Unlock instant, AI-driven research and patent intelligence for your innovation.

Physical Layer Security Transmission Method Based on Secondary User Selection in Cognitive Wireless Networks

A cognitive wireless network and physical layer security technology, applied in the field of cognitive wireless network physical layer security, can solve problems such as imperfect research, no consideration, and enhanced primary user security communication, so as to improve security performance, increase complexity, low-complexity effects

Active Publication Date: 2019-11-08
PLA UNIV OF SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in CRN, the research on how to use the secondary user transmission to improve the secure communication of the primary user is still incomplete.
On the one hand, the current research on physical layer security transmission in CRN rarely considers the unknown and randomness of the location of eavesdroppers and user nodes, and most of them are carried out under the assumption of ideal location information, without considering the unknown node location information. Physical layer security transmission, in the actual system, how to obtain the location information of these nodes, especially the location information of eavesdropping nodes, and how to feed back and interact with this information is not a simple problem
On the other hand, most of the existing research on resource allocation in CRNs does not consider how to use the interference between primary and secondary users to enhance the security communication of primary users and increase the communication opportunities of secondary users at the same time, and does not propose a simple and effective and easy-to-implement transport scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical Layer Security Transmission Method Based on Secondary User Selection in Cognitive Wireless Networks
  • Physical Layer Security Transmission Method Based on Secondary User Selection in Cognitive Wireless Networks
  • Physical Layer Security Transmission Method Based on Secondary User Selection in Cognitive Wireless Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A physical layer security transmission scheme based on security protection domain and secondary user selection, the system model can be found in figure 1 , the system has a pair of primary user communication pairs, multiple secondary user communication pairs with randomly distributed positions, and multiple eavesdroppers with randomly distributed positions. In addition, the eavesdropper eavesdrops on the primary user communication, the secondary user communication pair and the eavesdropper's position respectively obey the independent uniform Poisson point process distribution, and the node densities are λ S and lambda E ; All secondary user receivers use the same transmit power P S ; All communication channels and eavesdropping channels are subject to quasi-static Rayleigh fading. The physical layer security transmission method of the cognitive wireless network based on the secondary user selection is carried out in the following steps:

[0019] Step 1: Optimal setti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer security transmission method of a cognitive wireless network based on secondary user selection. First, the sender of the primary user optimizes the setting of the channel gain threshold before sending security information, and then broadcasts its own state to the receiver of the primary user and all Secondary user sender. Next, the primary user receiver broadcasts the pilot signal to all secondary user senders. The sender of any secondary user uses the pilot signal and the least squares algorithm to estimate the channel gain between it and the primary user receiver, and decides whether to communicate according to whether the channel gain is less than the channel gain threshold: the secondary user whose channel gain is greater than the channel gain threshold User senders remain silent; secondary senders whose channel gain is less than the channel threshold are allowed to communicate. Finally, the primary user sender and the specific secondary user sender communicate simultaneously on the primary user band. The method of the invention is close to the actual system, has good performance and can be implemented in a distributed manner.

Description

technical field [0001] The invention belongs to the technical field of cognitive wireless network physical layer security, and relates to a physical layer security transmission scheme based on secondary user selection. Background technique [0002] The open and dynamic network framework of the Cognitve Radio Network (CRN) allows various wireless terminals to dynamically access the licensed spectrum, which significantly improves the utilization efficiency of the licensed spectrum. However, this also makes CRN more vulnerable to malicious attacks and eavesdropping, and secure communication faces huge security risks. The modern cryptography system is based on the computational complexity and is widely used in protocols above the physical layer. It is the main means to ensure the information security of the communication system at present. However, the modern cryptography system is facing a huge challenge: with the characteristics of heterogeneity, diversity, node mobility and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/02H04W72/04H04W72/08H04L25/02H04W72/54
CPCH04L25/024H04W28/0252H04W72/0453H04W72/542
Inventor 杨炜伟许晓明蔡跃明陶利伟牟卫峰管新荣
Owner PLA UNIV OF SCI & TECH