CN110430566B - Two-hop multi-relay network secure transmission method based on energy collection - Google Patents
Two-hop multi-relay network secure transmission method based on energy collection Download PDFInfo
- Publication number
- CN110430566B CN110430566B CN201910683555.3A CN201910683555A CN110430566B CN 110430566 B CN110430566 B CN 110430566B CN 201910683555 A CN201910683555 A CN 201910683555A CN 110430566 B CN110430566 B CN 110430566B
- Authority
- CN
- China
- Prior art keywords
- relay
- information
- transmission
- interference
- eavesdropping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 88
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000003306 harvesting Methods 0.000 claims abstract description 12
- 230000001149 cognitive effect Effects 0.000 claims description 9
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 6
- 238000004088 simulation Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000009795 derivation Methods 0.000 description 3
- 230000002035 prolonged effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 101150050759 outI gene Proteins 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
The invention discloses a two-hop multi-relay network safety transmission method based on energy collection, which is used for transmitting private information and interference information; relay RiAnd RjThe energy harvesting part of the energy harvesting mechanism is adopted to receive the transmitted interference information energy, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of the source node is completed. The method of the invention improves the energy efficiency of the network and prolongs the relay working time.
Description
Technical Field
The invention belongs to the technical field of wireless communication, relates to a scheme design of wireless communication network safety transmission, and particularly relates to a two-hop multi-relay network safety transmission method based on energy collection.
Background
Due to the broadcast nature of wireless communication networks, any user within the transmission range of the communication network may receive the information and therefore the wireless communication network faces the threat of eavesdropping. However, the traditional upper-layer key encryption technology assumes that the calculation capacity of the eavesdropping node is limited, and cannot deal with the threat of hardware development of the eavesdropping node in the future. The physical layer security technology utilizes the physical characteristics of the wireless channel to protect information, and can well meet the requirement of safe transmission of a future communication network.
Cooperative relaying and cooperative interference are two common physical layer security schemes. In the cooperative relay scheme, a relay node assists a legal user to improve the legal transmission rate of a network; in the cooperative interference scheme, the cooperative node adopts an interference mechanism to interfere the wiretapping node to receive the legal information. In addition, at present, there is also a scheme for improving the security of the network by combining cooperative relaying and cooperative interference. However, in the existing cooperative secure transmission scheme, the interference information interferes the reception of information by a legitimate user, and the transmission rate of the legitimate user is reduced, thereby also reducing the security of the network. Therefore, aiming at the adverse effect brought by the interference information, the patent provides a two-hop multi-relay network safety transmission scheme based on energy collection, and the influence of the interference on a legal node is eliminated, so that the requirement of the next generation network safety transmission is met.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a two-hop multi-relay network secure transmission method based on energy collection, which eliminates the influence of interference on a legal node and the interference influence, thereby improving the security of users; meanwhile, the collected energy is used as transmitting power to protect private information, and the privacy performance and energy efficiency of the two-hop multi-relay network are improved, so that the requirement of safe transmission of the next generation network is met.
The invention adopts the following technical scheme:
a two-hop multi-relay network secure transmission method based on energy collection comprises the following steps:
s1, transmitting private information and interference information;
s2 Relay RiAnd RjThe energy harvesting part of the energy harvesting mechanism is adopted to receive the interference information energy transmitted in the step S1, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of the source node is completed.
Specifically, in step S1, the security rate of the private information is:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a),CabFor cognitive transmission rate at the receiving end, CaeAnd decoding the rate of the cognitive information of the eavesdropping end.
In particular, the relay RiThe information received at step S1 is:
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjFor normalized interference information, niIs RiThe reception noise of (d);
relaying R according to the energy harvesting mechanismiThe collected energy:
wherein eta is an energy conversion efficiency coefficient; gaiFor sender-to-relay RiThe channel power gain of (a).
In particular, the relay RjThe information received at step S1 is:
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjReceive noise of
Relaying R according to the energy-cut principlejThe energy collected here is:
wherein, gajFor sender-to-relay RjThe channel power gain of (a).
