A full-duplex cooperative scrambling secure transmission method based on optimal user selection of a direct path

A direct path, safe transmission technology, applied in the direction of transmission system, interference to communication, radio transmission system, etc.

Active Publication Date: 2018-12-21
HUAQIAO UNIVERSITY
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, after conducting relevant investigations, it is found that in the existing research work on physical layer security performance, there is a lack of rel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A full-duplex cooperative scrambling secure transmission method based on optimal user selection of a direct path
  • A full-duplex cooperative scrambling secure transmission method based on optimal user selection of a direct path
  • A full-duplex cooperative scrambling secure transmission method based on optimal user selection of a direct path

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0048] Such as figure 1 with figure 2 As shown, the present invention discloses a full-duplex cooperative scrambling secure transmission method based on the optimal user selection of a direct path, which is applied to a multi-user relay network, which includes a source node and a relay Nodes and multiple destination user nodes (sinks), all nodes are single antennas, and the relay node is a passive node, the destination user node adopts full-duplex working technology, and there is a direct path.

[0049] The entire secure transmission process of information is divided into two time slots to complete. In the first time slot, the source node sends information to the relay node and the destination user node, and at the same time selects a user with the largest signal-to-noise ratio from all destination user nodes The node is a legitimate user node, and the eavesdropping user node is the eavesdropping user node. Since the destination node is in full duplex mode, the legitimate user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a full-duplex cooperative scrambling secure transmission method based on optimal user selection of direct path. In the first time slot, the source node sends information to the relay node and the destination user node. At the same time, one user node with the largest signal-to-noise ratio is selected from all the destination user nodes as the legal user node, and the otherdestination user nodes are eavesdropping user nodes. The legal user node sends interference signals to the relay node and destination user node. In the second time slot, the relay node amplifies theinformation received in the first time slot by using the variable gain amplification and forwarding protocol, and forwards the information to the destination user node. The legitimate user continues to send the scrambling signal to the eavesdropping user node. The invention can reduce the receiving signal-to-noise ratio of the eavesdropping channel and ensure the safe transmission of the information.

Description

technical field [0001] The invention relates to the field of wireless communication physical layer security, in particular to a full-duplex cooperative scrambling secure transmission method based on the optimal user selection of the direct path. Background technique [0002] From the perspective of information theory, physical layer security makes full use of various propagation characteristics of wireless channels to solve information security problems in the communication process at the physical layer. Compared with key encryption, physical layer security has many advantages, such as no need for highly complex algorithms, clear security performance evaluation criteria, and so on. In terms of data security, physical layer security technology has received more and more attention as a supplement or replacement of key encryption technology. By processing information at the physical layer, the security of information can be fundamentally ensured. Therefore, research on physic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B7/026H04K3/00H04B7/155H04W72/12
CPCH04B7/026H04K3/825H04B7/15535H04W72/542
Inventor 赵睿方嘉佳
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products