Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer security control method based on power allocation in full duplex relay system

A technology of physical layer security and relay system, which is applied in the field of physical layer security control based on power distribution, can solve the problems of low security of communication system and inability to effectively overcome security problems, so as to improve security performance and reduce signal interference and noise Ratio and link capacity, security improvement effect

Active Publication Date: 2018-03-20
BEIJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the security problems caused by eavesdropping nodes in the prior art cannot be realized in a simple and effective way
[0004] Therefore, in the process of implementing the present application, the inventor found that the prior art has at least the following problems: the security problems caused by eavesdropping nodes cannot be effectively overcome, so that the security in the communication system is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer security control method based on power allocation in full duplex relay system
  • Physical layer security control method based on power allocation in full duplex relay system
  • Physical layer security control method based on power allocation in full duplex relay system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to specific embodiments and accompanying drawings.

[0048] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are for the purpose of distinguishing two entities with the same name but not the same or non-identical parameters. It can be seen that "first" and "second" It is only for the convenience of expression and should not be construed as a limitation to the embodiments of the present invention, and subsequent embodiments will not describe them one by one.

[0049] refer to figure 2 As shown, the eavesdropping node of the communication system in the present application can receive the signals of the source node and the relay node, and the relay node works in the full-duplex mode. Therefore, the source node and the eavesdropping n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer security control method based on power allocation in a full duplex relay system. The method comprises the following steps: working in a full duplex mode on thebasis of a relay node, simultaneously sending, by a source node and the relay node, signals, simultaneously receiving, by an eavesdropping node, the signals of the source node and the relay node, andconstructing a signal model; establishing a function relationship between the sending power of the source node and the relay node and system security capacity, namely a constrained optimization function using it as a constraint condition that the sending power of the source node and the relay node is smaller than the maximum sending power and using the maximum system security capacity as the target; when the constraint condition of the sending power of the relay node is not considered, obtaining an optimal sending power expression of the source node, and converting the constrained optimization function into a single-variable constrained optimization function; and finding a feasible solution of the optimal relay sending power by using numerical solution and dichotomy to obtain the expression of the optimal sending power of the relay node. By adoption of the security control method, the physical layer security of the full duplex relay system can be improved.

Description

technical field [0001] The invention relates to the related technical field of physical layer security in a full-duplex relay system, in particular to a physical layer security control method based on power allocation in a full-duplex relay system. Background technique [0002] The popularization of the Internet and the large-scale application of wireless networks have brought convenience to people's lives. While considering the effectiveness and reliability of wireless communication systems, people pay more attention to its security. Signal transmission in wireless communication has broadcast characteristics, which makes it easy for eavesdroppers to receive information when it is sent. From the perspective of the seven-layer protocol of open system interconnection, the current information security technology of communication systems mainly focuses on the network layer and the layers above, and is based on the assumption that the physical layer has provided error-free transm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W52/34
CPCH04L63/16H04W52/34
Inventor 刘芳张茹刘元安
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products