CN113452470B - Signal power optimization method of wireless energy supply communication network - Google Patents

Signal power optimization method of wireless energy supply communication network Download PDF

Info

Publication number
CN113452470B
CN113452470B CN202110489492.5A CN202110489492A CN113452470B CN 113452470 B CN113452470 B CN 113452470B CN 202110489492 A CN202110489492 A CN 202110489492A CN 113452470 B CN113452470 B CN 113452470B
Authority
CN
China
Prior art keywords
node
base station
throughput
eavesdropping
energy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110489492.5A
Other languages
Chinese (zh)
Other versions
CN113452470A (en
Inventor
孔帅颖
张书彬
池凯凯
黄亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202110489492.5A priority Critical patent/CN113452470B/en
Publication of CN113452470A publication Critical patent/CN113452470A/en
Application granted granted Critical
Publication of CN113452470B publication Critical patent/CN113452470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/22Countermeasures against jamming including jamming detection and monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • H04W52/34TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a signal power optimization method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, and provides a scheme that other nodes send interference power to enable eavesdropping throughput of eavesdropping nodes to be lower than a threshold value and optimize interference power of other nodes to enable system data transmission throughput to be maximized, aiming at a scene that a potential eavesdropping node eavesdrops on a specific sensor node in the wireless energy supply network. The method ensures the safe data transmission in the wireless energy supply communication network, and can solve the optimal solution of the node interference power to obtain the maximum throughput of the node data transmission in the wireless energy supply communication network under the condition of determining the network topology.

Description

Signal power optimization method of wireless energy supply communication network
Technical Field
The invention relates to a signal power optimization method for preventing eavesdropping by utilizing interference signals in a wireless energy supply communication network, which is suitable for the wireless energy supply communication network in which sensor nodes can capture radio frequency energy and a potential eavesdropping node exists.
Background
The traditional sensor network powered by a battery has a plurality of problems, and the battery replacement is inconvenient in some scenes, such as the application of the traditional sensor network powered by the battery to some sensors for measuring physiological characteristics of human bodies. With the development of technology, wireless sensor networks with the capability of capturing environmental energy are about to replace traditional sensor networks. In the novel network, the nodes can absorb energy (such as solar energy, radio frequency energy and the like) from the surrounding environment while working, so that energy constraints that the traditional sensor nodes need to be replaced in time when the energy is exhausted are overcome.
Potential eavesdropping nodes are often present in the novel wireless energy-supplying communication network to challenge the safe transmission of data. According to the method, the nodes capture energy firstly and then carry out data transmission according to a time division multiplexing mode, a potential eavesdropping node in a network eavesdrops on a certain node while carrying out data transmission on the node, and meanwhile, other sensor nodes in the network send interference signals to the potential eavesdropping node by using the captured energy, so that the eavesdropping throughput of the eavesdropping node is lower than a threshold value. Optimizing the interference power of other nodes on the premise of ensuring safe data transmission so as to maximize the network throughput is a problem worthy of study.
Disclosure of Invention
In order to overcome the defect that safe transmission is rarely considered in the existing energy capture wireless sensor network, the invention provides a signal power optimization method of a wireless energy supply communication network for guaranteeing the safe transmission.
In order to solve the technical problems, the invention adopts the following technical scheme:
a method for optimizing signal power in a wireless powered communication network, said method comprising the steps of:
1) the wireless energy supply communication network comprises K sensor nodes capable of capturing radio frequency energy, a wiretap node and a mixed base station capable of transmitting radio frequency signals and receiving information of the sensor nodes, wherein the time length arranged by the network system takes T as a period and is divided into K +1 time slots, tau012,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with power
Figure BDA0003051652300000021
Figure BDA0003051652300000022
The interception node is interfered, and the interception throughput is lower than the threshold value RthTo achieve secure communication of the network;
the interference power
Figure BDA0003051652300000023
The value determination process of (1) is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKSetting a eavesdropping throughput threshold RthInitializing network system arrangement time length T and mixed base station broadcast time length tau0Time slot τ0The back node transmits information to the mixed base station in sequence in the time slot tauiIn node NiTransmitting information to the hybrid base station;
2.2): arbitrary sensor node NiI 1,2, …, K, at time slot τ0Captured energy EiCalculating according to the formula (1);
Ei=ξhip0τ0,i=1,2,...,K, (1)
where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.3): the transmission power of the node 1 is
Figure BDA0003051652300000024
Calculating node N according to formula (2)1Throughput R of1
Figure BDA0003051652300000025
Wherein, delta2Representing the Gaussian white noise power, g1Representing node N1Uplink channel gain, p, to a hybrid base station1Representing node N1A transmission power for transmitting information to the hybrid base station;
2.4): node NiThroughput R of 2,3, …, KiCalculated from equation (3):
Figure BDA0003051652300000031
wherein, giIndicating hybrid base station to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.5): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure BDA0003051652300000032
The following relationships exist:
Figure BDA0003051652300000033
Figure BDA0003051652300000034
2.6): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches a maximum, ReThe following equation (6) is obtained:
Figure BDA0003051652300000035
wherein h isEIndicating the channel gain of the eavesdropped link, hiERepresenting a node NiI ═ 2,3, …, K to the eavesdropping node's interfering link channel gain;
2.7): the following expression is derived from equation (6):
Figure BDA0003051652300000036
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003051652300000037
2.8): the following throughput expressions are obtained by combining equations (3), (5) and (7):
Figure BDA0003051652300000038
wherein
Figure BDA0003051652300000039
2.9): according to the formula (8), the slope l is obtainediWith respect to xiAnd i is 2,3, …, a relational expression of K:
Figure BDA00030516523000000310
Figure BDA0003051652300000041
2.10): except for the critical point, the slope of the node transmitting the interference power should be the same to maximize the system throughput, and this inference results in
Figure BDA0003051652300000042
Expression for slope l:
Figure BDA0003051652300000043
2.11): by aSA lower boundary value representing a feasible region of the slope l is initialized to 0; by aBAn upper boundary value representing the slope l is initialized to li maxI is the maximum of 2,3, …, K, where li maxRepresents the slope liMaximum value of (d);
2.12): order to
Figure BDA0003051652300000044
2.13): calculating the iterative interference power according to the formula (12)
Figure BDA0003051652300000045
Figure BDA0003051652300000046
2.14): computing
Figure BDA0003051652300000047
2.15): will be provided with
Figure BDA0003051652300000048
And a-delta2Compare if, if
Figure BDA0003051652300000049
lBL'; otherwise, lS=l';
2.16): repeating steps 2.12) to 2.15) until l' converges;
2.17): iterative interference power at convergence of l
Figure BDA00030516523000000410
As output optimal solution
Figure BDA00030516523000000411
Figure BDA00030516523000000412
Finishing;
3) at the next τ2To tauKAnd in the time slot, the nodes 2 to K carry out data transmission by using the energy left after the interference signal is sent.
The beneficial effects of the invention are as follows: the method ensures the safe data transmission in the wireless energy supply communication network, and can solve the optimal solution of the node interference power to obtain the maximum throughput of the node data transmission in the wireless energy supply communication network under the condition of determining the network topology.
Drawings
Fig. 1 is a flow chart of a method of signal power optimization for a wireless powered communication network.
Fig. 2 is a schematic diagram of a model of a wirelessly powered communications network in which a potential eavesdropping node is present.
Fig. 3 is a schematic diagram of a node capturing energy first and then performing data transmission in a time division multiplexing manner.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1-3, a method for optimizing signal power of a wireless powered communication network, the method comprising the steps of:
1) the wireless energy supply communication network comprises K sensor nodes capable of capturing radio frequency energy, a wiretap node and a hybrid base station capable of transmitting radio frequency signals and receiving information of the sensor nodes, wherein the time length arranged by the network system takes T as a period and is divided into K +1 time slots, tau012,…,τkIn time slot τ0Mixing base stations with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1In the method, a node 1 transmits data to a hybrid base station, an eavesdropping node eavesdrops the node 1, and nodes 2 to K utilize captured energy to respectively interfere with power
Figure BDA0003051652300000051
Figure BDA0003051652300000052
The interception node is interfered, and the interception throughput is lower than the threshold value RthTo achieve secure communication of the network;
in the step 2), the interference power
Figure BDA0003051652300000053
The value determination process is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKSetting a eavesdropping throughput threshold RthInitializing network system arrangement time length T and hybrid base station broadcast time length tau0Time slot tau0The back node transmits information to the mixed base station in sequence in time slot tauiIn, node NiTransmitting information to the hybrid base station;
2.2): arbitrary sensor node NiI 1,2, …, K, at time slot τ0Energy of capture EiCalculating according to the formula (1);
Ei=ξhip0τ0,i=1,2,...,K, (1)
where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.3): the transmission power of the node 1 is
Figure BDA0003051652300000061
Calculating node N according to formula (2)1Throughput of (R)1
Figure BDA0003051652300000062
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.4): node NiThroughput R of 2,3, …, KiCan be calculated from equation (3):
Figure BDA0003051652300000063
wherein, giRepresenting hybrid base stations to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.5): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure BDA0003051652300000064
The following relationships exist:
Figure BDA0003051652300000065
Figure BDA0003051652300000066
2.6): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches a maximum, ReThe following equation (6) is obtained:
Figure BDA0003051652300000067
wherein h isEIndicating the channel gain of the eavesdropped link, hiERepresenting a node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.7): the following expression is derived from equation (6):
Figure BDA0003051652300000068
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003051652300000071
2.8): simultaneous equations (3), (5) and (7) can give the following throughput expressions:
Figure BDA0003051652300000072
wherein
Figure BDA0003051652300000073
2.9): from equation (8), the slope l can be obtainediWith respect to xiAnd i is 2,3, …, a relational expression of K:
Figure BDA0003051652300000074
Figure BDA0003051652300000075
2.10): the inference that the slope of the nodes transmitting the interference power should be the same except for the critical point to maximize the system throughput
Figure BDA0003051652300000076
Expression for slope l:
Figure BDA0003051652300000077
2.11): by aSA lower boundary value representing a feasible region of the slope l is initialized to 0; by aBAn upper boundary value representing the slope l is initialized to li maxI is the maximum of 2,3, …, K, where li maxRepresents the slope liMaximum value of (d);
2.12): order to
Figure BDA0003051652300000078
2.13): calculating the iterative interference power according to the formula (12)
Figure BDA0003051652300000079
Figure BDA00030516523000000710
2.14): calculating out
Figure BDA00030516523000000711
2.15): will be provided with
Figure BDA0003051652300000081
And a-delta2Compare if, if
Figure BDA0003051652300000082
lBL'; otherwise, lS=l';
2.16): repeating steps 2.12) to 2.15) until l' converges;
2.17): iterative interference power at convergence of l
Figure BDA0003051652300000083
As output optimal solution
Figure BDA0003051652300000084
Figure BDA0003051652300000085
Finishing;
3) at the next τ2To tauKAnd in the time slot, the nodes 2 to K perform data transmission by using the energy left after the interference signal is sent.
In the present invention, the convergence of step 2.16) means: the absolute value of the subtraction of the front and rear l' values is smaller than a set precision value, and if the absolute value is smaller than the precision value, convergence is indicated, and if the absolute value is greater than or equal to the precision value, non-convergence is indicated.
Embodiments of the present invention are described with respect to a wireless powered communications network in which there is a potential eavesdropping node in the network. The network consists of a hybrid base station, a plurality of sensor nodes and a potential eavesdropping node. The invention researches the safety data transmission of a specific node in a wiretap network by using a wiretap node, wherein N is used for K nodesiI is 2,3, …, K.
In the case of a network system scheduled time period T, the entire time block T is divided into node energy capturesTime tau0And node transmission time tau1~τKTwo stages. In the first phase, the hybrid base station transmits at a transmission power p0To broadcast radio frequency signals. Node N in the second phase1Transmitting data tau1In the time slot of (1), the potential eavesdropping node eavesdrops on the node N1Node NiAnd i is 2,3, …, and K interferes the eavesdropping node by using the energy captured in the first stage, so that the eavesdropping throughput is lower than a threshold value. Subsequent τiNode N in time slotiAnd i is 2,3, …, and K uses the energy left by interference for data transmission.
Determining the value of a common slope l by using an efficient binary search algorithm, and then solving the optimal interference power by using l
Figure BDA0003051652300000086
The data transmission throughput of the nodes is maximized on the premise of ensuring the safe transmission of the wireless energy supply communication network.
The embodiments described in this specification are merely illustrative of implementations of the inventive concepts, which are intended for purposes of illustration only. The scope of the present invention should not be construed as being limited to the particular forms set forth in the examples, but rather as being defined by the claims and the equivalents thereof which can occur to those skilled in the art upon consideration of the present inventive concept.

Claims (1)

1. A signal power optimization method for a wireless energy supply communication network is characterized by comprising the following steps:
1) the wireless energy supply communication network comprises K sensor nodes capable of capturing radio frequency energy, a wiretap node and a hybrid base station capable of transmitting radio frequency signals and receiving information of the sensor nodes, wherein the time length arranged by the network system takes T as a period and is divided into K +1 time slots, tau012,…,τkIn time slot τ0Mixing base station with transmission power p0Broadcasting radio frequency signals, and capturing energy by K sensor nodes;
2) in time slot τ1Inner, node N1Transmitting data to the hybrid base station, and the eavesdropping node pair transmitting node N1Eavesdropping, node N2To node NKUsing the captured energy with respective interference power
Figure FDA0003574627760000011
The interception node is interfered, and the interception throughput is lower than the threshold value RthTo implement secure communication of the network;
the interference power
Figure FDA0003574627760000012
The value determination process is as follows:
2.1): the deployed K energy capture sensor nodes are randomly numbered 1,2, …, K, denoted N respectively1,N2,…,Ni,…,NKSetting a eavesdropping throughput threshold RthInitializing network system arrangement time length T and mixed base station broadcast time length tau0Time slot τ0The back node transmits information to the mixed base station in sequence in the time slot tauiIn, node NiTransmitting information to the hybrid base station;
2.2): arbitrary sensor node NiI 1,2, …, K, at time slot τ0Energy of capture EiCalculating according to the formula (1);
Ei=ξhip0τ0,i=1,2,...,K, (1)
where ξ is the node NiEfficiency of energy capture, hiIs a hybrid base station to node NiOf the downlink channel, p0Is the transmit power of the hybrid base station;
2.3): node N1Has a transmission power of
Figure FDA0003574627760000013
Calculating node N according to formula (2)1Throughput R of1
Figure FDA0003574627760000014
Wherein, delta2Representing the Gaussian white noise power, g1Representing a node N1Uplink channel gain, p, to a hybrid base station1Representing a node N1A transmission power for transmitting information to the hybrid base station;
2.4): node NiThroughput R of 2,3, …, KiCalculated by equation (3):
Figure FDA0003574627760000015
wherein, giIndicating hybrid base station to node NiOf the uplink channel, piRepresenting a node NiA transmission power for transmitting information to the hybrid base station;
2.5): for node NiI 2,3, …, K, data transmission power piAnd interference power
Figure FDA0003574627760000016
The following relationships exist:
Figure FDA0003574627760000021
Figure FDA0003574627760000022
2.6): for eavesdropping nodes, the eavesdropping throughput ReExactly equal to a given threshold value RthThe system throughput reaches a maximum, ReThe following equation (6) is obtained:
Figure FDA0003574627760000023
wherein h isEIndicating the channel gain of the eaves-dropped link, hiERepresenting node NiI is 2,3, …, K to the channel gain of the interference link of the eavesdropping node;
2.7): the following expression is derived from equation (6):
Figure FDA0003574627760000024
wherein the content of the first and second substances,
Figure FDA0003574627760000025
2.8): simultaneous equations (3), (5) and (7) give the following throughput expression:
Figure FDA0003574627760000026
wherein
Figure FDA0003574627760000027
2.9): according to the formula (8), the slope l is obtainediWith respect to xiAnd i is 2,3, …, a relational expression of K:
Figure FDA0003574627760000028
Figure FDA0003574627760000029
2.10): except for the critical point, the slope of the node transmitting the interference power should be the same to maximize the system throughput, and this inference results in
Figure FDA00035746277600000210
Expression for slope l:
Figure FDA00035746277600000211
2.11): by usingSA lower boundary value representing a feasible region of the slope l is initialized to 0; by aBAn upper boundary value representing the slope l is initialized to limaxI is the maximum of 2,3, …, K, where limaxRepresents the slope liMaximum value of (d);
2.12): order to
Figure FDA00035746277600000212
2.13): calculating the iterative interference power according to the formula (12)
Figure FDA00035746277600000213
Figure FDA0003574627760000031
2.14): computing
Figure FDA0003574627760000032
2.15): will be provided with
Figure FDA0003574627760000033
And a-delta2Compare if, if
Figure FDA0003574627760000034
lBL'; otherwise, |S=l';
2.16): repeating steps 2.12) to 2.15) until l' converges;
2.17): iterative interference power at convergence of l
Figure FDA0003574627760000035
As output optimal solution
Figure FDA0003574627760000036
Finishing;
3) at the next τ2To tauKAnd in the time slot, the nodes 2 to K carry out data transmission by using the energy left after the interference signal is sent.
CN202110489492.5A 2021-05-06 2021-05-06 Signal power optimization method of wireless energy supply communication network Active CN113452470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110489492.5A CN113452470B (en) 2021-05-06 2021-05-06 Signal power optimization method of wireless energy supply communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110489492.5A CN113452470B (en) 2021-05-06 2021-05-06 Signal power optimization method of wireless energy supply communication network

Publications (2)

Publication Number Publication Date
CN113452470A CN113452470A (en) 2021-09-28
CN113452470B true CN113452470B (en) 2022-06-17

Family

ID=77809775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110489492.5A Active CN113452470B (en) 2021-05-06 2021-05-06 Signal power optimization method of wireless energy supply communication network

Country Status (1)

Country Link
CN (1) CN113452470B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235423A (en) * 2017-12-29 2018-06-29 中山大学 Wireless communication anti-eavesdrop jamming power control algolithm based on Q study
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution
CN111328079A (en) * 2020-02-25 2020-06-23 大连理工大学 Multi-antenna covert communication method for movable eavesdropper

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10694526B2 (en) * 2016-09-30 2020-06-23 Drexel University Adaptive pursuit learning method to mitigate small-cell interference through directionality

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235423A (en) * 2017-12-29 2018-06-29 中山大学 Wireless communication anti-eavesdrop jamming power control algolithm based on Q study
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution
CN111328079A (en) * 2020-02-25 2020-06-23 大连理工大学 Multi-antenna covert communication method for movable eavesdropper

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
High-Throughput Communication Scheme Between Nodes in Backscatter;MAO keji 等;《传感技术学报》;20201215;全文 *

Also Published As

Publication number Publication date
CN113452470A (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN110062377B (en) Power division factor and beam forming combined optimization method in safe energy-carrying communication
CN109067488B (en) Energy accumulation-based information and energy bidirectional transmission system performance optimization method
CN109525984B (en) Method for improving safety rate of untrusted relay energy-carrying communication system
CN110213807B (en) Safety rate optimization method of energy-limited non-trusted relay network
CN107241799B (en) Energy-efficient resource allocation and interference alignment joint method in heterogeneous network
CN110708698A (en) Physical layer secure transmission method of heterogeneous wireless sensor network based on wireless energy-carrying communication
CN107426792A (en) A kind of work(of purpose user scrambling divides energy acquisition to relay safe transmission scheme
Guo et al. A power allocation method based on particle swarm algorithm for NOMA downlink networks
CN115379393A (en) Full-duplex relay unmanned aerial vehicle energy efficiency optimization method facing interference coordination
CN101471705B (en) Sensing network node terminal with environmental suitability automatic gain adjustment
CN113452470B (en) Signal power optimization method of wireless energy supply communication network
CN112261662B (en) Transmission method for improving energy efficiency of NOMA cooperative communication system
CN116456383A (en) Signal mapping algorithm processing system for wireless network transmission channel
CN113747452B (en) Cloud wireless access network communication cooperative beam forming design method and system
CN114520989B (en) Multi-carrier wave number energy simultaneous transmission NOMA network energy efficiency maximization method
CN110545128A (en) Cooperative transmission optimization method in environment backscatter array communication system
CN114285504B (en) Large-scale wireless energy supply backscattering communication network transmission performance research method
CN112994870B (en) Power equipment transmission power optimization method and device for full-duplex D2D communication
CN113301564B (en) Heuristic method for preventing eavesdropping by utilizing interference signals in wireless energy supply communication network
Wang et al. Performance analysis of aerial base station assisted cooperative communication systems
CN110572871B (en) Wireless energy-carrying relay system with multiple eavesdropping nodes and resource allocation method thereof
CN110545577B (en) Passive node transmission system and safety energy efficiency maximization method thereof
Li et al. Power allocation for capacity maximization in sensing-based cognitive DF relay networks with energy harvesting
CN102238736A (en) Decode-and-forward relaying resource allocation method for orthogonal frequency division multiplexing (OFDM) system
CN113726396A (en) High-energy-efficiency confidential transmission method of full-duplex wireless energy-carrying relay communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant