Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability

A technology of multi-user cooperation and interference power, which is applied in the field of multi-user cooperation interference power allocation, and can solve problems such as not applicable to cellular mobile communication

Active Publication Date: 2015-04-29
XI AN JIAOTONG UNIV
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a multi-user cooperative interference power allocation method under the constraint of confidentiality interruption probability to solve the problem that the above-mentioned wireless communication physical layer security method is not applicable to the actual cellular mobile communication uplink transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
  • Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
  • Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 As shown, the communication system model that the present invention adopts comprises: K single-antenna transmitting ends, respectively Alice-1, ..., Alice-K, a single-antenna expected receiving end Bob and a single-antenna eavesdropping end Eve, transmitting user Alice -1 forms a communication pair with the expected receiver Bob. Remember h B,i is the channel coefficient from Alice-i to Bob, h E,i Indicates the channel coefficient from Alice-i to Eve, assuming that the wireless channel fades slowly and is modeled as quasi-static Rayleigh fading, h B,i and h E,i are independent of each other, and all obey the complex Gaussian distribution with a mean value of zero, and their distributions are denoted as h B,i ~CN(0,Γ B,i ) and h E,i ~CN(0,Γ E,i ), where Γ B,i >0 and Γ E,i >0, indicating the variance of the complex Gaussian distribution, reflecting the large-scale fading of the channel. During the communication process, Alice-1 is fixed to trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-user collaboration jamming power distribution method under the restraint of confidentiality interrupt probability in a wireless wiretap channel. The Alice-1 user emits useful signals to an expected receiving end Bob, and remaining K-1 users emit collaboration jamming signals, and the wiretap end Eve of a single antenna wiretaps information sent by the Alice-1 user. By means of the method, the secure communication rate is improved by optimizing the emitting powers of all the jamming users, and the physical layer safe communication in the wireless wiretap channel is achieved.

Description

【Technical field】 [0001] The invention relates to the technical field of wireless communication, in particular to a multi-user cooperative interference power allocation method under the constraint of confidentiality interruption probability in a wireless eavesdropping channel. 【Background technique】 [0002] With the rapid development of wireless communication technologies such as cellular mobile communication, wireless communication security has attracted more and more attention in recent years. The root of wireless communication security problems comes from the broadcast characteristics of electromagnetic waves, which shows that the physical layer of wireless communication is not safe. Therefore, how to ensure the security of wireless communication from the physical layer is the key to solve the problem of wireless communication security. [0003] Multi-antenna transmission can increase the rate of secure communication. Therefore, when the base station is equipped with mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W72/04
CPCH04B7/024H04J11/0026
Inventor 穆鹏程钟艺玲胡晓燕殷勤业王慧明王文杰
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products