CN108989115A - Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer - Google Patents
Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer Download PDFInfo
- Publication number
- CN108989115A CN108989115A CN201810824649.3A CN201810824649A CN108989115A CN 108989115 A CN108989115 A CN 108989115A CN 201810824649 A CN201810824649 A CN 201810824649A CN 108989115 A CN108989115 A CN 108989115A
- Authority
- CN
- China
- Prior art keywords
- node
- cooperation
- interfere
- physical layer
- wireless network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/60—Jamming involving special techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to radio direction findings;Radionavigation;Using radio wave ranging or test the speed;Using the reflection of radio wave or reradiative positioning or there is detection;Using the similar device technical field of other waves, a kind of virtual beams co-interfere is disclosed in the application method of heterogeneous wireless network safety of physical layer, the virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and it is other participate in co-interfere node between distribution of interests relationship modeling be Stackelberg game, by being paid with compensation to power consumed by participation cooperative node, excitation cooperation interfering nodes participate in source node;Competitive relation between each participation cooperative node is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.Cooperation interference is carried out during carrying out important information interaction using the key node of heterogeneous network, prevents malicious node from eavesdropping.
Description
Technical field
The invention belongs to radio direction findings;Radionavigation;Using radio wave ranging or test the speed;Using radio wave
There is detection in reflection or reradiative positioning;Similar device technical field more particularly to a kind of virtual wave using other waves
Application method of the beam co-interfere in heterogeneous wireless network safety of physical layer.
Background technique
Currently, the prior art commonly used in the trade is such thatWith the rapid development of wireless communication technique, in wireless network
Safe information transmission problem is more and more important.In recent years, safety of physical layer technology is since it is independent of the encryption envelope to data
Dress but becomes the research hotspot of information security field with the characteristic that information transmission is perfectly safe.It makes an uproar for a band additivity
For the degeneration tapping channel of sound, safe capacity CS are as follows: CS=CM-CE, wherein CM and CE is respectively main channel and eavesdropping letter
The channel capacity in road.Confidential information exchange can be carried out with the rate of some non-zero between source node and destination node, without
Stolen hearer steals any information.Since safe capacity is often depending on the channel condition between source node and its destination node,
And the channel condition between source node and listener-in.However, when the channel condition between source node and its destination node compares source
When node is worse to the channel condition between listener-in, source node can be obtained secrecy capacity with its destination node and be exactly
Zero.The wireless communication of early stage is mainly point-to-point communication, and wireless communication system and wireless terminal are substantially single antenna configuration, nothing
Gauze network has a single function, these features make practical safe capacity be zero.Safety of physical layer technology is random using wireless channel
The features such as property, time variation and reciprocity can guarantee that the both sides of legitimate correspondence securely communicate in the presence of listener-in
Without being ravesdropping any information.Now, the rapid advances for wirelessly communicating physical-layer techniques promote tapping channel new model
Occur.For example, aerial array tapping channel, OFDM tapping channel, MIMO tapping channel, multicarrier multicast tapping channel, relaying
Cooperation tapping channel etc. can obtain effective secrecy capacity.The junction network model physical layer of multiple relay nodes is asked safely
Topic.In multiple relay nodes and multiple eavesdropping nodes there are under scene, relaying is anti-using finite rate using decoding retransmission technique
The scheme of feedback has studied the distribution of radio sources node resource.Node location and location-based is eavesdropped under complex network scenarios
Channel state information estimation problem about eavesdropping node.For the eavesdropping node being buried in macrocellular network, cellular base station
Node is eavesdropped by multiple base stations united positioning, and on this basis, analyzes physics simultaneously by optimization aim of fair demand
Layer safely, interfere with each other and power and subcarrier combined optimization problem.Under complex network scenarios eavesdrop node location and
The location-based channel state information estimation about eavesdropping node, and the federated resource based on safety of physical layer is analyzed in turn
Assignment problem.But the utilization of interference is not accounted for, the characteristics of the technologies such as OFDM and MIMO, restricted and detail etc. asks
Topic.When the channel quality between legitimate user couple is worse than tapping channel, it is unable to get effective safe transmission rate.Therefore it assists
It is suggested as interference mechanism, the quality of tapping channel is reduced by the means using Human disturbance, to destroy eavesdropping node
Intercept capabilities.Several schemes that wireless communication safety of physical layer rate is promoted by collaboration relay node.How cooperation is utilized
Relay node further promotes wireless communication safety of physical layer rate using decoding forwarding and cooperation interference scheme for combining.It discusses
Major technique and difficult point in terms of ofdm communication system safety of physical layer.Article briefly describes OFDM beam forming simultaneously first
The robustness in the case of noise, interference and multipath fading exist is commented on.Then, OFDM beam forming technique is discussed various
Robustness under noise jamming attack.Finally, having probed into newest interference attack technology in text and having pointed out some potential
Interference attack is fought, the method for improving robustness and reliability.Time domain in MIMO-OFDM system for safety of physical layer is artificial
Noise generation technology extends man made noise's technology in MIMO-OFDM system in application, still which limit the days of originator
The necessary originator antenna number of line number is not less than the limitation of legal destination's antenna number.It, can also be in addition, in MIMO-OFDM system
Using time domain man made noise's generation technology for safety of physical layer.Man made noise is realizing communication system physical layer information safety
Aspect has extremely important effect, has the characteristics that illegal node can be interfered and does not influence legitimate correspondence both sides simultaneously.
About in the OFDM technology access network existing for the friendly interfering nodes of a source node, multiple insincere nodes and one
Resource allocation problem.How research perhaps improves secrecy rate by the interference of friendly interfering nodes or improve whole system
Fairness.However, the wireless cooperation node in heterogeneous wireless network has selfishness, incentive mechanism is needed to guarantee that they are participated in
It cooperates lucrative.The scheme to be cooperated with compensation using the method for game can motivate selfish relay node to participate in cooperation.
