CN110266704B - Authorization system physical layer secure communication method based on assisted cognitive user selection - Google Patents
Authorization system physical layer secure communication method based on assisted cognitive user selection Download PDFInfo
- Publication number
- CN110266704B CN110266704B CN201910555647.3A CN201910555647A CN110266704B CN 110266704 B CN110266704 B CN 110266704B CN 201910555647 A CN201910555647 A CN 201910555647A CN 110266704 B CN110266704 B CN 110266704B
- Authority
- CN
- China
- Prior art keywords
- user
- cognitive
- transmitter
- authorized
- cognitive user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An authorization system physical layer secure communication method based on assisting cognitive user selection comprises the following steps: s1, the authorized user transmitter sends notification information to the authorized user receiver and the cognitive user transmitter before transmitting information; s2, the receiver of the authorized user broadcasts the pilot signal after receiving the notification information; s3, the cognitive user transmitter selects whether to join the alternative set or not based on the communication conditions of the authorized user receiver, the authorized user transmitter and the cognitive user transmitter; s4, the cognitive user transmitter calculates the communication condition parameters according to the authorized user receiver, the cognitive user transmitter and the eavesdropping user, and sends the communication condition parameters to the authorized user transmitter; s5, the authorized user transmitter selects a cognitive user transmitter from the alternative set as an assisted cognitive user; s6, the authorized user transmitter and the assisting cognitive user share the authorized frequency band to assist the assisting cognitive user to transmit assisting artificial noise. The invention can effectively improve the physical layer security performance of the authorization system.
Description
Technical Field
The invention relates to the field of cognitive wireless networks, in particular to an authorization system physical layer secure communication method based on assistance of cognitive user selection.
Background
A Cognitive Radio Network (CRN) is an effective method that can alleviate shortage of spectrum resources and improve spectrum efficiency. Due to the dynamic and open wireless propagation characteristics of the CRN, the information transmitted by the CRN is very vulnerable to eavesdropping by an eavesdropper (Eve), which poses a great threat to the security of wireless network communication. The traditional encryption Security mechanism cannot be applied to a dynamic and open CRN system architecture, and a Physical Layer Security (PLS) technology is used as a supplement and a substitute for the encryption Security mechanism and can be used for guaranteeing the communication Security of the cognitive radio network. Therefore, the application of the physical layer security technology to the cognitive wireless network has great practical significance.
Currently, related researches on a physical layer security enhancement technology in a CRN mainly focus on solving the problem of security transmission of cognitive user information by using a multi-antenna technology, a cooperative interference technology, a resource optimization configuration technology, an artificial noise transmission technology and the like. Most of these studies employ an idealized model, and secure communication of cognitive user information is studied at the cost of either reducing transmission performance and resource utilization, or increasing system design complexity. However, in the cognitive radio system, it is necessary to secure not only the secure communication of the cognitive user information but also the secure communication of the authorized user information, and many studies have been focused on secure communication studies of the cognitive user information, and studies on the secure communication of the authorized user information are very limited.
In the existing CRN authorization system physical layer security enhancement technology, research is mainly considered to be carried out by taking authorization system technology improvement as an entry point, and the authorization system physical layer security enhancement is realized by rarely utilizing the cooperation of cognitive users. In fact, the information security communication performance of authorized users is improved in a cognitive user assistance mode, and on one hand, the transmission of cognitive user data is an interference to eavesdroppers; on the other hand, because the cognitive user and the eavesdropping user have similar partial behavior characteristics, such as randomness and dynamics of a user terminal, the cognitive user can effectively track and intervene the eavesdropping user through the similar characteristics, and therefore the security enhancement of the physical layer of the authorization system can be better realized through the cooperation of the cognitive user.
A fair and reasonable cooperation mode among users is a premise for determining whether the developed transmission technology has a good practical application prospect. In order to realize higher information security communication performance of authorized users, the cognitive users are urgently required to participate in the cooperation from the perspective of benefit of the authorized users, but the cognitive users are encouraged to participate in the cooperation only for compensation from the perspective of benefit of the cognitive users, and the cognitive users have to have the capability of participating in the cooperation. In CNR, a cognitive user needs to utilize an authorized spectrum for data communication, spectrum resources which can be obtained by the cognitive user when the cognitive user does not participate in cooperation are very limited, and in order to obtain more available spectrum resources, the cognitive user can actively assist the authorized user to improve the information security communication performance on one hand so as to stimulate the authorized user to release more spectrum use rights; on the other hand, in order to guarantee the communication service quality of the cognitive system, the cognitive user selectively participates in assisting the authorized user to realize information security communication. Therefore, the cognitive user assisting the authorized user to realize the security enhancement is a mutual and beneficial cooperation mode between the cognitive system and the authorized system, and has a good practical application prospect.
In a wireless communication system, the guarantee of user service quality and information security communication have the same important status. The prior art researches focus on the adoption of certain technologies to enhance the physical security of users, which often causes the degradation of the user service quality, and therefore, it is hopeful in the industry to develop a transmission scheme that can improve the information security transmission performance of users while not affecting the user service quality.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides the authorization system physical layer secure communication method based on the selection of the assisted cognitive user, which can effectively improve the physical layer security performance of the authorization system.
In order to achieve the purpose, the invention adopts the specific scheme that: an authorization system physical layer security communication method based on assisting cognitive user selection comprises an authorized user transmitter AT, an authorized user receiver AR and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, said method comprising the steps of:
s1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiSending notification information;
s2, broadcasting a pilot signal after the receiver AR of the authorized user receives the notification information;
s3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml;
S4 cognitive user transmitter CTiCalculation authorization user receiver AR and cognitive user transmitter CTiAnd eavesdropping communication condition parameters between the users E and sending to an authorized user transmitter AT;
s5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user;
s6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data.
As a preferable scheme, the specific method of S3 is:
s3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous capacity CA:
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) respectively representing authorized user transmitter AT machine and cognitive user transmitter CTiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]=1,N0Is additive white gaussian noise power;
s3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set Ml。
As a preferable scheme, the specific method of S4 is:
s4.1, cognitive user transmitter CTiAuthorizing user receiver AR and cognitive user transmitter CT when serving as assisting cognitive user under calculation theory stateiAnd eavesdropping on the received signal and instantaneous capacity of the user E:
wherein r isA(t) andrespectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively cognitive user transmitter CTiOf the received signal and the instantaneous capacity, rE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) cognitive user transmitters CT, respectivelyiAnd reception noise on eavesdropping user E [ | s [ ]n(t)|2]=1,Transmitter CT for cognitive usersiTransmit power, h, as an aid to cognitive usersAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,transmitter CT for cognitive usersiThe channel coefficients with the cognitive user receiver CR,transmitter for cognitive usersCTiChannel coefficients between the eavesdropping user E and the eavesdropping user E;
s4.2, cognitive user transmitter CTiWill r isA(t)、rC(t)、CC、rE(t) and CETo the authorized user transmitter AT.
As a preferred scheme, in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:CTOrepresenting assisted cognitive users, RCRepresenting the lowest transmission rate required by the cognitive system to decode the recovered signal.
As a preferred scheme, in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:CTOindicating assistance to the cognitive user.
As a preferred scheme, in S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bandsAnd sA(t), wherein alpha is the power distribution factor of the cognitive transmitter, and is more than or equal to 0 and less than or equal to 1, sn(t) is the assisting artifact.
Has the advantages that:
1. under the condition that the transmission performance of the transmitter of the authorized user is not changed, the safety performance of the physical layer of the authorized system is improved by utilizing the cognitive assisting user to send assisting artificial noise;
2. the invention provides two selection modes for assisting the cognitive user, which can be flexibly selected according to the actual condition;
3. the invention ensures the system transmission capacity and the system physical layer safety capacity by properly assisting the cognitive user to select and enhancing the transmission power of the assisting cognitive user;
4. the invention has simple transmission mode, wider application range and lower system realization complexity.
Drawings
FIG. 1 is a diagram of the transmission mode of the present invention compared to a conventional underlay mode;
FIG. 2 is a graph comparing the performance of connection interruption between an authorized user transmitter and a cognitive user transmitter under the present invention and conventional schemes in a simulation experiment;
FIG. 3 is a graph comparing the impact of the number of cognitive user transmitters on the probability of a safe outage for an authorized user transmitter of the present invention versus a conventional scheme in a simulation experiment;
FIG. 4 is a graph comparing the impact of power allocation factor values on the probability of a safe outage for an authorized subscriber transmitter of the present invention versus a conventional scheme in a simulation experiment;
fig. 5 is a graph comparing the effect of the channel parameter value between the cognitive user transmitter and the eavesdropping user on the safety interruption probability of the authorized user transmitter in the present invention and the conventional scheme in the simulation experiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in this embodiment, an authorization system is implemented by introducing a new transmission mode based on a conventional underlay mode of a cognitive radio network, and includes an authorized user transmitter AT, an authorized user receiver AR, and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, all terminals are simply configured with single antenna and half duplex mode. Moreover, all the wireless communication channels and the wiretapping channel involved are quasi-static Rayleigh fading channelsChannel and additive white gaussian noise channel, for simplicity of analysis, all channel state information is assumed to remain unchanged for one slot, given hA,hAE,Representing channels AT → AR, AT → CT, respectivelyi,AT→E,CTi→AR,CTi→CR,CTiChannel coefficients on → E. Assuming that the received noise of all receivers is zero noise power N on average0White additive gaussian noise.
The authorized system physical layer secure communication method based on the assistance cognitive user selection comprises S1 to S6.
S1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiAnd sending the notification information.
S2, the receiver AR of authorized user broadcasts the pilot signal after receiving the notification information.
S3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml. Specific methods of S3 are S3.1 to S3.3.
S3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous Capacity CA:
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) denotes an authorized user transmitter AT and a cognitive user transmitter CT, respectivelyiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]1, i.e. to sA(t) and sC(t) normalization to simplify the analysis, N0Is additive white gaussian noise power.
S3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set MlCan be expressed as Ml={CTiI ∈ (1,2, L, L) }, L is the number of elements in the alternative set.
S4 cognitive user transmitter CTiCalculation authorization user receiver AR and cognitive user transmitter CTiAnd eavesdropping on the communication situation parameters between the users E and sending to the authorized user transmitter AT. Specific methods of S4 are S4.1 to S4.2.
S4.1, cognitive user transmitter CTiCalculating the received signals and instantaneous capacities of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E:
wherein r isA(t) andrespectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively the received signal and the instantaneous capacity, r, of the cognitive user receiver CRE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) reception noise, E [ | s, at the cognitive user receiver CR and at the eavesdropping user E, respectivelyn(t)|2]=1,Representing the transmission power of the assisted cognitive user, alpha is the power distribution factor of the cognitive transmitter, hAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,transmitter CT for cognitive usersiThe channel coefficients with the cognitive user receiver CR,transmitter CT for cognitive usersiAnd eavesdropping on the channel coefficients between the users E.
Because of the fact thatPCAnd alpha is known and unambiguous, so that the individual cognitive user transmitters CT in the theoretical state can be calculated directlyiAnd further selecting a more appropriate assisted cognitive user as a communication condition for assisting the cognitive user.
S4.2, cognitive user transmitter CTiWill r isA(t)、rC(t)、CC、rE(t) and CETo the authorized user transmitter AT.
S5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user. The invention provides two methods for selecting assistance cognitive users.
The method for authorizing the user transmitter AT to select the assisted cognitive user comprises the following steps:
CTOrepresenting assisted cognitive users, RCRespectively, the lowest transmission rate required by the cognitive system to decode the recovered signal. Method one is referred to as the OSTS (best cognitive transmission selection) model below.
In this embodiment, if the candidate set MlCognitive user transmitter CT for stimulation when the number of medium elements is lessiParticipating in the cooperation, authorizing the user transmitter AT to be selected from the alternative set MlOne of the CT data which can realize the maximum cognitive transmission rate is selected as the CT data of the assisted cognitive userOAnd then the first method is executed.
The method for authorizing the user transmitter AT to select the assisted cognitive user comprises the following steps:
CTOindicating assistance to the cognitive user. Method two is hereinafter referred to as OCJS (best security enhanced selection) model.
In this embodiment, ifSet of alternatives MlWhen the number of the medium elements is more, it indicates that more cognitive users exist in the system to compete for sharing the spectrum resources of the authorized system, and the authorized user transmitter AT will be selected from the alternative set MlCognitive user transmitter CT for selecting the cognitive user transmitter CT capable of providing the maximum security performance service for the authorized useriCT as an assisted cognitive userOAnd executing the second method.
S6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data. In S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bandsAnd sA(t), wherein alpha is the power distribution factor of the cognitive transmitter, and is more than or equal to 0 and less than or equal to 1, sn(t) is an AT per authorized user transmitter and a CT per cognitive user transmitteriThe cognitive user receiver CR and the authorized user receiver AR can effectively use s according to the original rulen(t) is eliminated from the received signal, which is unknown to the eavesdropping user E, so that snAnd (t) interference is caused to the eavesdropping user E, and the safety of the communication process is improved.
The invention is theoretically verified by a connection interruption probability analysis and a safety interruption probability analysis.
The first stage, in the cognitive radio network, is the cognitive user transmitter CTiThe licensed band can only be accessed if the interference limitation condition is satisfied. Device setCognitive user transmitter CT indicating satisfaction of interference constraintsiA set of M, whereinl={CTi|CA≥RAI ∈ {1, K, M } }, cognitive user transmitter CT on the licensed bandiThere are two access situations, one is that all cognitive users transmit CTiDo not satisfy the interference limitation condition, i.e.This indicates that there is no cognitive user transmitter CTiThe authorized frequency band can be accessed; secondly, a certain cognitive user transmitter CTiCapable of meeting interference limiting conditions so as to have access to a licensed frequency band, i.e.Setting all Rayleigh fading channel random variables | hA|2、|hAE|2,Respectively obey parameters ofThe occurrence probabilities of the two cases can be respectively calculated as follows
Second phase, cognitive user transmitter CT considering two cases of access to licensed bands in first phaseiIn different situations, the corresponding cognitive communication link CTiThe connection interruption probability on → CR, the connection interruption probability on the authorized communication link AT → AR and its security interruption probability will all be different, so two interruption probabilities of the case-by-case solution system are needed. Setting cognitive communication link CTiConnection interruption event on → CR, authorized communication link aT → connection interruption event on AR and its safe interruption event respectively represent ΨC、ΨAAnd Ψint. In case one, namelyDue to no cognitive user transmitter CTiAccess to licensed bands, cognitive connection outage probabilityThe reception of the signals by the authorized user receiver AR and the eavesdropping user E and the instantaneous capacities corresponding thereto can be expressed respectively as
Setting random variable U1=|hA|2,U4=|hAE|2Then, the connection interruption probability and the security interruption probability of the authorized communication link AT → AR AT this time are
At the third stage whenOne cognitive user transmitter CTiIs selected as the auxiliary cognitive user to access the authorized frequency band and meets the interference limitation condition CA≥RAThen the probability of a connection interruption on the authorized communication link AT → AR in this case is easily derivedThe second stage provides the received signals and the instantaneous channel capacity of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E under the second condition, and sets R according to two cooperative cognitive user selection modelsCRepresents the minimum transmission rate required for the cognitive receiver to decode the recovered signal,random variableSet MlThe number of the elements in the formula is L. Then, when the OCJS and the OSTS models are respectively adopted, the connection interruption probability of the cognitive user and the security interruption probability of the authorized user can be respectively solved as follows
In the formulaEi (t) is an exponential integration function with an argument t, i.e.,where a is the euler constant.
In the fourth stage, the first step is carried out,cognitive user transmitter CT as described in the first stageiThere are two different possible cases of access to the licensed band, and in each case a cognitive communication link CTiThe connection interruption probability on the → CR, the connection interruption probability on the authorized communication link AT → AR and the safety interruption probability thereof are obtained in the second stage and the third stage, then according to the Bayesian total probability formula, the probabilities obtained in the first stage, the second stage and the third stage are substituted into the total probability formula, the complete connection interruption probability on the authorized communication link AT → AR and the cognitive communication link CT in the transmission mode of the inventioniThe connection interruption probability on the → CR and the security interruption probability on the authorized communication link AT → AR can be solved
When the two collaborative user selection models of OCJS and OSTS are respectively adopted, the model is expressed in the above formulaAre respectively substituted intoOr
The invention is verified by simulation experiments below.
As can be seen from FIG. 2, when the system is a cognitive user transmitter CTiWhen the number L of the network nodes is the same, the authorized communication link AT → in the OCJS model, the OSTS model and the traditional network methodThe connection interruption probabilities on the AR are equal, and the connection interruption probability on the authorized communication link AT → AR is obviously reduced along with the increase of the value of L under the same scheme; when L takes the same value, the cognitive communication link CT in the OCJS model and the traditional network methodiThe probability of connection interruption on → CR is equal and at the cognitive user transmitter CTiThe average emission signal-to-noise ratio is less than 10dB, and the cognitive communication link CT is under the OSTS model methodiThe connection interruption probability on the → CR is obviously reduced compared with the former two, and the cognitive communication link CT is recognized along with the increase of the value of L in the same methodiThe probability of a connection interruption on → CR also decreases significantly. In conclusion, the cognitive communication link CT in the inventioni→ CR and authorized communication link AT → connection interruption performance on AR is no worse than that of traditional network, especially cognitive communication link CT in OSTS modeliThe connection interruption performance on the → CR is significantly better than that of the conventional network.
As can be seen from fig. 3, 4 and 5, the probability of security interruption on the authorized communication link AT → AR in the conventional network is the greatest, the next time under the OSTS model in the present invention, and the smallest under the OCJS model in the present invention; when the same method is adopted, the larger the value of L is, or the smaller the value of the power distribution factor alpha is, or the channel parameterThe smaller the value, the smaller the probability of security interruption on the authorized communication link AT → AR. In short, the security interruption performance of the authorized communication link AT → AR under the two models of OSTS and OCJS is superior to that of the traditional network, namely the invention improves the transmission security performance of the authorized user.
The above examples are to be construed as merely illustrative and not limitative of the remainder of the disclosure. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (5)
1. An authorization system physical layer security communication method based on assisting cognitive user selection comprises an authorized user transmitter AT, an authorized user receiver AR and a plurality of cognitive user transmitters CTiA cognitive user receiver CR and an eavesdropping user E, characterized in that: the method comprises the following steps:
s1, authorized user transmitter AT transmits information to authorized user receiver AR and cognitive user transmitter CTiSending notification information;
s2, broadcasting a pilot signal after the receiver AR of the authorized user receives the notification information;
s3 cognitive user transmitter CTiBased on authorized user receiver AR and authorized user transmitter AT and cognitive user transmitter CTiSelects whether to join the alternative set Ml;
S4 cognitive user transmitter computer CTiReceiver AR, cognitive user transmitter CT according to authorized useriAnd eavesdropping communication condition parameters between the users E and sending to an authorized user transmitter AT;
the specific method of S4 is as follows:
s4.1, cognitive user transmitter CTiAnd (3) calculating the received signals and the instantaneous capacity of the authorized user receiver AR, the cognitive user receiver CR and the eavesdropping user E when the receiver is used as an assisted cognitive user in a theoretical state:
wherein r isA(t) andrespectively the received signal and the instantaneous capacity, r, of the authorized subscriber receiver ARC(t) and CCRespectively the received signal and the instantaneous capacity, r, of the cognitive user receiver CRE(t) and CERespectively of the received signal and of the instantaneous capacity, n, of the eavesdropping user EC(t) and nE(t) reception noise, E [ | s, at the cognitive user receiver CR and at the eavesdropping user E, respectivelyn(t)|2]=1,Transmitter CT for cognitive usersiTransmit power, h, as an aid to cognitive usersAETo authorize the channel coefficients between the user transmitter AT and the eavesdropping user E,transmitter CT for cognitive usersiAnd cognizing the userThe channel coefficients between the receivers CR are,transmitter CT for cognitive usersiChannel coefficients between the eavesdropping user E and the eavesdropping user E; h isA,hAE, Representing channels AT → AR, AT → CT, respectivelyi,AT→E,CTi→AR,CTi→CR,CTiChannel coefficients on → E; alpha is the power distribution factor of the cognitive transmitter, and alpha is more than or equal to 0 and less than or equal to 1, sn(t) assisting artifacts;
s4.2, cognitive user transmitter CTiWill r isA(t)、rC(t)、CC、rE(t) and CESending to an authorized user transmitter AT; s5, authorizing the user transmitter AT to select from the alternative set MlSelecting a cognitive user transmitter CTiAs an assisting cognitive user;
s6, the authorized user transmitter AT shares the authorized frequency band with the assisting cognitive user, and the assisting cognitive user transmits assisting artificial noise while transmitting cognitive data.
2. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 1, wherein: the specific method of S3 is as follows:
s3.1, cognitive user transmitter CTiCognitive user transmitter CT calculation based on pilot signalsiChannel gain with authorized subscriber receiver AR
S3.2, the receiver AR of the authorized user calculates the received signal rA(t) and corresponding instantaneous Capacity CA:
Wherein, PAAnd PCRespectively representing authorized user transmitters AT and cognitive user transmitters CTiTransmit power of hAFor the channel condition between the authorized subscriber transmitter AT and the authorized subscriber receiver AR, sA(t) and sC(t) respectively representing authorized user transmitter AT machine and cognitive user transmitter CTiTransmitted information, nA(t) is the reception noise at the receiver AR of the authorized user and has E [ | sA(t)|2]=E[|sC(t)|2]=1,N0Is additive white gaussian noise power;
s3.3, with RARepresents the minimum transmission rate required by the authorized system to decode the recovered signal, when CA≥RATime, corresponding cognitive user transmitter CTiSelecting to join candidate set Ml。
3. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 2, wherein: in S5, the method for authorizing the user transmitter AT to select the assisted cognitive user includes:
5. An authorization system physical layer secure communication method based on assisting cognitive user selection according to claim 3 or 4, characterized in that: in S6, the authorized user transmitter AT and the assisted cognitive user CTOTransmitting signals separately over authorized frequency bandsAnd sA(t)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910555647.3A CN110266704B (en) | 2019-06-25 | 2019-06-25 | Authorization system physical layer secure communication method based on assisted cognitive user selection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910555647.3A CN110266704B (en) | 2019-06-25 | 2019-06-25 | Authorization system physical layer secure communication method based on assisted cognitive user selection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110266704A CN110266704A (en) | 2019-09-20 |
CN110266704B true CN110266704B (en) | 2021-05-28 |
Family
ID=67921389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910555647.3A Active CN110266704B (en) | 2019-06-25 | 2019-06-25 | Authorization system physical layer secure communication method based on assisted cognitive user selection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266704B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104507091A (en) * | 2014-12-16 | 2015-04-08 | 西安交通大学 | Energy cooperation method based on mutual benefit in cognitive radio network |
CN105392143A (en) * | 2015-11-17 | 2016-03-09 | 浙江工业大学 | Authorized user and cognitive user QoS guaranteed frequency spectrum access method based on power allocation |
CN105516997A (en) * | 2015-12-06 | 2016-04-20 | 桂林电子科技大学 | Physical layer safe cognition relay communication method |
CN107171775A (en) * | 2017-05-09 | 2017-09-15 | 桂林电子科技大学 | The mixing duplex transmission method of safety of physical layer is lifted in a kind of cognitive junction network |
CN107404475A (en) * | 2017-06-13 | 2017-11-28 | 西安电子科技大学 | A kind of safe transmission method of physical layer encouraged based on frequency spectrum and energy resource |
CN108901028A (en) * | 2018-06-25 | 2018-11-27 | 广东工业大学 | The combined optimization method of cooperative cognitive radio net safe capacity and energy efficiency |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8514790B2 (en) * | 2009-01-22 | 2013-08-20 | Intel Mobile Communications GmbH | System and method for optimizing network wireless communication resources |
-
2019
- 2019-06-25 CN CN201910555647.3A patent/CN110266704B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104507091A (en) * | 2014-12-16 | 2015-04-08 | 西安交通大学 | Energy cooperation method based on mutual benefit in cognitive radio network |
CN105392143A (en) * | 2015-11-17 | 2016-03-09 | 浙江工业大学 | Authorized user and cognitive user QoS guaranteed frequency spectrum access method based on power allocation |
CN105516997A (en) * | 2015-12-06 | 2016-04-20 | 桂林电子科技大学 | Physical layer safe cognition relay communication method |
CN107171775A (en) * | 2017-05-09 | 2017-09-15 | 桂林电子科技大学 | The mixing duplex transmission method of safety of physical layer is lifted in a kind of cognitive junction network |
CN107404475A (en) * | 2017-06-13 | 2017-11-28 | 西安电子科技大学 | A kind of safe transmission method of physical layer encouraged based on frequency spectrum and energy resource |
CN108901028A (en) * | 2018-06-25 | 2018-11-27 | 广东工业大学 | The combined optimization method of cooperative cognitive radio net safe capacity and energy efficiency |
Non-Patent Citations (3)
Title |
---|
Statistical analysis of a class of secure relay assisted cognitive radio networks;Mona Shokair;Waleed Saad;Shady M.Ibraheem;《China Communications》;20181230;全文 * |
协作与认知无线通信网络中若干关键技术研究;陈丹;《中国博士学位论文全文数据库 信息科技辑》;20130115;全文 * |
基于解码转发协议的认知中继网络物理层安全研究与应用;杨启青;《中国优秀硕士学位论文全文数据库 信息科技辑》;20171115;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110266704A (en) | 2019-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | Cooperative OFDM relaying for opportunistic spectrum sharing: Protocol design and resource allocation | |
Maham et al. | Cognitive multiple access network with outage margin in the primary system | |
CN105491563B (en) | Method and system for improving security rate of MISO security communication system by utilizing artificial noise | |
CN111510987B (en) | Relay selection method based on safety cooperation NOMA network | |
CN107248908B (en) | Hybrid duplex transmission method in cognitive relay network based on relay selection | |
Kalantari et al. | Joint power control in wiretap interference channels | |
Wu et al. | Joint resource allocation and power control for cellular and device‐to‐device multicast based on cognitive radio | |
Bouida et al. | Adaptive spatial modulation for spectrum sharing systems with limited feedback | |
CN110149127A (en) | A kind of D2D communication system precoding vector optimization method based on NOMA technology | |
Fazel et al. | Secure throughput optimization for cache-enabled multi-UAVs networks | |
Shang et al. | Secure transmission for NOMA-based cognitive radio networks with imperfect CSI | |
Sun et al. | Transmit power control for cognitive radio over a Rayleigh fading channel | |
Peng et al. | Covert non-orthogonal multiple access communication assisted by multi-antenna jamming | |
CN107171775B (en) | Hybrid duplex transmission method for improving physical layer security in cognitive relay network | |
CN105376847B (en) | A kind of vehicle-mounted relaying cluster power distribution method towards 5G car networking safety of physical layer | |
CN110266704B (en) | Authorization system physical layer secure communication method based on assisted cognitive user selection | |
CN107404475B (en) | Physical layer secure transmission method based on frequency spectrum and energy resource excitation | |
Zhang et al. | Performance analysis of relay based NOMA cooperative transmission under cognitive radio network | |
Pham et al. | Spectrum sharing with secure transmission | |
CN111263363A (en) | High-strength safe transmission method | |
Ali | Modeling, analysis, and design of 5G networks using stochastic geometry | |
CN111885718A (en) | Robust cognitive communication system power distribution method based on cooperative relay | |
Yang et al. | Power Control for Full-Duplex Device-to-Device Underlaid Cellular Networks: A Stackelberg Game Approach | |
Sezer et al. | Optimal channel switching in multiuser systems under average capacity constraints | |
Zou et al. | Dynamic spectrum access‐based cryptosystem for cognitive radio networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |