Physical Layer Security Transmission Method Based on Secondary User Selection in Cognitive Wireless Networks
A cognitive wireless network and physical layer security technology, applied in the field of cognitive wireless network physical layer security, can solve problems such as imperfect research, no consideration, and enhanced primary user security communication, so as to improve security performance, increase complexity, low-complexity effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] A physical layer security transmission scheme based on security protection domain and secondary user selection, the system model can be found in figure 1 , the system has a pair of primary user communication pairs, multiple secondary user communication pairs with randomly distributed positions, and multiple eavesdroppers with randomly distributed positions. In addition, the eavesdropper eavesdrops on the primary user communication, the secondary user communication pair and the eavesdropper's position respectively obey the independent uniform Poisson point process distribution, and the node densities are λ S and lambda E ; All secondary user receivers use the same transmit power P S ; All communication channels and eavesdropping channels are subject to quasi-static Rayleigh fading. The physical layer security transmission method of the cognitive wireless network based on the secondary user selection is carried out in the following steps:
[0019] Step 1: Optimal setti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


