Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network

A physical layer security and heterogeneous network technology, which is applied in the field of physical layer security and multi-layer heterogeneous networks, can solve the problems of difficulty in connecting to the best base station for users and high computational complexity, so as to ensure reliable transmission, alleviate channel congestion, Guaranteed efficient use

Active Publication Date: 2019-02-01
NORTHWEST NORMAL UNIVERSITY
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to solve the problem that users are easily affected by situations such as load balancing and resource limitations in the traditional cascading scheme, making it difficult to connect to the best base station; and the traditional security is realized by encryption at the application layer, This method has high computational complexity; then a physical layer security method based on non-optimal user cascading in cellular heterogeneous networks is proposed, which effectively improves network throughput and spectrum efficiency, and to a certain extent Solved the optimization problem of physical layer security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network
  • Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network
  • Physical layer security methods based on non-optimal user cascading scheme in heterogeneous network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A physical layer security method based on a non-optimal user cascade scheme in a heterogeneous network, including the following steps:

[0066] S1. The described network model according to the homogeneous Poisson point process of spatial nodes is analyzed using random geometric mathematical tools. For all network nodes (base stations, user equipment, eavesdroppers), their spatial positions obey the intensity λ The homogeneous Poisson point process Φ;

[0067] S2, we consider a K-layer heterogeneous network, such as figure 1 As shown, analyze the heterogeneous network structure composed of macrocell, microcell and picocell when K=3. The spatial position of the k-th layer base station satisfies the intensity λ k Homogeneous Poisson point process Φ k , And k=1, 2,...,K. In addition, the obedience intensity of the cell user location is λ U Homogeneous Poisson point process Φ U . We assume that all cellular communication links are passive and vulnerable to eavesdropping by mal...

Embodiment 2

[0117] Example 2: Based on Example 1 but with a difference;

[0118] The security mentioned in the present invention is based on a physical layer security algorithm. Due to the broadcast nature of wireless transmission, it is prone to security problems such as interference and eavesdropping, which will endanger communication privacy in the wireless network. Specific performance as Figure 5 As shown, user A, user B, and eavesdroppers share the same wireless network communication system, where user A and user B are legal users, and the channel between them is called a legal channel. The eavesdropper is a potential threat in the communication system, and the channel it occupies is called the eavesdropping channel. When the signal-to-interference plus noise ratio received by the eavesdropper is less than the security threshold, user A and user B can achieve secure communication. Therefore, the random characteristics of channel noise or the security threshold can be used to safely tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses physical layer security methods based on a non-optimal user cascading scheme in a multilayer heterogeneous network and belongs to the technical field of wireless communication.According to the methods, a multilayer heterogeneous network model in a passive eavesdropping scene is analyzed through description of node distribution density, a base station transmitting power, path loss indexes and a bias factor of each layer. The problem that the optimal base stations are difficult to connect is solved by the provided method based on the non-optimal user cascading scheme. According to the scheme, network nodes are modeled into a homogeneous Poisson point process through utilization of stochastic geometry. On the basis of a stochastic geometry mathematical tool, a physical layer security probability expression of the multilayer cellular heterogeneous network is inferred. Influence of the transmitting powers, security thresholds and eavesdropper density on a system security probability is compared and analyzed according to obtained security probabilities. The method has obvious advantages in the aspect of improving physical layer security of the system. A network coverage probability and average user capacity are improved. Throughput and spectral efficiency of the network are also improved.

Description

Technical field [0001] The invention relates to a physical layer security method based on a non-optimal user cascade scheme, which is applied to a multi-layer heterogeneous network and belongs to the field of communication technology. Background technique [0002] In recent years, with the exponential growth of mobile data traffic and network traffic, mobile users have further increased the demand for service quality and user experience of next-generation networks. Because the traditional macro cell is faced with huge challenges in terms of signal strength, throughput, and penetration of obstacles. As a result, the concept of heterogeneous network (HetNet) came into being. Because of its flexible and irreplaceable characteristics, it is considered to be the key technology for future 5G communications. Its main feature is that a large number of small cells are deployed on the basis of traditional macro cells, and the macro cells and small cells share system spectrum, bandwidth an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W52/24H04W52/40H04K1/00
CPCH04K1/00H04W12/02H04W52/241H04W52/40
Inventor 贾向东陈玉宛徐文娟纪澎善
Owner NORTHWEST NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products