CN111262644A - Transmission method for improving safety performance of edge computing system - Google Patents

Transmission method for improving safety performance of edge computing system Download PDF

Info

Publication number
CN111262644A
CN111262644A CN202010047267.1A CN202010047267A CN111262644A CN 111262644 A CN111262644 A CN 111262644A CN 202010047267 A CN202010047267 A CN 202010047267A CN 111262644 A CN111262644 A CN 111262644A
Authority
CN
China
Prior art keywords
edge computing
signal
terminal
secret
computing device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010047267.1A
Other languages
Chinese (zh)
Inventor
宋欢欢
文红
徐鑫辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN202010047267.1A priority Critical patent/CN111262644A/en
Publication of CN111262644A publication Critical patent/CN111262644A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • H04B17/3911Fading models or fading generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/62Jamming involving special techniques by exposing communication, processing or storing systems to electromagnetic wave radiation, e.g. causing disturbance, disruption or damage of electronic circuits, or causing external injection of faults in the information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a transmission method for improving the security performance of an edge computing system, which comprises the following steps: the edge computing equipment isolates a potential illegal terminal out of a circular area in a physical patrol mode; according to the power of the transmitted signal and the space propagation environment, the edge computing equipment determines the radiation range of the signal; the edge computing equipment collects communication network information, determines power distribution of a secret signal and an artificial noise signal through a transmission mode of combining artificial noise and safe beam forming, and transmits the secret signal to a legal terminal. The invention physically provides natural security guarantee for a legal terminal by utilizing a method of a security protection area, prevents a malicious terminal of any adjacent edge computing equipment from stealing a confidential signal, saves power for an energy-limited edge computing system and improves the security performance of the system.

Description

Transmission method for improving safety performance of edge computing system
Technical Field
The invention relates to the field of information theory security, in particular to a transmission method for improving the security performance of an edge computing system.
Background
In the future, a communication system is responsible for various large data transmission and forwarding tasks, and the explosive growth of data not only increases the management difficulty of the communication system, but also faces unprecedented security threats, so that a safer and more reliable transmission medium is needed. The edge computing migrates all computing tasks or part of computing tasks of a traditional cloud computing model to network edge equipment in a near-node deployment mode, and the edge side can better meet communication requirements in the aspects of matching big data, energy consumption, instantaneity, safety and the like of edge terminal equipment. However, the edge computing device is close to a plurality of terminals, the terminals with limited resources are widely distributed and are very easy to attack, and compared with the cloud platform, the edge computing node security protection method is poor in security protection capability, and the problem to be solved is to protect the edge computing node security.
The physical characteristic safe transmission technology fully utilizes the openness of a wireless channel, and enhances the signal receiving quality of a legal communication terminal and/or reduces the signal receiving quality of an illegal terminal by adaptively optimizing system resources, thereby realizing the reliable and safe transmission of the system. Meanwhile, the physical characteristic secure transmission can be well compatible with the existing communication system, has higher practical deployment feasibility, and can adapt to the security requirement of the future emerging communication service, thereby being favored in the field of secure communication.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a transmission method for improving the security performance of an edge computing system.
The purpose of the invention is realized by the following technical scheme: a transmission method for improving the security performance of an edge computing system comprises the following steps:
s1, establishing a transmission model of an edge computing system:
the edge computing device Alice prepares to transmit a security signal to the legitimate terminal Bob, the security signalA plurality of illegal terminals are hidden around a communication link to prepare for eavesdropping on secret signals at any moment; assuming that Alice configures N transmitting antennas, Bob configures a single receiving antenna, and each illegal terminal configures a single receiving antenna; alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a); assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE(ii) a The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular region of (a); due to path loss and fading in the communication space, the radiation range of the transmitted signal is a radius R2The wireless channel is modeled into an independent same-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α being more than or equal to 2, and the channels from the edge computing equipment Alice to the legal terminal Bob and the k-th illegal terminal are represented as
Figure BDA0002369880200000021
Wherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
Figure BDA0002369880200000022
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2
S4, the edge computing device transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, channel information is fed back to the edge computing device through a lossless feedback link;
s5, after the edge computing equipment obtains channel information, transmitting a secret signal by using a maximum ratio transmission beam forming strategy; meanwhile, in order to enhance the safe transmission quality, the edge computing device uses a part of the transmission power to transmit an artificial noise signal to disturb a potential illegal terminal, and the artificial noise signal is designed in a null space of a legal communication link and cannot influence the receiving quality of the legal terminal;
and S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
The invention has the beneficial effects that: the invention utilizes the safety protection area to combine with the artificial noise strategy, reduces the safety interruption probability of the edge computing system and improves the safety transmission performance of the confidential signals.
Drawings
FIG. 1 is a flow chart of the method of the present invention
FIG. 2 is a schematic diagram of a transmission model of an edge computing system.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
The invention is an improvement of a scheme based on a safety protection area and artificial noise, the current research based on the safety protection area is based on a single-transmitting single-receiving antenna, the safety strategy is simpler, and an approximate solution of the safety problem is generally obtained. The invention develops research under a multi-antenna system, and utilizes a one-dimensional linear search algorithm to obtain accurate power distribution of safety problems so as to realize optimal safety performance, and particularly,
as shown in fig. 1, a transmission method for improving security performance of an edge computing system includes the following steps:
s1, establishing a transmission model of an edge computing system:
as shown in fig. 2, the edge computing device Alice in the system is prepared to transmit a secure signal to the legitimate terminal Bob, around which many illegitimate terminals are hidden to prepare to eavesdrop on the secure signal. Assume Alice configures N transmissionsAnd the antenna Bob is configured with a single receiving antenna, and each illegal terminal is configured with a single receiving antenna. Alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a). Assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE. The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular area of (a). Due to path loss and fading in the communication space, the radiation range of the transmitted signal is a radius R2The wireless channel is modeled as an independent equal-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α (α ≧ 2.) the channels of the edge computing device Alice to the legal terminal Bob and the kth illegal terminal are represented as
Figure BDA0002369880200000031
Wherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
Figure BDA0002369880200000032
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2
And S4, the edge computing equipment transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, the channel information is fed back to the edge computing equipment through a lossless feedback link.
And S5, after the edge computing equipment obtains the channel information, transmitting the secret signal by using a maximum ratio transmission beam forming strategy. Meanwhile, in order to enhance the secure transmission quality, the edge computing device uses a portion of the transmit power to transmit an artificial noise signal that is designed in the null space of the legitimate communication link and that does not affect the reception quality of the legitimate terminal, disrupting potentially illegitimate terminals.
S501, utilizing estimated main channel information hBThe edge computing device designs a secret signal:
Figure BDA0002369880200000033
where P is the power budget of the edge computing device,
Figure BDA0002369880200000034
is an information-bearing security signal, phi ∈ [0,1 ]]Is the power allocation ratio of the security signal. Using primary channel information hBThe edge computing device aligns the transmission direction of the security signal with Bob, and the beamforming vector satisfies wB=hB/||hB||。
S502, adopting a zero-space artificial noise scheme, and enabling Alice to transmit an interference signal to disturb an illegal terminal:
Figure BDA0002369880200000035
wherein the weighting matrix
Figure BDA0002369880200000036
Is hBA set of orthonormal bases in null space,
Figure BDA0002369880200000037
is an artificial noise signal.
And S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
S601, the received signal-to-interference-and-noise ratio of the legal terminal and the k illegal terminal is as follows:
Figure BDA0002369880200000041
Figure BDA0002369880200000042
s602, the main channel capacity and the eavesdropping channel capacity are respectively expressed as: cB=log2(1+ρB),CE=log2(1+ρE). Wherein, the potential passive eavesdroppers independently crack the secret signals respectively, so the ability of stealing secret messages depends on the illegal terminal with the best channel quality,
Figure BDA0002369880200000043
s603, the edge computing system knows the complete main channel information and only knows the statistical channel information of the eavesdropping channel, and the security capacity of the system possibly cannot support the transmission rate of the transmitter secret message, so that the security communication can be interrupted at some time due to the insecure channel introduced by the illegal terminal. The outage probability is expressed as:
Figure BDA0002369880200000044
wherein,
Figure BDA0002369880200000045
En(x) Is an exponential integration function.
S604, the edge computing system minimizes the safe interruption probability of the system by designing a power distribution ratio. Since the safety interruption probability function is very complex, it is difficult to obtain the optimal power distribution ratio phi*So the invention adopts particle swarm optimization algorithm in the interval [0,1 ]]Inner search for optimum phi*And obtaining the minimum safe interruption probability. .
In the embodiment of the present application, the channel estimation algorithm of the edge computing device may be a least square, minimum mean square error, or other channel estimation method, and may also be an improved algorithm of these methods.
In the embodiment of the present application, the optimization algorithm of step S5 includes, but is not limited to, a particle swarm optimization algorithm, and may also be other one-dimensional linear search algorithms.
In conclusion, the invention utilizes the safety protection area and the artificial noise method under the multi-antenna system, is beneficial to the safe transmission of the confidential signals and improves the safety performance of the edge computing system.
The foregoing is a preferred embodiment of the present invention, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as excluding other embodiments, and is capable of other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (3)

1. A transmission method for improving security performance of an edge computing system, comprising: the method comprises the following steps:
s1, establishing a transmission model of an edge computing system:
the edge computing equipment Alice prepares to transmit a secret signal to a legal terminal Bob, and a plurality of illegal terminals are hidden around a secret communication link to prepare to eavesdrop the secret signal all the time; assuming that Alice configures N transmitting antennas, Bob configures a single receiving antenna, and each illegal terminal configures a single receiving antenna; alice is located at the origin of two-dimensional coordinates, and Bob is deployed at the distance edge computing device dBThe position of (a); assuming that random position distribution of illegal terminals obeys two-dimensional homogeneous Poisson Point Process phiEDensity of λE(ii) a The non-colluding illegal terminals independently crack the secret signals, and the k-th illegal terminal is in the distance edge computing device dkIn order to prevent any illegal terminal close to the edge computing device from stealing the secret signal, the edge computing device Alice isolates the illegal terminal to the radius R in a physical patrol mode and the like1Outside the circular region of (a); transmitting due to path loss and fading in the communication spaceThe signal has a radiation range of a radius R2The wireless channel is modeled into an independent same-distribution Rayleigh fading combined large-scale path loss model, the path loss factor is represented as α being more than or equal to 2, and the channels from the edge computing equipment Alice to the legal terminal Bob and the k-th illegal terminal are represented as
Figure FDA0002369880190000011
Wherein h isBAnd hkAre mutually independent small-scale fading channels, and the vector elements of the channels are subject to independent and identically distributed complex random variables
Figure FDA0002369880190000012
S2, the edge computing equipment isolates the potential illegal terminal out of a circular area in a physical patrol mode, and the radius of the area is R1
S3, according to the power budget P of the transmitted signal and a wireless channel space path loss model, the edge computing equipment determines the radiation range of the signal, and the radius of the maximum radiation area is R2
S4, the edge computing device transmits a pilot frequency sequence to a legal terminal Bob, and after the Bob carries out channel estimation, channel information is fed back to the edge computing device through a lossless feedback link;
s5, after the edge computing equipment obtains channel information, transmitting a secret signal by using a maximum ratio transmission beam forming strategy; the edge computing device uses a part of the transmitting power to transmit an artificial noise signal to disturb a potential illegal terminal, wherein the artificial noise signal is designed in a null space of a legal communication link and does not influence the receiving quality of the legal terminal;
and S6, the edge computing equipment maximizes the confidential transmission rate of the system and improves the safety performance of the system by optimally designing the power distribution ratio of the confidential signal and the artificial noise.
2. The transmission method for improving the security performance of the edge computing system according to claim 1, wherein: the step S5 includes the following sub-steps:
s501, utilizing estimated main channel information hBThe edge computing device designs a secret signal:
Figure FDA0002369880190000021
where P is the power budget of the edge computing device,
Figure FDA0002369880190000022
is an information-bearing security signal, phi ∈ [0,1 ]]Is the power allocation ratio of the security signal; using primary channel information hBThe edge computing device aligns the transmission direction of the security signal with Bob, and the beamforming vector satisfies wB=hB/||hB||;
S502, adopting a zero-space artificial noise scheme, and enabling Alice to transmit an interference signal to disturb an illegal terminal:
Figure FDA0002369880190000023
wherein the weighting matrix
Figure FDA0002369880190000024
Is hBA set of orthonormal bases in null space,
Figure FDA0002369880190000025
is an artificial noise signal.
3. The transmission method for improving the security performance of the edge computing system according to claim 1, wherein: the optimization design of the power distribution ratio of the secret signal and the artificial noise in the step S6 includes:
s601, the received signal-to-interference-and-noise ratio of the legal terminal and the k illegal terminal is as follows:
Figure FDA0002369880190000026
Figure FDA0002369880190000027
s602, the main channel capacity and the eavesdropping channel capacity are respectively expressed as: cB=log2(1+ρB),CE=log2(1+ρE) (ii) a Wherein, the potential passive eavesdroppers independently crack the secret signals respectively, so the ability of stealing secret messages depends on the illegal terminal with the best channel quality,
Figure FDA0002369880190000028
s603, the edge computing system knows the complete main channel information and only knows the statistical channel information of the eavesdropping channel, and the safety capacity of the system possibly cannot support the transmission rate of the transmitter secret message, so that the safety communication can be interrupted at some time due to the unsafe channel introduced by the illegal terminal; the outage probability is expressed as:
Figure FDA0002369880190000029
wherein,
Figure FDA00023698801900000210
En(x) An exponential integration function;
s604, the edge computing system minimizes the safe interruption probability of the system by designing a power distribution ratio; since the safety interruption probability function is very complex, it is difficult to obtain the optimal power distribution ratio phi*So that a particle swarm optimization algorithm is adopted in the interval [0,1 ]]Inner search for optimum phi*And obtaining the minimum safe interruption probability.
CN202010047267.1A 2020-01-16 2020-01-16 Transmission method for improving safety performance of edge computing system Pending CN111262644A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010047267.1A CN111262644A (en) 2020-01-16 2020-01-16 Transmission method for improving safety performance of edge computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010047267.1A CN111262644A (en) 2020-01-16 2020-01-16 Transmission method for improving safety performance of edge computing system

Publications (1)

Publication Number Publication Date
CN111262644A true CN111262644A (en) 2020-06-09

Family

ID=70948817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010047267.1A Pending CN111262644A (en) 2020-01-16 2020-01-16 Transmission method for improving safety performance of edge computing system

Country Status (1)

Country Link
CN (1) CN111262644A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225825A (en) * 2021-05-10 2021-08-06 苏州大学 Particle swarm optimization algorithm-based hybrid artificial noise-assisted safe transmission method and device
CN113534829A (en) * 2021-06-11 2021-10-22 南京邮电大学 Daily detecting system that patrols of unmanned aerial vehicle based on edge calculation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915472A (en) * 2016-05-20 2016-08-31 电子科技大学 Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition
CN106068032A (en) * 2016-05-20 2016-11-02 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915472A (en) * 2016-05-20 2016-08-31 电子科技大学 Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition
CN106068032A (en) * 2016-05-20 2016-11-02 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
TENGYUE ZHANG 等: "Analysis of the physical layer security enhancing of wireless communication system under the random mobile", 《IET COMMUNICATIONS》 *
章露萍: "《电子科技大学硕士学位论文 理想与非理想信道条件下物理层安全传输的理论与性能分析》", 8 February 2018 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225825A (en) * 2021-05-10 2021-08-06 苏州大学 Particle swarm optimization algorithm-based hybrid artificial noise-assisted safe transmission method and device
CN113534829A (en) * 2021-06-11 2021-10-22 南京邮电大学 Daily detecting system that patrols of unmanned aerial vehicle based on edge calculation
CN113534829B (en) * 2021-06-11 2024-04-05 南京邮电大学 Unmanned aerial vehicle daily patrol detecting system based on edge calculation

Similar Documents

Publication Publication Date Title
Sun et al. Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks
Mostafa et al. Physical-layer security for indoor visible light communications
Lu et al. Proactive eavesdropping in UAV-aided suspicious communication systems
Yesilkaya et al. Physical-layer security in visible light communications
Yao et al. 3D trajectory optimization for secure UAV communication with CoMP reception
CN113193891B (en) Physical layer security authentication method for downlink non-orthogonal multiple access unmanned aerial vehicle system
Chen et al. UAV-aided secure transmission in MISOME wiretap channels with imperfect CSI
Jung et al. Security energy efficiency analysis of analog collaborative beamforming with stochastic virtual antenna array of UAV swarm
Sharma et al. Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review
Mukherjee et al. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
Nusenu et al. Green secure communication range-angle focusing quadrature spatial modulation using frequency modulated diverse retrodirective array for mmWave wireless communications
Lai et al. Directional modulation-enabled secure transmission with intelligent reflecting surface
CN108736989B (en) The implementation method that optimal secrecy handling capacity and high efficiency energy are collected in SWIPT system
Zhu et al. Secure precise transmission with multi-relay-aided directional modulation
Lu et al. Optimal power allocation for secure directional modulation networks with a full-duplex UAV user
CN111262644A (en) Transmission method for improving safety performance of edge computing system
Xu et al. Beyond encryption: Exploring the potential of physical layer security in UAV networks
Maeng et al. Power allocation for fingerprint-based PHY-Layer authentication with mmWave UAV networks
Shi et al. Physical layer security techniques for data transmission for future wireless networks
Zhang et al. Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities
Zhao et al. Intelligent reflecting surface aided wireless information surveillance
Illi et al. On the secrecy analysis of a RIS-aided wireless communication system subject to phase quantization errors
Bhuyan et al. Secure mmWave cellular network for drone communication
Hu et al. Maxmin fairness for UAV-enabled proactive eavesdropping with jamming over distributed transmit beamforming-based suspicious communications
Qiu et al. Robust multi-beam secure mmwave wireless communication for hybrid wiretapping systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609