Unlock instant, AI-driven research and patent intelligence for your innovation.

Fictitious play-based D2D collaborative relay selection method against semi-duplex active eavesdropping

A collaborative relay, half-duplex technology, applied in the direction of interference to communication, machine-to-machine/machine-type communication services, security devices, etc., can solve problems such as reducing data transmission performance, deteriorating eavesdropping channels, and reducing eavesdropping rates

Active Publication Date: 2018-11-16
ARMY ENG UNIV OF PLA
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although D2D communication will bring inevitable interference to cellular communication, from the perspective of physical layer security, the interference it brings will also deteriorate the eavesdropping channel, reduce the eavesdropping rate, and increase the safe reachable rate of the cellular system under certain conditions , so the interference brought by D2D communication is a friendly interference to the physical layer security performance of cellular users
When the eavesdropper switches to the active interference mode, if D2D still uses the friendly interference method, it will only increase the interference of cellular users and reduce their data transmission performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fictitious play-based D2D collaborative relay selection method against semi-duplex active eavesdropping
  • Fictitious play-based D2D collaborative relay selection method against semi-duplex active eavesdropping
  • Fictitious play-based D2D collaborative relay selection method against semi-duplex active eavesdropping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Preferred embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein.

[0060] The system block diagram of the present invention is as figure 1 As shown, the system simulation adopts Matlab simulation, and the parameter setting does not affect the generality. Considering a cell, there is a base station in the center of the cell; a cell user, 3 D2D communication pairs and an active eavesdropper are randomly distributed in a square area with a side length of 1km*1km, and the D2D transmitter and receiver The distance between them is set to 20m. The transmit power of the base station, the transmit power of each D2D user and the interference power of the active eavesdropper are set as P B =P D =P J =...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fictitious play-based D2D collaborative relay selection method against semi-duplex active eavesdropping. The method adopts a method of joining D2D collaborative relay and friendly jamming to enhance the security performance and the data transmission performance of a cellular system. In view of different attack modes, robust and reliable D2D collaborative relay selection isused to optimize the secure reachable rate and the data transmission rate of a cellular user. According to the fictitious play-based D2D collaborative relay selection scheme, a non-collaborative gamemodel between legitimate users and active eavesdroppers is established, the security and the reliability of cellular user communication can be improved, and the method provided in the invention is better than the traditional nearest distance relay selection algorithm and a random selection algorithm.

Description

technical field [0001] The invention belongs to D2D cooperative relay selection technology in 5G mobile communication, in particular to a D2D cooperative relay selection method based on virtual decision-making (fictitious play) for physical layer security under active eavesdropping. Background technique [0002] Traditional communication security is generally realized through encryption and authentication at high levels such as the network layer. However, with the continuous improvement of computer computing speed and capabilities, high-level security measures cannot guarantee perfect data security. Therefore, using the physical characteristics of wireless channels to improve the security of data transmission has important practical significance. Research on physical layer security has become an important direction of communication security in wireless communication. In the study of physical layer security, most system models assume that there is a passive eavesdropper, who...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/70H04W12/08H04W40/22H04W12/122
CPCH04W4/70H04W12/08H04W40/22H04K3/825H04K2203/16H04K3/45H04K2203/34H04K3/226H04K3/43
Inventor 王金龙罗屹洁徐以涛龚玉萍杨旸江汉
Owner ARMY ENG UNIV OF PLA