Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure transmission method based on statistical QoS guarantee in cognitive wireless network

A cognitive wireless network and secure transmission technology, applied in the field of secure transmission based on statistical QoS, can solve the problems of reduced system throughput due to reliability and security, insufficient flexibility of evaluation performance indicators, and insufficient flexibility of QoS

Active Publication Date: 2020-03-17
XI AN JIAOTONG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using perfect security to evaluate performance has the following disadvantages: first, the rapidly changing wireless environment cannot always ensure that the quality of legitimate channels is better than that of eavesdropping channels, so that the simple combination of reliability and security will be severely degraded system throughput
Second, most of the services of mobile users are time-limited, therefore, the data that is tapped will also expire after a certain period of time
[0004] In summary, we found that the traditional method to guarantee the QoS of the primary user in spectrum sharing is not flexible enough, and the traditional method to evaluate performance indicators in the physical layer security technology is also not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure transmission method based on statistical QoS guarantee in cognitive wireless network
  • A secure transmission method based on statistical QoS guarantee in cognitive wireless network
  • A secure transmission method based on statistical QoS guarantee in cognitive wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0128] The security transmission method based on the statistical QoS guarantee in the cognitive wireless network of the present invention uses the statistical delay QoS guarantee framework to guarantee the statistical delay QoS of the PU. The framework is described by PS's queue delay threshold violation probability. Different from the currently widely used QoS protection methods, the adopted framework can quantitatively and accurately describe the fine-grained delay requirements of the primary user transmitter through a single parameter called PS delay QoS index. Secondly, the framework of security transmission guarantee is used to guarantee the statistical security of cognitive users. The framework can control the reliability and security functions separately for delay-sensitive systems to meet the constraints of various security requirements. Based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure transmission method based on statistical QoS guarantee in a cognitive wireless network, which uses a statistical delay QoS guarantee framework to guarantee the statistical QoS of a primary user transmitter, and uses a statistical delay-sensitive security transmission scheme for cognitive The user's statistical delay-sensitive security is guaranteed. Statistical queue analysis theory is used to ensure the statistical delay QoS requirements of primary users and the statistical delay-sensitive requirements of cognitive users. The present invention proposes an algorithm for finding the convex hull of any second-order derivable function by using the convex hull and probability transmission theory, then finds the convex hull of the Lagrangian function of the problem through the algorithm, and finally finds the optimal formula with the K.K.T. condition Optimal transmit power, and thus the average maximum throughput of cognitive user transmitters is obtained. The power allocation strategy of the present invention can be dynamically adjusted according to the time delay QoS requirement of the main user transmitter, the statistical security constraint of the cognitive user and the channel condition.

Description

technical field [0001] The invention relates to a physical layer security transmission technology of a cognitive wireless network, in particular to a statistical QoS-based security transmission method in a cognitive wireless network, aiming at effectively alleviating the shortage of spectrum resources and ensuring the security of wireless communication. Background technique [0002] With the rapid and continuous upgrading of wireless communication and the sharp increase in the number of wireless communication terminals, wireless communication technology is facing more and more challenges, the two most important challenges are: 1. Spectrum resources are becoming more and more tight; 2. , Wireless communication security is becoming more and more difficult. These are briefly explained below. Spectrum sharing and cognitive radio technology can effectively alleviate the problem of spectrum resource shortage and are considered to be one of the most important features of future co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W16/10H04W28/24H04W72/04H04W72/08
CPCH04W16/10H04W28/24H04W72/0473H04W72/543Y02D30/70
Inventor 王熠晨徐文文任品毅杜清河孙黎高贞贞
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products