Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure Interaction Method for Wireless Cooperative Communication

A technology of cooperative communication and interaction method, applied in the field of wireless cooperative communication security interaction, can solve the problem of not forming a security mechanism, restricting communication nodes, etc., and achieve the effects of good security guarantee, efficient and secure interaction, and reduced complexity.

Active Publication Date: 2022-03-04
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although cooperative communication technologies have been introduced in advanced mobile communication systems, there is still no effective security mechanism to restrict the behavior of communication nodes in cooperative communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Interaction Method for Wireless Cooperative Communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0015] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0016] Such as figure 1 as shown, figure 1 It is a schematic diagram of an interaction process of a secure interaction method for wireless cooperative communication according to an embodiment of the present invention.

[0017] A secure interaction method for wireless cooperative communication according to a preferred embodiment of the present invention, comprising the following steps: the source node 1 sends the RTS frame...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure interaction method for wireless cooperative communication, comprising the following steps: a source node sends an RTS frame; a cooperative node receives the RTS frame, and extracts channel information between it and the source node; and the cooperative node performs security verification with the source node; Cooperating node and destination node perform security verification; Coordinating node sends HTS frame to source node; Destination node sends CCTS frame to Cooperating node and source node; Normal data communication starts. In this way, the secure interaction method for wireless cooperative communication of the present invention adopts the method of directly performing node security authentication between the cooperative node and the source node, and between the cooperative node and the destination node. Effectively reduces the complexity of security certification.

Description

technical field [0001] The invention relates to the communication field, in particular to a secure interaction method for wireless cooperative communication. Background technique [0002] Cooperative communication is a technology that uses mobile relay nodes to increase the capacity of specific users. The principle of this technology is that when all nodes in the cell work in the same frequency band, the system can be decomposed into three types of nodes. The base station is the source node, the specific The user (high-speed user) is the destination node, and other user terminals are relay nodes. All relay nodes can be regarded as the transceiver antennas of specific user nodes, so the network is equal to a multiple-input multiple-output (MIMO) antenna system, which is called It is a virtual multiple-input multiple-output antenna (V-MIMO) system that can support a specific capacity for high-speed users. Therefore, this technique is called "cooperative communication". [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/0431H04W12/06H04L9/32H04L9/08H04B7/024H04B7/026
CPCH04L9/3247H04W12/04H04W12/06H04B7/024H04B7/026
Inventor 甄岩王立城白晖峰霍超侯莹莹
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products