CN114337977B - An anti-eavesdropping solution based on half-duplex cooperative NOMA system - Google Patents
An anti-eavesdropping solution based on half-duplex cooperative NOMA system Download PDFInfo
- Publication number
- CN114337977B CN114337977B CN202210024359.7A CN202210024359A CN114337977B CN 114337977 B CN114337977 B CN 114337977B CN 202210024359 A CN202210024359 A CN 202210024359A CN 114337977 B CN114337977 B CN 114337977B
- Authority
- CN
- China
- Prior art keywords
- user
- remote user
- relay
- remote
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 206010042135 Stomatitis necrotising Diseases 0.000 title claims abstract 4
- 201000008585 noma Diseases 0.000 title claims abstract 4
- 230000014509 gene expression Effects 0.000 claims abstract description 7
- 238000004364 calculation method Methods 0.000 claims abstract description 6
- 230000005540 biological transmission Effects 0.000 claims description 6
- 230000000295 complement effect Effects 0.000 claims description 2
- 238000010295 mobile communication Methods 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 8
- 238000004458 analytical method Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 238000011160 research Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域Technical field
本发明属于无线移动通信领域,主要针对的应用场景是半双工协作NOMA系统,主要应用是防止远端用户的信号被窃听,具体涉及单窃听者半双工协作NOMA系统的安全中断概率分析求得防止用户被窃听的最小服务质量要求。The invention belongs to the field of wireless mobile communications. The main application scenario is a half-duplex cooperative NOMA system. The main application is to prevent the signal of a remote user from being eavesdropped. Specifically, it relates to the analysis of the security interruption probability of a single eavesdropper half-duplex cooperative NOMA system. Minimum quality of service requirements to prevent users from being eavesdropped.
背景技术Background technique
鉴于互联网和物联网业务的高速发展,无线通信的业务需求日益增长。非正交多址接入技术(Non-orthogonal multiple access,NOMA)作为第五代无线网络中很有前途的关键技术之一,已在各个领域得到了广泛的应用。不同于以往的正交多址接入(Orthogonalmultiple access,OMA)技术,只能为一个用户分配单一的无线资源,例如按照频率或时间分割。NOMA技术允许在同一个资源块(时间/频率/编码)中通过不同的功率同时为多个用户服务。其接收端依据功率差异通过串行干扰消除(Successive interference cancel,SIC)消除来自其他用户的干扰进行解码。In view of the rapid development of the Internet and IoT services, the business demand for wireless communications is growing day by day. Non-orthogonal multiple access (NOMA) technology, as one of the promising key technologies in the fifth generation wireless network, has been widely used in various fields. Different from the previous Orthogonal Multiple Access (OMA) technology, only a single wireless resource can be allocated to a user, for example, divided according to frequency or time. NOMA technology allows serving multiple users simultaneously with different powers in the same resource block (time/frequency/coding). The receiving end uses serial interference cancel (Successive interference cancel, SIC) to eliminate interference from other users based on the power difference for decoding.
协作传输技术是对抗路径损失、信道衰落和阴影效应的有效技术,它可以形成虚拟多输入多输出方案,协作处理数据,提高信道条件差的用户的通信可靠性。在协作通信系统中,通过利用中继节点转发源节点的信号,称之为协作分集。中继节点的工作模式可以分为全双工模式和半双工模式。由于无线通信的广播特性,物理层安全作为一种实现安全通信的很有吸引力的方法,近年来引起了人们的广泛关注。因此如何防止用户信号被窃听是目前研究的主要方向。Cooperative transmission technology is an effective technology to combat path loss, channel fading and shadow effects. It can form a virtual multiple-input multiple-output scheme, collaboratively process data, and improve communication reliability for users with poor channel conditions. In a cooperative communication system, relay nodes are used to forward signals from source nodes, which is called cooperative diversity. The working mode of the relay node can be divided into full-duplex mode and half-duplex mode. Due to the broadcast nature of wireless communications, physical layer security has attracted widespread attention in recent years as an attractive method for achieving secure communications. Therefore, how to prevent user signals from being eavesdropped is the main direction of current research.
综上所述,现有技术存在的问题是:虽然现在对于协作NOMA系统的保密分析是一大研究热点,但是目前基于半双工协作NOMA系统中用户的防窃听方案研究比较少。To sum up, the problem with the existing technology is that although the security analysis of cooperative NOMA systems is a major research hotspot, there is currently relatively little research on anti-eavesdropping solutions for users in half-duplex cooperative NOMA systems.
