CN110740492B - Security access strategy in heterogeneous network with maximized security capacity - Google Patents

Security access strategy in heterogeneous network with maximized security capacity Download PDF

Info

Publication number
CN110740492B
CN110740492B CN201911026799.0A CN201911026799A CN110740492B CN 110740492 B CN110740492 B CN 110740492B CN 201911026799 A CN201911026799 A CN 201911026799A CN 110740492 B CN110740492 B CN 110740492B
Authority
CN
China
Prior art keywords
user
security
capacity
base station
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911026799.0A
Other languages
Chinese (zh)
Other versions
CN110740492A (en
Inventor
高媛媛
王世界
李亦高
臧国珍
沙楠
郭明喜
刘笑辰
张广娜
黄晟
王小雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Army Engineering University of PLA
Original Assignee
Army Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Army Engineering University of PLA filed Critical Army Engineering University of PLA
Priority to CN201911026799.0A priority Critical patent/CN110740492B/en
Publication of CN110740492A publication Critical patent/CN110740492A/en
Application granted granted Critical
Publication of CN110740492B publication Critical patent/CN110740492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A security access strategy in a heterogeneous network with maximized security capacity belongs to an information security technology in the field of wireless communication, and relates to a physical layer security technology. The invention designs a simple and practical access strategy in consideration of a large amount of co-band interference possibly existing in a heterogeneous network, and the invention performs base station access based on the maximum safety capacity criterion so as to improve the safety performance obtained by a user and enable the safety performance of the user to approach the safety performance of the user under the maximum safety capacity criterion.

Description

Security access strategy in heterogeneous network with maximized security capacity
Technical Field
The invention belongs to an information security technology in the field of wireless communication, relates to a physical layer security technology, and discloses a security access strategy in a heterogeneous network with maximized security capacity.
Background
The rapid development of wireless communication technology brings great convenience to the life of people, but due to the inherent openness characteristic, the wireless communication is easy to be intercepted by the outside, which brings serious threat to the communication safety. How to prevent important information from being intercepted illegally and guarantee the safety of communication is one of the hot problems of research in the communication field.
There are two main types of current information security technologies (document [1 ]): one is a traditional cryptography-based security policy and the other is a security policy based on physical layer security techniques. The traditional security strategy considers that the calculation capacity of an eavesdropper is limited, and the password cannot be effectively decoded within a limited time. However, with the development of large-scale computing technologies (document [2]) such as big data and cloud computing, the computing power of an eavesdropper can be unprecedentedly enhanced, resulting in a higher risk of the encryption method. The physical layer security technology is based on the information theory principle, reliable security can be obtained on the basis of reasonably designing channel coding, and the communication security of the system is not influenced by the computing capability of an eavesdropper.
The concept of physical layer security technology was first proposed at 1949 (document [3]), and document [4] [5] investigated the system security capacity of communication according to the uncertainty of the radio channel. In order to solve the problem of how to increase the safety capacity of the system, a great deal of research is carried out in the academic world (document 6). In cellular networks and heterogeneous networks, the security of the system can be effectively improved by reasonably designing the access policy of the user for selecting the base station (document [7 ]).
Current research on user access strategies focuses mainly on how to boost the received signal power of the user. In view of how to improve the user security performance through access, document [8] proposes a maximum security capacity access policy. However, the document [8] only studies the high signal to interference and noise ratio scenario, i.e. does not consider the problem of co-band interference of heterogeneous networks. Document [7] comprehensively studies the maximum received power access and maximum safe capacity access strategies, but also does not consider the problems of small-scale fading and co-band interference. The invention designs a practical maximum safe capacity access strategy, and a user obtains better safety performance by accessing the base station with the maximum safe capacity on the premise that the base station can acquire the position information of a potential eavesdropper and the user. The invention has the significance of designing a reasonable and practical safety access strategy and realizing the enhancement of the safety performance of the user.
Reference to the literature
[1]Bloch M,Barros J,Rodrigues M R D,et al.Wireless Information-Theoretic Security[J].IEEE Transactions on Information Theory,2008,54(6):2515-2534.
[2] Shao Xiaohui, Quyuan Xiang, le Huan, cloud computing and omnibearing multi-angle information security technology research and practice under big data environment [ J ] science and technology report, 2017,33(1):76-79.
[3]Wyner A D.The Wire-Tap Channel[J].Bell Syst.tech.j,1975,54(8):1355-1387.
[4]Csiszar I,Korner J.Broadcast channels with confidential messages[M].IEEE Press,1978.
[5]Leung-Yan-Cheong S,Hellman M E.The Gaussian wire-tap channel[J].Information Theory IEEE Transactions on,1978,24(4):451-456.
[6]Liu Y,Chen H H,Wang L.Physical Layer Security for Next Generation Wireless Networks:Theories,Technologies,and Challenges[J].IEEE Communications Surveys&Tutorials,2017,PP(99):1-1.
[7]Wang H,Zhou X,Reed M C.Physical Layer Security in Cellular Networks:A Stochastic Geometry Approach[J].IEEE Transactions on Wireless Communications,2013,12(6):2776-2787.
[8].Wu H,Tao X,Li N,et al.Secrecy Outage Probability in Multi-RAT Heterogeneous Networks[J].IEEE Communications Letters,2016,20(1):53-56.
Disclosure of Invention
The invention aims to solve the problems that: considering the situation of the existence of the same-band interference in the heterogeneous network, how to reasonably select the base station for access to obtain better security performance is researched.
The technical scheme of the invention is as follows: a security access strategy in a heterogeneous network with maximized security capacity comprises a large number of uniformly distributed different-layer base stations, a large number of uniformly distributed users and a large number of uniformly distributed eavesdroppers, wherein the users select the base stations to access according to a maximum security capacity access strategy, and the maximum security capacity access strategy specifically comprises the following steps:
Figure BDA0002248892850000021
Figure BDA0002248892850000022
layers representing all base stations,. phitRepresents all the t-th base stations, (t, i) represents the ith base station of the t-th layer, zt,iAnd ze,t,iDistance, beta, of legal channel and eavesdropping channel of ith base station of t layertFor the quantity to be optimized, the safety performance of user connection is determined, and when the user accesses, only the distance information z between the user and the base station and between the base station and the eavesdropper is needed to be obtainedt,iAnd ze,t,iAccess under the maximum safe capacity criterion can be performed.
The channel conditions of the heterogeneous network are large-scale fading and Rayleigh fading related to distance, the same-band interference exists among cells, different users in the same cell do not have the mutual interference, and the coding mode of communication comprises Turbo codes, Polar codes and LDPC codes.
The invention has the following progress:
1. the base station is selected to access based on the maximum safety capacity criterion, so that the safety performance obtained by a user is improved;
2. considering a large amount of same-band interference possibly existing in a heterogeneous network, the invention designs a simple and practical access strategy, so that the safety performance of a user approaches the safety performance of the user under the maximum safety capacity criterion;
3. based on the security access policy of the present invention, the security performance of the user side can be predicted.
Drawings
Fig. 1 is a system model for secure access of a user in a heterogeneous network.
Fig. 2 is a simulation diagram of a relationship between a user connection probability and a base station density under different access policies in the first embodiment of the present invention.
Fig. 3 is a simulation diagram of a relationship between user security probability and base station density under different access policies in the second embodiment of the present invention.
Fig. 4 is a simulation diagram of a relationship between user security throughput and base station density under different access policies in a third embodiment of the present invention.
Detailed Description
The system model diagram of the invention is shown in FIG. 1, and the heterogeneous network comprises a large number of uniformly distributed base stations phi of different layers1,Φ2…ΦkUser phiuAnd eavesdropper ΦeOf density respectively λt、λuAnd λe. The channel conditions are assumed to be large scale fading and rayleigh fading, which are distance dependent. The same-band interference exists between cells, and different users in the same cell do not interfere with each other due to the adoption of an FDD or TDD mode. And the user selects and accesses the base station based on the maximum safe capacity access strategy.
The user selects a base station for access according to the maximum safe capacity access strategy, which specifically comprises the following steps:
Figure BDA0002248892850000031
wherein P istIs the transmission power of the t-th base station, IlInterference strength for legitimate clients, IeFor interference at the eavesdropper sideStrength. z is a radical oft,iAnd ze,t,iThe distance between a legal channel and an eavesdropping channel of the ith base station of the t layer is respectively, and alpha is a fading coefficient related to the distance.
Figure BDA0002248892850000032
And
Figure BDA0002248892850000033
the probability density function of the interference intensity of the legal user terminal and the eavesdropper terminal respectively. It can be seen that the above access strategy is difficult to implement when the probability density function of the interference strength of the legitimate user terminal and the eavesdropper terminal is unknown. The invention provides a simple and practical access strategy to approach the performance of the scheme.
The present invention is embodied as follows.
1. Secure access policy
When a user selects a base station for secure access, the base station needs to know distance information between the user and a potential eavesdropper with the base station before communication. The following access strategies are used for base station selection:
Figure BDA0002248892850000041
wherein
Figure BDA0002248892850000046
Layers representing all base stations,. phitDenotes all the t-th base stations, zt,iAnd ze,t,iThe distances of a legal channel and an eavesdropping channel of the ith base station of the t layer are respectively. Beta is atThe quantity to be optimized is determined according to the safety performance of the user connection. When the user accesses, only the distance information z between the user and the base station and between the base station and the eavesdropper is needed to be obtainedt,iAnd ze,t,iAccess under maximum safe capacity criteria can be made.
Assuming the densities of different layers of base stations, users and eavesdroppers in the heterogeneous network are respectively lambdat、λuAnd λe. The channel condition being large-scale fading in dependence on distanceAnd rayleigh fading. The same-band interference exists between cells, and different users in the same cell do not interfere with each other due to the adoption of an FDD or TDD mode.
Defining a connection probability P of a usercWhen the bandwidth is W, the capacity of a legal channel is greater than or equal to a set threshold value RtProbability of (c):
Pc=P{W log(1+SINR)≥Rt} (3)
wherein, the SINR represents the signal-to-interference-and-noise ratio of the legal channel, and the connection probability using the access strategy can be calculated as:
Figure BDA0002248892850000042
wherein DtRepresents the farthest access threshold, P, of the t-th base stationkRepresents the downlink power of the kth base station, i.e. the transmission power, and the above formula represents that for the t-th base station, the integral derivation is performed within the threshold range,
Figure BDA0002248892850000043
Figure BDA0002248892850000044
satisfy the requirement of
Figure BDA0002248892850000045
Defining a user's security probability PsWhen the bandwidth is W, the capacity of the eavesdropping channel is smaller than a set threshold value ReProbability of (c):
Ps=P{W log(1+SINRe)<Re} (6)
SINRethe signal-to-interference-and-noise ratio of the intercepted channel is represented, and the security probability adopting the access strategy can be calculated as follows:
Figure BDA0002248892850000051
wherein z iseIndicating the distance of the eavesdropping channel to be eavesdropped,
Figure BDA0002248892850000052
alpha is a fading coefficient related to the distance,
Figure BDA0002248892850000053
defining a user's secure throughput Θ (R)t,Re) For data rates that the user can transmit correctly and safely:
Figure BDA0002248892850000054
the secure throughput using this access policy can be calculated as
Figure BDA0002248892850000055
Determining beta according to the calculation formula of the connection probability, the safety probability and the safety throughput obtained by adopting the maximum safety capacity access strategy and taking the best safety performance as a targett
The invention enhances the enhancement of the security performance of the heterogeneous network by reasonably designing the access strategy of the user, and the coding mode of the communication comprises a Turbo code, a Polar code and an LDPC code.
In the invention, when a user selects a base station for access, the user selects the base station according to the criterion of the maximum safe capacity, and particularly, the user selects the base station by adopting the mode of the formula (2) under the condition that the same-band interference exists in a heterogeneous network.
2. Simulation of experiment
Suppose there is a layer 2 base station in the communication system, and the transmission power of the base station is P110W and P22W. The distribution density of users is lambdau=2.5nodes/(π5002m2). Distribution density of eavesdroppers is lambdae=10nodes/(π5002m2). The channel fading coefficient is α -3. Threshold value R t1 and Re=0.0353。
Embodiment one simulates the relation between the connection probability of the user and the base station density and compares the present invention with the maximum safe capacity access policy, the policy of document [1 ].
As can be seen from fig. 2, the connection performance of the user brought by the access policy proposed by the present invention can be well described by the theoretical formula in the present invention. The connection performance brought by the proposed strategy can approach the maximum safe capacity access strategy, which is superior to the strategy of document [8 ]. Meanwhile, as the density of the base stations increases, the connection probability of the users decreases, but the decrease trend is slower.
The second embodiment simulates the relationship between the security probability of the user and the density of the base station, and compares the present invention with the maximum security capacity access policy, the policy of document [8 ].
As can be seen from fig. 3, the security performance of the user brought by the access policy proposed by the present invention can be well described by the theoretical formula in the present invention. The security performance brought by the proposed policy can approach the maximum security capacity access policy, which is superior to the policy of document [8 ]. Meanwhile, with the increase of the density of the base stations, the safety probability of the users is obviously improved.
The third embodiment simulates the relation between the secure throughput of the user and the base station density and compares the present invention with the maximum secure capacity access policy, the policy of document [8 ].
As can be seen from fig. 4, the safety throughput performance of the user brought by the access policy proposed by the present invention can be well described by the theoretical formula in the present invention. The security throughput brought by the proposed strategy can approach the maximum security capacity access strategy, which is superior to the strategy of document [8 ]. Meanwhile, as the density of base stations increases, the safety throughput of users is significantly improved.

Claims (2)

1. A security access strategy method in a heterogeneous network with maximized security capacity is characterized in that the heterogeneous network comprises a large number of uniformly distributed different-layer base stations, a large number of uniformly distributed users and a large number of uniformly distributed eavesdroppers, the users select the base stations to access according to a maximum security capacity access strategy, and the maximum security capacity access strategy specifically comprises the following steps:
Figure FDA0003188326480000011
Figure FDA0003188326480000015
layers representing all base stations,. phitRepresents all the t-th base stations, (t, i) represents the ith base station of the t-th layer, zt,iAnd ze,t,iDistance, beta, of legal channel and eavesdropping channel of ith base station of t layertFor the quantity to be optimized, the safety performance of user connection is determined, and when the user accesses, only the distance information z between the user and the base station and between the base station and the eavesdropper is needed to be obtainedt,iAnd ze,t,iThe access under the maximum safe capacity criterion can be carried out;
setting the densities of different layers of base stations, users and eavesdroppers in the heterogeneous network as lambdat、λuAnd λeThe channel condition is large-scale fading and Rayleigh fading related to distance, the same-band interference exists among cells, the mutual interference does not exist among different users in the same cell, and the safety performance prediction method for the access of the user selection base station is as follows:
defining a connection probability P of a usercWhen the bandwidth is W, the capacity of a legal channel is greater than or equal to a set threshold value RtProbability of (c):
Pc=P{W log(1+SINR)≥Rt}
wherein the SINR represents the signal-to-interference-and-noise ratio of a legal channel, and the connection probability using the maximum safe capacity access policy is calculated as:
Figure FDA0003188326480000012
wherein D istRepresents the farthest access threshold, P, of the t-th base stationkIndicates the downlink power of the kth base station,
Figure FDA0003188326480000013
satisfy the requirement of
Figure FDA0003188326480000014
Defining a user's security probability PsWhen the bandwidth is W, the capacity of the eavesdropping channel is smaller than a set threshold value ReProbability of (c):
Ps=P{W log(1+SINRe)<Re}
wherein the SINReAnd representing the signal-to-interference-and-noise ratio of the intercepted channel, wherein the security probability of the access strategy adopting the maximum security capacity is calculated as follows:
Figure FDA0003188326480000021
wherein z iseIndicating the distance of the eavesdropping channel to be eavesdropped,
Figure FDA0003188326480000022
alpha is a fading coefficient related to the distance,
Figure FDA0003188326480000023
defining a user's secure throughput Θ (R)t,Re) For data rates that the user can transmit correctly and safely:
Figure FDA0003188326480000024
the secure throughput using the maximum secure capacity access policy is calculated as:
Figure FDA0003188326480000025
determining beta according to the calculation formula of the connection probability, the safety probability and the safety throughput obtained by adopting the maximum safety capacity access strategy and taking the best safety performance as a targett
2. The method of claim 1, wherein the coding scheme for the user communication with the base station includes Turbo code, Polar code, and LDPC code.
CN201911026799.0A 2019-10-26 2019-10-26 Security access strategy in heterogeneous network with maximized security capacity Active CN110740492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911026799.0A CN110740492B (en) 2019-10-26 2019-10-26 Security access strategy in heterogeneous network with maximized security capacity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911026799.0A CN110740492B (en) 2019-10-26 2019-10-26 Security access strategy in heterogeneous network with maximized security capacity

Publications (2)

Publication Number Publication Date
CN110740492A CN110740492A (en) 2020-01-31
CN110740492B true CN110740492B (en) 2021-10-01

Family

ID=69271522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911026799.0A Active CN110740492B (en) 2019-10-26 2019-10-26 Security access strategy in heterogeneous network with maximized security capacity

Country Status (1)

Country Link
CN (1) CN110740492B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108092737A (en) * 2018-01-08 2018-05-29 中国民航大学 The relaying unmanned aerial vehicle flight path planing method of criterion is maximized based on secrecy capacity
CN108124253A (en) * 2017-11-14 2018-06-05 杭州电子科技大学 A kind of wireless multi-hop network Route Selection and power distribution method for considering safety
CN109150855A (en) * 2018-08-01 2019-01-04 中国人民解放军陆军工程大学 A kind of robustness secure wireless communication transmission method optimizing power resource
CN109348475A (en) * 2018-09-14 2019-02-15 南京邮电大学 A kind of safety of physical layer optimization method based on isomery wireless transmission scheduling
CN109982407A (en) * 2019-01-07 2019-07-05 广州番禺职业技术学院 Secure transmission system and its method in NOMA system based on relay selection
CN110381503A (en) * 2019-06-21 2019-10-25 西安交通大学 The interference blocking scheme switching method of millimeter wave cellular network uplink safe transmission
CN110730452A (en) * 2019-10-25 2020-01-24 中国人民解放军陆军工程大学 Performance analysis method of combined relay and interference selection scheme in wireless communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8781125B2 (en) * 2007-03-09 2014-07-15 Georgia Tech Research Corporation Systems and methods of secure coding for physical layer communication channels

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124253A (en) * 2017-11-14 2018-06-05 杭州电子科技大学 A kind of wireless multi-hop network Route Selection and power distribution method for considering safety
CN108092737A (en) * 2018-01-08 2018-05-29 中国民航大学 The relaying unmanned aerial vehicle flight path planing method of criterion is maximized based on secrecy capacity
CN109150855A (en) * 2018-08-01 2019-01-04 中国人民解放军陆军工程大学 A kind of robustness secure wireless communication transmission method optimizing power resource
CN109348475A (en) * 2018-09-14 2019-02-15 南京邮电大学 A kind of safety of physical layer optimization method based on isomery wireless transmission scheduling
CN109982407A (en) * 2019-01-07 2019-07-05 广州番禺职业技术学院 Secure transmission system and its method in NOMA system based on relay selection
CN110381503A (en) * 2019-06-21 2019-10-25 西安交通大学 The interference blocking scheme switching method of millimeter wave cellular network uplink safe transmission
CN110730452A (en) * 2019-10-25 2020-01-24 中国人民解放军陆军工程大学 Performance analysis method of combined relay and interference selection scheme in wireless communication system

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
Improving physical-layer security in wireless communications using diversity techniques;Yulong Zou,Jia Zhu,Xianbin Wang,Victor C.M. Leung;《IEEEXplore》;20150126;全文 *
Physical layer security enhancement with generalized selection diversity combining;Li Chen,Ying Yang,Guo Wei;《IEEEXplore》;20131111;全文 *
一种有效提高RFID系统物理层安全性能的方法;宋慧颖;《万方数据》;20181123;全文 *
协同安全传输系统中最佳中继选择技术研究;张倩倩;《万方数据》;20161014;全文 *
多天线RFID系统物理层安全优化方案的研究;宋慧颖;《万方数据》;20180124;全文 *
无线网络的物理层安全问题研究;陈涛;《中国优秀博士学位论文全文数据库(电子期刊)》;20131130;全文 *
网络空间安全体系与关键技术;罗军舟;《万方数据》;20161231;全文 *
衰落环境下无线认知中继网络传输性能与物理层安全研究;陈蕾;《中国优秀硕士学位论文全文数据库(电子期刊)》;20170228;全文 *

Also Published As

Publication number Publication date
CN110740492A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
Cao et al. Achieving reliable and secure communications in wireless-powered NOMA systems
Shirvanimoghaddam et al. On the fundamental limits of random non-orthogonal multiple access in cellular massive IoT
Pedhadiya et al. Device to device communication: A survey
AU2020100505A4 (en) Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System
Liu et al. On ergodic secrecy capacity of random wireless networks with protected zones
Xiang et al. Cache-aided non-orthogonal multiple access: The two-user case
CN110381503B (en) Interference blocking scheme switching method for uplink safe transmission of millimeter wave cellular network
Lv et al. Guard zone based interference management for D2D-aided underlaying cellular networks
Liu et al. Power allocation for energy efficiency maximization in downlink CoMP systems with NOMA
Li et al. Secrecy outage analysis for Alamouti space–time block coded non-orthogonal multiple access
Yu et al. Secrecy energy efficiency optimization for downlink two-user OFDMA networks with SWIPT
Zeng et al. On the performance of pattern division multiple access in 5G systems
Song et al. Physical layer security in cognitive millimeter wave networks
Zhao et al. Caching-aided physical layer security in wireless cache-enabled heterogeneous networks
Thieu et al. Outage protection for cellular-mode users in device-to-device communications through stochastic optimization
Sreya et al. Adaptive rate NOMA for cellular IoT networks
Zheng et al. Secure content delivery in two-tier cache-enabled mmWave heterogeneous networks
Chaudhary et al. SecGreen: Secrecy ensured power optimization scheme for software-defined connected IoV
CN110740492B (en) Security access strategy in heterogeneous network with maximized security capacity
Zhang et al. Physical layer security in iot: A spatial-temporal perspective
CN110856166B (en) Interference selection-based idle user cooperative interference method in cellular network
KR101332025B1 (en) Method for user scheduling considering inter-cell interference and wireless mobile communication system
Liu et al. Dynamic power allocation scheme with clustering based on physical layer security
Fang et al. Security analysis for interference management in heterogeneous networks
Chae et al. Distributed multi-radio access control for decentralized OFDMA multi-RAT wireless networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant