CN109890031A - A kind of more relaying non-orthogonal multiple system safe transmission schemes based on man made noise - Google Patents

A kind of more relaying non-orthogonal multiple system safe transmission schemes based on man made noise Download PDF

Info

Publication number
CN109890031A
CN109890031A CN201910181591.XA CN201910181591A CN109890031A CN 109890031 A CN109890031 A CN 109890031A CN 201910181591 A CN201910181591 A CN 201910181591A CN 109890031 A CN109890031 A CN 109890031A
Authority
CN
China
Prior art keywords
relay
signal
noise
orthogonal multiple
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910181591.XA
Other languages
Chinese (zh)
Other versions
CN109890031B (en
Inventor
雷宏江
杨子轩
任智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Qingfeng Intelligent Technology Co.,Ltd.
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910181591.XA priority Critical patent/CN109890031B/en
Publication of CN109890031A publication Critical patent/CN109890031A/en
Application granted granted Critical
Publication of CN109890031B publication Critical patent/CN109890031B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

The present invention proposes a kind of more relaying non-orthogonal multiple system safe transmission schemes based on man made noise;Transmission system includes source node, two users, eavesdropping node and multiple relay nodes;In the present invention, entire communication process is divided into four-stage: the preparation stage relays decoding stage, relay selection stage and user's decoding stage more;System communication is divided to two time slots to complete: the first time slot, and message is broadcast to all relay nodes by information source S, and when broadcast uses message mapping policy, and relay reception signal is simultaneously decoded;Second time slot, system carry out double relay selections, optimal relay forwarding subscriber signal are selected from decodable code relay collection, and optimal relaying is selected from un-decodable relay collection and sends man made noise;The complexity and security interrupt probability of system can be effectively reduced while keeping more relay system diversity gains in relay selection strategy;Man made noise's scrambling can further decrease the signal-to-noise ratio at eavesdropping end, improve security of system energy.

Description

Multi-relay non-orthogonal multiple access system safe transmission scheme based on artificial noise
Technical Field
The invention belongs to the technical field of wireless communication networks, particularly relates to a wireless communication network adopting a cooperative non-orthogonal multiple access technology, and belongs to the field of physical layer security.
Background
In the last two decades, mobile communication technology has experienced a dramatic development. Meanwhile, the explosive increase of mobile data volume brought by the popularization of the intelligent terminal puts higher requirements on the speed, the time delay, the signal coverage rate and the like of a wireless communication network. Compared with the conventional orthogonal multiple access technology, the non-orthogonal multiple access technology has been receiving wide attention from the industry and academia due to its high bandwidth efficiency, high user fairness, ultra-high connectivity and compatibility. The cooperative communication technology can improve the coverage rate of the network, and meanwhile, the system performance can be obviously improved due to the fact that the receiving end adopts the diversity technology. The physical layer security does not need a secret key, and the absolute security of information transmission can be realized theoretically by using a time-varying encryption communication system of a wireless channel. Since the computing power of the terminal is gradually enhanced, the information breaking capability of the eavesdropper is gradually improved. Traditional cryptography is under increasing pressure in the field of information encryption. The physical layer security is based on the information theory, realizes information security in the physical layer, and is a very promising encryption mode in the communication field.
A general downlink non-orthogonal multiple access communication network model is shown in fig. 1. The main techniques for non-orthogonal multiple access are two: superposition coding is adopted at a transmitting end to simultaneously transmit information of a plurality of users at the same frequency, and a serial interference elimination technology is adopted at a receiving end to ensure that the plurality of users can be served in given resources (such as time/frequency). The basic steps of successive interference cancellation are: 1. firstly, the signal of the user with the worst channel condition is solved in the superposed signal (in a non-orthogonal multiple access system, the power of the signal sent to the user is strongest); 2. deleting the signal from the superimposed signal; 3, executing the same steps for the users with poor channel condition, and solving the signals of all users one by one in the method.
The cooperative communication technology can improve the coverage rate of the network, and meanwhile, the system performance can be obviously improved due to the fact that the receiving end adopts the diversity technology. The combination of cooperative communication with non-orthogonal multiple access techniques may further improve the performance of non-orthogonal multiple access communication systems. As shown in fig. 2: the common non-orthogonal multiple access cooperative communication system mainly has two architectures: 1. in the special relay system, the source node and the destination node cannot directly communicate due to the existence of deep fading, so a special relay is established to forward the information of the base station for two users; 2. in the user cooperation, since the strong user needs to decode the weak user signal first, the strong user can forward the information to the weak user through short-distance communication (such as bluetooth, WiFi, etc.). The cooperation mode can reduce the redundancy of the system and improve the diversity gain. There are two common relay protocols: amplify-and-forward protocol and decode-and-forward protocol. The present invention is primarily directed to decode-and-forward relay systems.
Physical layer security is a security theory based on information theory. The method utilizes the time-varying property of a wireless channel and combines a channel coding and encryption technology to ensure that information is not decoded by an eavesdropper. Shannon, 1945, demonstrated in classical literature (see literature [1 ]: Shannon C E communication theory of communication systems [ J ]. The Bell System technical Journal,1949,28(4):656-715.) from an information theory perspective: to achieve absolute security of the message, the communication process must use a "one-time-pad" encryption method, i.e., one bit of data should have a one-bit key. The conditions are too severe to be applied in the engineering field. Wyner first modeled a noisy eavesdropping channel in 1975 on The basis of The Shannon study (see document [2 ]: Wyner A D. The wire-tap channel [ J ]. The Bell System technical Journal,1975,54(8):1355-1387.), as shown in FIG. 3. Wyner demonstrates that: when the channel condition of the main channel is superior to that of the wiretapping channel and the information transmission is carried out between the information source and the legal receiving end, a coding mode is provided, the probability of information transmission error is arbitrarily small, at the moment, the wiretapping end cannot acquire any useful information, and the system is absolutely safe. Through decades of development, the safety theory of the physical layer is gradually mature. The adoption of physical layer security to realize secure transmission of wireless communication systems is becoming a hot spot of research in academic and industrial fields. The measurement indexes of the system physical layer safety mainly comprise traversal secret capacity, safety interruption probability and the like, wherein the safety interruption probability refers to the probability that the instantaneous safety capacity of the system is smaller than a given threshold value, and a mathematical expression is as follows:
in the formula, gammaDAnd gammaEIndicating the signal-to-noise ratio of the destination and eavesdropping,Rsrepresenting a safe rate threshold, FD(x) A cumulative distribution function representing the signal-to-noise ratio of the primary channel. f (gamma)E) Represents gammaEIs determined.
A downlink cooperative communication system constructed based on the combination of non-orthogonal multiple access, cooperative communication and physical layer security theory has a great application prospect in the 5G era of pursuing high speed, large integration and large connection.
Disclosure of Invention
Problems to be solved by the invention
Aiming at the problem of system security of an eavesdropper possibly existing in two-hop transmission of a downlink cooperative multi-relay non-orthogonal multiple access system, the invention provides a manually scrambled multi-relay cooperative non-orthogonal multiple access system security transmission scheme. By adopting a double-relay selection strategy, the complexity of the system is effectively reduced while the diversity gain of the multi-relay communication network is kept; meanwhile, the eavesdropping end is effectively interfered, and the safe transmission of the non-orthogonal multiple access system is ensured.
(II) technical scheme of the invention
As shown in fig. 4, the communication system according to the embodiment of the present invention includes K +3 nodes, where K is the number of half-duplex relay nodes R and satisfies K ≧ 1. The system also comprises a source node S and two user nodes U1And U2(wherein, U1And U2Respectively representStrong and weak users), eavesdropping on node E. Source node S and two users U1And U2Due to deep fading, direct transmission links do not exist, communication needs multi-relay assistance, and all nodes are provided with single antennas. Channel power gain ofIs shown in whichIt indicates the sending end and the receiving end,indicating the receiving end. All channels are assumed to be subject to independent identically distributed Nakagami-m fading. The probability density function and the cumulative distribution function of the channel gain of the link between the source node v and the destination node l can thus be expressed as:
wherein,Γ (·) is a gamma function.Representing a fading coefficient whose value is a positive integer,representing the average channel power gain. To simplify the analysis, it is assumed that both hop links are independently identically distributed. That is, it is And is
The embodiment of the invention is based on the physical layer security technology, and considers the correlation of the security capacities of two users in a multi-relay downlink non-orthogonal multiple access system. The utility model discloses a manual scrambling security transmission strategy of a multi-relay cooperation non-orthogonal multiple access system, the core of the strategy is the optimal security relay selection based on the physical layer security technology, the specific implementation steps of the strategy are as follows:
step S1: and (5) initializing the system. The source node firstly broadcasts a training sequence to a downlink multi-relay non-orthogonal multiple access system. This step has two purposes: (1) estimating channel state information of a primary channel, including S-Rk,k∈[1:K],Rk-UiI belongs to each channel of channel state information of {1,2 }; (2) channel state information of the eavesdropping channel is estimated. Namely Rk-channel state information of the E-channel. The acquisition of the channel state information of each link can be realized by monitoring the transmission of each port or adopting some complex channel estimation algorithms (see related document [3 ])]Zou Y,Zhu J,WangX,et al.Improving physical-layersecurity in wireless communications using diversity techniques[J]IEEENetwork,2015,29(1):42-48.) is not described in detail herein.
Step S2: first time slot, source S, via a message mapping strategy (see document [4 ]]: xu P, Yang Z, Ding Z, et al]Ieee transactions on vehicular technology,2018,67(8): 7851-: w1×W2→W0Wherein "x" represents the Cartesian product, WjIs WjAnd j is 0,1, 2. Through the training sequence, all nodes can decode the information sent by adopting the message mapping strategy. The first time slot thus has R0=R1+R2Is always true, wherein RiIs a message WiData rate of 0,1, 2;
step S3: in the second time slot, the relay receives the broadcast information of the information source S, and the signal received by the kth relay is:wherein, PSIs the base station power, s0A code word representing the superimposed signal,representing variance as δ2White additive gaussian noise. Then, the relay decodes and forwards the broadcast information of the information source by adopting a decoding and forwarding protocol;
step S4: a forward decodable trunk combination Φ is established. Apparently, the experience of S-RkAfter the channel fading, some relays may not be able to decode information normally, this step selects a relay set Φ that can be decoded normally from all K relays, and the mathematical expression is:
in the formulaBecause the system needs two time slots, pSWhich represents the transmitted signal-to-noise ratio of S,is UiThe data rate threshold of (c).
Step S5: the optimal relay of the retransmission signal is selected from Φ. The optimal relay selection principle will now be explained in detail. According to the basic principle of successive interference cancellation, U1Weak signal is taken as interference to solve U by serial interference elimination2And subtracting U from the mixed signal2Finally solve U1Of the signal of (1). U shape2Then directly connect U1As a signalAnd (4) interfering and solving signals of the interference. The SINRs for two users may be expressed as:in the formula,αi(i ═ 1,2) denotes the power division factor of the k-th relay, α12=1,α1>α2,PRRepresents the transmission power of the kth relay, σ2Representing the noise power, αJRepresenting the power allocation factor of the artificial noise. For the mth relay, define:
in the formula of3(x)=l+θ1x, To maximize the security performance of the system, the criteria for selecting relays isI.e. selecting X in phimThe relay with the largest value. Based on the above analysis, it can be known that the relay selection strategy can minimize the outage probability of the multi-relay cooperative non-orthogonal multiple access system.
Step S6: fromTo select the optimal relay to transmit the artificial noise. To further enhance the security performance of a multi-relay cooperative non-orthogonal multiple access system, a relay set that cannot be decoded correctly is setIn the method, a relay k with the maximum channel gain to the eavesdropping node E is selected*An artificial noise is transmitted. The selection criteria are expressed asWhereinRepresenting the complement of phi. To make a fair comparison of the inventive strategy and the conventional multi-relay forwarding strategy, the total power of all relays is limited to PR
Step S7: user U1And U2Receiving relay m*The forwarded message is decoded, the eavesdropping end E eavesdrops the relayed signal at the same time, the relay k*Sending artificial noise to disturb eavesdropping end E. hypothesis αJ(0≤αJ< 1) power allocation factor for transmission artifacts. From the above analysis, the user U1、U2And the signal-to-noise ratio of the eavesdropping end E can be expressed as:wherein,representing the transmitted signal-to-noise ratio of the artificially scrambled relay,
the security performance of the system of the embodiment of the present invention is analyzed below. According to the expression of the safe interruption probability and some simple algebraic operations, the U when the mth relay sends the signal can be obtained1The safe outage probability of (1) is:similarly, when the mth relay transmits a signal, U2The outage probability of (c) may be expressed as:
it is obvious thatWhile, U2It will be safely interrupted. According to the definition and a series of mathematical deductions of the safe interruption probability, the safe interruption probability expression of the system under the strategy is as follows:
in the formula,
in the formula, the g and h functions are complex integrals which cannot solve a closed-form solution, and can be approximated as follows by using a Gauss Chebyshev expansion equation:
in the formula, N is the number of expansion terms, Si=ti+1,tiIs the ith zero, w, of a Lagrangian polynomialiIs the weight of the gaussian is the weight of,
(III) advantageous effects of the invention
The beneficial effects of the invention are mainly as follows: the method has the advantages that the correlation of the safety capacities of the two users is considered, under the condition that the safety rate thresholds of the two users are different, the diversity gain of the multi-relay system is kept, meanwhile, the complexity and the safety interruption probability of the multi-relay cooperative non-orthogonal multiple access system are effectively reduced, and the safety performance of the system is improved.
The beneficial effects of the invention come from the following three aspects:
(1) and adopting multi-relay cooperative communication. Due to the time-varying nature of the wireless channel, the attenuation of the signal as it is transmitted can vary dramatically. The cooperative techniques provide additional diversity gain to the communication system, and thus may improve the coverage of the network. Meanwhile, the receiving end adopts the diversity technology, so that the system performance can be obviously improved.
(2) A relay selection strategy is employed. The relay selection strategy can effectively reduce the complexity of the system while maintaining the diversity gain of the multi-relay communication network. In addition, different from a common relay selection scheme, the method considers the correlation of the safety capacities of two users, and is completely suitable for the situation that the safety rate thresholds of the two users are different. The effect of different safety rate thresholds on the probability of a system safety outage is shown in figure 5. The monte carlo simulation results in fig. 5 show that: compared with other forwarding strategies, the method can obviously enhance the system security.
(3) And adopting a manual noise adding strategy. Different from the traditional single relay selection strategy, the invention provides a double relay selection strategy. And selecting one relay from the relays which cannot normally decode to transmit artificial noise to interfere the eavesdropping end. Fig. 6 demonstrates that the manual noise-adding strategy proposed by the present invention enhances the security performance of the system compared to the single-relay selection strategy and the conventional multi-relay forwarding strategy.
Drawings
FIG. 1: model of a general non-orthogonal multiple access system. In the figure, S is a source node, D1And D2Respectively strong and weak users. The source node adopts superposition coding, and the principle is as follows: the signals of two users are simultaneously transmitted in a same frequency and superposed mode according to different powers. Due to D1For strong users, the system distributes less power to the users, and serial interference elimination is executed during decoding, and D is firstly carried out1Is regarded as interference, and D is decoded2Of the superimposed signal, removing D from the superimposed signal2Then, the signal itself is solved. D2For weak users in non-orthogonal multiple access systems, D is used for decoding1Is regarded as interference, and D is decoded2Of the signal of (1).
FIG. 2 is a drawing: two types of cooperative non-orthogonal multiple access systems. Graph (a) is a dedicated relay scenario, where the source node and two users are in deep fade due to blockage by a mountain or dense building. At this time, a special relay is set up, and after receiving the signal of the source node, the superposition message is forwarded to the two users. The diagram (b) shows user cooperation, since strong users perform successive interference cancellation, it is first necessary to solve the signals of weak users. At this time, the strong user can forward information to the weak user through short-distance communication (such as Bluetooth, WiFi and the like). The redundancy is reduced through the cooperation of users, and the diversity gain of the system is improved.
FIG. 3: wyner eavesdrops on the channel model. The eavesdropping model is an improvement of a Shannon model, Wyner in the model indicates that when the channel condition of a main channel is superior to that of the eavesdropping channel, an encoding mode must exist when an information source and a legal receiving end transmit information, the probability of transmitting information errors can be reduced arbitrarily, at the moment, the eavesdropping end cannot acquire any useful information, and the system is absolutely safe. And from the perspective of information theory, the physical layer security is defined by using the source entropy.
FIG. 4 is a drawing: a multi-relay cooperative non-orthogonal multiple access system model. The invention considers a multi-relay downlink cooperation non-orthogonal multiple access systemAnd (4) a system. Wherein S represents a base station, R1...RKFor decode-and-forward, half-duplex relaying, U, of total number K1And U2Respectively representing a strong user and a weak user, and E is an eavesdropping terminal. Suppose a base station and two user us1And U2Due to deep fading, direct transmission links do not exist, communication needs multi-relay assistance, and all nodes are provided with single antennas.
FIG. 5: different safe rate thresholdsImpact on the probability of a safety outage for a cooperative non-orthogonal multiple access system. The parameters are set as follows:K=2,mU=mE=mR=2,α1=0.2,αJ=0.5,Ω1=12dB,ΩR=Ω2=10dB,ΩE-5 dB. Wherein "ODRS" represents a dual-relay selection strategy proposed in the present invention, "OSRS" represents a single-relay selection strategy (only forwarding without adding noise), "TMRF" represents a conventional multi-relay forwarding strategy (all relays forward signals, and a user and an eavesdropping terminal employ a maximum ratio combining strategy to combine signals), "Sim" represents a monte carlo simulation result, and "Analysis" represents a theoretical Analysis result. The figure demonstrates the correctness of the theoretical analysis with Monte Carlo simulation. Obviously, increasing the security rate threshold may degrade the security performance of the wireless communication system. When the signal to noise ratio of the transmission is large, the security performance of the double-relay selection strategy provided by the invention is obviously superior to that of the other two strategies.
FIG. 6 Artificial noise Allocation parameter αJAnd the influence of the relay number K on the safety interruption probability of the system. The parameters are set as follows: r1=0.1nat,R2=0.2nat,ρS=ρR=10dB,mU=mE=mR=m,α1=0.2,Ω1=12dB,ΩR=Ω2=10dB,ΩE-5 dB. Wherein the ODRS tableThe double-relay selection strategy provided by the invention is shown, the OSRS represents a single-relay selection strategy (only forwarding and not adding noise), the Sim represents a Monte Carlo simulation result, and the Analysis represents a theoretical Analysis result. The figure demonstrates the correctness of the theoretical analysis with Monte Carlo simulation. Obviously, the diversity gain of the system can be improved by increasing the number of relays, and the safety performance of the system is further enhanced. In addition, simulation results show that the system security can be further improved by the double-relay selection strategy compared with the single-relay selection strategy. This performance improvement is more pronounced as the number of relays increases.
FIG. 7: the implementation process of the multi-relay cooperative non-orthogonal multiple access system safe transmission scheme. The method is mainly divided into two time slots, and the first time slot mainly comprises the following steps: the base station sends the superposed signal and relays to receive and decode the signal; and performing relay decision and user decoding in a second time slot, selecting an optimal relay to forward two user signals, selecting the relay with the strongest channel gain at the eavesdropping end to send artificial noise, using the signal of the strong user as interference decoding by the weak user, and eliminating and decoding the strong user based on serial interference.
FIG. 8: the abstract of the specification is shown in the figure. The whole communication process in the invention is divided into four stages: a preparation phase, a multi-relay decoding phase, a relay selection phase and a user decoding phase.
Detailed Description
System presetting
The non-orthogonal multiple access communication system comprises K +3 nodes, wherein K is the number of the half-duplex relay nodes R and satisfies that K is more than or equal to 1. The system also comprises a source node S and two user nodes U1And U2(wherein, U1And U2Representing strong and weak users, respectively), eavesdropping node E. Source node S and two users U1And U2Due to deep fading, direct transmission links do not exist, communication needs multi-relay assistance, and all nodes are provided with single antennas. Assuming that all channels obey independent and identically distributed Nakagami-m fading.
(II) Process for carrying out
The specific implementation flow of the invention is shown in figure 7. The implementation process of the invention is totally divided into seven steps:
step S1: initializing a system; transmitting training series in a multi-relay downlink cooperative non-orthogonal multiple access system, estimating channel state information of each channel through a channel estimation algorithm, and obtaining the mth relay to U1、U2The channel gains for E are:meanwhile, the relay and the destination node acquire message mapping strategy information through the training sequence;
step S2: in the first time slot, the base station sends superposed signals to all K relays based on superposition coding and by adopting a message mapping strategy according to a basic principle of non-orthogonal multiple access;
step S3: in the second time slot, the receiving signal of the decoding forwarding relay is decoded, and then the message is forwarded to the user terminal by adopting double-relay selection and noise is added;
step S4: the system establishes two sets according to the relay decoding condition: decodable relay set Φ and undecodable relay setWhere Φ is defined as:ρSrepresenting the transmit signal-to-noise ratio of the source node S,is UiThe safe rate threshold of (2);the complement of Φ, and the relay set that cannot decode normally. Can be correctly decodedProceed to step S5: the relay which cannot decode correctly goes to step S6;
step S5: in Φ, for the mth relay, define
Selecting X in phimThe relay with the largest value, i.e. the selectionWhereini e (1,2) is the mth relay to U1And U2Channel gain of δ3(x)=l+θ1x,
Step S6: in thatAnd (4) selecting the relay transmission artificial noise with the maximum eavesdropping end channel gain. Namely, selection
Step S7: user decoding, where strong user U1Performing successive interference cancellation, preferentially decoding the weak user's signal and deleting it from the superimposed signal, and then decoding its own signal, the weak user U2Directly handle U1The signal of (2) is regarded as noise and the own signal is decoded.

Claims (1)

1. A multi-relay non-orthogonal multiple access system safety transmission scheme based on artificial noise is characterized in that a double-relay selection and artificial scrambling strategy is as follows: namely, the optimal relay forwarding signal is selected from the decodable relay, the optimal relay is selected from the undecodable relay to send artificial noise, and the specific implementation flow is as follows:
step S1: initializing a system; transmitting training series in a multi-relay downlink non-orthogonal multiple access system, estimating channel state information of each channel through a channel estimation algorithm, and obtaining the mth relay to U1、U2And EThe channel gains are respectively: meanwhile, the relay and the destination node acquire message mapping strategy information through the training sequence;
step S2: in the first time slot, the base station sends superposed signals to all K relays based on superposition coding and by adopting a message mapping strategy according to a basic principle of non-orthogonal multiple access;
step S3: in the second time slot, the receiving signal of the decoding forwarding relay is decoded, and then the message is forwarded to the user terminal by adopting double-relay selection and noise is added;
step S4: the system establishes two sets according to the relay decoding condition: decodable relay set Φ and undecodable relay setWhere Φ is defined as:ρSrepresenting the transmit signal-to-noise ratio of the source node S,is UiThe safe rate threshold of (2);if the set is a complement of Φ and the set is a relay set that cannot be decoded normally, the relay that can be decoded correctly goes to step S5, and the relay that cannot be decoded correctly goes to step S6;
step S5: in Φ, for the mth relay, define
Selecting X in phimMaximum value of the valueRelaying, i.e. selectingWhereinFor the mth relay to U1And U2Channel gain of δ3(x)=l+θ1x,
Step S6: in thatIn (1), the relay transmission artificial noise with the maximum channel gain at the eavesdropping end is selected, namely
Step S7: user decoding, where strong user U1Performing successive interference cancellation, preferentially decoding the weak user's signal and deleting it from the superimposed signal, and then decoding its own signal, the weak user U2Directly handle U1The signal of (2) is regarded as noise and the own signal is decoded.
CN201910181591.XA 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise Active CN109890031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Publications (2)

Publication Number Publication Date
CN109890031A true CN109890031A (en) 2019-06-14
CN109890031B CN109890031B (en) 2022-03-01

Family

ID=66931718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910181591.XA Active CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Country Status (1)

Country Link
CN (1) CN109890031B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446169A (en) * 2019-08-28 2019-11-12 惠州学院 The cooperation broadcast system and broadcasting method continuously relayed based on quantization mapping forwarding
CN110730452A (en) * 2019-10-25 2020-01-24 中国人民解放军陆军工程大学 Performance analysis method of combined relay and interference selection scheme in wireless communication system
CN110784866A (en) * 2019-09-23 2020-02-11 天津大学 Untrusted relay network safety transmission method based on blocking type fault-tolerant decoding and forwarding
CN111245498A (en) * 2020-01-13 2020-06-05 大连理工大学 Relay-assisted non-orthogonal multiple access cooperative network secure communication method
CN111464214A (en) * 2020-04-02 2020-07-28 山东交通学院 Increment selectable decoding forwarding relay method suitable for non-orthogonal multiple access
CN111510869A (en) * 2020-03-13 2020-08-07 西安电子科技大学 Cooperative non-orthogonal layered multicast multiple access transmission method
CN111510987A (en) * 2020-03-13 2020-08-07 西安电子科技大学 Relay selection method based on safety cooperation NOMA network
CN112702741A (en) * 2020-12-29 2021-04-23 中国人民解放军空军工程大学 NOMA (non-orthogonal multiple access) safe transmission method and system combining artificial noise and power distribution
CN112737656A (en) * 2020-12-16 2021-04-30 中国人民解放军战略支援部队信息工程大学 Relay network green safety transmission method and system based on non-orthogonal multiple access technology
CN113115233A (en) * 2021-03-30 2021-07-13 南京邮电大学 Opportunistic NOMA (non-access-point) cooperative multicast relay selection method
CN114024591A (en) * 2021-10-26 2022-02-08 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method
CN114337877A (en) * 2022-01-10 2022-04-12 重庆邮电大学 CR-NOMA communication system performance optimization method based on full-duplex relay
CN114640388A (en) * 2022-03-24 2022-06-17 重庆邮电大学 Cognitive network-based trajectory design method for double unmanned aerial vehicles to fairly schedule multiple users
CN115134932A (en) * 2022-07-29 2022-09-30 重庆邮电大学 Enhanced non-orthogonal multiple access assisted semi-unlicensed system secure transmission method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN107995615A (en) * 2017-11-15 2018-05-04 中国人民解放军信息工程大学 Heterogeneous network NOMA safe transmission method of physical layer
US20180146491A1 (en) * 2015-04-05 2018-05-24 Lg Electronics Inc. Method and device for transmitting/receiving data in wireless communication system that supports device-to-device communication
US20180167932A1 (en) * 2016-12-09 2018-06-14 Samsung Electronics Co., Ltd. Multiplexing control information in a physical uplink data channel
CN108512585A (en) * 2018-04-04 2018-09-07 哈尔滨工业大学 Dynamic cooperative relay transmission method based on power domain non-orthogonal multiple access technology
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 Non-orthogonal multiple accesses the user throughput justice link selecting method of collaborative network
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN108900263A (en) * 2018-05-25 2018-11-27 宁波大学 The preparation method of safe unicast rate model for downlink NOMA Communication System Design
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
US20180146491A1 (en) * 2015-04-05 2018-05-24 Lg Electronics Inc. Method and device for transmitting/receiving data in wireless communication system that supports device-to-device communication
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
US20180167932A1 (en) * 2016-12-09 2018-06-14 Samsung Electronics Co., Ltd. Multiplexing control information in a physical uplink data channel
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN107995615A (en) * 2017-11-15 2018-05-04 中国人民解放军信息工程大学 Heterogeneous network NOMA safe transmission method of physical layer
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 Non-orthogonal multiple accesses the user throughput justice link selecting method of collaborative network
CN108512585A (en) * 2018-04-04 2018-09-07 哈尔滨工业大学 Dynamic cooperative relay transmission method based on power domain non-orthogonal multiple access technology
CN108900263A (en) * 2018-05-25 2018-11-27 宁波大学 The preparation method of safe unicast rate model for downlink NOMA Communication System Design
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
PENG XU ECT.: "Optimal Relay Selection Schemes for Cooperative NOMA", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *
TIEP M. HOANG ECT.: "Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer", 《IEEE WIRELESS COMMUNICATIONS LETTERS》 *
YOUHONG FENG ECT.: "Non-orthogonal Multiple Access and Artificial-Noise Aided Secure Transmission in FD Relay Networks", 《IEEE》 *
YUANWEI LIU ECT.: "Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks", 《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 *
YULONG ZOU ECT.: "Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques", 《IEEE NETWORK》 *
雷宏江等: "解码转发中继选择系统的安全性能分析", 《中国科学:信息科学》 *
韩帅,台祥雪,孟维晓: "空天地通信网络的物理层安全系统模型与关键技术", 《电信科学》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446169A (en) * 2019-08-28 2019-11-12 惠州学院 The cooperation broadcast system and broadcasting method continuously relayed based on quantization mapping forwarding
CN110784866A (en) * 2019-09-23 2020-02-11 天津大学 Untrusted relay network safety transmission method based on blocking type fault-tolerant decoding and forwarding
CN110730452B (en) * 2019-10-25 2023-05-02 中国人民解放军陆军工程大学 Performance analysis method for joint relay and interference selection scheme in wireless communication system
CN110730452A (en) * 2019-10-25 2020-01-24 中国人民解放军陆军工程大学 Performance analysis method of combined relay and interference selection scheme in wireless communication system
CN111245498A (en) * 2020-01-13 2020-06-05 大连理工大学 Relay-assisted non-orthogonal multiple access cooperative network secure communication method
CN111510869A (en) * 2020-03-13 2020-08-07 西安电子科技大学 Cooperative non-orthogonal layered multicast multiple access transmission method
CN111510987A (en) * 2020-03-13 2020-08-07 西安电子科技大学 Relay selection method based on safety cooperation NOMA network
CN111510869B (en) * 2020-03-13 2021-04-13 西安电子科技大学 Cooperative non-orthogonal layered multicast multiple access transmission method
CN111464214A (en) * 2020-04-02 2020-07-28 山东交通学院 Increment selectable decoding forwarding relay method suitable for non-orthogonal multiple access
CN112737656A (en) * 2020-12-16 2021-04-30 中国人民解放军战略支援部队信息工程大学 Relay network green safety transmission method and system based on non-orthogonal multiple access technology
CN112702741A (en) * 2020-12-29 2021-04-23 中国人民解放军空军工程大学 NOMA (non-orthogonal multiple access) safe transmission method and system combining artificial noise and power distribution
CN113115233B (en) * 2021-03-30 2022-07-01 南京邮电大学 Opportunistic NOMA (non-access-point) cooperative multicast relay selection method
CN113115233A (en) * 2021-03-30 2021-07-13 南京邮电大学 Opportunistic NOMA (non-access-point) cooperative multicast relay selection method
CN114024591A (en) * 2021-10-26 2022-02-08 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method
CN114024591B (en) * 2021-10-26 2023-09-01 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method
CN114337877A (en) * 2022-01-10 2022-04-12 重庆邮电大学 CR-NOMA communication system performance optimization method based on full-duplex relay
CN114640388A (en) * 2022-03-24 2022-06-17 重庆邮电大学 Cognitive network-based trajectory design method for double unmanned aerial vehicles to fairly schedule multiple users
CN114640388B (en) * 2022-03-24 2023-07-25 重庆邮电大学 Track design method for fair scheduling of multiple users by double unmanned aerial vehicles based on cognitive network
CN115134932A (en) * 2022-07-29 2022-09-30 重庆邮电大学 Enhanced non-orthogonal multiple access assisted semi-unlicensed system secure transmission method

Also Published As

Publication number Publication date
CN109890031B (en) 2022-03-01

Similar Documents

Publication Publication Date Title
CN109890031B (en) Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
CN109743729B (en) Secret transmission method of wireless energy-carrying cooperative system
Li et al. Relay selection with network coding in two-way relay channels
CN106131823B (en) Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene
Chen et al. Multiuser two-way relaying: detection and interference management strategies
CN109451492B (en) Safety transmission method based on artificial noise and beam forming in downlink full-duplex relay network
CN106533516B (en) Physical layer secure transmission method of multi-antenna multi-relay cognitive eavesdropping network
CN106992803A (en) A kind of man made noise precoding safe transmission method of full duplex relaying system
CN109039411B (en) One-way full-duplex MIMO relay antenna selection safety transmission method
CN110519756B (en) Physical layer safety transmission method of full duplex relay network
CN110290558B (en) Safe transmission method based on time delay in cache-assisted multi-relay transmission system
CN104202790B (en) A kind of MIMO-CCRN bottleneck effect removing methods based on power adaptive
Ma et al. Performance analysis and optimization in two-way cooperative NOMA under two-phase transmission protocol
Alabed et al. A simple distributed differential transmit beamforming technique for two-way wireless relay networks
CN106230476B (en) Information secure transmission method based on non-joint man made noise in insincere relay system
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
Wang et al. Distributed cooperation and diversity for hybrid wireless networks
CN108900225B (en) Bidirectional full-duplex MIMO relay antenna selection safe transmission method
Nguyen et al. Energy harvesting based two-way full-duplex relaying network over a Rician fading environment: performance analysis
CN115278662A (en) Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy
CN105704079B (en) Joint subcarrier in the more relay systems of two-way OFDM based on PLNC inhibits and relay selection method
CN110381561B (en) Safe transmission method based on energy efficiency in cache-assisted multi-relay transmission system
CN107994934A (en) Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
Pan et al. Single-relay selections with amplify forwarding and network coding in two-way relay channels
CN104270228B (en) Adaptive cooperation transmission method in a kind of MIMO CCRN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240807

Address after: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Hongyue Enterprise Management Consulting Co.,Ltd.

Country or region after: China

Address before: 400065 No. 2, Chongwen Road, Nan'an District, Chongqing

Patentee before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240814

Address after: Room 1103, 11th Floor, Building B, Tianxin Software Industrial Park, No. 66-68 Xinling Road, Tianxin District, Changsha City, Hunan Province 410000

Patentee after: Hunan Qingfeng Intelligent Technology Co.,Ltd.

Country or region after: China

Address before: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Patentee before: Shenzhen Hongyue Enterprise Management Consulting Co.,Ltd.

Country or region before: China