CN113301564A - Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network - Google Patents
Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network Download PDFInfo
- Publication number
- CN113301564A CN113301564A CN202110483825.3A CN202110483825A CN113301564A CN 113301564 A CN113301564 A CN 113301564A CN 202110483825 A CN202110483825 A CN 202110483825A CN 113301564 A CN113301564 A CN 113301564A
- Authority
- CN
- China
- Prior art keywords
- node
- base station
- eavesdropping
- hybrid base
- power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a signal power heuristic method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, aiming at a scene that a potential eavesdropping node eavesdrops a specific sensor node in the wireless energy supply network, the invention provides that other nodes send interference power to enable the eavesdropping throughput of the eavesdropping node to be lower than a threshold value, and the interference power of each node is obtained through the distance relation between the node and a mixed base station as well as the eavesdropping node. The method and the device calculate the interference power of the non-eavesdropped node through extremely low time complexity to ensure the safe data transmission in the wireless energy supply communication network, and have higher network throughput.
Description
Technical Field
The invention relates to a signal power optimization method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network.
Background
In recent years, wireless power supply technology has been attracting more attention in the field of wireless networks. According to the technology, the hybrid base station is used as an energy source to supply wireless energy in a large range, stable and controllable energy can be provided for a plurality of wireless sensing nodes, and the nodes work by utilizing the captured energy. The technology can be widely applied to the Internet of things such as intelligent transportation, intelligent home and the like.
There may be potential eavesdropping nodes in a wireless powered communication network that eavesdrop on a node while the node is transmitting data. The invention considers the mode that the node captures energy firstly and then utilizes time division multiplexing to transmit information, and a potential interception node in the network intercepts the node in a time slot of data transmission of a certain node. And other nodes in the network send interference signals by using the captured energy to interfere the interception node so that the interception throughput of the interception node is lower than the threshold value. The problem of obtaining the interference power of other nodes on the premise of ensuring the safe data transmission to improve the network throughput is worthy of study.
Disclosure of Invention
In order to overcome the defect that the safe data transmission is rarely considered in the conventional energy capture wireless sensor network, the invention provides a heuristic method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, which can ensure the safe transmission and improve the network throughput.
In order to solve the technical problems, the invention adopts the following technical scheme:
a signal power heuristic for utilizing interfering signals to prevent eavesdropping in a wirelessly powered communications network, the method comprising the steps of:
1) for K sensor nodes capable of capturing radio frequency energy, a potential interception node and a hybrid base station capable of transmitting radio frequency signals and receiving sensor node information in a wireless energy supply communication network, the time length of the network system is arranged by taking T as a period and divided into K +1 time slots, and tau0,τ1,τ2,…,τk. In time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In-node 1 transmitting data to hybrid base stationThe node 1 is intercepted by the eavesdropping node, and the nodes 2 to K utilize the captured energy to respectively interfere with the powerAnd K, 2,3, …, and the eavesdropping node is interfered by the eavesdropping node, so that the eavesdropping throughput is lower than the threshold value, and the network can realize the safe communication. At the next τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),and sorting the data from small to large by using quick sorting;
2.3): for each sensor node NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi;
Ei=ξhip0τ0,i=1,2,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): of node 1A transmission power ofThe throughput R of the node 1 is calculated according to the formula (2)1,
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference powerThe following relationships exist:
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
2.10): traverse the sorted arrays of 2.2), each time with the top sorted arraySet as maximum interference power
2.12): will be provided withAnd a-delta2Compare if, ifJumping to the step nine; if it is notOut of circulation, outFinishing; if it is notJump to step 2.13);
2.13): the interference power of this node is calculated using equation (7)Output of And (6) ending.
The beneficial effects of the invention are as follows: the method and the device calculate the interference power of the non-eavesdropped node through extremely low time complexity to ensure the safe data transmission in the wireless energy supply communication network, and have higher network throughput.
Drawings
Fig. 1 is a flow chart of a signal power heuristic for utilizing interfering signals to prevent eavesdropping in a wireless powered communication network.
Fig. 2 is a schematic diagram of a model of a wirelessly powered communications network in which a potential eavesdropping node is present.
Fig. 3 is a schematic diagram of a node capturing energy first and then performing data transmission in a time division multiplexing manner.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1-3, a heuristic method of signal power for eavesdropping prevention by using interference signals in a wireless energy-supplying communication network comprises the following steps:
1) for K sensor nodes capable of capturing radio frequency energy in wireless energy supply communication network, a potential interception node and a potential transmission radio frequency signalThe time length of the network system arrangement is divided into K +1 time slots and tau by taking T as a period0,τ1,τ2,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with power And interfering the eavesdropping node to enable the eavesdropping throughput of the eavesdropping node to be lower than a threshold value so as to realize the secure communication of the network. At the next τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),and sorting the data from small to large by using quick sorting;
2.3): for each sensorNode NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi;
Ei=ξhip0τ0,i=1,2,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): the transmission power of the node 1 isThe throughput R of the node 1 is calculated according to the formula (2)1,
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference powerThe following relationships exist:
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
2.10): traverse the sorted arrays of 2.2), each time with the top sorted arraySet as maximum interference power
2.12): will be provided withAnd a-delta2Compare if, ifJump to step 2.9); if it is notOut of circulation, outFinishing; if it is notJump to step 2.13);
2.13): the interference power of this node is calculated using equation (7)Output ofi 2,3, …, K, end.
Embodiments of the present invention are described with respect to a wireless powered communications network in which there is a potential eavesdropping node in the network. The network consists of a hybrid base station, a plurality of sensor nodes and a potential eavesdropping node. The invention researches the safety data transmission of a specific node in a wiretap network by using a wiretap node, wherein N is used for K nodesiI is 1,2, …, K.
In the case of a network system scheduling duration T, the entire time block T is divided into node energy capture times τ0And node transmission time τ1~τKTwo stages. In the first phase, the hybrid base station transmits at a transmission power p0To broadcast radio frequency signals. In the second phase node N1Transmitting data tau1Within a time slot of (2), a potential eavesdropping node N1Node NiAnd i is 2,3, …, and K interferes the eavesdropping node by using the energy captured in the first stage, so that the eavesdropping throughput is lower than a threshold value. Subsequent τiNode N in time slotiAnd i is 2,3, …, and K uses the energy left by interference for data transmission.
Because the channel gain is inversely related to the distance, the node which is close to the eavesdropping node and is close to the hybrid base station has good eavesdropping channel gain and poor data transmission channel gain, and the node which meets the conditions sends an interference signal by using multi-energy, so that the eavesdropping throughput of the eavesdropping node is exactly equal to the threshold value, and the network throughput is improved.
The embodiments described in this specification are merely illustrative of implementations of the inventive concepts, which are intended for purposes of illustration only. The scope of the present invention should not be construed as being limited to the particular forms set forth in the examples, but rather as being defined by the claims and the equivalents thereof which can occur to those skilled in the art upon consideration of the present inventive concept.
Claims (1)
1. A heuristic method of signal power for eavesdropping prevention using interfering signals in a wireless powered communication network, the method comprising the steps of:
1) for K sensor nodes capable of capturing radio frequency energy, a potential interception node and a hybrid base station capable of transmitting radio frequency signals and receiving sensor node information in a wireless energy supply communication network, the time length of the network system is arranged by taking T as a period and divided into K +1 time slots, and tau0,τ1,τ2,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with powerK interferes with the eavesdropping node when i is 2,3, …, so thatWith eavesdropping throughput below a threshold to effect secure communication over the network, at subsequent τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),and sorting the data from small to large by using quick sorting;
2.3): for each sensor node NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi;
Ei=ξhip0τ0,i=2,3,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): the transmission power of the node 1 isThe throughput R of the node 1 is calculated according to the formula (2)1,
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference powerThe following relationships exist:
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
2.10): traverse the sorted arrays of 2.2), each time with the top sorted arraySet as maximum interference power
2.12): will be provided withAnd a-delta2Compare if, ifJumping to the step nine; if it is notOut of circulation, outFinishing; if it is notJump to step 2.13);
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110483825.3A CN113301564B (en) | 2021-04-30 | 2021-04-30 | Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110483825.3A CN113301564B (en) | 2021-04-30 | 2021-04-30 | Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113301564A true CN113301564A (en) | 2021-08-24 |
CN113301564B CN113301564B (en) | 2022-07-15 |
Family
ID=77320774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110483825.3A Active CN113301564B (en) | 2021-04-30 | 2021-04-30 | Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113301564B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107396436A (en) * | 2017-07-11 | 2017-11-24 | 浙江工业大学 | A kind of energy source transmit power collocation method of RF energy capture wireless sense network |
CN107787002A (en) * | 2017-10-25 | 2018-03-09 | 河海大学 | A kind of method of the rate of information throughput in rapid evaluation wireless power communication |
US9922473B1 (en) * | 2017-01-23 | 2018-03-20 | UScontracting, Inc. | Systems and methods for location-based automated authentication |
CN110601789A (en) * | 2019-11-18 | 2019-12-20 | 南京邮电大学 | Wireless energy-carrying secret communication method based on multi-user scheduling and interference selection |
CN110708698A (en) * | 2019-07-15 | 2020-01-17 | 郑州大学 | Physical layer secure transmission method of heterogeneous wireless sensor network based on wireless energy-carrying communication |
CN111132333A (en) * | 2019-12-13 | 2020-05-08 | 重庆邮电大学 | Time distribution device and method based on time reversal in wireless power supply network |
-
2021
- 2021-04-30 CN CN202110483825.3A patent/CN113301564B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9922473B1 (en) * | 2017-01-23 | 2018-03-20 | UScontracting, Inc. | Systems and methods for location-based automated authentication |
CN107396436A (en) * | 2017-07-11 | 2017-11-24 | 浙江工业大学 | A kind of energy source transmit power collocation method of RF energy capture wireless sense network |
CN107787002A (en) * | 2017-10-25 | 2018-03-09 | 河海大学 | A kind of method of the rate of information throughput in rapid evaluation wireless power communication |
CN110708698A (en) * | 2019-07-15 | 2020-01-17 | 郑州大学 | Physical layer secure transmission method of heterogeneous wireless sensor network based on wireless energy-carrying communication |
CN110601789A (en) * | 2019-11-18 | 2019-12-20 | 南京邮电大学 | Wireless energy-carrying secret communication method based on multi-user scheduling and interference selection |
CN111132333A (en) * | 2019-12-13 | 2020-05-08 | 重庆邮电大学 | Time distribution device and method based on time reversal in wireless power supply network |
Non-Patent Citations (3)
Title |
---|
SEOKWOO HONG: "Low EMF Design of Cochlear Implant Wireless Power Transfer System using A Shielding Coil", 《2020 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY & SIGNAL/POWER INTEGRITY 》 * |
SHUBIN ZHANG: "Optimal Probabilistic Caching in Heterogeneous IoT Networks", 《IEEE INTERNET OF THINGS JOURNAL 》 * |
毛科技等: "后向散射辅助无线供能网络中的节点间高吞吐量通信方案", 《传感技术学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113301564B (en) | 2022-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106452503B (en) | Full duplex relaying safe transmission method based on power distribution energy acquisition technology | |
CN108834112B (en) | NOMA-based relay-assisted D2D communication system power distribution method | |
Elkourdi et al. | Enabling slotted Aloha-NOMA for massive M2M communication in IoT networks | |
Di et al. | NOMA-based low-latency and high-reliable broadcast communications for 5G V2X services | |
CN110062377B (en) | Power division factor and beam forming combined optimization method in safe energy-carrying communication | |
CN106856611A (en) | Wave beam processing method, initial beam find method and base station and terminal | |
CN106877919B (en) | Relay safety communication method for power distribution energy collection based on optimal user selection | |
CN104506284B (en) | The implementation method of ARQ agreements in SWIPT junction networks based on relay selection | |
CN107995680B (en) | SWIPT relay power division coefficient adjusting method with interference energy collection function | |
CN106717080A (en) | Method for synchronization signal transmission in wireless communication system | |
CN109982438A (en) | A kind of multi-user resource distributing method based under NOMA and SWIPT cognitive radio environment | |
Ghazi et al. | Uplink NOMA scheme for Wi-Fi applications | |
CN109348500A (en) | Meet the resource allocation methods of two-way SWIPT relay system under the conditions of a kind of hardware damage | |
Wang et al. | Full duplex random access for multi-user OFDMA communication systems | |
CN106878958B (en) | Rapid propagation method based on adjustable duty ratio in software defined wireless network | |
CN111542109A (en) | User peer-to-peer cooperation method based on power division under non-orthogonal multiple access | |
CN112994759B (en) | Cooperative relay D2D communication method based on OFDM | |
CN113301564B (en) | Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network | |
CN106973362A (en) | D2D communication means based on network code in a kind of cellular network | |
Elkourdi et al. | Enabling Aloha-NOMA for massive M2M communication in IoT networks | |
CN113452470B (en) | Signal power optimization method of wireless energy supply communication network | |
Choi | Channel-aware multichannel random access for energy-limited sensors and MTC devices | |
Song et al. | A reliable transmission scheme for security and protection system based on internet of things | |
Sirkeci-Mergen et al. | Broadcasting in dense linear networks: To cooperate or not to cooperate? | |
Anh et al. | Reliability-security analysis for harvest-to-jam based multi-hop leach networks under impact of hardware noises |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |