An Optimal Power Allocation Method for Untrusted Relay Networks with Imperfect CSI

A relay network and optimal power technology, applied in power management, wireless communication, electrical components, etc., can solve problems such as the impossibility of CSI

Active Publication Date: 2019-01-18
NORTHWESTERN POLYTECHNICAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above literatures are all researched under the assumption of perfect CSI, but in a real communication environment, perfect CSI is basically impossible to achieve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Optimal Power Allocation Method for Untrusted Relay Networks with Imperfect CSI
  • An Optimal Power Allocation Method for Untrusted Relay Networks with Imperfect CSI
  • An Optimal Power Allocation Method for Untrusted Relay Networks with Imperfect CSI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings and embodiments, and the present invention includes but not limited to the following embodiments.

[0035]The system model used in the present invention is a relay network with three nodes, its principle is as follows figure 1 shown. The model consists of a source node (Alice), an untrusted amplify-and-forward relay node (R) and a destination node (Bob). Each node uses a single-antenna configuration, and a transmission process requires 2 time slots to complete. Assuming that there is no direct communication link between Alice and Bob due to shadow fading or too far away, they can only communicate through an untrusted relay node R. In the first time slot, Alice transmits information x to the untrusted relay node R A , at the same time Bob transmits information x to the untrusted relay node R R . In the second time slot, the relay node R re-sends the received signal to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an optimal power allocation method of an untrusted relay network under perfect CSI. The method comprises the following steps: firstly, describing a communication scheme of a two-hop half-duplex relay network, then providing an optimal power allocation scheme, and finally analyzing channel ESR to acquire a reachable safety rate. According to the optimal power allocation method provided by the invention, an optimal power allocation formula in a transmission process is provided to maximize the safety rate, and the ESR under high SNR is further analyzed for evaluating the reachable average safety rate. The approximate optimal power allocation can bring a higher safety rate than equal power allocation.

Description

technical field [0001] The invention relates to an optimal power allocation scheme of an untrusted relay network under the condition of non-ideal channel state information (Channel State Information, CSI). Background technique [0002] Multi-hop relay is identified as an energy-efficient transmission scheme, which is the optimal way to solve wireless communication security. The method of physical layer secure transmission has the advantages of low computational complexity and resource saving. In recent years, cooperative diversity technology has attracted the attention of many scholars because it can improve the security of the physical layer against eavesdropping. [0003] In the physical layer, there is a game problem of power allocation between users and interference sources. The interference source hopes to transmit an interference signal with sufficient power to prevent eavesdroppers from eavesdropping on the user's transmission information, and the user also hopes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W52/34H04W52/46
CPCH04W52/346H04W52/46
Inventor 姚如贵高岩徐菲徐娟
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products