CN106712816B - A kind of design method of the safe beam forming based on energy harvesting cognition network - Google Patents
A kind of design method of the safe beam forming based on energy harvesting cognition network Download PDFInfo
- Publication number
- CN106712816B CN106712816B CN201611159727.XA CN201611159727A CN106712816B CN 106712816 B CN106712816 B CN 106712816B CN 201611159727 A CN201611159727 A CN 201611159727A CN 106712816 B CN106712816 B CN 106712816B
- Authority
- CN
- China
- Prior art keywords
- user
- energy
- time
- optimization problem
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
- H04B7/043—Power distribution using best eigenmode, e.g. beam forming or beam steering
Abstract
The invention discloses a kind of design methods of safe beam forming based on energy harvesting cognition network, gather in time ratio as variable using energy first, construct the objective optimisation problems of the maximization transmission rate of time custom system in cognition wireless network;Secondly, objective optimisation problems are converted to semidefinite decoding problem using Matrix Conjugate transposition principle, use Charnes-Cooper by semidefinite decoding problem equivalency transform for convex optimization problem;Beamforming vectors and cognition beamforming vectors are forwarded than obtaining globally optimal solution finally by the linear search energy harvesting time, and then solve the safe rate of primary user and time user, complete the design of the safe beam forming of cognition wireless network.This method greatly simplifies design process, and solution scheme can not only prevent intercepting and capturing of the eavesdropping user to confidential information, while be able to achieve the increase of transmission rate again, effectively raise the performance of system.
Description
Technical field
The invention belongs to field of communication security, in particular to a kind of safe beam forming based on energy harvesting cognition network
Design method.
Background technique
In face of growing wireless transmission demand, frequency spectrum resource becomes a kind of rare resource, cognition wireless network
Occur effectively improving the spectrum efficiency of wireless network.Carrying out cooperation transmission using secondary user's (SU) not only can be with less
Resource consumption promote the transmission of primary user (PU) data, while SU can also be transmitted using the frequency spectrum resource of part primary user
The information of oneself, to achieve the effect that two-win.However the collaboration communication meeting in some practical application scenes between PU and SU
It is restricted, such as when sensor is as cooperating relay, since the capacity of battery is limited, if charging or timely cannot be provided
When replacing battery, cooperation transmission can then be interrupted.Therefore, if relaying can obtain energy, coorporative network from transmission environment
" life cycle " of network will greatly extend.In order to solve this problem, energy is carried out using radio frequency (RF) signal gather in quilt
It is recognized as a kind of effective solution method.Currently, the combination that wireless energy gathers in technology and cordless communication network has been obtained
Extensive concern, just gradually becomes a new hot research problem in wireless communication.In the wireless communication gathered in based on energy
In network, the wireless energy harvesting node energy as entrained by radiofrequency signal completely is powered, and then the node utilizes harvesting
Energy carry out again relevant operation and data transmission.
Due to wirelessly communicating the broadcast characteristic when transmitting information, the information of user is easy to be stolen in transmission process
It listens.In the collaboration communication of energy harvesting, the transmitting terminal (ST) of secondary user's carries out the energy using harvesting as cooperating relay
The signal for forwarding PU, because this user receiving end (SR) is possible to the signal of eavesdropping PU, to produce a series of information peace
Full problem.In traditional cognition wireless network, in order to guarantee the safety of information, the beam forming of safety of physical layer has been carried out
Extensive research.In recent years, it was also greatly paid close attention to using the safety that relaying carries out energy harvesting and promotes physical layer.
ZHANG N has studied and safe wave beam how is designed and optimized in half-duplex relay network from the angle of achievable safe rate
Forming and transimission power, (bibliography ZHANG N, LU N, SHEN X X.Cooperative spectrum access
towards secure information transfer for CRNs[J].IEEE Journal on Selected
Areas in Communications, 2013,31 (11): 2453-2464.) in the cooperative cognitive network of energy harvesting, it examines
This problem of the information of PU may be eavesdropped by considering SU, design for the safe rate of collaborative network, have scholar to have studied at present
Under single-input single-output (SISO) mode, the fast up to safety of collaboration mode has been carried out for the case where single SR and multiple SR
Rate analysis.The analysis of the cooperative cognitive network gathered in based on energy is only limited under the mode of SISO above, and is not accounted for
How the distribution of energy harvesting time and message processing time is optimized.
Summary of the invention
The present invention provides a kind of design method of safe beam forming based on energy harvesting cognition network, purpose exists
In the Communication Security Problem for the safe beam forming for overcoming cooperative cognitive wireless network.
A kind of design method of the safe beam forming based on energy harvesting cognition wireless network, comprising the following steps:
Step 1: using energy harvesting time ratio as optimized variable, optimization is turned to the transmission rate maximum of secondary custom system
Target constructs the safe beamforming design optimization problem based on energy harvesting cognition wireless network, so that primary user's system is full
The transmission power of sufficient secure communication quality requirement and secondary custom system transmitting terminal meets secure communication limitation;
Step 2: objective optimisation problems described in step 1 are converted into semidefinite decoding using Matrix Conjugate transposition principle
Problem uses Charnes-Cooper by semidefinite decoding problem equivalency transform for convex optimization problem;
Step 3: the time is gathered in than obtaining globally optimal solution by linear search energy, the globally optimal solution is including secondary
User forwards main system beamforming vectors and subsystem sends beamforming vectors, and then solves the peace of primary user and time user
Full rate completes the design of the safe beam forming of cognition wireless network.
Further, objective optimisation problems are as follows in the step 1:
Wherein, T is expressed as the overall process time of cooperative cognitive wireless network, and α is that energy gathers in time ratio, wPFor secondary user
Forward main system beamforming vectors, wSBeamforming vectors are sent for subsystem;
PPFor the average transmitting power of primary user's transmitting terminal, hPSTIndicate channel of the primary user to time user, N0For noise function
Rate,For main custom system demand rate,To eavesdrop end user system limiting speed, η is energy conversion efficiency, η ∈ [0,
1], ψ0Indicate time initial energy of user,Time user is represented sequentially as to eavesdropping end, secondary user to k-th
Eavesdrop end, secondary user to the channel vector h for receiving userSS、hSPConjugate transposition, hPP、hPSWithIt respectively indicates primary
The channel vector that family is eavesdropped between point to reception user, main system to k-th to reception user, subsystem;nPR、With
The additive white Gaussian noise at primary user receiving end, first eavesdropping point and k-th of eavesdropping point is respectively indicated, K is eavesdropping end
Number;
Primary user's transmitting terminal is PT in cognition wireless network, secondary user's transmitting terminal is ST, primary user receiving end is PR, secondary use
Family receiving end is SR, and the transmission channel of PT to PR is as primary user's system, and the transmission channel of ST to PR is as time custom system, PT
Main system is formed to the transmission channel between ST, PR and SR, the transmission channel between ST to PR, SR forms subsystem, and main
There are the signals of K-1 legal SR eavesdropping PT and ST in system and the coverage area of subsystem.
Further, described that objective optimisation problems described in step 1 are converted to half using Matrix Conjugate transposition principle
Determine relaxation problem to refer to w using Matrix Conjugate transposition principleS、wP、hSS、hSPIt is converted, appoints and energy is taken to gather in the time
Than α, objective optimisation problems are converted into semidefinite decoding problem:
Wherein,βp、For intermediate variable, Wherein Tr () is expressed as the mark of matrix;
Equal intermediate variable,WithRespectively secondary use
Family forwards the conjugate transposition of main system beamforming vectors, and subsystem sends the conjugate transposition of beamforming vectors.
Further, use Charnes-Cooper by the semidefinite decoding problem equivalency transform for convex optimization problem:
Wherein, HSS、HSP、WSAnd WPIt is intermediate variable, Withλ is relaxation transformation contraction-expansion factor.
Further, as follows for the solution procedure of the convex optimization problem:
Step 1): setting linear search precision Δ α concurrently sets the initial value of energy harvesting time ratio;
The initial value that energy gathers in time ratio is set according to practical application request, and value range 0-1, value is smaller, searches
The range of rope is bigger.
Step 2): solving the equation group of convex optimization problem, obtains local optimum solution vector
Step 3): ifWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWithWherein, rank is expressed as rank of matrix;
Step 4): updating search value α=α+Δ α and enter step 5) if α >=1, otherwise, return step 2);
Step 5): substituting into convex optimization problem for all local optimum solution vectors, so that convex optimization problem corresponding time is used
Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate maximum of family system are global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time
The optimal safe rate of user
Beneficial effect
The present invention provides a kind of design methods of safe beam forming based on energy harvesting cognition network, first with energy
Amount harvesting time ratio as variable, ask by the objective optimization for constructing the peak transfer rate of time custom system in cognition wireless network
Topic, and objective optimisation problems is made to meet the secure communication quality of primary user's system and the transmission power satisfaction of subsystem transmitting terminal
Subsystem secure communication quality;Secondly, objective optimisation problems described in step 1 are converted using Matrix Conjugate transposition principle
For semidefinite decoding problem, use Charnes-Cooper by semidefinite decoding problem equivalency transform for convex optimization problem;Finally by
Linear search energy gathers in the time than obtaining globally optimal solution i.e. forwarding beamforming vectors and cognition beamforming vectors, in turn
The safe rate for solving primary user and time user, completes the design of the safe beam forming of cognition wireless network.By that will solve
After the non-convex optimization problem of time custom system peak transfer rate by converting twice in cognition wireless network, dissolve as convex optimization
Problem solving greatly simplifies design process, meanwhile, the solution scheme proposed can not only prevent eavesdropping user to secrecy
The intercepting and capturing of information, while it being able to achieve the increase of transmission rate again, effectively raise the performance of system.
Detailed description of the invention
Fig. 1 is of the present invention a kind of based on safe beamforming design method process in energy harvesting cognition network
Figure;
Fig. 2 is system model;
Fig. 3 is to eavesdrop number of nodes to influence the safe rate of secondary custom system;
Fig. 4 is that the initialization energy in ST influences the safe rate of secondary custom system, (K=2);
Fig. 5 is that the initialization energy in ST influences the safe rate of primary user's system, (K=2).
Specific embodiment
Below in conjunction with example and attached drawing, the present invention is described further.
Embodiment 1:
The indoor environment of 2.4GHz band resource is shared by one wireless sensor network of design or WiFi and ZigBee
In, wherein WiFi and ZigBee is respectively that primary user and time user carry out data transmission, and emulation tool uses matlab.
As shown in Figure 1, it is a kind of based on energy harvesting cognition network in safe beam forming design method, specifically include with
Lower step:
Step 1: using energy harvesting time ratio as optimized variable, optimization mesh being turned to the transmission rate maximum of secondary custom system
Mark constructs the safe beamforming design optimization problem based on energy harvesting cognition wireless network, so that primary user's system meets
The transmission power of secure communication quality requirement and secondary custom system transmitting terminal meets secure communication limitation.
As shown in Fig. 2, carrying out collaboration communication between a main system and the subsystem of an energy constraint.Main system includes
Transmission channel between PT to ST, PR and SR, includes the transmission channel between ST to PR, SR in subsystem, while subsystem
Coverage area in there is also the signals that K-1 SR user may eavesdrop PT, it is assumed that ST outfit N root antenna, other terminals match
Standby 1 antenna.Within the system, the data that PT sends secrecy are provided after ST receives information using the frequency spectrum of primary user to PR
Source carries out relay forwarding, while also sending unclassified data and giving its corresponding receiving end SR.If the transmission energy of ST is too low,
The efficiency of collaboration communication will also become very low.Therefore, time conversion relaying (TSR) agreement is used at the end ST, ST is existed
The alternate operation of energy harvesting and information processing is carried out in transmission time T.
Therefore it before carrying out collaboration communication, needs to carry out in advance to obtain energy from the transmission of primary user;Simultaneously in number
According to the transmission stage, other ZigBee users in effective range may also carry out monitoring decoding to main user data.It is assisted in TSR
In view, all times T is divided into three phases, as shown in table 1:
TSR agreement in 1 ST of table
(1) energy gathers in stage α T:
In this stage, PT sends dedicated energy signal xe, energy signal that ST will be received using power conversion circuits
Be converted to energy, PR, SR and SRkIt does nothing.At this time according to TSR agreement, the energy ψ of ST harvestinghIt is expressed as
Wherein, η ∈ [0,1] is energy conversion efficiency;PpFor the average transmitting power at the end PT;hPSTIndicate the letter of PT to ST
Road vector, since the noise that antenna and rectifier generate is too small, the energy of harvesting is ignored.
(2) information reconnaissance phase (1- α) T/2
In this stage, PT sends confidential information xPTo ST.ST received signal is at this time
Wherein, nSTIt is 0 for mean value, is expressed as white complex gaussian noise, i.e. nST, PR, SR1 and eavesdropping end SRk(k∈{2,...,
K }) signal of PT is also received in this stage.PR, SR1 and SR at this timekReceived signal is respectively
Wherein, hPP, hPSWithRespectively indicate PT to PR, SR1 and k-th of eavesdropping point SRkChannel vector, nPR,Respectively indicate PR, SR1 and k-th of eavesdropping point SRkThe additive white Gaussian noise at place.ST is sharp by received primary user's signal
Forwarding (amplify-and-forward, AF) is amplified with maximum-ratio combing (maximal ratio combining, MRC)
Processing, therefore signal to be sent is expressed as
(3) information re-transmission stage (1- α) T/2:
In this stage, ST uses remaining energy ψ0With the energy ψ of harvestingh, and using forwarding beamforming vectors wPWith
Recognize beamforming vectors wS, the confidential information of simultaneous transmission primary user and the information of their own.At this point, PR, SR1 and SRkIt receives
Signal be respectively as follows:
Wherein, hSP, hSSWithRespectively indicate ST to PR, SR and k-th of eavesdropping point SRkChannel vector,
Then objective function is established, the objective function for combining safe beam forming optimization design is that maximized realization is secondary
The transmission rate of user, while guaranteeing that PU meets security restriction and the transmission power limit of ST in qualified function.Therefore, combine
Optimization problem (P1) formula indicates are as follows:
Step 2: objective optimisation problems described in step 1 being converted into semidefinite decoding using Matrix Conjugate transposition principle
Problem uses Charnes-Cooper by semidefinite decoding problem equivalency transform for convex optimization problem;
It can be seen that the realization and primary user's system of the peak transfer rate of time custom system from the above combined optimization problem
Demand rateEavesdrop end user system limiting speedAnd initialization energy is related to harvesting energy.Analyze (P1) it is found that
Combined optimization problem (P1) is non-convex optimization problem, can not obtain simultaneously and forward main system beamforming vectors for secondary user
wP, beamforming vectors w is sent for subsystemSThe optimization solution of time ratio α is gathered in, with energy in order to solve non-convex combined optimization
Problem (P1), which is first appointed, takes energy to gather in time ratio α, and optimization problem is converted to semidefinite decoding (SDR) problem.It is assumed that energy gathers in
Time ratioConstant between 0-1, by variable wPIt is expressed as
DefinitionWithProblem
(P1) relaxation problem (P2) can indicate are as follows:
Wherein,
Objective function in problem (P2) is fractional form, therefore can be converted using Charnes-Cooper, is enabledWithBy relaxation problem (P2) etc.
Effect is (P3)
Step 3: the time being gathered in than obtaining globally optimal solution by linear search energy, the globally optimal solution is including forwarding
Beamforming vectors and cognition beamforming vectors, and then the safe rate of primary user and time user are solved, complete cognition wireless
The design of the safe beam forming of network;
Step 1): setting linear search precision Δ α=0.01, concurrently set energy harvesting time ratio initial value α=
0.1;
Step 2): solving the equation group of convex optimization problem, obtains local optimum solution vector
Step 3): ifWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWith
Step 4): updating search value α=α+Δ α and enter step 5) if α >=1, otherwise, return step 2);
Step 5): substituting into convex optimization problem for all local optimum solution vectors, so that convex optimization problem corresponding time is used
Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate maximum of family system are global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time
The optimal safe rate of user
In the environment of simulation, it is assumed that the signal transmitting power P of PTPRemaining energy ψ in=20dB, ST0=10dB, hair
Channel model between sending end and receiving end isD indicates distance, and μ=3.5 indicates path loss index, ω clothes
From [0,2 π) be uniformly distributed.Noise normalized covariance N0=1.It is assumed that the antenna number N=4 in ST, from ST to other terminals
Distance be 2m, the distance of PT to PR is 4m;PR minimum essential requirement rateSRkIt monitors needed for primary user's signal most
Small rate
Step 4: finding eavesdropping number of nodes influences the safe rate of secondary custom system.
Fig. 3 is indicated under different-energy transfer efficiency, eavesdrops node SRkThe increase of quantity is to secondary custom system security performance
Influence.From the figure, it can be seen that the safe rate of secondary custom system is reduced with the increase of eavesdropping number of nodes.Meanwhile it is secondary
The safe transmission rate of user is reduced with the reduction of energy conversion efficiency η, but the security performance of prioritization scheme still better than
Security performance when noenergy is gathered in.Work as ψ0=0dB, η=0.8, when 0.5,0.3, when safe rate is gathered in than noenergy
Safe rate is higher by about 0.85bit/s/Hz, 0.67bit/s/Hz and 0.5bit/s/Hz respectively.
Step 5: the initialization energy found in ST influences the safe rate of secondary custom system, K=2.
Fig. 4 illustrates that at eavesdropping number of nodes K=2 and different energy conversion efficiencies, the initialization energy of ST is to secondary use
The influence of the safe rate of family system.It can be seen from the figure that the safe rate of secondary custom system is with ST initialization energy
Increase and increases.In lower initialization energy range, secondary custom system security performance is substantially better than time when noenergy harvesting
The security performance of custom system.Even if when energy conversion efficiency η=0.3, the safe rate of secondary user is received still better than noenergy
The safe rate cut.When initialization energy is in higher range, the secondary user security rate of noenergy harvesting is close to energy
Measure the secondary user security rate of harvesting.
Step 6: the initialization energy found in ST influences the safe rate of primary user's system, K=2.
Fig. 5 illustrates that at eavesdropping number of nodes K=2 and different energy conversion efficiencies, the initialization energy of ST is to primary
The influence of the safe rate of family system.The wherein safe rate demand of primary user's systemIt can from Fig. 5
Out, in low initialization energy range (0dB-10dB), as scheme η=0.3 proposed by the present invention and noenergy harvesting feelings
Under condition, the safe rate of PU is unable to meet demand.As energy conversion efficiency η=0.5,0.8, the safe rate of primary user PU
The demand of safe rate is all satisfied in entirely initialization energy range.With the increase of initialization energy, gathered in using energy
When PU safe rate with do not use energy harvesting when PU safe rate move closer to.Thus illustrate in lower relay transmission
Under energy, the transmission rate of PU will receive serious influence;With the promotion of energy conversion efficiency, the transmission energy of relaying also can
Increase, therefore also primary user's rate can be made to meet transmission demand in lower initialization energy range.
Although the present invention has been presented for some embodiments of the present invention, it will be appreciated by those of skill in the art that
Without departing from the spirit of the invention, the embodiments herein can be changed, above-described embodiment is only exemplary,
It should not be using the embodiments herein as the restriction of interest field of the present invention.
Claims (1)
1. it is a kind of based on energy harvesting cognition wireless network safe beam forming design method, which is characterized in that including with
Lower step:
Step 1: using energy harvesting time ratio as optimized variable, turning to optimization aim with the transmission rate maximum of secondary custom system,
The safe beamforming design optimization problem based on energy harvesting cognition wireless network is constructed, so that primary user's system meets safety
The transmission power of QoS requirement and secondary custom system transmitting terminal meets secure communication limitation;
Step 2: objective optimisation problems described in step 1 are converted into semidefinite decoding using Matrix Conjugate transposition principle and are asked
Topic, uses Charnes-Cooper by semidefinite decoding problem equivalency transform for convex optimization problem;
Step 3: the time is gathered in than acquisition globally optimal solution by linear search energy, the globally optimal solution includes time user
It forwards main system beamforming vectors and subsystem to send beamforming vectors, and then solves the safety speed of primary user and time user
Rate completes the design of the safe beam forming of cognition wireless network;
Objective optimisation problems are as follows in the step 1:
s.t.
C1:
C2:
C3:
C4:0≤α < 1
Wherein, T is expressed as the overall process time of cooperative cognitive wireless network, and α is that energy gathers in time ratio, wPFor secondary user forwarding
Main system beamforming vectors, wSBeamforming vectors are sent for subsystem;
PPFor the average transmitting power of primary user's transmitting terminal, hPSTIndicate channel of the primary user to time user, N0For noise power,
For main custom system demand rate,To eavesdrop end user system limiting speed, η is energy conversion efficiency, η ∈ [0,1], ψ0Table
Show time initial energy of user,Be represented sequentially as time user to eavesdropping end, secondary user to k-th eavesdrop end,
Channel vector h of the secondary user to reception userSS、hSSk、hSPConjugate transposition, hPP、hPSAnd hPSkPrimary user is respectively indicated to reception
User, subsystem to reception user, main system to the channel vector between k-th of eavesdropping point;K is eavesdropping end number;
Primary user's transmitting terminal is PT in cognition wireless network, secondary user's transmitting terminal is ST, primary user receiving end is PR, and secondary user connects
The transmission channel of receiving end SR, PT to PR as primary user's system, the transmission channel of ST to PR as time custom system, PT to ST,
Transmission channel between PR and SR forms main system, and the transmission channel between ST to PR, SR forms subsystem, and main system with
There are the signals of K-1 legal SR eavesdropping PT and ST in the coverage area of subsystem;
Objective optimisation problems described in step 1 are converted to semidefinite decoding problem by the utilization Matrix Conjugate transposition principle is
Refer to and utilizes Matrix Conjugate transposition principle by wS、wP、hSS、hSPIt is converted, appoints and energy is taken to gather in time ratio α, target is excellent
Change problem is converted to semidefinite decoding problem:
s.t.
C1:
C2:
C3:
Wherein, Wherein Tr () is expressed as the mark of matrix,βp、For intermediate variable;
Equal intermediate variable,With Respectively secondary use
Family forwards the conjugate transposition of main system beamforming vectors, and subsystem sends the conjugate transposition of beamforming vectors;
Use Charnes-Cooper by the semidefinite decoding problem equivalency transform for convex optimization problem:
s.t.
C1:Tr(HSSWP)+λN0=1
C2:
C3:
C4:
C5:WP≥0,WS≥0,λ≥0
Wherein, HSS、HSP、WSAnd WPIt is intermediate variable, Withλ is relaxation transformation contraction-expansion factor;
It is as follows for the solution procedure of the convex optimization problem:
Step 1): setting linear search precision Δ α concurrently sets the initial value of energy harvesting time ratio;
Step 2): solving the equation group of convex optimization problem, obtains local optimum solution vector
Step 3): ifWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWithWherein, rank is expressed as rank of matrix;
Step 4): updating search value α=α+Δ α and enter step 5) if α >=1, otherwise, return step 2);
Step 5): substituting into convex optimization problem for all local optimum solution vectors, so that the corresponding secondary user system of convex optimization problem
Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate maximum of system are global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time
The optimal safe rate of user
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611159727.XA CN106712816B (en) | 2016-12-15 | 2016-12-15 | A kind of design method of the safe beam forming based on energy harvesting cognition network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611159727.XA CN106712816B (en) | 2016-12-15 | 2016-12-15 | A kind of design method of the safe beam forming based on energy harvesting cognition network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106712816A CN106712816A (en) | 2017-05-24 |
CN106712816B true CN106712816B (en) | 2019-11-29 |
Family
ID=58937847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611159727.XA Active CN106712816B (en) | 2016-12-15 | 2016-12-15 | A kind of design method of the safe beam forming based on energy harvesting cognition network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106712816B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109195169B (en) * | 2018-09-04 | 2022-11-11 | 中国人民解放军陆军工程大学 | Cognitive eavesdropping network physical layer secure transmission method based on energy acquisition technology |
CN111866904A (en) * | 2019-04-26 | 2020-10-30 | 深圳先进技术研究院 | Optimal distribution method, device, terminal and storage medium for energy efficiency of relay network |
CN110601736B (en) * | 2019-08-09 | 2023-10-24 | 中央民族大学 | Multi-antenna full-duplex cognitive radio energy capturing and information transmitting method |
CN110912597B (en) * | 2019-11-07 | 2023-04-21 | 南京邮电大学 | Robust safe beam forming method based on multi-objective optimization |
CN111446993B (en) * | 2020-03-26 | 2023-03-14 | 南京邮电大学 | Beam forming method for safety-oriented communication in cognitive radio network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7698926B2 (en) * | 2007-04-26 | 2010-04-20 | Honeywell International Inc. | Electrical connection of energy harvesting devices |
CN104135770A (en) * | 2014-07-02 | 2014-11-05 | 北京邮电大学 | Energy distribution method of system for simultaneous transmission of wireless information and energy |
CN104883741A (en) * | 2015-04-09 | 2015-09-02 | 南京邮电大学 | Resource allocation algorithm for cognitive radio network |
CN105375955A (en) * | 2015-10-26 | 2016-03-02 | 西安电子科技大学 | Cooperative transmission method in simultaneous wireless information and power transfer relay network |
CN105744629A (en) * | 2016-04-02 | 2016-07-06 | 南京邮电大学 | Method for optimal distribution of time of energy harvesting relay system based on relay selection |
CN106102117A (en) * | 2016-06-13 | 2016-11-09 | 西安交通大学 | Double bounce has safe transmission method based on energy harvesting in buffer network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007079490A2 (en) * | 2006-01-05 | 2007-07-12 | University Of Pittsburgh-Of The Commonwealth System Of Higher Education | A wireless autonomous device system |
US10405326B2 (en) * | 2012-08-01 | 2019-09-03 | Texas Instruments Incorporated | Scheduling energy harvesting nodes in a wireless sensor networks |
KR101393934B1 (en) * | 2013-06-12 | 2014-05-12 | 인하대학교 산학협력단 | Apparatus and method of energy harvesting in the interference alignment systems |
KR101579705B1 (en) * | 2015-01-30 | 2015-12-23 | 세종대학교산학협력단 | Wi-Fi Backscatter System and Method For Beamforming using The Same |
-
2016
- 2016-12-15 CN CN201611159727.XA patent/CN106712816B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7698926B2 (en) * | 2007-04-26 | 2010-04-20 | Honeywell International Inc. | Electrical connection of energy harvesting devices |
CN104135770A (en) * | 2014-07-02 | 2014-11-05 | 北京邮电大学 | Energy distribution method of system for simultaneous transmission of wireless information and energy |
CN104883741A (en) * | 2015-04-09 | 2015-09-02 | 南京邮电大学 | Resource allocation algorithm for cognitive radio network |
CN105375955A (en) * | 2015-10-26 | 2016-03-02 | 西安电子科技大学 | Cooperative transmission method in simultaneous wireless information and power transfer relay network |
CN105744629A (en) * | 2016-04-02 | 2016-07-06 | 南京邮电大学 | Method for optimal distribution of time of energy harvesting relay system based on relay selection |
CN106102117A (en) * | 2016-06-13 | 2016-11-09 | 西安交通大学 | Double bounce has safe transmission method based on energy harvesting in buffer network |
Non-Patent Citations (7)
Title |
---|
Cooperative Spectrum Access Towards Secure Information Transfer for CRNs;Ning Zhang et al;《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》;20131130;第31卷(第11期);第2453-2464页 * |
Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers;Muhammad R. A. Khandaker et al;《IEEE WIRELESS COMMUNICATIONS LETTERS》;20150228;第4卷(第1期);第10-13页 * |
Secure wireless energy harvesting-enabled AF-relaying SWIPT networks;Hong Xing et al;《2015 IEEE International Conference on Communications (ICC)》;20150612;第2307-2312页 * |
基于半定规划方法的多个窃听用户认知网络物理层安全优化设计;谢显中等;《电子与信息学报》;20151031;第37卷(第10期);第2424-2430页 * |
基于时频资源分配的认知无线中继网络物理层安全研究;高锐锋等;《计算机科学》;20160430;第43卷(第4期);第163-166,187页 * |
基于能量收割的认知无线电预编码优化;朱锐等;《清华大学学报(自然科学版)》;20140430;第54卷(第4期);第407-412页 * |
采用博弈论的认知无线网络主用户和不可信任次用户的协作策略;马亚燕;《西安交通大学学报》;20160229;第50卷(第2期);第61-67页 * |
Also Published As
Publication number | Publication date |
---|---|
CN106712816A (en) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106712816B (en) | A kind of design method of the safe beam forming based on energy harvesting cognition network | |
Lu et al. | SWIPT cooperative spectrum sharing for 6G-enabled cognitive IoT network | |
Lu et al. | Energy efficiency optimization in SWIPT enabled WSNs for smart agriculture | |
Liu et al. | RF energy harvesting wireless powered sensor networks for smart cities | |
Hao et al. | Green communication for NOMA-based CRAN | |
Liu et al. | QoS-aware throughput maximization in wireless powered underground sensor networks | |
Li et al. | Energy-efficient resources allocation with millimeter-wave massive MIMO in ultra dense HetNets by SWIPT and CoMP | |
Long et al. | Transmit beamforming for cooperative ambient backscatter communication systems | |
Chen et al. | Stochastic transceiver optimization in multi-tags symbiotic radio systems | |
Su et al. | Optimizing computation efficiency for NOMA-assisted mobile edge computing with user cooperation | |
CN107769823A (en) | A kind of information energy cooperative beam manufacturing process based on cognition bilateral relay network | |
Zhang et al. | On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking | |
Xu et al. | Weighted sum rate maximization in IRS-BackCom enabled downlink multi-cell MISO network | |
Zhang et al. | Performance analysis and optimization for power beacon-assisted wireless powered cooperative NOMA systems | |
Su et al. | Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting | |
CN113518357B (en) | Relay method of passive Internet of things | |
Hu et al. | Multi-domain resource scheduling for simultaneous wireless computing and power transfer in fog radio access network | |
Du et al. | Sum rate maximization for UAV-enabled wireless powered NOMA systems | |
CN105848267B (en) | Based on energy consumption minimized serial energy-collecting method | |
Lu et al. | Resource allocation for OFDM relaying wireless power transfer based energy-constrained UAV communication network | |
Mao et al. | Joint distributed beamforming and backscattering for UAV-assisted WPSNs | |
Al-Obiedollah et al. | A joint beamforming and power-splitter optimization technique for SWIPT in MISO-NOMA system | |
Ma et al. | Sum rate optimization for SWIPT system based on zero-forcing beamforming and time switching | |
Lei et al. | Secrecy rate maximization for 6g cognitive satellite-uav networks | |
Li et al. | Multigroup multicast transmission via intelligent reflecting surface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Dong Jian Inventor after: Shi Heyuan Inventor after: Shi Zhenhong Inventor after: Tang Gun Inventor before: Dong Jian Inventor before: Shi Zhenhong Inventor before: Tang Gun |
|
CB03 | Change of inventor or designer information |