CN110430566A - A kind of more junction network safe transmission methods of double bounce based on collection of energy - Google Patents

A kind of more junction network safe transmission methods of double bounce based on collection of energy Download PDF

Info

Publication number
CN110430566A
CN110430566A CN201910683555.3A CN201910683555A CN110430566A CN 110430566 A CN110430566 A CN 110430566A CN 201910683555 A CN201910683555 A CN 201910683555A CN 110430566 A CN110430566 A CN 110430566A
Authority
CN
China
Prior art keywords
information
transmission
energy
relaying
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910683555.3A
Other languages
Chinese (zh)
Other versions
CN110430566B (en
Inventor
王大伟
吴珂婷
王佳欣
张若南
胡晓宇
翟道森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xunshi Youdao Information Technology Co ltd
Original Assignee
Northwest University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwest University of Technology filed Critical Northwest University of Technology
Priority to CN201910683555.3A priority Critical patent/CN110430566B/en
Publication of CN110430566A publication Critical patent/CN110430566A/en
Application granted granted Critical
Publication of CN110430566B publication Critical patent/CN110430566B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

The invention discloses a kind of more junction network safe transmission methods of double bounce based on collection of energy, transmit private information and interference information;Relay RiAnd RjThe interference information energy that transmission is received using energy harvesting mechanism harvesting part, relays RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjNew interference information is sent using decoding forwarding scheme, receiving end and eavesdropping end receive relay transmission information, by designing interference information, eliminate interference to legal customer impact, complete the safe transmission of source node private information.The energy efficiency of network is improved using the method for the present invention, extends the relaying working time.

