CN108810885A - Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization - Google Patents

Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization Download PDF

Info

Publication number
CN108810885A
CN108810885A CN201810364696.4A CN201810364696A CN108810885A CN 108810885 A CN108810885 A CN 108810885A CN 201810364696 A CN201810364696 A CN 201810364696A CN 108810885 A CN108810885 A CN 108810885A
Authority
CN
China
Prior art keywords
follows
case
optimal solution
optimization
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810364696.4A
Other languages
Chinese (zh)
Inventor
吴远
吴伟聪
倪克杰
毛浩伟
石佳俊
钱丽萍
黄亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201810364696.4A priority Critical patent/CN108810885A/en
Publication of CN108810885A publication Critical patent/CN108810885A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为一个多变量非凸性优化问题;将问题P1转换为一个底层子问题P1‑Sub和一个顶层问题P1‑Top进行优化求解;将底层子问题P1‑Sub经过多次等效转换为P2‑E问题;得到在P2‑E问题中控制变量范围给定的情况下的问题优化解;列举出不同情况下P2‑E问题的控制变量范围,代入到在控制变量范围给定时所求得的P2‑E问题优化解中;得到底层子问题P1‑Sub的最优化解;在得到底层子问题P1‑Sub的最优化解后,通过使用线性搜索法对顶层问题P1‑Top进行求解,得到顶层问题的最优化解,最终得到了整个优化问题的最优化解。本发明效率较高、灵活度较高。

An uplink dual-connection data splitting method based on joint confidentiality and power consumption optimization, wherein the optimization problem of minimizing the total power consumption of MU under the condition of satisfying data confidentiality requirements and energy effectiveness is described as a multivariable non-convex optimization problem; problem P1 is converted into a bottom subproblem P1-Sub and a top problem P1-Top for optimization and solution; the bottom subproblem P1-Sub is equivalently converted into the P2-E problem for multiple times; the problem optimization solution is obtained when the control variable range in the P2-E problem is given; the control variable ranges of the P2-E problem under different conditions are listed and substituted into the P2-E problem optimization solution obtained when the control variable range is given; the optimal solution of the bottom subproblem P1-Sub is obtained; after obtaining the optimal solution of the bottom subproblem P1-Sub, the top problem P1-Top is solved by using a linear search method to obtain the optimal solution of the top problem, and finally the optimal solution of the entire optimization problem is obtained. The present invention has high efficiency and high flexibility.

Description

一种基于联合保密程度和功率消耗优化的上行双连接数据分 流方法An uplink dual connection data distribution based on joint security degree and power consumption optimization stream method

技术领域technical field

本发明涉及无线网络,尤其是一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法。The invention relates to a wireless network, in particular to an uplink dual connection data distribution method based on joint security degree and power consumption optimization.

背景技术Background technique

在过去的十年,智能移动终端的爆炸式增长,移动网络服务的受欢迎程度不断提高,蜂窝网中产生了巨大的通信量。在无线电接入网的多层结构上,大量的异构小基站密集覆盖在宏基站的单元内,宏基站将移动通信量分流给小基站,这种方式就是数据分流。数据分流已经作为一种有效并且有经济效益的方法,在宏基站蜂窝网中缓解通信量的拥塞起了很大的作用。但是,这种单一的方式效率和灵活度有较大的欠缺。为了可以更好地分流数据和更灵活地管理资源,第三代合作伙伴项目提出“双连接”技术,能够使用户(MobileUsers,MUs)通过使用两个不同的无线电接口和宏基站(macro Base Station,BS)交流,并且同时将分流的数据传给小基站(small-cell Access Point,AP)。In the past decade, the explosive growth of smart mobile terminals, the increasing popularity of mobile network services, and the huge traffic generated in cellular networks. In the multi-layer structure of the radio access network, a large number of heterogeneous small base stations are densely covered in the unit of the macro base station, and the macro base station offloads mobile traffic to the small base station. This method is data offloading. As an effective and cost-effective method, data offloading has played a significant role in alleviating traffic congestion in macro base station cellular networks. However, the efficiency and flexibility of this single method are relatively lacking. In order to better distribute data and manage resources more flexibly, the Third Generation Partnership Project proposes "dual connectivity" technology, which enables users (MobileUsers, MUs) to use two different radio interfaces and macro base stations (macro Base Station) , BS) to communicate, and at the same time transmit the offloaded data to a small base station (small-cell Access Point, AP).

发明内容Contents of the invention

为了克服现有技术的效率较低、灵活度较低的不足,本发明提供一种效率较高、灵活度较高的无线网络中基于联合保密程度和功率消耗优化的上行双连接数据分流方法。In order to overcome the disadvantages of low efficiency and low flexibility in the prior art, the present invention provides an uplink dual connection data offloading method based on joint security degree and power consumption optimization in a wireless network with high efficiency and high flexibility.

本发明解决其技术问题所采用的技术方案是:The technical solution adopted by the present invention to solve its technical problems is:

一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,所述方法包括以下步骤:A method for offloading uplink dual connection data based on joint confidentiality and power consumption optimization, said method comprising the following steps:

(1)在基站BS的覆盖范围下有一个移动用户MU,同时部署了一个小蜂窝辅助网络接入点AP通过“双连接”为MU提供数据分流服务;(1) There is a mobile user MU under the coverage of the base station BS, and a small cell auxiliary network access point AP is deployed to provide data offloading services for the MU through "dual connectivity";

在无线网络中,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为如下所示的非凸性优化问题P1问题,该问题表示如下:In a wireless network, the optimization problem of minimizing the total power consumption of a MU while satisfying data confidentiality requirements and energy efficiency is described as a non-convex optimization problem P1 shown below, which is expressed as follows:

min piA+piB min p iA +p iB

限制条件: limitation factor:

xiA≥0x iA ≥ 0

xiB≥0x iB ≥ 0

控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )

在P1问题中,xiB表示BS侧MU所能达到的最大数据需求流量,piB表示BS侧MU消耗的能量;xiA表示AP侧MU所能达到的最大数据需求流量,piA表示AP侧MU消耗的能量;Pout是关于piA和xiA的函数,表示为Pout(piA,xiA),式(1-5)是通过香农定理得到的;In the P1 problem, x iB represents the maximum data flow required by the MU on the BS side, p iB represents the energy consumed by the MU on the BS side; x iA represents the maximum data flow required by the MU on the AP side, and p iA represents the energy consumed by the MU on the AP side Energy consumed by MU; P out is a function of p iA and x iA , expressed as P out (p iA , x iA ), formula (1-5) is obtained through Shannon's theorem;

将问题中的各个变量的含义说明如下:The meaning of each variable in the question is explained as follows:

piA:AP侧MU消耗的能量/W;p iA : energy consumed by the MU on the AP side/W;

piB:BS侧MU消耗的能量/W;p iB : energy consumed by the MU on the BS side/W;

xiB:BS侧MU所能达到的最大数据需求流量;x iB : the maximum data flow required by the MU on the BS side;

xiA:AP侧MU所能达到的最大数据需求流量;x iA : the maximum data flow required by the MU on the AP side;

WB:MU到BS的信道带宽/HZ;W B : channel bandwidth/HZ from MU to BS;

WA:MU到AP的信道带宽/HZ;W A : channel bandwidth/HZ from MU to AP;

giA:MU到AP的信道增益;g iA : channel gain from MU to AP;

giB:MU到BS的信道增益;g iB : channel gain from MU to BS;

giE:MU到窃听者的信道增益;g iE : channel gain from MU to eavesdropper;

nA:MU到AP的背景噪声功率/W;n A : background noise power from MU to AP/W;

nB:MU到BS的背景噪声功率/W;n B : background noise power from MU to BS/W;

nE:MU到窃听者的背景噪声功率/W;n E : background noise power from MU to eavesdropper/W;

MU到AP可以获得的最大保密数据吞吐量; The maximum confidential data throughput that can be obtained from MU to AP;

Pout:AP在给MU提供数据分流服务时的保密性溢出的概率MU到AP的最大消耗能量/W;P out : probability of confidentiality overflow when AP provides data offload service to MU The maximum energy consumption from MU to AP/W;

MU到BS的最大消耗能量/W; The maximum energy consumption from MU to BS/W;

MU的保密性溢出概率的上界; The upper bound of the confidentiality overflow probability of MU;

i:MU的保密性溢出概率;i : Confidentiality overflow probability of MU;

αi:MU到窃听者信道增益的平均值;α i : the average value of channel gain from MU to eavesdropper;

(2)通过对P1问题的分析,将P1问题分解为一个底层子问题P1-Sub和一个顶层问题P1-Top进行优化求解,其中的底层子问题P1-Sub如下所示:(2) Through the analysis of the P1 problem, the P1 problem is decomposed into a bottom sub-problem P1-Sub and a top-level problem P1-Top for optimal solution. The bottom sub-problem P1-Sub is as follows:

V(∈i)=minpiA+piB V(∈ i )=minp iA +p iB

限制条件:Pout(piA,xiA)=∈i (2-1)Constraints: P out (p iA , x iA )=∈ i (2-1)

xiA≥0x iA ≥ 0

xiB≥0x iB ≥ 0

控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )

顶层问题P1-Top如下所示:The top-level problem P1-Top looks like this:

min V(εi)min V(ε i )

限制条件: limitation factor:

控制变量:εi Control variable: ε i

在P1问题的优化求解过程中,先对底层子问题P1-Sub进行逐步的优化求解;In the process of optimizing the solution of the P1 problem, the underlying sub-problem P1-Sub is first optimized and solved step by step;

(3)保密性溢出的概率函数Pout(piA,xiA)表达式如下:(3) The expression of the probability function P out (p iA , x iA ) of confidentiality overflow is as follows:

上式中的表示MU到AP可以获得的最大保密数据吞吐量,其表达式如下:in the above formula Indicates the maximum confidential data throughput that can be obtained from MU to AP, and its expression is as follows:

将式(3-2)代入(3-1)得到Pout(piA,xiA)表达式如下:Substitute formula (3-2) into (3-1) to get the expression of P out (p iA , x iA ) as follows:

定义一个辅助量表示MU到AP的有效信道功率增益,其表达式如下:define an auxiliary Indicates the effective channel power gain from MU to AP, and its expression is as follows:

结合式(3-4)得到Pout(piA,xiA)表达式如下:Combining formula (3-4) to get the expression of P out (p iA , x iA ) as follows:

(4)通过对(1-1)和(3-5)进行联立分析,得到(1-1)的限制表达式如下:(4) Through the simultaneous analysis of (1-1) and (3-5), the restricted expression of (1-1) is obtained as follows:

定义一个新的变量θiA来量化保密性需求的影响,θiA的表达式如下:Define a new variable θ iA to quantify the impact of confidentiality requirements, the expression of θ iA is as follows:

通过对(4-1)的进一步转化,得到(1-1)的等效表达式如下:By further transforming (4-1), the equivalent expression of (1-1) is obtained as follows:

而在P1问题的最优化方案中,上式为问题的一个严格约束,而在问题分析中,MU的分流数据流量速率满足如下表达式:In the optimization scheme of the P1 problem, the above formula is a strict constraint of the problem, and in the problem analysis, the split data flow rate of the MU satisfies the following expression:

通过(2-2)以及(4-4)的分析得到如下表达式:Through the analysis of (2-2) and (4-4), the following expressions are obtained:

因此,通过联立(2-5)和(4-5),可以得到表达式如下:Therefore, by combining (2-5) and (4-5), the expression can be obtained as follows:

(5)P1-Sub问题的等效转化,代入(4-5)、(4-6)及以上的各关系到P1-Sub问题,得到P2问题表示如下:(5) The equivalent transformation of the P1-Sub problem, substituting (4-5), (4-6) and the above are related to the P1-Sub problem, and the P2 problem is expressed as follows:

限制条件: limitation factor:

控制变量:piA Control variable: p iA

对(5-1)进行等效转化,得到表达式如下:Perform equivalent transformation on (5-1), and get the following expression:

同样对(5-2)也进行等效转化,得到表达式如下:Similarly, (5-2) is also converted equivalently, and the expression is as follows:

通过(5-3)与(5-4)将P2问题进行等价转化为P2-E问题,“E”表示的是等价的,如下:Through (5-3) and (5-4), the P2 problem is equivalently transformed into a P2-E problem, and "E" means equivalence, as follows:

限制条件:条件(1-3)Restrictions: Conditions (1-3)

条件(5-3)Conditions (5-3)

条件(5-4)Conditions (5-4)

控制变量:piA Control variable: p iA

P2-E问题中的限制条件(5-3)和(5-4)都与piA成线性关系,所以在参数设置上,三个限制条件(5-3)、(5-4)、(1-3)产生了一个关于piA的可行区间,即 The constraints (5-3) and (5-4) in the P2-E problem are both linearly related to p iA , so in the parameter setting, the three constraints (5-3), (5-4), ( 1-3) Generate a feasible interval about p iA , namely

(6)P2-E问题看成是一个凸性优化问题,对P2-E中的目标函数进行一阶求导,得到其一阶导数表达式如下:(6) The P2-E problem is regarded as a convex optimization problem, and the first-order derivation is performed on the objective function in P2-E, and the expression of the first-order derivative is obtained as follows:

通过分析知道是关于piA的递增函数;know by analysis is an increasing function about p iA ;

(7)在给定的情况下,根据P2-E问题中目标函数的一阶导数的单调性求解该问题的算法SolP2E如下:(7) In the given and In the case of , the algorithm SolP2E to solve the problem according to the monotonicity of the first derivative of the objective function in the P2-E problem is as follows:

步骤7.1:设置计算误差的容忍值为γ,flag=1;Step 7.1: Set the tolerance value of the calculation error to γ, flag=1;

步骤7.2:如果成立,那么执行步骤7.6;如果成立,那么执行步骤7.6,否则执行步骤7.3;Step 7.2: If established, then Go to step 7.6; if established, then Go to step 7.6, otherwise go to step 7.3;

步骤7.3设置 Step 7.3 Setup

步骤7.4:当flag=1时,得到如果成立,那么同时设置flag=0,执行步骤7.6;Step 7.4: When flag=1, get if established, then Set flag=0 at the same time, execute step 7.6;

步骤7.5:如果成立,当满足时,更新返回步骤7.4;当满足时,更新返回步骤7.4;Step 7.5: If established when satisfied when, update Return to step 7.4; when satisfied when, update Return to step 7.4;

步骤7.6:结束循环;Step 7.6: end the loop;

步骤7.7:输出P2-E问题的当前最优解为 Step 7.7: Output the current optimal solution of the P2-E problem as

(8)在算法SolP2E中,是在给定piA的上界与下界的情况下计算的,所以要对piA的上界与下界进行求解,需要考虑多种情况下的定义两个新的参量K和L,其表达式如下所示:(8) In the algorithm SolP2E, it is the upper bound of the given p iA with the nether The case is calculated, so the upper bound of p iA with the nether To solve it, it is necessary to consider various situations and Define two new parameters K and L whose expressions are as follows:

通过参量K和L,(5-3)和(5-4)转化为如下表达式:Through parameters K and L, (5-3) and (5-4) are transformed into the following expressions:

基于以上(8-3)和(8-4)两式来得到需要考虑不同情况下的K和L,首先通过分析(8-3),得到两种不同的情况,即CaseⅠ:KL≥1;CaseⅡ:KL<1;Based on the above two formulas (8-3) and (8-4) to get and It is necessary to consider K and L in different situations. First, through the analysis (8-3), two different situations are obtained, namely CaseⅠ: KL≥1; CaseⅡ: KL<1;

CaseⅠ是在KL≥1下的情况,在这种情况下,满足 表示BS能满足MU的全部流量需求,不需要AP进行数据分流;相反,CaseⅡ在KL<1下的情况下,BS不能满足MU全部的数据流量需求,因此,P2-E问题在CaseⅡ情况下可能是不可行的;Case I is the case under KL≥1, in this case, satisfy Indicates that the BS can meet all the traffic demands of the MU, and does not require the AP to perform data offloading; on the contrary, when KL<1 in Case II, the BS cannot meet all the data traffic demands of the MU. Therefore, the P2-E problem may occur in Case II is not feasible;

若KL≥1,即为CaseⅠ,通过分析得到两种子情况,如下:If KL≥1, it is Case I. Through analysis, two sub-cases are obtained, as follows:

CaseⅠ.1:当时,得到 CaseⅠ.1: when when, get

CaseⅠ.2:当时,得到 CaseⅠ.2: when when, get

若KL<1,即为CaseⅡ,通过分析得到五种子情况,如下:If KL<1, it is Case II. Five sub-cases are obtained through analysis, as follows:

CaseⅡ.1:当P2-E问题不可行;CaseⅡ.1: when The P2-E problem is infeasible;

CaseⅡ.2a:当时,得到CaseⅡ.2a: when and when, get

CaseⅡ.2b:当时,P2-E问题不可行;CaseⅡ.2b: when and When , the P2-E problem is infeasible;

CaseⅡ.3a:当时,得到 CaseⅡ.3a: When and when, get

CaseⅡ.3b:当时,P2-E问题不可行;CaseⅡ.3b: when and When , the P2-E problem is infeasible;

最终得到以下各情况:Eventually the following situations are obtained:

CaseⅠ.1 Case I.1

Casecase

Ⅰ.2 I.2

CaseⅡ.1P2-E问题不可行;Case II.1 The P2-E problem is infeasible;

CaseⅡ.2a(): Case II.2a( and ):

CaseⅡ.2b():P2-E问题不可行;CaseⅡ.3a():Case II.2b( and ): P2-E problem is infeasible; CaseⅡ.3a( and ):

CaseⅡ.3b():Case II.3b( and ):

P2-E问题不可行;The P2-E problem is infeasible;

通过以上过程得到代入算法SolP2E得到最优解通过得到的最优解得到P2-E问题相应的其他三个最优解 如下:Obtained through the above process and Substitute into the algorithm SolP2E to get the optimal solution The optimal solution obtained by Get the other three optimal solutions corresponding to the P2-E problem as follows:

以上为P2-E问题的最优解,即为P1-Sub问题中,MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解 The above is the optimal solution of the P2-E problem, that is, the optimal solution of the energy consumed by the MU on the AP side in the P1-Sub problem Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side

(9)顶层问题P1-Top的优化求解,通过对底层子问题的分析,顶层问题P1-Top表示如下所示:(9) The optimal solution of the top-level problem P1-Top. Through the analysis of the bottom-level sub-problems, the top-level problem P1-Top is expressed as follows:

限制条件: limitation factor:

控制变量:∈i Control variable: ∈ i

根据∈i在可行范围内的线性搜索法来求解P1-Top的算法SolP1Top如下所示:The algorithm SolP1Top to solve P1-Top according to the linear search method of ∈ i in the feasible range is as follows:

步骤9.1:设置当前最优解CBS为空集,当前最优能量消耗值CBV=∞,同时设置∈i的初值为Δ,步长也为Δ;Step 9.1: Set the current optimal solution CBS as an empty set, the current optimal energy consumption value CBV = ∞, and set the initial value of ∈ i to Δ, and the step size to Δ;

步骤9.2:如果∈i满足则执行步骤9.3;否则执行步骤9.6;Step 9.2: If ∈ i satisfies Then go to step 9.3; otherwise go to step 9.6;

步骤9.3:将∈i带入顶层问题P1-Top的目标函数中,判断所得到的V(∈i)是否小于当前最优能量消耗值CBV;Step 9.3: Bring ∈ i into the objective function of the top-level problem P1-Top, and judge whether the obtained V(∈ i ) is less than the current optimal energy consumption value CBV;

步骤9.4:如果V(∈i)≥CBV成立,那么更新∈i=∈i+Δ,返回步骤9.2;Step 9.4: If V(∈ i )≥CBV is established, then update ∈ i =∈ i +Δ, return to step 9.2;

步骤9.5:如果V(∈i)<CBV成立,那么更新当前最优解当前最优能量消耗值为V*(∈i),同时更新∈i=∈i+Δ,返回步骤9.2;Step 9.5: If V(∈ i )<CBV holds, then update the current optimal solution The current optimal energy consumption value is V * (∈ i ), while updating ∈ i =∈ i +Δ, return to step 9.2;

步骤9.6:结束循环;Step 9.6: end the loop;

步骤9.7:如果当前最优能量消耗值CBV为∞,那么P1问题不可行,否则输出当前最优解当前最优能量消耗值为V*(∈i);Step 9.7: If the current optimal energy consumption value CBV is ∞, then the P1 problem is not feasible, otherwise output the current optimal solution The current optimal energy consumption value is V * (∈ i );

(10)通过对P1问题的分层求解,得到MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解MU的保密性程度最优解MU的最优能量消耗值为V*(∈i)。(10) Through the hierarchical solution to the P1 problem, the optimal solution of the energy consumed by the MU on the AP side is obtained Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side Optimal Solution of MU's Secrecy Degree The optimal energy consumption value of MU is V * (∈ i ).

本发明为基于双连接的无线网络数据分流的优化设计。考虑到在无线网络中,为MU提供数据分流服务的AP工作在未授权频段上,这就导致一个窃听者能在未授权频段上窃听分流到AP的数据流量。所以本发明研究的是双连接下联合保密程度和功率消耗的优化,对AP的数据分流服务进行最优化的方案设计。本发明针对上述所提出的设想,研究了基于联合保密程度和功率消耗的上行双连接数据分流方案设计。The invention is an optimized design of wireless network data distribution based on dual connection. Considering that in the wireless network, the AP that provides the data offload service for the MU works in an unlicensed frequency band, this leads to an eavesdropper being able to eavesdrop on the data traffic offloaded to the AP in the unlicensed frequency band. Therefore, what the present invention researches is the optimization of the joint security degree and power consumption under the dual connection, and the scheme design of optimizing the data offloading service of the AP. Aiming at the idea proposed above, the present invention studies the design of an uplink dual connection data distribution scheme based on joint secrecy degree and power consumption.

本发明的技术构思为:首先,考虑到在异构无线网络中AP和BS通过对于MU的数据分流实现最小化功率来获得一定的经济效益。在本发明中,通过对问题特性分析,将问题转换为一个底层子问题和一个顶层问题。通过等效转换,将底层子问题转换为易于解决的凸性优化问题。之后,通过对所得到的等效问题进行分析,先假设问题中控制变量已经给定,再根据目标函数的一阶导数的单调性以及二分查找法,来获得当前给定控制变量范围的情况下的底层子问题最优化解。之后,通过对问题的分析,列举出不同情况下的控制变量范围,再将不同的控制变量范围代入所求得的最优化解中。最终求解得到底层子问题的最优解。最后,通过线性搜索法对顶层问题进行求解,得到顶层问题的最优化解。最终提出一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法的最优化解决方案。The technical idea of the present invention is as follows: firstly, it is considered that in a heterogeneous wireless network, the AP and the BS achieve certain economic benefits by offloading data to the MU to minimize power. In the present invention, by analyzing the characteristics of the problem, the problem is converted into a bottom sub-problem and a top-level problem. Transform the underlying subproblem into an easily solvable convex optimization problem through an equivalent transformation. Afterwards, by analyzing the obtained equivalent problem, assuming that the control variable in the problem has been given, and then according to the monotonicity of the first derivative of the objective function and the binary search method, to obtain the current range of the given control variable The optimal solution of the underlying subproblem of . Afterwards, through the analysis of the problem, the control variable ranges in different situations are listed, and then the different control variable ranges are substituted into the obtained optimal solution. Finally, the optimal solution to the underlying sub-problem is obtained. Finally, the top-level problem is solved by the linear search method, and the optimal solution of the top-level problem is obtained. Finally, an optimal solution of uplink dual connection data offloading method based on joint security degree and power consumption optimization is proposed.

本发明的有益效果主要表现在:1、对于整体系统而言,双连接技术大大提高了对于无线资源的利用率;2、对于MU而言,在联合保密程度和功率消耗优化,最小化了在双连接下的总功率损耗,既获得了更优质的上行数据流量服务,保证了MU的保密性需求,又提高了能量的利用率。The beneficial effects of the present invention are mainly manifested in: 1. For the overall system, the dual connection technology greatly improves the utilization rate of wireless resources; The total power loss under dual connections not only obtains better uplink data traffic services, ensures the confidentiality requirements of MU, but also improves energy utilization.

附图说明Description of drawings

图1是无线网络中一个用户MU、一个宏基站BS、一个小基站AP以及一个窃听者的场景示意图。Fig. 1 is a schematic diagram of a scene of a user MU, a macro base station BS, a small base station AP and an eavesdropper in a wireless network.

具体实施方式Detailed ways

下面结合附图对于本发明作进一步详细描述。The present invention will be described in further detail below in conjunction with the accompanying drawings.

参照图1,一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,实现该方法能在满足MU适当的保密性需求的前提下,使MU的总能耗最小,提高整个系统的无线资源利用率以及能源利用率,本发明可以应用于无线网络,如图1所示场景中。针对该目标设计对问题的优化方法主要包括如下步骤:Referring to Figure 1, an uplink dual-connection data offloading method based on joint security degree and power consumption optimization, the implementation of this method can minimize the total energy consumption of the MU under the premise of meeting the appropriate security requirements of the MU, and improve the efficiency of the entire system. Wireless resource utilization and energy utilization, the present invention can be applied to a wireless network, as shown in FIG. 1 . The optimization method designed for the problem mainly includes the following steps:

(1)在基站BS的覆盖范围下有一个移动用户MU,同时部署了一个小蜂窝辅助网络接入点AP通过“双连接”为MU提供数据分流服务;(1) There is a mobile user MU under the coverage of the base station BS, and a small cell auxiliary network access point AP is deployed to provide data offloading services for the MU through "dual connectivity";

在无线网络中,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为如下所示的非凸性优化问题P1问题,该问题表示如下:In a wireless network, the optimization problem of minimizing the total power consumption of a MU while satisfying data confidentiality requirements and energy efficiency is described as a non-convex optimization problem P1 shown below, which is expressed as follows:

min piA+piB min p iA +p iB

限制条件: limitation factor:

xiA≥0x iA ≥ 0

xiB≥0x iB ≥ 0

控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )

在P1问题中,xiB表示BS侧MU所能达到的最大数据需求流量,piB表示BS侧MU消耗的能量;xiA表示AP侧MU所能达到的最大数据需求流量,piA表示AP侧MU消耗的能量;Pout是关于piA和xiA的函数,表示为Pout(piA,xiA),式(1-5)是通过香农定理得到的;In the P1 problem, x iB represents the maximum data flow required by the MU on the BS side, p iB represents the energy consumed by the MU on the BS side; x iA represents the maximum data flow required by the MU on the AP side, and p iA represents the energy consumed by the MU on the AP side Energy consumed by MU; P out is a function of p iA and x iA , expressed as P out (p iA , x iA ), formula (1-5) is obtained through Shannon's theorem;

将问题中的各个变量的含义说明如下:The meaning of each variable in the question is explained as follows:

piA:AP侧MU消耗的能量/W;p iA : energy consumed by the MU on the AP side/W;

piB:BS侧MU消耗的能量/W;p iB : energy consumed by the MU on the BS side/W;

xiB:BS侧MU所能达到的最大数据需求流量;x iB : the maximum data flow required by the MU on the BS side;

xiA:AP侧MU所能达到的最大数据需求流量;x iA : the maximum data flow required by the MU on the AP side;

WB:MU到BS的信道带宽/HZ;W B : channel bandwidth/HZ from MU to BS;

WA:MU到AP的信道带宽/HZ;W A : channel bandwidth/HZ from MU to AP;

giA:MU到AP的信道增益;g iA : channel gain from MU to AP;

giB:MU到BS的信道增益;g iB : channel gain from MU to BS;

giE:MU到窃听者的信道增益;g iE : channel gain from MU to eavesdropper;

nA:MU到AP的背景噪声功率/W;n A : background noise power from MU to AP/W;

nB:MU到BS的背景噪声功率/W;n B : background noise power from MU to BS/W;

nE:MU到窃听者的背景噪声功率/W;n E : background noise power from MU to eavesdropper/W;

MU到AP可以获得的最大保密数据吞吐量; The maximum confidential data throughput that can be obtained from MU to AP;

Pout:AP在给MU提供数据分流服务时的保密性溢出的概率MU到AP的最大消耗能量/W;P out : probability of confidentiality overflow when AP provides data offload service to MU The maximum energy consumption from MU to AP/W;

MU到BS的最大消耗能量/W; The maximum energy consumption from MU to BS/W;

MU的保密性溢出概率的上界; The upper bound of the confidentiality overflow probability of MU;

i:MU的保密性溢出概率;i : Confidentiality overflow probability of MU;

αi:MU到窃听者信道增益的平均值;α i : the average value of channel gain from MU to eavesdropper;

(2)通过对P1问题的分析,将P1问题分解为一个底层子问题P1-Sub和一个顶层问题P1-Top进行优化求解,其中的底层子问题P1-Sub如下所示:(2) Through the analysis of the P1 problem, the P1 problem is decomposed into a bottom sub-problem P1-Sub and a top-level problem P1-Top for optimal solution. The bottom sub-problem P1-Sub is as follows:

V(∈i)=minpiA+piB V(∈ i )=minp iA +p iB

限制条件:Pout(piA,xiA)=εi (2-1)Restrictions: P out (p iA , x iA )=ε i (2-1)

xiA≥0x iA ≥ 0

xiB≥0x iB ≥ 0

控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )

顶层问题P1-Top如下所示:The top-level problem P1-Top looks like this:

min V(∈i)min V(∈ i )

限制条件: limitation factor:

控制变量:∈i Control variable: ∈ i

在P1问题的优化求解过程中,先对底层子问题P1-Sub进行逐步的优化求解;In the process of optimizing the solution of the P1 problem, the underlying sub-problem P1-Sub is first optimized and solved step by step;

(3)保密性溢出的概率函数Pout(piA,xiA)表达式如下:(3) The expression of the probability function P out (p iA , x iA ) of confidentiality overflow is as follows:

上式中的表示MU到AP可以获得的最大保密数据吞吐量,其表达式如下:in the above formula Indicates the maximum confidential data throughput that can be obtained from MU to AP, and its expression is as follows:

将式(3-2)代入(3-1)得到Pout(piA,xiA)表达式如下:Substitute formula (3-2) into (3-1) to get the expression of P out (p iA , x iA ) as follows:

定义一个辅助量表示MU到AP的有效信道功率增益,其表达式如下:define an auxiliary Indicates the effective channel power gain from MU to AP, and its expression is as follows:

结合式(3-4)得到Pout(piA,xiA)表达式如下:Combining formula (3-4) to get the expression of P out (p iA , x iA ) as follows:

(4)通过对(1-1)和(3-5)进行联立分析,得到(1-1)的限制表达式如下:(4) Through the simultaneous analysis of (1-1) and (3-5), the restricted expression of (1-1) is obtained as follows:

定义一个新的变量θiA来量化保密性需求的影响,θiA的表达式如下:Define a new variable θ iA to quantify the impact of confidentiality requirements, the expression of θ iA is as follows:

通过对(4-1)的进一步转化,得到(1-1)的等效表达式如下:By further transforming (4-1), the equivalent expression of (1-1) is obtained as follows:

而在P1问题的最优化方案中,上式为问题的一个严格约束,而在问题分析中,MU的分流数据流量速率满足如下表达式:In the optimization scheme of the P1 problem, the above formula is a strict constraint of the problem, and in the problem analysis, the split data flow rate of the MU satisfies the following expression:

通过(2-2)以及(4-4)的分析得到如下表达式:Through the analysis of (2-2) and (4-4), the following expressions are obtained:

因此,通过联立(2-5)和(4-5),得到表达式如下:Therefore, by combining (2-5) and (4-5), the expression is as follows:

(5)P1-Sub问题的等效转化,代入(4-5)、(4-6)及以上的各关系到P1-Sub问题,得到P2问题表示如下:(5) The equivalent transformation of the P1-Sub problem, substituting (4-5), (4-6) and the above are related to the P1-Sub problem, and the P2 problem is expressed as follows:

限制条件: limitation factor:

控制变量:piA Control variable: p iA

对(5-1)进行等效转化,得到表达式如下:Perform equivalent transformation on (5-1), and get the following expression:

同样对(5-2)也进行等效转化,得到表达式如下:Similarly, (5-2) is also converted equivalently, and the expression is as follows:

通过(5-3)与(5-4)将P2问题进行等价转化为P2-E问题,“E”表示的是等价的,如下:Through (5-3) and (5-4), the P2 problem is equivalently transformed into a P2-E problem, and "E" means equivalence, as follows:

限制条件:条件(1-3)Restrictions: Conditions (1-3)

条件(5-3)Conditions (5-3)

条件(5-4)Conditions (5-4)

控制变量:piA Control variable: p iA

P2-E问题中的限制条件(5-3)和(5-4)都与piA成线性关系,所以在参数设置上,三个限制条件(5-3)、(5-4)、(1-3)产生了一个关于piA的可行区间,即 The constraints (5-3) and (5-4) in the P2-E problem are both linearly related to p iA , so in the parameter setting, the three constraints (5-3), (5-4), ( 1-3) Generate a feasible interval about p iA , namely

(6)P2-E问题看成是一个凸性优化问题,对P2-E中的目标函数进行一阶求导,得到其一阶导数表达式如下:(6) The P2-E problem is regarded as a convex optimization problem, and the first-order derivation is performed on the objective function in P2-E, and the expression of the first-order derivative is obtained as follows:

通过分析知道是关于piA的递增函数;know by analysis is an increasing function about p iA ;

(7)在给定的情况下,根据P2-E问题中目标函数的一阶导数的单调性求解该问题的算法SolP2E如下;(7) In the given and In the case of , the algorithm SolP2E to solve the problem according to the monotonicity of the first derivative of the objective function in the P2-E problem is as follows;

步骤7.1:设置计算误差的容忍值为γ,flag=1;Step 7.1: Set the tolerance value of the calculation error to γ, flag=1;

步骤7.2:如果成立,那么执行步骤7.6;如果成立,那么执行步骤7.6,否则执行步骤7.3;Step 7.2: If established, then Go to step 7.6; if established, then Go to step 7.6, otherwise go to step 7.3;

步骤7.3设置 Step 7.3 Setup

步骤7.4:当flag=1时,得到如果成立,那么同时设置flag=0,执行步骤7.6;Step 7.4: When flag=1, get if established, then Set flag=0 at the same time, execute step 7.6;

步骤7.5:如果成立,当满足时,更新返回步骤7.4;当满足时,更新返回步骤7.4;Step 7.5: If established when satisfied when, update Return to step 7.4; when satisfied when, update Return to step 7.4;

步骤7.6:结束循环;Step 7.6: end the loop;

步骤7.7:输出P2-E问题的当前最优解为 Step 7.7: Output the current optimal solution of the P2-E problem as

(8)在算法SolP2E中,是在给定piA的上界与下界的情况下计算的,所以要对piA的上界与下界进行求解,需要考虑多种情况下的定义两个新的参量K和L,其表达式如下所示:(8) In the algorithm SolP2E, it is the upper bound of the given p iA with the nether The case is calculated, so the upper bound of p iA with the nether To solve it, it is necessary to consider various situations and Define two new parameters K and L whose expressions are as follows:

通过参量K和L,(5-3)和(5-4)转化为如下表达式:Through parameters K and L, (5-3) and (5-4) are transformed into the following expressions:

基于以上(8-3)和(8-4)两式来得到需要考虑不同情况下的K和L,首先通过分析(8-3),得到两种不同的情况,即CaseⅠ:KL≥1;CaseⅡ:KL<1;Based on the above two formulas (8-3) and (8-4) to get and It is necessary to consider K and L in different situations. First, through the analysis (8-3), two different situations are obtained, namely CaseⅠ: KL≥1; CaseⅡ: KL<1;

CaseⅠ是在KL≥1下的情况,在这种情况下,满足WBlog2(1+piBmaxgiBnB≥Rireq,表示BS能满足MU的全部流量需求,不需要AP进行数据分流;相反,CaseⅡ在KL<1下的情况下,BS不能满足MU全部的数据流量需求,因此,P2-E问题在CaseⅡ情况下可能是不可行的;Case I is the situation under KL ≥ 1. In this case, W B log 2 (1+piBmaxgiBnB ≥ Rireq is satisfied, which means that BS can meet all traffic demands of MU, and AP does not need data offloading; on the contrary, Case II is in KL In the case of <1, the BS cannot meet all the data flow requirements of the MU, therefore, the P2-E problem may not be feasible in the case of Case II;

若KL≥1,即为CaseⅠ,通过分析得到两种子情况,如下:If KL≥1, it is Case I. Through analysis, two sub-cases are obtained, as follows:

CaseⅠ.1:当时,得到 CaseⅠ.1: when when, get

CaseⅠ.2:当时,得到 CaseⅠ.2: when when, get

若KL<1,即为CaseⅡ,通过分析得到五种子情况,如下:If KL<1, it is Case II. Five sub-cases are obtained through analysis, as follows:

CaseⅡ.1:当P2-E问题不可行;CaseⅡ.1: When The P2-E problem is infeasible;

CaseⅡ.2a:当时,得到CaseⅡ.2a: when and when, get

CaseⅡ.2b:当时,P2-E问题不可行;CaseⅡ.2b: when and When , the P2-E problem is infeasible;

CaseⅡ.3a:当时,得到 CaseⅡ.3a: when and when, get

CaseⅡ.3b:当时,P2-E问题不可行;CaseⅡ.3b: when and When , the P2-E problem is infeasible;

最终得到以下各情况:Eventually the following situations are obtained:

CaseⅠ.1 Case I.1

Casecase

Ⅰ.2 I.2

CaseⅡ.1P2-E问题不可行;Case II.1 The P2-E problem is infeasible;

CaseⅡ.2a(): Case II.2a( and ):

CaseⅡ.2b():P2-E问题不可行;CaseⅡ.3a():Case II.2b( and ): P2-E problem is infeasible; CaseⅡ.3a( and ):

CaseⅡ.3b():Case II.3b( and ):

P2-E问题不可行;The P2-E problem is infeasible;

通过以上过程得到代入算法SolP2E得到最优解通过得到的最优解得到P2-E问题相应的其他三个最优解 如下:Obtained through the above process and Substitute into the algorithm SolP2E to get the optimal solution The optimal solution obtained by Get the other three optimal solutions corresponding to the P2-E problem as follows:

以上为P2-E问题的最优解,即为P1-Sub问题中,MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解 The above is the optimal solution of the P2-E problem, that is, the optimal solution of the energy consumed by the MU on the AP side in the P1-Sub problem Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side

(9)顶层问题P1-Top的优化求解,通过对底层子问题的分析,顶层问题P1-Top表示如下所示:(9) The optimal solution of the top-level problem P1-Top. Through the analysis of the bottom-level sub-problems, the top-level problem P1-Top is expressed as follows:

限制条件: limitation factor:

控制变量:∈i Control variable: ∈ i

根据∈i在可行范围内的线性搜索法来求解P1-Top的算法SolP1Top如下所示:The algorithm SolP1Top to solve P1-Top according to the linear search method of ∈ i in the feasible range is as follows:

步骤9.1:设置当前最优解CBS为空集,当前最优能量消耗值CBV=∞,同时设置∈i的初值为Δ,步长也为Δ;Step 9.1: Set the current optimal solution CBS as an empty set, the current optimal energy consumption value CBV = ∞, and set the initial value of ∈ i to Δ, and the step size to Δ;

步骤9.2:如果∈i满足则执行步骤9.3;否则执行步骤9.6;Step 9.2: If ∈ i satisfies Then go to step 9.3; otherwise go to step 9.6;

步骤9.3:将∈i带入顶层问题P1-Top的目标函数中,判断所得到的V(∈i)是否小于当前最优能量消耗值CBV;Step 9.3: Bring ∈ i into the objective function of the top-level problem P1-Top, and judge whether the obtained V(∈ i ) is less than the current optimal energy consumption value CBV;

步骤9.4:如果V(∈i)≥CBV成立,那么更新∈i=∈i+Δ,返回步骤9.2;Step 9.4: If V(∈ i )≥CBV is established, then update ∈i=∈ i +Δ, return to step 9.2;

步骤9.5:如果V(∈i)<CBV成立,那么更新当前最优解当前最优能量消耗值为V*(∈i),同时更新∈i=∈i+Δ,返回步骤9.2;Step 9.5: If V(∈ i )<CBV holds, then update the current optimal solution The current optimal energy consumption value is V * (∈ i ), while updating ∈ i =∈ i +Δ, return to step 9.2;

步骤9.6:结束循环;Step 9.6: end the loop;

步骤9.7:如果当前最优能量消耗值CBV为∞,那么P1问题不可行,否则输出当前最优解当前最优能量消耗值为V*(∈i);Step 9.7: If the current optimal energy consumption value CBV is ∞, then the P1 problem is not feasible, otherwise output the current optimal solution The current optimal energy consumption value is V * (∈ i );

(10)通过对P1问题的分层求解,得到MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解MU的保密性程度最优解MU的最优能量消耗值为V*(∈i)。(10) Through the hierarchical solution to the P1 problem, the optimal solution of the energy consumed by the MU on the AP side is obtained Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side Optimal Solution of MU's Secrecy Degree The optimal energy consumption value of MU is V * (∈ i ).

在本实施例中,图1是本发明考虑的无线网络中包含一个宏基站BS、一个用户MU、一个小基站AP以及一个窃听者的系统。在该系统中,主要考虑的不包括干扰,但是会考虑到1.用户MU与小基站AP之间的信道环境、用户MU与宏基站BS之间的信道环境以及用户MU与窃听者之间的信道环境;2.用户MU的保密性需求;3.用户MU在不同情况下的总能耗。为了使得MU获得一个满足保密性需求同时能耗最小的目标,提出发明实现对于该问题的解决。In this embodiment, FIG. 1 is a system in which a wireless network considered in the present invention includes a macro base station BS, a user MU, a small base station AP, and an eavesdropper. In this system, the main consideration does not include interference, but it will consider 1. The channel environment between the user MU and the small base station AP, the channel environment between the user MU and the macro base station BS, and the communication between the user MU and the eavesdropper Channel environment; 2. Confidentiality requirement of user MU; 3. Total energy consumption of user MU in different situations. In order to make MU achieve a goal of meeting the confidentiality requirement while minimizing energy consumption, an invention is proposed to solve this problem.

本实施案例着眼于满足用户MU适当的保密性需求的前提下,最小化在双连接下的MU的总能耗,联合保密程度和功率消耗优化,提高无线资源利用率以及能量利用率。本发明的实行过程中,得益于问题的有效转换以及优化算法对于计算复杂度的减少。This implementation case focuses on minimizing the total energy consumption of the MU under dual connectivity under the premise of meeting the appropriate confidentiality requirements of the user MU, jointly optimizing the degree of confidentiality and power consumption, and improving the utilization rate of wireless resources and energy utilization. In the implementation process of the present invention, it benefits from the effective transformation of the problem and the reduction of the computational complexity of the optimization algorithm.

Claims (1)

1. a kind of uplink dual link data distribution method based on joint privacy degrees and power consumption optimization, which is characterized in that It the described method comprises the following steps:
(1) there are one mobile subscriber MU under the coverage area of base station BS, while deploying a cellulor auxiliary network insertion Point AP provides data distribution service by " dual link " for MU;
In the wireless network, the general power that MU is minimized in the case where meeting data security requirement and energy efficiency disappears The optimization problem of consumption describes the nonconvex property optimization problem P1 problems being as follows, and the problem representation is as follows:
min piA+piB
Restrictive condition:
xiA≥0
xiB≥0
Control variable:(xiA, piA) and (xiB, piB)
In P1 problems, xiBIndicate the attainable maximum data demand volume of BS side MU institutes, piBIndicate the energy of BS side MU consumption; xiAIndicate the attainable maximum data demand volume of AP side MU institutes, piAIndicate the energy of AP side MU consumption;PoutIt is about piAWith xiAFunction, be expressed as Pout(piA, xiA), formula (1-5) is obtained by Shannon's theorems;
The meaning of each variable in problem is described as follows:
piA:Energy/W of the sides AP MU consumption;
piB:Energy/W of the sides BS MU consumption;
xiB:The attainable maximum data demand volume of the sides BS MU institutes;
xiA:The attainable maximum data demand volume of the sides AP MU institutes;
WB:Channel width/HZ of MU to BS;
WA:Channel width/HZ of MU to AP;
giA:The channel gain of MU to AP;
giB:The channel gain of MU to BS;
giE:Channel gains of the MU to listener-in;
nA:Background Noise Power/W of MU to AP;
nB:Background Noise Power/W of MU to BS;
nE:Background Noise Power/Ws of the MU to listener-in;
The maximum private data handling capacity that MU to AP can be obtained;
Pout:The probability that confidentiality of the AP when providing data distribution service to MU is overflowed
Maximum consumption energy/W of MU to AP;
Maximum consumption energy/W of MU to BS;
The upper bound of the confidentiality overflow probability of MU;
i:The confidentiality overflow probability of MU;
αi:Average values of the MU to listener-in's channel gain;
(2) it is an a bottom subproblem P1-Sub and top layer problem P1- by P1 PROBLEM DECOMPOSITIONs by the analysis to P1 problems Top optimizes solution, and bottom subproblem P1-Sub therein is as follows:
V(∈i)=min PiA+PiB
Restrictive condition:Pout(piA, xiA)=∈i (2-1)
xiA≥0
xiB≥0
Control variable:(xiA, PiA) and (xiB, PiB)
Top layer problem P1-Top is as follows:
min V(∈i)
Restrictive condition:
Control variable:∈i
During the Optimization Solution of P1 problems, Optimization Solution gradually first is carried out to bottom subproblem P1-Sub;
(3) the probability function P that confidentiality is overflowedout(piA, xiA) expression formula is as follows:
In above formulaIndicate that the maximum private data handling capacity that MU to AP can be obtained, expression formula are as follows:
Formula (3-2) substitution (3-1) is obtained into Pout(piA, xiA) expression formula is as follows:
Define an auxiliary quantityIndicate that the efficient channel power gain of MU to AP, expression formula are as follows:
Convolution (3-4) obtains Pout(piA, xiA) expression formula is as follows:
(4) by carrying out simultaneous analysis to (1-1) and (3-5), the limiting expression formula for obtaining (1-1) is as follows:
Define a new variable θiATo quantify the influence of confidentiality demand, θiAExpression formula it is as follows:
By the further conversion to (4-1), the equivalent expression for obtaining (1-1) is as follows:
And in the optimization scheme of P1 problems, above formula is a hard constraints of problem, and in case study, the shunting of MU Data traffic rate meets following expression:
Following expression is obtained by the analysis of (2-2) and (4-4):
Therefore, by simultaneous (2-5) and (4-5), it is as follows to obtain expression formula:
(5) equivalent conversion of P1-Sub problems, substitute into (4-5), (4-6) or more is respectively related to P1-Sub problems, obtains P2 Problem representation is as follows:
Restrictive condition:
Control variable:PiA
Equivalent conversion is carried out to (5-1), it is as follows to obtain expression formula:
Equivalent conversion is also equally carried out to (5-2), it is as follows to obtain expression formula:
Convert P2 problems progress equivalence to P2-E problems by (5-3) and (5-4), what " E " was indicated be it is of equal value, it is as follows:
Restrictive condition:Condition (1-3)
Condition (5-3)
Condition (5-4)
Control variable:PiA
Restrictive condition (5-3) and (5-4) in P2-E problems all with PiAIt is linear, so in parameter setting, three limits Condition (5-3) processed, (5-4), (1-3) produce one about PiAFeasible section, i.e.,
(6) P2-E problems regard a convexity optimization problem as, carry out first derivation to the object function in P2-E, obtain one Order derivative expression formula is as follows:
Known by analysisIt is about PiAIncreasing function;
(7) givenWithIn the case of, it is solved according to the monotonicity of the first derivative of object function in P2-E problems The algorithm SolP2E of the problem is as follows;
Step 7.1:It is arranged and calculates the tolerance value of error as γ, flag=1;
Step 7.2:Such as bodyIt sets up, thenExecute step 7.6;If It sets up, thenStep 7.6 is executed, it is no to then follow the steps 7.3;
Step 7.3 is arranged
Step 7.4:As flag=1, obtainIfIt sets up, then Flag=0 is set simultaneously, executes step 7.6;
Step 7.5:IfIt sets up, works as satisfactionWhen, updateIt returns Step 7.4;Work as satisfactionWhen, updateReturn to step 7.4;
Step 7.6:End loop;
Step 7.7:Output P2-E problems current optimal solution be
(8) it is in given p in algorithm SolP2EiAThe upper boundWith lower boundIn the case of calculate, so right piAThe upper boundWith lower boundSolved, need to consider it is a variety of in the case ofWithDefine two it is new Parameter K and L, expression formula are as follows:
By parameter K and L, (5-3) and (5-4) is converted into following expression:
It is obtained based on above (8-3) and (8-4) two formulaWithIt needs to consider the K and L under different situations, it is logical first Analysis (8-3) is crossed, two different situations, i.e. Case I are obtained:KL≥1;
Case II:KL < 1;
Case I are that the situation under KL >=1 meets W in this caseB log2(1+piBmaxgiBnB >=Rireq is indicated BS can meet whole flow demands of MU, do not need AP and carry out data distribution;On the contrary, Case II are in the case of KL < 1 time, BS cannot meet the data traffic demand of MU wholes, and therefore, P2-E problems may be infeasible in Case II;
If KL >=1, as Case I obtain two sub-cases by analysis, as follows:
Case I.1:WhenWhen, it obtains
Case I.2:WhenWhen, it obtains
If KL < 1, as Case II obtain five sub-cases by analysis, as follows:
Case II.1:WhenP2-E problems are infeasible;
Case II.2a:WhenAndWhen, it obtains
Case II.2b:WhenAndWhen, P2-E problems are infeasible;
Case II.3a:WhenAndWhen, it obtains
Case II.3b:WhenAndWhen,
P2-E problems are infeasible;
Finally obtain following situation:
Case I.
Case
I.
Case II.P2-E problems are infeasible;
Case II.
Case II.P2-E problems are infeasible;
Case II.
Case II.
P2-E problems are infeasible;
It is obtained by above procedureWithIt substitutes into algorithm SolP2E and obtains optimal solutionPass through obtained optimal solutionObtain other corresponding three optimal solutions of P2-E problems It is as follows:
It is the optimal solution of P2-E problems above, as in P1-Sub problems, MU consumes the optimal solution of energy in the sides APMU exists AP side datas shunt demand optimal solutionMU consumes the optimal solution of energy in the sides BSMU is optimal BS side data demands Solution
(9) Optimization Solution of top layer problem P1-Top, by the analysis to bottom subproblem, top layer problem P1-Top indicates as follows It is shown:
Restrictive condition:
Control variable:∈i
According to ∈iLinear search method in feasible region is as follows come the algorithm SolP1Top for solving P1-Top:
Step 9.1:It is empty set, current optimum energy consumption value CBV=∞, while ∈ is arranged that current optimal solution CBS, which is arranged,iJust Value is Δ, and step-length is also Δ;
Step 9.2:If ∈iMeetThen follow the steps 9.3;It is no to then follow the steps 9.6;
Step 9.3:By ∈iIt brings into the object function of top layer problem P1-Top, judges obtained V (∈i) whether be less than currently Optimum energy consumption value CBV;
Step 9.4:If V (∈i) >=CBV is set up, then updating ∈i=∈i+ Δ, return to step 9.2;
Step 9.5:If V (∈i) < CBV establishments, then updating current optimal solutionCurrent optimum energy consumption value For V*(∈i), while updating ∈i=∈i+ Δ, return to step 9.2;
Step 9.6:End loop;
Step 9.7:If current optimum energy consumption value CBV is ∞, P1 problems are infeasible, otherwise export current optimal solutionCurrent optimum energy consumption value is V*(∈i);
(10) it by the hierarchical solving to P1 problems, obtains MU and consumes the optimal solution of energy in the sides APMU is in AP side datas point Stream demand optimal solutionMU consumes the optimal solution of energy in the sides BSOptimal solutions of the MU in BS side data demandsMU's Confidentiality degree optimal solutionThe optimum energy consumption value of MU is V*(∈i)。
CN201810364696.4A 2018-04-23 2018-04-23 Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization Pending CN108810885A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810364696.4A CN108810885A (en) 2018-04-23 2018-04-23 Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810364696.4A CN108810885A (en) 2018-04-23 2018-04-23 Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization

Publications (1)

Publication Number Publication Date
CN108810885A true CN108810885A (en) 2018-11-13

Family

ID=64093728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810364696.4A Pending CN108810885A (en) 2018-04-23 2018-04-23 Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization

Country Status (1)

Country Link
CN (1) CN108810885A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170265150A1 (en) * 2013-08-21 2017-09-14 Intel Corporation User equipment and method for enhanced uplink power control
CN107466069A (en) * 2017-07-17 2017-12-12 浙江工业大学 Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170265150A1 (en) * 2013-08-21 2017-09-14 Intel Corporation User equipment and method for enhanced uplink power control
CN107466069A (en) * 2017-07-17 2017-12-12 浙江工业大学 Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YUAN WU 等: "Joint Traffic Scheduling and Resource Allocations for Traffic Offloading With Secrecy Provisioning", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *
YUAN WU 等: "Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 *

Similar Documents

Publication Publication Date Title
Feng et al. BOOST: Base station on-off switching strategy for energy efficient massive MIMO HetNets
CN103716869B (en) A kind of distributed power control method optimized based on efficiency in D2D communication
CN107466069A (en) Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network
CN108040364A (en) Channel width and the linear search method of power joint distribution in non-orthogonal multiple link
CN108600999B (en) FD-D2D joint optimization method based on channel allocation and power control
CN110213822B (en) A data security-based optimization method for downlink linear search power allocation in non-orthogonal multiple access systems
CN105188089A (en) Load balancing method based on integral optimization of user connection and interference management in ultra-dense heterogeneous network
CN105959234A (en) Load balance resource optimization method under safety perceptive cloud radio access network
CN107026684A (en) A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise
CN108965009A (en) A kind of load known users correlating method based on gesture game
CN109526040A (en) The mobile edge calculations linear search formula time delay optimization method based on non-orthogonal multiple access in more base station scenes
CN106304111A (en) Isomery cellular network power allocation method based on energy acquisition relay station
CN105813189B (en) A D2D distributed power optimization method in cellular network
CN107343268A (en) Nonopiate multicast and unicast transmission beam shaping method and system
CN104869646A (en) Energy-efficient resource allocation method for use in heterogeneous wireless network
Chen et al. Resource allocation for energy harvesting-powered D2D communications underlaying NOMA-based networks
CN105142224B (en) D2D power distribution rapid optimizing algorithms in the case of single channel phone user
CN108449737B (en) D2D-based downlink energy-efficient power distribution method in distributed antenna system
CN106413098B (en) A Resource Allocation Method Based on Outage Probability in D2D Network
CN110248403A (en) A kind of resource management-control method of the maximization D2D connection number based on non-orthogonal multiple
CN108810885A (en) Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization
CN108513292A (en) Uplink dual-connection data distribution method based on confidentiality and energy efficiency optimization
CN107613565B (en) Wireless resource management method in full-duplex ultra-dense network
CN105101381B (en) D2D power distribution fast Optimization in the case of multichannel phone user
Li et al. User cooperation and link selection in hybrid VLC/RF systems with NOMA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113

RJ01 Rejection of invention patent application after publication