Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A physical layer security method and system based on resource allocation in v2v communication

A technology of physical layer security and resource allocation, applied in the field of physical layer security, can solve problems such as unoptimized confidentiality capacity and impact on system confidentiality performance, and achieve the effect of improving confidentiality capacity and ensuring security performance

Active Publication Date: 2021-11-19
HARBIN INST OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This subcarrier allocation method does not optimize the secrecy capacity, which will affect the secrecy performance of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer security method and system based on resource allocation in v2v communication
  • A physical layer security method and system based on resource allocation in v2v communication
  • A physical layer security method and system based on resource allocation in v2v communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] Example 1: This implementation mode is applied to scenario 1:

[0106] Scenario 1: Eve eavesdrops on all VUEs in the cellular network,

[0107] In scenario 1, when Eve eavesdrops on the confidential information of all VUEs in the network, the purpose of this embodiment is to maximize the sum confidentiality capacity of all VUEs, and the confidentiality capacity optimization problem is:

[0108]

[0109] The flow chart of this embodiment to solve the optimization problem is as follows figure 2 shown.

[0110] Aiming at the issue of subcarrier allocation when VUE and CUE multiplex subcarriers, step A of this embodiment provides an iterative method for subcarrier allocation based on 3D matching when VUE and CUE multiplex subcarriers, including:

[0111] Step A1: Set the transmission power when any VUE and CUE multiplex any subcarrier, the method includes:

[0112] for any U k and R m , in order to ensure the fairness among users, use the user's channel power gain ...

Embodiment 2

[0189] Embodiment 2: This embodiment is applied to scenario 2:

[0190] Scenario 2: Eve eavesdrops on some VUEs in the cellular network,

[0191] In the second scenario, Eve only eavesdrops on the secret information of some VUEs in the cellular network. At this time, the purpose of the present invention is to maximize the sum of the secret capacity of the eavesdropped VUEs and the channel capacity of the VUEs not eavesdropped. Then the optimization objective function can be expressed as:

[0192]

[0193] Algorithm flow chart such as Figure 6 shown.

[0194] Aiming at the problem of subcarrier allocation when VUE and CUE multiplex subcarriers, step A of this embodiment provides an iterative method for subcarrier allocation based on 3D matching when VUE and CUE multiplex subcarriers, which is similar to the subcarrier allocation method in scenario 1. same, including:

[0195] Step A1:

[0196] Set U within cellular coverage k and R m use S n The transmit power whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A physical layer security method and system based on resource allocation in V2V communication, which can improve system security performance, and belongs to the technical field of wireless communication. The present invention includes: S1. When an eavesdropper eavesdrops on the confidential information of all vehicle user equipment VUEs in the cellular network, so as to maximize the sum and confidentiality capacity of all vehicle user equipment VUEs, allocate and multiplex the vehicle user equipment VUE and cellular user equipment CUE subcarriers, VUE and CUE have the same priority; when the eavesdropper only eavesdrops on the secret information of some VUEs in the cellular network, in order to maximize the sum of the secret capacity of the eavesdropped VUE and the channel capacity of the uneavesdropped VUE, Assign multiplexed subcarriers to VUE and CUE, and VUE and CUE have the same priority; S2. According to the subcarrier allocation result of S1, solve the transmission power of VUE and CUE that multiplex corresponding subcarriers.

Description

technical field [0001] The invention relates to a physical layer security method and system based on resource allocation in V2V (vehicle-to-vehicle, vehicle-to-vehicle) communication, belonging to the technical field of wireless communication. Background technique [0002] In recent years, due to the rapid development of communication technology, the first phase of 5G has been frozen in 3GPP R15. Among them, the Internet of Vehicles technology including LTE-V2X (long term evolution-vehicle to everything) has become a key technology for 5G research. , the Internet of Vehicles has become one of the main application scenarios of 5G. The existing vehicular ad hoc network (VANET) is based on IEEE 802.11p dedicated short range communication (DSRC), but the communication distance of DSRC is relatively short, generally 10-30m, which cannot meet the growing data volume and long-distance vehicle communication requirements. Therefore, LTE-based vehicle-to-vehicle (V2V) communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/46H04W12/02H04W72/04
Inventor 陈晓华罗雪文刘怡良
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products