Analyze system gaming performance and multiple users share single cooperation interfering nodes of 2 cooperation interfering nodes when assisting jointly is
System game performance.Here it can be seen that relaying cooperation technology has further widened the safety of physical layer scope of application, have wide
Application prospect.However, radio node has mobility, the characteristic of channel between node due under the conditions of heterogeneous wireless network
Dynamic change.Effective safety of physical layer capacity is difficult to be effectively ensured.In view of the selfishness of cooperative node, it has been proposed that
The scheme to be cooperated with compensation using the method for game.However the research of early stage mainly considers simple collaborative strategy or right
Anti- strategy lacks the confrontation of the more strategy coordinations of multiagent under dynamic network environment and imperfect information and considers, still urgently deeply
Expansion research.
In conclusion problem of the existing technology is:Existing cooperative node limited energy and legitimate correspondence user
Between QoS requirement it is higher, need multiple cooperative nodes to carry out interference service, cooperative node be unable to reasonable distribution recompense and
Efficiency is lower.
Currently, there is many urgent problems to be solved for heterogeneous wireless network information security.And when the nothing under isomerous environment
When line terminal carries out access authentication, it is often faced with cross-domain authentication question between heterogeneous network.The access of heterogeneous wireless network
Security mechanism includes being mutually authenticated between network and user, being mutually authenticated between user and the communication server between heterogeneous network
Be mutually authenticated.Fusion certification between heterogeneous network, which not only increases to generate when authenticating between communications burden and heterogeneous network, frequently cuts
The time delay expense changed, and will lead to additional safety problem;The broadcast characteristic of wireless communication system wireless transmission holds that it more
It is subject to security threat;The mobility of wireless terminal keeps its safety management difficulty bigger;Wireless communication network topology structure it is more
Sample and time variation bring difficulty to the implementation of security mechanism;The unstability of wireless transmission is in addition to influencing wireless communication system
Validity and reliability except, the same safety to wireless communication brings challenge.These problems cause mobile communication with
And the security mechanism of wireless access technology is more fragile, is easy by security threat.For these problems, existing solution
All it is to rely on data encryption encapsulation mechanism, is handled from application layer, it is difficult to solves what heterogeneous wireless network secure aspect faced
Predicament.For that purpose it is necessary to solve heterogeneous wireless network peace as much as possible using approaches and methods appropriate with a kind of completely new thinking
Full problem.Safety of physical layer capacity technologies are independent of key mechanism, without carrying out encryption encapsulation to data, only by object
Reason layer transmission can obtain the information security in absolute sense.The high mobility of radio node under existing heterogeneous wireless network environment
Bring the dynamic changes such as the characteristic of channel, network structure.Meanwhile under heterogeneous wireless network environment, each radio node is opposite
It is independent, it is the relationship not only cooperated but also competed between each other, node has selfishness.It would therefore be desirable to have adapt to heterogeneous wireless network ring
The high dynamic in border and the solution of radio node selfishness.
Solve the difficulty and meaning of above-mentioned technical problem:
Therefore, research is unfolded to following content in the present invention.(1) physical layer is based under further investigated heterogeneous networks scene
The node synergistic mechanism of safe capacity, resource allocation mechanism.(2) it is excellent that resource allocation and synergistic combinations under static network environment are constructed
The safety of physical layer betting model of change, will be between game subject (source node, destination node, relay node and malicious node)
Collaborative strategy and counterplot incorporate game equilibrium solution.(3) aggregators agreement and resource under dynamic network environment are constructed
The safety of physical layer Dynamic Game Model of distribution furthers investigate the dynamic equalization strategy of each main body.(4) in dynamic network environment
Under, construct the Dynamic Game Model based on imperfect information condition, interbehavior, dynamic cooperation strategy between analysis personnel and
Confrontation mechanism.
Radio node in heterogeneous wireless communication networks has mobility, and the relationship between node changes therewith, wireless to save
The characteristic of channel between point is among dynamic change.Therefore the relativeness between radio node (close by neighborhood, cooperation
System, competitive relation etc.) also in dynamic change.Meanwhile wireless mobile node typically belongs to different main bodys, has selfishness,
They participate in cooperation and always select for oneself strategy advantageously.Therefore, there is the source node of Secret Information Transmission, need to pay
Certain cost out, compensation cooperative node help it to complete the energy consumption of secret communication, to motivate relay node product trusty
Pole participates in cooperation.On the other hand, source node always wants to only pay the lesser cost of radio node to cooperation is participated in, so that it may
Obtain the result for enabling oneself be satisfied with.In this way, source node will certainly select those power Price Pricings low, big by the to oneself helping
Tripartite's trusted node participates in cooperation.This requires each potential radio node arm's length pricings, can be in numerous alternative sections
The advantage that should be occupied is occupied in point, obtains the income of relative maximum.It is based on this consideration, herein selects source node with it
Relationship modeling between the credible relay node for the participation cooperation secrecy transmission selected is Stackelberg game, while will be each
The relationship modeling between credible relay node vied each other is non-cooperative game.
The dynamic change of integrated survey heterogeneous wireless network node is analyzed agreement and mechanism between radio node, is ground
Study carefully resource management and optimization method, it will the flexibility and adaptability for substantially improving heterogeneous wireless network information security are to realize
The important foundation of heterogeneous wireless network information security certification integration technology based on safety of physical layer technology.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of virtual beams co-interferes in heterogeneous wireless network
The application method of safety of physical layer.
The invention is realized in this way a kind of application of virtual beams co-interfere in heterogeneous wireless network safety of physical layer
Method, the virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and other participations
Distribution of interests relationship modeling between co-interfere node is Stackelberg game, and source node passes through to participation cooperative node
Consumed power is paid with compensation, and excitation cooperation interfering nodes participate in;Competition between each participation cooperative node is closed
System is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.
Further, the virtual beams co-interfere includes: in the application method of heterogeneous wireless network safety of physical layer
(1) information that source node broadcasts it is transferred to destination node, allows all relay nodes for participating in relay transmission by power
It transmits jam signal respectively again, is expressed as vector z, indicated in the signal that destination receives:
The signal received at eavesdropping node is then are as follows:
ndAnd neIt is illustrated respectively in the noise signal that at destination node and eavesdropping junction receives;
(2) R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, respectively indicate
It is as follows:
In the presence of an eavesdropping node, the secrecy rate of acquisition:
Rs=max { 0, Rd-Re};
Rd> ReIt indicates are as follows:
Further, the power of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer point
With one constraint of strategy addition:
Optimization problem indicates are as follows:
In formula
PsUnder the conditions of obtaining for determining constant value, the optimized power apportioning cost for participating in the interfering nodes of cooperation is solved;With
Optimization problem conversion are as follows:
It is a positive real number.
With PsFor variable:
About PsConvex function, existence anduniquess optimal solution;First derivative is sought, and enabling it is zero to obtain PsOptimization solution are as follows:
The power P of source nodesThe later half item being not less than on the right of above equationIt is equivalent to source node
In the presence of no eavesdropping node, reach secrecy rateLowest power consumption.
Further, the interference section of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
Point power price strategy:
Wherein: the effectiveness of interfering nodesEnergy costInterfering nodes Jm。
Further comprise:
(1) in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each cooperation
The utility function of interfering nodesEquilibrium point exist and unique;
Interfering nodes utility function is substituted into obtain:
Objective function aboutFirst derivation is carried out, is obtained:
Objective function aboutSecond order derivation is carried out, is obtained:
(1) whenWhen,Always less than zero.This explanation
It is concave function, existence anduniquess maximum value;
(2) whenWhen,Always less than zero.This explanation
WithIncrease and reduce.
Further, the virtual beams co-interfere is done in all of application method of heterogeneous wireless network safety of physical layer
Disturb the optimization price indication of node are as follows:
Solution obtains:
Calculate initial pricesIt calculatesWithPrice updating is public
Formula isIt computes repeatedlyWithWith
Lattice more new formula untilLess than stop value.
Realize the virtual beams co-interfere in heterogeneous wireless network object another object of the present invention is to provide a kind of
Manage the wireless communication system of the application method of layer safety.
In conclusion advantages of the present invention and good effect are as follows:It is used for cooperative node limited energy and legitimate correspondence
The higher scene of QoS requirement between family, needs multiple cooperative nodes to carry out interference service, for reasonable distribution recompense and
The efficiency for improving cooperative node, proposes a kind of efficiency optimal power allocation method based on Stackelberg game;The present invention adopts
With the double-deck game strategies, optimal payment recompense is determined in the 1st layer of game, and the 2nd layer of game carries out the recompense distribution between cooperative node
And power adjustment;According to the double-deck betting model established, it was demonstrated that global optimum's efficiency of system existence anduniquess, and provide
The closed solutions of optimal power allocation method.The present invention is that multiple cooperation interfering nodes are assisted jointly under heterogeneous wireless network environment
It helps, forms virtual beam forming, help the safe information transmission between source mesh node, confrontation eavesdropping node is to useful information
Eavesdropping.Under the heterogeneous network environment that wireless sensor network and WiFi coexist, the information of wireless sensor network is generally required
Pass through WiFi network and external progress important information interaction.Connection wireless sensor network and WiFi network artis to close weight
It wants, surrounding there is numerous wireless sensor nodes trusty.It is important in artis progress to can use them
Cooperation interference is carried out during information exchange, prevents malicious node from eavesdropping.
The present invention is in order to encourage potential credible radio node to participate in cooperation and optimization distribution overall power consumption, on the one hand
Source node needs to use power consumed by cooperation interfering nodes with compensation, on the other hand each cooperation interference for participating in cooperation
Node can carry out reasonable power cost price and market price (dependent on the section for participating in cooperation according to the importance of self-energy
The channel state information of point quantity, node itself, and the relativeness between source node, destination node and eavesdropping node
Deng) dynamic adjustment.Cooperation relation between source node and cooperative node is modeled as Stackelberg game by the present invention, respectively
Competition and cooperative relationship between a cooperation interfering nodes are modeled as non-cooperative game.
Detailed description of the invention
Fig. 1 is application of the virtual beams co-interfere provided in an embodiment of the present invention in heterogeneous wireless network safety of physical layer
Method flow diagram.
Fig. 2 is system model schematic diagram provided in an embodiment of the present invention.
Fig. 3 is J provided in an embodiment of the present invention1IncomeWith its power priceChange curve schematic diagram.
Fig. 4 is cooperation interfering nodes power price provided in an embodiment of the present invention and utility function schematic diagram.
Fig. 5 is the dynamic adjustment schematic diagram of power Price Pricing provided in an embodiment of the present invention and power distribution.
Fig. 6 is cooperation interfering nodes power price provided in an embodiment of the present inventionWith its change in location schematic diagram.
Fig. 7 is cooperation interfering nodes income provided in an embodiment of the present inventionWith its change in location schematic diagram.
Fig. 8 is source node total payoff U provided in an embodiment of the present inventionSWith collaboration relay node change in location schematic diagram.
Fig. 9 is source node total payoff U provided in an embodiment of the present inventionSChange schematic diagram with eavesdropping node location.
Figure 10 is change curve schematic diagram of the power price provided in an embodiment of the present invention with cost price.
Figure 11 is source node total payoff U provided in an embodiment of the present inventionSWith collaboration relay node quantity schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
Between source destination node of the present invention while carrying out information transmission, by cooperating, interfering nodes are cooperatively formed virtually
Beam forming is directed toward malice eavesdropping node to realize that safety of physical layer communicates.First by source node and other participation co-interfere sections
Distribution of interests relationship modeling between point is Stackelberg game, and source node passes through to function consumed by participation cooperative node
Rate is paid with compensation, and excitation cooperation interfering nodes play an active part in.Then by the competitive relation between each participation cooperative node
It is configured to non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.It is saved in source
In the case that safe and secret rate is certain between point and destination node, function of the Game Model about source node and participation cooperative node
Rate is distributed and the equilibrium point of power price exists and unique.Simulation result shows that power dynamically distributes and power Dynamic Pricing
With good convergence, source node gives thinking for the selection of cooperative node and its quantity.
Application principle of the invention is explained in detail with reference to the accompanying drawing.
As shown in Figure 1, virtual beams co-interfere provided in an embodiment of the present invention is in heterogeneous wireless network safety of physical layer
Application method the following steps are included:
S101: it is by the distribution of interests relationship modeling between source node and other participation co-interfere nodes
Stackelberg game, source node by paying power consumed by participation cooperative node with compensation, excitation cooperation interference
Node plays an active part in;
S102: the competitive relation between each participation cooperative node is configured to non-cooperative game, to promote each node
To consumed power arm's length pricing when participating in cooperation.
Application principle of the invention is further described with reference to the accompanying drawing.
1, system model
As shown in Fig. 2, the system considered includes 1 source node S, 1 destination node D, 1 eavesdropping node E and N
A cooperation interfering nodes Ji(i ∈ N, N={ 1,2 ..., n }).Node is all made of single antenna and works in semiduplex mode.Surreptitiously
Node is listened to eavesdrop information transmitted by source node always;When source node is weaker than main channel to the tapping channel quality between eavesdropping node
When quality, safety of physical layer communication is may be implemented in the both sides of legitimate correspondence;The attainable maximum of institute from source node to destination node
Safe transmission rate is known as safe capacity, and safe rate is then less than the justifiable rate of safe capacity;When main channel quality is weak
When tapping channel, in order to guarantee to transmit the safety of information, needs to resort to the assistance of interfering nodes, sent out by interfering nodes
Work of making a gift to someone interference signal is to destroy the quality of tapping channel, to build the environment that can be securely communicated;Here N number of
Cooperate interfering nodes J1..., JNIt is all only equipped with omnidirectional's single antenna and is used to transmit data, integration and cooperation realizes that beam forming interference is stolen
Listen node.
For the communication scenes of interfering nodes cooperation, entire communication process includes two parts: first is that source node is with power P s
Destination node is sent a signal to, while the information will also be ravesdropping node and be eavesdropped, at this time the letter on link S → D and S → E
Road gain is respectively Gsd and Gse;Second is that interfering nodes JiArtificial interference signal is externally sent with power P i, at this time link Ji→D
And JiThe channel gain of → E is respectively Gid and Gie.It is assumed that source node can obtain the transient channel of every communication channel
Information, and every channel obeys Flat quasistatic Rayleigh fading, and in path loss model, path loss coefficient is set as chiseling, eavesdropping
Node and the thermal noise power of destination node are expressed as dregs 2.
A Radio Network System model of the invention, all radio nodes all only be equipped with omnidirectional's single antenna be used to transmit and
Data are received, and are worked in semiduplex mode.It is by a source node, a destination node, N number of cooperation interference trusty
Node JiIt is formed with an eavesdropping node.As shown in Fig. 2, source node wish one eavesdrop node in the presence of it
Data are safely transferred to destination node.Variable of the present invention uses following expression.The capitalization representing matrix of black matrix, and it is black
The lowercase of body indicates column vector, and the conjugation of matrix, transposition and conjugate transposition use () *, () respectivelyTWithThese three marks
Note is to indicate.It is assumed that all communication channels are ergodic flat fading and semi-static channel.Use PsExpression source section
The transimission power of point, uses PJRelay node is indicated in order to interfere the biography for confusing the reception for eavesdropping node and sending independent interference signal
Defeated power.Then, it is w that the present invention, which defines the weight vector of relay node transmission interference signal,J(N×1)。h0Represent source node and mesh
Node between channel, g0It represents source node and eavesdrops the channel between node;H=(N × 1) represent N number of relay node with
Channel column vectors between destination node, g (N × 1) represent N number of relay node and eavesdrop the channel column vectors between node.This
Outside, it re-definesWithAlso, σ2Indicate noise power.
Entire cooperation scheme is divided into two parts.In the first portion, the information that source node broadcasts it is transferred to purpose section
Point.By being totally independent of when this N number of trusted relay node is transmitted respectively by weight in the scheme that the present invention is recommended
The jam signal of source node confidential information, purpose are exactly to confuse eavesdropping node.Can thus help source node and
Secret communication between its destination node.
It allows all relay nodes for participating in relay transmission to transmit jam signal respectively by weight, is expressed as vector z.This
Sample can be expressed as follows in the signal that destination receives:
And the signal that receives then can be at eavesdropping node are as follows:
Here ndAnd neThe noise signal for being illustrated respectively at destination node and being received at eavesdropping node.
In turn, R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, they divide
It is not expressed as follows:
Then, in the presence of an eavesdropping node, the secrecy rate that destination node place can obtain then such as
Shown in following formula:
Rs=max { 0, Rd-Re} (5)
R is only discussed behind the present inventiond> ReThe case where, therefore above formula can further indicate that are as follows:
2, problem is stated
In practical applications, user link secrecy rate requirement needs are guaranteed.It is assumed that user cipher device rate requirement isThat is when satisfactionWhen, user link secrecy rate requirement will be met.Then, the pass of problem, which is built, seeks to examine
ConsiderRestrictive condition under, minimize the payment of source node.Node in wireless cooperative network all belongs to different
Individual, and be selfish.Then, source node just needs to take measures to motivate possible relay node help that transmission is forwarded to come from
The data of source node.On the other hand, source node needs to select to oneself best relay node.According to source node and relaying section
The behavior of point will be analyzed below using the distributed resource allocation scheme based on theory of games.
For source node, it is considered as a buyer, and the purpose is to reach link rate with payment as small as possible
Demand.Assuming that UsIndicate the payment of source node, and UsIt is defined as the linear function of transimission power.It is expressed as follows:
Here vsWithRespectively indicate source node and relay node JmPower price,Indicate source node to relay node
JmThe power for relaying of purchase.
The transimission power of source node transimission power and the interfering nodes that cooperate is adjusted by joint, source node is always to try to minimum
Change the payment of oneself.Then, following formula just can be used to indicate about the optimization problem of source node:
HereIt is vector power, and:
For the interfering nodes that cooperate, they can be considered the seller.Its target, which is not only satisfied with to obtain source node, gives it
Participate in the payment of cooperation, and to obtain additional benefit as much as possible by vying each other.So, cooperate interfering nodes Jm
Utility function is defined as:
Here,It is the cooperation interfering nodes J of settingmPower cost.Then, for relay node JmIncome it is optimal
Change problem can indicate are as follows:
In network model above, in order to maximize their profit, each cooperation interfering nodes not only need and not
Interfering nodes competition and source node be at war with.For source node, the power valence that it will be provided according to cooperation interfering nodes
Lattice carry out the optimization distribution of power between source node and each interfering nodes.For each interfering nodes, they must be mentioned
For the power price of optimization, to obtain maximized effectiveness.Between all interfering nodes, they can be by constantly adjusting
Respective power price and carry out vying each other for non-cooperative.Then, source node can be taken as the main side of game, and handle
Interfering nodes are as from side.Therefore, it is Stackelberg game between source node and relay node, and is between relay node
Non-cooperative game.
3, power and price selection strategy
3.1 power distribution strategies
Due in practical applications, it tends to be difficult to obtain the global information that malice eavesdrops node.So the present invention only allows
All interference information for participating in cooperation interference beam formings at destination node are sky.This requires that meeting problem (8) is two
The product of a correlation generalized eigenvector problem, is in general extremely difficult.For simplifying the analysis, the present invention will add one
A constraint, to completely eliminate interference signal at destination node, it may be assumed that
To which the optimization problem of equation (8) can indicate are as follows:
In above formula
The present invention first assumes PsUnder the conditions of obtaining for determining constant value, the optimization function for participating in the interfering nodes of cooperation is solved
Rate apportioning cost.In order to solve the optimization problem of above equation (15), enableWithSo, the optimization problem of equation (15) can be further converted to:
It can be seen that from formula aboveIt is a positive real number.
Lemma 1: it enablesAndFollowing problem:
Solution can indicate are as follows:
It, first can be according to lemma 1It is expressed as μ2Function:
Therefore:
Here k0, km1,km2And km3It is expressed as follows:
Therefore, equation (14) is just further represented as following with PsFor the form of variable:
Equation (22) is about PsConvex function, existence anduniquess optimal solution.Above formula is sought into first derivative, and enabling it be zero can
To obtain PsOptimization solution are as follows:
It can be seen that the power of source node is with source node power cost price vsIncrease and successively decrease.But source node
Power PsThe later half item being not less than on the right of above equationIt is equivalent to source node in no eavesdropping node
In the presence of, reach secrecy rateLowest power consumption.
3.2 interfering nodes power price strategies
In this section, the present invention will discuss the power price strategy of relaying.?It substitutes into (19), available:
Notice that (24) are the non-cooperative game to cooperate between interfering nodes, and the effectiveness of interfering nodesWith energy valence
LatticeBetween there is compromises.If interfering nodes JmChannel condition it is good, it is desirable that energy cost it is relatively low, source node will
It can be from interference JmMore collaboration power is requested, in this wayIt can be withGrowth and increase.WhenIncrease beyond some value
When, select it to participate in cooperation just no longer favorably for source node, even if JmChannel be dominant.In this way, JmIt will reduce Also it therefore reduces.It is therefore desirable to each interfering nodes JmDynamic provides the optimal power with changes in channel conditions
Price.Further, since source node can only select those for oneself best interfering nodes, therefore, optimization price also can
It is influenced by the bid of other interfering nodes.In addition, the interfering nodes power increased costs that ought cooperate (such as: the energy of node itself
Reduce, cooperation request increases with maximum power upper limit value etc.), the starting point power price of the participation cooperation of cooperative node will water therewith
Rise height.
Property 1: in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each association
Make the utility function of interfering nodesEquilibrium point exist and unique.
It proves: from formula (19) above:
Above formula substitution interfering nodes utility function is obtained again:
To the objective function of the above optimization method aboutFirst derivation is carried out, available:
Again to the objective function of the above optimization method aboutSecond order derivation is carried out, may further be obtained:
Pass through first derivative aboveAnd second dervativeThe present invention can be segmented to divide
Analysis.
(1) whenWhen,Always less than zero.This explanation
It is concave function, existence anduniquess maximum value.
(2) whenWhen,Always less than zero.This explanation
WithIncrease and reduce.
Therefore,Maximum value exists and unique, and property 1 must be demonstrate,proved.
According to analysis above, need pairIt takesDerivative, and enable it be equal to zero, just obtain:
Solve it is all these aboutEquation after, theoretically can be obtained by the optimization price of all interfering nodes,
It can be indicated are as follows:
It is available to solve above equation (29):
It must be noted here that calculated by above formulaValue be the power price of source node power and other relay nodes to
Determine to obtain in situation.The calculated result of institute's above formula is not to optimize.It obtains meeting the optimal of certain required precision
ChangeValue, can be obtained by gradient method recurrence.It the steps include: that (1) calculates initial prices by (31) formula
(2) it is calculated by equation (24) formulaWith(cost price isIn the case where, Δ is generally
0.01);(3) price updating formula is(4) it repeats
(2) and (3) untilLess than stop value.
3.3 whole network power prices
In heterogeneous wireless network, each node is often merely able to obtain local channel status information.Therefore, either source
Distribution of the node for power, or the cooperation respective power Price Pricing of interfering nodes, are all difficult to directly give optimal value.?
In this case, it needs between source node and each interfering nodes that cooperate by " each interfering nodes power price → source node
Power distribution → each interfering nodes power price → source node power distribution " negotiations process repeatedly.After several rounds, convergence
To meeting error requirements optimal value.
Below with reference to emulation to the detailed description of application principle of the invention.
The present invention is in this part to situations such as dynamic power distribution, the variation of price Dynamic Pricing, cost price and convergences
Some emulation are done.Herein, system of the invention setting are as follows: wherein source node, destination node and eavesdropping node are along one
Straight line is placed.In order to illustrate the effect (representing the variation of wireless channel environment using the effect of distance) of distance, any two
Channel model between node is set as a line of signt transmission channel model, and path gain indicates are as follows: d-c/2eiθ, d is indicated here
The distance between any two node (unit: rice), c=3.5 indicate the exponential factor of path loss, and θ expression is one uniform
Ground is distributed in the random phase between [0,2 π].
In the emulation carried out below, it is assumed that the distance between cooperation interfering nodes are relative to them and source node, purpose
It can be ignored for node and eavesdropping node, in this way cooperation interfering nodes to source node, destination node and eavesdropping section
The distance between point approximate can be regarded as the same.Source node and destination node are separately fixed at the point in two-dimensional coordinate system
(0,0) and point (100,0) (unit: rice).Noise in channel uses additive white Gaussian noise, noise power are as follows: 10-19W.This
It invents next emulation and has all carried out 1000 Monte Carlo independent experiments, be then averaged, to obtain average knot
Fruit.
Fig. 3 is cooperation interfering nodes J1IncomeWith its power priceChange curve.As we can see from the figure
J1IncomeMaximum value existence anduniquess.Fig. 4 depicts cooperation interfering nodes power price and utility function respectively with passing
Return time gradually convergent curve (cooperation interference eavesdrops node at coordinate (50,0) at coordinate (30,5)).It can be with from Fig. 5
See the dynamic adjustment of the power Price Pricing by more than 5 rounds and power distribution, the power price and effectiveness of each node
Function can rapidly restrain.Fig. 6 is cooperation interfering nodes power priceThe song of dynamic change with its change in location
Line, Fig. 7 are cooperation interfering nodes incomesWith its change in location dynamic change curve (cooperation interfering nodes position from
Coordinate points (10,5) move along a straight line at coordinate points (90,5), and eavesdropping node is fixed at coordinate points (50,0)).Interference section
Point is in different positions, its corresponding channel condition is different, and the price of optimized power dynamically adjusts therewith.From two figures above
It can be seen that highest power price does not correspond to highest income.The income of interfering nodes is disappeared by its power price with it
The power of consumption codetermines.The power Price Pricing of only interfering nodes is suitable, and source node is just ready to allocate it more function
Rate participates in cooperation.Interfering nodes are also because its reasonable selection obtains most incomes.Fig. 8 describes source node total payoff USWith
Cooperation interfering nodes change in location and change curve (cooperation interfering nodes position moved along a straight line from coordinate points (10,5)
To at coordinate points (90,5), eavesdropping node is fixed at coordinate points (50,0)).It can be seen in from the graph, when cooperation interfering nodes
When distance eavesdropping node is nearest, source node total payoff USIt is minimum.As can be seen from FIG., when cooperation interfering nodes distance eavesdropping
When node is nearest, source node total payoff USIt is minimum.This is because cooperation interfering nodes distance eavesdropping nodal distance is nearest
When for eavesdrop node interference effect it is best, the power of consumption is minimum.Fig. 9 describes source node total payoff US with eavesdropping
The curve of node location variation and variation (eavesdropping node is moved at coordinate points (90,0) along straight line from coordinate points (20,0)).
Five simulation curves of upper figure respectively correspond cooperation interfering nodes be located at coordinate points (30,5), (40,5), (50,5),
The case where at (60,5) and (70,5).It can be seen in from the graph, when eavesdropping nodal distance cooperation interfering nodes are nearest, source
Node total payoff is minimum;And the interfering nodes that cooperate are closer apart from source node, the maximum value (source node total payoff) of each curve
It is lower.The analysis of comprehensive front selects the cooperation near eavesdropping node when eavesdropping known to node channel status information
Interfering nodes are most advantageous;When eavesdrop node channel status information it is unknown when, need to consider the worst situation, selection near
The cooperation interfering nodes of source node are most advantageous.
Figure 10 is cooperation interfering nodes J1Power price V1With its cost price c1Increase and increased curve.This be by
It is higher in the power cost price for participating in cooperation interfering nodes, it certainly will need accordingly to propose power price to obtain identical income
It is high.From the point of view of simulation result, curve approximation linear increase.
Figure 11 describes source node total payoff USWith the curve for participating in the variation of cooperation interfering nodes quantity and changing.Eavesdropping
Node is fixed at coordinate points (50,0), and three simulation curves of upper figure respectively correspond interfering nodes and are located at coordinate points
The case where at (30,5), (50,5) and (70,5).It can be seen that the total payoff U of source nodeSWith participation cooperation interfering nodes number
The increase of amount and reduce.This is because participate in cooperation number of nodes increase, will lead to participate in cooperative node between competition more
Add fierceness, and then causes the interfering nodes power Price Pricing for participating in cooperating lower.Seek to cooperate this necessarily lowers source node
The cost paid.Therefore, source node always wants to more cooperative relaying node and participates in cooperation interference, with reduce total payoff at
This.However, from fig. 1 above 0 it can be seen that after the relay node quantity for participating in cooperation interference transmission reaches 5, source
Node total payoff USIt will become slowly to reduce with the increase of collaboration relay node quantity is participated in.In practice, more node ginseng
More complicated channel state information is brought to interact expense with cooperative association, so source node seeks 6 or more relay node ginsengs
Interference transmission just seems not it is very necessary with cooperating.It not only vied each other but also cooperated between each cooperation interfering nodes, they are independently
According to the situation of change (including characteristic of channel, dog-eat-dog degree, energy state etc.) of network environment, dynamic optimization oneself power
Price.Correspondingly, source node also can carry out power according to cooperative node power price, the characteristic of channel and self-energy situation etc.
Optimization distribution, improves safety of physical layer rate dynamic adaptability.Under heterogeneous wireless network environment, the present invention is saved in an eavesdropping
Under point existence condition, source node and destination node carry out cooperation interference by interfering nodes trusty and eavesdrop node, to realize
Safety of physical layer communication.In order to motivate cooperation interfering nodes to participate in cooperation, interference malicious node eavesdropping, the present invention is by source node
Cooperation interfering nodes between relationship modeling be Stackelberg game, to cooperation interfering nodes consumption power according to city
Field price is bought with compensation, and gives the power distribution solution in the certain situation of the market price.Meanwhile each participation cooperation interference
Competitive relation between interfering nodes is modeled as non-cooperative game, and each interfering nodes for participating in cooperation are independently believed according to itself
Road characteristic, the energy of surplus and power of consumption etc., dynamically adjust power cost price and the market price.
The present invention emulates following several situations.Firstly, being dynamically distributed to power, and dry to each cooperation
The emulation for disturbing node power Dynamic Pricing situation shows by dynamic adjustment more than 5 rounds, power distribution and its market price
Optimal value is quickly reached, with good convergence.Secondly, to the dynamic change of cooperation interfering nodes and eavesdropping node location
Situation is emulated respectively, and result illustrates that the cooperative node under different situations selects thinking.Finally, it can be seen that source section
The total payoff U of pointSIt is reduced with the increase for participating in cooperation interfering nodes quantity.However, when the section for participating in cooperation interference transmission
After point quantity reaches 5, source node total payoff USIt will become slowly to reduce with the increase of collaboration relay node quantity is participated in, this
There is directive significance for the selection for the interfering nodes quantity that cooperates.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (7)
1. a kind of virtual beams co-interfere is in the application method of heterogeneous wireless network safety of physical layer, which is characterized in that described
Virtual beams co-interfere heterogeneous wireless network safety of physical layer application method by source node and other participation co-interferes
Distribution of interests relationship modeling between node is Stackelberg game, and source node passes through to consumed by participation cooperative node
Power is paid with compensation, and excitation cooperation interfering nodes play an active part in;By the competitive relation structure between each participation cooperative node
It builds as non-cooperative game, to promote each node when participating in cooperation to consumed power arm's length pricing.
2. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer,
It is characterized in that, the virtual beams co-interfere includes: in the application method of heterogeneous wireless network safety of physical layer
(1) information that source node broadcasts it is transferred to destination node, allows all relay nodes for participating in cooperation interference by weight point
The defeated jam signal of supplementary biography, is expressed as vector z, indicates in the signal that destination receives:
The signal received at eavesdropping node is then are as follows:
ndAnd neIt is illustrated respectively in the noise signal that at destination node and eavesdropping junction receives;
(2) R is expressed as with the eavesdropping obtainable information rate in node place at destination nodedAnd Re, respectively indicate as
Under:
In the presence of an eavesdropping node, the secrecy rate of acquisition:
Rs=max { 0, Rd-Re};
Rd> ReIt indicates are as follows:
3. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer,
It is characterized in that, the power distribution strategies of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
Add a constraint:
Optimization problem indicates are as follows:
In formula
PsUnder the conditions of obtaining for determining constant value, the optimized power apportioning cost for participating in the interfering nodes of cooperation is solved;With
Optimization problem conversion are as follows:
It is a positive real number;
With PsFor variable:
About PsConvex function, existence anduniquess optimal solution;First derivative is sought, and enabling it is zero to obtain PsOptimization solution are as follows:
The power P of source nodesThe later half item being not less than on the right of above equationIt, which is equivalent to source node, is not having
In the presence of having eavesdropping node, reach secrecy rateLowest power consumption.
4. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer,
It is characterized in that, the interfering nodes power of application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
Price strategy:
Wherein: the effectiveness of interfering nodesEnergy costInterfering nodes Jm。
5. virtual beams co-interfere as claimed in claim 4 is in the application method of heterogeneous wireless network safety of physical layer,
It is characterized in that, further comprises:
(1) in the case that the power price of source node power and other cooperation interfering nodes immobilizes, each cooperation interference
The utility function of nodeEquilibrium point exist and unique;
Interfering nodes utility function is substituted into obtain:
Objective function aboutFirst derivation is carried out, is obtained:
Objective function aboutSecond order derivation is carried out, is obtained:
(1) whenWhen,Always less than zero;ExplanationIt is
Concave function, existence anduniquess maximum value;
(2) whenWhen,Always less than zero;ExplanationWith
?Increase and reduce.
6. virtual beams co-interfere as described in claim 1 is in the application method of heterogeneous wireless network safety of physical layer,
It is characterized in that, all interfering nodes of the virtual beams co-interfere in the application method of heterogeneous wireless network safety of physical layer
Optimization price indication are as follows:
Solution obtains:
Calculate initial pricesIt calculatesWithPrice updating formula isIt computes repeatedlyWith
With lattice more new formula untilLess than stop value.
7. virtual beams co-interfere described in a kind of realization claim 1~6 any one is pacified in heterogeneous wireless network physical layer
The wireless communication system of full application method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810824649.3A CN108989115A (en) | 2018-07-25 | 2018-07-25 | Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810824649.3A CN108989115A (en) | 2018-07-25 | 2018-07-25 | Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108989115A true CN108989115A (en) | 2018-12-11 |
Family
ID=64551025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810824649.3A Pending CN108989115A (en) | 2018-07-25 | 2018-07-25 | Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989115A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743774A (en) * | 2019-03-14 | 2019-05-10 | 杭州电子科技大学 | A kind of power distribution method for realizing safety of physical layer transmission based on non-cooperative game |
CN111726192A (en) * | 2020-06-12 | 2020-09-29 | 南京航空航天大学 | Communication countermeasure medium frequency decision optimization method based on log linear algorithm |
CN112799695A (en) * | 2020-12-30 | 2021-05-14 | 中国人民解放军国防科技大学 | Multi-domain multi-source collaborative common scene software reconstruction implementation method |
CN113660656A (en) * | 2021-06-30 | 2021-11-16 | 南京邮电大学 | Cooperative physical layer secure communication method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104918238A (en) * | 2014-03-14 | 2015-09-16 | 北京邮电大学 | Cooperation interference excitation method for realizing physical layer safety |
US20180083483A1 (en) * | 2016-09-22 | 2018-03-22 | Seung Ho Hong | Incentive-based demand response method considering hierarchical electricity market |
-
2018
- 2018-07-25 CN CN201810824649.3A patent/CN108989115A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104918238A (en) * | 2014-03-14 | 2015-09-16 | 北京邮电大学 | Cooperation interference excitation method for realizing physical layer safety |
US20180083483A1 (en) * | 2016-09-22 | 2018-03-22 | Seung Ho Hong | Incentive-based demand response method considering hierarchical electricity market |
Non-Patent Citations (2)
Title |
---|
SHUANGLIN HUANG等: "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network", 《EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING》 * |
黄双林: "无线协作中继策略和资源分配方法研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743774A (en) * | 2019-03-14 | 2019-05-10 | 杭州电子科技大学 | A kind of power distribution method for realizing safety of physical layer transmission based on non-cooperative game |
CN109743774B (en) * | 2019-03-14 | 2021-08-24 | 杭州电子科技大学 | Power distribution method for realizing physical layer safe transmission based on non-cooperative game |
CN111726192A (en) * | 2020-06-12 | 2020-09-29 | 南京航空航天大学 | Communication countermeasure medium frequency decision optimization method based on log linear algorithm |
CN111726192B (en) * | 2020-06-12 | 2021-10-26 | 南京航空航天大学 | Communication countermeasure medium frequency decision optimization method based on log linear algorithm |
CN112799695A (en) * | 2020-12-30 | 2021-05-14 | 中国人民解放军国防科技大学 | Multi-domain multi-source collaborative common scene software reconstruction implementation method |
CN112799695B (en) * | 2020-12-30 | 2022-05-17 | 中国人民解放军国防科技大学 | Multi-domain multi-source collaborative common-scene software reconstruction implementation method |
CN113660656A (en) * | 2021-06-30 | 2021-11-16 | 南京邮电大学 | Cooperative physical layer secure communication method |
CN113660656B (en) * | 2021-06-30 | 2023-10-17 | 南京邮电大学 | Cooperative physical layer secure communication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ji et al. | Several key technologies for 6G: Challenges and opportunities | |
Zhang et al. | Improving physical layer security for reconfigurable intelligent surface aided NOMA 6G networks | |
CN108989115A (en) | Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer | |
CN105515717B (en) | One kind being based on the scrambled cooperative relaying safe transmission method of man made noise | |
Wang et al. | Strategic antieavesdropping game for physical layer security in wireless cooperative networks | |
CN108901065A (en) | A kind of optimal recompense of efficiency and power distribution method of distribution of interests relationship modeling | |
CN104540124B (en) | A kind of more relaying safety of physical layer methods of known eavesdropping end channel information | |
Tian et al. | Secrecy rate optimization in wireless multi-hop full duplex networks | |
Al-Talabani et al. | Enhancing secrecy rate in cognitive radio networks via stackelberg game | |
Aman et al. | Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook | |
CN110048751A (en) | A kind of optimization method based on multicast frequency control battle array direction modulation | |
CN107359892B (en) | A method of safety of physical layer is realized based on distributing antenna system | |
Kong et al. | Distributed beamforming in the presence of adversaries | |
He et al. | Delay aware secure offloading for NOMA-assisted mobile edge computing in internet of vehicles | |
He et al. | A NOMA and MRC enabled framework in drone-relayed vehicular networks: Height/trajectory optimization and performance analysis | |
Mao et al. | Joint resource allocation and 3D deployment for multi-UAV covert communications | |
Tourki et al. | Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI | |
Yang et al. | Covert rate study for full-duplex D2D communications underlaid cellular networks | |
Ngo et al. | Physical layer security in IRS-assisted cache-enabled satellite communication networks | |
Alsaba et al. | A game-theoretical modelling approach for enhancing the physical layer security of non-orthogonal multiple access system | |
Liu et al. | Exploiting STAR-RIS for physical layer security in integrated sensing and communication networks | |
Yang et al. | Sum rate and max-min rate for cellular-enabled UAV swarm networks | |
Huang et al. | Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network | |
Amer et al. | Secure transmission in wireless sensor networks via reconfigurable intelligent surface | |
Liu et al. | Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181211 |