Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Physical Layer Security Transmission Method for Secrecy of Relay and Interference Node Selection Results

A physical layer security and interference node technology, applied in the field of physical layer security transmission that keeps the selection results of relay and interference nodes secret, can solve the problems of network security performance deterioration, insufficient consideration of the selection process and result confidentiality, etc.

Inactive Publication Date: 2017-09-22
XIAN UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the existing relay or interference node selection methods can usually obtain relatively good system performance, the confidentiality of the selection process and results is not considered enough
If there are multiple eavesdropping users in the network, and they intercept the selection result of the relay or interference node, they can cooperate with each other, use cooperative beamforming and other means to eliminate or reduce interference, and extract useful signals, thereby leading to a sharp deterioration in network security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Physical Layer Security Transmission Method for Secrecy of Relay and Interference Node Selection Results
  • A Physical Layer Security Transmission Method for Secrecy of Relay and Interference Node Selection Results
  • A Physical Layer Security Transmission Method for Secrecy of Relay and Interference Node Selection Results

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0072] In the present invention, the physical layer security transmission method for keeping the selection result of the relay and the interference node secret, first establishes as figure 1 Shown is a wireless transmission network with eavesdropping nodes. The network includes a source node S, a destination node D, and M intermediate nodes T 1 , T 2 ,...,T M , and K eavesdropping nodes E 1 ,E 2 ,...,E K . The source node, the intermediate node and the eavesdropping node all have a single antenna, and the destination node is equipped with N antennas. Due to the influence of obstacles and other factors, there is no direct communication link between the source node and the destination node and the eavesdropping node, and the information transmission must be completed with the help of the intermediate node. During the transmission proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A physical layer security transmission method that keeps the selection results of relay and interference nodes secret, and establishes a wireless transmission network with eavesdropping nodes, including a source node S, a destination node D, M intermediate nodes T1, T2,..., TM, and K There are eavesdropping nodes E1, E2,..., EK, the whole transmission process includes two stages: in the first stage, the source node broadcasts the information s, and believes that all intermediate nodes can successfully decode it in this stage; in the second stage, the selected intermediate nodes The relay node uses the decoding and forwarding protocol to forward information to the destination node, and the interference node transmits interference information to the eavesdropping node. The relay and interference node selection results of the present invention are close to the security outage probability performance of the optimal selection result obtained by the exhaustive method, and have higher security outage probability performance; the present invention only needs Obtaining statistical channel state information of eavesdropping users has high practicability; the selection results of relay and interference nodes are kept secret from eavesdropping nodes, ensuring the security of confidential signal transmission.

Description

technical field [0001] The invention belongs to the communication field and relates to a physical layer security transmission method, in particular to a physical layer security transmission method for keeping the selection result of relay and interference nodes secret. Background technique [0002] With the wide application of contemporary wireless communication technology in daily life, more and more attention has been paid to the security and privacy of wireless transmission. Ensuring the security and privacy of wireless transmission has become a very important research topic. In traditional networks, security is guaranteed through the encryption mechanism at the upper layer of the network. However, signal encryption requires the generation and interaction of secret keys, which will bring additional complexity and signaling overhead to the system. Physical layer security technology ensures the security and privacy of information transmission by making use of the physical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04K3/825H04K2203/34
Inventor 惠鏸梁军利
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products