Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security pre-encoding method of multi-user opposite end-to-end relay system

A relay system and multi-user technology, which is applied in the field of precoding processing for multi-user to relay nodes in an end-to-end relay system, and can solve problems such as few studies and reports

Active Publication Date: 2017-05-31
PLA UNIV OF SCI & TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, few related studies have been reported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security pre-encoding method of multi-user opposite end-to-end relay system
  • Security pre-encoding method of multi-user opposite end-to-end relay system
  • Security pre-encoding method of multi-user opposite end-to-end relay system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Technical scheme realization process of the present invention is as follows:

[0034] figure 1 The multi-user peer-to-peer relay communication system shown includes a relay node R and K source nodes S 1 ,S 2 ,...,S k ,...,S K , K destination nodes D 1 ,D 2 ,...,D k ,...,D K and J tapped section E 1 ,E 2 ,...,E j ,...,E J A multi-user peer-to-peer relay system is formed. In the system, K source nodes and K destination nodes realize long-distance communication with the assistance of relay R. Each source node S k respectively corresponding to the kth destination node D k Form a set of user pairs {S k ,D k}, forming a total of K groups of user pairs {S 1 ,D 1},{S 2 ,D 2},...,{S k ,D k},...,{S K ,D K}. Among the K groups of user pairs, each destination node D k Only want to get the source node S k The private information sent by other source nodes is regarded as interference. The K group of user pairs and the J eavesdropping nodes are all legal mobi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security pre-encoding method of a multi-user opposite end-to-end relay system. Multi-user interference can be eliminated from corresponding target nodes of relay nodes by virtue of differences of channels by using a pre-encoding signal processing techniques, and zero-forcing processing is implemented in an eavesdrop node direction, so that information security transmission is achieved. On the other hand, multi-user interference is eliminated, information disclosure is prevented, detection complexity of a target node receiver is degraded, and security transmission of information is ensured. On the other hand, main complexity is integrated in a fixed facility relay, hardware requirements of a mobile user is simplified, moreover, as only simple addition and multiplication operation is implemented by the relay nodes to received signals, the security pre-encoding method is simple in hardware achievement and relatively good in practicability.

Description

technical field [0001] The present invention relates to a precoding design method for improving physical layer security, in particular to a precoding processing method for multi-user to relay nodes in an end-to-end relay system, which can eliminate interference between multi-users , to prevent information leakage. Background technique [0002] Although the widespread use of wireless communication has brought great convenience to people's lives, the broadcast characteristics of wireless communication and the openness of wireless media have led to increasingly serious threats to information security, especially in e-commerce and other fields, which has made information security issues increasingly serious. Widespread concern. Traditionally, the way to solve this security problem is to adopt encryption key system in the higher layers above the physical layer, and realize identity authentication and secure communication by distributing keys to legitimate users. However, with t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B7/0456H04L25/02H04L25/03
CPCH04B7/0456H04L25/0202H04L25/03006
Inventor 蔡跃明曹阔杨炜伟杨文东吴丹
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products