Safe transmission method in MIMO Y eavesdropping network based on real interference alignment

A technology for secure transmission and interference alignment, applied in the field of secure transmission

Inactive Publication Date: 2017-02-01
XI AN JIAOTONG UNIV
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The object of the present invention is to overcome above-mentioned deficiency, provide a kind of secure transmission method in the MIMO Y eavesdropping network based on real interference alignment, in K user MIMO Y eavesdropping network, by precoding the PAM constellation symbols sent by all users, And the relay sends the coded artificial noise signal, combined with real interference alignment technology and cooperative scrambling technology, when the user and the relay node meet the power limit, the entire network can transmit secure data streams

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
  • Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
  • Safe transmission method in MIMO Y eavesdropping network based on real interference alignment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention will be further described below in conjunction with the drawings.

[0083] The present invention proposes a physical layer security scheme using real interference alignment technology and cooperative scrambling. The scheme adopts an amplifying and forwarding protocol, based on a multi-user-relay-multi-user physical channel, precoding is performed at the user, and the relay is Artificial noise is sent everywhere, which interferes with external eavesdropping nodes without disturbing users, and obtains all secure communication channels under the condition of power limitation of each user node.

[0084] The present invention considers a MIMO Y eavesdropping model, there are a total of K users, each user has M antennas, and there are N antennas at the relay. Multiple users communicate with each other through an AF relay, and the system includes an eavesdropping Node, the power of each user's signal is P i , The sum of the transmission power of all users is P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe transmission method in an MIMO Y eavesdropping network based on real interference alignment. According to the method, through utilization of a real interference alignment technology and an artificial noise technology, through construction of useful signal precoding matrixes and interference suppression matrixes, inter-user interference signals at legal user positions are located in null spaces of receiving suppression matrixes; and noise signals are completely eliminated through linear combination. Moreover, through construction of a noise signal coding matrix at a relay position, the noise signals are completely aligned to receiving signal spaces of eavesdropping users, so the eavesdropping users cannot eavesdrop the signals and the whole multi-user eavesdropping network can obtain multiple safe communication channels.

Description

Technical field [0001] The invention belongs to the field of physical layer security in wireless communication, and particularly relates to a safe transmission method in a MIMOY eavesdropping network based on real interference alignment. Background technique [0002] In recent years, security issues in wireless communications have gradually become a research focus. Traditional encryption algorithms are mainly applied to the upper network. At the sending end, the key is used to encrypt information and the plaintext is converted into ciphertext; at the receiving end, the key is used to decrypt the information and the ciphertext is converted into plaintext. The eavesdropper will analyze the plaintext based on the received ciphertext. Therefore, the encryption algorithm needs to be continuously improved and the length of the key is increased to cope with the increasing computing power of the computer. As a supplement to encryption technology, physical layer security technology has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/02H04B7/0413H04L5/00
CPCH04B7/024H04B7/0456H04L5/0037H04L5/0076
Inventor 廖学文樊晔高贞贞
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products