CN110022557A - A kind of physical layer active sniffing method towards non-orthogonal multiple access system - Google Patents

A kind of physical layer active sniffing method towards non-orthogonal multiple access system Download PDF

Info

Publication number
CN110022557A
CN110022557A CN201910222087.XA CN201910222087A CN110022557A CN 110022557 A CN110022557 A CN 110022557A CN 201910222087 A CN201910222087 A CN 201910222087A CN 110022557 A CN110022557 A CN 110022557A
Authority
CN
China
Prior art keywords
suspicious
module
signal
power
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910222087.XA
Other languages
Chinese (zh)
Inventor
张超
刘小楚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201910222087.XA priority Critical patent/CN110022557A/en
Publication of CN110022557A publication Critical patent/CN110022557A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The physical layer active sniffing method towards non-orthogonal multiple access system that the invention discloses a kind of, is transmitted using power domain non-orthogonal multiple cut-in method;After each suspicious recipient's module receives composite signal, detected in the way of serial interference elimination in suspicious recipient's module;Active sniffing person's module works in full-duplex mode, while receiving composite signal, sends interference signal to suspicious recipient's module;Suspicious recipient's module changes the transmission rate of suspicious sender's module after receiving interference signal;Active sniffing person's module detects the composite signal received using the method for serial interference elimination;Average monitoring and rate are calculated, optimization problem is established, passes through and adjusts the jamming power that active sniffing person module is sent, obtain maximum average monitoring and rate, by sending the control of power to active sniffing person, obtains than passively listening better monitoring effect, improve the safety of system.

Description

A kind of physical layer active sniffing method towards non-orthogonal multiple access system
Technical field
The invention belongs to wireless communication technology fields, and in particular to a kind of physical layer towards non-orthogonal multiple access system Active sniffing method.
Background technique
With flourishing for modern society's information technology, the requirement for information transmission quality is also higher and higher.Many institutes Known, communication quality is mainly measured in terms of validity, reliability.In addition to this, safety is also a kind of important weighing apparatus Amount means.Safety is the characterization of the anti-interference ability of system in the case where facing artificial destruction and threatening.In recent decades, Along with the rapid development of the networks such as cellular network, wifi network, cognitive radio networks, for cable network, It wirelessly communicates due to broadcast and the open threat made it easier to by safety, thus realizes the wireless transmission of secure communication Technology is extremely urgent.The security mechanism of existing wireless communication system be based primarily upon OSI Reference Model network layer and its more than The security protocol and Encryption Algorithm of each layer are realized, and assume that physical layer provides unimpeded and error free transmission.However in reality In, the fast development of decoding equipment, so that this traditional encryption technology meets with unprecedented challenge.Therefore, How the intrinsic characteristics such as shadow fading, path loss, the multipath of wireless channel are utilized, and information is reliable in realization physical layer meaning Transmit the extensive concern by everybody.
In wireless communication system, more new capital of every generation communication system along with new multiple access technology appearance, will The 5G epoch of arrival, non-orthogonal multiple technology (NOMA) are used as key technology, meet future by shared band come adaptive Complicated enriched data business, to be expected to realize the business demand of mass users.It is non-relative to traditional orthogonal multiple access system Orthogonal multiple access techniques have the features such as spectrum utilization efficiency is high, and power system capacity is big, conform exactly to 5G and want for what is accessed on a large scale It asks.But meanwhile the research in relation to the safety of physical layer problem under non-orthogonal multiple technology does not cause enough attention also, it is existing About safety of physical layer technology all or the problem of discussion prevents information leakage, seldom it is related to supervision area, once technology is non- Orthogonal multiple access techniques are mature, and the missing of supervision area will have serious security hidden trouble.Therefore, non-orthogonal multiple is studied Active sniffing technology under system, not only contributes to the security control of non-orthogonal multiple system, is also beneficial to safety of physical layer skill Art is generalized in 5G non-orthogonal multiple system.
It is worth noting that the side for eavesdropping information is typically considered to be in the research of traditional safety of physical layer Illegal, it needs to avoid information leakage as far as possible.But if being not that each communication connection is worth in global security consideration It must trust, such as offender carries out criminal activity using wireless device and just becomes difficult to monitor, it, will once criminal activity occurs Very big loss can be caused to society.Especially in last decade, the generation of a large amount of wireless devices, between equipment and equipment Communication do not need to achieve that into core network, and caused supervision problem is further serious, for example, comparative maturity nobody Machine, only its influence to aviation is just very serious.It is therefore desirable to thinking be converted, from stealing for traditional safety of physical layer problem The side of listening is converted into monitoring side, realizes that monitoring rate maximizes to achieve the purpose that supervision.Certainly, active sniffing is in addition to traditional Outside the eavesdropping informational function of safety of physical layer, active interference ability is also added, to improve average eavesdropping rate, so that supervision Initiative significantly improves, and completes good supplement for the realization of entire safety of physical layer technology.
Summary of the invention
