CN106131823B - Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene - Google Patents

Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene Download PDF

Info

Publication number
CN106131823B
CN106131823B CN201610394002.2A CN201610394002A CN106131823B CN 106131823 B CN106131823 B CN 106131823B CN 201610394002 A CN201610394002 A CN 201610394002A CN 106131823 B CN106131823 B CN 106131823B
Authority
CN
China
Prior art keywords
follows
eavesdropping user
ρ
eavesdropping
jump
Prior art date
Application number
CN201610394002.2A
Other languages
Chinese (zh)
Other versions
CN106131823A (en
Inventor
任品毅
许茜
杜清河
孙黎
王熠晨
Original Assignee
西安交通大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安交通大学 filed Critical 西安交通大学
Priority to CN201610394002.2A priority Critical patent/CN106131823B/en
Publication of CN106131823A publication Critical patent/CN106131823A/en
Application granted granted Critical
Publication of CN106131823B publication Critical patent/CN106131823B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic

Abstract

The invention discloses the relay transmission methods based on safety of physical layer in a kind of eavesdropping user random distribution scene, it include: 1) to be obtained under the scene of eavesdropping user random distribution based on random geometry theory, after independent eavesdropping coding twice, the security interrupt probability of double bounce relay transmission;2) under conditions of source node and limited relay node total transmission power, the optimization problem for maximizing safe transmission rate is constructed;3) it by the solution to constructed optimization problem, obtains that the maximized relay transmission method of safe transmission rate can be made, this method includes power distribution and code book rated design two parts.The present invention has comprehensively considered the reliability and safety of communication, the maximization to safe transmission rate is realized while meeting security interrupt probability constraints in the case where requiring no knowledge about eavesdropping user specific location.

Description

Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Technical field

The invention belongs to be based on physical layer in wireless communication technology field more particularly to eavesdropping user random distribution scene to pacify Full relay transmission method.

Background technique

Due to the broadcast characteristic of wireless channel, the private information transmitted between node is easy to by some illegal nodes (surreptitiously Listen user) it is eavesdropped, to bring threat to the safe transmission of information.Traditional higher-layer encryption technology is based on eavesdropping user Limited this of computing capability assume to ensure information security.However, as the high-speed and high-efficiencies such as quantum calculation calculate skill The development of art, the computing capability of eavesdropping user will tend to be infinite, and higher-layer encryption technology will no longer can guarantee being perfectly safe for information. Corresponding, safety of physical layer technology can provide information theory meaning independent of the limitation to eavesdropping user computing capability Being perfectly safe in justice.

However, assuming that the channel status of known eavesdropping user in many researchs in relation to safety of physical layer.It is practical On, this hypothesis is difficult to realize in reality, because eavesdropping user generally remains silence, any signal is not sent, even if It is that the position distribution of eavesdropping user is also difficult to obtain.Therefore, in the item for the position distribution and channel status for not knowing eavesdropping user Under part, transmission strategy how is designed to guarantee secure communication, is the work with important research meaning.

Summary of the invention

In view of the foregoing drawbacks or insufficient, the purpose of the present invention is to provide bases in a kind of no eavesdropping user random distribution scene In the relay transmission method of safety of physical layer, safe transmission rate can be maximized.

To achieve the above objectives, technical method of the invention are as follows:

Relay transmission method based on safety of physical layer in a kind of eavesdropping user random distribution scene, comprising the following steps:

1) theoretical based on random geometry, it calculates in eavesdropping user position random distribution and the non-collusion of eavesdropping user Security interrupt probability after double bounce relay transmission, and construct and maximize safe transmission speed under the security interrupt probability constraints The Optimized model P1 of rate;

2) Optimized model P1 is converted to simplified model P2 of equal value;

3) solving model P2 obtains optimal transmission method, including power distribution and the selection of code book rate.It is described

Step 1) specifically:

A, source node and destination node are equipped with single antenna, and relaying is equipped with NRRoot antenna, each eavesdropping user are equipped with NERoot day Line uses EjJ-th of eavesdropping user is represented, Φ is usedE,1It indicates to jump and (be transferred to relaying R from source node S) transmission process first In, the set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates the channel capacity of legal link when the first jump CM,1With the channel capacity C of eavesdropping linkE,1, calculation formula is respectively as follows:

Wherein, ρ1The transmitting signal-to-noise ratio of the first jump transmitting node (source node S) is represented, | | hSR||2Source node S is represented in After the multipath fading gain of link legal between R, dSRThe distance between source node S and relaying R are represented,Represent source Node S and eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent source node S and eavesdropping user EjBetween Distance, α is path-loss factor;

B, using EjJ-th of eavesdropping user is represented, Φ is usedE,2It indicates to jump second and (is transferred to destination node from relaying R D) in transmission process, the set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates legal link when the second jump Channel capacity CM,2With the channel capacity C of eavesdropping linkE,2, calculation formula is respectively as follows:

Wherein, ρ2The transmitting signal-to-noise ratio of the second jump transmitting node (relaying R) is represented, | | hRD||2Represent relaying R and purpose section The multipath fading gain of legal link, d between point DRDRelaying the distance between R and destination node D are represented,In representative After R and eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent relaying R and eavesdropping user EjBetween away from From;

C, for the given required private information code rate R reachedS, use Psec,1Indicate the defeated security interrupt of the first jump set Probability, specific formula for calculation are as follows:

Wherein, γ (NE,cj) it is incomplete gamma functions;

D, for the given required private information code rate R reachedS, use Psec,2Indicate the defeated security interrupt of the second jump set Probability, specific formula for calculation are as follows:

E, the security interrupt probability after double bounce relay transmission is obtained in conjunction with formula (5) and formula (6), embodied Formula is as follows:

Wherein,For substitution of variable.

The step 2) specifically:

A, safe transmission rate T is defineds, expression formula are as follows:

Wherein, RsFor the private information code rate (R of double bounce of code book used in every jumpsEqually);

B, R is usedt,iIt indicates the i-th codeword transmission rate for jumping code book used, then constructs safe transmission rate as follows most Bigization Optimized model P1:

Wherein, security interrupt probability PoutExpression formula provided in formula (7), ε is patient to be preset The threshold value of security interrupt probability.

The step 3) specifically:

A, it could be maximized due to safe transmission rate when transmission power exhausts, it can will be last in model P1 One inequality constraints condition ρ about general power12≤ρ01≥0,ρ2>=0 conversion general power ρ0To power when exhausting The constraint of distribution factor η is 0≤η≤1, has ρ under the power allocation factor1=η ρ0And ρ2=(1- η) ρ0, then with model P1 phase Corresponding simplified Optimized model P2 are as follows:

Wherein, formulaExpression formula are as follows:

B, solving model P2, obtain give legal downlink channel state h=(| | hSR||2,||hRD||2) under optimal transmission Method is as follows:

1) downlink channel state is not fallen in launching condition set i.e. if legalThen without transmission, launching condition The expression formula of set H is as follows:

2) downlink channel state falls within i.e. h ∈ H in launching condition set if legal, then is transmitted, optimal power allocation Factor η*(h) and maximum private information code rateFor the root of following two element equations:

Then maximum safe transmission rateAre as follows:

Meanwhile i-th jump (i=1,2) used in code book optimum code word transmission rateIt is respectively as follows:

Compared with the prior art, the invention has the benefit that

The invention discloses the relay transmission method based on safety of physical layer in a kind of eavesdropping user random distribution scene, institutes The optimal transmission method of proposition can maximize peace under conditions of meeting security interrupt probability constraints and total transmission power constrains Full transmission rate;Position and channel state information of the method proposed independent of eavesdropping user, more hold in systems in practice Easily implement;Emulation experiment shows that the method (optimal solution/optimal power allocation) that we are proposed can maximize safe transmission speed Rate, and better simply second best measure can be used under high s/n ratio --- signal-to-noise ratio equal power is distributed come approximate.

Detailed description of the invention

Fig. 1 is system model figure of the invention;

Fig. 2 is the simulating, verifying to security interrupt probability expression (11) in the present invention;

Fig. 3 is in the present invention under different path-loss factors, and safe transmission rate is bent with the variation of power allocation factor Line;

Fig. 4 be in the present invention under different eavesdropping user distribution densities, safe transmission rate with power allocation factor change Change curve;

Fig. 5 is in the present invention under different total transmitting signal-to-noise ratio, and safe transmission rate is bent with the variation of power allocation factor Line;

Fig. 6 is handled up under different antennae number configuring condition using optimal transmission method safety achieved in the present invention Amount;

Fig. 7 is in the present invention using different transmission methods safe handling capacity achieved.

Specific embodiment

The present invention will be described in detail with reference to the accompanying drawing.

There are the relay transmission systems of position random distribution eavesdropping user for present invention investigation, as shown in Figure 1.Source node S is wanted Private information is transferred to destination node D, due to the missing for the link that direct transfers, R is relayed and is selected to turn the private information Hair.Source node and destination node are equipped with single antenna, and relay node is equipped with NRRoot antenna.Therefore, complete transmission process packet In (two stages) containing double bounce, first jumps from source node S to relaying R, and second jumps from relaying R to destination node D.There are positions in network The eavesdropping user of random distribution is set, each eavesdropping user is equipped with NERoot antenna.Assuming that eavesdropping user is in the position of this double bounce point Cloth is independent from each other, and obeying density is λEHomogeneous Poisson point process (PPP distribution).

To avoid eavesdropping user using the ability of maximum-ratio combing raising decoded information, we use RF relay forwarding plan Slightly, it need to only guarantee the safe transmission of each jump in this way, then final information is exactly safe.

For system above model, key step of the invention includes:

1) theoretical based on random geometry, it calculates in eavesdropping user position random distribution and the non-collusion of eavesdropping user Security interrupt probability after double bounce relay transmission, and construct and maximize safe transmission rate under the security interrupt probability constraints Optimized model P1;

2) Optimized model P1 is converted to simplified model P2 of equal value;

3) solving model P2 obtains optimal transmission method, including power distribution and the selection of code book rate.It is described

Step 1) specifically:

A, using EjJ-th of eavesdropping user is represented, Φ is usedE,1It indicates to jump first and (be transferred to relaying R from source node S) In transmission process, the set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates legal link when the first jump Channel capacity CM,1With the channel capacity C of eavesdropping linkE,1, calculation formula is respectively as follows:

Wherein, ρ1The transmitting signal-to-noise ratio of the first jump transmitting node (source node S) is represented, | | hSR||2Source node S is represented in After the multipath fading gain of link legal between R, dSRThe distance between source node S and relaying R are represented,Represent source Node S and eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent source node S and eavesdropping user EjBetween Distance, α is path-loss factor;

B, using EjJ-th of eavesdropping user is represented, Φ is usedE,2It indicates to jump second and (is transferred to destination node from relaying R D) in transmission process, the set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates legal link when the second jump Channel capacity CM,2With the channel capacity C of eavesdropping linkE,2, calculation formula is respectively as follows:

Wherein, ρ2The transmitting signal-to-noise ratio of the second jump transmitting node (relaying R) is represented, | | hRD||2Represent relaying R and purpose section The multipath fading gain of legal link, d between point DRDRelaying the distance between R and destination node D are represented,In representative After R and eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent relaying R and eavesdropping user EjBetween away from From;

C, for the given required private information code rate R reachedS, use Psec,1Indicate the defeated security interrupt of the first jump set Probability, specific formula for calculation are as follows:

Wherein, γ (NE,cj) it is incomplete gamma functions;

D, for the given required private information code rate R reachedS, use Psec,2Indicate the defeated security interrupt of the second jump set Probability, specific formula for calculation are as follows:

E, the security interrupt probability after double bounce relay transmission, expression are obtained in conjunction with formula (5) and formula (6) It is as follows:

Wherein,For substitution of variable.

The step 2) specifically:

A, safe transmission rate T is defineds, expression formula are as follows:

Wherein, RsFor the private information code rate (R of double bounce of code book used in every jumpsEqually);

B, R is usedt,iIt indicates the i-th codeword transmission rate for jumping code book used, then constructs safe transmission rate as follows most Bigization Optimized model P1:

Wherein, security interrupt probability PoutExpression formula provided in formula (7), ε is patient to be preset The threshold value of security interrupt probability.

The step 3) specifically:

A, it could be maximized due to safe transmission rate when transmission power exhausts, it can will be last in model P1 One inequality constraints condition ρ about general power12≤ρ01≥0,ρ2>=0 conversion general power ρ0To power when exhausting The constraint of distribution factor η is 0≤η≤1, has ρ under the power allocation factor1=η ρ0And ρ2=(1- η) ρ0, then with model P1 phase Corresponding simplified Optimized model P2 are as follows:

Wherein, formulaExpression formula are as follows:

B, solving model P2, obtain give legal downlink channel state h=(| | hSR||2,||hRD||2) under optimal transmission Method is as follows:

1) downlink channel state is not fallen in launching condition set i.e. if legalThen without transmission, emit item The expression formula of part set H is as follows:

2) downlink channel state falls within i.e. h ∈ H in launching condition set if legal, then is transmitted, optimal power allocation Factor η*(h) and maximum private information code rateFor the root of following two element equations:

Then maximum safe transmission rateAre as follows:

Meanwhile i-th jump (i=1,2) used in code book optimum code word transmission rateIt is respectively as follows:

Fig. 2 is the simulating, verifying to security interrupt probability expression (11) in the present invention.We use Monte Carlo simulation To verify expression formula (11).It is the border circular areas of 2000m that simulating scenes, which are by the radius in the center of circle of source node S,.Power distribution because Son is redefined for η=0.5, and path-loss factor is α=3, and total signal-to-noise ratio that emits is ρ0=30dB, eavesdropping user density are λE =10-3It is a/every square metre.This figure is observed it can be found that the security interrupt probability (11) and Monte Carlo simulation result derived It matches.

Fig. 3 is in the present invention under different path-loss factors, and safe transmission rate is bent with the variation of power allocation factor Line.Asterisk is uses the attainable optimal solution (η of optimal transmission method proposed by the invention*(h), Ts *(h)).Observing this figure can With discovery, the mentioned method of the present invention can maximize safe transmission rate, and with the increase of path-loss factor, maximum is passed Defeated rate decline.

Fig. 4 be the present invention under different eavesdropping user distribution densities, safe transmission rate with power allocation factor change Change curve.Asterisk is uses the attainable optimal solution of optimal transmission method proposed by the invention.This figure is observed it can be found that originally Safe transmission rate can be maximized by inventing proposed method, and with the increase of eavesdropping user density, under peak transfer rate Drop.

Fig. 5 is to be handled up under different antennae number configuring condition using optimal transmission method safety achieved in the present invention Amount.Asterisk is uses the attainable optimal solution of optimal transmission method proposed by the invention.This figure is observed it can be found that the present invention Mentioned method can maximize safe transmission rate, and with the increase of total transmission signal-to-noise ratio, peak transfer rate increase is simultaneously Tend to definite value.

Fig. 6 is to be handled up under different antennae number configuring condition using optimal transmission method safety achieved in the present invention Amount.This figure is observed it can be found that working as NR>NEWhen, safe rate is larger, works as NR<NEWhen, safe rate is extremely low.In NR=NEFeelings Under condition, with the increase of number of antennas, safe transmission rate increases and tends to definite value.

Fig. 7 is that different transmission methods safe handling capacity achieved is used in the present invention.Constant power distribution is ηeql=0.5, Signal-to-noise ratio equal power is distributedThis figure is observed it can be found that this hair Bright proposed method (optimal power allocation) is better than other two control methods.Also, under conditions of high signal/noise ratio, this hair Bright proposed method can be distributed with signal-to-noise ratio equal power come approximate.

Claims (3)

1. the relay transmission method based on safety of physical layer in eavesdropping user random distribution scene, which is characterized in that including following Step:
1) theoretical based on random geometry, it calculates in eavesdropping user position random distribution and the non-collusion of eavesdropping user through two Security interrupt probability after jumping relay transmission, and construct and maximize the excellent of safe transmission rate under the security interrupt probability constraints Change model P1;
2) Optimized model P1 is converted to simplified model P2 of equal value;
The specific method is as follows:
A, safe transmission rate T is defineds, expression formula are as follows:
Wherein, RsFor the private information code rate of code book used in every jump, the R of double bouncesEqually;
B, R is usedt,iIt indicates the i-th codeword transmission rate for jumping code book used, then constructs safe transmission rate as follows and maximize Optimized model P1:
Wherein, security interrupt probability PoutExpression formula provided in formula (7), ε is preset patient safety The threshold value of outage probability;
3) solving model P2 obtains optimal transmission method, including power distribution and the selection of code book rate.
2. the relay transmission method based on safety of physical layer in eavesdropping user random distribution scene according to claim 1, It is characterized in that, the specific method is as follows for the step 1):
A, source node and destination node are equipped with single antenna, and relaying is equipped with NRRoot antenna, each eavesdropping user are equipped with NERoot antenna, Use EjJ-th of eavesdropping user is represented, Φ is usedE,1It indicates to jump first and be transferred in relaying R transmission process from source node S, The set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates the channel capacity C of legal link when the first jumpM,1 With the channel capacity C of eavesdropping linkE,1, calculation formula is respectively as follows:
Wherein, ρ1The the first jump transmitting node i.e. transmitting signal-to-noise ratio of source node S is represented, | | hSR||2Represent source node S and relaying R it Between legal link multipath fading gain, dSRThe distance between source node S and relaying R are represented,Represent source node S and Eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent source node S and eavesdropping user EjThe distance between, α For path-loss factor;
B, using EjJ-th of eavesdropping user is represented, Φ is usedE,2It indicates to jump second, is transferred to destination node D transmission from relaying R In the process, the set that the eavesdropping user being distributed on entire two-dimensional surface is constituted calculates the channel of legal link when the second jump Capacity CM,2With the channel capacity C of eavesdropping linkE,2, calculation formula is respectively as follows:
Wherein, ρ2The transmitting signal-to-noise ratio that the second jump transmitting node relays R is represented, | | hRD||2Represent relaying R and destination node D it Between legal link multipath fading gain, dRDRelaying the distance between R and destination node D are represented,Represent relaying R and Eavesdropping user EjBetween eavesdrop link multipath fading gain,Represent relaying R and eavesdropping user EjThe distance between;
C, for the given required private information code rate R reachedS, use Psec,1Indicate that the defeated security interrupt of the first jump set is general Rate, specific formula for calculation are as follows:
Wherein, γ (NE,cj) it is incomplete gamma functions;
D, for the given required private information code rate R reachedS, use Psec,2Indicate that the defeated security interrupt of the second jump set is general Rate, specific formula for calculation are as follows:
E, the security interrupt probability after double bounce relay transmission is obtained in conjunction with formula (5) and formula (6), expression is such as Under:
Wherein,For substitution of variable.
3. the relay transmission method based on safety of physical layer in eavesdropping user random distribution scene according to claim 1, It is characterized in that, the specific method is as follows for the step 3):
A, it could be maximized due to safe transmission rate when transmission power exhausts, the last one in model P1 is closed In the inequality constraints condition ρ of general power12≤ρ01≥0,ρ2>=0 conversion general power ρ0When exhausting to power distribution because The constraint of sub- η is 0≤η≤1, has ρ under the power allocation factor1=η ρ0And ρ2=(1- η) ρ0, then corresponding with model P1 Simplify Optimized model P2 are as follows:
Wherein, formulaExpression formula are as follows:
B, solving model P2, obtain give legal downlink channel state h=(| | hSR||2,||hRD||2) under optimal transmission method It is as follows:
1) downlink channel state is not fallen in launching condition set i.e. if legalThen without transmission, launching condition setExpression formula it is as follows:
2) downlink channel state is fallen in launching condition set i.e. if legalIt is then transmitted, the optimal power allocation factor η*(h) and maximum private information code rateFor the root of following two element equations:
Then maximum safe transmission rateAre as follows:
Meanwhile i-th jump (i=1,2) used in code book optimum code word transmission rateIt is respectively as follows:
CN201610394002.2A 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene CN106131823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610394002.2A CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610394002.2A CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Publications (2)

Publication Number Publication Date
CN106131823A CN106131823A (en) 2016-11-16
CN106131823B true CN106131823B (en) 2019-08-23

Family

ID=57270178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610394002.2A CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Country Status (1)

Country Link
CN (1) CN106131823B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571875B (en) * 2016-11-17 2018-12-14 东南大学 A kind of VLC secret signalling launching technique maximizing safe transmission rate
CN106877919A (en) * 2017-01-03 2017-06-20 华侨大学 Power distribution energy acquisition based on optimal user selection relays safety communicating method
CN107231683A (en) * 2017-05-27 2017-10-03 西安电子科技大学 Relay system power distribution method based on safety of physical layer
CN107396346B (en) * 2017-08-15 2019-11-12 广州大学 A kind of caching cellular network safety of physical layer data transmission method and system
CN109068345A (en) * 2018-09-28 2018-12-21 西北工业大学 A kind of random collaborative communication method based on geometric probability method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533166B1 (en) * 2010-08-20 2013-09-10 Brevity Ventures LLC Methods and systems for encoding/decoding files and transmission thereof
CN103475441A (en) * 2013-07-26 2013-12-25 北京邮电大学 Cooperative interference transmission method based on clusters in wireless multi-hop network
CN104301098A (en) * 2014-09-01 2015-01-21 北京航空航天大学 Opportunistic quantum network coding method
US9100405B2 (en) * 2007-10-17 2015-08-04 Dispersive Networks Inc. Apparatus, systems and methods utilizing dispersive networking
CN105007578A (en) * 2015-06-05 2015-10-28 西安交通大学 Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9100405B2 (en) * 2007-10-17 2015-08-04 Dispersive Networks Inc. Apparatus, systems and methods utilizing dispersive networking
US8533166B1 (en) * 2010-08-20 2013-09-10 Brevity Ventures LLC Methods and systems for encoding/decoding files and transmission thereof
CN103475441A (en) * 2013-07-26 2013-12-25 北京邮电大学 Cooperative interference transmission method based on clusters in wireless multi-hop network
CN104301098A (en) * 2014-09-01 2015-01-21 北京航空航天大学 Opportunistic quantum network coding method
CN105007578A (en) * 2015-06-05 2015-10-28 西安交通大学 Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system

Also Published As

Publication number Publication date
CN106131823A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN102077679B (en) For the relay antenna index of shared antenna communication
Ju et al. Relay selection with ANC and TDBC protocols in bidirectional relay networks
Sun et al. On the ergodic capacity of MIMO NOMA systems
Liu et al. Nonorthogonal multiple access in large-scale underlay cognitive radio networks
Stavridis et al. Energy evaluation of spatial modulation at a multi-antenna base station
Li et al. Energy efficiency of large-scale multiple antenna systems with transmit antenna selection
Ma et al. Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
Wang et al. Joint source and relay precoding designs for MIMO two-way relaying based on MSE criterion
Mo et al. Secure beamforming for MIMO two-way communications with an untrusted relay
Mostafa et al. Physical-layer security for MISO visible light communication channels
Ikki et al. Performance analysis of two-way amplify-and-forward relaying in the presence of co-channel interferences
Men et al. Performance analysis of nonorthogonal multiple access for relaying networks over Nakagami-$ m $ fading channels
Van Khuong et al. General expression for pdf of a sum of independent exponential random variables
Men et al. Non-orthogonal multiple access for multiple-antenna relaying networks
Mostafa et al. Physical-layer security for indoor visible light communications
Zhang et al. Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks
Deng et al. Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach
Chae et al. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone
Zhu et al. On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping
Xu et al. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers
Nabar et al. MIMO Communication Systems
Mostafa et al. Securing visible light communications via friendly jamming
CN103702322B (en) A kind of safe transmission method of physical layer resisting the eavesdropping of unreliable via node
TW200830761A (en) Wireless communication method and apparatus for controlling the transmission power of downlink and uplink coded composite transport channels based on discontinuous transmission state value
Cai et al. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant