CN110430566A - A kind of more junction network safe transmission methods of double bounce based on collection of energy - Google Patents
A kind of more junction network safe transmission methods of double bounce based on collection of energy Download PDFInfo
- Publication number
- CN110430566A CN110430566A CN201910683555.3A CN201910683555A CN110430566A CN 110430566 A CN110430566 A CN 110430566A CN 201910683555 A CN201910683555 A CN 201910683555A CN 110430566 A CN110430566 A CN 110430566A
- Authority
- CN
- China
- Prior art keywords
- information
- transmission
- energy
- relaying
- interference
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 93
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000003306 harvesting Methods 0.000 claims abstract description 10
- 230000003321 amplification Effects 0.000 claims abstract description 9
- 238000003199 nucleic acid amplification method Methods 0.000 claims abstract description 9
- 230000019771 cognition Effects 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 230000001149 cognitive effect Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 claims description 3
- KCXVZYZYPLLWCC-UHFFFAOYSA-N EDTA Chemical compound OC(=O)CN(CC(O)=O)CCN(CC(O)=O)CC(O)=O KCXVZYZYPLLWCC-UHFFFAOYSA-N 0.000 claims description 2
- 229960001484 edetic acid Drugs 0.000 claims description 2
- 238000005192 partition Methods 0.000 claims 1
- 230000008901 benefit Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000002035 prolonged effect Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
The invention discloses a kind of more junction network safe transmission methods of double bounce based on collection of energy, transmit private information and interference information;Relay RiAnd RjThe interference information energy that transmission is received using energy harvesting mechanism harvesting part, relays RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjNew interference information is sent using decoding forwarding scheme, receiving end and eavesdropping end receive relay transmission information, by designing interference information, eliminate interference to legal customer impact, complete the safe transmission of source node private information.The energy efficiency of network is improved using the method for the present invention, extends the relaying working time.
Description
Technical field
The invention belongs to wireless communication technology fields, are related to the conceptual design of wireless communication network security transmission, specifically relate to
And a kind of more junction network safe transmission methods of double bounce based on collection of energy.
Background technique
Due to the broadcast characteristic of cordless communication network, any user within the scope of communication network transmission can receive letter
Breath, therefore cordless communication network is faced with the threat of eavesdropping.However traditional upper layer Key Encryption Technology assumes eavesdropping node
Computing capability is limited, cannot cope with the threat of the following eavesdropping node hardware development.Safety of physical layer technology utilizes wireless channel
Physical features protect information, can be very good to meet future communications network security transmission demand.
Cooperating relay and cooperation interference are two kinds of common safety of physical layer schemes.In cooperating relay scheme, relaying section
Point assists the legal transmission rate of legitimate user's promotion network;In cooperation jamming program, cooperative node is dry using interference mechanism
It disturbs eavesdropping node and receives legal information.In addition, also thering is scheme integration and cooperation to relay at present and cooperation interfering to promote the peace of network
Quan Xing.However, interference information meeting interfering legality user receives information at present in existing cooperation safe transmission scheme, reduce
The transmission rate of legitimate user, to also reduce the safety of network.Therefore, it is adversely affected for interference information bring,
This patent proposes a kind of more junction network safe transmission schemes of the double bounce based on collection of energy, eliminates interference in the shadow of legitimate node
It rings, to adapt to the demand of next generation network safe transmission.
Summary of the invention
In view of the above-mentioned deficiencies in the prior art, the technical problem to be solved by the present invention is that providing a kind of based on energy
The more junction network safe transmission methods of the double bounce of collection eliminate interference in the influence of legitimate node, interference effect are eliminated, to mention
Rise the safety of user;Meanwhile using the energy being collected into as transmission power, private information is protected, improves double bounce
The secret performance and energy efficiency of more junction networks, to adapt to the demand of next generation network safe transmission.
The invention adopts the following technical scheme:
A kind of more junction network safe transmission methods of double bounce based on collection of energy, comprising the following steps:
S1, transmission private information and interference information;
S2, relaying RiAnd RjUsing the interference information energy of energy harvesting mechanism harvesting part receiving step S1 transmission, relaying
RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjNew do is sent using decoding forwarding scheme
Information is disturbed, receiving end and eavesdropping end receive relay transmission information, by designing interference information, eliminate interference to legitimate user's shadow
It rings, completes the safe transmission of source node private information.
Specifically, in step S1, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a), CabFor the cognition transmission rate of receiving end, CaeFor the cognitive information decoding for eavesdropping end
Rate.
Specifically, relaying RiPlace receives the information of step S1 are as follows:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power distribution system of transmitting terminal
Number, haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor normalized interference information,
niFor RiThe reception noise at place;
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient;gaiFor transmitting terminal to relaying RiChannel power gain.
Specifically, relaying RjPlace receives the information of step S1 are as follows:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjPlace connects
Receive noise
Principle is cut according to energy, relays RjLocate the energy collected are as follows:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
Further, R is relayedjThe interference signal x at placerjMeet following formula:
Specifically, in step S2, information that receiving end receives are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power h of transmissionibAnd hjbRespectively RiAnd RjIt arrives
The path gain of receiving end, xrjFor RjThe interference signal of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo connect
Receive the noise variance of node;
Receive client information transmission rate be
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end;
Specifically, eavesdropping terminates the information received in step S2 are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neFor making an uproar for eavesdropping end
Sound variable;
Eavesdrop the eavesdropping rate at end are as follows:
Wherein, gieAnd gjeRespectively RiAnd RjTo the channel power gain at eavesdropping end.
Specifically, in step S2 transmission method Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the target of network
Transmission rate, K1() is the second class of single order modified Bessel function.
Specifically, in step S2 transmission method security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReFor the target of network
Rate is eavesdropped,2F1() is hypergeometric progression.
Further, in step S2 transmission method safe transmission probability are as follows:
Compared with prior art, the present invention at least has the advantages that
The more junction network safe transmission schemes of a kind of double bounce based on collection of energy disclosed by the invention, two E-mail relay utilizations
The radio frequency spectrum information of sending node collects energy, to assist legitimate user's safe information transmission.Specifically, the present invention is mentioned
Safe transmission strategy be divided into two stages and implement.In the first stage, transmitting terminal transmits secret by power distribution method respectively
Information and interference information.For relaying after obtaining energy in a part of radiofrequency signal received, a relaying uses amplification forwarding
Trunk protocol auxiliary information safe transmission, another relaying will send newly-designed interference information, to eliminate interference information pairing
The influence of method receiving end.For the program, we devise the interference information that relaying is sent and analyze network transmission and interrupt generally
Rate, security interrupt probability and safe transmission probability, and derived their closed expression.Simulation results show the program
Results of performance analysis shows performance advantage of the program in terms of traversing safe transmission rate.
Further, R is relayediThe energy efficiency of network can be promoted by carrying out energy harvesting using portion radio frequency information, be prolonged
The long relaying working time, while relaying RiAlso information security relay services can be provided for transmitting terminal using remaining information.
Further, R is relayedjThe energy efficiency of network can be promoted by carrying out energy harvesting using portion radio frequency information, be prolonged
The long relaying working time, while relaying RjAlso information security relay services can be provided for transmitting terminal using remaining information.
Further, receiving end receives RiThe information and R of amplification forwardingjThe interference information of transmission, by interference information
It is analyzed, R can be designedjThe interference information of transmission.
Further, eavesdropping termination receives RiThe information and R of amplification forwardingjThe interference information of transmission, RiAnd RjWhat is sent is dry
Eavesdropping end can be interfered by disturbing information, to promote the safety of network.
Further, receiving end receives RiThe interference information and R of forwardingjThe interference information of transmission, in order to eliminate interference letter
Cease the influence to legitimate user, RjThe interference information and R of transmissioniThe interference information of amplification forwarding should cancel out each other, so as to mention
Rise the transmission rate and safety of legitimate user.
Further, private information is received according to receiving end and eavesdropping end, recommendation obtains corresponding legal rate and eavesdropping
Rate.In the case of considering high s/n ratio, obtains legal rate and eavesdrop the approximation of rate.
Further, legal rate and eavesdropping rate are obtained according to analysis, the safe rate of available network, this is net
The design and analysis of network provide foundation.
Further, by analyzing and deriving the closed solutions of available conduction transmission outage probability, this can be intuitive
Reflect that network transmitting terminal to the transmission performance for receiving client information, provides foundation for network design.
