Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

42results about How to "Increase confidentiality capacity" patented technology

CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization

The invention provides a CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization. The CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization comprises the steps of: establishing a system model; initializing a quantum population and system parameters, so that mapping modes of quantum individuals are obtainedthrough a mapping rule; calculating adaptive values of the quantum individuals, and taking the quantum individual, the adaptive value of which is the maximum in the quantum population, as the globallyoptimal solution; generating new quantum individuals through evolution and crossover strategies; obtaining mapping modes of the new quantum individuals according to the mapping rule, calculating adaptive values, and updating the quantum population and the globally optimal solution through greedy selection; if the iteration time is less than the pre-set maximum iteration time, returning to the fourth step; and otherwise, ending iteration, and outputting the globally optimal solution, so that an optimal power distribution scheme is obtained. According to the CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization provided by the invention, the spectrum utilization rate is effectively increased; self-interference and mutual interference of base stations and users are sufficiently considered; the secrecy capacity of a system is increased to a great extent; and a new solution is provided for the power distribution problem of a complex system.
Owner:HARBIN ENG UNIV

Physical layer safety transmission method of manual noise based on constellation rotation

The invention provides a physical layer safety transmission method of manual noise based on constellation rotation. A technical problem that a wireless communication system is small in secrecy capacity in the prior art is solved. The realization step is as follows: a source node S acquires channel state information to a destination node D, produces a sending signal and performing beamforming on the sending signal, produces manual noise and performs the constellation rotation at the specified angle and the beamforming; the source node S overlaps the sending signal after beamforming and the manual noise after constellation rotation as a compound signal, and sends the compound signal; the destination node D receives the compound signal passing through a channel, and demodulates the same to acquire a demodulated signal. By performing the constellation rotation on the manual noise, the receiving signal signal-to-noise ratio of a sending end can be obviously improved, and the signal-to-noiseratio of an illegal eavesdropping terminal can be maintained at the low value level, thereby improving the secrecy capacity of the wireless communication system, and the security of the wireless communication system is effectively improved.
Owner:XIDIAN UNIV

Mobile equipment position control method and device for dynamic noise based on signal-to-interference and noise ratio

The invention provides a mobile equipment position control method and device for dynamic noise based on signal-to-interference and noise ratio, and the method comprises the steps: determining a first change trend of a first secrecy capacity of a communication system in an (n+1)-th time slot relative to a second secrecy capacity of the communication system in an n-th time slot; determining a first change trend of a first interception capacity of mobile equipment in an (n+1)-th time slot relative to a second interception capacity of the mobile equipment in an n-th time slot; determining the SINR of a signal received by the mobile equipment in the same time period; adjusting the transmission power of target end equipment in transmitting a manual noise signal; and transmitting the feedback information to the mobile terminal according to the first change trend. According to the embodiment of the invention, the method can achieve the control of the movement position of the mobile equipment according to the feedback information, achieves the further optimization of the secrecy capacity of the communication system through the adaptive adjustment of the manual noise signal, and enables the safe communication to be carried out continuously.
Owner:SHENZHEN UNIV

Multicast method and device based on physical layer security transmission

Embodiments of the invention provide a multicast method and device based on physical layer security transmission. The method comprises the following steps of estimating channel state information of each multicast user according to a pilot frequency training sequence; when the first number is smaller than the second number, acquiring secrecy capacity according to the estimated channel state information, determining a target multicast user from the multicast user corresponding to the acquired maximum secrecy capacity, and determining sub-carriers corresponding to the maximum secrecy capacity astarget sub-carriers; respectively loading the target sub-carriers into a null space of a main channel corresponding to the target multicast user according to the estimated channel state information inorder to obtain a target channel; and correspondingly introducing artificial noise into each zero space, superposing the artificial noise and data to be sent, and sending the superposed signal through the target channel of each target multicast user. According to the scheme provided by the embodiments of the invention, when different secret QoS requirements of each user in a multicast group are ensured, the correctness of the data can be guaranteed.
Owner:CHINA CRIMINAL POLICE UNIV

Mixed duplex transmission method for improving physical layer security in cognitive relay network

ActiveCN107171775AIncrease safety capacity situationDetrimental effects of weakening transmission capacity performanceAllocation timingSecurity arrangementSelf interferencePhysical layer
The invention discloses a mixed duplex transmission method for improving physical layer security in a cognitive relay network. The mixed duplex transmission method comprises the steps of, by a pair of unauthorized users, sharing a frequency band resource with an authorized user in the cognitive relay network with an illegal eavesdropper under the assistance of a cooperative relay and under the interference limitation to a main user; and by the relay, playing a role of confusing the illegal eavesdropper through adding man-made noise while assisting to decode and forward information. One relay transmission frame is divided into two equal time slots during half-duplex transmission. The relay transmission frame is not subjected to time slot division during the full-duplex transmission. When the full-duplex self-interference power is lower than a threshold value, the full-duplex transmission is adopted; otherwise, the half-duplex transmission is adopted. Switching between the half-duplex transmission and full-duplex transmission is realized based on the full-duplex self-interference power, respective advantages of the half-duplex mode and the full-duplex mode are utilized, and the physical layer security of the cognitive relay network is finally improved by increasing the total transmission capacity of the cognitive relay network.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Physical layer security resource allocation method in ICV network

The invention discloses a physical layer security resource allocation method in an ICV network, solves the problem that an existing allocation mode cannot optimize V2V time delay, and belongs to the technical field of wireless communication. The method comprises the following steps: S1, a sending vehicle in each V2V link being an intelligent agent, the intelligent agent being realized by adoptinga deep reinforcement learning network and comprising a trained target network and a real-time network, and the target network being used for updating parameters of the real-time network; S2, each intelligent agent obtaining local observation of the environment, including information of legality, interference and eavesdropping channels, sending load, time delay limitation, training iteration timesof a target network and exploration utilization probability; S3, each intelligent agent outputting an action by using a real-time network according to local observation, wherein the action comprises afrequency band occupied by signal sending and transmitting power; S4, the target networks of all the intelligent agents receiving the same reward from the environment, the environment entering the global state of the next moment, executing the step S2, and the reward comprising the system secrecy capacity and the time delay limit.
Owner:HARBIN INST OF TECH

Hybrid resource configuration method for fog computing Internet-of-Things physical layer security

The invention provides a hybrid resource configuration method for fog computing Internet-of-Things physical layer security. The method comprises the following steps: establishing a secure fog computing Internet-of-Things system model; initializing a quantum galaxy group and parameters; according to a designed quantum galaxy group evolution rule, evolving all quantum galaxes; measuring the quantum states of the updated quantum galaces to obtain the measurement states of all the updated quantum galaces, calculating the fitness of the measurement states, and updating the measurement states of all the quantum galaces and the global optimal measurement state of the quantum galaces according to the fitness value; and judging whether a termination condition is met. If the algebra of the current evolution is smaller than the set maximum number of iterations, i is made to be equal to i+1, and the third step is executed; otherwise, the evolution is terminated, and the global optimal measurement state of the quantum galaxy group is output, thereby obtaining a corresponding hybrid resource configuration scheme. According to the invention, the uplink secrecy capacity of the whole Internet-of-Things system is greatly improved, network data leakage is reduced, and the Internet-of-Things user is prevented from eavesdropping useful information by a malicious eavesdropper.
Owner:HARBIN ENG UNIV

Resource allocation method for improving wireless transmission safety performance of Internet of Vehicles

The invention relates to a resource allocation method for improving the wireless transmission safety performance of the Internet of Vehicles. The method comprises the steps of obtaining a first communication parameter of each first communication link, a second communication parameter of each second communication link, a first eavesdropping parameter of a first eavesdropping link and a second eavesdropping parameter of a second eavesdropping link in the Internet of Vehicles, respectively calculating channel transmission capacities of each first communication link and each second communication link on each resource block according to the first communication parameter and the second communication parameter; respectively calculating a first eavesdropping channel capacity and a second eavesdropping channel capacity according to the first eavesdropping parameter and the second eavesdropping parameter, and determining the total confidentiality capacity of the system through the transmission capacity of each channel and the capacity of each eavesdropping channel, establishing a resource allocation and power control combined model based on the target of the maximum total confidentiality capacity of the system, allocating resource blocks, and improving the safety performance of the system in a manner of improving the confidentiality capacity of the system.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD

Secure communication method based on feedback under MIMO eavesdropping channel

ActiveCN106972912ALarge diversity gain and coding rateSimple linear processingError prevention/detection by diversity receptionSignal-to-noise ratio (imaging)Secure communication
The invention provides a secure communication method based on feedback under a MIMO eavesdropping channel. The secure communication between a target user possessing N transmitting antennas and a source end is realized, and the eavesdropping of an eavesdropper is prevented. The secure communication method is characterized in that the feedback performance gain of the source end as the receiving end is optimized, so that the receiving signal-to-noise ratio of the source end is higher than the eavesdropper. The secure capacity of the MIMO eavesdropping channel is improved, not only can be the receiving signal-to-noise ratio of the legal receiving end improved, but also can be the feedback performance gain of the MIMO eavesdropping channel enlarged. A theoretical simulation experiment shows that the feedback performance gain is in a linear increasing relation along the increasing of the signal-to-noise ratio; and meanwhile, the theoretical simulation shows that the security gap between the legal receiving end using the protocol and the eavesdropping end is increased along the increasing of the transmitting antenna number and / or signal-to-noise ratio.
Owner:DONGHUA UNIV

Power allocation method for ccfd-massive MIMO system optimized by quantum backtracking search

The invention provides a CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization. The CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization comprises the steps of: establishing a system model; initializing a quantum population and system parameters, so that mapping modes of quantum individuals are obtainedthrough a mapping rule; calculating adaptive values of the quantum individuals, and taking the quantum individual, the adaptive value of which is the maximum in the quantum population, as the globallyoptimal solution; generating new quantum individuals through evolution and crossover strategies; obtaining mapping modes of the new quantum individuals according to the mapping rule, calculating adaptive values, and updating the quantum population and the globally optimal solution through greedy selection; if the iteration time is less than the pre-set maximum iteration time, returning to the fourth step; and otherwise, ending iteration, and outputting the globally optimal solution, so that an optimal power distribution scheme is obtained. According to the CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization provided by the invention, the spectrum utilization rate is effectively increased; self-interference and mutual interference of base stations and users are sufficiently considered; the secrecy capacity of a system is increased to a great extent; and a new solution is provided for the power distribution problem of a complex system.
Owner:HARBIN ENG UNIV

Self-adaptive safety communication device and method based on vortex electromagnetic waves

The invention discloses a self-adaptive safety communication device and method based on vortex electromagnetic waves, and relates to the technical field of wireless communication. Generating a direction radiation coefficient table of the N-element uniform circular ring antenna array under a given carrier frequency; adaptively selecting an orbital angular momentum mode for sending the artificial noise; orbital angular momentum modulation of the sending signal and the artificial noise; the invention relates to coaxial multimode multiplexing transmission of orbital angular momentum. According to the invention, the secure wireless communication can be realized by using only one uniform circular ring antenna array. The artificial noise is multiplexed in a non-zero mode, so that legal users are not interfered, the channel capacity of eavesdroppers is reduced, and high-capacity secret communication is realized. Meanwhile, according to the direction angle information of the eavesdropper, the optimal mode of the artificial noise is adaptively selected, the eavesdropper is shielded to the maximum extent, and the secrecy performance of the system is improved. And when the direction of the eavesdropper is unknown, a mode of random hopping of an artificial noise mode is adopted to shield potential eavesdroppers in all directions, so that the secrecy capacity of the system is improved.
Owner:江苏集萃移动通信技术研究所有限公司

Power service secure transmission method and system based on edge calculation

InactiveCN112995129AOptimize computing resourcesOptimize communication resourcesCircuit arrangementsTransmission monitoringPower utilityTransmitted power
The invention discloses a power service secure transmission method and system based on edge calculation. The method comprises the steps: taking the easy eavesdropping during data unloading and the limited processing resources of a power service terminal as consideration factors, According to the processing capability of power terminal equipment, carrying out the edge calculation; the method comprises the following steps: respectively calculating energy consumption of power service for local calculation and secure unloading transmission energy consumption unloaded to a mobile edge calculation server, introducing a Lagrange function based on a physical layer protection technology of main channel capacity and eavesdropping channel capacity, establishing a transmitting power utility function for secure unloading, introducing a KKT condition equation, and establishing a secure unloading transmission power utility function for secure unloading; by calculating the optimal solution, the local optimal task allocation quantity of the power terminal equipment and the optimal transmitting power for safe unloading are obtained, the safe transmission of the power service is completed, the calculation and communication resources of the power terminal equipment are optimized, and the secrecy capacity and the safety of the system are improved.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products