In view of the above-mentioned deficiencies in the prior art, the technical problem to be solved by the present invention is that provide it is a kind of towards it is non-just The physical layer active sniffing method for handing over multiple access system carries out active sniffing for the system using non-orthogonal multiple access, The initiative monitored is obtained, the safety of communication is improved, compared with the safety of physical layer of traditional non-orthogonal multiple system, improves The initiative of Lawful Interception person obtains and preferably monitors effect.
The invention adopts the following technical scheme:
A kind of physical layer active sniffing method towards non-orthogonal multiple access system, comprising the following steps:
It is carried out between S1, suspicious sender's module and suspicious recipient's module using power domain non-orthogonal multiple cut-in method Transmission;
After S2, each suspicious recipient's module receive composite signal, in suspicious recipient's module according to serial interference elimination Mode detected;
S3, active sniffing person's module work in full-duplex mode, while receiving composite signal, send interference signal to Suspicious recipient's module;
S4, suspicious recipient's module change the transmission rate of suspicious sender's module after receiving interference signal;
S5, active sniffing person's module detect the composite signal received using the method for serial interference elimination;
S6, average monitoring and rate are calculated, establishes optimization problem, passed through and adjust the interference function that active sniffing person module is sent Rate obtains maximum average monitoring and rate, by sending the control of power to active sniffing person, obtains than passively listening more Good monitoring effect, improves the safety of system.
Specifically, in step S1, suspicious sender's module is according to the fine or not distribution power of channel quality, according to channel quality The good corresponding signal of suspicious recipient's module distributes few power, the corresponding signal of suspicious recipient's module of bad channel quality The more power of distribution, multiple signals it is compound after sent in the form of broadcast, the signal s that suspicious sender's module is sent Are as follows:
Wherein: s indicates that the signal that suspicious sender's module is sent, N indicate the number of suspicious user, aiExpression distributes to The corresponding power coefficient of the signal of i suspicious user, PaIndicate that suspicious sender's module sends the power of signal, siIt indicates to send To the signal of i-th of suspicious user.
Specifically, after each suspicious recipient's module receives composite signal, successively being detected from composite signal in step S2 Then peak signal out removes from the composite signal, until detecting the suspicious user corresponding signal.
Specifically, active sniffing person module detects signal, active sniffing person's mould using serial interference elimination in step S3 Block adjusts the power for sending interference signal when sending interference signal according to actual needs:
If necessary to prevent the generation of suspicious traffic link, then active sniffing module sends high power interference signal make can Doubt interrupted communication link;
If active sniffing person module only monitors suspicious traffic link, rather than interrupt the hair of suspicious traffic link Raw, active sniffing person's module sends interference signal to suspicious recipient's module, and the power for changing interference signal reaches monitoring and gulps down The amount of spitting maximizes, and the power value of interference signal is between 0 to its attainable maximum value.
Further, the signal y received at m-th of suspicious usermAre as follows:
Wherein, hmIndicate channel of the suspicious sender's module to m-th of suspicious user, hBmIndicate that active sniffing person module arrives The channel of m-th of suspicious user, PEIndicate that the power for the interference signal that active sniffing person module is sent, z indicate interference signal, nm Indicate the noise of m-th of suspicious user, aiThe corresponding power coefficient of signal of i-th of suspicious user, P are distributed in expressionaExpression can Doubt the power that sender's module sends signal, siIndicate the signal for being sent to i-th of suspicious user.
The rate r of corresponding m-th of suspicious usermAre as follows:
Wherein,σ is the power of noise, aiThe corresponding power train of signal of i-th of suspicious user is distributed in expression Number, aEThe ratio of signal power is sent for the power of interference signal and suspicious sender's module;
M-th of suspicious user detects the rate of j-th of suspicious user are as follows:
Wherein, j≤m detects j-th of suspicious user with serial interference elimination for m-th of suspicious user, full Sufficient condition is as follows:
rj→m≥Rj
Wherein, RjIndicate the transmission rate for corresponding to j-th of suspicious user.
Specifically, for m-th of suspicious user, need to guarantee that communication will not be interrupted in step S4, then require rm≥Rm, m The outage probability of a suspicious userAre as follows:
Wherein, B is beta function,Γ (N) is gamma function, RmTransmission rate corresponding to m-th of suspicious user;Indicate that m-th of suspicious suspicious user detects the thing of j-th of suspicious user Part.
Further, m-th of suspicious suspicious user detects the event of j-th of suspicious userAre as follows:
Wherein, RjIndicate the transmission rate for corresponding to j-th of suspicious user, hmIt is suspicious to m-th for suspicious sender's module The channel of user, QjFor the Signal to Interference plus Noise Ratio thresholding of j-th of suspicious user.
Specifically, active sniffing person's module monitors the rate of m-th of suspicious user in step S5Are as follows:
Wherein, amBe sent to the power of m-th of suspicious user signal for suspicious sender and suspicious sender send it is total Power ratio, hEFor the channel of suspicious sender's module to active sniffing person's module;
Listener successfully monitors the event of m-th of suspicious userAre as follows:
Wherein, RmFor the transmission rate corresponding to m-th of suspicious user, QmFor the Signal to Interference plus Noise Ratio door of m-th of suspicious user Limit;
Active sniffing person module successfully monitors the interruption rate of m-th of suspicious userAre as follows:
Wherein, Indicate | hE|2Corresponding CDF,Indicate | hE|2It is corresponding PDF.
Specifically, in step S6, average monitoring and rate are as follows:
Wherein, R=Rj=Rm,The interruption rate of m-th of suspicious user is successfully monitored for active listener module.
Further, optimization problem converts are as follows:
Wherein,It is to work as PESubstitution when being maximizedValue,It is to work as PESubstitution when being minimizedValue.
Compared with prior art, the present invention at least has the advantages that
A kind of physical layer active sniffing method towards non-orthogonal multiple access system of the present invention, by increasing listener Initiative sends interference signal to listener and carries out power control, can be very good to realize the monitoring to non-orthogonal multiple system, It obtains and preferably monitors effect relative to conventional intercept method, improve the overall security of non-orthogonal multiple system.
Further, compound to signal progress is sent in suspicious transmitting terminal in step S1, entire communication system can be improved User access number.
Further, in step s 2, in suspicious receiving end, serial interference elimination detection is carried out to the signal received, The signal received is successively detected, when detecting n-th signal, it is believed that preceding N-1 signal has been detected by, from again It closes and is removed in signal, remaining signal treats as interference signal.
Further, in step s3, the work of listener module is sent dry in full-duplex mode while collecting information It disturbs, therefore the interference signal that suspicious recipient's module receives the information of suspicious sender's module simultaneously and listener is sent.It can be with Accomplish to interfere in real time.
Further, in step s 4, since suspicious traffic link has certain qos requirement, (outage probability is maintained very In small range), therefore, adjust the power of interference signal, thus it is possible to vary the transmission rate of suspicious sender.
Further, in step s 5, since the form that suspicious sender's module uses non-orthogonal multiple sends information, Listener module can successively detect the signal that suspicious sender sends using the form of serial interference elimination, to suspicious traffic It is monitored.
Further, in step s 6, by the solution to optimization problem, average monitor can be made to maximize with rate Purpose, reach best monitoring effect.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Fig. 1 is mode block diagram of the present invention;
Fig. 2 is simulation performance figure of the present invention;
Fig. 3 is the performance comparison figure of monitor method and traditional monitor method of the invention.
Specific embodiment
Referring to Fig. 1, the present invention provides a kind of physical layer active sniffing method towards non-orthogonal multiple access system, Belong to the safety of physical layer technical field under non-orthogonal multiple system, using suspicious sender's module and multiple suspicious recipient's moulds Block is communicated, wherein suspicious sender's module the composite signal comprising multiple suspicious recipient's modules is broadcast to it is multiple Suspicious recipient's module, suspicious recipient's module is after receiving composite signal, according to method for eliminating serial interference to compound letter It number is detected, Lawful Interception person works in full-duplex mode, while receiving composite signal, sends interference signal to multiple Suspicious receiver.Lawful Interception person according to the actual situation, if desired prevents suspicious one-to-many communication link, then sends high power Interference signal block suspicious link communication;If legal listener only suspicious traffic link is monitored, then guarantee can The service quality (QoS) of communication is doubted under certain require, by adjusting the power of interference signal, to reach snoop throughput maximum The target of change.Advantage is considered from the entirety of safety, to the suspicious traffic chain communicated using non-orthogonal multiple access way Road achievees the effect that active sniffing, can effectively prevent the transmission of suspicious traffic and guarantee to monitor the real-time intervened.
A kind of physical layer active sniffing method towards non-orthogonal multiple access system of the present invention includes the following:
Suspicious sender's module, suspicious sender's module are used to composite signal being sent to suspicious reception using the forms of broadcasting Person's module;
Suspicious recipient's module, suspicious recipient's module include multiple suspicious users, and each suspicious user is multiple for receiving It closes signal and is detected;
Active sniffing person's module, active sniffing person's module include a Lawful Interception person, and Lawful Interception person listens to signal Meanwhile interference signal is sent to suspicious recipient's module;After the suspicious traffic link of suspicious recipient's module receives interference signal, The rate that signal is sent by changing, reaches the maximized purpose of snoop throughput.Specific step is as follows:
It is carried out between S1, suspicious sender's module and suspicious recipient's module using power domain non-orthogonal multiple cut-in method Transmission;
Suspicious sender's module is according to the fine or not distribution power of channel quality, according to suspicious recipient's mould that channel quality is good The corresponding signal of block distributes few power, and the corresponding signal of suspicious recipient's module of bad channel quality distributes more power, It is sent in the form of broadcast after multiple signals are compound;
The signal s that suspicious sender's module is sent are as follows:
Wherein: s indicates that the signal that suspicious sender's module is sent, N indicate the number of suspicious user, aiExpression distributes to The corresponding power coefficient of the signal of i suspicious user, PaIndicate that suspicious sender's module sends the power of signal, siIt indicates to send To the signal of i-th of suspicious user;
After S2, each suspicious recipient's module receive composite signal, in suspicious recipient's module according to serial interference elimination Mode detected;
After each suspicious recipient's module receives composite signal, peak signal is successively detected from composite signal, then Remove from the composite signal, until detecting the suspicious user corresponding signal.
S3, active sniffing person's module work in full-duplex mode, while receiving composite signal, send interference signal to Suspicious recipient's module;
Active sniffing person module adjusts the power for sending interference signal, such as when sending interference signal according to actual needs Fruit needs to prevent the generation of suspicious traffic link, then active sniffing module sends high-power interference signal, so that suspicious traffic Link down;If active sniffing person module only monitors suspicious traffic link, rather than interrupt suspicious traffic link Occur, active sniffing person's module sends interference signal to suspicious recipient's module, and changes the power of interference signal to reach prison Throughput-maximized purpose is listened, wherein the power value of interference signal is between 0 to its attainable maximum value, active sniffing Person's module detects signal using serial interference elimination.
The signal y received at m-th of suspicious usermAre as follows:
Wherein, hmIndicate channel of the suspicious sender's module to m-th of suspicious user, hBmIndicate that active sniffing person module arrives The channel of m-th of suspicious user, PEIndicate that the power for the interference signal that active sniffing person module is sent, z indicate interference signal, nm Indicate the noise of m-th of suspicious user.
The rate r of corresponding m-th of suspicious usermAre as follows:
M-th of suspicious user detects the rate of j-th of suspicious user are as follows:
Wherein, j≤m detects j-th of suspicious user with serial interference elimination for m-th of suspicious user, full Sufficient condition is as follows:
rj→m≥Rj
Wherein, RjIndicate the transmission rate for corresponding to j-th of suspicious user.
After receiving interference signal, the Signal to Interference plus Noise Ratio at suspicious recipient's module declines for S4, suspicious recipient's module, to QoS is continued to, then changes the transmission rate of suspicious sender's module, the outage probability at active sniffing person's module is just at this time It can decline, non-interrupted probability will rise, so that it may reach the maximized purpose of snoop throughput;
For m-th of suspicious user, it need to guarantee that communication will not be interrupted, then require rm≥Rm, wherein RmIt can corresponding to m-th Doubt the transmission rate of user;
Use eventIndicate that m-th of suspicious suspicious user detects the event of j-th of suspicious user:
The outage probability of m-th of suspicious user are as follows:
Wherein,Γ (N) is gamma function.
S5, active sniffing person's module detect the composite signal received using the method for serial interference elimination;
Active sniffing person's module monitors the rate of m-th of suspicious user are as follows:
Use eventIndicate that active sniffing person module successfully monitors the event of m-th of suspicious user are as follows:
Wherein, hEIndicate suspicious sender's module to active sniffing person's module channel;
Active sniffing person module successfully monitors the interruption rate of m-th of suspicious user are as follows:
Wherein, Indicate | hE|2Corresponding CDF,Indicate | hE|2It is corresponding PDF;
S6, average monitoring and rate are calculated, calculating is averagely monitored and rate, optimization problem is established, by adjusting active prison The jamming power that hearer's module is sent, obtains maximum average monitoring and rate passes through the control to active sniffing person transmission power System, obtains and preferably monitors effect than conventional intercept mode, improve the safety of system.Wherein, traditional listening mode It only passively listens, that is to say, that listener module does not have the ability for sending interference signal, this traditional listening mode Both lack initiative, it is also undesirable to monitor effect.Method proposed by the present invention overcomes the defect of conventional intercept method, is obtaining While initiative, monitoring performance is also improved.
Average monitoring and rate are as follows:
Wherein, R=Rj=Rm
Optimization problem just becomes:
Wherein, i=1,2 ..., N;
Optimization problem conversion are as follows:
Wherein,It is to work as PESubstitution when being maximizedValue,It is to work as PESubstitution when being minimizedValue.
The initiative of the present invention improves Lawful Interception person obtains and preferably monitors effect.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being described and shown in usually here in attached drawing is real The component for applying example can be arranged and be designed by a variety of different configurations.Therefore, below to the present invention provided in the accompanying drawings The detailed description of embodiment be not intended to limit the range of claimed invention, but be merely representative of of the invention selected Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are obtained without creative efforts The every other embodiment obtained, shall fall within the protection scope of the present invention.
Emulation experiment
Referring to Fig. 2, average monitoring first increases with rate to be reduced afterwards with the increase of transmission rate, then that is, With the increase of interfering signal power, average monitoring first increases with rate to be reduced again, that is to say, that jamming power is in a certain range Monitoring performance can be improved in interior increase, but when jamming power is too big, can make to monitor performance decline instead, or even interrupt.Thus Prove that the physical layer transmission method based on the active sniffing under non-orthogonal multiple access system proposed in the present invention is can to mention Height monitors performance.
Fig. 3 is the comparison diagram of the present invention with conventional intercept method, from the figure, it can be seen that the prison of monitor method of the invention Effect is listened to be substantially better than the monitoring effect of conventional intercept method.
The above content is merely illustrative of the invention's technical idea, and this does not limit the scope of protection of the present invention, all to press According to technical idea proposed by the present invention, any changes made on the basis of the technical scheme each falls within claims of the present invention Protection scope within.

Claims (10)

1. a kind of physical layer active sniffing method towards non-orthogonal multiple access system, which comprises the following steps:
It is passed between S1, suspicious sender's module and suspicious recipient's module using power domain non-orthogonal multiple cut-in method It is defeated;
After S2, each suspicious recipient's module receive composite signal, in suspicious recipient's module according to the side of serial interference elimination Formula is detected;
S3, the work of active sniffing person's module are in full-duplex mode, while receiving composite signal, send interference signal to suspicious Recipient's module;
S4, suspicious recipient's module change the transmission rate of suspicious sender's module after receiving interference signal;
S5, active sniffing person's module detect the composite signal received using the method for serial interference elimination;
S6, average monitoring and rate are calculated, establishes optimization problem, the jamming power sent by adjusting active sniffing person module, Obtain maximum average monitoring and rate.
2. monitor method according to claim 1, which is characterized in that in step S1, suspicious sender's module is according to channel The fine or not distribution power of quality distributes few power, channel according to the corresponding signal of suspicious recipient's module that channel quality is good The more power of the corresponding signal distribution of ropy suspicious recipient's module, multiple signals it is compound after sent in the form of broadcast It goes out, the signal s that suspicious sender's module is sent are as follows:
Wherein: s indicates that the signal that suspicious sender's module is sent, N indicate the number of suspicious user, aiExpression distributes to i-th can Doubt the corresponding power coefficient of signal of user, PaIndicate that suspicious sender's module sends the power of signal, siExpression is sent to i-th The signal of a suspicious user.
3. monitor method according to claim 1, which is characterized in that in step S2, each suspicious recipient's module is received After composite signal, peak signal is successively detected from composite signal, is then removed from the composite signal, until detecting this Until the corresponding signal of suspicious user.
4. monitor method according to claim 1, which is characterized in that in step S3, active sniffing person's module uses serial Interference is eliminated to detect signal, and active sniffing person module adjusts send interference letter according to actual needs when sending interference signal Number power:
If necessary to prevent the generation of suspicious traffic link, then active sniffing module transmission high power interference signal makes suspicious logical Believe link down;
If active sniffing person module only monitors suspicious traffic link, rather than the generation of suspicious traffic link is interrupted, Active sniffing person's module sends interference signal to suspicious recipient's module, and the power for changing interference signal reaches snoop throughput It maximizes, the power value of interference signal is between 0 to its attainable maximum value.
5. monitor method according to claim 4, which is characterized in that the signal y received at m-th of suspicious usermAre as follows:
Wherein, hmIndicate channel of the suspicious sender's module to m-th of suspicious user, hBmIndicate active sniffing person module to m The channel of a suspicious user, PEIndicate that the power for the interference signal that active sniffing person module is sent, z indicate interference signal, nmIt indicates The noise of m-th of suspicious user, aiThe corresponding power coefficient of signal of i-th of suspicious user, P are distributed in expressionaIndicate suspicious hair The person's of sending module sends the power of signal, siIndicate the signal for being sent to i-th of suspicious user;
The rate r of corresponding m-th of suspicious usermAre as follows:
Wherein,σ is the power of noise, aiThe corresponding power coefficient of signal of i-th of suspicious user, a are distributed in expressionE The ratio of signal power is sent for the power of interference signal and suspicious sender's module;
M-th of suspicious user detects the rate of j-th of suspicious user are as follows:
Wherein, j≤m detects j-th of suspicious user with serial interference elimination, meets item for m-th of suspicious user Part is as follows:
rj→m≥Rj
Wherein, RjIndicate the transmission rate for corresponding to j-th of suspicious user.
6. monitor method according to claim 1, which is characterized in that in step S4, for m-th of suspicious user, need to protect Card communication will not be interrupted, then require rm≥Rm, the outage probability of m-th of suspicious userAre as follows:
Wherein, B is beta function,Γ (N) is gamma function, RmIt is right It should be in the transmission rate of m-th of suspicious user;Indicate that m-th of suspicious suspicious user detects the event of j-th of suspicious user.
7. monitor method according to claim 6, which is characterized in that m-th of suspicious suspicious user detects j-th of suspicious use The event at familyAre as follows:
Wherein, RjIndicate the transmission rate for corresponding to j-th of suspicious user, hmFor suspicious sender's module to m-th of suspicious user Channel, QjFor the Signal to Interference plus Noise Ratio thresholding of j-th of suspicious user.
8. monitor method according to claim 1, which is characterized in that in step S5, active sniffing person's module is monitored m-th The rate of suspicious userAre as follows:
Wherein, amThe power of m-th of suspicious user signal and the general power ratio of suspicious sender transmission are sent to for suspicious sender Value, hEFor the channel of suspicious sender's module to active sniffing person's module;
Listener successfully monitors the event of m-th of suspicious userAre as follows:
Wherein, RmFor the transmission rate corresponding to m-th of suspicious user, QmFor the Signal to Interference plus Noise Ratio thresholding of m-th of suspicious user;
Active sniffing person module successfully monitors the interruption rate of m-th of suspicious userAre as follows:
Wherein, Indicate | hE|2Corresponding CDF,Indicate | hE|2It is corresponding PDF。
9. monitor method according to claim 1, which is characterized in that in step S6, average monitoring and rate are as follows:
Wherein, R=Rj=Rm,The interruption rate of m-th of suspicious user is successfully monitored for active listener module.
10. monitor method according to claim 9, which is characterized in that optimization problem conversion are as follows:
Wherein,It is to work as PESubstitution when being maximizedValue,It is to work as PESubstitution when being minimized Value.
CN201910222087.XA 2019-03-22 2019-03-22 A kind of physical layer active sniffing method towards non-orthogonal multiple access system Pending CN110022557A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910222087.XA CN110022557A (en) 2019-03-22 2019-03-22 A kind of physical layer active sniffing method towards non-orthogonal multiple access system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910222087.XA CN110022557A (en) 2019-03-22 2019-03-22 A kind of physical layer active sniffing method towards non-orthogonal multiple access system

Publications (1)

Publication Number Publication Date
CN110022557A true CN110022557A (en) 2019-07-16

Family

ID=67189831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910222087.XA Pending CN110022557A (en) 2019-03-22 2019-03-22 A kind of physical layer active sniffing method towards non-orthogonal multiple access system

Country Status (1)

Country Link
CN (1) CN110022557A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111148096A (en) * 2019-12-03 2020-05-12 西安电子科技大学 Physical layer safety optimization power distribution method in 5G NOMA system
CN111586679A (en) * 2020-04-08 2020-08-25 西北工业大学 Safety guarantee method based on limited feedback non-orthogonal multiple access network
CN112512037A (en) * 2020-12-01 2021-03-16 华侨大学 Unmanned aerial vehicle active eavesdropping method combining track and interference power optimization

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411911A (en) * 2016-10-19 2017-02-15 浙江大学 Method for maximizing monitoring non-interruption probability of system based on active monitoring
CN106788651A (en) * 2017-01-22 2017-05-31 西安交通大学 The information transferring method of many geographic area broadcast systems accessed based on non-orthogonal multiple
CN108495337A (en) * 2018-01-23 2018-09-04 华南理工大学 Wireless portable communications system maximum safe rate optimization method based on NOMA
US20180324809A1 (en) * 2014-06-10 2018-11-08 Qualcomm Incorporated Devices and methods for facilitating non-orthogonal wireless communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180324809A1 (en) * 2014-06-10 2018-11-08 Qualcomm Incorporated Devices and methods for facilitating non-orthogonal wireless communications
CN106411911A (en) * 2016-10-19 2017-02-15 浙江大学 Method for maximizing monitoring non-interruption probability of system based on active monitoring
CN106788651A (en) * 2017-01-22 2017-05-31 西安交通大学 The information transferring method of many geographic area broadcast systems accessed based on non-orthogonal multiple
CN108495337A (en) * 2018-01-23 2018-09-04 华南理工大学 Wireless portable communications system maximum safe rate optimization method based on NOMA

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JIE XU 等: "Proactive Eavesdropping via Cognitive Jamming in Fading Channels", 《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111148096A (en) * 2019-12-03 2020-05-12 西安电子科技大学 Physical layer safety optimization power distribution method in 5G NOMA system
CN111148096B (en) * 2019-12-03 2022-03-25 西安电子科技大学 Physical layer safety optimization power distribution method in 5G NOMA system
CN111586679A (en) * 2020-04-08 2020-08-25 西北工业大学 Safety guarantee method based on limited feedback non-orthogonal multiple access network
CN111586679B (en) * 2020-04-08 2021-11-02 西北工业大学 Safety guarantee method based on limited feedback non-orthogonal multiple access network
CN112512037A (en) * 2020-12-01 2021-03-16 华侨大学 Unmanned aerial vehicle active eavesdropping method combining track and interference power optimization
CN112512037B (en) * 2020-12-01 2023-12-15 华侨大学 Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization

Similar Documents

Publication Publication Date Title
CN110022557A (en) A kind of physical layer active sniffing method towards non-orthogonal multiple access system
Yin et al. Delay and throughput oriented continuous spectrum sensing schemes in cognitive radio networks
CN103281143B (en) Selecting type cooperation spectrum sensing method based on double-threshold energy detection
CN101772047B (en) Method and system for monitoring network quality
CN107995615B (en) Heterogeneous network NOMA physical layer safety transmission method
CN104469784A (en) Processing method and apparatus of frequency spectrum sensing data in heterogeneous network
CN111988783B (en) Safe transmission method and system for uplink non-orthogonal multiple access
CN109714737A (en) A kind of D2D convert communication system and its communication means with full duplex base station cellular network
CN112383380B (en) Covert vehicle communication method based on non-orthogonal multiple access technology
Stotas et al. On the throughput maximization of spectrum sharing cognitive radio networks
Alahmadi et al. Subband PUEA detection and mitigation in OFDM-based cognitive radio networks
CN106162847B (en) A kind of frequency spectrum share energy consumption optimization method based on multi-user and multi-channel perception
Kim et al. Multi-band cognitive radio spectrum sensing for quality-of-service traffic
Liu et al. NOMA-based cognitive spectrum access for 5G-enabled Internet of Things
CN106131854A (en) Base station and signaling method based on frequency spectrum perception technology
CN110337094B (en) Secure transmission system for D2D content sharing and method thereof
CN113517911A (en) Power line communication system and communication method based on multi-carrier aggregation technology
CN110278068B (en) LoRa communication encryption system based on chaos sequence
Zhang et al. Joint optimization of energy harvesting and spectrum sensing for energy harvesting cognitive radio
CN112468245B (en) Short wave emission channel real-time diagnosis method based on data analysis
CN103023838A (en) Interference alignment method of up cell
CN114142909A (en) Passive radar assisted physical layer security satellite communication method
He et al. Full-duplex spectrum sensing for multi-antenna non-time-slotted cognitive radio networks
Jin et al. Superposition-based cooperative spectrum sensing in cognitive radio networks
CN106686689B (en) Method for rapidly accessing wireless network on train

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190716

RJ01 Rejection of invention patent application after publication