A physical layer security optimization method based on SDP in multi-eavesdropping user cognitive network

A technology of physical layer security and optimization methods, applied in the field of physical layer security, can solve problems such as poor performance and high computational complexity, and achieve the effects of good security, low complexity, and high confidentiality rate

Active Publication Date: 2018-08-14
CHONGQING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many literatures use global optimization algorithms to optimize power allocation, that is, the key to maximum secrecy capacity (SRM) is to solve the quasi-convex problem, while in the MISO environment, a closed method is mainly used to solve the SRM problem [Zang Li, Trappe W, and YatesR. Secret communication via multi-antenna transmission[C].IEEE 41st Annual Conference on Information Sciences and Systems(CISS2007),Baltimore,MD,2007:905–910], and the performance of this sub-optimization method is relatively poor
However, many literatures transform the security optimization problem of secondary users into a semi-definite programming problem, and study the physical layer security performance of MISO cognitive radio network assisted by noise, and the computational complexity of this method is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer security optimization method based on SDP in multi-eavesdropping user cognitive network
  • A physical layer security optimization method based on SDP in multi-eavesdropping user cognitive network
  • A physical layer security optimization method based on SDP in multi-eavesdropping user cognitive network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further explained below in conjunction with the drawings:

[0038] figure 1 Step 1. The system of this scheme is a multiple input single output (MISO) model under multiple multi-antenna eavesdropping users. By one with N t Antenna secondary user transmitter (SU-Tx), a single antenna secondary user receiver SU-Rx, a single antenna primary user receiver PU-Rx and K have N e Antenna eavesdropping on users (ED-Rx).

[0039] Step two, For the sending signal of the secondary user’s sender, according to figure 1 , The received signals of the secondary user SU-Rx, the primary user PU-Rx and the k-th eavesdropping user ED-Rx are:

[0040]

[0041]

[0042]

[0043] Where h s , Respectively represent the channel gain from the secondary user's transmitter to the secondary user and the primary user's receiver; Represents the channel matrix from the sending end of the secondary user to the eavesdropping end. They are the additive white Gaussian noise at th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a semi-defined programming (SDP) based physical layer safe optimization method in a multi-eavesdropping user cognitive network, relating to cognitive wireless communication systems. For the cognitive radio network (CRN) with a plurality of multi-antenna eavesdroppers, to maximize the system secrecy rate, the interference to a master user is designed as a constraint condition, and the physical layer safe performance is improved through the optimization design of transmission of a covariance matrix to a transmitting end of a secondary user. When channel state information (CSI) is known, a non-convex function is converted into a SDP by use of the matrix property and Charnes-Cooper conversion, so as to obtain an optimization scheme of the transmitting end of the secondary user. A simulation result shows that the method can make the system secrecy rate higher and has the advantage in complexity compared with conventional secondary optimization transmission strategies.

Description

Technical field [0001] The invention belongs to the field of cognitive wireless communication, and particularly relates to physical layer security technology in cognitive radio technology. Background technique [0002] Cognitive Radio (CR) is an effective method to solve the current shortage of spectrum resources. The innovation of physical layer transmission technology of cognitive radio network provides a wide range of topics and research space for the research of physical layer security. At present, the traditional eavesdropping terminals based on the physical layer security selection of cognitive radio are all single antennas, and this model is relatively simple. Moreover, in the existing literature, the method for designing the transmission covariance matrix of the secondary user transmitter is limited and the complexity is high. [0003] In the cognitive radio network (CRN), the secondary user transmitter (SU-Tx) ensures that the communication of the primary user (PU) does ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W16/18H04L29/06
CPCH04W12/02
Inventor 谢显中谢成静胡强
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products