Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Constellation rotation assisted wireless physical layer secure transmission method in two-way relay system

A physical layer security and two-way relay technology, applied in the field of wireless physical layer security transmission, can solve the problem of untrustworthy relay itself, achieve the effect of resisting eavesdropping, ensuring safe transmission, and low resource consumption

Active Publication Date: 2015-12-16
XI AN JIAOTONG UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing work only focuses on techniques to enhance communication reliability, such as network coding, relay routing, and beamforming design, etc., and rarely addresses security issues in two-way relay systems from the perspective of the physical layer.
[0003] At present, the research on the untrusted relay problem in the two-way relay system mainly involves the achievable privacy rate in the Gaussian eavesdropping channel, the selection strategy of cooperative relay and jammer, and the joint design of beamforming and artificial noise. It is assumed that the eavesdropper is an independent individual outside the network. However, in some application scenarios, the relay itself may not be trusted. It is not only a facilitator of the communication process, but also a potential eavesdropper.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Constellation rotation assisted wireless physical layer secure transmission method in two-way relay system
  • Constellation rotation assisted wireless physical layer secure transmission method in two-way relay system
  • Constellation rotation assisted wireless physical layer secure transmission method in two-way relay system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention is described in further detail below in conjunction with accompanying drawing:

[0032] refer to figure 1 The wireless physical layer security transmission method assisted by constellation rotation in the two-way relay system of the present invention comprises the following steps:

[0033] 1) Estimating channel information, user node A and user node B select symbols carrying information from the rotated constellation, and then construct a composite signal by injecting artificial noise, and then perform phase pre-compensation on the composite signal according to the estimated channel information, Get the composite signal S to be sent by user node A A and the composite signal S to be sent by user node B B , user node A and user node B transmit the composite signal S A and the composite signal S to be sent B Forward to relay;

[0034] 2) The relay receives the signals sent by user node A and user node B, and obtains the mixed signal y R ,in,

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a constellation rotation assisted wireless physical layer secure transmission method in a two-way relay system. The constellation rotation assisted wireless physical layer secure transmission method comprises: 1) channel information is established, a user node A and a user node B select symbols carrying information from a rotated constellation, inject manual noise to construct a composite signal, carry out phase pre-compensation on the composite signal according to the estimated channel information to obtain a composite signal SA to be sent by the user node A and a composite signal SB to be sent by the user node B, and meanwhile respectively send the composite signal SA to be sent and the composite signal SB to be sent at transmitting power P; 2) a relay receives the signals sent by the user node A and the user node B to obtain a mixed signal yB; 3) the relay amplifies the obtained mixed signal and broadcasts the mixed signal to the user node A and the user node B; and 4) the user node A and the user node B detect the mixed signal. The constellation rotation assisted wireless physical layer secure transmission method disclosed by the invention can be used for effectively resisting the eavesdropping behavior of incredible relays.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a wireless physical layer security transmission method assisted by constellation rotation in a two-way relay system. Background technique [0002] In the past few years, two-way cooperative networks have received extensive attention due to the advantages of high spectral efficiency. However, most of the existing works only focus on techniques to enhance communication reliability, such as network coding, relay routing, and beamforming design, etc., and rarely address security issues in two-way relay systems from the perspective of the physical layer. [0003] At present, the research on the untrusted relay problem in the two-way relay system mainly involves the achievable privacy rate in the Gaussian eavesdropping channel, the selection strategy of cooperative relay and jammer, and the joint design of beamforming and artificial noise, etc. Most of these schemes It is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L5/14H04B7/185
CPCH04B7/18565H04L5/14H04W12/02
Inventor 孙黎徐洪斌任品毅杜清河
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products