Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multicast method and device based on physical layer security transmission

A physical layer security and base station technology, applied in the field of secure multicast transmission of wireless communication, can solve problems such as inability to receive data, destroy legitimate user signals, and low multicast transmission rate

Inactive Publication Date: 2018-11-02
CHINA CRIMINAL POLICE UNIV
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional multicast cannot make full use of the receiving ability of each user, the multicast transmission rate is very low, and the throughput performance of the multicast system is poor.
[0003] In order to meet the QoS requirements of multicast users and improve system performance such as multicast system throughput, a multicast method for secure physical layer transmission is proposed. This method uses multiple antennas at the sending end to send and receive data. Party is a multicast user, and each multicast user uses a single antenna to send and receive data, wherein, after the base station obtains the channel state information of each multicast user, that is, a legal user, through the pilot training sequence, the main channel of the legal user Add artificial noise to the eavesdropping user, so that the eavesdropping user is disturbed by the artificial noise and cannot receive the correct data
Although this method can safely transmit data, it is difficult to generate effective artificial noise in the orthogonal space of channel vectors of many legal users when the number of antennas at the transmitting end is lower than that at the receiving end. It will destroy the signal received by legitimate users, and the correctness of the received data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast method and device based on physical layer security transmission
  • Multicast method and device based on physical layer security transmission
  • Multicast method and device based on physical layer security transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] see figure 1 , a flow chart of the first multicast method based on physical layer secure transmission provided by an embodiment of the present invention, the method includes:

[0057] S101, estimating the channel state information of each multicast user according to the pilot training sequence;

[0058] The channel state information involved in the embodiments of the present invention specifically refers to the channel state information in the field of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a multicast method and device based on physical layer security transmission. The method comprises the following steps of estimating channel state information of each multicast user according to a pilot frequency training sequence; when the first number is smaller than the second number, acquiring secrecy capacity according to the estimated channel state information, determining a target multicast user from the multicast user corresponding to the acquired maximum secrecy capacity, and determining sub-carriers corresponding to the maximum secrecy capacity astarget sub-carriers; respectively loading the target sub-carriers into a null space of a main channel corresponding to the target multicast user according to the estimated channel state information inorder to obtain a target channel; and correspondingly introducing artificial noise into each zero space, superposing the artificial noise and data to be sent, and sending the superposed signal through the target channel of each target multicast user. According to the scheme provided by the embodiments of the invention, when different secret QoS requirements of each user in a multicast group are ensured, the correctness of the data can be guaranteed.

Description

technical field [0001] The present invention relates to the technical field of secure multicast transmission in wireless communication, in particular to a multicast method and device based on physical layer secure transmission. Background technique [0002] With the development of broadband wireless communication technology, 5G network is evolving in the direction of diversification, broadband, integration and intelligence. Multimedia Broadcast / Multicast (MBMS, Multimedia Broadcast Multicast Service, multicast for short) technology based on OFDMA (Orthogonal Frequency Division Multiple Access) can use the same time-frequency resource to transmit the same information to multiple users. business. Since there are differences in wireless channels between the transmitting end, that is, the base station end, and each user, the wireless channel information between the transmitting end and all users needs to be considered overall in multicast transmission. In traditional multicast...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W72/00H04W72/04H04W72/08H04W12/02H04L25/02
CPCH04L25/0224H04W12/02H04W72/0453H04W72/30H04W72/543H04W72/542
Inventor 陈雷拱宝富孟凡瑞左国瑞贾杰王冰霞黄子琪
Owner CHINA CRIMINAL POLICE UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products