CN108989115A - Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer - Google Patents

Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Download PDF

Info

Publication number
CN108989115A
CN108989115A CN201810824649.3A CN201810824649A CN108989115A CN 108989115 A CN108989115 A CN 108989115A CN 201810824649 A CN201810824649 A CN 201810824649A CN 108989115 A CN108989115 A CN 108989115A
Authority
CN
China
Prior art keywords
node
cooperation
interfere
physical layer
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810824649.3A
Other languages
Chinese (zh)
Inventor
黄双林
谭琼应
景爱霞
刘三军
朱黎
张远念
戴昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University for Nationalities
Original Assignee
Hubei University for Nationalities
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University for Nationalities filed Critical Hubei University for Nationalities
Priority to CN201810824649.3A priority Critical patent/CN108989115A/en
Publication of CN108989115A publication Critical patent/CN108989115A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to radio direction findings;Radionavigation;Using radio wave ranging or test the speed;Using the reflection of radio wave or reradiative positioning or there is detection;Using the similar device technical field of other waves, a kind of virtual beams co-interfere is disclosed in the application method of heterogeneous wireless network safety of physical layer, the virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and it is other participate in co-interfere node between distribution of interests relationship modeling be Stackelberg game, by being paid with compensation to power consumed by participation cooperative node, excitation cooperation interfering nodes participate in source node;Competitive relation between each participation cooperative node is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.Cooperation interference is carried out during carrying out important information interaction using the key node of heterogeneous network, prevents malicious node from eavesdropping.

Description

Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
Technical field
The invention belongs to radio direction findings;Radionavigation;Using radio wave ranging or test the speed;Using radio wave There is detection in reflection or reradiative positioning;Similar device technical field more particularly to a kind of virtual wave using other waves Application method of the beam co-interfere in heterogeneous wireless network safety of physical layer.
Background technique
Currently, the prior art commonly used in the trade is such thatWith the rapid development of wireless communication technique, in wireless network Safe information transmission problem is more and more important.In recent years, safety of physical layer technology is since it is independent of the encryption envelope to data Dress but becomes the research hotspot of information security field with the characteristic that information transmission is perfectly safe.It makes an uproar for a band additivity For the degeneration tapping channel of sound, safe capacity CS are as follows: CS=CM-CE, wherein CM and CE is respectively main channel and eavesdropping letter The channel capacity in road.Confidential information exchange can be carried out with the rate of some non-zero between source node and destination node, without Stolen hearer steals any information.Since safe capacity is often depending on the channel condition between source node and its destination node, And the channel condition between source node and listener-in.However, when the channel condition between source node and its destination node compares source When node is worse to the channel condition between listener-in, source node can be obtained secrecy capacity with its destination node and be exactly Zero.The wireless communication of early stage is mainly point-to-point communication, and wireless communication system and wireless terminal are substantially single antenna configuration, nothing Gauze network has a single function, these features make practical safe capacity be zero.Safety of physical layer technology is random using wireless channel The features such as property, time variation and reciprocity can guarantee that the both sides of legitimate correspondence securely communicate in the presence of listener-in Without being ravesdropping any information.Now, the rapid advances for wirelessly communicating physical-layer techniques promote tapping channel new model Occur.For example, aerial array tapping channel, OFDM tapping channel, MIMO tapping channel, multicarrier multicast tapping channel, relaying Cooperation tapping channel etc. can obtain effective secrecy capacity.The junction network model physical layer of multiple relay nodes is asked safely Topic.In multiple relay nodes and multiple eavesdropping nodes there are under scene, relaying is anti-using finite rate using decoding retransmission technique The scheme of feedback has studied the distribution of radio sources node resource.Node location and location-based is eavesdropped under complex network scenarios Channel state information estimation problem about eavesdropping node.For the eavesdropping node being buried in macrocellular network, cellular base station Node is eavesdropped by multiple base stations united positioning, and on this basis, analyzes physics simultaneously by optimization aim of fair demand Layer safely, interfere with each other and power and subcarrier combined optimization problem.Under complex network scenarios eavesdrop node location and The location-based channel state information estimation about eavesdropping node, and the federated resource based on safety of physical layer is analyzed in turn Assignment problem.But the utilization of interference is not accounted for, the characteristics of the technologies such as OFDM and MIMO, restricted and detail etc. asks Topic.When the channel quality between legitimate user couple is worse than tapping channel, it is unable to get effective safe transmission rate.Therefore it assists It is suggested as interference mechanism, the quality of tapping channel is reduced by the means using Human disturbance, to destroy eavesdropping node Intercept capabilities.Several schemes that wireless communication safety of physical layer rate is promoted by collaboration relay node.How cooperation is utilized Relay node further promotes wireless communication safety of physical layer rate using decoding forwarding and cooperation interference scheme for combining.It discusses Major technique and difficult point in terms of ofdm communication system safety of physical layer.Article briefly describes OFDM beam forming simultaneously first The robustness in the case of noise, interference and multipath fading exist is commented on.Then, OFDM beam forming technique is discussed various Robustness under noise jamming attack.Finally, having probed into newest interference attack technology in text and having pointed out some potential Interference attack is fought, the method for improving robustness and reliability.Time domain in MIMO-OFDM system for safety of physical layer is artificial Noise generation technology extends man made noise's technology in MIMO-OFDM system in application, still which limit the days of originator The necessary originator antenna number of line number is not less than the limitation of legal destination's antenna number.It, can also be in addition, in MIMO-OFDM system Using time domain man made noise's generation technology for safety of physical layer.Man made noise is realizing communication system physical layer information safety Aspect has extremely important effect, has the characteristics that illegal node can be interfered and does not influence legitimate correspondence both sides simultaneously. About in the OFDM technology access network existing for the friendly interfering nodes of a source node, multiple insincere nodes and one Resource allocation problem.How research perhaps improves secrecy rate by the interference of friendly interfering nodes or improve whole system Fairness.However, the wireless cooperation node in heterogeneous wireless network has selfishness, incentive mechanism is needed to guarantee that they are participated in It cooperates lucrative.The scheme to be cooperated with compensation using the method for game can motivate selfish relay node to participate in cooperation. Analyze system gaming performance and multiple users share single cooperation interfering nodes of 2 cooperation interfering nodes when assisting jointly is System game performance.Here it can be seen that relaying cooperation technology has further widened the safety of physical layer scope of application, have wide Application prospect.However, radio node has mobility, the characteristic of channel between node due under the conditions of heterogeneous wireless network Dynamic change.Effective safety of physical layer capacity is difficult to be effectively ensured.In view of the selfishness of cooperative node, it has been proposed that The scheme to be cooperated with compensation using the method for game.However the research of early stage mainly considers simple collaborative strategy or right Anti- strategy lacks the confrontation of the more strategy coordinations of multiagent under dynamic network environment and imperfect information and considers, still urgently deeply Expansion research.
In conclusion problem of the existing technology is:Existing cooperative node limited energy and legitimate correspondence user Between QoS requirement it is higher, need multiple cooperative nodes to carry out interference service, cooperative node be unable to reasonable distribution recompense and Efficiency is lower.
Currently, there is many urgent problems to be solved for heterogeneous wireless network information security.And when the nothing under isomerous environment When line terminal carries out access authentication, it is often faced with cross-domain authentication question between heterogeneous network.The access of heterogeneous wireless network Security mechanism includes being mutually authenticated between network and user, being mutually authenticated between user and the communication server between heterogeneous network Be mutually authenticated.Fusion certification between heterogeneous network, which not only increases to generate when authenticating between communications burden and heterogeneous network, frequently cuts The time delay expense changed, and will lead to additional safety problem;The broadcast characteristic of wireless communication system wireless transmission holds that it more It is subject to security threat;The mobility of wireless terminal keeps its safety management difficulty bigger;Wireless communication network topology structure it is more Sample and time variation bring difficulty to the implementation of security mechanism;The unstability of wireless transmission is in addition to influencing wireless communication system Validity and reliability except, the same safety to wireless communication brings challenge.These problems cause mobile communication with And the security mechanism of wireless access technology is more fragile, is easy by security threat.For these problems, existing solution All it is to rely on data encryption encapsulation mechanism, is handled from application layer, it is difficult to solves what heterogeneous wireless network secure aspect faced Predicament.For that purpose it is necessary to solve heterogeneous wireless network peace as much as possible using approaches and methods appropriate with a kind of completely new thinking Full problem.Safety of physical layer capacity technologies are independent of key mechanism, without carrying out encryption encapsulation to data, only by object Reason layer transmission can obtain the information security in absolute sense.The high mobility of radio node under existing heterogeneous wireless network environment Bring the dynamic changes such as the characteristic of channel, network structure.Meanwhile under heterogeneous wireless network environment, each radio node is opposite It is independent, it is the relationship not only cooperated but also competed between each other, node has selfishness.It would therefore be desirable to have adapt to heterogeneous wireless network ring The high dynamic in border and the solution of radio node selfishness.
Solve the difficulty and meaning of above-mentioned technical problem:
Therefore, research is unfolded to following content in the present invention.(1) physical layer is based under further investigated heterogeneous networks scene The node synergistic mechanism of safe capacity, resource allocation mechanism.(2) it is excellent that resource allocation and synergistic combinations under static network environment are constructed The safety of physical layer betting model of change, will be between game subject (source node, destination node, relay node and malicious node) Collaborative strategy and counterplot incorporate game equilibrium solution.(3) aggregators agreement and resource under dynamic network environment are constructed The safety of physical layer Dynamic Game Model of distribution furthers investigate the dynamic equalization strategy of each main body.(4) in dynamic network environment Under, construct the Dynamic Game Model based on imperfect information condition, interbehavior, dynamic cooperation strategy between analysis personnel and Confrontation mechanism.
Radio node in heterogeneous wireless communication networks has mobility, and the relationship between node changes therewith, wireless to save The characteristic of channel between point is among dynamic change.Therefore the relativeness between radio node (close by neighborhood, cooperation System, competitive relation etc.) also in dynamic change.Meanwhile wireless mobile node typically belongs to different main bodys, has selfishness, They participate in cooperation and always select for oneself strategy advantageously.Therefore, there is the source node of Secret Information Transmission, need to pay Certain cost out, compensation cooperative node help it to complete the energy consumption of secret communication, to motivate relay node product trusty Pole participates in cooperation.On the other hand, source node always wants to only pay the lesser cost of radio node to cooperation is participated in, so that it may Obtain the result for enabling oneself be satisfied with.In this way, source node will certainly select those power Price Pricings low, big by the to oneself helping Tripartite's trusted node participates in cooperation.This requires each potential radio node arm's length pricings, can be in numerous alternative sections The advantage that should be occupied is occupied in point, obtains the income of relative maximum.It is based on this consideration, herein selects source node with it Relationship modeling between the credible relay node for the participation cooperation secrecy transmission selected is Stackelberg game, while will be each The relationship modeling between credible relay node vied each other is non-cooperative game.
The dynamic change of integrated survey heterogeneous wireless network node is analyzed agreement and mechanism between radio node, is ground Study carefully resource management and optimization method, it will the flexibility and adaptability for substantially improving heterogeneous wireless network information security are to realize The important foundation of heterogeneous wireless network information security certification integration technology based on safety of physical layer technology.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of virtual beams co-interferes in heterogeneous wireless network The application method of safety of physical layer.
The invention is realized in this way a kind of application of virtual beams co-interfere in heterogeneous wireless network safety of physical layer Method, the virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and other participations Distribution of interests relationship modeling between co-interfere node is Stackelberg game, and source node passes through to participation cooperative node Consumed power is paid with compensation, and excitation cooperation interfering nodes participate in;Competition between each participation cooperative node is closed System is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.
Further, the virtual beams co-interfere includes: in the application method of heterogeneous wireless network safety of physical layer
(1) information that source node broadcasts it is transferred to destination node, allows all relay nodes for participating in relay transmission by power It transmits jam signal respectively again, is expressed as vector z, indicated in the signal that destination receives:
The signal received at eavesdropping node is then are as follows:
ndAnd neIt is illustrated respectively in the noise signal that at destination node and eavesdropping junction receives;
(2) R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, respectively indicate It is as follows:
In the presence of an eavesdropping node, the secrecy rate of acquisition:
Rs=max { 0, Rd-Re};
Rd> ReIt indicates are as follows:
Further, the power of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer point With one constraint of strategy addition:
Optimization problem indicates are as follows:
In formula
PsUnder the conditions of obtaining for determining constant value, the optimized power apportioning cost for participating in the interfering nodes of cooperation is solved;With Optimization problem conversion are as follows:
It is a positive real number.
With PsFor variable:
About PsConvex function, existence anduniquess optimal solution;First derivative is sought, and enabling it is zero to obtain PsOptimization solution are as follows:
The power P of source nodesThe later half item being not less than on the right of above equationIt is equivalent to source node In the presence of no eavesdropping node, reach secrecy rateLowest power consumption.
Further, the interference section of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Point power price strategy:
Wherein: the effectiveness of interfering nodesEnergy costInterfering nodes Jm
Further comprise:
(1) in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each cooperation The utility function of interfering nodesEquilibrium point exist and unique;
Interfering nodes utility function is substituted into obtain:
Objective function aboutFirst derivation is carried out, is obtained:
Objective function aboutSecond order derivation is carried out, is obtained:
(1) whenWhen,Always less than zero.This explanation It is concave function, existence anduniquess maximum value;
(2) whenWhen,Always less than zero.This explanation WithIncrease and reduce.
Further, the virtual beams co-interfere is done in all of application method of heterogeneous wireless network safety of physical layer Disturb the optimization price indication of node are as follows:
Solution obtains:
Calculate initial pricesIt calculatesWithPrice updating is public Formula isIt computes repeatedlyWithWith Lattice more new formula untilLess than stop value.
Realize the virtual beams co-interfere in heterogeneous wireless network object another object of the present invention is to provide a kind of Manage the wireless communication system of the application method of layer safety.
In conclusion advantages of the present invention and good effect are as follows:It is used for cooperative node limited energy and legitimate correspondence The higher scene of QoS requirement between family, needs multiple cooperative nodes to carry out interference service, for reasonable distribution recompense and The efficiency for improving cooperative node, proposes a kind of efficiency optimal power allocation method based on Stackelberg game;The present invention adopts With the double-deck game strategies, optimal payment recompense is determined in the 1st layer of game, and the 2nd layer of game carries out the recompense distribution between cooperative node And power adjustment;According to the double-deck betting model established, it was demonstrated that global optimum's efficiency of system existence anduniquess, and provide The closed solutions of optimal power allocation method.The present invention is that multiple cooperation interfering nodes are assisted jointly under heterogeneous wireless network environment It helps, forms virtual beam forming, help the safe information transmission between source mesh node, confrontation eavesdropping node is to useful information Eavesdropping.Under the heterogeneous network environment that wireless sensor network and WiFi coexist, the information of wireless sensor network is generally required Pass through WiFi network and external progress important information interaction.Connection wireless sensor network and WiFi network artis to close weight It wants, surrounding there is numerous wireless sensor nodes trusty.It is important in artis progress to can use them Cooperation interference is carried out during information exchange, prevents malicious node from eavesdropping.
The present invention is in order to encourage potential credible radio node to participate in cooperation and optimization distribution overall power consumption, on the one hand Source node needs to use power consumed by cooperation interfering nodes with compensation, on the other hand each cooperation interference for participating in cooperation Node can carry out reasonable power cost price and market price (dependent on the section for participating in cooperation according to the importance of self-energy The channel state information of point quantity, node itself, and the relativeness between source node, destination node and eavesdropping node Deng) dynamic adjustment.Cooperation relation between source node and cooperative node is modeled as Stackelberg game by the present invention, respectively Competition and cooperative relationship between a cooperation interfering nodes are modeled as non-cooperative game.
Detailed description of the invention
Fig. 1 is application of the virtual beams co-interfere provided in an embodiment of the present invention in heterogeneous wireless network safety of physical layer Method flow diagram.
Fig. 2 is system model schematic diagram provided in an embodiment of the present invention.
Fig. 3 is J provided in an embodiment of the present invention1IncomeWith its power priceChange curve schematic diagram.
Fig. 4 is cooperation interfering nodes power price provided in an embodiment of the present invention and utility function schematic diagram.
Fig. 5 is the dynamic adjustment schematic diagram of power Price Pricing provided in an embodiment of the present invention and power distribution.
Fig. 6 is cooperation interfering nodes power price provided in an embodiment of the present inventionWith its change in location schematic diagram.
Fig. 7 is cooperation interfering nodes income provided in an embodiment of the present inventionWith its change in location schematic diagram.
Fig. 8 is source node total payoff U provided in an embodiment of the present inventionSWith collaboration relay node change in location schematic diagram.
Fig. 9 is source node total payoff U provided in an embodiment of the present inventionSChange schematic diagram with eavesdropping node location.
Figure 10 is change curve schematic diagram of the power price provided in an embodiment of the present invention with cost price.
Figure 11 is source node total payoff U provided in an embodiment of the present inventionSWith collaboration relay node quantity schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
Between source destination node of the present invention while carrying out information transmission, by cooperating, interfering nodes are cooperatively formed virtually Beam forming is directed toward malice eavesdropping node to realize that safety of physical layer communicates.First by source node and other participation co-interfere sections Distribution of interests relationship modeling between point is Stackelberg game, and source node passes through to function consumed by participation cooperative node Rate is paid with compensation, and excitation cooperation interfering nodes play an active part in.Then by the competitive relation between each participation cooperative node It is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.It is saved in source In the case that safe and secret rate is certain between point and destination node, function of the Game Model about source node and participation cooperative node Rate is distributed and the equilibrium point of power price exists and unique.Simulation result shows that power dynamically distributes and power Dynamic Pricing With good convergence, source node gives thinking for the selection of cooperative node and its quantity.
Application principle of the invention is explained in detail with reference to the accompanying drawing.
As shown in Figure 1, virtual beams co-interfere provided in an embodiment of the present invention is in heterogeneous wireless network safety of physical layer Application method the following steps are included:
S101: it is by the distribution of interests relationship modeling between source node and other participation co-interfere nodes Stackelberg game, source node by paying power consumed by participation cooperative node with compensation, excitation cooperation interference Node plays an active part in;
S102: the competitive relation between each participation cooperative node is configured to non-cooperative game, to promote each node To consumed power arm's length pricing when participating in cooperation.
Application principle of the invention is further described with reference to the accompanying drawing.
1, system model
As shown in Fig. 2, the system considered includes 1 source node S, 1 destination node D, 1 eavesdropping node E and N A cooperation interfering nodes Ji(i ∈ N, N={ 1,2 ..., n }).Node is all made of single antenna and works in semiduplex mode.Surreptitiously Node is listened to eavesdrop information transmitted by source node always;When source node is weaker than main channel to the tapping channel quality between eavesdropping node When quality, safety of physical layer communication is may be implemented in the both sides of legitimate correspondence;The attainable maximum of institute from source node to destination node Safe transmission rate is known as safe capacity, and safe rate is then less than the justifiable rate of safe capacity;When main channel quality is weak When tapping channel, in order to guarantee to transmit the safety of information, needs to resort to the assistance of interfering nodes, sent out by interfering nodes Work of making a gift to someone interference signal is to destroy the quality of tapping channel, to build the environment that can be securely communicated;Here N number of Cooperate interfering nodes J1..., JNIt is all only equipped with omnidirectional's single antenna and is used to transmit data, integration and cooperation realizes that beam forming interference is stolen Listen node.
For the communication scenes of interfering nodes cooperation, entire communication process includes two parts: first is that source node is with power P s Destination node is sent a signal to, while the information will also be ravesdropping node and be eavesdropped, at this time the letter on link S → D and S → E Road gain is respectively Gsd and Gse;Second is that interfering nodes JiArtificial interference signal is externally sent with power P i, at this time link Ji→D And JiThe channel gain of → E is respectively Gid and Gie.It is assumed that source node can obtain the transient channel of every communication channel Information, and every channel obeys Flat quasistatic Rayleigh fading, and in path loss model, path loss coefficient is set as chiseling, eavesdropping Node and the thermal noise power of destination node are expressed as dregs 2.
A Radio Network System model of the invention, all radio nodes all only be equipped with omnidirectional's single antenna be used to transmit and Data are received, and are worked in semiduplex mode.It is by a source node, a destination node, N number of cooperation interference trusty Node JiIt is formed with an eavesdropping node.As shown in Fig. 2, source node wish one eavesdrop node in the presence of it Data are safely transferred to destination node.Variable of the present invention uses following expression.The capitalization representing matrix of black matrix, and it is black The lowercase of body indicates column vector, and the conjugation of matrix, transposition and conjugate transposition use () *, () respectivelyTWithThese three marks Note is to indicate.It is assumed that all communication channels are ergodic flat fading and semi-static channel.Use PsExpression source section The transimission power of point, uses PJRelay node is indicated in order to interfere the biography for confusing the reception for eavesdropping node and sending independent interference signal Defeated power.Then, it is w that the present invention, which defines the weight vector of relay node transmission interference signal,J(N×1)。h0Represent source node and mesh Node between channel, g0It represents source node and eavesdrops the channel between node;H=(N × 1) represent N number of relay node with Channel column vectors between destination node, g (N × 1) represent N number of relay node and eavesdrop the channel column vectors between node.This Outside, it re-definesWithAlso, σ2Indicate noise power.
Entire cooperation scheme is divided into two parts.In the first portion, the information that source node broadcasts it is transferred to purpose section Point.By being totally independent of when this N number of trusted relay node is transmitted respectively by weight in the scheme that the present invention is recommended The jam signal of source node confidential information, purpose are exactly to confuse eavesdropping node.Can thus help source node and Secret communication between its destination node.
It allows all relay nodes for participating in relay transmission to transmit jam signal respectively by weight, is expressed as vector z.This Sample can be expressed as follows in the signal that destination receives:
And the signal that receives then can be at eavesdropping node are as follows:
Here ndAnd neThe noise signal for being illustrated respectively at destination node and being received at eavesdropping node.
In turn, R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, they divide It is not expressed as follows:
Then, in the presence of an eavesdropping node, the secrecy rate that destination node place can obtain then such as Shown in following formula:
Rs=max { 0, Rd-Re} (5)
R is only discussed behind the present inventiond> ReThe case where, therefore above formula can further indicate that are as follows:
2, problem is stated
In practical applications, user link secrecy rate requirement needs are guaranteed.It is assumed that user cipher device rate requirement isThat is when satisfactionWhen, user link secrecy rate requirement will be met.Then, the pass of problem, which is built, seeks to examine ConsiderRestrictive condition under, minimize the payment of source node.Node in wireless cooperative network all belongs to different Individual, and be selfish.Then, source node just needs to take measures to motivate possible relay node help that transmission is forwarded to come from The data of source node.On the other hand, source node needs to select to oneself best relay node.According to source node and relaying section The behavior of point will be analyzed below using the distributed resource allocation scheme based on theory of games.
For source node, it is considered as a buyer, and the purpose is to reach link rate with payment as small as possible Demand.Assuming that UsIndicate the payment of source node, and UsIt is defined as the linear function of transimission power.It is expressed as follows:
Here vsWithRespectively indicate source node and relay node JmPower price,Indicate source node to relay node JmThe power for relaying of purchase.
The transimission power of source node transimission power and the interfering nodes that cooperate is adjusted by joint, source node is always to try to minimum Change the payment of oneself.Then, following formula just can be used to indicate about the optimization problem of source node:
HereIt is vector power, and:
For the interfering nodes that cooperate, they can be considered the seller.Its target, which is not only satisfied with to obtain source node, gives it Participate in the payment of cooperation, and to obtain additional benefit as much as possible by vying each other.So, cooperate interfering nodes Jm Utility function is defined as:
Here,It is the cooperation interfering nodes J of settingmPower cost.Then, for relay node JmIncome it is optimal Change problem can indicate are as follows:
In network model above, in order to maximize their profit, each cooperation interfering nodes not only need and not Interfering nodes competition and source node be at war with.For source node, the power valence that it will be provided according to cooperation interfering nodes Lattice carry out the optimization distribution of power between source node and each interfering nodes.For each interfering nodes, they must be mentioned For the power price of optimization, to obtain maximized effectiveness.Between all interfering nodes, they can be by constantly adjusting Respective power price and carry out vying each other for non-cooperative.Then, source node can be taken as the main side of game, and handle Interfering nodes are as from side.Therefore, it is Stackelberg game between source node and relay node, and is between relay node Non-cooperative game.
3, power and price selection strategy
3.1 power distribution strategies
Due in practical applications, it tends to be difficult to obtain the global information that malice eavesdrops node.So the present invention only allows All interference information for participating in cooperation interference beam formings at destination node are sky.This requires that meeting problem (8) is two The product of a correlation generalized eigenvector problem, is in general extremely difficult.For simplifying the analysis, the present invention will add one A constraint, to completely eliminate interference signal at destination node, it may be assumed that
To which the optimization problem of equation (8) can indicate are as follows:
In above formula
The present invention first assumes PsUnder the conditions of obtaining for determining constant value, the optimization function for participating in the interfering nodes of cooperation is solved Rate apportioning cost.In order to solve the optimization problem of above equation (15), enableWithSo, the optimization problem of equation (15) can be further converted to:
It can be seen that from formula aboveIt is a positive real number.
Lemma 1: it enablesAndFollowing problem:
Solution can indicate are as follows:
It, first can be according to lemma 1It is expressed as μ2Function:
Therefore:
Here k0, km1,km2And km3It is expressed as follows:
Therefore, equation (14) is just further represented as following with PsFor the form of variable:
Equation (22) is about PsConvex function, existence anduniquess optimal solution.Above formula is sought into first derivative, and enabling it be zero can To obtain PsOptimization solution are as follows:
It can be seen that the power of source node is with source node power cost price vsIncrease and successively decrease.But source node Power PsThe later half item being not less than on the right of above equationIt is equivalent to source node in no eavesdropping node In the presence of, reach secrecy rateLowest power consumption.
3.2 interfering nodes power price strategies
In this section, the present invention will discuss the power price strategy of relaying.?It substitutes into (19), available:
Notice that (24) are the non-cooperative game to cooperate between interfering nodes, and the effectiveness of interfering nodesWith energy valence LatticeBetween there is compromises.If interfering nodes JmChannel condition it is good, it is desirable that energy cost it is relatively low, source node will It can be from interference JmMore collaboration power is requested, in this wayIt can be withGrowth and increase.WhenIncrease beyond some value When, select it to participate in cooperation just no longer favorably for source node, even if JmChannel be dominant.In this way, JmIt will reduce Also it therefore reduces.It is therefore desirable to each interfering nodes JmDynamic provides the optimal power with changes in channel conditions Price.Further, since source node can only select those for oneself best interfering nodes, therefore, optimization price also can It is influenced by the bid of other interfering nodes.In addition, the interfering nodes power increased costs that ought cooperate (such as: the energy of node itself Reduce, cooperation request increases with maximum power upper limit value etc.), the starting point power price of the participation cooperation of cooperative node will water therewith Rise height.
Property 1: in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each association Make the utility function of interfering nodesEquilibrium point exist and unique.
It proves: from formula (19) above:
Above formula substitution interfering nodes utility function is obtained again:
To the objective function of the above optimization method aboutFirst derivation is carried out, available:
Again to the objective function of the above optimization method aboutSecond order derivation is carried out, may further be obtained:
Pass through first derivative aboveAnd second dervativeThe present invention can be segmented to divide Analysis.
(1) whenWhen,Always less than zero.This explanation It is concave function, existence anduniquess maximum value.
(2) whenWhen,Always less than zero.This explanation WithIncrease and reduce.
Therefore,Maximum value exists and unique, and property 1 must be demonstrate,proved.
According to analysis above, need pairIt takesDerivative, and enable it be equal to zero, just obtain:
Solve it is all these aboutEquation after, theoretically can be obtained by the optimization price of all interfering nodes, It can be indicated are as follows:
It is available to solve above equation (29):
It must be noted here that calculated by above formulaValue be the power price of source node power and other relay nodes to Determine to obtain in situation.The calculated result of institute's above formula is not to optimize.It obtains meeting the optimal of certain required precision ChangeValue, can be obtained by gradient method recurrence.It the steps include: that (1) calculates initial prices by (31) formula (2) it is calculated by equation (24) formulaWith(cost price isIn the case where, Δ is generally 0.01);(3) price updating formula is(4) it repeats (2) and (3) untilLess than stop value.
3.3 whole network power prices
In heterogeneous wireless network, each node is often merely able to obtain local channel status information.Therefore, either source Distribution of the node for power, or the cooperation respective power Price Pricing of interfering nodes, are all difficult to directly give optimal value.? In this case, it needs between source node and each interfering nodes that cooperate by " each interfering nodes power price → source node Power distribution → each interfering nodes power price → source node power distribution " negotiations process repeatedly.After several rounds, convergence To meeting error requirements optimal value.
Below with reference to emulation to the detailed description of application principle of the invention.
The present invention is in this part to situations such as dynamic power distribution, the variation of price Dynamic Pricing, cost price and convergences Some emulation are done.Herein, system of the invention setting are as follows: wherein source node, destination node and eavesdropping node are along one Straight line is placed.In order to illustrate the effect (representing the variation of wireless channel environment using the effect of distance) of distance, any two Channel model between node is set as a line of signt transmission channel model, and path gain indicates are as follows: d-c/2e, d is indicated here The distance between any two node (unit: rice), c=3.5 indicate the exponential factor of path loss, and θ expression is one uniform Ground is distributed in the random phase between [0,2 π].
In the emulation carried out below, it is assumed that the distance between cooperation interfering nodes are relative to them and source node, purpose It can be ignored for node and eavesdropping node, in this way cooperation interfering nodes to source node, destination node and eavesdropping section The distance between point approximate can be regarded as the same.Source node and destination node are separately fixed at the point in two-dimensional coordinate system (0,0) and point (100,0) (unit: rice).Noise in channel uses additive white Gaussian noise, noise power are as follows: 10-19W.This It invents next emulation and has all carried out 1000 Monte Carlo independent experiments, be then averaged, to obtain average knot Fruit.
Fig. 3 is cooperation interfering nodes J1IncomeWith its power priceChange curve.As we can see from the figure J1IncomeMaximum value existence anduniquess.Fig. 4 depicts cooperation interfering nodes power price and utility function respectively with passing Return time gradually convergent curve (cooperation interference eavesdrops node at coordinate (50,0) at coordinate (30,5)).It can be with from Fig. 5 See the dynamic adjustment of the power Price Pricing by more than 5 rounds and power distribution, the power price and effectiveness of each node Function can rapidly restrain.Fig. 6 is cooperation interfering nodes power priceThe song of dynamic change with its change in location Line, Fig. 7 are cooperation interfering nodes incomesWith its change in location dynamic change curve (cooperation interfering nodes position from Coordinate points (10,5) move along a straight line at coordinate points (90,5), and eavesdropping node is fixed at coordinate points (50,0)).Interference section Point is in different positions, its corresponding channel condition is different, and the price of optimized power dynamically adjusts therewith.From two figures above It can be seen that highest power price does not correspond to highest income.The income of interfering nodes is disappeared by its power price with it The power of consumption codetermines.The power Price Pricing of only interfering nodes is suitable, and source node is just ready to allocate it more function Rate participates in cooperation.Interfering nodes are also because its reasonable selection obtains most incomes.Fig. 8 describes source node total payoff USWith Cooperation interfering nodes change in location and change curve (cooperation interfering nodes position moved along a straight line from coordinate points (10,5) To at coordinate points (90,5), eavesdropping node is fixed at coordinate points (50,0)).It can be seen in from the graph, when cooperation interfering nodes When distance eavesdropping node is nearest, source node total payoff USIt is minimum.As can be seen from FIG., when cooperation interfering nodes distance eavesdropping When node is nearest, source node total payoff USIt is minimum.This is because cooperation interfering nodes distance eavesdropping nodal distance is nearest When for eavesdrop node interference effect it is best, the power of consumption is minimum.Fig. 9 describes source node total payoff US with eavesdropping The curve of node location variation and variation (eavesdropping node is moved at coordinate points (90,0) along straight line from coordinate points (20,0)). Five simulation curves of upper figure respectively correspond cooperation interfering nodes be located at coordinate points (30,5), (40,5), (50,5), The case where at (60,5) and (70,5).It can be seen in from the graph, when eavesdropping nodal distance cooperation interfering nodes are nearest, source Node total payoff is minimum;And the interfering nodes that cooperate are closer apart from source node, the maximum value (source node total payoff) of each curve It is lower.The analysis of comprehensive front selects the cooperation near eavesdropping node when eavesdropping known to node channel status information Interfering nodes are most advantageous;When eavesdrop node channel status information it is unknown when, need to consider the worst situation, selection near The cooperation interfering nodes of source node are most advantageous.
Figure 10 is cooperation interfering nodes J1Power price V1With its cost price c1Increase and increased curve.This be by It is higher in the power cost price for participating in cooperation interfering nodes, it certainly will need accordingly to propose power price to obtain identical income It is high.From the point of view of simulation result, curve approximation linear increase.
Figure 11 describes source node total payoff USWith the curve for participating in the variation of cooperation interfering nodes quantity and changing.Eavesdropping Node is fixed at coordinate points (50,0), and three simulation curves of upper figure respectively correspond interfering nodes and are located at coordinate points The case where at (30,5), (50,5) and (70,5).It can be seen that the total payoff U of source nodeSWith participation cooperation interfering nodes number The increase of amount and reduce.This is because participate in cooperation number of nodes increase, will lead to participate in cooperative node between competition more Add fierceness, and then causes the interfering nodes power Price Pricing for participating in cooperating lower.Seek to cooperate this necessarily lowers source node The cost paid.Therefore, source node always wants to more cooperative relaying node and participates in cooperation interference, with reduce total payoff at This.However, from fig. 1 above 0 it can be seen that after the relay node quantity for participating in cooperation interference transmission reaches 5, source Node total payoff USIt will become slowly to reduce with the increase of collaboration relay node quantity is participated in.In practice, more node ginseng More complicated channel state information is brought to interact expense with cooperative association, so source node seeks 6 or more relay node ginsengs Interference transmission just seems not it is very necessary with cooperating.It not only vied each other but also cooperated between each cooperation interfering nodes, they are independently According to the situation of change (including characteristic of channel, dog-eat-dog degree, energy state etc.) of network environment, dynamic optimization oneself power Price.Correspondingly, source node also can carry out power according to cooperative node power price, the characteristic of channel and self-energy situation etc. Optimization distribution, improves safety of physical layer rate dynamic adaptability.Under heterogeneous wireless network environment, the present invention is saved in an eavesdropping Under point existence condition, source node and destination node carry out cooperation interference by interfering nodes trusty and eavesdrop node, to realize Safety of physical layer communication.In order to motivate cooperation interfering nodes to participate in cooperation, interference malicious node eavesdropping, the present invention is by source node Cooperation interfering nodes between relationship modeling be Stackelberg game, to cooperation interfering nodes consumption power according to city Field price is bought with compensation, and gives the power distribution solution in the certain situation of the market price.Meanwhile each participation cooperation interference Competitive relation between interfering nodes is modeled as non-cooperative game, and each interfering nodes for participating in cooperation are independently believed according to itself Road characteristic, the energy of surplus and power of consumption etc., dynamically adjust power cost price and the market price.
The present invention emulates following several situations.Firstly, being dynamically distributed to power, and dry to each cooperation The emulation for disturbing node power Dynamic Pricing situation shows by dynamic adjustment more than 5 rounds, power distribution and its market price Optimal value is quickly reached, with good convergence.Secondly, to the dynamic change of cooperation interfering nodes and eavesdropping node location Situation is emulated respectively, and result illustrates that the cooperative node under different situations selects thinking.Finally, it can be seen that source section The total payoff U of pointSIt is reduced with the increase for participating in cooperation interfering nodes quantity.However, when the section for participating in cooperation interference transmission After point quantity reaches 5, source node total payoff USIt will become slowly to reduce with the increase of collaboration relay node quantity is participated in, this There is directive significance for the selection for the interfering nodes quantity that cooperates.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (7)

1. a kind of virtual beams co-interfere is in the application method of heterogeneous wireless network safety of physical layer, which is characterized in that described Virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and other participation co-interferes Distribution of interests relationship modeling between node is Stackelberg game, and source node passes through to consumed by participation cooperative node Power is paid with compensation, and excitation cooperation interfering nodes play an active part in;By the competitive relation structure between each participation cooperative node It builds as non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.
2. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer, It is characterized in that, the virtual beams co-interfere includes: in the application method of heterogeneous wireless network safety of physical layer
(1) information that source node broadcasts it is transferred to destination node, allows all relay nodes for participating in cooperation interference by weight point The defeated jam signal of supplementary biography, is expressed as vector z, indicates in the signal that destination receives:
The signal received at eavesdropping node is then are as follows:
ndAnd neIt is illustrated respectively in the noise signal that at destination node and eavesdropping junction receives;
(2) R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, respectively indicate as Under:
In the presence of an eavesdropping node, the secrecy rate of acquisition:
Rs=max { 0, Rd-Re};
Rd> ReIt indicates are as follows:
3. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer, It is characterized in that, the power distribution strategies of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Add a constraint:
Optimization problem indicates are as follows:
In formula
PsUnder the conditions of obtaining for determining constant value, the optimized power apportioning cost for participating in the interfering nodes of cooperation is solved;With Optimization problem conversion are as follows:
It is a positive real number;
With PsFor variable:
About PsConvex function, existence anduniquess optimal solution;First derivative is sought, and enabling it is zero to obtain PsOptimization solution are as follows:
The power P of source nodesThe later half item being not less than on the right of above equationIt, which is equivalent to source node, is not having In the presence of having eavesdropping node, reach secrecy rateLowest power consumption.
4. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer, It is characterized in that, the interfering nodes power of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Price strategy:
Wherein: the effectiveness of interfering nodesEnergy costInterfering nodes Jm
5. virtual beams co-interfere as claimed in claim 4 is in the application method of heterogeneous wireless network safety of physical layer, It is characterized in that, further comprises:
(1) in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each cooperation interference The utility function of nodeEquilibrium point exist and unique;
Interfering nodes utility function is substituted into obtain:
Objective function aboutFirst derivation is carried out, is obtained:
Objective function aboutSecond order derivation is carried out, is obtained:
(1) whenWhen,Always less than zero;ExplanationIt is Concave function, existence anduniquess maximum value;
(2) whenWhen,Always less than zero;ExplanationWith ?Increase and reduce.
6. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer, It is characterized in that, all interfering nodes of the virtual beams co-interfere in the application method of heterogeneous wireless network safety of physical layer Optimization price indication are as follows:
Solution obtains:
Calculate initial pricesIt calculatesWithPrice updating formula isIt computes repeatedlyWith With lattice more new formula untilLess than stop value.
7. virtual beams co-interfere described in a kind of realization claim 1~6 any one is pacified in heterogeneous wireless network physical layer The wireless communication system of full application method.
CN201810824649.3A 2018-07-25 2018-07-25 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Pending CN108989115A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810824649.3A CN108989115A (en) 2018-07-25 2018-07-25 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810824649.3A CN108989115A (en) 2018-07-25 2018-07-25 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer

Publications (1)

Publication Number Publication Date
CN108989115A true CN108989115A (en) 2018-12-11

Family

ID=64551025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810824649.3A Pending CN108989115A (en) 2018-07-25 2018-07-25 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer

Country Status (1)

Country Link
CN (1) CN108989115A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743774A (en) * 2019-03-14 2019-05-10 杭州电子科技大学 A kind of power distribution method for realizing safety of physical layer transmission based on non-cooperative game
CN111726192A (en) * 2020-06-12 2020-09-29 南京航空航天大学 Communication countermeasure medium frequency decision optimization method based on log linear algorithm
CN112799695A (en) * 2020-12-30 2021-05-14 中国人民解放军国防科技大学 Multi-domain multi-source collaborative common scene software reconstruction implementation method
CN113660656A (en) * 2021-06-30 2021-11-16 南京邮电大学 Cooperative physical layer secure communication method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety
US20180083483A1 (en) * 2016-09-22 2018-03-22 Seung Ho Hong Incentive-based demand response method considering hierarchical electricity market

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety
US20180083483A1 (en) * 2016-09-22 2018-03-22 Seung Ho Hong Incentive-based demand response method considering hierarchical electricity market

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHUANGLIN HUANG等: "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network", 《EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING》 *
黄双林: "无线协作中继策略和资源分配方法研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743774A (en) * 2019-03-14 2019-05-10 杭州电子科技大学 A kind of power distribution method for realizing safety of physical layer transmission based on non-cooperative game
CN109743774B (en) * 2019-03-14 2021-08-24 杭州电子科技大学 Power distribution method for realizing physical layer safe transmission based on non-cooperative game
CN111726192A (en) * 2020-06-12 2020-09-29 南京航空航天大学 Communication countermeasure medium frequency decision optimization method based on log linear algorithm
CN111726192B (en) * 2020-06-12 2021-10-26 南京航空航天大学 Communication countermeasure medium frequency decision optimization method based on log linear algorithm
CN112799695A (en) * 2020-12-30 2021-05-14 中国人民解放军国防科技大学 Multi-domain multi-source collaborative common scene software reconstruction implementation method
CN112799695B (en) * 2020-12-30 2022-05-17 中国人民解放军国防科技大学 Multi-domain multi-source collaborative common-scene software reconstruction implementation method
CN113660656A (en) * 2021-06-30 2021-11-16 南京邮电大学 Cooperative physical layer secure communication method
CN113660656B (en) * 2021-06-30 2023-10-17 南京邮电大学 Cooperative physical layer secure communication method

Similar Documents

Publication Publication Date Title
Ji et al. Several key technologies for 6G: Challenges and opportunities
Zhang et al. Improving physical layer security for reconfigurable intelligent surface aided NOMA 6G networks
CN108989115A (en) Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
CN105515717B (en) One kind being based on the scrambled cooperative relaying safe transmission method of man made noise
Wang et al. Strategic antieavesdropping game for physical layer security in wireless cooperative networks
CN108901065A (en) A kind of optimal recompense of efficiency and power distribution method of distribution of interests relationship modeling
CN104540124B (en) A kind of more relaying safety of physical layer methods of known eavesdropping end channel information
Tian et al. Secrecy rate optimization in wireless multi-hop full duplex networks
Al-Talabani et al. Enhancing secrecy rate in cognitive radio networks via stackelberg game
Aman et al. Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook
CN110048751A (en) A kind of optimization method based on multicast frequency control battle array direction modulation
CN107359892B (en) A method of safety of physical layer is realized based on distributing antenna system
Kong et al. Distributed beamforming in the presence of adversaries
He et al. Delay aware secure offloading for NOMA-assisted mobile edge computing in internet of vehicles
He et al. A NOMA and MRC enabled framework in drone-relayed vehicular networks: Height/trajectory optimization and performance analysis
Mao et al. Joint resource allocation and 3D deployment for multi-UAV covert communications
Tourki et al. Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI
Yang et al. Covert rate study for full-duplex D2D communications underlaid cellular networks
Ngo et al. Physical layer security in IRS-assisted cache-enabled satellite communication networks
Alsaba et al. A game-theoretical modelling approach for enhancing the physical layer security of non-orthogonal multiple access system
Liu et al. Exploiting STAR-RIS for physical layer security in integrated sensing and communication networks
Yang et al. Sum rate and max-min rate for cellular-enabled UAV swarm networks
Huang et al. Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network
Amer et al. Secure transmission in wireless sensor networks via reconfigurable intelligent surface
Liu et al. Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181211