KR101865452B1 - An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks - Google Patents
An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks Download PDFInfo
- Publication number
- KR101865452B1 KR101865452B1 KR1020150182105A KR20150182105A KR101865452B1 KR 101865452 B1 KR101865452 B1 KR 101865452B1 KR 1020150182105 A KR1020150182105 A KR 1020150182105A KR 20150182105 A KR20150182105 A KR 20150182105A KR 101865452 B1 KR101865452 B1 KR 101865452B1
- Authority
- KR
- South Korea
- Prior art keywords
- channel capacity
- frequency
- hop
- user
- channel
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/22—Traffic simulation tools or models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/02—Resource partitioning among network components, e.g. reuse partitioning
- H04W16/10—Dynamic resource partitioning
Abstract
The present invention relates to a multi-hop underlaying method in which a user who is not assigned a frequency in a line that does not exceed an interference threshold preset by a user assigned a frequency for efficient use of frequency uses multi- In a communication using an underlay cognitive radio scheme, a plurality of nodes are connected to avoid eavesdropping of eavesdroppers. A mathematical model is presented to easily evaluate the security failure probability of eavesdropping prevention.
Description
The present invention relates to a multi-hop underlaying method in which a user who is not assigned a frequency in a line that does not exceed an interference threshold preset by a user assigned a frequency for efficient use of frequency uses multi- The present invention relates to a wireless communication method and a wireless communication method, and more particularly, to a wireless communication method and a wireless communication method in which a plurality of nodes are connected to each other to avoid eavesdropping of an eavesdropper, Can be easily evaluated.
As recent technology develops, it is increasingly required to transmit important data using wireless communication. Security is important when transmitting data using wireless communications.
One type of security, cryptography, uses a "Key" to encrypt a message when it forwards it.
And when you check the message, you use "Key" to decrypt and get the message.
Here, "Key" is a rule created by mathematical complexity. However, as computer technology evolves, the cryptography of "Key", which relies on mathematical complexity with increasing computer process speed, is becoming more and more easily exposed to threats.
On the other hand, unlike cryptography, physical layer security is the one that started from the point of not delivering messages to eavesdroppers.
Physical layer security is a method of conveying a message to the eavesdropper by using the physical characteristics of the signal (antenna gain, transmission power, etc.) without sending as much as possible to the eavesdropper.
As wireless communication develops, there is an increasing use of frequency-limited resources. Frequency assigned technologies are not very high when they examine actual frequency utilization in a given space.
Accordingly, an underlay cognitive radio is used to allow users (PUs) allocated for efficient use of frequencies to use an unassigned user (SU) in a line that does not exceed a predetermined interference threshold.
Conventionally, when a user communicates with Underlay Cognitive Radio using a frequency, physical evaluation or complex simulation is performed in order to evaluate security against eavesdropping due to having a plurality of nodes.
Therefore, there is a problem that it takes a lot of cost and time.
SUMMARY OF THE INVENTION The present invention has been made in view of the above problems, and it is an object of the present invention to provide a wireless communication method and a wireless communication method in which, in communication using a Underlay Cognitive Radio scheme, a plurality of nodes are connected to avoid eavesdropping of eavesdroppers, And to provide a physical layer security evaluation system for a multi-hop underlay or radio network that can be easily evaluated by presenting a mathematical model without physical experiment and complicated simulation.
According to an aspect of the present invention for achieving the above object, a first aspect of the present invention provides a radio network controller for a radio communication system, comprising: a multi-hop underlay using a frequency of a user (PU) (PU = P) to a frequency interference limit point (PU =
An interference limit point setting unit that sets the interference limit point A plurality of nodes S, R 1 , R n , R k , and D used for communication of a user SU not having a frequency assigned thereto, 1 , R n , R k , and D), and calculates an inter-channel capacity based on the main channel capacity and the eavesdrop channel capacity used for communication of a user (SU) not assigned a frequency; A secure channel capacity calculating unit for calculating a secure channel capacity using the main channel capacity and the tapping channel capacity; And a security failure probability calculator for calculating a security failure probability based on the smallest value of the security channel capacity.
The second invention is characterized in that, in the first invention, the section channel capacity calculating section calculates a main channel capacity and an eavesdropping channel capacity by the following formula.
Main channel capacity (
)
Tap channel capacity (
)
In a third aspect of the present invention, in the first aspect, the secure channel capacity calculation unit calculates a secure channel capacity using the following formula.
In a fourth aspect of the invention according to the first aspect of the present invention, the security failure probability calculation unit calculates a security failure probability
) Is calculated.
According to the physical layer security evaluation system for a multi-hop underlay or radio network according to the present invention, a plurality of nodes are connected to avoid eavesdropping of an eavesdropper, and a mathematical model is presented to prevent eavesdropping without performing physical experiment and complicated simulation It is easy to evaluate the security failure probability.
Accordingly, there is an evaluation cost and a time saving effect according to physical experiment and simulation.
1 is a block diagram of a physical layer security assessment system for a multi-hop underlay or radio network according to the present invention;
FIG. 2 is a diagram illustrating a single node for avoiding eavesdropping when an eavesdropper is present in Underlay Cognitive Radio Networks;
FIG. 3 illustrates an example of a plurality of nodes to avoid eavesdropping when an eavesdropper is present in Underlay Cognitive Radio Networks,
FIG. 4 is a graph comparing simulation results of FIG. 3 with mathematical models presented in a physical layer security evaluation system for a multi-hop underlay or a radio network according to the present invention.
Hereinafter, a physical layer security evaluation system for a multi-hop underlay or radio network according to the present invention will be described in detail with reference to the accompanying drawings.
FIG. 1 is a block diagram of a physical layer security evaluation system for a multi-hop underlay or radio network according to the present invention. FIG. 2 illustrates an example of a single node for avoiding eavesdropping when an eavesdropper is present in Underlay Cognitive Radio Networks FIG. 3 is an exemplary diagram illustrating a plurality of nodes in order to avoid eavesdropping when an eavesdropper is present in Underlay Cognitive Radio Networks.
As shown in FIG. 1, in order to efficiently use a frequency, a user who has not been assigned a frequency in a line that does not exceed a predetermined interference limit point of a user (a primary user: PU = P) In this paper, we propose a mathematical model for the prevention of eavesdropping due to the presence of a large number of nodes in a multi - hop underlay or radio network. Layer security evaluation system.
A physical layer security evaluation system for a multi-hop underlay or radio network includes an interference threshold setting unit, a plurality of nodes, an interval channel capacity calculating unit, a secure channel capacity calculating unit, a secure channel capacity calculating unit, Probability calculator.
In this case, the interference threshold setting unit sets the interference threshold of the frequency from the P of the PU to which the frequency use is allocated,
) Is not exceeded.This means that P is the interference threshold (PU)
), It should not interfere with PU communication.Accordingly, the interference threshold setting unit may set the interference threshold value for the user's own smooth communication
), From which the interference threshold of the frequency ( ) So that P and SU can use the same frequency simultaneously.In order to avoid an eavesdropper, it is also possible to include a single node as shown in FIG. 2, and also to include the plurality (N) of nodes (S, R 1 , R n , R k , D) , The plurality (N) of nodes (S, R 1 , R n , R k , D)
), And is used for communication of a user (SU) not assigned a frequency.And S of the plurality of nodes (S, R 1, R n, R k, D) is a starting point, D is the destination, and, N relay to assist communications between the S and D nodes R 1, R n, and R k .
The inter-channel capacity calculation unit calculates a channel capacity between the plurality of nodes (S, R 1 , R n , R k , D), and calculates the channel capacity between the main channel capacity and the tapped channel capacity used for SU communication .
Before calculating the main channel capacity and the tapping channel capacity separately, P has set an interference limit point for his / her desired communication. And SUs should not exceed the interference limit. Therefore, considering the interference limit of P in S, R 1 , R n , R k ,
) .here
Is a channel information state between each SU (S, R 1 , R n , R k ) and P.At this time, P does not send its channel state information to SU. Therefore, in the present invention
Is defined by the following equation (1).
In Equation (1)
Is the channel state information between P and SU. Indicates the accuracy of the channel information, The bigger Wow Are similar.The interval channel capacity calculating unit may calculate a main channel capacity and an eavesdropping channel capacity by substituting into the Shannon formula.
First, the main channel capacity (
) Is a communication channel between SU (S, R 1 , R n , and R k ) and is expressed by Equation (2) below.
Here, hop is the number of relay nodes,
Is the transmission power of R k , Lt; / RTI > Channel state information at the time of transmission, Is the noise power.And the tapping channel capacity (
) Is a communication channel between SU (S, R 1 , R n , R k ) and E (eavesdropper), and is expressed by Equation (3) below.
here
Is channel state information between R n and E (eavesdroppers) Is the transmission power of R k , Is the noise power.
Meanwhile, the secure channel capacity calculation unit calculates a secure channel capacity using the main channel capacity and the tap channel capacity.
The secure channel capacity (
) Is the main channel capacity ) And tap channel capacity ), The following equation (4) is obtained.
On the other hand, the security failure probability calculator calculates the security channel capacity
), And calculates the security failure probability on the basis thereof.This is because when E (eavesdropper) eavesdrops, if the eavesdropping succeeds with the smallest value, the other case succeeds.
This is called the security failure probability (
) Refers to a case where all the failures have passed once through the N relays, which can be expressed by Equation (5) as follows.
Where R represents the channel capacity difference between the main channel and the eavesdrop channel in the system,
Is the average channel value between P and SU,Is the average channel value of the main channel, Is the average channel value of the intercept channel, and K is the hop count. Where R is defined as failure if the difference between the main channel capacity and the tapped channel capacity is less than R. [
FIG. 4 is a graph comparing simulation results of FIG. 3 with mathematical models presented in a physical layer security evaluation system for a multi-hop underlay or a radio network according to the present invention.
As shown in FIG. 4, the solid line, which is a mathematical model, and the simulation (o) show that the security channel probability decreases and the security becomes better as the number of relay nodes (k = 1, k = 2, k3) increases.
Accordingly, the present invention provides a mathematical model of the communication failure probability according to Equation (5), so that the security failure probability can be easily obtained by saving costs and shortening the time through actual physical experiments and simulations.
Although the present invention has been described in connection with the preferred embodiments mentioned above, various other modifications and variations will be possible without departing from the spirit and scope of the invention. It is, therefore, to be understood that the appended claims are intended to cover such modifications and changes as fall within the true scope of the invention.
Claims (4)
From the user (PU = P) assigned the frequency usage, An interference limit point setting unit for setting an interference limit point;
The interference threshold ( A plurality of nodes S, R 1 , R n , R k , D used for communication of users (SUs) having channel information in a frequency-unallocated user (SU);
The channel capacity between the plurality of nodes S, R 1 , R n , R k , and D is calculated and the main channel capacity and the tapping channel capacity, which are used for communication of the user SU An inter-channel capacity calculation unit for calculating the inter-channel capacity;
A secure channel capacity calculation unit for calculating a secure channel capacity using the main channel capacity and the tapping channel capacity; And
And a security failure probability calculation unit for calculating a security failure probability based on the smallest value of the security channel capacity.
Wherein the inter-channel capacity calculation unit calculates a main channel capacity and an eavesdropping channel capacity according to the following formula.
Main channel capacity ( )
Here, hop is the number of relay nodes, Is the transmission power of R k , Lt; / RTI > Channel state information at the time of transmission, Is the noise power.
Tap channel capacity ( )
here Is channel state information between R n and E (eavesdroppers) Is the transmission power of R k , Is the noise power.
The secure channel capacity calculation unit may calculate the secure channel capacity ( Wherein the multi-hop underlay or the radio network is calculated based on the received signal.
Here, hop is the number of relay nodes, Is the channel state information between each SU node (S, R 1 , R n , R k ) and P, Is channel state information between each SU node (S, R 1 , R n , R k ) and E (eavesdropper) Is the noise power.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150182105A KR101865452B1 (en) | 2015-12-18 | 2015-12-18 | An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150182105A KR101865452B1 (en) | 2015-12-18 | 2015-12-18 | An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170073329A KR20170073329A (en) | 2017-06-28 |
KR101865452B1 true KR101865452B1 (en) | 2018-06-07 |
Family
ID=59280953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150182105A KR101865452B1 (en) | 2015-12-18 | 2015-12-18 | An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101865452B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102282744B1 (en) * | 2020-03-26 | 2021-07-27 | 홍익대학교세종캠퍼스산학협력단 | Opportunistic scheduling method to improve the Physical-Layer Security in MU-MISO NOMA systems |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111132347B (en) * | 2019-12-30 | 2023-11-10 | 三维通信股份有限公司 | Resource allocation method, device and computer for wireless energy-carrying physical layer secure transmission |
KR102224645B1 (en) * | 2020-10-19 | 2021-03-08 | 국방과학연구소 | Communication system in multi-user environment, signal transmission method of base station and signal reception method of user equipment |
KR102578936B1 (en) * | 2020-11-12 | 2023-09-18 | 한국과학기술원 | Communication method of heterogeneous distributed wireless network system and network system thereof |
CN112566127B (en) * | 2020-11-30 | 2022-05-06 | 北京邮电大学 | Physical layer secure transmission method in cognitive wireless network based on unmanned aerial vehicle assistance |
KR102399979B1 (en) * | 2021-02-08 | 2022-05-18 | 홍익대학교세종캠퍼스산학협력단 | Node Selection and System Performance Evaluation Methods for improving system secrecy performance in multi-hop energy harvesting IoT networks |
CN113660656B (en) * | 2021-06-30 | 2023-10-17 | 南京邮电大学 | Cooperative physical layer secure communication method |
-
2015
- 2015-12-18 KR KR1020150182105A patent/KR101865452B1/en active IP Right Grant
Non-Patent Citations (3)
Title |
---|
"A Physical Layer Security-based Multihop Relaying Protocol for Underlay Cognitive Radio Networks" Nhu Tri Do 외 1인, 대한전자공학회학술대회 No.6, pp.1454-1455, 2015. * |
"Secure Transmission using Decode-and-Forward Protocol for Underlay Cognitive Radio Networks" Nhu Tri Do 외 1인, Int'l Conference on Ubiquitous and Future Networks, pp.914-918, 2015. |
"Secure Transmission using Decode-and-Forward Protocol for Underlay Cognitive Radio Networks" Nhu Tri Do 외 1인, Intl Conference on Ubiquitous and Future Networks, pp.914-918, 2015. * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102282744B1 (en) * | 2020-03-26 | 2021-07-27 | 홍익대학교세종캠퍼스산학협력단 | Opportunistic scheduling method to improve the Physical-Layer Security in MU-MISO NOMA systems |
Also Published As
Publication number | Publication date |
---|---|
KR20170073329A (en) | 2017-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101865452B1 (en) | An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks | |
CN105187200B (en) | Method for generating a key in a network, and user and network on a network | |
Tang et al. | Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks | |
Lv et al. | Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation | |
Shu et al. | Impact of interference on secrecy capacity in a cognitive radio network | |
KR101410764B1 (en) | Apparatus and method for remotely deleting important information | |
CN105024807A (en) | Data processing method and system | |
Grissa et al. | An efficient technique for protecting location privacy of cooperative spectrum sensing users | |
Lu et al. | Interference‐aware spectrum handover for cognitive radio networks | |
Ryu et al. | Confidential cooperative communication with trust degree of potential eavesdroppers | |
CN107113608A (en) | By user equipment and base station generate multiple shared keys using cipher key spreading multiplier | |
Soltani et al. | Covert communications on poisson packet channels | |
Ye et al. | A tractable model for optimizing device-to-device communications in downlink cellular networks | |
Xu et al. | Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks | |
KR102054715B1 (en) | Physical layer security method and system for cooperative multihop routing in ad-hoc wireless network | |
Ghourab et al. | Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network | |
Hou et al. | Message integrity protection over wireless channel by countering signal cancellation: Theory and practice | |
US11343278B2 (en) | Apparatus and method for protecting location privacy of cooperative spectrum sensing users | |
Sheikholeslami et al. | Energy-efficient secrecy in wireless networks based on random jamming | |
Yildiz et al. | The impact of incomplete secure connectivity on the lifetime of wireless sensor networks | |
CN112566123B (en) | Method and device for determining abnormal network node | |
Yang et al. | Less is more: need to simplify ETSI distributed congestion control algorithm | |
Lee et al. | Secure node packing of large-scale wireless networks | |
Tahmasbi et al. | Adaptive ternary timing covert channel in IEEE 802.11 | |
Graves et al. | Detection of channel degradation attack by intermediary node in linear networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E902 | Notification of reason for refusal | ||
E90F | Notification of reason for final refusal | ||
E701 | Decision to grant or registration of patent right |