Description

A kind of more junction network safe transmission methods of double bounce based on collection of energy
Technical field
The invention belongs to wireless communication technology fields, are related to the conceptual design of wireless communication network security transmission, specifically relate to And a kind of more junction network safe transmission methods of double bounce based on collection of energy.
Background technique
Due to the broadcast characteristic of cordless communication network, any user within the scope of communication network transmission can receive letter Breath, therefore cordless communication network is faced with the threat of eavesdropping.However traditional upper layer Key Encryption Technology assumes eavesdropping node Computing capability is limited, cannot cope with the threat of the following eavesdropping node hardware development.Safety of physical layer technology utilizes wireless channel Physical features protect information, can be very good to meet future communications network security transmission demand.
Cooperating relay and cooperation interference are two kinds of common safety of physical layer schemes.In cooperating relay scheme, relaying section Point assists the legal transmission rate of legitimate user's promotion network;In cooperation jamming program, cooperative node is dry using interference mechanism It disturbs eavesdropping node and receives legal information.In addition, also thering is scheme integration and cooperation to relay at present and cooperation interfering to promote the peace of network Quan Xing.However, interference information meeting interfering legality user receives information at present in existing cooperation safe transmission scheme, reduce The transmission rate of legitimate user, to also reduce the safety of network.Therefore, it is adversely affected for interference information bring, This patent proposes a kind of more junction network safe transmission schemes of the double bounce based on collection of energy, eliminates interference in the shadow of legitimate node It rings, to adapt to the demand of next generation network safe transmission.
Summary of the invention
In view of the above-mentioned deficiencies in the prior art, the technical problem to be solved by the present invention is that providing a kind of based on energy The more junction network safe transmission methods of the double bounce of collection eliminate interference in the influence of legitimate node, interference effect are eliminated, to mention Rise the safety of user;Meanwhile using the energy being collected into as transmission power, private information is protected, improves double bounce The secret performance and energy efficiency of more junction networks, to adapt to the demand of next generation network safe transmission.
The invention adopts the following technical scheme:
A kind of more junction network safe transmission methods of double bounce based on collection of energy, comprising the following steps:
S1, transmission private information and interference information;
S2, relaying RiAnd RjUsing the interference information energy of energy harvesting mechanism harvesting part receiving step S1 transmission, relaying RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjNew do is sent using decoding forwarding scheme Information is disturbed, receiving end and eavesdropping end receive relay transmission information, by designing interference information, eliminate interference to legitimate user's shadow It rings, completes the safe transmission of source node private information.
Specifically, in step S1, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a), CabFor the cognition transmission rate of receiving end, CaeFor the cognitive information decoding for eavesdropping end Rate.
Specifically, relaying RiPlace receives the information of step S1 are as follows:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power distribution system of transmitting terminal Number, haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor normalized interference information, niFor RiThe reception noise at place;
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient;gaiFor transmitting terminal to relaying RiChannel power gain.
Specifically, relaying RjPlace receives the information of step S1 are as follows:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjPlace connects Receive noise
Principle is cut according to energy, relays RjLocate the energy collected are as follows:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
Further, R is relayedjThe interference signal x at placerjMeet following formula:
Specifically, in step S2, information that receiving end receives are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power h of transmissionibAnd hjbRespectively RiAnd RjIt arrives The path gain of receiving end, xrjFor RjThe interference signal of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo connect Receive the noise variance of node;
Receive client information transmission rate be
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end;
Specifically, eavesdropping terminates the information received in step S2 are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neFor making an uproar for eavesdropping end Sound variable;
Eavesdrop the eavesdropping rate at end are as follows:
Wherein, gieAnd gjeRespectively RiAnd RjTo the channel power gain at eavesdropping end.
Specifically, in step S2 transmission method Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the target of network Transmission rate, K1() is the second class of single order modified Bessel function.
Specifically, in step S2 transmission method security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReFor the target of network Rate is eavesdropped,2F1() is hypergeometric progression.
Further, in step S2 transmission method safe transmission probability are as follows:
Compared with prior art, the present invention at least has the advantages that
The more junction network safe transmission schemes of a kind of double bounce based on collection of energy disclosed by the invention, two E-mail relay utilizations The radio frequency spectrum information of sending node collects energy, to assist legitimate user's safe information transmission.Specifically, the present invention is mentioned Safe transmission strategy be divided into two stages and implement.In the first stage, transmitting terminal transmits secret by power distribution method respectively Information and interference information.For relaying after obtaining energy in a part of radiofrequency signal received, a relaying uses amplification forwarding Trunk protocol auxiliary information safe transmission, another relaying will send newly-designed interference information, to eliminate interference information pairing The influence of method receiving end.For the program, we devise the interference information that relaying is sent and analyze network transmission and interrupt generally Rate, security interrupt probability and safe transmission probability, and derived their closed expression.Simulation results show the program Results of performance analysis shows performance advantage of the program in terms of traversing safe transmission rate.
Further, R is relayediThe energy efficiency of network can be promoted by carrying out energy harvesting using portion radio frequency information, be prolonged The long relaying working time, while relaying RiAlso information security relay services can be provided for transmitting terminal using remaining information.
Further, R is relayedjThe energy efficiency of network can be promoted by carrying out energy harvesting using portion radio frequency information, be prolonged The long relaying working time, while relaying RjAlso information security relay services can be provided for transmitting terminal using remaining information.
Further, receiving end receives RiThe information and R of amplification forwardingjThe interference information of transmission, by interference information It is analyzed, R can be designedjThe interference information of transmission.
Further, eavesdropping termination receives RiThe information and R of amplification forwardingjThe interference information of transmission, RiAnd RjWhat is sent is dry Eavesdropping end can be interfered by disturbing information, to promote the safety of network.
Further, receiving end receives RiThe interference information and R of forwardingjThe interference information of transmission, in order to eliminate interference letter Cease the influence to legitimate user, RjThe interference information and R of transmissioniThe interference information of amplification forwarding should cancel out each other, so as to mention Rise the transmission rate and safety of legitimate user.
Further, private information is received according to receiving end and eavesdropping end, recommendation obtains corresponding legal rate and eavesdropping Rate.In the case of considering high s/n ratio, obtains legal rate and eavesdrop the approximation of rate.
Further, legal rate and eavesdropping rate are obtained according to analysis, the safe rate of available network, this is net The design and analysis of network provide foundation.
Further, by analyzing and deriving the closed solutions of available conduction transmission outage probability, this can be intuitive Reflect that network transmitting terminal to the transmission performance for receiving client information, provides foundation for network design.
Further, by analyzing and deriving the closed solutions of available conduction security interrupt probability, this can be intuitive Reflect that network transmitting terminal to the security performance of eavesdropping client information, provides foundation for network security transmission design.
Further, by analyzing and deriving the closed solutions of available safe transmission probability, this can intuitively reflect The performance of network security transmission rationally provides foundation using resource for network.
In conclusion the more junction network safe transmission schemes of a kind of double bounce based on collection of energy disclosed by the invention.In In this scheme, the radio frequency spectrum information of two E-mail relay utilization sending nodes collects energy, so that legitimate user's information security be assisted to pass It is defeated, the energy efficiency of network is improved, the relaying working time is extended.It, can by rationally designing transmission plan and interference information To eliminate influence of the interference information to legitimate user, the security performance of network is promoted.It is suggested plans by analyzing and being derived by Transmission probability, security interrupt probability and safe transmission probability, provide intuitive foundation for the implementation of this programme.Emulation knot Fruit demonstrates the results of performance analysis of the program, shows performance advantage of the program in terms of traversing safe transmission rate.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Fig. 1 is that the present invention is based on the system model figures of the double jump junction network of collection of energy;
Fig. 2 is the traversal secret Capacity Plan of system, wherein (a) is traversal safe rate and security interrupt probabilistic relation Analogous diagram is (b) analogous diagram of traversal safe rate and transmitting terminal transmission power relationship, (c) traverses safe rate and target passes The analogous diagram of defeated Rate Relationship.
Specific embodiment
Referring to Fig. 1, being examined the present invention provides a kind of more junction network safe transmission methods of double bounce based on collection of energy Consider the transmission network of five nodes, legitimate user Alice wants safely and reliably to convey information to Bob, and Eve can be to Alice Transmission data eavesdropped.Two relayings collect energy from the portion radio frequency information that sending node is sent, to assist safety Transmission.Assuming that network experienced independent stable Rayleigh fading, it may be assumed that in each frame, channel status is remained unchanged, and in difference Interframe, channel status independently changes.In addition, each data frame is divided into two time slots, private information and interference are corresponded respectively to The transmission and collection of energy of information.Amplification forwarding and decoding forwarding scheme is respectively adopted in two relayings, assists legal information safety Transmission, and eliminate influence of the interference information to legitimate user.Finally, general by first analyzing Transmission probability, security interrupt Rate and safe transmission probability, and derived their closure expression formula.Numerical result demonstrates the results of performance analysis of the program, Show performance advantage of the program in terms of traversing safe transmission rate.
A kind of more junction network safe transmission methods of double bounce based on collection of energy of the invention, comprising the following steps:
S1, sending node transmission private information and interference information;
S2, after the signal for receiving step S1, relay RiAnd RjSignal is received using energy harvesting mechanism harvesting part Energy then relays RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjIt is forwarded using decoding Scheme sends new interference signal, and receiving end and eavesdropping end can all receive relay transmission information.By designing interference information, eliminate Interference is to legal customer impact, to complete the safe transmission of source node private information.
Source node sends private information and interference information using power distribution method, relays RiPlace receives signal:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power distribution system of transmitting terminal Number, haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor interference information, niFor RiPlace Reception noise.
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient, the value on [0,1];gaiFor transmitting terminal to relaying RiChannel power increase Benefit.
Relay RjPlace receives signal:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjPlace connects Receive noise.
Principle is cut according to energy, relays RjLocate the energy collected:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
The signal of receiving node are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power of transmission, hibAnd hjbRespectively RiAnd RjIt arrives The path gain of receiving end, xrjFor RjThe interference information of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo connect Receive the noise variance of node.
In conjunction with relaying RiAnd RjThe signal at place, eavesdropping end receive private information are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neFor making an uproar for eavesdropping end Sound variable.
In order to reduce the interference of receiving end, RjThe interference signal x at placerjFollowing formula should be met:
However, due to
Wherein, hjeFor RjTo the path gain at eavesdropping end, therefore, R is relayedjThe interference signal at place can eliminate interference information Influence to transmitting terminal promotes the safety of network.
When transmitting terminal sends data, the rate of information throughput of receiving end are as follows:
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end.
Eavesdropping end will also receive and recognize private information at this time, to the solution bit rate of cognitive information are as follows:
Wherein, gieAnd gjeRespectively relay RiAnd RjTo the channel power gain at eavesdropping end.
At this point, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a).
Due to CabAnd CaeExpression formula too complex, it is contemplated that high s/n ratio region is in order to analyze, then CabAnd CaeIt can It is written as respectively:
The present invention usesWithC is replaced respectivelyabAnd Cae
When solution bit rate is lower than scheduled target transmission speed RbWhen, Transmission can occur for network;When stealing for eavesdropping end It listens rate to be higher than target and eavesdrops rate Re=Rb-Rs(wherein RsFor secret rate) when, security interrupt can occur for network.
For the scheme of proposition
1) Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the target of network Transmission rate, K1() is the second class of single order modified Bessel function.
2) security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReFor the target of network Rate is eavesdropped,2F1() is hypergeometric progression.
3) safe transmission probability are as follows:
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being described and shown in usually here in attached drawing is real The component for applying example can be arranged and be designed by a variety of different configurations.Therefore, below to the present invention provided in the accompanying drawings The detailed description of embodiment be not intended to limit the range of claimed invention, but be merely representative of of the invention selected Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are obtained without creative efforts The every other embodiment obtained, shall fall within the protection scope of the present invention.
Simulating, verifying
1) as can be seen that the increase limited with secret outage probability, the traversal safe transmission speed of system from Fig. 2 (a) Rate will also become larger.This is because the limitation of security interrupt probability is bigger, the safe transmission for more readily satisfying network is required, therefore time Going through safe transmission rate can increase with it.Further, it can be seen that include two classical joint cooperating relays and cooperation relayed Jamming program, since the noise that interference signal generates at receiver can not be offset, so safety is than proposing the low of scheme.By It is interfered in no cooperation, traditional cooperating relay scheme performance is also below being suggested plans.
2) as can be seen that with transimission power P from Fig. 2 (b)sIncrease, the traversal safe rate of system will also become larger. This is because with PsIncrease, transmitting terminal can provide more energy for relay using progress safe transmission, therefore net The traversal secret safe rate of network can increase therewith.Further, it can be seen that include two classical joint cooperating relays relayed And cooperation jamming program, since the noise that interference signal generates at receiver can not be offset, so safety is than proposal scheme It is low.Due to not having cooperation to interfere, traditional cooperating relay scheme performance is also below being suggested plans.
3) as can be seen that with target transmission speed R from Fig. 2 (c)bIncrease, the traversal safe rate of system will subtract It is small.This is because with RbIncrease, network, which is difficult to meet, can lean on the requirement of transmission, therefore, utilizable peace in network Full transmission opportunity is reduced, and the traversal secret safe rate of network can reduce therewith.Further, it can be seen that include two relayings Classical joint cooperating relay and cooperation jamming program, since the noise that interference signal generates at receiver can not be offset, so Safety is than proposing the low of scheme.Due to not having cooperation to interfere, traditional cooperating relay scheme performance is also below being suggested plans.
The above content is merely illustrative of the invention's technical idea, and this does not limit the scope of protection of the present invention, all to press According to technical idea proposed by the present invention, any changes made on the basis of the technical scheme each falls within claims of the present invention Protection scope within.

Claims (10)

1. a kind of more junction network safe transmission methods of double bounce based on collection of energy, which comprises the following steps:
S1, transmission private information and interference information;
S2, relaying RiAnd RjUsing the interference information energy of energy harvesting mechanism harvesting part receiving step S1 transmission, R is relayediIt adopts Private information and interference information are forwarded with amplification forwarding trunk protocol, relays RjNew interference letter is sent using decoding forwarding scheme It ceasing, receiving end and eavesdropping end receive relay transmission information, and by designing interference information, eliminates and interfere to legal customer impact, Complete the safe transmission of source node private information.
2. the method according to claim 1, wherein in step S1, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a), CabFor the cognition transmission rate of receiving end, CaeSpeed is decoded to eavesdrop the cognitive information at end Rate.
3. the method according to claim 1, wherein relaying RiPlace receives the information of step S1 are as follows:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power partition coefficient of transmitting terminal, haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor normalized interference information, ni For RiThe reception noise at place;
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient;gaiFor transmitting terminal to relaying RiChannel power gain.
4. the method according to claim 1, wherein relaying RjPlace receives the information of step S1 are as follows:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjThe reception noise at place
Principle is cut according to energy, relays RjLocate the energy collected are as follows:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
5. according to the method described in claim 4, it is characterized in that, relaying RjThe interference signal x at placerjMeet following formula:
6. the method according to claim 1, wherein in step S2, information that receiving end receives are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power h of transmissionibAnd hjbRespectively RiAnd RjTo reception The path gain at end, xrjFor RjThe interference signal of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo receive section The noise variance of point;
Receive client information transmission rate be
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end.
7. the method according to claim 1, wherein eavesdropping terminates the information received in step S2 are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neBecome to eavesdrop the noise at end Amount;
Eavesdrop the eavesdropping rate at end are as follows:
Wherein, gieAnd gjeRespectively RiAnd RjTo the channel power gain at eavesdropping end.
8. the method according to claim 1, wherein in step S2 transmission method Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the object transmission of network Rate, K1() is the second class of single order modified Bessel function.
9. the method according to claim 1, wherein in step S2 transmission method security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReIt is eavesdropped for the target of network Rate,2F1() is hypergeometric progression.
10. method according to claim 8 or claim 9, which is characterized in that the safe transmission probability of transmission method in step S2 Are as follows:
CN201910683555.3A 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection Active CN110430566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910683555.3A CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910683555.3A CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Publications (2)

Publication Number Publication Date
CN110430566A true CN110430566A (en) 2019-11-08
CN110430566B CN110430566B (en) 2020-12-25

Family

ID=68412772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910683555.3A Active CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Country Status (1)

Country Link
CN (1) CN110430566B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272183A (en) * 2020-10-29 2021-01-26 桂林电子科技大学 RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248414A (en) * 2013-04-17 2013-08-14 重庆邮电大学 Method for multi-relay two-hop transmission based on interference alignment and beamforming
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106413074A (en) * 2016-10-11 2017-02-15 西北工业大学 Optimal power allocation method of untrusted relay network under perfect CSI
CN106533606A (en) * 2016-10-28 2017-03-22 国网山东省电力公司莱芜供电公司 Physical layer secure transmission method for single-antenna amplification forwarding relay network
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN108601019A (en) * 2018-03-27 2018-09-28 西北工业大学 Insincere relaying transmitted in both directions network security transmission method based on relay selection
CN109861728A (en) * 2019-02-21 2019-06-07 哈尔滨工程大学 The more relay selections of joint and time slot resource configuration method of extensive mimo system
CN109995413A (en) * 2019-05-06 2019-07-09 西安交通大学 A kind of environment backscatter communication method of relaying auxiliary

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248414A (en) * 2013-04-17 2013-08-14 重庆邮电大学 Method for multi-relay two-hop transmission based on interference alignment and beamforming
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106413074A (en) * 2016-10-11 2017-02-15 西北工业大学 Optimal power allocation method of untrusted relay network under perfect CSI
CN106533606A (en) * 2016-10-28 2017-03-22 国网山东省电力公司莱芜供电公司 Physical layer secure transmission method for single-antenna amplification forwarding relay network
CN108601019A (en) * 2018-03-27 2018-09-28 西北工业大学 Insincere relaying transmitted in both directions network security transmission method based on relay selection
CN109861728A (en) * 2019-02-21 2019-06-07 哈尔滨工程大学 The more relay selections of joint and time slot resource configuration method of extensive mimo system
CN109995413A (en) * 2019-05-06 2019-07-09 西安交通大学 A kind of environment backscatter communication method of relaying auxiliary

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HONGJIANG LEI 等: "On Secure Underlay MIMO Cognitive Radio", 《IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING》 *
LEE K 等: "Adaptive Wireless-powered Relaying schemes with Cooperative Jamming for Two-hop Secure Communication", 《IEEE INTERNET OF THINGS JOURNAL》 *
雷维嘉: "基于干扰对齐的中继MIMO窃听信道安全传输机制", 《吉林大学学报(工学版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272183A (en) * 2020-10-29 2021-01-26 桂林电子科技大学 RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission
CN112272183B (en) * 2020-10-29 2022-04-01 桂林电子科技大学 RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission

Also Published As

Publication number Publication date
CN110430566B (en) 2020-12-25

Similar Documents

Publication Publication Date Title
Parvin et al. Cognitive radio network security: A survey
Meng et al. Smart grid neighborhood area networks: a survey
Zou et al. Optimal relay selection for physical-layer security in cooperative wireless networks
Guo et al. Outage performance of relay-assisted cognitive-radio system under spectrum-sharing constraints
CN105515717B (en) One kind being based on the scrambled cooperative relaying safe transmission method of man made noise
Fu et al. On flow marking attacks in wireless anonymous communication networks
CN106452655A (en) System security transmission method in combination with collaborative interference and time division energy collection technology
CN108834113A (en) A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer
Raveendran et al. VLC and D2D heterogeneous network optimization: A reinforcement learning approach based on equilibrium problems with equilibrium constraints
Bhowmick et al. Sensing throughput trade‐off for an energy efficient cognitive radio network under faded sensing and reporting channel
CN110430566A (en) A kind of more junction network safe transmission methods of double bounce based on collection of energy
Wan et al. Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
Zhang et al. Optimization of relay-based cooperative spectrum sensing in cognitive radio networks
CN109600746A (en) Cooperate with the method for analyzing performance of opportunistic relay selection scheme in wireless communication system
Shokair et al. Statistical analysis of a class of secure relay assisted cognitive radio networks
Morais et al. A distributed intrusion detection scheme for wireless ad hoc networks
Benedict et al. Secrecy analysis of a cognitive radio network with an energy harvesting AF relay
Peng et al. Security performance analysis for cooperative communication system under Nakagami-m fading channel
CN110324827B (en) Cognitive safety transmission method based on wireless information and power joint transmission
CN114567352A (en) Wireless energy-carrying communication method based on multi-antenna relay system
Chen et al. Resource allocation algorithm for IoT communication based on ambient backscatter
Ji et al. Opportunistic relay selection for joint decode-and-forward based two-way relaying with network coding
Andrawes et al. Survey on performance of adaptive modulation scheme with cooperative diversity in wireless systems
Chen et al. QoE-driven resource allocation for D2D underlaying NOMA cellular networks
Yang et al. Performance Analysis in Multi-Relay DF Cognitive Relay Networks under Nakagami–m fading channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240126

Address after: 710072 Qing'an Park 2-310-21, No. 9 Gaoxin Second Road, High tech Zone, Xi'an City, Shaanxi Province

Patentee after: Xi'an Xunshi Youdao Information Technology Co.,Ltd.

Country or region after: China

Address before: Beilin District Shaanxi province Xi'an City friendship road 710072 No. 127

Patentee before: Northwestern Polytechnical University

Country or region before: China