Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer security transmission method for keeping relay and jamming node selection result secret

A technology of physical layer security and interference node, which is applied in the field of physical layer security transmission that keeps the selection result of relay and interference node confidential, and can solve the problems of network security performance deterioration, insufficient consideration of selection process and result confidentiality, etc.

Inactive Publication Date: 2015-03-25
XIAN UNIV OF TECH
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the existing relay or interference node selection methods can usually obtain relatively good system performance, the confidentiality of the selection process and results is not considered enough
If there are multiple eavesdropping users in the network, and they intercept the selection result of the relay or interference node, they can cooperate with each other, use cooperative beamforming and other means to eliminate or reduce interference, and extract useful signals, thereby leading to a sharp deterioration in network security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer security transmission method for keeping relay and jamming node selection result secret
  • Physical layer security transmission method for keeping relay and jamming node selection result secret
  • Physical layer security transmission method for keeping relay and jamming node selection result secret

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0072] In the present invention, the physical layer security transmission method for keeping the selection result of the relay and the interference node secret, first establishes as figure 1 Shown is a wireless transmission network with eavesdropping nodes. The network includes a source node S, a destination node D, and M intermediate nodes T 1 , T 2 ,...,T M , and K eavesdropping nodes E 1 ,E 2 ,...,E K . The source node, the intermediate node and the eavesdropping node all have a single antenna, and the destination node is equipped with N antennas. Due to the influence of obstacles and other factors, there is no direct communication link between the source node and the destination node and the eavesdropping node, and the information transmission must be completed with the help of the intermediate node. During the transmission proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a physical layer security transmission method for keeping a relay and jamming node selection result secret. A wireless transmission network in which hacking nodes exist is established and comprises a source node S, a destination node D, M intermediate nodes T<1>, T<2>, ..., T<M>, and the K hacking nodes E<1>, E<2>, ..., E<K>, the whole transmission process includes two stages, wherein in the first stage, the source node broadcasts information s and considers that the information s can be successfully decoded in all the intermediate nodes in the stage; in the second stage, the selected intermediate nodes forward information to the destination node through a decoding forwarding protocol, and jamming nodes transmit jamming information to the hacking nodes. The security outage probability performance of the relay and jamming node selection result is similar to that of an optimal selection result acquired through a method of exhaustion, and the relay and jamming node selection result has high security outage probability performance; only statistical channel state information of a hacking user needs to be acquired in the relay and jamming node selection process, and high practicability is achieved; the relay and jamming node selection result is kept secret to the hacking nodes, and the transmission security of confidential signals is guaranteed.

Description

technical field [0001] The invention belongs to the communication field and relates to a physical layer security transmission method, in particular to a physical layer security transmission method for keeping the selection result of relay and interference nodes secret. Background technique [0002] With the wide application of contemporary wireless communication technology in daily life, more and more attention has been paid to the security and privacy of wireless transmission. Ensuring the security and privacy of wireless transmission has become a very important research topic. In traditional networks, security is guaranteed through the encryption mechanism at the upper layer of the network. However, signal encryption requires the generation and interaction of secret keys, which will bring additional complexity and signaling overhead to the system. Physical layer security technology ensures the security and privacy of information transmission by making use of the physical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04K3/825H04K2203/34
Inventor 惠鏸梁军利
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products