Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A multi-relay physical layer security method with known eavesdropping terminal channel information

A technology of physical layer security and channel information, which is applied in the field of multi-relay physical layer security, can solve the unrealistic problems of installing multiple antennas, and achieve the effect of maximizing the security capacity

Inactive Publication Date: 2018-05-01
SHANDONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, considering the constraints of size, cost, and complexity, it is not realistic to install multiple antennas in actual network nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-relay physical layer security method with known eavesdropping terminal channel information
  • A multi-relay physical layer security method with known eavesdropping terminal channel information
  • A multi-relay physical layer security method with known eavesdropping terminal channel information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Based on the research on the security problem of the physical layer, the present invention proposes a physical layer security method based on a multi-relay multi-interference network with known eavesdropping terminal channel information. In this method, the relay node group is divided into a relay forwarding group and an interference group. On the premise of ensuring the maximum degree of freedom of the system, the beamforming vectors of the relay forwarding node group and the interference node group are optimized to maximize The secrecy capacity of the system. Then, the optimal relay power allocation scheme is calculated to maximize the system secrecy capacity.

[0020] The present invention will be further described below in conjunction with specific examples (but not limited to this example) and accompanying drawings.

[0021] as attached figure 1 As shown, the system model is a eavesdropping network with multiple relays and multiple interferences. The network con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-relay physical layer safety method based on known eavesdropping end channel information to achieve safety communication of a physical layer. Based on known eavesdropping end channel information, a relay group is divided into a relay forwarding group part and a relay interference group part, effectiveness and safe transmission of information are guaranteed for a first information transmission time slot by means of the beam forming technology and the artificial interference technology, and information is effectively prevented from being received by an eavesdropping end in a second time slot by means of the known eavesdropping end channel information and the beam forming technology. On the premise that relay power distribution is considered, the beam forming vector of the relay forwarding group part and the beam forming vector of the relay interference group part are optimized, and the maximum safe capacity of a system is obtained finally.

Description

technical field [0001] The invention discloses a multi-relay physical layer security method with known eavesdropping terminal channel information, which belongs to the technical fields of wireless communication and signal processing. Background technique [0002] Security and privacy issues have long been hot topics in communication research, especially for wireless communication networks, because the wireless medium has public access characteristics, and the secure transmission of information is more difficult to guarantee. Among all the requirements for security and privacy issues, confidentiality is the top priority. Traditionally, confidentiality can be achieved through encryption at the application layer. Due to the dynamic changes of network topology and the lack of public facilities and key distribution, people are eager and demanding to ensure secure wireless communication at the physical layer, which is also a research topic in recent decades. The original stealth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00
CPCH04W12/00Y02D30/70
Inventor 刘琚岳思思卢冰冰董郑
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products