Further, the relay RjOf the interference signal xrjSatisfies the following formula:
specifically, in step S2, the information received by the receiving end is:
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power h of transmissionibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference signal, gaiFor sender-to-relay RiChannel power gain of nbA noise variance for the receiving node;
the transmission rate of the information at the receiving end is
Wherein, gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end;
specifically, in step S2, the information received by the eavesdropping terminal is:
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neNoise variable of eavesdropping end;
the interception rate of the interception end is as follows:
wherein, gieAnd gjeAre each RiAnd RjChannel power gain to the eavesdropping end.
Specifically, the transmission interruption probability of the transmission method in step S2 is:
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
Specifically, the safety interruption probability of the transmission method in step S2 is:
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
Further, the safe transmission probability of the transmission method in step S2 is:
compared with the prior art, the invention has at least the following beneficial effects:
the invention discloses a two-hop multi-relay network safety transmission scheme based on energy collection. Specifically, the secure transmission strategy proposed by the present invention is implemented in two phases. In the first stage, a transmitting end transmits private information and interference information respectively through a power allocation method. After the relays acquire energy from a part of received radio frequency signals, one relay adopts an amplify-and-forward relay protocol to assist information safe transmission, and the other relay sends newly designed interference information to eliminate the influence of the interference information on a legal receiving end. For the scheme, interference information sent by relays is designed, network transmission interruption probability, safety interruption probability and safety transmission probability are analyzed, and closed expressions of the interference information and the safety transmission probability are deduced. The simulation result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
Further, the relay RiEnergy harvesting is carried out by utilizing partial radio frequency information, so that the energy efficiency of the network can be improved, the working time of the relay is prolonged, and meanwhile, the relay RiAnd the residual information can be utilized to provide information security relay service for the sending end.
Further, the relay RjEnergy harvesting is carried out by utilizing partial radio frequency information, so that the energy efficiency of the network can be improved, the working time of the relay is prolonged, and meanwhile, the relay RjAnd the residual information can be utilized to provide information security relay service for the sending end.
Further, the receiving end receives RiAmplifying forwarded information and RjThe transmitted interference information can be analyzed to design RjThe interference information sent.
Further, the eavesdropping end receives RiAmplifying forwarded information and RjTransmitted interference information, RiAnd RjThe transmitted interference information can interfere with the eavesdropping end, so that the security of the network is improved.
Further, the receiving end receives RiForwarded interference information and RjInterference information transmitted, R for eliminating the influence of interference information on legitimate usersjTransmitted interference information and RiThe amplified and forwarded interference information should cancel each other, so that the transmission rate and the security of the legal user can be improved.
Further, according to the private information received by the receiving end and the interception end, the corresponding legal rate and the interception rate are obtained through recommendation. And obtaining the approximate values of the legal rate and the interception rate under the condition of considering high signal-to-noise ratio.
Furthermore, the legal rate and the interception rate are obtained according to the analysis, and the security rate of the network can be obtained, which provides a basis for the design and analysis of the network.
Furthermore, a closed-form solution of the transmission interruption probability can be obtained through analysis and derivation, so that the transmission performance of information from a network sending end to a receiving end can be intuitively reflected, and a basis is provided for network design.
Furthermore, a closed-form solution of the transmission safety interruption probability can be obtained through analysis and derivation, so that the safety performance from a network sending end to an eavesdropping end can be intuitively reflected, and a basis is provided for the design of network safety transmission.
Furthermore, a closed-form solution of the safe transmission probability can be obtained through analysis and derivation, so that the performance of network safe transmission can be intuitively reflected, and a basis is provided for reasonably utilizing resources by a network.
In summary, the invention discloses a two-hop multi-relay network secure transmission scheme based on energy collection. In the scheme, the two relays collect energy by using the radio frequency spectrum information of the sending node, so that the information safety transmission of legal users is assisted, the energy efficiency of a network is improved, and the relay working time is prolonged. By reasonably designing the transmission scheme and the interference information, the influence of the interference information on legal users can be eliminated, and the safety performance of the network is improved. The transmission interruption probability, the safe interruption probability and the safe transmission probability of the scheme are obtained through analysis and deduction, and visual basis is provided for implementation of the scheme. The simulation result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
FIG. 1 is a system model diagram of a two-hop relay network based on energy collection according to the present invention;
fig. 2 is a diagram of the traversal secret capacity of the system, in which (a) is a simulation diagram of the relationship between the traversal security rate and the security outage probability, (b) is a simulation diagram of the relationship between the traversal security rate and the transmission power of the transmitting end, and (c) is a simulation diagram of the relationship between the traversal security rate and the target transmission rate.
