CN113301564A - Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network - Google Patents

Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network Download PDF

Info

Publication number
CN113301564A
CN113301564A CN202110483825.3A CN202110483825A CN113301564A CN 113301564 A CN113301564 A CN 113301564A CN 202110483825 A CN202110483825 A CN 202110483825A CN 113301564 A CN113301564 A CN 113301564A
Authority
CN
China
Prior art keywords
node
base station
eavesdropping
hybrid base
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110483825.3A
Other languages
Chinese (zh)
Other versions
CN113301564B (en
Inventor
孔帅颖
张书彬
池凯凯
黄亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202110483825.3A priority Critical patent/CN113301564B/en
Publication of CN113301564A publication Critical patent/CN113301564A/en
Application granted granted Critical
Publication of CN113301564B publication Critical patent/CN113301564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a signal power heuristic method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, aiming at a scene that a potential eavesdropping node eavesdrops a specific sensor node in the wireless energy supply network, the invention provides that other nodes send interference power to enable the eavesdropping throughput of the eavesdropping node to be lower than a threshold value, and the interference power of each node is obtained through the distance relation between the node and a mixed base station as well as the eavesdropping node. The method and the device calculate the interference power of the non-eavesdropped node through extremely low time complexity to ensure the safe data transmission in the wireless energy supply communication network, and have higher network throughput.

Description

Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network
Technical Field
The invention relates to a signal power optimization method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network.
Background
In recent years, wireless power supply technology has been attracting more attention in the field of wireless networks. According to the technology, the hybrid base station is used as an energy source to supply wireless energy in a large range, stable and controllable energy can be provided for a plurality of wireless sensing nodes, and the nodes work by utilizing the captured energy. The technology can be widely applied to the Internet of things such as intelligent transportation, intelligent home and the like.
There may be potential eavesdropping nodes in a wireless powered communication network that eavesdrop on a node while the node is transmitting data. The invention considers the mode that the node captures energy firstly and then utilizes time division multiplexing to transmit information, and a potential interception node in the network intercepts the node in a time slot of data transmission of a certain node. And other nodes in the network send interference signals by using the captured energy to interfere the interception node so that the interception throughput of the interception node is lower than the threshold value. The problem of obtaining the interference power of other nodes on the premise of ensuring the safe data transmission to improve the network throughput is worthy of study.
Disclosure of Invention
In order to overcome the defect that the safe data transmission is rarely considered in the conventional energy capture wireless sensor network, the invention provides a heuristic method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, which can ensure the safe transmission and improve the network throughput.
In order to solve the technical problems, the invention adopts the following technical scheme:
a signal power heuristic for utilizing interfering signals to prevent eavesdropping in a wirelessly powered communications network, the method comprising the steps of:
1) for K sensor nodes capable of capturing radio frequency energy, a potential interception node and a hybrid base station capable of transmitting radio frequency signals and receiving sensor node information in a wireless energy supply communication network, the time length of the network system is arranged by taking T as a period and divided into K +1 time slots, and tau012,…,τk. In time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In-node 1 transmitting data to hybrid base stationThe node 1 is intercepted by the eavesdropping node, and the nodes 2 to K utilize the captured energy to respectively interfere with the power
Figure BDA0003049506560000023
And K, 2,3, …, and the eavesdropping node is interfered by the eavesdropping node, so that the eavesdropping throughput is lower than the threshold value, and the network can realize the safe communication. At the next τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
the interference power
Figure BDA0003049506560000021
The value determination process is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),
Figure BDA0003049506560000022
and sorting the data from small to large by using quick sorting;
2.3): for each sensor node NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi
Ei=ξhip0τ0,i=1,2,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): of node 1A transmission power of
Figure BDA0003049506560000031
The throughput R of the node 1 is calculated according to the formula (2)1
Figure BDA0003049506560000032
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
Figure BDA0003049506560000033
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure BDA0003049506560000034
The following relationships exist:
Figure BDA0003049506560000035
Figure BDA0003049506560000036
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
Figure BDA0003049506560000037
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
Figure BDA0003049506560000041
wherein the content of the first and second substances,
Figure BDA0003049506560000042
2.9): will be provided with
Figure BDA0003049506560000043
Set to 0;
2.10): traverse the sorted arrays of 2.2), each time with the top sorted array
Figure BDA0003049506560000044
Set as maximum interference power
Figure BDA0003049506560000045
2.11): computing
Figure BDA0003049506560000046
2.12): will be provided with
Figure BDA0003049506560000047
And a-delta2Compare if, if
Figure BDA0003049506560000048
Jumping to the step nine; if it is not
Figure BDA0003049506560000049
Out of circulation, out
Figure BDA00030495065600000410
Finishing; if it is not
Figure BDA00030495065600000411
Jump to step 2.13);
2.13): the interference power of this node is calculated using equation (7)
Figure BDA00030495065600000412
Output of
Figure BDA00030495065600000413
Figure BDA00030495065600000414
And (6) ending.
The beneficial effects of the invention are as follows: the method and the device calculate the interference power of the non-eavesdropped node through extremely low time complexity to ensure the safe data transmission in the wireless energy supply communication network, and have higher network throughput.
Drawings
Fig. 1 is a flow chart of a signal power heuristic for utilizing interfering signals to prevent eavesdropping in a wireless powered communication network.
Fig. 2 is a schematic diagram of a model of a wirelessly powered communications network in which a potential eavesdropping node is present.
Fig. 3 is a schematic diagram of a node capturing energy first and then performing data transmission in a time division multiplexing manner.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1-3, a heuristic method of signal power for eavesdropping prevention by using interference signals in a wireless energy-supplying communication network comprises the following steps:
1) for K sensor nodes capable of capturing radio frequency energy in wireless energy supply communication network, a potential interception node and a potential transmission radio frequency signalThe time length of the network system arrangement is divided into K +1 time slots and tau by taking T as a period012,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with power
Figure BDA0003049506560000051
Figure BDA0003049506560000052
And interfering the eavesdropping node to enable the eavesdropping throughput of the eavesdropping node to be lower than a threshold value so as to realize the secure communication of the network. At the next τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
the interference power
Figure BDA0003049506560000053
The value determination process is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),
Figure BDA0003049506560000054
and sorting the data from small to large by using quick sorting;
2.3): for each sensorNode NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi
Ei=ξhip0τ0,i=1,2,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): the transmission power of the node 1 is
Figure BDA0003049506560000061
The throughput R of the node 1 is calculated according to the formula (2)1
Figure BDA0003049506560000062
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
Figure BDA0003049506560000063
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure BDA0003049506560000064
The following relationships exist:
Figure BDA0003049506560000065
Figure BDA0003049506560000066
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
Figure BDA0003049506560000071
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
Figure BDA0003049506560000072
wherein the content of the first and second substances,
Figure BDA0003049506560000073
2.9): will be provided with
Figure BDA0003049506560000074
Set to 0;
2.10): traverse the sorted arrays of 2.2), each time with the top sorted array
Figure BDA0003049506560000075
Set as maximum interference power
Figure BDA0003049506560000076
2.11): computing
Figure BDA0003049506560000077
2.12): will be provided with
Figure BDA0003049506560000078
And a-delta2Compare if, if
Figure BDA0003049506560000079
Jump to step 2.9); if it is not
Figure BDA00030495065600000710
Out of circulation, out
Figure BDA00030495065600000711
Finishing; if it is not
Figure BDA00030495065600000712
Jump to step 2.13);
2.13): the interference power of this node is calculated using equation (7)
Figure BDA00030495065600000713
Output of
Figure BDA00030495065600000714
i 2,3, …, K, end.
Embodiments of the present invention are described with respect to a wireless powered communications network in which there is a potential eavesdropping node in the network. The network consists of a hybrid base station, a plurality of sensor nodes and a potential eavesdropping node. The invention researches the safety data transmission of a specific node in a wiretap network by using a wiretap node, wherein N is used for K nodesiI is 1,2, …, K.
In the case of a network system scheduling duration T, the entire time block T is divided into node energy capture times τ0And node transmission time τ1~τKTwo stages. In the first phase, the hybrid base station transmits at a transmission power p0To broadcast radio frequency signals. In the second phase node N1Transmitting data tau1Within a time slot of (2), a potential eavesdropping node N1Node NiAnd i is 2,3, …, and K interferes the eavesdropping node by using the energy captured in the first stage, so that the eavesdropping throughput is lower than a threshold value. Subsequent τiNode N in time slotiAnd i is 2,3, …, and K uses the energy left by interference for data transmission.
Because the channel gain is inversely related to the distance, the node which is close to the eavesdropping node and is close to the hybrid base station has good eavesdropping channel gain and poor data transmission channel gain, and the node which meets the conditions sends an interference signal by using multi-energy, so that the eavesdropping throughput of the eavesdropping node is exactly equal to the threshold value, and the network throughput is improved.
The embodiments described in this specification are merely illustrative of implementations of the inventive concepts, which are intended for purposes of illustration only. The scope of the present invention should not be construed as being limited to the particular forms set forth in the examples, but rather as being defined by the claims and the equivalents thereof which can occur to those skilled in the art upon consideration of the present inventive concept.

Claims (1)

1. A heuristic method of signal power for eavesdropping prevention using interfering signals in a wireless powered communication network, the method comprising the steps of:
1) for K sensor nodes capable of capturing radio frequency energy, a potential interception node and a hybrid base station capable of transmitting radio frequency signals and receiving sensor node information in a wireless energy supply communication network, the time length of the network system is arranged by taking T as a period and divided into K +1 time slots, and tau012,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with power
Figure FDA0003049506550000016
K interferes with the eavesdropping node when i is 2,3, …, so thatWith eavesdropping throughput below a threshold to effect secure communication over the network, at subsequent τ2To tauKTime slot, node N2To node NKTransmitting data to the hybrid base station by using the energy left after the interference signal is transmitted;
the interference power
Figure FDA0003049506550000011
The value determination process is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKInitializing network system arrangement time T, setting interception throughput threshold RthHybrid base station broadcast duration τ0Time slot τ0The rear node sequentially transmits information to the hybrid base station;
2.2): calculating the distance dSink from the node to the hybrid base stationiDistance dE from node to eavesdropping nodeiThe ratio of (a) to (b),
Figure FDA0003049506550000012
and sorting the data from small to large by using quick sorting;
2.3): for each sensor node NiI 1,2, …, K, node N is calculated according to equation (1)iEnergy E captured from hybrid base stationi
Ei=ξhip0τ0,i=2,3,...,K, (1)
Where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.4): the transmission power of the node 1 is
Figure FDA0003049506550000013
The throughput R of the node 1 is calculated according to the formula (2)1
Figure FDA0003049506550000014
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.5): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
Figure FDA0003049506550000015
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.6): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure FDA0003049506550000021
The following relationships exist:
Figure FDA0003049506550000022
Figure FDA0003049506550000023
2.7): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches the maximum, and the expression is as follows:
Figure FDA0003049506550000024
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.8): the following expression is derived from equation (6):
Figure FDA0003049506550000025
wherein the content of the first and second substances,
Figure FDA0003049506550000026
2.9): will be provided with
Figure FDA0003049506550000027
Set to 0;
2.10): traverse the sorted arrays of 2.2), each time with the top sorted array
Figure FDA0003049506550000028
Set as maximum interference power
Figure FDA0003049506550000029
2.11): computing
Figure FDA00030495065500000210
2.12): will be provided with
Figure FDA00030495065500000211
And a-delta2Compare if, if
Figure FDA00030495065500000212
Jumping to the step nine; if it is not
Figure FDA00030495065500000213
Out of circulation, out
Figure FDA00030495065500000214
Finishing; if it is not
Figure FDA00030495065500000215
Jump to step 2.13);
2.13): the interference power of this node is calculated using equation (7)
Figure FDA00030495065500000216
Output of
Figure FDA00030495065500000217
i 2,3, …, K, end.
CN202110483825.3A 2021-04-30 2021-04-30 Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network Active CN113301564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110483825.3A CN113301564B (en) 2021-04-30 2021-04-30 Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110483825.3A CN113301564B (en) 2021-04-30 2021-04-30 Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network

Publications (2)

Publication Number Publication Date
CN113301564A true CN113301564A (en) 2021-08-24
CN113301564B CN113301564B (en) 2022-07-15

Family

ID=77320774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110483825.3A Active CN113301564B (en) 2021-04-30 2021-04-30 Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network

Country Status (1)

Country Link
CN (1) CN113301564B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396436A (en) * 2017-07-11 2017-11-24 浙江工业大学 A kind of energy source transmit power collocation method of RF energy capture wireless sense network
CN107787002A (en) * 2017-10-25 2018-03-09 河海大学 A kind of method of the rate of information throughput in rapid evaluation wireless power communication
US9922473B1 (en) * 2017-01-23 2018-03-20 UScontracting, Inc. Systems and methods for location-based automated authentication
CN110601789A (en) * 2019-11-18 2019-12-20 南京邮电大学 Wireless energy-carrying secret communication method based on multi-user scheduling and interference selection
CN110708698A (en) * 2019-07-15 2020-01-17 郑州大学 Physical layer secure transmission method of heterogeneous wireless sensor network based on wireless energy-carrying communication
CN111132333A (en) * 2019-12-13 2020-05-08 重庆邮电大学 Time distribution device and method based on time reversal in wireless power supply network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9922473B1 (en) * 2017-01-23 2018-03-20 UScontracting, Inc. Systems and methods for location-based automated authentication
CN107396436A (en) * 2017-07-11 2017-11-24 浙江工业大学 A kind of energy source transmit power collocation method of RF energy capture wireless sense network
CN107787002A (en) * 2017-10-25 2018-03-09 河海大学 A kind of method of the rate of information throughput in rapid evaluation wireless power communication
CN110708698A (en) * 2019-07-15 2020-01-17 郑州大学 Physical layer secure transmission method of heterogeneous wireless sensor network based on wireless energy-carrying communication
CN110601789A (en) * 2019-11-18 2019-12-20 南京邮电大学 Wireless energy-carrying secret communication method based on multi-user scheduling and interference selection
CN111132333A (en) * 2019-12-13 2020-05-08 重庆邮电大学 Time distribution device and method based on time reversal in wireless power supply network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SEOKWOO HONG: "Low EMF Design of Cochlear Implant Wireless Power Transfer System using A Shielding Coil", 《2020 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY & SIGNAL/POWER INTEGRITY 》 *
SHUBIN ZHANG: "Optimal Probabilistic Caching in Heterogeneous IoT Networks", 《IEEE INTERNET OF THINGS JOURNAL 》 *
毛科技等: "后向散射辅助无线供能网络中的节点间高吞吐量通信方案", 《传感技术学报》 *

Also Published As

Publication number Publication date
CN113301564B (en) 2022-07-15

Similar Documents

Publication Publication Date Title
CN106452503B (en) Full duplex relaying safe transmission method based on power distribution energy acquisition technology
CN108834112B (en) NOMA-based relay-assisted D2D communication system power distribution method
Elkourdi et al. Enabling slotted Aloha-NOMA for massive M2M communication in IoT networks
Di et al. NOMA-based low-latency and high-reliable broadcast communications for 5G V2X services
CN110062377B (en) Power division factor and beam forming combined optimization method in safe energy-carrying communication
CN106856611A (en) Wave beam processing method, initial beam find method and base station and terminal
CN106877919B (en) Relay safety communication method for power distribution energy collection based on optimal user selection
CN104506284B (en) The implementation method of ARQ agreements in SWIPT junction networks based on relay selection
CN107995680B (en) SWIPT relay power division coefficient adjusting method with interference energy collection function
CN106717080A (en) Method for synchronization signal transmission in wireless communication system
CN109982438A (en) A kind of multi-user resource distributing method based under NOMA and SWIPT cognitive radio environment
Ghazi et al. Uplink NOMA scheme for Wi-Fi applications
CN109348500A (en) Meet the resource allocation methods of two-way SWIPT relay system under the conditions of a kind of hardware damage
Wang et al. Full duplex random access for multi-user OFDMA communication systems
CN106878958B (en) Rapid propagation method based on adjustable duty ratio in software defined wireless network
CN111542109A (en) User peer-to-peer cooperation method based on power division under non-orthogonal multiple access
CN112994759B (en) Cooperative relay D2D communication method based on OFDM
CN113301564B (en) Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network
CN106973362A (en) D2D communication means based on network code in a kind of cellular network
Elkourdi et al. Enabling Aloha-NOMA for massive M2M communication in IoT networks
CN113452470B (en) Signal power optimization method of wireless energy supply communication network
Choi Channel-aware multichannel random access for energy-limited sensors and MTC devices
Song et al. A reliable transmission scheme for security and protection system based on internet of things
Sirkeci-Mergen et al. Broadcasting in dense linear networks: To cooperate or not to cooperate?
Anh et al. Reliability-security analysis for harvest-to-jam based multi-hop leach networks under impact of hardware noises

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant