Secure transmission method based on non-trusted cognitive user collaboration interference

A technology of cognitive user and secure transmission, applied in the field of wireless communication, can solve the problem of cognitive network security, not trustworthy, etc.

Active Publication Date: 2015-09-16
XI AN JIAOTONG UNIV
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Alternatively, the cognitive user can share the channel with the authorized user to transmit its own information, but the interference of the cognitive user to the authorized user is below an interference threshold
Because cognitive users and authorized users belong to different communication systems, they are sometimes not trusted, so there are also security issues in cognitive networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method based on non-trusted cognitive user collaboration interference
  • Secure transmission method based on non-trusted cognitive user collaboration interference
  • Secure transmission method based on non-trusted cognitive user collaboration interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0061] Since the access environment of the authorized network is open, it faces the problem of eavesdropping by cognitive users. At the same time, since cognitive users do not have authorized spectrum, it needs to assist authorized users to securely transmit to obtain spectrum opportunities. Cooperative jamming is a very effective security transmission scheme, which can reduce the eavesdropping rate of eavesdropping links, thereby increasing the security capacity of authorized users. Therefore, in the present invention, we use cognitive user cooperative interference to assist authorized users to transmit securely, thereby ensuring secure transmission of authorized users, and cooperative cognitive users can obtain certain spectrum opportunities as compensation for their cooperation.

[0062] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transmission method based on non-trusted cognitive user collaboration interference, which belongs to the technical field of wireless communication. The secure transmission method adopts a time-division scheme, and is divided into two phases. The two phases respectively correspond to first hop transmission and second hop transmission of an authorized user. At each transmission phase, the authorized user occupies part of time slots for transmitting authorization information and selecting one cognitive user to generate interference information for assisting his secure transmission; and the rest of the time slots at the phase is allocated to the cognitive user for use. According to the secure transmission method based on non-trusted cognitive user collaboration interference, two cooperative cognitive users are selected optimally, and transmission time slots are allocated to the users for maximizing transmission speed of the cognitive users while ensuring security of the authorized user; and the simulation results indicate that the secure transmission method can improve secure outage performance of the authorized user and average transmission speed of the cognitive user when compared with the traditional single cognitive user collaborative scheme.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, relates to safe transmission and spectrum access scheme design in a radio network, in particular to a safe transmission method based on cooperative interference of untrusted cognitive users. Background technique [0002] With the rapid development of wireless technology and wireless devices, the demand for spectrum resources has risen sharply, but the traditional fixed spectrum access mechanism does not take into account the characteristics of spectrum resources in time and space changes, resulting in waste of spectrum resources, and further lead to low spectrum utilization. Cognitive radio technology can make full use of the spectrum opportunities used by unlicensed users to transmit information, thereby improving spectrum efficiency and alleviating the shortage of spectrum resources. In a cognitive radio network, cognitive users can determine spectrum opportunities not used by l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/084
CPCH04W12/00
Inventor 任品毅王大伟王熠晨杜清河孙黎
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products