A Cooperative Congestion Strategy Method Based on Proximal Gradient Algorithm

A near-end gradient and strategy technology, applied in the field of wireless communication, can solve the problems of multi-relay quantity and relay power, ignore interference signals, etc., and achieve the effect of reducing total power consumption and improving relay efficiency

Inactive Publication Date: 2019-10-18
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the classic CJ strategy research, the interference signal received by the destination node is ignored and a large number of relays and relay power are used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Cooperative Congestion Strategy Method Based on Proximal Gradient Algorithm
  • A Cooperative Congestion Strategy Method Based on Proximal Gradient Algorithm
  • A Cooperative Congestion Strategy Method Based on Proximal Gradient Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] Such as figure 1 As shown, a cooperative congestion strategy method based on the near-end gradient algorithm for wiretapping channel systems, such as figure 2 As shown, the eavesdropping channel system includes a source node S, a destination node D, an eavesdropping node E and n relay nodes R, and the core step is to obtain the optimal beamforming factor w opt It is used to adjust the weight of n relay nodes R transmitting interference signal z, and the ultimate goal is to increase the safety capacity R S-CJ , to get a local optimum.

[0028] Specifically include the following steps:

[0029] S1 When the source node S broadcasts a complex signal x to the destination node D, n relay nodes transmit an interference signal z with a beamforming factor w independent of the complex signal x, so as to confuse the signal received by the eavesdropper E , get the safety capacity R S-CJ , the beamforming factor is w=(w 1 ,w 2 ,...,w n ) T , also represents the weight facto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cooperation congestion strategy method based on a near-end gradient algorithm, used for a wiretap channel system. The wiretap channel system comprises a source node, a destination node, a wiretap node and relay nodes; n relay nodes transmit interference signals of a band beam forming factor independent of complex signals while the source node broadcasts the complex signals to the destination node, such that the safety capacity is obtained; group sparse penalty is introduced into a safety capacity objective function; the optimal band beam forming factor is obtained according to the safety capacity, into which the group sparse penalty is introduced; then, weights of sending signals of various relay nodes are adjusted; power limitation conditions of the relay nodes are satisfied; and thus, the maximum safety capacity is obtained. According to the cooperation congestion strategy method disclosed by the invention, in the event that the relatively high safety capacity is kept, the total power consumption of relays and the use number of the relays are greatly reduced; and the relay efficiency is increased.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a cooperative congestion strategy method based on a near-end gradient algorithm. Background technique [0002] With the development of wireless communication technology, more and more attention has been paid to the security issues in wireless communication. Traditional information security technology includes encryption technology, authentication (authentication) and key distribution (AKA), security algorithm, etc., and the communication parties encrypt the communication content to prevent eavesdroppers from eavesdropping on relevant information. However, with the continuous improvement of computer performance, these security technologies still have the danger of being cracked. [0003] Wyner introduced the concept of wiretapping channel in 1975, and introduced a three-node wiretapping channel model. He pointed out that when the channel conditions of the main cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/06H04W40/22H04W52/26H04W52/46
CPCH04W24/06H04W40/22H04W52/267H04W52/46Y02D30/70
Inventor 柯峰黄晓宇麦帆陈晓彬
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products