Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A physical layer security method and system based on resource allocation in V2V communication

A physical layer security and resource allocation technology, applied in the field of physical layer security, can solve the problems of system confidentiality performance impact, unoptimized confidentiality capacity, etc.

Active Publication Date: 2019-05-03
HARBIN INST OF TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This subcarrier allocation method does not optimize the secrecy capacity, which will affect the secrecy performance of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer security method and system based on resource allocation in V2V communication
  • A physical layer security method and system based on resource allocation in V2V communication
  • A physical layer security method and system based on resource allocation in V2V communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] Example 1: This implementation mode is applied to scenario 1:

[0106] Scenario 1: Eve eavesdrops on all VUEs in the cellular network,

[0107] In scenario 1, when Eve eavesdrops on the confidential information of all VUEs in the network, the purpose of this embodiment is to maximize the sum confidentiality capacity of all VUEs, and the confidentiality capacity optimization problem is:

[0108]

[0109] The flow chart of this embodiment to solve the optimization problem is as follows figure 2 shown.

[0110] Aiming at the issue of subcarrier allocation when VUE and CUE multiplex subcarriers, step A of this embodiment provides an iterative method for subcarrier allocation based on 3D matching when VUE and CUE multiplex subcarriers, including:

[0111] Step A1: Set the transmission power when any VUE and CUE multiplex any subcarrier, the method includes:

[0112] for any U k and R m , in order to ensure the fairness among users, use the user's channel power gain ...

Embodiment 2

[0189] Embodiment 2: This embodiment is applied to scenario 2:

[0190] Scenario 2: Eve eavesdrops on some VUEs in the cellular network,

[0191] In the second scenario, Eve only eavesdrops on the secret information of some VUEs in the cellular network. At this time, the purpose of the present invention is to maximize the sum of the secret capacity of the eavesdropped VUEs and the channel capacity of the VUEs not eavesdropped. Then the optimization objective function can be expressed as:

[0192]

[0193] Algorithm flow chart such as Figure 6 shown.

[0194] Aiming at the problem of subcarrier allocation when VUE and CUE multiplex subcarriers, step A of this embodiment provides an iterative method for subcarrier allocation based on 3D matching when VUE and CUE multiplex subcarriers, which is similar to the subcarrier allocation method in scenario 1. same, including:

[0195] Step A1:

[0196] Set U within cellular coverage k and R m use S n The transmit power whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer security method and system based on resource allocation in V2V communication, which can improve the confidentiality of the system, and belongs to the technicalfield of wireless communication. The method comprises: S1, when a wiretaker wiretaps confidential information of all vehicle user equipment VUEs in a cellular network, the purpose of maximizing the sum confidentiality capacity of all the vehicle user equipment VUEs is achieved, multiplexed subcarriers are distributed to the vehicle user equipment VUEs and cellular user equipment CUEs, and the VUEs and the CUEs have the same priority; When the eavesdropper only eavesdrops confidential information of part of the VUEs in the cellular network to enable the sum of the confidential capacity of theeavesdropped VUEs and the channel capacity of the VUEs which are not eavesdropped to be maximum, multiplexing subcarriers are distributed to the VUEs and the CUEs, and the VUEs and the CUEs have the same priority; And S2, the transmission power of the VUE and the CUE multiplexing the corresponding subcarriers is solved according to the subcarrier distribution result in the step S1.

Description

technical field [0001] The invention relates to a physical layer security method and system based on resource allocation in V2V (vehicle-to-vehicle, vehicle-to-vehicle) communication, belonging to the technical field of wireless communication. Background technique [0002] In recent years, due to the rapid development of communication technology, the first phase of 5G has been frozen in 3GPP R15. Among them, the Internet of Vehicles technology including LTE-V2X (long term evolution-vehicle to everything) has become a key technology for 5G research. , the Internet of Vehicles has become one of the main application scenarios of 5G. The existing vehicular ad hoc network (VANET) is based on IEEE 802.11p dedicated short range communication (DSRC), but the communication distance of DSRC is relatively short, generally 10-30m, which cannot meet the growing data volume and long-distance vehicle communication requirements. Therefore, LTE-based vehicle-to-vehicle (V2V) communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/46H04W12/02H04W72/04
Inventor 陈晓华罗雪文刘怡良
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products