CN110430566B - Two-hop multi-relay network secure transmission method based on energy collection - Google Patents

Two-hop multi-relay network secure transmission method based on energy collection Download PDF

Info

Publication number
CN110430566B
CN110430566B CN201910683555.3A CN201910683555A CN110430566B CN 110430566 B CN110430566 B CN 110430566B CN 201910683555 A CN201910683555 A CN 201910683555A CN 110430566 B CN110430566 B CN 110430566B
Authority
CN
China
Prior art keywords
relay
information
transmission
interference
eavesdropping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910683555.3A
Other languages
Chinese (zh)
Other versions
CN110430566A (en
Inventor
王大伟
吴珂婷
王佳欣
张若南
胡晓宇
翟道森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xunshi Youdao Information Technology Co ltd
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN201910683555.3A priority Critical patent/CN110430566B/en
Publication of CN110430566A publication Critical patent/CN110430566A/en
Application granted granted Critical
Publication of CN110430566B publication Critical patent/CN110430566B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

The invention discloses a two-hop multi-relay network safety transmission method based on energy collection, which is used for transmitting private information and interference information; relay RiAnd RjThe energy harvesting part of the energy harvesting mechanism is adopted to receive the transmitted interference information energy, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of the source node is completed. The method of the invention improves the energy efficiency of the network and prolongs the relay working time.

Description

Two-hop multi-relay network secure transmission method based on energy collection
Technical Field
The invention belongs to the technical field of wireless communication, relates to a scheme design of wireless communication network safety transmission, and particularly relates to a two-hop multi-relay network safety transmission method based on energy collection.
Background
Due to the broadcast nature of wireless communication networks, any user within the transmission range of the communication network may receive the information and therefore the wireless communication network faces the threat of eavesdropping. However, the traditional upper-layer key encryption technology assumes that the calculation capacity of the eavesdropping node is limited, and cannot deal with the threat of hardware development of the eavesdropping node in the future. The physical layer security technology utilizes the physical characteristics of the wireless channel to protect information, and can well meet the requirement of safe transmission of a future communication network.
Cooperative relaying and cooperative interference are two common physical layer security schemes. In the cooperative relay scheme, a relay node assists a legal user to improve the legal transmission rate of a network; in the cooperative interference scheme, the cooperative node adopts an interference mechanism to interfere the wiretapping node to receive the legal information. In addition, at present, there is also a scheme for improving the security of the network by combining cooperative relaying and cooperative interference. However, in the existing cooperative secure transmission scheme, the interference information interferes the reception of information by a legitimate user, and the transmission rate of the legitimate user is reduced, thereby also reducing the security of the network. Therefore, aiming at the adverse effect brought by the interference information, the patent provides a two-hop multi-relay network safety transmission scheme based on energy collection, and the influence of the interference on a legal node is eliminated, so that the requirement of the next generation network safety transmission is met.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a two-hop multi-relay network secure transmission method based on energy collection, which eliminates the influence of interference on a legal node and the interference influence, thereby improving the security of users; meanwhile, the collected energy is used as transmitting power to protect private information, and the privacy performance and energy efficiency of the two-hop multi-relay network are improved, so that the requirement of safe transmission of the next generation network is met.
The invention adopts the following technical scheme:
a two-hop multi-relay network secure transmission method based on energy collection comprises the following steps:
s1, transmitting private information and interference information;
s2 Relay RiAnd RjThe energy harvesting part of the energy harvesting mechanism is adopted to receive the interference information energy transmitted in the step S1, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of the source node is completed.
Specifically, in step S1, the security rate of the private information is:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a),CabFor cognitive transmission rate at the receiving end, CaeAnd decoding the rate of the cognitive information of the eavesdropping end.
In particular, the relay RiThe information received at step S1 is:
Figure GDA0002617544270000021
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjFor normalized interference information, niIs RiThe reception noise of (d);
relaying R according to the energy harvesting mechanismiThe collected energy:
Figure GDA0002617544270000022
wherein eta is an energy conversion efficiency coefficient; gaiFor sender-to-relay RiThe channel power gain of (a).
In particular, the relay RjThe information received at step S1 is:
Figure GDA0002617544270000023
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjReceive noise of
Relaying R according to the energy-cut principlejThe energy collected here is:
Figure GDA0002617544270000031
wherein, gajFor sender-to-relay RjThe channel power gain of (a).
Further, the relay RjOf the interference signal xrjSatisfies the following formula:
Figure GDA0002617544270000032
specifically, in step S2, the information received by the receiving end is:
Figure GDA0002617544270000033
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power h of transmissionibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference signal, gaiFor sender-to-relay RiChannel power gain of nbA noise variance for the receiving node;
the transmission rate of the information at the receiving end is
Figure GDA0002617544270000034
Wherein, gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end;
specifically, in step S2, the information received by the eavesdropping terminal is:
Figure GDA0002617544270000035
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neNoise variable of eavesdropping end;
the interception rate of the interception end is as follows:
Figure GDA0002617544270000041
wherein, gieAnd gjeAre each RiAnd RjChannel power gain to the eavesdropping end.
Specifically, the transmission interruption probability of the transmission method in step S2 is:
Figure GDA0002617544270000042
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
Specifically, the safety interruption probability of the transmission method in step S2 is:
Figure GDA0002617544270000043
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
Further, the safe transmission probability of the transmission method in step S2 is:
Figure GDA0002617544270000051
compared with the prior art, the invention has at least the following beneficial effects:
the invention discloses a two-hop multi-relay network safety transmission scheme based on energy collection. Specifically, the secure transmission strategy proposed by the present invention is implemented in two phases. In the first stage, a transmitting end transmits private information and interference information respectively through a power allocation method. After the relays acquire energy from a part of received radio frequency signals, one relay adopts an amplify-and-forward relay protocol to assist information safe transmission, and the other relay sends newly designed interference information to eliminate the influence of the interference information on a legal receiving end. For the scheme, interference information sent by relays is designed, network transmission interruption probability, safety interruption probability and safety transmission probability are analyzed, and closed expressions of the interference information and the safety transmission probability are deduced. The simulation result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
Further, the relay RiEnergy harvesting is carried out by utilizing partial radio frequency information, so that the energy efficiency of the network can be improved, the working time of the relay is prolonged, and meanwhile, the relay RiAnd the residual information can be utilized to provide information security relay service for the sending end.
Further, the relay RjEnergy harvesting is carried out by utilizing partial radio frequency information, so that the energy efficiency of the network can be improved, the working time of the relay is prolonged, and meanwhile, the relay RjAnd the residual information can be utilized to provide information security relay service for the sending end.
Further, the receiving end receives RiAmplifying forwarded information and RjThe transmitted interference information can be analyzed to design RjThe interference information sent.
Further, the eavesdropping end receives RiAmplifying forwarded information and RjTransmitted interference information, RiAnd RjThe transmitted interference information can interfere with the eavesdropping end, so that the security of the network is improved.
Further, the receiving end receives RiForwarded interference information and RjInterference information transmitted, R for eliminating the influence of interference information on legitimate usersjTransmitted interference information and RiThe amplified and forwarded interference information should cancel each other, so that the transmission rate and the security of the legal user can be improved.
Further, according to the private information received by the receiving end and the interception end, the corresponding legal rate and the interception rate are obtained through recommendation. And obtaining the approximate values of the legal rate and the interception rate under the condition of considering high signal-to-noise ratio.
Furthermore, the legal rate and the interception rate are obtained according to the analysis, and the security rate of the network can be obtained, which provides a basis for the design and analysis of the network.
Furthermore, a closed-form solution of the transmission interruption probability can be obtained through analysis and derivation, so that the transmission performance of information from a network sending end to a receiving end can be intuitively reflected, and a basis is provided for network design.
Furthermore, a closed-form solution of the transmission safety interruption probability can be obtained through analysis and derivation, so that the safety performance from a network sending end to an eavesdropping end can be intuitively reflected, and a basis is provided for the design of network safety transmission.
Furthermore, a closed-form solution of the safe transmission probability can be obtained through analysis and derivation, so that the performance of network safe transmission can be intuitively reflected, and a basis is provided for reasonably utilizing resources by a network.
In summary, the invention discloses a two-hop multi-relay network secure transmission scheme based on energy collection. In the scheme, the two relays collect energy by using the radio frequency spectrum information of the sending node, so that the information safety transmission of legal users is assisted, the energy efficiency of a network is improved, and the relay working time is prolonged. By reasonably designing the transmission scheme and the interference information, the influence of the interference information on legal users can be eliminated, and the safety performance of the network is improved. The transmission interruption probability, the safe interruption probability and the safe transmission probability of the scheme are obtained through analysis and deduction, and visual basis is provided for implementation of the scheme. The simulation result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
FIG. 1 is a system model diagram of a two-hop relay network based on energy collection according to the present invention;
fig. 2 is a diagram of the traversal secret capacity of the system, in which (a) is a simulation diagram of the relationship between the traversal security rate and the security outage probability, (b) is a simulation diagram of the relationship between the traversal security rate and the transmission power of the transmitting end, and (c) is a simulation diagram of the relationship between the traversal security rate and the target transmission rate.
Detailed Description
Referring to fig. 1, the invention provides a two-hop multi-relay network secure transmission method based on energy collection, considering a five-node transmission network, a legitimate user Alice wants to transmit information to Bob safely and reliably, and Eve eavesdrops on Alice's transmission data. The two relays collect energy from a portion of the radio frequency information transmitted by the transmitting node to assist in secure transmission. Assuming that the network experiences independent stationary rayleigh fading, namely: the channel state remains the same within each frame, while the channel state changes independently between different frames. In addition, each data frame is divided into two time slots, which respectively correspond to the transmission and energy collection of the private information and the interference information. The two relays respectively adopt an amplification forwarding scheme and a decoding forwarding scheme to assist the safe transmission of legal information and eliminate the influence of interference information on legal users. Finally, the transmission interruption probability, the safe interruption probability and the safe transmission probability are analyzed firstly, and the closed expressions of the transmission interruption probability, the safe interruption probability and the safe transmission probability are deduced. The numerical result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
The invention relates to a two-hop multi-relay network safety transmission method based on energy collection, which comprises the following steps:
s1, the sending node transmits private information and interference information;
s2, after receiving the signal of step S1, relaying RiAnd RjHarvesting part of the received signal energy using an energy harvesting mechanism, and subsequently relaying RiPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send a new interference signal, and both a receiving end and an eavesdropping end can receive relay transmission information. Interference information is designed, so that the influence of interference on legal users is eliminated, and the secure transmission of the private information of the source node is completed.
The source node adopts a power distribution method to send private information and interference information, and the relay RiReceiving a signal:
Figure GDA0002617544270000071
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjFor interference information, niIs RiThe reception noise of (b).
Relaying R according to the energy harvesting mechanismiThe collected energy:
Figure GDA0002617544270000081
wherein eta is the coefficient of energy conversion efficiency, and is in [0,1 ]]Taking the value; gaiFor sender-to-relay RiThe channel power gain of (a).
Relay RjReceiving a signal:
Figure GDA0002617544270000082
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjThe reception noise of (b).
Relaying R according to the energy-cut principlejThe collected energy:
Figure GDA0002617544270000083
wherein, gajFor sender-to-relay RjThe channel power gain of (a).
The signals of the receiving node are:
Figure GDA0002617544270000084
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power of transmission, hibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference information, gaiFor sender-to-relay RiChannel power gain of nbIs the noise variance of the receiving node.
Binding relay RiAnd RjThe signal of department, eavesdropping end receive the private information:
Figure GDA0002617544270000085
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neIs a noise variable at the eavesdropping end.
To reduce interference at the receiving end, RjOf the interference signal xrjThe following should be satisfied:
Figure GDA0002617544270000091
however, because
Figure GDA0002617544270000092
Wherein h isjeIs RjPath gain to eavesdropping end, relay RjThe interference signal can eliminate the influence of interference information on the transmitting end, and the safety of the network is improved.
When the sending end sends data, the information transmission rate of the receiving end is as follows:
Figure GDA0002617544270000093
wherein, gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end.
At this time, the eavesdropping end also receives the cognitive private information, and the decoding rate of the cognitive private information is as follows:
Figure GDA0002617544270000094
wherein, gieAnd gjeAre respectively a relay RiAnd RjChannel power gain to the eavesdropping end.
At this time, the security rate of the private information is:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a)。
Due to CabAnd CaeIs too complex, so high signal-to-noise ratio regions are considered for analysis, then CabAnd CaeCan be written as:
Figure GDA0002617544270000101
Figure GDA0002617544270000102
the invention uses
Figure GDA0002617544270000103
And
Figure GDA0002617544270000104
separately replace CabAnd Cae
When the decoding rate is lower than the predetermined target transmission rate RbWhen the network is in use, transmission interruption occurs;when the interception rate of the interception end is higher than the target interception rate Re=Rb-Rs(wherein R issPrivacy rate), a security disruption of the network may occur.
For the proposed solution
1) The transmission outage probability is:
Figure GDA0002617544270000105
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
2) The safe outage probability is:
Figure GDA0002617544270000106
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
3) The secure transmission probability is:
Figure GDA0002617544270000111
in order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Simulation verification
1) As can be seen from (a) in fig. 2, as the privacy break probability limit increases, the traversal security transmission rate of the system will also become larger. This is because the greater the safety interruption probability limit, the easier it is to meet the safety transmission requirements of the network, and therefore the traversal safety transmission rate will increase. Furthermore, a conventional joint cooperative relay and cooperative interference scheme including two relays can be seen, which is less secure than the proposed scheme since noise generated at the receiver by the interfering signal cannot be cancelled out. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
2) As can be seen from (b) in fig. 2, with the transmission power PsThe traversal security rate of the system will also become greater. This is because, with PsWith the increase, the sending end can provide more energy for relay use to perform secure transmission, so the traversal privacy security rate of the network is increased. Furthermore, a conventional joint cooperative relay and cooperative interference scheme including two relays can be seen, which is less secure than the proposed scheme since noise generated at the receiver by the interfering signal cannot be cancelled out. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
3) As can be seen from (c) in fig. 2, with the target transmission rate RbThe traversal security rate of the system will decrease. This is because, with RbThe network is difficult to meet the requirement of reliable transmission, so that the safe transmission opportunity available in the network is reduced, and the traversing privacy safety rate of the network is reduced. Furthermore, it can be seen that the conventional joint cooperative relay and cooperative interference scheme including two relays has a safety ratio higher than that of the proposed scheme because noise generated at the receiver by the interference signal cannot be cancelled outIs low. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
The above-mentioned contents are only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited thereby, and any modification made on the basis of the technical idea of the present invention falls within the protection scope of the claims of the present invention.

Claims (4)

1. A two-hop multi-relay network security transmission method based on energy collection is characterized by comprising the following steps:
s1, transmitting the private information and the interference information, wherein the security rate of the private information is as follows:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a),CabFor cognitive private information transfer rate at the receiving end, CaeDecoding rate of the cognitive private information of the eavesdropping end;
s2 Relay RiAnd RjThe reaping part of the energy reaping mechanism is adopted to receive the interference information transmitted in the step S1, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjA decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of a source node is completed;
relay RiThe information received at step S1 is:
Figure FDA0002665573890000011
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjTo be normalizedQuantized interference information, niIs RiThe reception noise of (d);
relaying R according to the energy harvesting mechanismiThe collected energy:
Figure FDA0002665573890000012
wherein eta is an energy conversion efficiency coefficient; gaiFor sender-to-relay RiThe channel power gain of (a);
relay RjThe information received at step S1 is:
Figure FDA0002665573890000013
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjReceive noise of
Relaying R according to the principle of energy harvestingjThe energy collected here is:
Figure FDA0002665573890000021
wherein, gajFor sender-to-relay RjChannel power gain of, relay RjOf the interference signal xrjSatisfies the following formula:
Figure FDA0002665573890000022
the information received by the receiving end is:
Figure FDA0002665573890000023
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power h of transmissionibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference signal, nbA noise variance for the receiving node;
the transmission rate of the information at the receiving end is
Figure FDA0002665573890000024
gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end;
the information received by the eavesdropping terminal is as follows:
Figure FDA0002665573890000025
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neNoise variable of eavesdropping end;
the interception rate of the interception end is as follows:
Figure FDA0002665573890000031
wherein, gieAnd gjeAre each RiAnd RjChannel power gain to the eavesdropping end.
2. The method according to claim 1, wherein the transmission interruption probability of the transmission method in step S2 is:
Figure FDA0002665573890000032
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
3. The method according to claim 1, wherein the probability of the abort safety of the transmission method in step S2 is:
Figure FDA0002665573890000033
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
4. The method according to claim 3, wherein the secure transmission probability of the transmission method in step S2 is:
Figure FDA0002665573890000041
wherein λ isibIs RiChannel variance to the receiving end.
CN201910683555.3A 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection Active CN110430566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910683555.3A CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910683555.3A CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Publications (2)

Publication Number Publication Date
CN110430566A CN110430566A (en) 2019-11-08
CN110430566B true CN110430566B (en) 2020-12-25

Family

ID=68412772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910683555.3A Active CN110430566B (en) 2019-07-26 2019-07-26 Two-hop multi-relay network secure transmission method based on energy collection

Country Status (1)

Country Link
CN (1) CN110430566B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272183B (en) * 2020-10-29 2022-04-01 桂林电子科技大学 RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248414B (en) * 2013-04-17 2016-08-10 重庆邮电大学 A kind of based on interference alignment and many relayings double bounce transmission method of wave beam forming
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106413074B (en) * 2016-10-11 2019-01-18 西北工业大学 A kind of optimal power allocation method of untrusted junction network under imperfect CSI
CN106533606B (en) * 2016-10-28 2019-01-08 国网山东省电力公司莱芜供电公司 A kind of safe transmission method of physical layer of single antenna amplification forwarding junction network
CN108601019B (en) * 2018-03-27 2021-01-15 西北工业大学 Safe transmission method of untrusted relay bidirectional transmission network based on relay selection
CN109861728B (en) * 2019-02-21 2021-06-18 哈尔滨工程大学 Joint multi-relay selection and time slot resource allocation method for large-scale MIMO system
CN109995413B (en) * 2019-05-06 2020-07-28 西安交通大学 Relay-assisted environment backscattering communication method

Also Published As

Publication number Publication date
CN110430566A (en) 2019-11-08

Similar Documents

Publication Publication Date Title
Dong et al. Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
Chen et al. Multiuser two-way relaying: detection and interference management strategies
CN110087278B (en) Safe transmission method in wireless energy-carrying cooperative network with cooperative interference
CN109525984B (en) Method for improving safety rate of untrusted relay energy-carrying communication system
Kader et al. Cooperative non‐orthogonal multiple access with SWIPT over Nakagami‐m fading channels
Feng et al. Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks
Pandey et al. Performance evaluation of amplify‐and‐forward relaying cooperative vehicular networks under physical layer security
Abd El-Malek et al. New bandwidth efficient relaying schemes in cooperative cognitive two-way relay networks with physical layer security
CN111107547B (en) Secure transmission method of alternate relay network in eavesdropping environment
Xu et al. On the hybrid relaying protocol for time division broadcasting
Alves et al. Outage, throughput and energy efficiency analysis of some half and full duplex cooperative relaying schemes
CN110430566B (en) Two-hop multi-relay network secure transmission method based on energy collection
Khuntia et al. A bidirectional relay-assisted underlay device-to-device communication in cellular networks: An IoT application for FinTech
Shokair et al. Statistical analysis of a class of secure relay assisted cognitive radio networks
Xu et al. Secrecy-enhancing design for two-way energy harvesting cooperative networks with full-duplex relay jamming
CN115278662A (en) Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy
Huang et al. Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection
Yuan et al. Optimal transmission power allocation for two-way relay channel using analog network coding
Zhang et al. A novel half-jamming protocol for secure two-way relay systems using a full-duplex jamming relay
Gao et al. Secure power allocation of two-way relaying with an untrusted denoise-and-forward relay
Cao et al. Joint source-relay selection for improving wireless physical-layer security
Jia et al. Performance analysis of hybrid DAF based incremental relaying cooperative system
Mallat et al. Secure two-user AF relaying networks using cooperative jamming
Krikidis Stability analysis for bidirectional MABC-DF relay networks with bursty traffic
Andrawes et al. Survey on performance of adaptive modulation scheme with cooperative diversity in wireless systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240126

Address after: 710072 Qing'an Park 2-310-21, No. 9 Gaoxin Second Road, High tech Zone, Xi'an City, Shaanxi Province

Patentee after: Xi'an Xunshi Youdao Information Technology Co.,Ltd.

Country or region after: China

Address before: Beilin District Shaanxi province Xi'an City friendship road 710072 No. 127

Patentee before: Northwestern Polytechnical University

Country or region before: China

TR01 Transfer of patent right