Data security shunt transmission method based on linear search

A technology of data security and transmission method, applied in the field of data security offload transmission based on linear search, which can solve the problems of security overflow, low security and reliability, etc.

Inactive Publication Date: 2018-09-04
ZHEJIANG UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the deficiencies of the existing wireless network, which is easy to be maliciously eavesdropped, resulting in the problem of security overflow, low security and reliability, the present invention provides a wireless network that reduces the problem of security overflow caused by malicious eavesdropping, and has high security and reliability. Data security shunt transmission method based on linear search

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security shunt transmission method based on linear search
  • Data security shunt transmission method based on linear search
  • Data security shunt transmission method based on linear search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The present invention will be further described below in conjunction with the accompanying drawings.

[0099] refer to figure 1 , a linear search-based data security shunt transmission method, the implementation of this method can minimize system energy consumption and improve the utilization rate of wireless resources of the entire system under the premise of meeting data requirements at the same time. Such as figure 1 in the scene shown. Designing an optimization method for this problem includes the following steps:

[0100] (1) In a wireless network, from the point of view of a smart device, part of the data is transmitted to the base station BS, and part of it is shunted to the low-power wireless access node AP. In this case, the optimization problem of minimizing the total power consumption of the system while guaranteeing data transmission requirements and safety overflow constraints is described as a non-convex optimization TPM problem as shown below:

[0101...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data security shunt transmission method based on linear search comprises the following steps of: (1) from the view of intelligent equipment SD in a wireless network, transmitting a part of data to abase station BS, and shunting the other part to a low power wireless access node AP, wherein there is also a situation that the data is eavesdropped by a hidden eavesdropper, and the optimization problem that minimizes the total system power consumption is described as a non-convex optimization problem in the case of ensuring data transmission requirements and safety overflow limit; (2) vertically resolving the TPM problem to a two-level optimization problem; (3) proposing a monotonically optimized power control method according to the underlying problem to optimize the transmission power ofSD; (4) proposing a linear search method for the top problem to further save energy and optimize the total consumed power of the system; and (5) finally solving the TPM problem through interactive iteration between the underlying problem and the top problem. The invention has relatively high security and reliability.

Description

technical field [0001] The invention belongs to the field of wireless networks, and relates to a linear search-based data security shunt transmission method. Background technique [0002] The massive growth of smart devices poses a huge challenge to future Internet of Things (IoT) systems. Today, in the process of developing towards 5G / LTE technology, cellular networks can already provide huge throughput and reliable connection performance for a large number of smart devices. In a wireless network system, some low-power wireless access nodes that work in unlicensed frequency bands for data offloading are easy to be maliciously eavesdropped, which leads to security overflow problems. Contents of the invention [0003] In order to overcome the deficiencies of the existing wireless network, which is easy to be maliciously eavesdropped, resulting in the problem of security overflow, low security and reliability, the present invention provides a wireless network that reduces t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W52/02H04W72/04H04W12/122
CPCH04W12/00H04W52/0206H04W72/0453H04W72/0473Y02D30/70
Inventor 吴远杨晓维石佳俊陈佳钱丽萍朱威
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products