Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe transmission method of physical layer in wireless communication

A technology of physical layer security and transmission method, which is applied in the field of wireless communication systems, can solve problems such as high power utilization, inability to effectively demodulate information, low power utilization, etc., and achieve the effect of high power utilization

Inactive Publication Date: 2010-12-01
XI AN JIAOTONG UNIV
View PDF1 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the problem that the power utilization rate is too low due to the design of the above random weighting coefficients, and proposes a wireless physical layer security transmission method for randomly selecting transmitting antennas. This method makes the signals sent by the base station always superimpose in phase at the desired user to obtain the highest The transmission gain is very high, and the power utilization rate is very high; for eavesdropping users, the information cannot be effectively demodulated, so as to achieve the purpose of secure communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe transmission method of physical layer in wireless communication
  • Safe transmission method of physical layer in wireless communication
  • Safe transmission method of physical layer in wireless communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and specific examples.

[0025] The present invention relates to a system model of secure transmission such as figure 1 As shown, base station Alice has multiple antennas, expects user Bob to use a single antenna, and eavesdropping user Eve adds multiple antennas to obtain information. In the specific implementation here, the base station J=8 antennas are selected, 1 antenna is expected for the user, and 4 antennas are used for the eavesdropping user. The significance of secure communication is that the symbols transmitted by the base station are only expected to be obtained by expected users, but not by eavesdropping users. The eavesdropping user here is passive, that is, it only eavesdrops on information and does not transmit signals into space. In addition, this wireless security transmission model generally requires the reciprocity of the sending and receiving chann...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe transmission method of a physical layer in wireless communication, which is characterized by comprising the following steps of: a single-antenna desired user firstly transmits unencrypted request information to a multi-antenna base station; the base station receives the request information and estimates a signal path between the base station and the desired user with a frequency piloting sequence; the base station modulates bit to be transmitted into a constellation point symbol b (n) with a known phase position modulating mode, designs a fast-variable weighting coefficient, weights the constellation point symbol b (n) to be transmitted, and transmits the weighted symbol on selected Jrand antennas according appointed gross power; the desired user receives the weighted symbol, i.e. a weighting symbol, and decodes with a maximum likelihood method; and a wiretap user fast changes the weighting coefficient due to the process of the base station, can not decode with a blind equalization method, and can not decode with the maximum likelihood method, so that the method finally realizes the safe transmission.

Description

technical field [0001] The invention relates to a wireless communication system, in particular to a physical layer security transmission method in the wireless communication system. Background technique [0002] In recent years, various wireless communication technologies have emerged in an endless stream. The emergence of these technologies enables terminals such as computers and mobile phones to have mobile access capabilities, solves the connection constraints of traditional wired access, and provides users with various efficient and high-speed access plan. With the continuous improvement of the data transmission rate supported by the wireless communication system and the continuous expansion of the wireless user scale, it has become an inevitable trend of communication development that the wireless communication system gradually replaces the traditional wired communication system in many aspects. At the same time, with the wide popularization of wireless communication i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/06H04L25/02H04L1/00H04L27/20
Inventor 穆鹏程殷勤业王文杰张建国姜红艳
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products