Cloud wireless access network system and security scheduling method of physical layer thereof

A wireless access network and physical layer security technology, applied in the field of cloud-based wireless access network systems, can solve problems such as information leakage, leakage of mobile users, and no research on security scheduling methods for cloud-based wireless access networks. Safety capacity, the effect of maximizing safety capacity

Inactive Publication Date: 2017-02-22
GUANGZHOU PANYU POLYTECHNIC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious wireless eavesdropping can lead to the leakage of information (such as call information, identity information, location information, data information, and signaling information between the mobile station and the network control center, etc.)
Leakage of identity information and location information of mobile users can lead to wireless tracking of mobile users
However, people have not yet developed a secure scheduling method for cloud-based wireless access networks, so people cannot increase the security capacity of legal links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The technical solution of this patent will be further described in detail below in conjunction with specific embodiments.

[0016] A cloud-based wireless access network system, including a central processor, a base station, legal users and eavesdropping users, the number of the central processor is one, the number of base stations is more than one, the central processor is connected to the base station, and the base stations are respectively connected to Legitimate users are connected to eavesdropping users. A cache is set in the base station to reduce the pressure on the central processor for backhaul.

[0017] The physical layer security scheduling method of the cloudized wireless access network system, the specific steps are as follows:

[0018] Step 1, the legal user sends a request, and the central processor selects an activation set according to the legal user's request file and the cache content of each base station, and all the corresponding caches of all base ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud wireless access network system comprising a central processor, base stations, legitimate users and eavesdropping users, one central processor is arranged, more than one base stations are arranged, the central processor is connected with the base stations, and the base stations are respectively connected with the legitimate users and the eavesdropping users. The invention further discloses a security scheduling method of a physical layer of the cloud wireless access network system. According to the security scheduling method disclosed by the invention, the maximum safe capacity of a cloud wireless access network is achieved by a simple base station selection algorithm; the optimal base station can be selected by the comparison of chain gains of legitimate links and eavesdropping links in active set base stations, the active set base stations are selected by a predetermined selection criterion, so the maximum safe capacity of the system can be guaranteed under different channel conditions, and the safe capacity of the system is improved by real-time link control without affecting the original communication system.

Description

technical field [0001] The invention relates to the communication field, in particular to a cloud-based wireless access network system. Background technique [0002] Cloud-based radio access network (Cloud-RAN, C-RAN) is a green radio access network architecture based on centralized processing, cooperative radio and real-time cloud computing architecture. Its goal is to solve the various challenges brought by the rapid development of mobile Internet to operators, including energy consumption, construction and operation and maintenance costs, and spectrum resources. Based on the cache-based cloud wireless access network, a certain capacity cache is set inside each wireless base station. If the download content requested by the user is in the cache content, the base station will directly send the file to the target user, thereby reducing the central processor’s overhead. transmission pressure and reduce network overhead. [0003] On the other hand, due to the openness of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W48/16H04W48/20
CPCH04W12/08H04W48/16H04W48/20
Inventor 邓单
Owner GUANGZHOU PANYU POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products