Further, by analyzing and deriving the closed solutions of available conduction security interrupt probability, this can be intuitive
Reflect that network transmitting terminal to the security performance of eavesdropping client information, provides foundation for network security transmission design.
Further, by analyzing and deriving the closed solutions of available safe transmission probability, this can intuitively reflect
The performance of network security transmission rationally provides foundation using resource for network.
In conclusion the more junction network safe transmission schemes of a kind of double bounce based on collection of energy disclosed by the invention.In
In this scheme, the radio frequency spectrum information of two E-mail relay utilization sending nodes collects energy, so that legitimate user's information security be assisted to pass
It is defeated, the energy efficiency of network is improved, the relaying working time is extended.It, can by rationally designing transmission plan and interference information
To eliminate influence of the interference information to legitimate user, the security performance of network is promoted.It is suggested plans by analyzing and being derived by
Transmission probability, security interrupt probability and safe transmission probability, provide intuitive foundation for the implementation of this programme.Emulation knot
Fruit demonstrates the results of performance analysis of the program, shows performance advantage of the program in terms of traversing safe transmission rate.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Fig. 1 is that the present invention is based on the system model figures of the double jump junction network of collection of energy;
Fig. 2 is the traversal secret Capacity Plan of system, wherein (a) is traversal safe rate and security interrupt probabilistic relation
Analogous diagram is (b) analogous diagram of traversal safe rate and transmitting terminal transmission power relationship, (c) traverses safe rate and target passes
The analogous diagram of defeated Rate Relationship.
Specific embodiment
Referring to Fig. 1, being examined the present invention provides a kind of more junction network safe transmission methods of double bounce based on collection of energy
Consider the transmission network of five nodes, legitimate user Alice wants safely and reliably to convey information to Bob, and Eve can be to Alice
Transmission data eavesdropped.Two relayings collect energy from the portion radio frequency information that sending node is sent, to assist safety
Transmission.Assuming that network experienced independent stable Rayleigh fading, it may be assumed that in each frame, channel status is remained unchanged, and in difference
Interframe, channel status independently changes.In addition, each data frame is divided into two time slots, private information and interference are corresponded respectively to
The transmission and collection of energy of information.Amplification forwarding and decoding forwarding scheme is respectively adopted in two relayings, assists legal information safety
Transmission, and eliminate influence of the interference information to legitimate user.Finally, general by first analyzing Transmission probability, security interrupt
Rate and safe transmission probability, and derived their closure expression formula.Numerical result demonstrates the results of performance analysis of the program,
Show performance advantage of the program in terms of traversing safe transmission rate.
A kind of more junction network safe transmission methods of double bounce based on collection of energy of the invention, comprising the following steps:
S1, sending node transmission private information and interference information;
S2, after the signal for receiving step S1, relay RiAnd RjSignal is received using energy harvesting mechanism harvesting part
Energy then relays RiPrivate information and interference information are forwarded using amplification forwarding trunk protocol, relay RjIt is forwarded using decoding
Scheme sends new interference signal, and receiving end and eavesdropping end can all receive relay transmission information.By designing interference information, eliminate
Interference is to legal customer impact, to complete the safe transmission of source node private information.
Source node sends private information and interference information using power distribution method, relays RiPlace receives signal:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power distribution system of transmitting terminal
Number, haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor interference information, niFor RiPlace
Reception noise.
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient, the value on [0,1];gaiFor transmitting terminal to relaying RiChannel power increase
Benefit.
Relay RjPlace receives signal:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjPlace connects
Receive noise.
Principle is cut according to energy, relays RjLocate the energy collected:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
The signal of receiving node are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power of transmission, hibAnd hjbRespectively RiAnd RjIt arrives
The path gain of receiving end, xrjFor RjThe interference information of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo connect
Receive the noise variance of node.
In conjunction with relaying RiAnd RjThe signal at place, eavesdropping end receive private information are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neFor making an uproar for eavesdropping end
Sound variable.
In order to reduce the interference of receiving end, RjThe interference signal x at placerjFollowing formula should be met:
However, due to
Wherein, hjeFor RjTo the path gain at eavesdropping end, therefore, R is relayedjThe interference signal at place can eliminate interference information
Influence to transmitting terminal promotes the safety of network.
When transmitting terminal sends data, the rate of information throughput of receiving end are as follows:
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end.
Eavesdropping end will also receive and recognize private information at this time, to the solution bit rate of cognitive information are as follows:
Wherein, gieAnd gjeRespectively relay RiAnd RjTo the channel power gain at eavesdropping end.
At this point, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a).
Due to CabAnd CaeExpression formula too complex, it is contemplated that high s/n ratio region is in order to analyze, then CabAnd CaeIt can
It is written as respectively:
The present invention usesWithC is replaced respectivelyabAnd Cae。
When solution bit rate is lower than scheduled target transmission speed RbWhen, Transmission can occur for network;When stealing for eavesdropping end
It listens rate to be higher than target and eavesdrops rate Re=Rb-Rs(wherein RsFor secret rate) when, security interrupt can occur for network.
For the scheme of proposition
1) Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the target of network
Transmission rate, K1() is the second class of single order modified Bessel function.
2) security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReFor the target of network
Rate is eavesdropped,2F1() is hypergeometric progression.
3) safe transmission probability are as follows:
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.The present invention being described and shown in usually here in attached drawing is real
The component for applying example can be arranged and be designed by a variety of different configurations.Therefore, below to the present invention provided in the accompanying drawings
The detailed description of embodiment be not intended to limit the range of claimed invention, but be merely representative of of the invention selected
Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are obtained without creative efforts
The every other embodiment obtained, shall fall within the protection scope of the present invention.
Simulating, verifying
1) as can be seen that the increase limited with secret outage probability, the traversal safe transmission speed of system from Fig. 2 (a)
Rate will also become larger.This is because the limitation of security interrupt probability is bigger, the safe transmission for more readily satisfying network is required, therefore time
Going through safe transmission rate can increase with it.Further, it can be seen that include two classical joint cooperating relays and cooperation relayed
Jamming program, since the noise that interference signal generates at receiver can not be offset, so safety is than proposing the low of scheme.By
It is interfered in no cooperation, traditional cooperating relay scheme performance is also below being suggested plans.
2) as can be seen that with transimission power P from Fig. 2 (b)sIncrease, the traversal safe rate of system will also become larger.
This is because with PsIncrease, transmitting terminal can provide more energy for relay using progress safe transmission, therefore net
The traversal secret safe rate of network can increase therewith.Further, it can be seen that include two classical joint cooperating relays relayed
And cooperation jamming program, since the noise that interference signal generates at receiver can not be offset, so safety is than proposal scheme
It is low.Due to not having cooperation to interfere, traditional cooperating relay scheme performance is also below being suggested plans.
3) as can be seen that with target transmission speed R from Fig. 2 (c)bIncrease, the traversal safe rate of system will subtract
It is small.This is because with RbIncrease, network, which is difficult to meet, can lean on the requirement of transmission, therefore, utilizable peace in network
Full transmission opportunity is reduced, and the traversal secret safe rate of network can reduce therewith.Further, it can be seen that include two relayings
Classical joint cooperating relay and cooperation jamming program, since the noise that interference signal generates at receiver can not be offset, so
Safety is than proposing the low of scheme.Due to not having cooperation to interfere, traditional cooperating relay scheme performance is also below being suggested plans.
The above content is merely illustrative of the invention's technical idea, and this does not limit the scope of protection of the present invention, all to press
According to technical idea proposed by the present invention, any changes made on the basis of the technical scheme each falls within claims of the present invention
Protection scope within.
Claims (10)
1. a kind of more junction network safe transmission methods of double bounce based on collection of energy, which comprises the following steps:
S1, transmission private information and interference information;
S2, relaying RiAnd RjUsing the interference information energy of energy harvesting mechanism harvesting part receiving step S1 transmission, R is relayediIt adopts
Private information and interference information are forwarded with amplification forwarding trunk protocol, relays RjNew interference letter is sent using decoding forwarding scheme
It ceasing, receiving end and eavesdropping end receive relay transmission information, and by designing interference information, eliminates and interfere to legal customer impact,
Complete the safe transmission of source node private information.
2. the method according to claim 1, wherein in step S1, the safe rate of private information are as follows:
Rsec=(Cab-Cae)+
Wherein, (a)+=max (0, a), CabFor the cognition transmission rate of receiving end, CaeSpeed is decoded to eavesdrop the cognitive information at end
Rate.
3. the method according to claim 1, wherein relaying RiPlace receives the information of step S1 are as follows:
Wherein, β1For RiThe power division coefficient at place, PsFor the transimission power of transmitting terminal, α is the power partition coefficient of transmitting terminal,
haiFor transmitting terminal to relaying RiPath gain, xsFor normalized cognition private information, xjFor normalized interference information, ni
For RiThe reception noise at place;
Mechanism is gathered according to energy, relays RiLocate the energy collected:
Wherein, η is energy conversion efficiency coefficient;gaiFor transmitting terminal to relaying RiChannel power gain.
4. the method according to claim 1, wherein relaying RjPlace receives the information of step S1 are as follows:
Wherein, β2For RjThe power division coefficient at place, hajFor transmitting terminal to relaying RjPath gain, njFor RjThe reception noise at place
Principle is cut according to energy, relays RjLocate the energy collected are as follows:
Wherein, gajFor transmitting terminal to relaying RjChannel power gain.
5. according to the method described in claim 4, it is characterized in that, relaying RjThe interference signal x at placerjMeet following formula:
6. the method according to claim 1, wherein in step S2, information that receiving end receives are as follows:
Wherein, N0For noise variance, PiAnd PjRespectively RiAnd RjThe maximum power h of transmissionibAnd hjbRespectively RiAnd RjTo reception
The path gain at end, xrjFor RjThe interference signal of forwarding, gaiFor transmitting terminal to relaying RiChannel power gain, nbTo receive section
The noise variance of point;
Receive client information transmission rate be
Wherein, gibAnd gjbRespectively RiAnd RjTo the channel power gain of receiving end.
7. the method according to claim 1, wherein eavesdropping terminates the information received in step S2 are as follows:
Wherein, hieFor RiTo the path gain at eavesdropping end, hjeFor RjTo the channel coefficients at eavesdropping end, neBecome to eavesdrop the noise at end
Amount;
Eavesdrop the eavesdropping rate at end are as follows:
Wherein, gieAnd gjeRespectively RiAnd RjTo the channel power gain at eavesdropping end.
8. the method according to claim 1, wherein in step S2 transmission method Transmission probability are as follows:
Wherein, λaiFor transmitting terminal to RiChannel variance, λibFor RiTo the channel variance of receiving end, RbFor the object transmission of network
Rate, K1() is the second class of single order modified Bessel function.
9. the method according to claim 1, wherein in step S2 transmission method security interrupt probability are as follows:
Wherein, λieFor RiTo the channel variance at eavesdropping end, λjeFor RjTo the channel variance at eavesdropping end, ReIt is eavesdropped for the target of network
Rate,2F1() is hypergeometric progression.
10. method according to claim 8 or claim 9, which is characterized in that the safe transmission probability of transmission method in step S2
Are as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683555.3A CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683555.3A CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430566A true CN110430566A (en) | 2019-11-08 |
CN110430566B CN110430566B (en) | 2020-12-25 |
Family
ID=68412772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910683555.3A Active CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430566B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106413074A (en) * | 2016-10-11 | 2017-02-15 | 西北工业大学 | Optimal power allocation method of untrusted relay network under perfect CSI |
CN106533606A (en) * | 2016-10-28 | 2017-03-22 | 国网山东省电力公司莱芜供电公司 | Physical layer secure transmission method for single-antenna amplification forwarding relay network |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN108601019A (en) * | 2018-03-27 | 2018-09-28 | 西北工业大学 | Insincere relaying transmitted in both directions network security transmission method based on relay selection |
CN109861728A (en) * | 2019-02-21 | 2019-06-07 | 哈尔滨工程大学 | The more relay selections of joint and time slot resource configuration method of extensive mimo system |
CN109995413A (en) * | 2019-05-06 | 2019-07-09 | 西安交通大学 | A kind of environment backscatter communication method of relaying auxiliary |
-
2019
- 2019-07-26 CN CN201910683555.3A patent/CN110430566B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106413074A (en) * | 2016-10-11 | 2017-02-15 | 西北工业大学 | Optimal power allocation method of untrusted relay network under perfect CSI |
CN106533606A (en) * | 2016-10-28 | 2017-03-22 | 国网山东省电力公司莱芜供电公司 | Physical layer secure transmission method for single-antenna amplification forwarding relay network |
CN108601019A (en) * | 2018-03-27 | 2018-09-28 | 西北工业大学 | Insincere relaying transmitted in both directions network security transmission method based on relay selection |
CN109861728A (en) * | 2019-02-21 | 2019-06-07 | 哈尔滨工程大学 | The more relay selections of joint and time slot resource configuration method of extensive mimo system |
CN109995413A (en) * | 2019-05-06 | 2019-07-09 | 西安交通大学 | A kind of environment backscatter communication method of relaying auxiliary |
Non-Patent Citations (3)
Title |
---|
HONGJIANG LEI 等: "On Secure Underlay MIMO Cognitive Radio", 《IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING》 * |
LEE K 等: "Adaptive Wireless-powered Relaying schemes with Cooperative Jamming for Two-hop Secure Communication", 《IEEE INTERNET OF THINGS JOURNAL》 * |
雷维嘉: "基于干扰对齐的中继MIMO窃听信道安全传输机制", 《吉林大学学报(工学版)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
CN112272183B (en) * | 2020-10-29 | 2022-04-01 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
Also Published As
Publication number | Publication date |
---|---|
CN110430566B (en) | 2020-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parvin et al. | Cognitive radio network security: A survey | |
Meng et al. | Smart grid neighborhood area networks: a survey | |
Zou et al. | Optimal relay selection for physical-layer security in cooperative wireless networks | |
Guo et al. | Outage performance of relay-assisted cognitive-radio system under spectrum-sharing constraints | |
CN106452655A (en) | System security transmission method in combination with collaborative interference and time division energy collection technology | |
CN108834113A (en) | A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer | |
Raveendran et al. | VLC and D2D heterogeneous network optimization: A reinforcement learning approach based on equilibrium problems with equilibrium constraints | |
Bhowmick et al. | Sensing throughput trade‐off for an energy efficient cognitive radio network under faded sensing and reporting channel | |
CN110430566A (en) | A kind of more junction network safe transmission methods of double bounce based on collection of energy | |
Wan et al. | Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks | |
CN109600746A (en) | Performance analysis method of opportunity relay selection scheme in cooperative wireless communication system | |
Zhang et al. | Optimization of relay-based cooperative spectrum sensing in cognitive radio networks | |
Shokair et al. | Statistical analysis of a class of secure relay assisted cognitive radio networks | |
CN110324827B (en) | Cognitive safety transmission method based on wireless information and power joint transmission | |
CN110213762A (en) | Untrusted junction network safe transmission method is acquired based on opportunistic wireless energy | |
Peng et al. | Security performance analysis for cooperative communication system under Nakagami-m fading channel | |
Benedict et al. | Secrecy analysis of a cognitive radio network with an energy harvesting AF relay | |
Morais et al. | A distributed intrusion detection scheme for wireless ad hoc networks | |
Chen et al. | Resource allocation algorithm for IoT communication based on ambient backscatter | |
CN114567352A (en) | Wireless energy-carrying communication method based on multi-antenna relay system | |
Chen et al. | QoE-driven resource allocation for D2D underlaying NOMA cellular networks | |
Ji et al. | Opportunistic relay selection for joint decode-and-forward based two-way relaying with network coding | |
Andrawes et al. | Survey on performance of adaptive modulation scheme with cooperative diversity in wireless systems | |
Shams | Effect of co-channel interference on two-way untrustworthy relay selection | |
Anastasopoulos et al. | A distributed routing protocol for providing QoS in wireless mesh networks operating above 10 GHz |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240126 Address after: 710072 Qing'an Park 2-310-21, No. 9 Gaoxin Second Road, High tech Zone, Xi'an City, Shaanxi Province Patentee after: Xi'an Xunshi Youdao Information Technology Co.,Ltd. Country or region after: China Address before: Beilin District Shaanxi province Xi'an City friendship road 710072 No. 127 Patentee before: Northwestern Polytechnical University Country or region before: China |