CN104104422A - Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof - Google Patents
Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof Download PDFInfo
- Publication number
- CN104104422A CN104104422A CN201410323124.3A CN201410323124A CN104104422A CN 104104422 A CN104104422 A CN 104104422A CN 201410323124 A CN201410323124 A CN 201410323124A CN 104104422 A CN104104422 A CN 104104422A
- Authority
- CN
- China
- Prior art keywords
- node
- signal
- feedback
- bits
- time slot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention relates to a multi-antenna non-trusted relay system based on limit feedback, and a transmission method for feedback bit number self-adaptive selection of the multi-antenna non-trusted relay system based on limit feedback. The model is a single-relay communication system comprising a signal transmitting source, a non-trusted relay and a legal receiving node. In the strategy, the transmitting source only needs to know a mark number of a channel quantified in a codebook and does not need to know channel complete state information (CSI). Safety interruption probability is minimized via reasonable selection of the feedback bit number under the situation of reaching the requirement for a receiving signal interference noise ratio (SINR) threshold so that safety and reliability of the system are both realized.
Description
Technical field
The present invention relates to one and be applied to many antennas cooperative relaying wireless communication system, more particularly, relate to a kind of many antennas untrusted relay system based on Limited Feedback, and a kind of adaptively selected transmission method of number of bits of feedback of the many antennas untrusted relay system based on Limited Feedback.
Background technology
The core concept of radio communication physical layer safety is to probe into the physical characteristic of wireless communication system so that secure communication environment to be provided.Physical layer safe practice, by making full use of spatial character and the time-varying characteristics of wireless channel complexity, makes listener-in cannot receive secret signal, can directly ensure the fail safe of communication from physical layer.Based on the Information Security Theory of Shannon, first Wyner has proposed safe capacity concept, be defined as can transmitting under eavesdropping is disturbed the maximum rate of information, reflected can safe transmission amount of information number, be the standard of weighing system safety performance.Optimized secure communication is exactly the maximum capacity that makes legal receiving node, makes the capacity of eavesdropping node minimize simultaneously.
Three node communication models and the tradition of cooperative relaying network made contact compared with traffic model, and the main distinction is that the former exists outside eavesdropping node.Even if there is not outside eavesdropping, information is also likely eavesdropped by untrusted relaying.Untrusted relaying, in helping forwarding information, is also being attempted eavesdropping information, and now untrusted relaying just becomes inner listener-in.By introducing friendly interfering nodes, the Turbo Detection for Cooperative Communication that contains untrusted relaying continues while adopting the transmission of decoding pass-through mode in the middle of can obtaining positive safe capacity, via node has precedence over destination node and receives decoded signal more accurately, cannot obtain positive safe capacity, therefore untrusted relay communications system generally adopts amplification forwarding relaying.
The safety Analysis of current collaboration relay system physical layer mainly comprises safe capacity, safe interruption rate etc.; Safe transmission method comprises beam forming, cooperation interference etc.; Security node system of selection comprises relay selection, friendly interference selection etc.The known CSI completely of sending node is all supposed in these work.But in many practical communication occasions, sending node is difficult to obtain complete CSI conventionally.For this problem, Limited Feedback technology can make sending node obtain part CSI.How appropriate design Limited Feedback bit number in the fail safe that obtains safeguards system in part CSI situation, is taken into account the reliability of system simultaneously, has very important realistic meaning.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, for the situation that lacks consideration in the probing into of current cooperative relaying networked physics layer safety and can not obtain complete CSI, the invention provides a kind of many antennas untrusted relay system based on Limited Feedback, and a kind of adaptively selected transmission method of number of bits of feedback of the many antennas untrusted relay system based on Limited Feedback.
Technical scheme of the present invention is as follows:
A kind of many antennas untrusted relay system based on Limited Feedback, the structure of this communication system comprises a transmitted signal source S node, a untrusted relaying R node and a legal reception D node, S node, R node and D node number of antennas are respectively M, 1, M, R node is the non-trusted relaying of amplification forwarding; Adopt Limited Feedback technology to obtain the channel condition information CSI of S-R channel, estimate the channel condition information CSI of R-D by training signal.
The adaptively selected transmission method of number of bits of feedback of many antennas untrusted relay system based on Limited Feedback, a complete communication process completes in two time slots:
The first time slot, S node sends signal to be transmitted to R node, and D node sends artificial noise jamming to R node simultaneously; The second time slot, the signal that R node receives the first time slot sends to D node after amplifying.
As preferably, concrete steps are as follows:
Step 1:S node and R node are set up public random code book
wherein N=2
b, B is number of bits of feedback;
Step 2:S node sends training signal to R node, and when without training evaluated error, R node is by the channel coefficients h of the S-R obtaining
sRbe normalized to channel directional information
according to minimum chordal distance method, can obtain
be about to
be estimated as
code word sequence number n is fed back to S node by R node afterwards;
Step 3: first transmission time slot, S node and D node adopt high specific send mode to send a signal to R node simultaneously, and the beamforming vectors of S node and D node is respectively
the reception signal of R node is
wherein, x
1for S node send be secret signal, x
2for D node send be man made noise's signal, P is average transmitting power, n
1for the multiple Gaussian noise variable of zero-mean;
The reception Signal to Interference plus Noise Ratio SINR of R node is
Step 4: second transmission time slot, R node, after amplifying, sends a signal to D node, and wherein, relaying amplification factor is 1/||y
r||, for maximizing receiving terminal signal to noise ratio, D node adopts high specific merging mode to receive, and D node carries out after self-interference elimination, receives signal to be
The reception Signal to Interference plus Noise Ratio SINR of D node is
As preferably, further comprise:
Step 5: only suppose the statistical average of known the first time slot R-D channel coefficients of R node
and complete known the second time slot R-D channel coefficients h
rD, and then push away to obtain system safety outage probability P{ γ
1< γ
2closed expression be the monotonic increasing function about B, also can be derived from target capacity is C
0system Transmission probability
closed expression formula be the monotone decreasing function about B;
Step 6: establish and have a threshold epsilon >0, as the reception Signal to Interference plus Noise Ratio SINR of destination node value γ
2when < ε, system Transmission; And work as γ
2when > ε, system can normally receive, and obtains number of bits of feedback to be:
Step 7: the selection B of system self-adaption.
As preferably, in step 1, quantize each code word c in code book
jit is the multiple unit vector that a random M who generates ties up in advance.
Beneficial effect of the present invention is as follows:
The present invention proposes a kind of adaptively selected transmission method of Limited Feedback bit number based on untrusted relaying.Whole transmitting procedure completes in two transmission time slots.The first time slot, S node sends signal to be transmitted to R node, and D node sends artificial noise jamming to R node simultaneously, and both are all MRT and send, and obtain the reception SINR of R node; The second time slot, sends to D node after the signal that R node receives the first time slot amplifies, and carries out MRC merging at D node, obtains the reception SINR of D node; Finally obtain the monotonicity of the closed expression formula of safe outage probability and Transmission probability about number of bits of feedback B, in the situation that given D node receives SINR threshold value, obtain the value of optimum B, complete the adaptively selected of number of bits of feedback.Compared with the transmission means of the present invention and existing consideration physical layer safety, the sending strategy while having considered first not obtain complete CSI, and provided the Optimal Feedback bit number adaptive selection method of simultaneously taking into account reliability and fail safe.The present invention can make the average that receives SINR will be greater than set threshold epsilon, thereby improves the transmission reliability of system, makes the number of bits of feedback should be as much as possible little simultaneously, to improve the fail safe of system.
Brief description of the drawings
Fig. 1 is communication system architecture figure of the present invention.
Fig. 2 is the flow chart of communication means of the present invention.
Fig. 3 selects in different number of bits of feedback situations, and safe outage probability is with SNR (being ρ) change curve;
Fig. 4 is in different number of bits of feedback situations, the curve that system Transmission probability changes with SNR;
Fig. 5 is the selection change curve of Optimal Feedback bit number under the different SINR of reception threshold epsilon;
Wherein, the antenna number M=4 of fixing S node and D node, R node is single antenna, and the transmitted power of each node is P, and noise power is normalized to σ
2in=1, Fig. 4, Offered target speed is C
0=1bps/Hz, in Fig. 5, the fixing value of SNR is 10dB.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
As shown in Figure 1, the structure of communication system comprises a transmitted signal source S node, a untrusted relaying R node and a legal reception D node.S node, R node and D node number of antennas are respectively M, 1, M, and R node is the non-trusted relaying of amplification forwarding (AF).System adopts Limited Feedback technology to obtain the channel condition information CSI of S-R channel, estimates the channel condition information CSI of R-D by training signal, does not have training evaluated error and has channel reciprocity.
Embodiments of the invention disclose the adaptively selected transmission method of a kind of number of bits of feedback, and a complete communication process completes in two time slots.The first time slot, S node sends signal to be transmitted to R node, and D node sends artificial noise jamming to R node simultaneously; The second time slot, the signal that R node receives the first time slot sends to D node after amplifying.As shown in Figure 2, the concrete steps of the method are as follows:
Step 1:S node and R node are set up public random code book
wherein N=2
b, B is number of bits of feedback.Quantize each code word c in code book
jit is the multiple unit vector that a random M who generates ties up in advance;
Step 2:S node sends training signal to R node, supposes that R node is by the channel coefficients h of the S-R obtaining without training evaluated error
sRbe normalized to channel directional information
according to minimum chordal distance method, can obtain
be about to
be estimated as
code word sequence number n is fed back to S node by R node afterwards;
Step 3: first transmission time slot, S node and D node adopt high specific to send (MRT) mode simultaneously and send a signal to R node, therefore the beamforming vectors of S node and D node is respectively
therefore the reception signal of R node is
wherein x
1for S node send be secret signal, x
2for D node send be man made noise's signal, P is average transmitting power, n
1for the multiple Gaussian noise variable of zero-mean.Therefore the reception Signal to Interference plus Noise Ratio SINR of R node is
Step 4: second transmission time slot, R node, after amplifying, sends a signal to D node, and wherein relaying amplification factor is 1/||y
r||, for maximizing receiving terminal signal to noise ratio, D node adopts high specific to merge (MRC) mode and receives, and D node carries out after self-interference elimination, receives signal to be
Therefore the reception SINR of D node is
Step 5: only suppose the statistical average of known the first time slot R-D channel coefficients of R node
and complete known the second time slot R-D channel coefficients h
rDtherefore, can be derived from system safety outage probability P{ γ
1< γ
2closed expression be the monotonic increasing function about B, also can be derived from target capacity is C
0system Transmission probability
closed expression formula be the monotone decreasing function about B;
Step 6: establish and have a threshold epsilon >0, as the reception SINR of destination node value γ
2when < ε, system Transmission; And work as γ
2when > ε, system can normally receive.Consider that number of bits of feedback should be as much as possible little, to improve the fail safe of system, therefore can obtain the Optimal Feedback bit number of taking into account reliability and fail safe be simultaneously:
Step 7: the selection B of system self-adaption.
Fig. 3 has provided and has selected in different number of bits of feedback situations, and safe outage probability is with SNR (being ρ) change curve.From simulation result, with the increase of number of bits of feedback, safe outage probability rises, i.e. system safety performance variation, has verified the monotonicity of safe interruption rate about number of bits of feedback.Can obtain, along with the change gradually of number of bits of feedback is large, safe outage probability spacing diminishes gradually simultaneously, i.e. convergence gradually.Fig. 4 has provided in different number of bits of feedback situations, the curve that system Transmission probability changes with SNR.From simulation result, along with the increase of number of bits of feedback, Transmission probability declines, and system reliability improves, and has verified the monotone decline of Transmission rate about number of bits of feedback.Can obtain, along with the increase of number of bits of feedback, number of bits of feedback reduces gradually to the contribution of Transmission probability simultaneously, is finally tending towards convergence.Fig. 5 has provided the selection change curve of Optimal Feedback bit number under different reception SINR threshold epsilon, and the fixing value of SNR is 10dB.From simulation result, number of bits of feedback lower bound increases along with the increase of ε in the time that the value of threshold epsilon approaches maximum occurrences, and number of bits of feedback lower bound increases very soon.But in practical application, if it is suitable to receive SINR threshold value, self adaptation is obtained to one and be easy to the Optimal Feedback bit number of realizing.
Above-described embodiment is only for the present invention is described, and not as limitation of the invention.As long as according to technical spirit of the present invention, to above-described embodiment change, modification etc. all will drop in the scope of claim of the present invention.
Claims (5)
1. the many antennas untrusted relay system based on Limited Feedback, it is characterized in that, the structure of this communication system comprises a transmitted signal source S node, a untrusted relaying R node and a legal reception D node, S node, R node and D node number of antennas are respectively M, 1, M, R node is the non-trusted relaying of amplification forwarding; Adopt Limited Feedback technology to obtain the channel condition information CSI of S-R channel, estimate the channel condition information CSI of R-D by training signal.
2. the adaptively selected transmission method of the number of bits of feedback of the untrusted of the many antennas based on Limited Feedback relay system, is characterized in that, a complete communication process completes in two time slots:
The first time slot, S node sends signal to be transmitted to R node, and D node sends artificial noise jamming to R node simultaneously; The second time slot, the signal that R node receives the first time slot sends to D node after amplifying.
3. the adaptively selected transmission method of number of bits of feedback of the many antennas untrusted relay system based on Limited Feedback according to claim 2, is characterized in that, concrete steps are as follows:
Step 1:S node and R node are set up public random code book
wherein N=2
b, B is number of bits of feedback;
Step 2:S node sends training signal to R node, and when without training evaluated error, R node is by the channel coefficients h of the S-R obtaining
sRbe normalized to channel directional information
according to minimum chordal distance method, can obtain
be about to
be estimated as
code word sequence number n is fed back to S node by R node afterwards;
Step 3: first transmission time slot, S node and D node adopt high specific send mode to send a signal to R node simultaneously, and the beamforming vectors of S node and D node is respectively
the reception signal of R node is
wherein, x
1for S node send be secret signal, x
2for D node send be man made noise's signal, P is average transmitting power, n
1for the multiple Gaussian noise variable of zero-mean;
The reception Signal to Interference plus Noise Ratio SINR of R node is
Step 4: second transmission time slot, R node, after amplifying, sends a signal to D node, and wherein, relaying amplification factor is
1/ || y
r||, for maximizing receiving terminal signal to noise ratio, D node adopts high specific merging mode to receive, and D node carries out after self-interference elimination, receives signal to be
The reception Signal to Interference plus Noise Ratio SINR of D node is
4. the adaptively selected transmission method of number of bits of feedback of the many antennas untrusted relay system based on Limited Feedback according to claim 3, is characterized in that, further comprises:
Step 5: only suppose the statistical average of known the first time slot R-D channel coefficients of R node
and complete known the second time slot R-D channel coefficients h
rD, and then push away to obtain system safety outage probability P{ γ
1< γ
2closed expression be the monotonic increasing function about B, also can be derived from target capacity is C
0system Transmission probability
closed expression formula be the monotone decreasing function about B;
Step 6: establish and have a threshold epsilon >0, as the reception Signal to Interference plus Noise Ratio SINR of destination node value γ
2when < ε, system Transmission; And work as γ
2when > ε, system can normally receive, and obtains number of bits of feedback to be:
Step 7: the selection B of system self-adaption.
5. the adaptively selected transmission method of number of bits of feedback of the many antennas untrusted relay system based on Limited Feedback according to claim 3, is characterized in that, in step 1, quantizes each code word c in code book
jit is the multiple unit vector that a random M who generates ties up in advance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410323124.3A CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410323124.3A CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104104422A true CN104104422A (en) | 2014-10-15 |
CN104104422B CN104104422B (en) | 2017-10-20 |
Family
ID=51672263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410323124.3A Active CN104104422B (en) | 2014-07-08 | 2014-07-08 | A kind of multiple antennas untrusted relay system and its transmission method based on Limited Feedback |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104104422B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105207706A (en) * | 2015-08-13 | 2015-12-30 | 中国联合网络通信集团有限公司 | Adaptive bit distribution method and multi-point cooperation transmission system |
CN105516997A (en) * | 2015-12-06 | 2016-04-20 | 桂林电子科技大学 | Physical layer safe cognition relay communication method |
CN105553649A (en) * | 2014-10-28 | 2016-05-04 | 罗伯特·博世有限公司 | Method and device for generating secret key |
CN105680995A (en) * | 2016-02-23 | 2016-06-15 | 北京邮电大学 | Information transmission method, device and system |
CN105744586A (en) * | 2016-03-04 | 2016-07-06 | 上海交通大学 | Full-duplex relay selection method based on outdated channel state information |
CN105813081A (en) * | 2016-03-09 | 2016-07-27 | 华侨大学 | Method for selecting relay nodes capable of enhancing security performance of cognitive relay network |
CN106102044A (en) * | 2016-05-23 | 2016-11-09 | 西安交通大学 | A kind of multi-user's junction network downlink cooperation physical layer method for secret protection |
CN106230476A (en) * | 2016-07-26 | 2016-12-14 | 西安交通大学 | Information secure transmission method based on non-associating man made noise in insincere relay system |
CN106712823A (en) * | 2016-12-21 | 2017-05-24 | 西安电子科技大学 | Beam forming method capable of realizing secure physical layer transmission |
CN106911420A (en) * | 2017-03-15 | 2017-06-30 | 中国人民解放军理工大学 | A kind of RF energy gathers the safe transmission method of many relay systems of untrusted |
CN106992836A (en) * | 2017-03-24 | 2017-07-28 | 华侨大学 | Full duplex scrambling transmission method in a kind of untrusted junction network |
WO2019006712A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on single bit feedback |
WO2019006713A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on adaptive noise feedback |
CN112637925A (en) * | 2020-11-28 | 2021-04-09 | 重庆工商大学融智学院 | Safe relay selection method based on random forest non-uniform quantitative feature extraction |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340218A (en) * | 2007-07-04 | 2009-01-07 | 华为技术有限公司 | Communication method and apparatus in MIMO system |
CN101494490A (en) * | 2009-01-04 | 2009-07-29 | 北京邮电大学 | Accidental distributed self-organizing communication method and system based on feedback |
US20140112152A1 (en) * | 2012-10-23 | 2014-04-24 | Korea University Research And Business Foundation | Limited feedback method and apparatus for two-way wireless relaying channels with physical network coding |
-
2014
- 2014-07-08 CN CN201410323124.3A patent/CN104104422B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340218A (en) * | 2007-07-04 | 2009-01-07 | 华为技术有限公司 | Communication method and apparatus in MIMO system |
CN101494490A (en) * | 2009-01-04 | 2009-07-29 | 北京邮电大学 | Accidental distributed self-organizing communication method and system based on feedback |
US20140112152A1 (en) * | 2012-10-23 | 2014-04-24 | Korea University Research And Business Foundation | Limited feedback method and apparatus for two-way wireless relaying channels with physical network coding |
Non-Patent Citations (4)
Title |
---|
E.TEKIN: "The Gaussian multiple access wiretap channel wireless secrecy and cooperative jamming", 《INFORMATION THEORY AND APPLICATION WORKSHOP》 * |
赵睿: "MIMO解码转发双向中继系统中的传输侧率与中断概率分析", 《信号处理》 * |
赵睿: "解码转发MIMO双向中继系统的传输策略与性能", 《中国科学》 * |
赵睿: "解码转发MIMO双向中继系统的传输策略与性能分析", 《中国科学》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553649A (en) * | 2014-10-28 | 2016-05-04 | 罗伯特·博世有限公司 | Method and device for generating secret key |
CN105207706A (en) * | 2015-08-13 | 2015-12-30 | 中国联合网络通信集团有限公司 | Adaptive bit distribution method and multi-point cooperation transmission system |
CN105516997A (en) * | 2015-12-06 | 2016-04-20 | 桂林电子科技大学 | Physical layer safe cognition relay communication method |
CN105680995A (en) * | 2016-02-23 | 2016-06-15 | 北京邮电大学 | Information transmission method, device and system |
CN105680995B (en) * | 2016-02-23 | 2019-03-15 | 北京邮电大学 | A kind of method for transmitting signals, apparatus and system |
CN105744586A (en) * | 2016-03-04 | 2016-07-06 | 上海交通大学 | Full-duplex relay selection method based on outdated channel state information |
CN105744586B (en) * | 2016-03-04 | 2019-10-08 | 上海交通大学 | Full duplex relaying selection method based on expired channel state information |
CN105813081B (en) * | 2016-03-09 | 2019-01-01 | 华侨大学 | The method that selective enhancement recognizes the relay node of junction network security performance |
CN105813081A (en) * | 2016-03-09 | 2016-07-27 | 华侨大学 | Method for selecting relay nodes capable of enhancing security performance of cognitive relay network |
CN106102044A (en) * | 2016-05-23 | 2016-11-09 | 西安交通大学 | A kind of multi-user's junction network downlink cooperation physical layer method for secret protection |
CN106230476A (en) * | 2016-07-26 | 2016-12-14 | 西安交通大学 | Information secure transmission method based on non-associating man made noise in insincere relay system |
CN106712823A (en) * | 2016-12-21 | 2017-05-24 | 西安电子科技大学 | Beam forming method capable of realizing secure physical layer transmission |
CN106712823B (en) * | 2016-12-21 | 2020-11-13 | 西安电子科技大学 | Beam forming method capable of realizing physical layer safe transmission |
CN106911420A (en) * | 2017-03-15 | 2017-06-30 | 中国人民解放军理工大学 | A kind of RF energy gathers the safe transmission method of many relay systems of untrusted |
CN106992836A (en) * | 2017-03-24 | 2017-07-28 | 华侨大学 | Full duplex scrambling transmission method in a kind of untrusted junction network |
WO2019006712A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on single bit feedback |
WO2019006713A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on adaptive noise feedback |
CN112637925A (en) * | 2020-11-28 | 2021-04-09 | 重庆工商大学融智学院 | Safe relay selection method based on random forest non-uniform quantitative feature extraction |
CN112637925B (en) * | 2020-11-28 | 2022-06-03 | 重庆财经学院 | Safe relay selection method based on random forest non-uniform quantitative feature extraction |
Also Published As
Publication number | Publication date |
---|---|
CN104104422B (en) | 2017-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104104422A (en) | Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof | |
Brown et al. | Practical guide to MIMO radio channel: With MATLAB examples | |
Li et al. | On cooperative relaying schemes for wireless physical layer security | |
CN101902265A (en) | Safe transmission method of physical layer in wireless communication | |
CN104469755A (en) | Physical layer security transmission method for keeping relay and jamming node selection result secret | |
CN102694628B (en) | Interference suppression method for multi-user MIMO collaborative relay system | |
CN104320826A (en) | Chance relay-selection method for cooperative communication network under tapping environment | |
CN103475441B (en) | In wireless multi-hop network based on bunch cooperation interference transmission method | |
CN110299934A (en) | A kind of security transmission method for wirelessly taking energy full duplex relaying system | |
CN102752080B (en) | A kind of anti-eavesdrop coded method based on physical layer | |
CN101252418A (en) | Self-adapting transmitting method using channel statistical information in multi-aerial transmission system | |
CN109039411A (en) | A kind of unidirectional full duplex MIMO relay antenna selection safe transmission method | |
CN104283629A (en) | Channel safety transmission method | |
Xu et al. | On the equivalence of two optimal power-allocation schemes for A-TWRC | |
CN104486754A (en) | Relay selection method for cooperative communication system based on physical layer safety technology | |
CN108601019A (en) | Insincere relaying transmitted in both directions network security transmission method based on relay selection | |
CN108631825A (en) | Enhance two-way AF relay cooperatives wireless communication system physical layer safe transmission method | |
US9844067B2 (en) | Broadcasting method using device-to-device (D2D) communication in wireless communication system | |
Yang et al. | Outage performance of orthogonal space–time block codes transmission in opportunistic decode-and-forward cooperative networks with incremental relaying | |
Khalid et al. | Outage performance analysis of hybrid relay-reconfigurable intelligent surface networks | |
Zhang et al. | Power control and channel training for MIMO channels: A DMT perspective | |
US9973247B2 (en) | Wireless communication system | |
JP5139331B2 (en) | Multi-antenna communication method with improved channel correlation utilization | |
Mu et al. | A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power | |
CN104468428B (en) | Safety of physical layer method based on low complex degree difference channel estimation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |