Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof

A technology of a relay system and a transmission method, which is applied to a multi-antenna untrusted relay system based on limited feedback and its transmission field, can solve problems such as the inability to obtain complete CSI and the like

Active Publication Date: 2014-10-15
HUAQIAO UNIVERSITY
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies of the prior art. In view of the lack of consideration of the fact that complete CSI cannot be obtained in the current exploration of the physical layer security of the cooperative r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof
  • Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof
  • Multi-antenna non-trusted relay system based on limit feedback and transmission method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0032] like figure 1 As shown, the structure of the communication system includes a sending signal source S node, an untrusted relay R node and a legitimate receiving D node. The numbers of antennas of S node, R node and D node are M, 1, M respectively, and R node is an amplify and forward (AF) untrusted relay. The system uses limited feedback technology to obtain the channel state information CSI of the S-R channel, and estimates the channel state information CSI of the R-D channel through the training signal. There is no training estimation error and there is channel reciprocity.

[0033] The embodiment of the invention discloses a transmission method for self-adaptive selection of the number of feedback bits, and a complete communication process is completed within two time slots. In the first time slot, the S node sends the signal to be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-antenna non-trusted relay system based on limit feedback, and a transmission method for feedback bit number self-adaptive selection of the multi-antenna non-trusted relay system based on limit feedback. The model is a single-relay communication system comprising a signal transmitting source, a non-trusted relay and a legal receiving node. In the strategy, the transmitting source only needs to know a mark number of a channel quantified in a codebook and does not need to know channel complete state information (CSI). Safety interruption probability is minimized via reasonable selection of the feedback bit number under the situation of reaching the requirement for a receiving signal interference noise ratio (SINR) threshold so that safety and reliability of the system are both realized.

Description

technical field [0001] The present invention relates to a wireless communication system applied to multi-antenna cooperative relay, more specifically, to a multi-antenna untrusted relay system based on limited feedback, and a multi-antenna untrusted relay system based on limited feedback A transmission method for adaptively selecting the number of feedback bits of the successor system. Background technique [0002] The core idea of ​​wireless communication physical layer security is to explore the physical characteristics of wireless communication systems to provide a secure communication environment. The physical layer security technology makes full use of the complex spatial characteristics and time-varying characteristics of wireless channels, so that eavesdroppers cannot receive confidential signals, and the security of information transmission can be guaranteed directly from the physical layer. Based on Shannon's information security theory, Wyner first proposed the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B7/06
Inventor 赵睿吴亚峰贺玉成龚艳君
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products