Detailed Description
Referring to fig. 1, the invention provides a two-hop multi-relay network secure transmission method based on energy collection, considering a five-node transmission network, a legitimate user Alice wants to transmit information to Bob safely and reliably, and Eve eavesdrops on Alice's transmission data. The two relays collect energy from a portion of the radio frequency information transmitted by the transmitting node to assist in secure transmission. Assuming that the network experiences independent stationary rayleigh fading, namely: the channel state remains the same within each frame, while the channel state changes independently between different frames. In addition, each data frame is divided into two time slots, which respectively correspond to the transmission and energy collection of the private information and the interference information. The two relays respectively adopt an amplification forwarding scheme and a decoding forwarding scheme to assist the safe transmission of legal information and eliminate the influence of interference information on legal users. Finally, the transmission interruption probability, the safe interruption probability and the safe transmission probability are analyzed firstly, and the closed expressions of the transmission interruption probability, the safe interruption probability and the safe transmission probability are deduced. The numerical result verifies the performance analysis result of the scheme, and shows the performance advantage of the scheme in the aspect of traversing the safe transmission rate.
The invention relates to a two-hop multi-relay network safety transmission method based on energy collection, which comprises the following steps:
s1, the sending node transmits private information and interference information;
s2, after receiving the signal of step S1, relaying RiAnd RjHarvesting part of the received signal energy using an energy harvesting mechanism, and subsequently relaying RiPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjAnd a decoding forwarding scheme is adopted to send a new interference signal, and both a receiving end and an eavesdropping end can receive relay transmission information. Interference information is designed, so that the influence of interference on legal users is eliminated, and the secure transmission of the private information of the source node is completed.
The source node adopts a power distribution method to send private information and interference information, and the relay RiReceiving a signal:
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjFor interference information, niIs RiThe reception noise of (b).
Relaying R according to the energy harvesting mechanismiThe collected energy:
wherein eta is the coefficient of energy conversion efficiency, and is in [0,1 ]]Taking the value; gaiFor sender-to-relay RiThe channel power gain of (a).
Relay RjReceiving a signal:
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjThe reception noise of (b).
Relaying R according to the energy-cut principlejThe collected energy:
wherein, gajFor sender-to-relay RjThe channel power gain of (a).
The signals of the receiving node are:
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power of transmission, hibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference information, gaiFor sender-to-relay RiChannel power gain of nbIs the noise variance of the receiving node.
Binding relay RiAnd RjThe signal of department, eavesdropping end receive the private information:
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neIs a noise variable at the eavesdropping end.
To reduce interference at the receiving end, RjOf the interference signal xrjThe following should be satisfied:
however, because
Wherein h isjeIs RjPath gain to eavesdropping end, relay RjThe interference signal can eliminate the influence of interference information on the transmitting end, and the safety of the network is improved.
When the sending end sends data, the information transmission rate of the receiving end is as follows:
wherein, gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end.
At this time, the eavesdropping end also receives the cognitive private information, and the decoding rate of the cognitive private information is as follows:
wherein, gieAnd gjeAre respectively a relay RiAnd RjChannel power gain to the eavesdropping end.
At this time, the security rate of the private information is:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a)。
Due to CabAnd CaeIs too complex, so high signal-to-noise ratio regions are considered for analysis, then CabAnd CaeCan be written as:
When the decoding rate is lower than the predetermined target transmission rate RbWhen the network is in use, transmission interruption occurs;when the interception rate of the interception end is higher than the target interception rate Re=Rb-Rs(wherein R issPrivacy rate), a security disruption of the network may occur.
For the proposed solution
1) The transmission outage probability is:
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
2) The safe outage probability is:
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
3) The secure transmission probability is:
in order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Simulation verification
1) As can be seen from (a) in fig. 2, as the privacy break probability limit increases, the traversal security transmission rate of the system will also become larger. This is because the greater the safety interruption probability limit, the easier it is to meet the safety transmission requirements of the network, and therefore the traversal safety transmission rate will increase. Furthermore, a conventional joint cooperative relay and cooperative interference scheme including two relays can be seen, which is less secure than the proposed scheme since noise generated at the receiver by the interfering signal cannot be cancelled out. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
2) As can be seen from (b) in fig. 2, with the transmission power PsThe traversal security rate of the system will also become greater. This is because, with PsWith the increase, the sending end can provide more energy for relay use to perform secure transmission, so the traversal privacy security rate of the network is increased. Furthermore, a conventional joint cooperative relay and cooperative interference scheme including two relays can be seen, which is less secure than the proposed scheme since noise generated at the receiver by the interfering signal cannot be cancelled out. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
3) As can be seen from (c) in fig. 2, with the target transmission rate RbThe traversal security rate of the system will decrease. This is because, with RbThe network is difficult to meet the requirement of reliable transmission, so that the safe transmission opportunity available in the network is reduced, and the traversing privacy safety rate of the network is reduced. Furthermore, it can be seen that the conventional joint cooperative relay and cooperative interference scheme including two relays has a safety ratio higher than that of the proposed scheme because noise generated at the receiver by the interference signal cannot be cancelled outIs low. The performance of the conventional cooperative relaying scheme is also lower than the proposed scheme due to the absence of cooperative interference.
The above-mentioned contents are only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited thereby, and any modification made on the basis of the technical idea of the present invention falls within the protection scope of the claims of the present invention.
Claims (4)
1. A two-hop multi-relay network security transmission method based on energy collection is characterized by comprising the following steps:
s1, transmitting the private information and the interference information, wherein the security rate of the private information is as follows:
Rsec=(Cab-Cae)+
wherein (a)+=max(0,a),CabFor cognitive private information transfer rate at the receiving end, CaeDecoding rate of the cognitive private information of the eavesdropping end;
s2 Relay RiAnd RjThe reaping part of the energy reaping mechanism is adopted to receive the interference information transmitted in the step S1, and R is relayediPrivate information and interference information are forwarded by adopting an amplifying and forwarding relay protocol, and a relay RjA decoding forwarding scheme is adopted to send new interference information, both a receiving end and an eavesdropping end receive relay transmission information, and the influence of interference on legal users is eliminated by designing the interference information, so that the secure transmission of private information of a source node is completed;
relay RiThe information received at step S1 is:
wherein, beta1Is RiPower division coefficient of PsAlpha is the power distribution coefficient of the transmitting end, haiFor sender-to-relay RiPath gain of (x)sFor normalized cognitive privacy information, xjTo be normalizedQuantized interference information, niIs RiThe reception noise of (d);
relaying R according to the energy harvesting mechanismiThe collected energy:
wherein eta is an energy conversion efficiency coefficient; gaiFor sender-to-relay RiThe channel power gain of (a);
relay RjThe information received at step S1 is:
wherein, beta2Is RjPower division coefficient of (h)ajFor sender-to-relay RjPath gain of (n)jIs RjReceive noise of
Relaying R according to the principle of energy harvestingjThe energy collected here is:
wherein, gajFor sender-to-relay RjChannel power gain of, relay RjOf the interference signal xrjSatisfies the following formula:
the information received by the receiving end is:
wherein N is0As variance of noise, PiAnd PjAre each RiAnd RjMaximum power h of transmissionibAnd hjbAre each RiAnd RjPath gain to the receiving end, xrjIs RjForwarded interference signal, nbA noise variance for the receiving node;
the transmission rate of the information at the receiving end is
gibAnd gjbAre each RiAnd RjChannel power gain to the receiving end;
the information received by the eavesdropping terminal is as follows:
wherein h isieIs RiPath gain to eavesdropping end, hjeIs RjChannel coefficient to eavesdropping end, neNoise variable of eavesdropping end;
the interception rate of the interception end is as follows:
wherein, gieAnd gjeAre each RiAnd RjChannel power gain to the eavesdropping end.
2. The method according to claim 1, wherein the transmission interruption probability of the transmission method in step S2 is:
wherein λ isaiIs a transmitting end to RiOf the channel variance, λibIs RiChannel variance, R, to the receiving endbFor the target transmission rate of the network, K1(. cndot.) is a first order modified Bessel function of the second type.
3. The method according to claim 1, wherein the probability of the abort safety of the transmission method in step S2 is:
wherein λ isieIs RiChannel variance, lambda, to eavesdropping endjeIs RjChannel variance to eavesdropping end, ReFor a target eavesdropping rate of the network,2F1(. cndot.) is a super-geometric series.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683555.3A CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683555.3A CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430566A CN110430566A (en) | 2019-11-08 |
CN110430566B true CN110430566B (en) | 2020-12-25 |
Family
ID=68412772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910683555.3A Active CN110430566B (en) | 2019-07-26 | 2019-07-26 | Two-hop multi-relay network secure transmission method based on energy collection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430566B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112272183B (en) * | 2020-10-29 | 2022-04-01 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248414B (en) * | 2013-04-17 | 2016-08-10 | 重庆邮电大学 | A kind of based on interference alignment and many relayings double bounce transmission method of wave beam forming |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106413074B (en) * | 2016-10-11 | 2019-01-18 | 西北工业大学 | A kind of optimal power allocation method of untrusted junction network under imperfect CSI |
CN106533606B (en) * | 2016-10-28 | 2019-01-08 | 国网山东省电力公司莱芜供电公司 | A kind of safe transmission method of physical layer of single antenna amplification forwarding junction network |
CN108601019B (en) * | 2018-03-27 | 2021-01-15 | 西北工业大学 | Safe transmission method of untrusted relay bidirectional transmission network based on relay selection |
CN109861728B (en) * | 2019-02-21 | 2021-06-18 | 哈尔滨工程大学 | Joint multi-relay selection and time slot resource allocation method for large-scale MIMO system |
CN109995413B (en) * | 2019-05-06 | 2020-07-28 | 西安交通大学 | Relay-assisted environment backscattering communication method |
-
2019
- 2019-07-26 CN CN201910683555.3A patent/CN110430566B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110430566A (en) | 2019-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dong et al. | Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper | |
Chen et al. | Multiuser two-way relaying: detection and interference management strategies | |
CN110087278B (en) | Safe transmission method in wireless energy-carrying cooperative network with cooperative interference | |
CN109525984B (en) | Method for improving safety rate of untrusted relay energy-carrying communication system | |
Kader et al. | Cooperative non‐orthogonal multiple access with SWIPT over Nakagami‐m fading channels | |
Feng et al. | Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks | |
Pandey et al. | Performance evaluation of amplify‐and‐forward relaying cooperative vehicular networks under physical layer security | |
Abd El-Malek et al. | New bandwidth efficient relaying schemes in cooperative cognitive two-way relay networks with physical layer security | |
CN111107547B (en) | Secure transmission method of alternate relay network in eavesdropping environment | |
Xu et al. | On the hybrid relaying protocol for time division broadcasting | |
Alves et al. | Outage, throughput and energy efficiency analysis of some half and full duplex cooperative relaying schemes | |
CN110430566B (en) | Two-hop multi-relay network secure transmission method based on energy collection | |
Khuntia et al. | A bidirectional relay-assisted underlay device-to-device communication in cellular networks: An IoT application for FinTech | |
Shokair et al. | Statistical analysis of a class of secure relay assisted cognitive radio networks | |
Xu et al. | Secrecy-enhancing design for two-way energy harvesting cooperative networks with full-duplex relay jamming | |
CN115278662A (en) | Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy | |
Huang et al. | Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection | |
Yuan et al. | Optimal transmission power allocation for two-way relay channel using analog network coding | |
Zhang et al. | A novel half-jamming protocol for secure two-way relay systems using a full-duplex jamming relay | |
Gao et al. | Secure power allocation of two-way relaying with an untrusted denoise-and-forward relay | |
Cao et al. | Joint source-relay selection for improving wireless physical-layer security | |
Jia et al. | Performance analysis of hybrid DAF based incremental relaying cooperative system | |
Mallat et al. | Secure two-user AF relaying networks using cooperative jamming | |
Krikidis | Stability analysis for bidirectional MABC-DF relay networks with bursty traffic | |
Andrawes et al. | Survey on performance of adaptive modulation scheme with cooperative diversity in wireless systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240126 Address after: 710072 Qing'an Park 2-310-21, No. 9 Gaoxin Second Road, High tech Zone, Xi'an City, Shaanxi Province Patentee after: Xi'an Xunshi Youdao Information Technology Co.,Ltd. Country or region after: China Address before: Beilin District Shaanxi province Xi'an City friendship road 710072 No. 127 Patentee before: Northwestern Polytechnical University Country or region before: China |
|
TR01 | Transfer of patent right |