
When the eavesdropping node is one, R=1, j=1 at this time, the eavesdropping node that is calculated is corresponding to be waited selecting
Relay node k1The as described data forwarding relay node k.
Further, when the eavesdropping node is multiple, i.e. when R >=2, calculate that each the eavesdropping node is corresponding waits for
Select relay node kj;
When calculated all eavesdropping nodes are corresponding when selecting relay node identical, then all eavesdropping nodes are corresponding
Relay node to be selected is the data forwarding relay node k;
When calculated all eavesdropping nodes are corresponding when selecting relay node different, select to wait for selection relaying section
The maximum relay node of safe capacity is the data forwarding relay node k in point;
When having in the corresponding relay node to be selected of calculated all eavesdropping nodes, part is identical to wait for selection relaying section
When point, holding with value and the remaining safety for differing relay node to be selected for the safe capacity of identical relay node to be selected is asked
Amount selects being relayed for the data forwarding with value or the maximum relay node to be selected of safe capacity value for the safe capacity
Node k.
Further, in step S3, when the snr value of relaying node i to the link of destination node is less than interruption thresholdingWhen, relay node i stops transmission data.
The another technical solution that the present invention solves above-mentioned technical problem is as follows:A kind of safety based on optimal power allocation
Cooperating relay selects system, including set of relay nodes structure module, parameter calculating module and data forwarding relay node meter
Calculate module;
The set of relay nodes structure module is used for energy decoding success source node signal in security cooperation communication system
Relay node be included in set of relay nodes Θ;The security cooperation communication system include a source node, a destination node,
N number of relay node and R eavesdropping node, the security cooperation communication system use Nakagami-m channels, it is assumed that can successfully translate
Relay node of the code from source node signal is M, then M≤N, M, N and R are the integer more than zero;
For the parameter calculating module for measuring and calculating required parameter, required parameter includes the set of relay nodes Θ
In relay node i to the destination node waveform parameter of the link under Nakagami-m channelsRelay node i is arrived
Eavesdrop waveform parameter of the link of node j under Nakagami-m channelsLinks of the relay node i to the destination node
Signal-to-noise ratio mean valueMean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsAnd the noise power at eavesdropping node jThe wherein described relay node i is indicated in set of relay nodes Θ i-th
Relay node, and i≤M, eavesdropping node j indicates j-th of eavesdropping node, and j≤R, i and j are the integer more than zero;
The data forwarding relay node computing module is used for the result of calculation according to the parameter calculating module, calculates simultaneously
Choose the relay node k that data forwarding relay node k, the data forwarding relay node k are progress data relay forwarding, and institute
It states relay node k and indicates that k-th of relay node in set of relay nodes Θ, k are the integer and k≤M more than zero.
Based on the above technical solution, the present invention can also be improved as follows.
Further, the eavesdropping node is in addition to the source node, the relay node and the destination node
Other nodes, the eavesdropping node do not receive the direct link signal from the source node, and the eavesdropping node can only be stolen
Hear the signal from the relay node, the source node, the destination node, the relay node and the eavesdropping node
Configure pilot channel.
Further, the corresponding relay node k to be selected of each eavesdropping node is calculatedj, kjIndicate j-th of eavesdropping section
The corresponding relay node to be selected of point;Wherein
When the eavesdropping node is one, R=1, j=1 at this time, the eavesdropping node that is calculated is corresponding to be waited selecting
Relay node k1The as described data forwarding relay node k.
Further, when the eavesdropping node is multiple, i.e. when R >=2, calculate that each the eavesdropping node is corresponding waits for
Select relay node kj;
When calculated all eavesdropping nodes are corresponding when selecting relay node identical, then all eavesdropping nodes are corresponding
Relay node to be selected is the data forwarding relay node k;
When calculated all eavesdropping nodes are corresponding when selecting relay node different, select to wait for selection relaying section
The maximum relay node of safe capacity is the data forwarding relay node k in point;
When having in the corresponding relay node to be selected of calculated all eavesdropping nodes, part is identical to wait for selection relaying section
When point, holding with value and the remaining safety for differing relay node to be selected for the safe capacity of identical relay node to be selected is asked
Amount selects being relayed for the data forwarding with value or the maximum relay node to be selected of safe capacity value for the safe capacity
Node k.
Further, when the snr value of relaying node i to the link of destination node is less than interruption thresholdingWhen, relaying
Node i stops transmission data.
The beneficial effects of the invention are as follows:(1) the method for the present invention considers the pass in power limited this real system application
Key factor devises the security cooperation relay selection method based on optimal user power distribution, has innovation and application value;
(2) present invention uses capacity mean value as the foundation for calculating safe capacity, and the frequency and system for reducing relaying switching are realized again
Miscellaneous degree, be particularly suitable for channel it is unstable in the case of communication scenes;(3) main thought of the invention is applicable not only to
Nakagami-m fading channels are equally applicable to other fading channels.
Description of the drawings
Fig. 1 is the flow chart of the security cooperation relay selection method of the present invention based on optimal power allocation;
Fig. 2 is the structure chart of the security cooperation relay selection system of the present invention based on optimal power allocation.
Specific implementation mode
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the present invention.
As shown in Figure 1, a kind of security cooperation relay selection method based on optimal power allocation, includes the following steps:
The relay node of energy decoding success source node signal in security cooperation communication system is included in relay node by step S1
Set Θ;The security cooperation communication system includes a source node, a destination node, N number of relay node and R eavesdropping section
Point, wherein eavesdropping node is any node in addition to source node, relay node, destination node, using Nakagami-m channels,
Assuming that eavesdropping node does not receive the direct link signal from source node, eavesdropping node can only be intercepted from relay node
Signal, wherein source node, destination node, relay node and eavesdropping node configure pilot channel.Assuming that energy decoding success comes from
The relay node of source node signal is M, then M≤N, M, N and R are the integer more than zero.
Step S2, measures and calculates required parameter, and required parameter includes the relay node i in the set of relay nodes Θ
To waveform parameter of the link under Nakagami-m channels of the destination nodeChains of the relay node i to eavesdropping node j
Waveform parameter of the road under Nakagami-m channelsSignal-to-noise ratio mean values of the relay node i to the link of the destination nodeMean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsAnd eavesdropping section
Noise power at point jThe wherein described relay node i indicates i-th of relay node in set of relay nodes Θ, and i
≤ M, eavesdropping node j indicate j-th of eavesdropping node, and j≤R, i and j are the integer more than zero.The survey calculation of the above parameter
Method is to be fruitful, and is repeated no more.
Step S3 is calculated according to the result of calculation of step S2 and is chosen data forwarding relay node k, the data forwarding
Relay node k is to carry out the relay node k of data relay forwarding, and the relay node k indicates kth in set of relay nodes Θ
A relay node, k≤M.
Calculate the corresponding relay node k to be selected of each eavesdropping nodej, wherein j indicates j-th of eavesdropping node, false
If the eavesdropping node is R, R is the integer more than zero, then j≤R, kjIndicate that node is corresponding waits in selecting for j-th of eavesdropping
After node;Wherein
It should be pointed out that working asWhen, the Nakagami-m channels of the link of relay node i to destination node are changed in quality
For Rayleigh channel, therefore the method for the present invention is equally applicable to Rayleigh channel.
When the eavesdropping node is one, R=1, j=1 at this time, the eavesdropping node that is calculated is corresponding to be waited selecting
Relay node k1The as described data forwarding relay node k.
When the eavesdropping node is multiple, i.e. when R >=2, calculate that each eavesdropping node is corresponding to wait for that selection relays
Node kj;
When calculated all eavesdropping nodes are corresponding when selecting relay node identical, then all eavesdropping nodes are corresponding
Relay node to be selected is the data forwarding relay node k;
When calculated all eavesdropping nodes are corresponding when selecting relay node different, select to wait for selection relaying section
The maximum relay node of safe capacity is the data forwarding relay node k in point;
When having in the corresponding relay node to be selected of calculated all eavesdropping nodes, part is identical to wait for selection relaying section
When point, holding with value and the remaining safety for differing relay node to be selected for the safe capacity of identical relay node to be selected is asked
Amount selects being relayed for the data forwarding with value or the maximum relay node to be selected of safe capacity value for the safe capacity
Node k.
In the case where not doing restriction modification, " signal-to-noise ratio " in the method for the present invention refers both to " Instant SNR ".
The main thought of the present invention is applicable not only to Nakagami-m fading channels, is equally applicable to other fading channels,
Difference lies in the parameter different from of different channels, the formula form different from being derived by, but derivation is identical
's.
Specific embodiment is given below to illustrate the application effect of the present invention.
The security cooperation communication system of the present embodiment is stolen by 1 source node, 3 relay nodes, 1 destination node and 1
It listens node (j=1) to constitute, eavesdrops node and destination node far from source node, eavesdropping node can only be eavesdropped from relay node
Information;Using Nakagami-m channels, system bandwidth 2MHz.
(1) it finds after testing, relay node 1, relay node 2, relay node 3 can letter of the decoding success from source node
Number, therefore 3 relay nodes constitute set of relay nodes Θ;
(3) according to following formula:
By the method for the above-mentioned security cooperation relay selection based on optimal power allocation, one kind is constructed accordingly and is based on
The security cooperation relay selection system of optimal power allocation, as shown in Fig. 2, in a kind of security cooperation based on optimal power allocation
After selection system, including set of relay nodes structure module, parameter calculating module and data forwarding relay node computing module;
The set of relay nodes structure module is used for energy decoding success source node signal in security cooperation communication system
Relay node be included in set of relay nodes Θ;The security cooperation communication system include a source node, a destination node,
N number of relay node and R eavesdropping node, the security cooperation communication system use Nakagami-m channels, it is assumed that can successfully translate
Relay node of the code from source node signal is M, then M≤N, M, N and R are the integer more than zero;
For the parameter calculating module for measuring and calculating required parameter, required parameter includes the set of relay nodes Θ
In relay node i to the destination node waveform parameter of the link under Nakagami-m channelsRelay node i is arrived
Eavesdrop waveform parameter of the link of node j under Nakagami-m channelsLinks of the relay node i to the destination node
Signal-to-noise ratio mean valueMean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsAnd the noise power at eavesdropping node jThe wherein described relay node i is indicated i-th in set of relay nodes Θ
A relay node, and i≤M, eavesdropping node j indicates j-th of eavesdropping node, and j≤R, i and j are the integer more than zero;
The data forwarding relay node computing module is used for the result of calculation according to the parameter calculating module, calculates simultaneously
Choose the relay node k that data forwarding relay node k, the data forwarding relay node k are progress data relay forwarding, and institute
It states relay node k and indicates that k-th of relay node in set of relay nodes Θ, k are the integer and k≤M more than zero.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of security cooperation relay selection method based on optimal power allocation, which is characterized in that include the following steps:
The relay node of energy decoding success source node signal in security cooperation communication system is included in set of relay nodes by step S1
Θ;The security cooperation communication system includes a source node, a destination node, N number of relay node and R eavesdropping node,
The security cooperation communication system uses Nakagami-m channels, it is assumed that can relay node of the decoding success from source node signal
It it is M, then M≤N, M, N and R are the integer more than zero;
Step S2, measures and calculates required parameter, and required parameter includes relay node i in the set of relay nodes Θ to institute
State waveform parameter of the link of destination node under Nakagami-m channelsThe link of relay node i to eavesdropping node j exist
Waveform parameter under Nakagami-m channelsSignal-to-noise ratio mean values of the relay node i to the link of the destination node
Mean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsAnd at eavesdropping node j
Noise powerThe wherein described relay node i indicates i-th of relay node in set of relay nodes Θ, and i≤M, surreptitiously
Node j is listened to indicate j-th of eavesdropping node, and j≤R, i and j are the integer more than zero;
Step S3 is calculated according to the result of calculation of step S2 and is chosen data forwarding relay node k, the data forwarding relaying
Node k is to carry out the relay node k of data relay forwarding, and the relay node k is indicated in set of relay nodes Θ in k-th
After node, k is the integer and k≤M more than zero;
Wherein, in step S3, the corresponding relay node k to be selected of each eavesdropping node is calculatedj, kjIndicate j-th of eavesdropping section
The corresponding relay node to be selected of point;Wherein
And
To correspond to the safe capacity for the relay node i that j-th is eavesdropped node,Destination node is arrived for relay node i
The capacity mean value of link;For relay node i to the capacity mean value of the link of eavesdropping node j;B is security cooperation communication system
The bandwidth of system;Γ () is gamma function;For wave of the link under Nakagami-m channels of relay node i to destination node
Shape parameter;For relay node i to waveform parameter of the link under Nakagami-m channels of eavesdropping node j;For in
After node i to mean power parameter of the link under Nakagami-m channels of eavesdropping node j;For relay node i to purpose
The signal-to-noise ratio of the link of node;For relay node i to the signal-to-noise ratio of the link of eavesdropping node j;It is arrived for relay node i
The signal-to-noise ratio mean value of the link of destination node;For the transmission power of the link of relay node i to destination node;For relaying
Average power limit of the node i to the link of destination node;Link for relay node i to eavesdropping node j is being eavesdropped
Noise power at node j;For the interruption thresholding of the link of relay node i to destination node;ByIt determines;For under Nakagami-m channelsProbability density letter
Number;
When the eavesdropping node is one, R=1, j=1 at this time, the eavesdropping node that is calculated is corresponding to wait for selection relaying
Node k1The as described data forwarding relay node k.
2. the security cooperation relay selection method according to claim 1 based on optimal power allocation, which is characterized in that step
In rapid S1, the eavesdropping node is other nodes in addition to the source node, the relay node and the destination node, institute
It states eavesdropping node and does not receive the direct link signal from the source node, the eavesdropping node can only be intercepted from described
The signal of relay node, the source node, the destination node, the relay node and the eavesdropping node configure pilot tone letter
Road.
3. the security cooperation relay selection method according to claim 1 based on optimal power allocation, which is characterized in that when
When the eavesdropping node is multiple, i.e. when R >=2, calculate the corresponding relay node k to be selected of each eavesdropping nodej;
When calculated all eavesdropping nodes are corresponding when selecting relay node identical, then all eavesdropping nodes are corresponding to be selected
It is the data forwarding relay node k to select relay node;
When calculated all eavesdropping nodes it is corresponding wait select relay node it is different when, select in relay node to be selected
The maximum relay node of safe capacity is the data forwarding relay node k;
When calculated all eavesdropping nodes are corresponding wait selecting have part identical when selecting relay node in relay node,
Ask the safe capacity that relay node to be selected is differed with value and residue of the safe capacity of identical relay node to be selected, choosing
Select the safe capacity is the data forwarding relay node with value or the maximum relay node to be selected of safe capacity value
k。
4. the security cooperation relay selection method according to claim 1 based on optimal power allocation, which is characterized in that step
In rapid S3, when the snr value of relaying node i to the link of destination node is less than interruption thresholdingWhen, relay node i stops
Transmission data.
5. a kind of security cooperation relay selection system based on optimal power allocation, which is characterized in that including set of relay nodes
Build module, parameter calculating module and data forwarding relay node computing module;
The set of relay nodes structure module is used for will be in energy decoding success source node signal in security cooperation communication system
It is included in set of relay nodes Θ after node;The security cooperation communication system includes a source node, a destination node, N number of
Relay node and R eavesdropping node, the security cooperation communication system use Nakagami-m channels, it is assumed that energy decoding success is come
It it is M from the relay node of source node signal, then M≤N, M, N and R are the integer more than zero;
For the parameter calculating module for measuring and calculating required parameter, required parameter includes in the set of relay nodes Θ
Link waveform parameters under Nakagami-m channel of the relay node i to the destination nodeRelay node i to eavesdropping
Waveform parameter of the link of node j under Nakagami-m channelsLetters of the relay node i to the link of the destination node
It makes an uproar and compares mean valueMean power parameter of the link of relay node i to eavesdropping node j under Nakagami-m channelsWith
And the noise power at eavesdropping node jThe wherein described relay node i indicates i-th of relaying in set of relay nodes Θ
Node, and i≤M, eavesdropping node j indicates j-th of eavesdropping node, and j≤R, i and j are the integer more than zero;
The data forwarding relay node computing module is used for the result of calculation according to the parameter calculating module, calculates and chooses
Data forwarding relay node k, the data forwarding relay node k be carry out data relay forwarding relay node k, and it is described in
Indicate that k-th of relay node in set of relay nodes Θ, k are the integer and k≤M more than zero after node k;
Calculate the corresponding relay node k to be selected of each eavesdropping nodej, kjIndicate that node is corresponding waits selecting for j-th of eavesdropping
Relay node;Wherein
And
To correspond to the safe capacity for the relay node i that j-th is eavesdropped node,For the chain of relay node i to destination node
The capacity mean value on road;For relay node i to the capacity mean value of the link of eavesdropping node j;B is the band of security cooperation communication system
It is wide;Γ () is gamma function;For waveform parameter of the link under Nakagami-m channels of relay node i to destination node;For relay node i to waveform parameter of the link under Nakagami-m channels of eavesdropping node j;Be relay node i to steal
Listen mean power parameter of the link of node j under Nakagami-m channels;For the letter of the link of relay node i to destination node
It makes an uproar ratio;For relay node i to the signal-to-noise ratio of the link of eavesdropping node j;For the letter of the link of relay node i to destination node
It makes an uproar and compares mean value;For the transmission power of the link of relay node i to destination node;For the chain of relay node i to destination node
The average power limit on road;Link for relay node i to eavesdropping node j is eavesdropping the noise power at node;
For the interruption thresholding of the link of relay node i to destination node;ByReally
It is fixed;For under Nakagami-m channelsProbability density function;
When the eavesdropping node is one, R=1, j=1 at this time, the eavesdropping node that is calculated is corresponding to wait for selection relaying
Node k1The as described data forwarding relay node k.
6. the security cooperation relay selection system according to claim 5 based on optimal power allocation, which is characterized in that institute
It is other nodes in addition to the source node, the relay node and the destination node to state eavesdropping node, the eavesdropping section
Point does not receive the direct link signal from the source node, and the eavesdropping node can only be intercepted from the relay node
Signal, the source node, the destination node, the relay node and the eavesdropping node configure pilot channel.
7. the security cooperation relay selection system according to claim 5 based on optimal power allocation, which is characterized in that when
When the eavesdropping node is multiple, i.e. when R >=2, calculate the corresponding relay node k to be selected of each eavesdropping nodej;
When calculated all eavesdropping nodes are corresponding when selecting relay node identical, then all eavesdropping nodes are corresponding to be selected
It is the data forwarding relay node k to select relay node;
When calculated all eavesdropping nodes it is corresponding wait select relay node it is different when, select in relay node to be selected
The maximum relay node of safe capacity is the data forwarding relay node k;
When calculated all eavesdropping nodes are corresponding wait selecting have part identical when selecting relay node in relay node,
Ask the safe capacity that relay node to be selected is differed with value and residue of the safe capacity of identical relay node to be selected, choosing
Select the safe capacity is the data forwarding relay node with value or the maximum relay node to be selected of safe capacity value
k。
8. the security cooperation relay selection system according to claim 5 based on optimal power allocation, which is characterized in that when
The snr value of relay node i to the link of destination node, which is less than, interrupts thresholdingWhen, relay node i stops transmission data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510209007.9A CN104936251B (en) | 2015-04-28 | 2015-04-28 | A kind of security cooperation relay selection method and system based on optimal power allocation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510209007.9A CN104936251B (en) | 2015-04-28 | 2015-04-28 | A kind of security cooperation relay selection method and system based on optimal power allocation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104936251A CN104936251A (en) | 2015-09-23 |
CN104936251B true CN104936251B (en) | 2018-08-03 |
Family
ID=54123145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510209007.9A Expired - Fee Related CN104936251B (en) | 2015-04-28 | 2015-04-28 | A kind of security cooperation relay selection method and system based on optimal power allocation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104936251B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105517096B (en) * | 2015-09-30 | 2019-04-02 | 河南科技大学 | A kind of relay selection method of more relaying amplification forward collaboration networks |
CN106533606B (en) * | 2016-10-28 | 2019-01-08 | 国网山东省电力公司莱芜供电公司 | A kind of safe transmission method of physical layer of single antenna amplification forwarding junction network |
CN107197497B (en) * | 2017-06-01 | 2019-07-23 | 湖北工程学院 | Optimal relay selection method and device |
CN109068366B (en) * | 2018-09-28 | 2020-05-26 | 太原科技大学 | Transmission method and system of wireless cognitive network based on physical layer security |
CN109600746B (en) * | 2018-12-14 | 2022-06-21 | 中国人民解放军陆军工程大学 | Performance analysis method of opportunity relay selection scheme in cooperative wireless communication system |
CN112737657B (en) * | 2020-12-29 | 2022-05-31 | 杭州电子科技大学 | Optimal relay node selection and power distribution method under cooperative diversity system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102355661A (en) * | 2011-07-21 | 2012-02-15 | 北京邮电大学 | Non-regenerative-relay-mode-based relay forwarding control method and device |
CN104320826A (en) * | 2014-10-10 | 2015-01-28 | 西安理工大学 | Chance relay-selection method for cooperative communication network under tapping environment |
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102238685B (en) * | 2010-05-06 | 2014-08-20 | 华为技术有限公司 | Method and equipment for relay node selection and power distribution in wireless relay network |
-
2015
- 2015-04-28 CN CN201510209007.9A patent/CN104936251B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102355661A (en) * | 2011-07-21 | 2012-02-15 | 北京邮电大学 | Non-regenerative-relay-mode-based relay forwarding control method and device |
CN104320826A (en) * | 2014-10-10 | 2015-01-28 | 西安理工大学 | Chance relay-selection method for cooperative communication network under tapping environment |
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
Also Published As
Publication number | Publication date |
---|---|
CN104936251A (en) | 2015-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104936251B (en) | A kind of security cooperation relay selection method and system based on optimal power allocation | |
Hu et al. | Covert transmission with a self-sustained relay | |
Feng et al. | Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access | |
Letafati et al. | Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay | |
Mukherjee et al. | Principles of physical layer security in multiuser wireless networks: A survey | |
Shu et al. | On physical layer security for cognitive radio networks | |
Chen et al. | Secure primary transmission assisted by a secondary full-duplex NOMA relay | |
CN104320826B (en) | The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment | |
CN110492996A (en) | A kind of key generation method applied in the extensive mimo system of multi-user | |
Shi et al. | Hybrid cache placement for physical-layer security in cooperative networks | |
CN103402200A (en) | Secret key generation method based on wireless channel characteristics in frequency division duplex system | |
CN111328079B (en) | Multi-antenna hidden communication method for movable eavesdropper | |
CN108880734A (en) | The CCFD-Massive mimo system power distribution method of quantum backtracking chess game optimization | |
Steinmetzer et al. | Lockpicking physical layer key exchange: Weak adversary models invite the thief | |
CN105813081B (en) | The method that selective enhancement recognizes the relay node of junction network security performance | |
Liu et al. | Detecting pilot spoofing attack in MISO systems with trusted user | |
CN109660553A (en) | Downlink safe transmission strategy based on time reversal technology | |
Ara et al. | A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer | |
Lakshmanan et al. | Securing wireless data networks against eavesdropping using smart antennas | |
Chen et al. | Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information | |
Jia et al. | Guaranteeing positive secrecy rate for NOMA system against internal eavesdropping | |
Wu et al. | Mixed numerology interference recognition approach for 5G NR | |
Soltani et al. | Achieving secure communication through pilot manipulation | |
Chatziantoniou et al. | Non-orthogonal multiple access with multi-carrier index keying | |
JP2018137702A (en) | Radio transmission method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180803 Termination date: 20210428 |
|
CF01 | Termination of patent right due to non-payment of annual fee |