Optimum power allocation method for untrusted relay network under bounded CSI (Channel State Information)

A relay network, optimal power technology, applied in power management, wireless communication, electrical components, etc., can solve problems such as the impossible realization of CSI, and achieve the effect of reducing complexity

Active Publication Date: 2017-08-18
NORTHWESTERN POLYTECHNICAL UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above literatures are all researched under the assumption of perfect CSI, b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimum power allocation method for untrusted relay network under bounded CSI (Channel State Information)
  • Optimum power allocation method for untrusted relay network under bounded CSI (Channel State Information)
  • Optimum power allocation method for untrusted relay network under bounded CSI (Channel State Information)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings and embodiments, and the present invention includes but not limited to the following embodiments.

[0036] The system model used in the present invention is a relay network with three nodes, its principle is as follows figure 1 shown. The model consists of a source node (Alice), an untrusted amplify-and-forward relay node (R) and a destination node (Bob). Each node uses a single-antenna configuration, and a transmission process requires 2 time slots to complete. Assuming that there is no direct communication link between Alice and Bob due to shadow fading or too far away, they can only communicate through an untrusted relay node R. In the first time slot, Alice transmits information x to the untrusted relay node R A , at the same time Bob transmits information x to the untrusted relay node R B . In the second time slot, the relay node R re-sends the received signal to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an optimum power allocation method for an untrusted relay network under bounded CSI (Channel State Information). A communication scheme of a two-hop half-duplex relay network is described and an optimum power allocation scheme is provided; a secrecy rate lower bound is obtained; and a channel ESR (Ergodic Secrecy Rate) is analyzed to obtain a reachable secrecy rate. According to the method, the secrecy rate is maximized through an optimum power allocation formula in a transmission process, the ESR under a high SNR is analyzed, and the reachable average secrecy rate is estimated. The secrecy rate higher than that provided by equal power allocation can be provided by approximate optimum power allocation.

Description

technical field [0001] The invention relates to an optimal power allocation scheme of an untrustworthy relay network under the condition that the channel estimation error is bounded. Background technique [0002] Multi-hop relay is identified as an energy-efficient transmission scheme, which is the optimal way to solve wireless communication security. The method of physical layer secure transmission has the advantages of low computational complexity and resource saving. In recent years, cooperative diversity technology has attracted the attention of many scholars because it can improve the security of the physical layer against eavesdropping. [0003] In the physical layer, there is a game problem of power allocation between users and interference sources. The interference source hopes to transmit an interference signal with sufficient power to prevent eavesdroppers from eavesdropping on the user's transmission information, and the user also hopes that the transmitted sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W52/24H04W52/26H04W52/34H04W52/46
CPCH04W52/241H04W52/267H04W52/346H04W52/46
Inventor 姚如贵徐菲高岩徐娟
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products