Secure transmission method based on energy harvesting for use in two-hop network with cache

A technology of energy harvesting and secure transmission, applied in the direction of reducing energy consumption, advanced technology, electrical components, etc., can solve problems such as easy eavesdropping

Active Publication Date: 2016-11-09
XI AN JIAOTONG UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In a two-hop network, the fixed forwarding mechanism is easy to eavesdrop
For example: the user first transmits from the source to the relay, and then transmits from the relay to the destination. In this fixed transmission mode, the eavesdropping end can easily move its position according to the transmission status of each time slot for better eavesdropping.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method based on energy harvesting for use in two-hop network with cache
  • Secure transmission method based on energy harvesting for use in two-hop network with cache
  • Secure transmission method based on energy harvesting for use in two-hop network with cache

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0050] The present invention considers a two-hop relay network, such as figure 1 shown. This network consists of a sender (S), a relay (R) and a receiver (D). In addition, there is an eavesdropping node (E), which eavesdrops on the network information all the time. Due to channel fading and distance factors, there is no direct transmission link between S and D, and between S and E. R has a data cache while harvesting energy from the surrounding environment.

[0051] The two-hop relay networks all experience independent and smooth Rayleigh fading, that is, the channel state remains unchanged in each frame, and the channel state changes independently between different frames. In addition, each data frame is divided into two time slots, corresponding to the first transmission and retransmiss...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transmission method based on energy harvesting for use in a two-hop network with cache. In the scheme, an optimal link selection scheme is designed according to channel quality from a transmitting end to a relay end and from the relay end to a destination end. Then, a maximum security speed problem is raised according to a data queue state and an energy queue state of the relay node. Specific to the optimization problem, a two-stage iterative solving algorithm is put forward, and an optimal link selection and power allocation scheme for each time slot is obtained. As proved a simulation result, the security speed of the user can be increased according to the scheme.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, relates to link selection and power distribution scheme design in a relay network, and in particular to a secure transmission method based on energy harvesting in a two-hop cached network. Background technique [0002] Due to the broadcast characteristics of the wireless channel, every user within the range of the wireless network can receive the information, so the wireless network is vulnerable to the threat of eavesdropping. Due to the complexity of encryption and the difficulty of key transmission, traditional encryption algorithms are increasingly challenged. Physical layer security transmission technology based on the physical characteristics of wireless channels has been extensively studied recently. [0003] In a two-hop network, the fixed forwarding mechanism is easy to eavesdrop. For example: the user first transmits from the source to the relay, and then transmits from...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/10H04W40/12H04W40/22H04W52/46
CPCH04W40/10H04W40/12H04W40/22H04W52/46Y02D30/70
Inventor 任品毅王大伟王熠晨杜清河孙黎
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products