Full-duplex opportunistic relaying protocol self-adaptation switching security transmission scheme

A technology of adaptive switching and secure transmission, which is applied in the field of protocol adaptive switching secure transmission schemes, can solve problems such as danger, and achieve the effect of improving the evaluation security rate and performance

Active Publication Date: 2017-05-31
HUAQIAO UNIVERSITY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the communication transmission method of the traditional encrypted cryptography method is also facing great danger. The high-speed computing brought by the high-speed network will easily crack the traditional key encryption method. focus of attention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full-duplex opportunistic relaying protocol self-adaptation switching security transmission scheme
  • Full-duplex opportunistic relaying protocol self-adaptation switching security transmission scheme
  • Full-duplex opportunistic relaying protocol self-adaptation switching security transmission scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] A full-duplex opportunistic relay protocol adaptive switching security transmission scheme disclosed by the present invention, such as figure 1 As shown, the scheme is applied in a system including four nodes of source (S), relay (R), sink (D) and eavesdropper (E), and the transmission of system information is completed in one time slot, in which The relay is configured with N antennas and the rest of the nodes are configured with a single antenna. The channel vector from the relay to the sink is denoted as Such as figure 2 As shown, the scheme includes the following steps:

[0039] Step 1, the relay sends pilot information to the sink, and the sink estimates the channel information h from the relay to the sink 2 Finally, the channel information is fed back to the relay, and the relay divides the N antennas into two groups according to the channel information, and one group is an optimal transmitting antenna, which can maximize the channel gain from the relay to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a full-duplex opportunistic relaying protocol self-adaptation switching security transmission scheme. The scheme is applied to a system including an information source, a relay, an information sink and an eavesdropper. According to the scheme, information is transmitted to the relay through the information source, the relay can perform transmission by selecting an antenna which can maximize the received signal to noise ratio of the information sink, maximal-ratio combining is performed by means of other antennas, and information of the information source is received; in the process, it is supposed that the relay can obtain channel state information of the information sink and the eavesdropper, the average security speed of the system is estimated by means of the information, and transmission is performed by selecting the best relay protocol from an amplifying-forwarding protocol and a decoding-forwarding protocol. The system security speed is a comparison condition, the two main protocols are automatically switched, and the evaluation security speed of the system can be increased and the evaluation security performance of the system can be improved by selecting the best relay protocol according to scenes in a self-adaptation mode.

Description

technical field [0001] The patent of the present invention relates to the fields of wireless communication and physical layer security, in particular to a full-duplex opportunistic relay protocol adaptive switching security transmission scheme. Background technique [0002] With the rapid development of wireless communication, the next generation of wireless communication technology 5G will bring higher network transmission speed. In the future, the high-speed network brought by wireless communication will also greatly promote the development of cloud computing, and more computer devices will be connected through the high-speed network to deal with more complex problems. However, the communication transmission method of the traditional encrypted cryptography method is also facing great danger. The high-speed computing brought by the high-speed network will easily crack the traditional key encryption method. focus of attention. The physical layer utilizes the space-time cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/155
Inventor 赵睿林鸿鑫李元健王聪
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products