解决上述问题的难度:获得基于单窃听者半双工协作NOMA系统中的安全中断概率的闭式表达式,以便推导远端用户不发生中断时的服务质量要求,进而防止远端用户信号被窃听。Difficulty in solving the above problem: Obtain a closed-form expression for the safe interruption probability in a single-eavesdropper half-duplex cooperative NOMA system, so as to derive the service quality requirements of the remote user when no interruption occurs, thereby preventing the remote user signal from being eavesdropped .
解决上述问题的意义:获得基于半双工协作NOMA系统中中继用户的中断概率和远端用户的安全中断概率的闭式表达式,定量了解基于单窃听者半双工协作NOMA系统的安全性能,推导了用户不发生中断的情况,进而有效防止远端用户的信号被窃听。The significance of solving the above problems: Obtain closed-form expressions for the interruption probability of relay users and the safe interruption probability of remote users in half-duplex cooperative NOMA systems, and quantitatively understand the security performance of half-duplex cooperative NOMA systems based on single eavesdroppers. , deducing the situation in which the user does not experience interruption, thereby effectively preventing the remote user's signal from being eavesdropped.
发明内容Contents of the invention
针对现有技术存在的问题,本发明提供了一种基于半双工协作NOMA系统的防窃听方案,用于防止远端用户的信号泄露,保障远端用户的信息安全。In view of the problems existing in the existing technology, the present invention provides an anti-eavesdropping solution based on the half-duplex cooperative NOMA system, which is used to prevent the remote user's signal leakage and ensure the remote user's information security.
第一方面,本申请提供了一种基于半双工协作NOMA系统的防窃听方案,所述方法包括:In the first aspect, this application provides an anti-eavesdropping solution based on the half-duplex collaborative NOMA system. The method includes:
S1.基站发送关于中继用户和远端用户的叠加编码信号到中继用户;S1. The base station sends the superimposed coded signal about the relay user and the remote user to the relay user;
S2.中继用户接收来自基站的信号,并采用串行干扰消除SIC进行解码;S2. The relay user receives the signal from the base station and decodes it using serial interference cancellation SIC;
S3.中继用户发送新的远端用户叠加编码信号;S3. The relay user sends a new remote user superimposed coded signal;
S4.远端用户和窃听者接收来自中继用户的信号,远端用户采用SIC解码信号,窃听者采用平行干扰消除PLC解码接收信号;S4. The remote user and the eavesdropper receive the signal from the relay user. The remote user uses SIC to decode the signal, and the eavesdropper uses parallel interference cancellation PLC to decode and receive the signal;
S5.根据香农公式,获得合法用户和窃听者的可实现速率;S5. According to the Shannon formula, obtain the achievable rates of legitimate users and eavesdroppers;
S6.获得远端用户的保密速率,然后通过数值计算获得远端用户的安全中断概率闭式表达式;S6. Obtain the confidentiality rate of the remote user, and then obtain the closed-form expression of the security interruption probability of the remote user through numerical calculation;
S7.根据远端用户刚好不发生中断时的服务质量要求,推导得到远端用户的最小防窃听服务质量要求。S7. Based on the service quality requirements of the remote user when no interruption occurs, derive the minimum anti-eavesdropping service quality requirements of the remote user.
进一步,所述方法还包括:Further, the method also includes:
当近端用户充当中继时,假设中继用户的发送功率和基站的发送功率一致。When a near-end user acts as a relay, it is assumed that the transmit power of the relay user is consistent with the transmit power of the base station.
进一步,所述方法包括:Further, the method includes:
由于距离、障碍物或其它现实原因导致远端用户以及窃听者和基站之间没有直接链路。Due to distance, obstacles or other practical reasons, there is no direct link between the remote user and the eavesdropper and the base station.
进一步,所述方法包括:Further, the method includes:
所述S2,包括:The S2 includes:
S21:中继用户接收到来自基站的信号后,根据功率分配大小不同,需要首先解码最远端用户的信号,然后解码次远端用户的信号,最后解码自身的信号。S21: After receiving the signal from the base station, the relay user needs to first decode the signal of the farthest user, then decode the signal of the secondary remote user, and finally decode its own signal according to the different power allocation.
S22:根据解码顺序,获得中继用户处分别解码中继用户和远端用户信号时的信号与干扰加噪声比(Signal to Interference plus Noise Ratio,SINR)。S22: According to the decoding sequence, obtain the signal to interference plus noise ratio (SINR) when the relay user decodes the relay user and remote user signals respectively.
进一步,所述方法包括:Further, the method includes:
中继用户工作在半双工模式去解码转发新的远端用户的叠加编码信号。The relay user operates in half-duplex mode to decode and forward the superimposed coded signal of the new remote user.
进一步,所述方法包括:Further, the method includes:
计算用户的可实现速率时,所述S5考虑的信道带宽为单位带宽。When calculating the user's achievable rate, the channel bandwidth considered in S5 is the unit bandwidth.
进一步,所述方法包括:Further, the method includes:
对于中继用户而言,只有中继用户同时成功解码远端用户和中继用户的信号时不会发生中断,所述S6远端用户的安全中断概率为远端用户的速率都小于用户服务质量要求的补。For relay users, only when the relay user successfully decodes the signals of the remote user and the relay user at the same time, no interruption will occur. The safe interruption probability of the S6 remote user is that the rate of the remote user is less than the user's quality of service. Required supplement.
附图说明Description of the drawings
为了使本发明的目的、技术方案及优点更加清楚,下面将结合附图对本发明作优选的详细描述,其中:In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings, in which:
图1是本发明实施提供的基于单窃听者半双工协作NOMA系统场景示意图。Figure 1 is a schematic diagram of a single eavesdropper half-duplex cooperative NOMA system scenario provided by the implementation of the present invention.
图2为本发明实施提供的安全中断概率分析流程图。Figure 2 is a flow chart of safety interruption probability analysis provided by the implementation of the present invention.
具体实施方式Detailed ways
以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需要说明的是,以下实施例中所提供的图示仅以示意方式说明本发明的基本构想,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。The following describes the embodiments of the present invention through specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments. Various details in this specification can also be modified or changed in various ways based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the illustrations provided in the following embodiments only illustrate the basic concept of the present invention in a schematic manner. The following embodiments and the features in the embodiments can be combined with each other as long as there is no conflict.
其中,附图仅用于示例性说明,表示的仅是示意图,而非实物图,不能理解为对本发明的限制;对本领域技术人员来说,附图中某些已知结构及其说明可能省略是可以理解的。The drawings are only for illustrative purposes and represent only schematic diagrams rather than actual drawings, which cannot be understood as limitations of the present invention. For those skilled in the art, some known structures and their descriptions may be omitted in the drawings. It's understandable.
下面结合附图对本发明的应用原理做详细的描述。The application principle of the present invention will be described in detail below with reference to the accompanying drawings.
本申请提供的基于单窃听者半双工协作NOMA系统中的安全中断概率分析是在图1的场景下实现的。其中BS表示中继,UE1表示中心用户,也是中继用户,UE2表示次远端用户,UE3表示最远端用户,E表示窃听者。hr表示基站和中继用户之间的信道参数,h1,i,分别表示中心用户与UE2,UE3和窃听者之间的信道参数,且假设其信道增益均服从指数分布。The security interruption probability analysis in the single-eavesdropper half-duplex cooperative NOMA system provided by this application is implemented in the scenario of Figure 1. Among them, BS represents the relay, UE 1 represents the central user, which is also the relay user, UE 2 represents the secondary remote user, UE 3 represents the farthest user, and E represents the eavesdropper. h r represents the channel parameters between the base station and the relay user, h 1,i , represent the channel parameters between the central user and UE 2 , UE 3 and the eavesdropper respectively, and it is assumed that the channel gains obey exponential distribution.
本发明实施提供的基于单窃听者半双工协作NOMA系统中的安全中断概率分析方法具体包括以下步骤:The security interruption probability analysis method in the single eavesdropper half-duplex cooperative NOMA system provided by the implementation of the present invention specifically includes the following steps:
S1.基站发送关于中继用户和远端用户的叠加编码信号到中继用户,基站发送的叠加信号可以表示为:S1. The base station sends a superimposed coded signal about the relay user and the remote user to the relay user. The superimposed signal sent by the base station can be expressed as:
其中x1,x2,x3分别表示中继用户,次远端用户和最远端用户的信号,Ps为基站的发送功率。Among them, x 1 , x 2 , and x 3 respectively represent the signals of the relay user, the secondary remote user and the most remote user, and P s is the transmit power of the base station.
S2.中继用户接收来自基站的信号,并采用串行干扰消除SIC进行解码,其中中继用户接收到的信号可以表示为:S2. The relay user receives the signal from the base station and uses serial interference cancellation SIC for decoding. The signal received by the relay user can be expressed as:
yr=hrx+n1 (2)y r =h r x+n 1 (2)
然后中继用户对接收到的信号采用SIC进行解码,对于半双工工作模式而言,中继用户依次解码最远端用户信号,次远端用户信号和中继用户,且解码信号时的SINR分别为:Then the relay user uses SIC to decode the received signal. For the half-duplex working mode, the relay user decodes the farthest user signal, the secondary remote user signal and the relay user in sequence, and the SINR when decoding the signal They are:
γ1=a1|hr|2ρ (5)γ 1 =a 1 |h r | 2 ρ (5)
其中表示基站的信噪比(Signal to Interference Ratio,SNR)。in Indicates the signal-to-noise ratio (SNR) of the base station.
S3.中继用户发送新的远端用户叠加编码信号,则中继用户转发的叠加信号为:S3. The relay user sends a new remote user superimposed coded signal, then the superimposed signal forwarded by the relay user is:
其中Pr为中继用户的发送功率,且有Pr=Ps,表示中继用户处的SNR。Where P r is the transmission power of the relay user, and P r =P s , Indicates the SNR at the relay user.
S4.远端用户和窃听者接收来自中继用户的信号,远端用户采用SIC解码信号,窃听者采用平行干扰消除PLC解码接收信号。具体而言,由于无线传输的广播性,所以小区内的用户都会接收到来自中心用户转发的信号,自然远端用户和窃听这也都会接收到远端用户的信号。最远端用户接收到来自中继用户的信号为:S4. The remote user and the eavesdropper receive the signal from the relay user. The remote user uses SIC to decode the signal, and the eavesdropper uses parallel interference cancellation PLC to decode and receive the signal. Specifically, due to the broadcast nature of wireless transmission, users in the community will receive signals forwarded from the central user. Naturally, remote users and eavesdroppers will also receive signals from remote users. The signal received by the farthest user from the relay user is:
y3=h1,3y+n3 (7)y 3 =h 1, 3 y+n 3 (7)
最远端用户解码最远端用户信号的SINR为:The SINR of the farthest user’s decoded signal is:
次远端用户接收到来自中继用户的信号为:The signal received by the secondary remote user from the relay user is:
y2=h1,2y+n2 (9)y 2 = h 1, 2 y+n 2 (9)
次远端用户采用SIC解码信号,次远端用户解码最远端用户信号和次远端用户信号的SINR分别为The sub-remote user uses SIC to decode the signal. The SINR of the sub-remote user decoding the farthest user signal and the sub-remote user signal are respectively
γ2=b1|h1,2|2ρ (11)γ 2 =b 1 |h 1,2 | 2 ρ (11)
窃听者接收到来自中继用户的信号为:The signal received by the eavesdropper from the relay user is:
ye=h1,ey+ne (12)y e =h 1,e y+n e (12)
然后窃听者通过并行干扰消除(Parallel interference cancellation,PLC)解码接收信号,则在窃听者处解码远端用户信号的SINR为:Then the eavesdropper decodes the received signal through parallel interference cancellation (PLC). Then the SINR of the remote user signal decoded at the eavesdropper is:
S5.根据香农公式,获得合法用户和窃听者的可实现速率,对于窃听者而言,其速率可以表示为S5. According to Shannon's formula, obtain the achievable rates of legitimate users and eavesdroppers. For eavesdroppers, their rates can be expressed as
对于合法用户而言,当中继用户工作在半双工模式时,次远端用户和最远端用户的可实现速率分别为:For legitimate users, when the relay user works in half-duplex mode, the achievable rates of the secondary remote user and the most remote user are:
S6.获得远端用户的保密速率,然后通过数值计算获得远端用户的安全中断概率闭式表达式,其中远端用户的保密速率为:S6. Obtain the remote user's confidentiality rate, and then obtain the closed-form expression of the remote user's security interruption probability through numerical calculation, where the remote user's confidentiality rate is:
其中[x]+=max{x,0}。然后通过数值计算获得系统的中断概率闭式表达式。具体为中继用户的中断概率和远端用户的安全中断概率。Among them [x] + =max{x,0}. Then the closed-form expression of the outage probability of the system is obtained through numerical calculation. Specifically, they are the outage probability of the relay user and the safe outage probability of the remote user.
第一步,计算中继用户的中断概率,中继用户只有在同时成功解码远端用户的信号和中继用户的信号时才不会发生中断,当中继用户工作在半双工模式时,中继用户的中断概率可以表示为:The first step is to calculate the interruption probability of the relay user. The relay user will not be interrupted until the remote user's signal and the relay user's signal are successfully decoded at the same time. When the relay user works in half-duplex mode, the relay user will not be interrupted. The outage probability of subsequent users can be expressed as:
其中 表示用户的服务质量要求,λr表示基站与中继用户之间的信道增益服从参数为λr的指数分布。in Indicates the user's service quality requirements, and λ r indicates that the channel gain between the base station and the relay user obeys an exponential distribution with parameter λ r .
第二步,计算远端用户的安全中断概率,远端用户的保密中断概率为远端用户的速率都小于用户服务质量要求的补,当中继用户工作在半双工模式时,远端用户的安全中断概率具体可以表示为:The second step is to calculate the remote user's secure interruption probability. The remote user's confidential interruption probability is the complement of the remote user's rate that is lower than the user's quality of service requirements. When the relay user works in half-duplex mode, the remote user's The safety outage probability can be specifically expressed as:
目前难以求得公式(1)的闭式解,因此考虑高信噪比的情况,当SNR趋于无穷时, 由此可得:It is currently difficult to obtain a closed-form solution to formula (1), so considering the situation of high signal-to-noise ratio, when SNR tends to infinity, Therefore:
其中 则基于单窃听者半双工协作NOMA系统的安全中断概率为:in Then the security interruption probability of the single eavesdropper half-duplex cooperative NOMA system is:
S7.根据远端用户刚好不发生中断时的服务质量要求,推导得到远端用户的最小防窃听服务质量要求。经过对数据传输过程的研究发现,由于计算的是安全中断概率,所以当远端用户处不发生中断时,窃听者一定不能窃取远端用户的信号,通过计算可得,当远端用户的服务质量要求满足以下条件时,S7. Based on the service quality requirements of the remote user when no interruption occurs, derive the minimum anti-eavesdropping service quality requirements of the remote user. After studying the data transmission process, it was found that since the safe interruption probability is calculated, when no interruption occurs at the remote user, the eavesdropper must not steal the remote user's signal. Through calculation, it can be found that when the remote user's service When the quality requirements meet the following conditions,
可以有效防止远端用户信号泄露。It can effectively prevent remote user signal leakage.
最后说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换,而不脱离本技术方案的宗旨和范围,其均应涵盖在本发明的权利要求范围当中。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention and are not limiting. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be modified. Modifications or equivalent substitutions without departing from the purpose and scope of the technical solution shall be included in the scope of the claims of the present invention.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024359.7A CN114337977B (en) | 2022-01-07 | 2022-01-07 | An anti-eavesdropping solution based on half-duplex cooperative NOMA system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024359.7A CN114337977B (en) | 2022-01-07 | 2022-01-07 | An anti-eavesdropping solution based on half-duplex cooperative NOMA system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114337977A CN114337977A (en) | 2022-04-12 |
CN114337977B true CN114337977B (en) | 2023-10-27 |
Family
ID=81026175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210024359.7A Active CN114337977B (en) | 2022-01-07 | 2022-01-07 | An anti-eavesdropping solution based on half-duplex cooperative NOMA system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114337977B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144080A (en) * | 2014-07-24 | 2014-11-12 | 上海斐讯数据通信技术有限公司 | System and method for managing terminal equipment through far-end equipment |
CN109548013A (en) * | 2018-12-07 | 2019-03-29 | 南京邮电大学 | A kind of mobile edge calculations system constituting method of the NOMA with anti-eavesdropping ability |
CN110113082A (en) * | 2019-03-20 | 2019-08-09 | 中山大学 | The method of the Robust Secure and rate optimized problem of multiple antennas non-orthogonal multiple access system based on the transmission of orthogonal space-time block coding |
AU2020100505A4 (en) * | 2020-04-02 | 2020-05-14 | Zhejiang Sci-Tech University | Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System |
CN111510987A (en) * | 2020-03-13 | 2020-08-07 | 西安电子科技大学 | A Relay Selection Method Based on Secure Cooperative NOMA Network |
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | A RIS-assisted NOMA-enabled method for VLC/RF hybrid network security transmission |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10608777B2 (en) * | 2017-12-11 | 2020-03-31 | Electronics And Telecommunications Research Institute | Apparatus and method for physical layer security commuication in wireless communication system |
US11431434B2 (en) * | 2019-12-10 | 2022-08-30 | Electronics And Telecommunications Research Institute | Method and apparatus for secure communication in wireless communication system |
-
2022
- 2022-01-07 CN CN202210024359.7A patent/CN114337977B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144080A (en) * | 2014-07-24 | 2014-11-12 | 上海斐讯数据通信技术有限公司 | System and method for managing terminal equipment through far-end equipment |
CN109548013A (en) * | 2018-12-07 | 2019-03-29 | 南京邮电大学 | A kind of mobile edge calculations system constituting method of the NOMA with anti-eavesdropping ability |
CN110113082A (en) * | 2019-03-20 | 2019-08-09 | 中山大学 | The method of the Robust Secure and rate optimized problem of multiple antennas non-orthogonal multiple access system based on the transmission of orthogonal space-time block coding |
CN111510987A (en) * | 2020-03-13 | 2020-08-07 | 西安电子科技大学 | A Relay Selection Method Based on Secure Cooperative NOMA Network |
AU2020100505A4 (en) * | 2020-04-02 | 2020-05-14 | Zhejiang Sci-Tech University | Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System |
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | A RIS-assisted NOMA-enabled method for VLC/RF hybrid network security transmission |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
Non-Patent Citations (6)
Title |
---|
NOMA系统中基于协作干扰的物理层安全方案;徐鑫;金梁;;信号处理(06);全文 * |
Performance Analysis of Full Duplex Cooperative NOMA System with Imperfect SIC;Huilin Jiang等;2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall);全文 * |
Secrecy Performance of Uplink-Downlink NOMA Network at Physical Layer;Shashibhushan Sharma;2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET);全文 * |
基于STBC的无线认知NOMA系统物理层安全性能研究;李美玲;田莉莉;杨晓霞;李莹;王安红;董增寿;Sami Muhaidat;Mehrdad Dianati;;电子学报(03);全文 * |
基于非完美信道信息的协作NOMA系统中保密通信技术研究;陈杨;张忠培;李彬睿;;电子科技大学学报(05);全文 * |
认知无线电非正交多址接入随机网络物理层安全性能分析;于宝泉;蔡跃明;胡健伟;;电子与信息学报(04);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114337977A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109890031B (en) | Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise | |
CN111245498B (en) | A relay-assisted non-orthogonal multiple access cooperative network security communication method | |
CN110212967B (en) | NOMA-based full-duplex relay cooperative communication system performance optimization method | |
CN110381503B (en) | Interference blocking scheme switching method for uplink secure transmission of millimeter-wave cellular network | |
CN109743768B (en) | Bidirectional relay communication scheme based on non-orthogonal multiple access technology | |
CN110730452B (en) | Performance analysis method for joint relay and interference selection scheme in wireless communication system | |
Tian et al. | Secrecy rate optimization in wireless multi-hop full duplex networks | |
Li et al. | Security enhancement with a hybrid cooperative NOMA scheme for MEC system | |
CN109451492A (en) | Safe transmission method in downlink full duplex relaying network based on man made noise and beam forming | |
Son et al. | A new approach for two-way relaying networks: improving performance by successive interference cancellation, digital network coding and opportunistic relay selection | |
CN106900030A (en) | Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks | |
CN110798282B (en) | Artificial noise implementation method of software radio MISO system | |
Zaghdoud et al. | Secure performance analysis for full-duplex cooperative NOMA system in the presence of multiple eavesdroppers | |
Kong et al. | Cooperative rate-splitting multiple access in heterogeneous networks | |
CN111107547B (en) | Secure transmission method of alternate relay network in eavesdropping environment | |
Li et al. | Physical layer security for CR-NOMA network with cooperative jamming | |
Wang et al. | Hybrid one-way full-duplex/two-way half-duplex relaying scheme | |
CN114337977B (en) | An anti-eavesdropping solution based on half-duplex cooperative NOMA system | |
Khennoufa et al. | Exact bit error rate of cooperative NOMA without diversity combining | |
Shemi et al. | Nelder‐Mead–based power optimization for secrecy enhancement in amplify‐and‐forward cooperative relay networks | |
CN117202171A (en) | Minimum safe rate resource allocation method for RIS (radio resource allocation system) auxiliary RSMA (RSMA) system | |
Uddin et al. | Uplink cooperative diversity using power‐domain nonorthogonal multiple access | |
CN113595675B (en) | Interference management method and system for maximizing safe data transmission rate | |
CN106712823B (en) | A beamforming method that can realize physical layer security transmission | |
CN115278662A (en) | Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |