CN110266704B - Authorization system physical layer secure communication method based on assisted cognitive user selection - Google Patents

Authorization system physical layer secure communication method based on assisted cognitive user selection Download PDF

Info

Publication number
CN110266704B
CN110266704B CN201910555647.3A CN201910555647A CN110266704B CN 110266704 B CN110266704 B CN 110266704B CN 201910555647 A CN201910555647 A CN 201910555647A CN 110266704 B CN110266704 B CN 110266704B
Authority
CN
China
Prior art keywords
user
cognitive
transmitter
authorized
cognitive user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910555647.3A
Other languages
Chinese (zh)
Other versions
CN110266704A (en
Inventor
谢萍
朱军龙
邢玲
张明川
吴红海
张高远
刘璐鑫
贾新宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Science and Technology
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN201910555647.3A priority Critical patent/CN110266704B/en
Publication of CN110266704A publication Critical patent/CN110266704A/en
Application granted granted Critical
Publication of CN110266704B publication Critical patent/CN110266704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An authorization system physical layer secure communication method based on assisting cognitive user selection comprises the following steps: s1, the authorized user transmitter sends notification information to the authorized user receiver and the cognitive user transmitter before transmitting information; s2, the receiver of the authorized user broadcasts the pilot signal after receiving the notification information; s3, the cognitive user transmitter selects whether to join the alternative set or not based on the communication conditions of the authorized user receiver, the authorized user transmitter and the cognitive user transmitter; s4, the cognitive user transmitter calculates the communication condition parameters according to the authorized user receiver, the cognitive user transmitter and the eavesdropping user, and sends the communication condition parameters to the authorized user transmitter; s5, the authorized user transmitter selects a cognitive user transmitter from the alternative set as an assisted cognitive user; s6, the authorized user transmitter and the assisting cognitive user share the authorized frequency band to assist the assisting cognitive user to transmit assisting artificial noise. The invention can effectively improve the physical layer security performance of the authorization system.

Description

Authorization system physical layer secure communication method based on assisted cognitive user selection
Technical Field
The invention relates to the field of cognitive wireless networks, in particular to an authorization system physical layer secure communication method based on assistance of cognitive user selection.
Background
A Cognitive Radio Network (CRN) is an effective method that can alleviate shortage of spectrum resources and improve spectrum efficiency. Due to the dynamic and open wireless propagation characteristics of the CRN, the information transmitted by the CRN is very vulnerable to eavesdropping by an eavesdropper (Eve), which poses a great threat to the security of wireless network communication. The traditional encryption Security mechanism cannot be applied to a dynamic and open CRN system architecture, and a Physical Layer Security (PLS) technology is used as a supplement and a substitute for the encryption Security mechanism and can be used for guaranteeing the communication Security of the cognitive radio network. Therefore, the application of the physical layer security technology to the cognitive wireless network has great practical significance.
Currently, related researches on a physical layer security enhancement technology in a CRN mainly focus on solving the problem of security transmission of cognitive user information by using a multi-antenna technology, a cooperative interference technology, a resource optimization configuration technology, an artificial noise transmission technology and the like. Most of these studies employ an idealized model, and secure communication of cognitive user information is studied at the cost of either reducing transmission performance and resource utilization, or increasing system design complexity. However, in the cognitive radio system, it is necessary to secure not only the secure communication of the cognitive user information but also the secure communication of the authorized user information, and many studies have been focused on secure communication studies of the cognitive user information, and studies on the secure communication of the authorized user information are very limited.
In the existing CRN authorization system physical layer security enhancement technology, research is mainly considered to be carried out by taking authorization system technology improvement as an entry point, and the authorization system physical layer security enhancement is realized by rarely utilizing the cooperation of cognitive users. In fact, the information security communication performance of authorized users is improved in a cognitive user assistance mode, and on one hand, the transmission of cognitive user data is an interference to eavesdroppers; on the other hand, because the cognitive user and the eavesdropping user have similar partial behavior characteristics, such as randomness and dynamics of a user terminal, the cognitive user can effectively track and intervene the eavesdropping user through the similar characteristics, and therefore the security enhancement of the physical layer of the authorization system can be better realized through the cooperation of the cognitive user.
A fair and reasonable cooperation mode among users is a premise for determining whether the developed transmission technology has a good practical application prospect. In order to realize higher information security communication performance of authorized users, the cognitive users are urgently required to participate in the cooperation from the perspective of benefit of the authorized users, but the cognitive users are encouraged to participate in the cooperation only for compensation from the perspective of benefit of the cognitive users, and the cognitive users have to have the capability of participating in the cooperation. In CNR, a cognitive user needs to utilize an authorized spectrum for data communication, spectrum resources which can be obtained by the cognitive user when the cognitive user does not participate in cooperation are very limited, and in order to obtain more available spectrum resources, the cognitive user can actively assist the authorized user to improve the information security communication performance on one hand so as to stimulate the authorized user to release more spectrum use rights; on the other hand, in order to guarantee the communication service quality of the cognitive system, the cognitive user selectively participates in assisting the authorized user to realize information security communication. Therefore, the cognitive user assisting the authorized user to realize the security enhancement is a mutual and beneficial cooperation mode between the cognitive system and the authorized system, and has a good practical application prospect.
In a wireless communication system, the guarantee of user service quality and information security communication have the same important status. The prior art researches focus on the adoption of certain technologies to enhance the physical security of users, which often causes the degradation of the user service quality, and therefore, it is hopeful in the industry to develop a transmission scheme that can improve the information security transmission performance of users while not affecting the user service quality.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides the authorization system physical layer secure communication method based on the selection of the assisted cognitive user, which can effectively improve the physical layer security performance of the authorization system.
In order to achieve the purpose, the invention adopts the specific scheme that: an authorization system physical layer security communication method based on assisting cognitive user selection comprises an authorized user transmitter AT, an authorized user receiver AR and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, said method comprising the steps of:
s1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiSending notification information;
s2, broadcasting a pilot signal after the receiver AR of the authorized user receives the notification information;
s3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml
S4 cognitive user transmitter CTiCalculation authorization user receiver AR and cognitive user transmitter CTiAnd eavesdropping communication condition parameters between the users E and sending to an authorized user transmitter AT;
s5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user;
s6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data.
As a preferable scheme, the specific method of S3 is:
s3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
Figure GDA0003001579300000021
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous capacity CA
Figure GDA0003001579300000022
Figure GDA0003001579300000031
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) respectively representing authorized user transmitter AT machine and cognitive user transmitter CTiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]=1,N0Is additive white gaussian noise power;
s3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set Ml
As a preferable scheme, the specific method of S4 is:
s4.1, cognitive user transmitter CTiAuthorizing user receiver AR and cognitive user transmitter CT when serving as assisting cognitive user under calculation theory stateiAnd eavesdropping on the received signal and instantaneous capacity of the user E:
Figure GDA0003001579300000032
Figure GDA0003001579300000033
Figure GDA0003001579300000034
Figure GDA0003001579300000035
Figure GDA0003001579300000036
Figure GDA0003001579300000037
wherein r isA(t) and
Figure GDA0003001579300000038
respectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively cognitive user transmitter CTiOf the received signal and the instantaneous capacity, rE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) cognitive user transmitters CT, respectivelyiAnd reception noise on eavesdropping user E [ | s [ ]n(t)|2]=1,
Figure GDA0003001579300000039
Transmitter CT for cognitive usersiTransmit power, h, as an aid to cognitive usersAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,
Figure GDA00030015793000000310
transmitter CT for cognitive usersiThe channel coefficients with the cognitive user receiver CR,
Figure GDA00030015793000000311
transmitter for cognitive usersCTiChannel coefficients between the eavesdropping user E and the eavesdropping user E;
s4.2, cognitive user transmitter CTiWill r isA(t)、
Figure GDA00030015793000000312
rC(t)、CC、rE(t) and CETo the authorized user transmitter AT.
As a preferred scheme, in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:
Figure GDA0003001579300000041
CTOrepresenting assisted cognitive users, RCRepresenting the lowest transmission rate required by the cognitive system to decode the recovered signal.
As a preferred scheme, in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:
Figure GDA0003001579300000042
CTOindicating assistance to the cognitive user.
As a preferred scheme, in S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bands
Figure GDA0003001579300000043
And sA(t), wherein alpha is the power distribution factor of the cognitive transmitter, and is more than or equal to 0 and less than or equal to 1, sn(t) is the assisting artifact.
Has the advantages that:
1. under the condition that the transmission performance of the transmitter of the authorized user is not changed, the safety performance of the physical layer of the authorized system is improved by utilizing the cognitive assisting user to send assisting artificial noise;
2. the invention provides two selection modes for assisting the cognitive user, which can be flexibly selected according to the actual condition;
3. the invention ensures the system transmission capacity and the system physical layer safety capacity by properly assisting the cognitive user to select and enhancing the transmission power of the assisting cognitive user;
4. the invention has simple transmission mode, wider application range and lower system realization complexity.
Drawings
FIG. 1 is a diagram of the transmission mode of the present invention compared to a conventional underlay mode;
FIG. 2 is a graph comparing the performance of connection interruption between an authorized user transmitter and a cognitive user transmitter under the present invention and conventional schemes in a simulation experiment;
FIG. 3 is a graph comparing the impact of the number of cognitive user transmitters on the probability of a safe outage for an authorized user transmitter of the present invention versus a conventional scheme in a simulation experiment;
FIG. 4 is a graph comparing the impact of power allocation factor values on the probability of a safe outage for an authorized subscriber transmitter of the present invention versus a conventional scheme in a simulation experiment;
fig. 5 is a graph comparing the effect of the channel parameter value between the cognitive user transmitter and the eavesdropping user on the safety interruption probability of the authorized user transmitter in the present invention and the conventional scheme in the simulation experiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in this embodiment, an authorization system is implemented by introducing a new transmission mode based on a conventional underlay mode of a cognitive radio network, and includes an authorized user transmitter AT, an authorized user receiver AR, and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, all terminals are simply configured with single antenna and half duplex mode. Moreover, all the wireless communication channels and the wiretapping channel involved are quasi-static Rayleigh fading channelsChannel and additive white gaussian noise channel, for simplicity of analysis, all channel state information is assumed to remain unchanged for one slot, given hA
Figure GDA0003001579300000051
hAE
Figure GDA0003001579300000052
Representing channels AT → AR, AT → CT, respectivelyi,AT→E,CTi→AR,CTi→CR,CTiChannel coefficients on → E. Assuming that the received noise of all receivers is zero noise power N on average0White additive gaussian noise.
The authorized system physical layer secure communication method based on the assistance cognitive user selection comprises S1 to S6.
S1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiAnd sending the notification information.
S2, the receiver AR of authorized user broadcasts the pilot signal after receiving the notification information.
S3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml. Specific methods of S3 are S3.1 to S3.3.
S3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
Figure GDA0003001579300000053
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous Capacity CA
Figure GDA0003001579300000054
Figure GDA0003001579300000055
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) denotes an authorized user transmitter AT and a cognitive user transmitter CT, respectivelyiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]1, i.e. to sA(t) and sC(t) normalization to simplify the analysis, N0Is additive white gaussian noise power.
S3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set MlCan be expressed as Ml={CTiI ∈ (1,2, L, L) }, L is the number of elements in the alternative set.
S4 cognitive user transmitter CTiCalculation authorization user receiver AR and cognitive user transmitter CTiAnd eavesdropping on the communication situation parameters between the users E and sending to the authorized user transmitter AT. Specific methods of S4 are S4.1 to S4.2.
S4.1, cognitive user transmitter CTiCalculating the received signals and instantaneous capacities of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E:
Figure GDA0003001579300000061
Figure GDA0003001579300000062
Figure GDA0003001579300000063
Figure GDA0003001579300000064
Figure GDA0003001579300000065
Figure GDA0003001579300000066
wherein r isA(t) and
Figure GDA0003001579300000067
respectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively the received signal and the instantaneous capacity, r, of the cognitive user receiver CRE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) reception noise, E [ | s, at the cognitive user receiver CR and at the eavesdropping user E, respectivelyn(t)|2]=1,
Figure GDA0003001579300000068
Representing the transmission power of the assisted cognitive user, alpha is the power distribution factor of the cognitive transmitter, hAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,
Figure GDA0003001579300000069
transmitter CT for cognitive usersiThe channel coefficients with the cognitive user receiver CR,
Figure GDA00030015793000000610
transmitter CT for cognitive usersiAnd eavesdropping on the channel coefficients between the users E.
Because of the fact thatPCAnd alpha is known and unambiguous, so that the individual cognitive user transmitters CT in the theoretical state can be calculated directlyiAnd further selecting a more appropriate assisted cognitive user as a communication condition for assisting the cognitive user.
S4.2, cognitive user transmitter CTiWill r isA(t)、
Figure GDA00030015793000000611
rC(t)、CC、rE(t) and CETo the authorized user transmitter AT.
S5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user. The invention provides two methods for selecting assistance cognitive users.
The method for authorizing the user transmitter AT to select the assisted cognitive user comprises the following steps:
Figure GDA00030015793000000612
CTOrepresenting assisted cognitive users, RCRespectively, the lowest transmission rate required by the cognitive system to decode the recovered signal. Method one is referred to as the OSTS (best cognitive transmission selection) model below.
In this embodiment, if the candidate set MlCognitive user transmitter CT for stimulation when the number of medium elements is lessiParticipating in the cooperation, authorizing the user transmitter AT to be selected from the alternative set MlOne of the CT data which can realize the maximum cognitive transmission rate is selected as the CT data of the assisted cognitive userOAnd then the first method is executed.
The method for authorizing the user transmitter AT to select the assisted cognitive user comprises the following steps:
Figure GDA0003001579300000071
CTOindicating assistance to the cognitive user. Method two is hereinafter referred to as OCJS (best security enhanced selection) model.
In this embodiment, ifSet of alternatives MlWhen the number of the medium elements is more, it indicates that more cognitive users exist in the system to compete for sharing the spectrum resources of the authorized system, and the authorized user transmitter AT will be selected from the alternative set MlCognitive user transmitter CT for selecting the cognitive user transmitter CT capable of providing the maximum security performance service for the authorized useriCT as an assisted cognitive userOAnd executing the second method.
S6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data. In S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bands
Figure GDA0003001579300000072
And sA(t), wherein alpha is the power distribution factor of the cognitive transmitter, and is more than or equal to 0 and less than or equal to 1, sn(t) is an AT per authorized user transmitter and a CT per cognitive user transmitteriThe cognitive user receiver CR and the authorized user receiver AR can effectively use s according to the original rulen(t) is eliminated from the received signal, which is unknown to the eavesdropping user E, so that snAnd (t) interference is caused to the eavesdropping user E, and the safety of the communication process is improved.
The invention is theoretically verified by a connection interruption probability analysis and a safety interruption probability analysis.
The first stage, in the cognitive radio network, is the cognitive user transmitter CTiThe licensed band can only be accessed if the interference limitation condition is satisfied. Device set
Figure GDA0003001579300000073
Cognitive user transmitter CT indicating satisfaction of interference constraintsiA set of M, whereinl={CTi|CA≥RAI ∈ {1, K, M } }, cognitive user transmitter CT on the licensed bandiThere are two access situations, one is that all cognitive users transmit CTiDo not satisfy the interference limitation condition, i.e.
Figure GDA0003001579300000074
This indicates that there is no cognitive user transmitter CTiThe authorized frequency band can be accessed; secondly, a certain cognitive user transmitter CTiCapable of meeting interference limiting conditions so as to have access to a licensed frequency band, i.e.
Figure GDA00030015793000000710
Setting all Rayleigh fading channel random variables | hA|2
Figure GDA0003001579300000075
|hAE|2
Figure GDA0003001579300000076
Respectively obey parameters of
Figure GDA0003001579300000077
The occurrence probabilities of the two cases can be respectively calculated as follows
Figure GDA0003001579300000078
Figure GDA0003001579300000079
In the formula
Figure GDA0003001579300000081
Second phase, cognitive user transmitter CT considering two cases of access to licensed bands in first phaseiIn different situations, the corresponding cognitive communication link CTiThe connection interruption probability on → CR, the connection interruption probability on the authorized communication link AT → AR and its security interruption probability will all be different, so two interruption probabilities of the case-by-case solution system are needed. Setting cognitive communication link CTiConnection interruption event on → CR, authorized communication link aT → connection interruption event on AR and its safe interruption event respectively represent ΨC、ΨAAnd Ψint. In case one, namely
Figure GDA0003001579300000082
Due to no cognitive user transmitter CTiAccess to licensed bands, cognitive connection outage probability
Figure GDA0003001579300000083
The reception of the signals by the authorized user receiver AR and the eavesdropping user E and the instantaneous capacities corresponding thereto can be expressed respectively as
Figure GDA0003001579300000084
Figure GDA0003001579300000085
Setting random variable U1=|hA|2,U4=|hAE|2Then, the connection interruption probability and the security interruption probability of the authorized communication link AT → AR AT this time are
Figure GDA0003001579300000086
Figure GDA0003001579300000087
At the third stage when
Figure GDA0003001579300000088
One cognitive user transmitter CTiIs selected as the auxiliary cognitive user to access the authorized frequency band and meets the interference limitation condition CA≥RAThen the probability of a connection interruption on the authorized communication link AT → AR in this case is easily derived
Figure GDA00030015793000000812
The second stage provides the received signals and the instantaneous channel capacity of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E under the second condition, and sets R according to two cooperative cognitive user selection modelsCRepresents the minimum transmission rate required for the cognitive receiver to decode the recovered signal,
Figure GDA0003001579300000089
random variable
Figure GDA00030015793000000810
Set MlThe number of the elements in the formula is L. Then, when the OCJS and the OSTS models are respectively adopted, the connection interruption probability of the cognitive user and the security interruption probability of the authorized user can be respectively solved as follows
Figure GDA00030015793000000811
Figure GDA0003001579300000091
Figure GDA0003001579300000092
Figure GDA0003001579300000093
In the formula
Figure GDA0003001579300000094
Ei (t) is an exponential integration function with an argument t, i.e.,
Figure GDA0003001579300000095
where a is the euler constant.
In the fourth stage, the first step is carried out,cognitive user transmitter CT as described in the first stageiThere are two different possible cases of access to the licensed band, and in each case a cognitive communication link CTiThe connection interruption probability on the → CR, the connection interruption probability on the authorized communication link AT → AR and the safety interruption probability thereof are obtained in the second stage and the third stage, then according to the Bayesian total probability formula, the probabilities obtained in the first stage, the second stage and the third stage are substituted into the total probability formula, the complete connection interruption probability on the authorized communication link AT → AR and the cognitive communication link CT in the transmission mode of the inventioniThe connection interruption probability on the → CR and the security interruption probability on the authorized communication link AT → AR can be solved
Figure GDA0003001579300000096
Figure GDA0003001579300000097
Figure GDA0003001579300000098
When the two collaborative user selection models of OCJS and OSTS are respectively adopted, the model is expressed in the above formula
Figure GDA0003001579300000099
Are respectively substituted into
Figure GDA00030015793000000910
Or
Figure GDA00030015793000000911
The invention is verified by simulation experiments below.
As can be seen from FIG. 2, when the system is a cognitive user transmitter CTiWhen the number L of the network nodes is the same, the authorized communication link AT → in the OCJS model, the OSTS model and the traditional network methodThe connection interruption probabilities on the AR are equal, and the connection interruption probability on the authorized communication link AT → AR is obviously reduced along with the increase of the value of L under the same scheme; when L takes the same value, the cognitive communication link CT in the OCJS model and the traditional network methodiThe probability of connection interruption on → CR is equal and at the cognitive user transmitter CTiThe average emission signal-to-noise ratio is less than 10dB, and the cognitive communication link CT is under the OSTS model methodiThe connection interruption probability on the → CR is obviously reduced compared with the former two, and the cognitive communication link CT is recognized along with the increase of the value of L in the same methodiThe probability of a connection interruption on → CR also decreases significantly. In conclusion, the cognitive communication link CT in the inventioni→ CR and authorized communication link AT → connection interruption performance on AR is no worse than that of traditional network, especially cognitive communication link CT in OSTS modeliThe connection interruption performance on the → CR is significantly better than that of the conventional network.
As can be seen from fig. 3, 4 and 5, the probability of security interruption on the authorized communication link AT → AR in the conventional network is the greatest, the next time under the OSTS model in the present invention, and the smallest under the OCJS model in the present invention; when the same method is adopted, the larger the value of L is, or the smaller the value of the power distribution factor alpha is, or the channel parameter
Figure GDA0003001579300000101
The smaller the value, the smaller the probability of security interruption on the authorized communication link AT → AR. In short, the security interruption performance of the authorized communication link AT → AR under the two models of OSTS and OCJS is superior to that of the traditional network, namely the invention improves the transmission security performance of the authorized user.
The above examples are to be construed as merely illustrative and not limitative of the remainder of the disclosure. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. An authorization system physical layer security communication method based on assisting cognitive user selection comprises an authorized user transmitter AT, an authorized user receiver AR and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, characterized in that: the method comprises the following steps:
s1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiSending notification information;
s2, broadcasting a pilot signal after the receiver AR of the authorized user receives the notification information;
s3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml
S4 cognitive user transmitter computer CTiReceiver AR, cognitive user transmitter CT according to authorized useriAnd eavesdropping communication condition parameters between the users E and sending to an authorized user transmitter AT;
the specific method of S4 is as follows:
s4.1, cognitive user transmitter CTiAnd (3) calculating the received signals and the instantaneous capacity of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E when the receiver is used as an assisted cognitive user in a theoretical state:
Figure FDA0003001579290000011
Figure FDA0003001579290000012
Figure FDA0003001579290000013
Figure FDA0003001579290000014
Figure FDA0003001579290000015
Figure FDA0003001579290000016
wherein r isA(t) and
Figure FDA0003001579290000017
respectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively the received signal and the instantaneous capacity, r, of the cognitive user receiver CRE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) reception noise, E [ | s, at the cognitive user receiver CR and at the eavesdropping user E, respectivelyn(t)|2]=1,
Figure FDA0003001579290000018
Transmitter CT for cognitive usersiTransmit power, h, as an aid to cognitive usersAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,
Figure FDA0003001579290000019
transmitter CT for cognitive usersiAnd cognizing the userThe channel coefficients between the receivers CR are,
Figure FDA00030015792900000110
transmitter CT for cognitive usersiChannel coefficients between the eavesdropping user E and the eavesdropping user E; h isA
Figure FDA00030015792900000111
hAE
Figure FDA00030015792900000112
Figure FDA00030015792900000113
Representing channels AT → AR, AT → CT, respectivelyi,AT→E,CTi→AR,CTi→CR,CTiChannel coefficients on → E; alpha is the power distribution factor of the cognitive transmitter, and alpha is more than or equal to 0 and less than or equal to 1, sn(t) assisting artifacts;
s4.2, cognitive user transmitter CTiWill r isA(t)、
Figure FDA0003001579290000021
rC(t)、CC、rE(t) and CESending to an authorized user transmitter AT; s5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user;
s6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data.
2. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 1, wherein: the specific method of S3 is as follows:
s3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
Figure FDA0003001579290000022
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous Capacity CA
Figure FDA0003001579290000023
Figure FDA0003001579290000024
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) respectively representing authorized user transmitter AT machine and cognitive user transmitter CTiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]=1,N0Is additive white gaussian noise power;
s3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set Ml
3. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 2, wherein: in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:
Figure FDA0003001579290000025
CTOrepresenting assisted cognitive users, RCShow and recognizeKnowing the minimum transmission rate required by the system to decode the recovered signal.
4. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 3, wherein: in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:
Figure FDA0003001579290000026
CTOindicating assistance to the cognitive user.
5. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 3 or 4, characterized in that: in S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bands
Figure FDA0003001579290000031
And sA(t)。
CN201910555647.3A 2019-06-25 2019-06-25 Authorization system physical layer secure communication method based on assisted cognitive user selection Active CN110266704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910555647.3A CN110266704B (en) 2019-06-25 2019-06-25 Authorization system physical layer secure communication method based on assisted cognitive user selection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910555647.3A CN110266704B (en) 2019-06-25 2019-06-25 Authorization system physical layer secure communication method based on assisted cognitive user selection

Publications (2)

Publication Number Publication Date
CN110266704A CN110266704A (en) 2019-09-20
CN110266704B true CN110266704B (en) 2021-05-28

Family

ID=67921389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910555647.3A Active CN110266704B (en) 2019-06-25 2019-06-25 Authorization system physical layer secure communication method based on assisted cognitive user selection

Country Status (1)

Country Link
CN (1) CN110266704B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507091A (en) * 2014-12-16 2015-04-08 西安交通大学 Energy cooperation method based on mutual benefit in cognitive radio network
CN105392143A (en) * 2015-11-17 2016-03-09 浙江工业大学 Authorized user and cognitive user QoS guaranteed frequency spectrum access method based on power allocation
CN105516997A (en) * 2015-12-06 2016-04-20 桂林电子科技大学 Physical layer safe cognition relay communication method
CN107171775A (en) * 2017-05-09 2017-09-15 桂林电子科技大学 The mixing duplex transmission method of safety of physical layer is lifted in a kind of cognitive junction network
CN107404475A (en) * 2017-06-13 2017-11-28 西安电子科技大学 A kind of safe transmission method of physical layer encouraged based on frequency spectrum and energy resource
CN108901028A (en) * 2018-06-25 2018-11-27 广东工业大学 The combined optimization method of cooperative cognitive radio net safe capacity and energy efficiency

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8514790B2 (en) * 2009-01-22 2013-08-20 Intel Mobile Communications GmbH System and method for optimizing network wireless communication resources

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507091A (en) * 2014-12-16 2015-04-08 西安交通大学 Energy cooperation method based on mutual benefit in cognitive radio network
CN105392143A (en) * 2015-11-17 2016-03-09 浙江工业大学 Authorized user and cognitive user QoS guaranteed frequency spectrum access method based on power allocation
CN105516997A (en) * 2015-12-06 2016-04-20 桂林电子科技大学 Physical layer safe cognition relay communication method
CN107171775A (en) * 2017-05-09 2017-09-15 桂林电子科技大学 The mixing duplex transmission method of safety of physical layer is lifted in a kind of cognitive junction network
CN107404475A (en) * 2017-06-13 2017-11-28 西安电子科技大学 A kind of safe transmission method of physical layer encouraged based on frequency spectrum and energy resource
CN108901028A (en) * 2018-06-25 2018-11-27 广东工业大学 The combined optimization method of cooperative cognitive radio net safe capacity and energy efficiency

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Statistical analysis of a class of secure relay assisted cognitive radio networks;Mona Shokair;Waleed Saad;Shady M.Ibraheem;《China Communications》;20181230;全文 *
协作与认知无线通信网络中若干关键技术研究;陈丹;《中国博士学位论文全文数据库 信息科技辑》;20130115;全文 *
基于解码转发协议的认知中继网络物理层安全研究与应用;杨启青;《中国优秀硕士学位论文全文数据库 信息科技辑》;20171115;全文 *

Also Published As

Publication number Publication date
CN110266704A (en) 2019-09-20

Similar Documents

Publication Publication Date Title
Lu et al. Cooperative OFDM relaying for opportunistic spectrum sharing: Protocol design and resource allocation
Maham et al. Cognitive multiple access network with outage margin in the primary system
CN105491563B (en) Method and system for improving security rate of MISO security communication system by utilizing artificial noise
CN111510987B (en) Relay selection method based on safety cooperation NOMA network
CN107248908B (en) Hybrid duplex transmission method in cognitive relay network based on relay selection
Kalantari et al. Joint power control in wiretap interference channels
Wu et al. Joint resource allocation and power control for cellular and device‐to‐device multicast based on cognitive radio
Bouida et al. Adaptive spatial modulation for spectrum sharing systems with limited feedback
CN110149127A (en) A kind of D2D communication system precoding vector optimization method based on NOMA technology
Fazel et al. Secure throughput optimization for cache-enabled multi-UAVs networks
Shang et al. Secure transmission for NOMA-based cognitive radio networks with imperfect CSI
Sun et al. Transmit power control for cognitive radio over a Rayleigh fading channel
Peng et al. Covert non-orthogonal multiple access communication assisted by multi-antenna jamming
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
CN105376847B (en) A kind of vehicle-mounted relaying cluster power distribution method towards 5G car networking safety of physical layer
CN110266704B (en) Authorization system physical layer secure communication method based on assisted cognitive user selection
CN107404475B (en) Physical layer secure transmission method based on frequency spectrum and energy resource excitation
Zhang et al. Performance analysis of relay based NOMA cooperative transmission under cognitive radio network
Pham et al. Spectrum sharing with secure transmission
CN111263363A (en) High-strength safe transmission method
Ali Modeling, analysis, and design of 5G networks using stochastic geometry
CN111885718A (en) Robust cognitive communication system power distribution method based on cooperative relay
Yang et al. Power Control for Full-Duplex Device-to-Device Underlaid Cellular Networks: A Stackelberg Game Approach
Sezer et al. Optimal channel switching in multiuser systems under average capacity constraints
Zou et al. Dynamic spectrum access‐based cryptosystem for cognitive radio networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant