CN106656405B - A method of minimizing system secrecy outage probability using energy station - Google Patents
A method of minimizing system secrecy outage probability using energy station Download PDFInfo
- Publication number
- CN106656405B CN106656405B CN201610908280.5A CN201610908280A CN106656405B CN 106656405 B CN106656405 B CN 106656405B CN 201610908280 A CN201610908280 A CN 201610908280A CN 106656405 B CN106656405 B CN 106656405B
- Authority
- CN
- China
- Prior art keywords
- node
- energy station
- energy
- legitimate receipt
- source node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000005540 biological transmission Effects 0.000 claims abstract description 18
- 238000004891 communication Methods 0.000 claims abstract description 17
- 238000013461 design Methods 0.000 claims abstract description 5
- 238000005457 optimization Methods 0.000 claims description 9
- 230000017105 transposition Effects 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 230000008054 signal transmission Effects 0.000 claims description 5
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 230000009466 transformation Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 2
- 241001168730 Simo Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of methods minimizing system secrecy outage probability using energy station, including:1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate a time slot;2) energy station estimates the channel state information in communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node;3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2;4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node eavesdrops the wireless signal, while energy station uses beamformer w2Wireless interference signal is transmitted to legitimate receipt node and eavesdropping receiving node, to minimize the secrecy outage probability of system.This method promotes safety of physical layer performance using energy station, to which the secret and safe performance of entire communication system be substantially improved.
Description
Technical field
The present invention relates to the communications fields, and in particular to a kind of side minimizing system secrecy outage probability using energy station
Method.
Background technology
With the rapid development of wireless communication technique, various wireless telecom equipments sharply increase, thing followed channel radio
Letter safety issue is also on the rise.Traditional secure wireless communication mechanism is mainly the associated encryption skill based on cryptography
Art, but with the rapid promotion of Computing ability, the secrecy basis of this technology becomes no longer firm, safety of physical layer skill
Art is come into being.
Wirelessly communicate angle of the safety of physical layer technology from information theory, the uniqueness using physical channel and reciprocity
Property, to realize that information is encrypted, identification validated user etc., it is intended to realize unconditional security.Chinese invention patent publication number
(CN103986545A) a kind of safe transmission method of physical layer for SIMO wireless communication systems is disclosed, it is expected to receive first
Fang Fanxiang emits random reference signal, then launch party using the reference signal that receives to symbol to be transmitted into sending out after line shuffle
It penetrates, finally it is expected that recipient is demodulated using the known reference signal docking collection of letters number to obtain the information of launch party's transmission.Value
It obtains, it is noted that the patent of invention, which only discloses launch party, perfect to receive the reversed random reference signal of desired recipient
Situation does not account for the scene of limited channel status information feedback.
On the other hand, the cruise duration of continuing to bring out with emerging wireless traffic, mobile communication equipment is increasingly becoming shadow
Ring the key factor of user experience.Under the constantly ripe background of wireless energy transmission technology, researcher, which proposes, to be communicated
Fixed supply station is disposed in network, and energy is provided for the mobile device in network using wireless energy transmission technology.Currently, to the greatest extent
The novel wireless communication network architecture that pipe introduces supply station has caused international extensive concern, but correlative study work is still in
Starting stage is limited only to the application of supply station to provide energy for mobile device, not yet fully excavates the potential of supply station.
Invention content
In view of the above-mentioned deficiencies in the prior art, it is an object of the present invention to provide a kind of utilize in energy station minimum system secrecy
The method of disconnected probability promotes safety of physical layer performance using energy station.
In order to solve the above technical problems, technical solution provided by the present invention is:
A method of using energy station minimize system secrecy outage probability, the communication system include source node,
Legitimate receipt node, eavesdropping receiving node and energy station;The energy station is configured with NJRoot antenna, NJ≥1;The source section
Point is configured with NSRoot antenna, NS≥1;The legitimate receipt node and eavesdropping receiving node configure single antenna, specifically include as
Lower step:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate
One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node
In channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2;
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to institute
The wireless signal stated is eavesdropped, while energy station uses beamformer w2It is passed to legitimate receipt node and eavesdropping receiving node
Defeated wireless interference signal, to minimize the secrecy outage probability of system.
The secrecy is interrupted:When the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
The communication system carries out energy transmission respectively according to time distribution factor θ in a time slot T and information passes
It is defeated;In preceding θ T times, energy station transmits wireless energy to source node;In rear (1- θ) T time, source node is to legitimate receipt
Node-node transmission wireless signal, eavesdropping receiving node eavesdrops the wireless signal, while energy station is to legitimate receipt section
Point and eavesdropping receiving node emit wireless interference signal.
The energy station and source node constitute wireless energy transfer subsystem;The source node, legitimate receipt node
Wireless signal transmission subsystem is constituted with eavesdropping receiving node;Energy station, legitimate receipt node and the eavesdropping receiving node
Constitute wireless interference signal transmission subsystem.
Channel state information includes in the step 2):Energy station and source node, source node and legitimate receipt node, source
The channel status of node and eavesdropping receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node is believed
Breath.
Optimum beam figuration device w in the step 3)2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η is indicated
Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are indicated respectively
Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station
With the channel state information of eavesdropping receiving node;T and ' indicate transposition and conjugate operation symbol respectively.
The best launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding
Conversion utilizes It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into as follows
Form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
Using Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2It is established rules by solving following convex half
The method for drawing optimization problem combination linear search obtains;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal
Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z
It arrives.
Compared with the existing technology, beneficial effects of the present invention are embodied in:
(1) present invention provides a kind of method minimizing system secrecy outage probability using energy station, is carried using energy station
Safety of physical layer performance is risen, wireless energy transmission technology is introduced in original tapping channel classical model, passes through energy station
Device end into system provides energy, establishes the model that a kind of application range is wider, more practical, avoids traditional mould
Type is merely able to the constraint suitable for low power consumption wireless device terminal, effectively improves the cruising ability of device end.
(2) energy station can also be used as an interference source transmitting interference while providing energy for terminal in the present invention
Signal.The channel state information obtained using estimation, energy station are adjusted and obtain corresponding optimum beam figuration device w2So that
Interference signal generates smaller influence while generating larger interference to eavesdropping receiving node on legal receiving node, to substantially
Promote the secret and safe performance of entire communication system.
Description of the drawings
Fig. 1 is the schematic diagram of the communication system in embodiment;
Fig. 2 is the method flow diagram for minimizing system secrecy outage probability in embodiment using energy station;
Fig. 3 is the relation curve that the secrecy Outage probability of distributed antenna after optimizing in embodiment changes with main channel average signal-to-noise ratio
Figure.
Specific implementation mode
The present invention is further described with reference to embodiment and Figure of description.
Embodiment
As shown in Figure 1, communication system include a source node, a legitimate receipt node, one eavesdropping receiving node and
One energy station that can emit interference;The energy utilization efficiency of source node is 80%, and time distribution factor is 0.5, energy station
Multiple antennas number is 4, and the multiple antennas number of source node is 2.Legitimate receipt node and eavesdropping receiving node configure single antenna.Its
In, energy station and source node constitute wireless energy transfer subsystem;Source node, legitimate receipt node and eavesdropping receiving node are constituted
Wireless signal transmission subsystem;Energy station, legitimate receipt node and eavesdropping receiving node constitute wireless interference signal and transmit subsystem
System.
As shown in Fig. 2, the method for minimizing system secrecy outage probability using energy station, specifically comprises the following steps:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate
One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node
In channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2;
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to institute
The wireless signal stated is eavesdropped, while energy station uses beamformer w2To legitimate receipt node and eavesdropping receiving node
Wireless interference signal is transmitted, to minimize the secrecy outage probability of system.
Communication system carries out energy transmission respectively according to time distribution factor θ in a time slot T and information is transmitted;Preceding
In θ T times, energy station transmits wireless energy to source node;In rear (1- θ) T time, source node is to legitimate receipt node-node transmission
Wireless signal, eavesdropping receiving node eavesdrops the wireless signal, while energy station is to legitimate receipt node and eavesdropping
Receiving node emits wireless interference signal, and when the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
Channel state information includes in the step 2):Energy station and source node, source node and legitimate receipt node, source
The channel status of node and eavesdropping receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node is believed
Breath.
Optimum beam figuration device w in the step 3)2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η is indicated
Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are indicated respectively
Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station
With the channel state information of eavesdropping receiving node;T and ' indicate transposition and conjugate operation symbol respectively.
The best launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding
Conversion utilizes It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into as follows
Form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
Using Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2It is established rules by solving following convex half
The method for drawing optimization problem combination linear search obtains;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal
Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z
It arrives.
Performance evaluation
To prove that the performance change of system in embodiment, the present embodiment are divided using secrecy Outage probability of distributed antenna parameter
Analysis.Fig. 3 is the graph of relation that the secrecy Outage probability of distributed antenna after optimizing in the present embodiment changes with main channel average signal-to-noise ratio.
Here, we use other two kinds of basic schemes as reference:With reference to one i.e. transmission antenna selection strategy, institute is utilized
The channel state information of acquisition selects an antenna transmission wireless interference signal minimum to the interference of legal receiving node;Reference
Two i.e. high specific sending strategy, utilizes obtained channel state information, and antenna alignment eavesdropping receiving node transmitting is wireless dry
Signal is disturbed, to cause larger interference to it.
By comparison it can be found that the best performance under optimum beam figuration device strategy, has thus confirmed the design method
Validity.Simultaneously from figure 3, it can be seen that with main channel average signal-to-noise ratio increase, the secrecy outage probability of system is not
Disconnected to reduce, i.e. the performance of system is constantly promoted.
The foregoing is merely the preferred embodiment of the present invention, are not intended to limit the invention, all spirit in the present invention
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (5)
1. a kind of method minimizing system secrecy outage probability using energy station, communication system include source node, legal connect
Receive node, eavesdropping receiving node and energy station;The energy station is configured with NJRoot antenna, NJ≥1;The source node configuration
There is NSRoot antenna, NS≥1;The legitimate receipt node and eavesdropping receiving node configures single antenna, which is characterized in that specific
Include the following steps:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate one
Time slot;
2) energy station is estimated by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node in communication system
Channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2;
The optimum beam figuration device w2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η indicates wireless
Radio frequency energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source node are indicated respectively,
Source node and legitimate receipt node, source node and eavesdropping receiving node, energy station is with legitimate receipt node and energy station and surreptitiously
Listen the channel state information of receiving node;T and ' indicate transposition and conjugate operation symbol respectively;
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to described
Wireless signal is eavesdropped, while energy station uses beamformer w2Nothing is transmitted to legitimate receipt node and eavesdropping receiving node
Line interference signal, to minimize the secrecy outage probability of system.
2. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute
The energy station and source node stated constitute wireless energy transfer subsystem;Source node, legitimate receipt node and the eavesdropping receives
Node constitutes wireless signal transmission subsystem;Energy station, legitimate receipt node and the eavesdropping receiving node constitutes wireless dry
Disturb signal transmission subsystem.
3. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute
Channel state information includes in the step 2) stated:Energy station and source node, source node and legitimate receipt node, source node and eavesdropping
The channel state information of receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node.
4. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute
The best launching beam figuration device w stated2Its object function is converted with constraints by the method for semidefinite decoding, is utilized It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into following form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
5. the method according to claim 4 for minimizing system secrecy outage probability using energy station, which is characterized in that profit
With Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2By solving following convex Semidefinite Programming optimization problem
It is obtained in conjunction with the method for linear search;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal solution Z
It is the matrix that order is 1, and meetsThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908280.5A CN106656405B (en) | 2016-10-19 | 2016-10-19 | A method of minimizing system secrecy outage probability using energy station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908280.5A CN106656405B (en) | 2016-10-19 | 2016-10-19 | A method of minimizing system secrecy outage probability using energy station |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106656405A CN106656405A (en) | 2017-05-10 |
CN106656405B true CN106656405B (en) | 2018-11-06 |
Family
ID=58856803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610908280.5A Active CN106656405B (en) | 2016-10-19 | 2016-10-19 | A method of minimizing system secrecy outage probability using energy station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106656405B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108966222B (en) * | 2018-04-28 | 2021-03-09 | 深圳大学 | Physical layer authentication method and system based on self-adaptive covert protocol |
CN108966223B (en) * | 2018-04-28 | 2021-03-09 | 深圳大学 | Physical layer authentication method and system based on single-bit covert protocol |
CN109039412B (en) * | 2018-07-23 | 2020-07-28 | 西安交通大学 | Physical layer safe transmission method based on random beam forming |
CN109361486B (en) * | 2018-09-26 | 2019-08-16 | 南京邮电大学 | A kind of wireless frequency spectrum shared system safety of physical layer method for optimizing based on energy acquisition power supply |
CN112153674B (en) * | 2020-08-17 | 2022-02-11 | 西安交通大学 | Communication system power distribution method, device, terminal and readable storage medium |
CN113055063A (en) * | 2021-03-10 | 2021-06-29 | 浙江大学 | Low interception relay communication system based on spatial field digital modulation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001313655A (en) * | 2000-04-28 | 2001-11-09 | Fujitsu Ltd | Method and device for analyzing ieee1394 bus |
CN104811313A (en) * | 2015-04-03 | 2015-07-29 | 浙江大学 | Wireless power transfer-based optimal beam and time distribution design method |
CN105744516A (en) * | 2016-04-07 | 2016-07-06 | 浙江大学 | Communication system and method for improving security performance of physical layer by energy station |
-
2016
- 2016-10-19 CN CN201610908280.5A patent/CN106656405B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001313655A (en) * | 2000-04-28 | 2001-11-09 | Fujitsu Ltd | Method and device for analyzing ieee1394 bus |
CN104811313A (en) * | 2015-04-03 | 2015-07-29 | 浙江大学 | Wireless power transfer-based optimal beam and time distribution design method |
CN105744516A (en) * | 2016-04-07 | 2016-07-06 | 浙江大学 | Communication system and method for improving security performance of physical layer by energy station |
Non-Patent Citations (2)
Title |
---|
power beacon assisted wiretap channels with jamming;xin jiang等;《IEEE transactions on wireless communication》;20160227;第15卷(第12期);全文 * |
secrecy performance of wirelessly powered wiretap channels;Caijun zhong等;《IEEE transactions on communications》;20160718;第64卷(第9期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106656405A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106656405B (en) | A method of minimizing system secrecy outage probability using energy station | |
Hu et al. | Covert transmission with a self-sustained relay | |
CN104320826B (en) | The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment | |
CN105744516B (en) | A kind of communication system and method promoting safety of physical layer performance using energy station | |
CN105933040B (en) | A kind of safe transmission method of information source relaying joint transmission antenna selection | |
CN105119645A (en) | Receiving antenna space hopping secret communication method in MIMO system | |
CN108712199B (en) | Interruption probability constraint-based two-dimensional robust beamforming method under MISO eavesdropping channel | |
CN103546210B (en) | Based on the method for precoding that safe rate is optimized in multi-base station cooperative scene | |
CN110299934A (en) | A kind of security transmission method for wirelessly taking energy full duplex relaying system | |
CN105933894B (en) | The method for carrying out cipher key-extraction using the stochastic behaviour that recipient receives signal | |
CN102801522B (en) | Method for generating asymmetric channel communication key for wireless cooperative communication network | |
CN105491563A (en) | Method and system for improving security rate of MISO security communication system by utilizing artificial noise | |
CN102752080A (en) | Anti-eavesdrop coding method based on physical layer | |
CN105813081A (en) | Method for selecting relay nodes capable of enhancing security performance of cognitive relay network | |
CN105915318B (en) | Pseudo relay selection safe transmission method based on spatial modulation | |
CN205610681U (en) | Wireless relay transmission system based on physical layer safety | |
CN106507345A (en) | A kind of wireless relay communication method based on game theoretic safety of physical layer | |
CN105743926A (en) | Wireless relay transmission system based on physical layer security | |
Liu et al. | Joint decode-and-forward and jamming for wireless physical layer security with destination assistance | |
CN105978610B (en) | It is a kind of meter and radio physical layer safety base station forwarding multiple antennas processing method | |
Xu et al. | Probabilistic robust secure beamforming in MISO channels with imperfect LCSI and statistical ECSI | |
CN114024591B (en) | Relay cooperation non-orthogonal multiple access system and information transmission method | |
CN106604274A (en) | Safety communication method based on information theory and cryptography in wireless sensor network | |
Xue et al. | Secrecy Information and Energy Transmission Optimization of SWIPT System | |
Shu et al. | Secure directional modulation to enhance physical layer security in IoT networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |