CN111786918A - Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method - Google Patents

Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method Download PDF

Info

Publication number
CN111786918A
CN111786918A CN202010504919.XA CN202010504919A CN111786918A CN 111786918 A CN111786918 A CN 111786918A CN 202010504919 A CN202010504919 A CN 202010504919A CN 111786918 A CN111786918 A CN 111786918A
Authority
CN
China
Prior art keywords
energy
user
time block
interference unit
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010504919.XA
Other languages
Chinese (zh)
Other versions
CN111786918B (en
Inventor
曹堃锐
丁海洋
陈华梁
荆锋
辛可为
李海鹏
李兵
屈亚运
张阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202010504919.XA priority Critical patent/CN111786918B/en
Publication of CN111786918A publication Critical patent/CN111786918A/en
Application granted granted Critical
Publication of CN111786918B publication Critical patent/CN111786918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0014Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • H04L1/0048Decoding adapted to other signal detection operation in conjunction with detection of multiuser or interfering signals, e.g. iteration between CDMA or MIMO detector and FEC decoder
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an energy acquisition interference unit-assisted cooperative non-orthogonal multiple access secure transmission method, which adopts a non-orthogonal multiple access system, wherein the non-orthogonal multiple access system consists of an information source, a near user, a far user, an energy acquisition interference unit and an eavesdropper; the energy collection interference unit collects energy opportunistically, specifically: in the previous time block, when the information source transmits useful information to a near user, the energy acquisition interference unit transmits artificial noise by using energy acquired in advance; in the next time block adjacent to the previous time block, the near user transmits useful information to the far user, the information source simultaneously transmits artificial noise, the energy acquisition interference unit acquires radio frequency energy transmitted by the information source and/or the near user, and the acquired energy is used for transmitting the artificial noise in the next time block. The invention ensures the normal transmission of the information source and the near user, and the energy acquisition interference unit acquires energy opportunistically, thereby fully utilizing the system energy without influencing the system performance.

Description

Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method
Technical Field
The invention belongs to the field of wireless communication, relates to cooperative non-orthogonal multiple access secure transmission, and particularly relates to an energy acquisition interference unit-assisted cooperative non-orthogonal multiple access secure transmission method.
Background
In order to meet the rapidly increasing demand of mobile communication services under the condition of increasingly scarce spectrum resources, Non-orthogonal multiple access (NOMA) technology is receiving more and more attention from the industry. The NOMA technology realizes high-spectrum-efficiency transmission by bearing information of different users on the same frequency time resource, and is considered as a multiple access mode with great application prospect in the 5G and later 5G times. Among them, the power domain NOMA technology has received wide attention due to the characteristics of low implementation complexity and high compatibility. The basic idea of power domain NOMA (hereinafter referred to as NOMA) is that at a sending end, superposition coding is used for distributing power with different sizes to different user signals, and at a receiving end, a Successive Interference Cancellation (SIC) technology is used for eliminating Interference among users and detecting multi-user information. Due to the use of superposition coding, each user in the NOMA system can receive the information of other users. Based on the characteristics, the document "Cooperative non-orthogonal multiple access in 5G systems" proposes a Cooperative NOMA transmission scheme that uses a strong (near) user as a relay to cooperate with a weak (far) user for transmission, thereby improving the transmission reliability of the far user.
On the other hand, the Physical Layer Security (Physical Layer Security) technology that has emerged in recent years is a supplement or replacement to the upper Layer encryption technology in order to secure information transmission Security of wireless communication from the viewpoint of the Physical Layer. Although the cooperation-based NOMA transmission improves the transmission reliability of user information, the increase of transmission times caused by relay forwarding increases the risk of eavesdropping useful information, and especially the eavesdropping channel quality is better than the channel quality of a legal user or under the condition that a direct link does not exist from a source to a far user. Meanwhile, the common artificial noise technology in the physical layer safety consumes excessive power of the system, and certain difficulty exists in applying the artificial noise technology to an energy-limited system. Therefore, the invention can be applied to an energy-limited system, and meanwhile, a cooperative NOMA physical layer secure transmission method for resisting eavesdropping under the condition that no direct link exists from an information source to a far user is in the forefront.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method, which solves the technical problem that the system energy is difficult to be fully utilized in order to ensure the transmission security in the prior art.
In order to solve the technical problems, the invention adopts the following technical scheme:
a energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method adopts a non-orthogonal multiple access system, wherein the non-orthogonal multiple access system consists of an information source, a near user, a far user, an energy acquisition interference unit and an eavesdropper;
the signal source and the energy acquisition interference unit emit artificial noise;
the energy collection interference unit collects energy opportunistically;
the method for opportunistically collecting energy by the energy collecting interference device comprises the following steps: in the previous time block, when the information source transmits useful information to a near user, the energy acquisition interference unit transmits artificial noise by using energy acquired in advance; in the next time block adjacent to the previous time block, the near user transmits useful information to the far user, the information source simultaneously transmits artificial noise, the energy acquisition interference unit acquires radio frequency energy transmitted by the information source and/or the near user, and the acquired energy is used for transmitting the artificial noise in the next time block.
Specifically, the energy collected by the energy collection interference unit is as follows:
Ej=ηT(|hsj|2Ps+|hnj|2Pn)
wherein:
Ejrepresenting the energy collected by the energy-collecting jammer within a time block;
t represents the length of a time block;
η ∈ (0,1) represents energy conversion efficiency;
hsjand hnjRespectively representing channel coefficients from an information source to an energy acquisition interference unit and from a near user to the energy acquisition interference unit;
Psand PnRespectively representing the signal transmission power of the source and near users.
Specifically, in the previous t time block, the information source broadcasts the superposed signals of the near user and the far user through superposition coding, and after the near user receives the superposed signals, the information of the near user and the information of the far user are respectively detected by utilizing the serial interference elimination technology. To prevent information leakage, the energy harvesting jammer uses power Pj
Figure BDA0002526182900000031
The method comprises the steps of transmitting an artificial noise pseudorandom sequence to cover transmission of useful signals, wherein the pseudorandom sequence is generated according to channel state information between an energy acquisition interference device and a near user through a physical layer secret key generation technology, and can be matched with a channel between the energy acquisition interference device and the near user, so that the pseudorandom sequence can be detected and removed by the near user; however, the eavesdropper cannot remove the pseudorandom sequence, so that the eavesdropper's signal interception quality is deteriorated;
wherein: t represents a sequence of time blocks, i.e. the tth time block;
specifically, in the next t +1 time block adjacent to the previous time block, the near user relays and forwards information of the far user, and meanwhile, the information source sends an artificial noise signal to cover transmission of useful information. Because a direct link does not exist between the information source and the remote user, the transmitted artificial noise does not influence the receiving quality of the remote user and only deteriorates the receiving quality of an eavesdropper;
wherein: t denotes a sequence of time blocks, i.e. the t-th time block.
Compared with the prior art, the invention has the following technical effects:
the invention (I) fully utilizes the system energy and does not influence the system performance. Conventional energy harvesting techniques require allocating dedicated time (time-switched architecture) or power (power-split architecture) for node energy harvesting, which can result in a reduction in system spectral efficiency performance. The invention ensures the normal transmission of the information source and the near user, and the interference unit collects the energy opportunistically, thereby fully utilizing the system energy without influencing the system performance.
And (II) the invention improves the safety of transmission. The invention transmits artificial noise through friendly energy acquisition interference unit, and the useful signal transmitted by the information source can realize safe transmission; the artificial noise is transmitted through the information source, and the useful signal transmitted by the near user can realize safe transmission. Theoretical analysis and simulation results show that the invention can still realize safe transmission even under very severe conditions (the quality of the eavesdropping channel is superior to that of the near user channel, and meanwhile, no direct link exists from the information source to the far user).
Drawings
Fig. 1 is a block diagram of a model of the energy harvesting jammer assisted cooperative NOMA safety transmission proposed by the present invention.
Figure 2 is a graph comparing the proposed safe transmission method of the present invention with the existing non-interference assisted cooperative NOMA transmission method with respect to near user safe throughput under rayleigh channel conditions.
Figure 3 is a graph comparing the proposed safe transmission method of the present invention with the existing non-interference assisted cooperative NOMA transmission method with respect to far user safe throughput under rayleigh channel conditions.
The present invention will be explained in further detail with reference to examples.
Detailed Description
The invention considers the condition that an eavesdropper exists in a downlink cooperative NOMA direct transmission link, and artificial noise is sent by a friendly interference unit to deteriorate the receiving quality of the eavesdropper, so that the safe transmission of an information source and a near user is ensured. Considering the actual energy-limited node, the jammer opportunistically acquires the energy required for sending the artificial noise through an energy acquisition technology, so that the energy utilization rate of the system is improved, and the safe transmission of system information is also ensured. Compared with the traditional non-interference device assisted cooperative NOMA transmission method, the invention obviously improves the physical layer safety performance of the NOMA system.
The non-orthogonal multiple access system consists of an information source, a near user, a far user, an energy acquisition interference unit and an eavesdropper; the information source is in wireless communication with a near user, the near user is in wireless communication with a far user, the energy acquisition interference unit is in wireless transmission with the information source and the near user respectively, and an eavesdropper attempts to intercept communication contents between the information source and the near user and between the information source and the far user.
In the non-orthogonal multiple access system, a direct link does not exist between the information source and the far user due to long distance or shielding, the near user is required to serve as a relay to cooperatively forward information of the far user, and the direct link exists between the information source and an eavesdropper; nodes in the non-orthogonal multiple access system are all provided with single antennas, and the working mode is half duplex.
In the present invention, successive interference cancellation techniques are known in the art.
In the present invention, the physical layer key generation technique is a technique known in the art.
The present invention is not limited to the following embodiments, and all equivalent changes based on the technical solutions of the present invention fall within the protection scope of the present invention.
Example 1:
the embodiment provides an energy acquisition jammer assisted cooperative non-orthogonal multiple access secure transmission method, which adopts a non-orthogonal multiple access system, as shown in fig. 1, wherein the non-orthogonal multiple access system consists of an information source, a near user, a far user, an energy acquisition jammer and an eavesdropper;
the information source and the energy acquisition interference unit emit artificial noise;
the energy collection jammer collects energy opportunistically;
the method for the energy acquisition interference unit to acquire energy opportunistically comprises the following steps: in the previous time block, when the information source transmits useful information to a near user, the energy acquisition interference unit transmits artificial noise by using energy acquired in advance; in the next time block adjacent to the previous time block, the near user transmits useful information to the far user, the information source simultaneously transmits artificial noise, the energy acquisition interference unit acquires radio frequency energy transmitted by the information source and/or the near user, and the acquired energy is used for transmitting the artificial noise in the next time block.
Specifically, the energy collected by the energy collection interference unit is as follows:
Ej=ηT(|hsj|2Ps+|hnj|2Pn)
wherein:
Ejrepresenting the energy collected by the energy-collecting jammer within a time block;
t represents the length of a time block;
η ∈ (0,1) represents energy conversion efficiency;
hsjand hnjRespectively representing channel coefficients from an information source to an energy acquisition interference unit and from a near user to the energy acquisition interference unit;
Psand PnRespectively representing the signal transmission power of the source and near users.
Specifically, in the previous t time block, the information source broadcasts the superposed signals of the near user and the far user through superposition coding, and after the near user receives the superposed signals, the information of the near user and the information of the far user are respectively detected by utilizing the serial interference elimination technology. To prevent information leakage, the energy harvesting jammer uses power Pj
Figure BDA0002526182900000061
Transmitting artificial noiseThe pseudo-random sequence is generated by a physical layer key generation technology according to the channel state information between the energy acquisition interference unit and the near user, and can be matched with a channel between the energy acquisition interference unit and the near user, so that the pseudo-random sequence can be detected and removed by the near user; however, the eavesdropper cannot remove the pseudorandom sequence, so that the eavesdropper's signal interception quality is deteriorated;
wherein: t represents a sequence of time blocks, i.e. the tth time block;
specifically, in the next t +1 time block adjacent to the previous time block, the near user relays and forwards information of the far user, and meanwhile, the information source sends an artificial noise signal to cover transmission of useful information. Because a direct link does not exist between the information source and the remote user, the transmitted artificial noise does not influence the receiving quality of the remote user and only deteriorates the receiving quality of an eavesdropper;
wherein: t denotes a sequence of time blocks, i.e. the t-th time block.
Example 2:
this embodiment provides an energy harvesting jammer assisted cooperative non-orthogonal multiple access secure transmission method, which employs the energy harvesting jammer assisted cooperative non-orthogonal multiple access secure transmission method as in embodiment 1. Specifically, the method comprises the following steps:
referring to fig. 1, the NOMA system is composed of an information source S, a near user NU, a far user FU, an energy acquisition disturber J and an eavesdropper E, wherein a direct link does not exist between the S and the FU due to long distance or shielding, the NU is required to serve as a relay to cooperatively forward information of the FU, and the direct link exists between the S and the E; nodes in the system are all provided with single antennas, and the working mode is half duplex; the communication process of the S, the NU and the FU is divided into continuous time blocks with equal time length by a fixed time length T.
In the t time block, S first broadcasts the superimposed signal of NU and FU by superposition coding
Figure BDA0002526182900000071
Wherein s isn(t) and sf(t) signals representing NU and FU, PsPresentation letterEmission power of the source, αnAnd αfRepresenting the power division factors of NU and FU, respectively (α)n+α f1 and αnf). To prevent information leakage, the energy harvesting jammer J uses power PjTransmitting an artificial noise pseudorandom sequence jrTo mask the transmission of the useful signal, the pseudo-random sequence is generated by physical layer key generation techniques based on the J to NU channel state information, able to match the J to NU channels and thus able to be detected and removed by the NU. However, E cannot remove the pseudo random sequence, and thus the signal reception quality of E is deteriorated. Based on this, the received signals of NU and E are respectively represented as
Figure BDA0002526182900000072
Figure BDA0002526182900000073
Wherein h issn、hse、hjeRepresenting the channel coefficients S to NU, S to E, J to E, respectively, nNU、nERespectively representing additive white Gaussian noise on NU and E (mean value is zero and variance is N)0). According to the downstream NOMA principle, sfIs first decoded and then removed by successive interference cancellation techniquesfThen, decoding sn. Correspondingly, s is decoded at the time blocks NU and EnAnd sfAre respectively expressed as
Figure BDA0002526182900000081
Figure BDA0002526182900000082
Figure BDA0002526182900000083
Figure BDA0002526182900000084
Wherein,
Figure BDA0002526182900000085
and
Figure BDA0002526182900000086
is obtained under successful successive interference cancellation conditions. In addition, the transmitted energy of the energy harvesting jammer comes from the energy harvesting of one time block (t-1 time block) before the system. Since the transmission of the t-1 time block is similar to the t +1 time block, the power PjThe size of (c) will be described below in the t +1 time block.
In t +1 time block, NU relays FU information sfWhile S sends an artificial noise signal jsTo cover the transmission of useful information. Since there is no direct link between S and FU, the transmitted artificial noise will not affect the reception quality of FU, only deteriorating the reception quality of eavesdropper E. Based on this, the received signals of FU and E are respectively represented as
Figure BDA0002526182900000087
Figure BDA0002526182900000088
Wherein h isnf、hneRespectively representing the channel coefficients NU to FU, NU to E, PnRepresenting the transmit power of the NU. Accordingly, in this time block, FU and E decode sfAre respectively expressed as
Figure BDA0002526182900000089
Figure BDA00025261829000000810
Wherein
Figure BDA0002526182900000091
Note that NU pairs s in t time blockfAn unsuccessful decoding will result in t +1 time block sfFails transmission of (d), so FD decodes sfIs expressed as
Figure BDA0002526182900000092
In addition, the eavesdropper E processes the received signals of the two time blocks by adopting a maximum ratio combining mode, and then E decodes sfIs expressed as
Figure BDA0002526182900000093
On the other hand, the energy collection interference unit J collects energy of the received S and NU signals by using a radio frequency signal energy collection technology in the time block, and stores the collected energy for sending artificial noise in the next time block. The energy harvested by the energy harvesting jammer J may be expressed as
Ej=ηT(|hsj|2Ps+|hnj|2Pn)
Wherein E isjRepresents the energy collected by J in a time block (length T), η∈ (0,1) represents the energy conversion efficiency, hsjAnd hnjRepresenting the channel coefficients of S to J, NU to J, respectively.
From the above analysis, it can be seen that under the transmission method proposed by the present invention, the secure throughputs of the two users of the system are respectively
Figure BDA0002526182900000094
Figure BDA0002526182900000095
Wherein,
Figure BDA0002526182900000096
respectively representing the coding rates of NU and FU,
Figure BDA0002526182900000097
representing the redundant rate on the NU, FU, respectively, against eavesdropping.
Simulation example:
following the technical solution of the above embodiment 2, the effect of the present invention can be further illustrated by the following simulation:
let the average gain of each channel of the system be λsn=λnf=λne=λje=0.6,λnjConsidering a severe condition, i.e. the channel quality E to S is better than NU to S, is set to λ 1snse0.8, power division factor set to αn=0.2,αf0.8, an energy conversion efficiency of η 0.8, and an average signal-to-noise ratio set to ρs=ρnρ. The simulation obtains the change curve of the user safety throughput with the coding rate and the average signal-to-noise ratio of the existing energy-collection-free jammer transmission method and the transmission method provided by the invention under the rayleigh channel condition of the cooperative non-orthogonal multiple access downlink communication system, as shown in fig. 2 and 3, wherein fig. 2 is the simulation of a near user, and fig. 3 is the simulation of a far user.
As can be seen from fig. 2 and 3, even under severe conditions (E to S channel quality is better than NU to S, and S to FU has no direct link), the energy-harvesting jammer-assisted cooperative NOMA secure transmission method provided by the present invention can still achieve non-zero secure throughput, and compared with the existing method, the method provided by the present invention improves the security of the system. Meanwhile, it can be seen that the safe throughput of the user can be maximized by further designing the coding rate.

Claims (4)

1. An energy-harvesting-jammer-assisted cooperative non-orthogonal multiple access secure transmission method, which adopts a non-orthogonal multiple access system, is characterized in that: the non-orthogonal multiple access system consists of an information source, a near user, a far user, an energy acquisition interference unit and an eavesdropper;
the signal source and the energy acquisition interference unit emit artificial noise;
the energy collection interference unit collects energy opportunistically;
the method for opportunistically collecting energy by the energy collecting interference device comprises the following steps: in the previous time block, when the information source transmits useful information to a near user, the energy acquisition interference unit transmits artificial noise by using energy acquired in advance; in the next time block adjacent to the previous time block, the near user transmits useful information to the far user, the information source simultaneously transmits artificial noise, the energy acquisition interference unit acquires radio frequency energy transmitted by the information source and/or the near user, and the acquired energy is used for transmitting the artificial noise in the next time block.
2. The energy harvesting jammer-assisted cooperative non-orthogonal multiple access secure transmission method of claim 1, wherein: the energy collected by the energy collection interference unit is as follows:
Ej=ηT(|hsj|2Ps+|hnj|2Pn)
wherein:
Ejrepresenting the energy collected by the energy-collecting jammer within a time block;
t represents the length of a time block;
η ∈ (0,1) represents energy conversion efficiency;
hsjand hnjRespectively representing channel coefficients from an information source to an energy acquisition interference unit and from a near user to the energy acquisition interference unit;
Psand PnRespectively representing the signal transmission power of the source and near users.
3. The energy harvesting jammer-assisted cooperative non-orthogonal multiple access secure transmission method of claim 1, wherein: in the previous t time block, the information source broadcasts the superposed signals of the near user and the far user through superposition coding, and after the near user receives the superposed signals, the information of the near user and the information of the far user are respectively detected by utilizing a serial interference elimination technology. Is composed ofThe information leakage is prevented, and the power P used by the energy acquisition interference unitj
Figure FDA0002526182890000021
The method comprises the steps of transmitting an artificial noise pseudorandom sequence to cover transmission of useful signals, wherein the pseudorandom sequence is generated according to channel state information between an energy acquisition interference device and a near user through a physical layer secret key generation technology, and can be matched with a channel between the energy acquisition interference device and the near user, so that the pseudorandom sequence can be detected and removed by the near user; however, the eavesdropper cannot remove the pseudorandom sequence, so that the eavesdropper's signal interception quality is deteriorated;
wherein: t denotes a sequence of time blocks, i.e. the t-th time block.
4. The energy harvesting jammer-assisted cooperative non-orthogonal multiple access secure transmission method of claim 1, wherein: in the next t +1 time block adjacent to the previous time block, the near user relays and forwards information of a far user, and meanwhile, the information source sends an artificial noise signal to shield transmission of useful information. Because a direct link does not exist between the information source and the remote user, the transmitted artificial noise does not influence the receiving quality of the remote user and only deteriorates the receiving quality of an eavesdropper;
wherein: t denotes a sequence of time blocks, i.e. the t-th time block.
CN202010504919.XA 2020-06-05 2020-06-05 Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method Active CN111786918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010504919.XA CN111786918B (en) 2020-06-05 2020-06-05 Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010504919.XA CN111786918B (en) 2020-06-05 2020-06-05 Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method

Publications (2)

Publication Number Publication Date
CN111786918A true CN111786918A (en) 2020-10-16
CN111786918B CN111786918B (en) 2022-09-09

Family

ID=72753969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010504919.XA Active CN111786918B (en) 2020-06-05 2020-06-05 Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method

Country Status (1)

Country Link
CN (1) CN111786918B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702741A (en) * 2020-12-29 2021-04-23 中国人民解放军空军工程大学 NOMA (non-orthogonal multiple access) safe transmission method and system combining artificial noise and power distribution
CN114024591A (en) * 2021-10-26 2022-02-08 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120302190A1 (en) * 2011-05-25 2012-11-29 Shared Spectrum Company Method and system for man-made noise rejection detector
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
CN106452655A (en) * 2016-08-04 2017-02-22 华侨大学 System security transmission method in combination with collaborative interference and time division energy collection technology
CN107426792A (en) * 2017-04-01 2017-12-01 华侨大学 A kind of work(of purpose user scrambling divides energy acquisition to relay safe transmission scheme
CN110087278A (en) * 2019-03-11 2019-08-02 西安电子科技大学 A kind of safe transmission method wirelessly taken in energy collaborative network with cooperation interference
CN110213807A (en) * 2019-05-29 2019-09-06 华侨大学 A kind of safe rate best practice of energy constraint untrusted junction network
CN110213762A (en) * 2019-05-29 2019-09-06 华侨大学 Untrusted junction network safe transmission method is acquired based on opportunistic wireless energy
CN110602777A (en) * 2019-08-28 2019-12-20 华北电力大学(保定) CR-NOMA bidirectional relay self-interference energy recovery transmission method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120302190A1 (en) * 2011-05-25 2012-11-29 Shared Spectrum Company Method and system for man-made noise rejection detector
CN106452655A (en) * 2016-08-04 2017-02-22 华侨大学 System security transmission method in combination with collaborative interference and time division energy collection technology
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
CN107426792A (en) * 2017-04-01 2017-12-01 华侨大学 A kind of work(of purpose user scrambling divides energy acquisition to relay safe transmission scheme
CN110087278A (en) * 2019-03-11 2019-08-02 西安电子科技大学 A kind of safe transmission method wirelessly taken in energy collaborative network with cooperation interference
CN110213807A (en) * 2019-05-29 2019-09-06 华侨大学 A kind of safe rate best practice of energy constraint untrusted junction network
CN110213762A (en) * 2019-05-29 2019-09-06 华侨大学 Untrusted junction network safe transmission method is acquired based on opportunistic wireless energy
CN110602777A (en) * 2019-08-28 2019-12-20 华北电力大学(保定) CR-NOMA bidirectional relay self-interference energy recovery transmission method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702741A (en) * 2020-12-29 2021-04-23 中国人民解放军空军工程大学 NOMA (non-orthogonal multiple access) safe transmission method and system combining artificial noise and power distribution
CN114024591A (en) * 2021-10-26 2022-02-08 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method
CN114024591B (en) * 2021-10-26 2023-09-01 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method

Also Published As

Publication number Publication date
CN111786918B (en) 2022-09-09

Similar Documents

Publication Publication Date Title
JP6473849B2 (en) Data communication method and apparatus in digital chaos cooperative network
CN111245498B (en) Relay-assisted non-orthogonal multiple access cooperative network secure communication method
CN103944606B (en) A kind of production method of AFH pattern
CN111988783B (en) Safe transmission method and system for uplink non-orthogonal multiple access
CN112702741B (en) NOMA (non-uniform access memory) safe transmission method and system combining artificial noise and power distribution
CN111786918B (en) Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method
WO2007101382A1 (en) Spread spectrum orthogonal frequency division multiplexing mix system and method
Yang et al. The spread spectrum GFDM schemes for integrated satellite-terrestrial communication system
Alahmadi et al. Subband PUEA detection and mitigation in OFDM-based cognitive radio networks
CN112492678B (en) NOMA downlink safety transmission method based on short packet communication
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
CN110337094B (en) Secure transmission system for D2D content sharing and method thereof
CN110324827B (en) Cognitive safety transmission method based on wireless information and power joint transmission
Zheng et al. Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay
CN114024591B (en) Relay cooperation non-orthogonal multiple access system and information transmission method
CN1555613A (en) Receiving method based on MIMO CDMA
CN107404475B (en) Physical layer secure transmission method based on frequency spectrum and energy resource excitation
CN115278662A (en) Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy
Alshammary et al. A review of recent developments in NOMA & SCMA schemes for 5G technology
CN113473388A (en) NOMA full-duplex user cooperation secret transmission method based on artificial noise
Wang et al. Physical layer security for full duplex relay system
Sheeba et al. Rate Maximization of Cell-Edge Users Through Cooperative Non-Orthogonal Multiple Access
Amin et al. Performance evaluation of cooperative NOMA-based improved hybrid SWIPT protocol
CN111586679B (en) Safety guarantee method based on limited feedback non-orthogonal multiple access network
Long et al. Cooperative jamming and power allocation in two-way relaying system with eavesdropper

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant