A method and system for safe communication of UAV formation network based on active jamming

A communication method and network security technology, applied in the field of UAV formation network security communication method and system, can solve problems such as affecting the security of the communication system, and achieve the effects of reducing the impact, balancing the transmission power, and ensuring the security

Active Publication Date: 2020-06-23
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, due to the broadcast and openness of the communication link between the UAV formation and the served users, the UAV formation communication system will inevitably be subject to different degrees of security threats; on the other hand, the UAV itself It has high flexibility, so in order to better serve users, the UAV formation communication system often chooses to send useful signals close to the user when it is working, which undoubtedly provides favorable conditions for unauthorized users to eavesdrop, thus Affect the security of the communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for safe communication of UAV formation network based on active jamming
  • A method and system for safe communication of UAV formation network based on active jamming
  • A method and system for safe communication of UAV formation network based on active jamming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0019] In order to better illustrate the embodiment of the present invention, the UAV formation network is described first. A UAV formation network usually refers to a network composed of a UAV swarm and several authorized terminals. The UAV swarm includes multiple UAVs, and the authorized terminal refers to a legal terminal that transmits informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an active interference-based unmanned aerial vehicle formation network security communication method and system. The method comprises the steps that based on large-scale channel information and small-scale channel information between an unmanned aerial vehicle group and a plurality of terminals, and a first transmitting power set and a second transmitting power set of the unmanned aerial vehicle group, acquiring the traversal confidentiality and rate of the unmanned aerial vehicle group; and adjusting the first transmitting power set and the second transmitting power set to maximize traversal confidentiality and rate, so that the unmanned aerial vehicle group transmits confidential signals and interference signals to a plurality of authorization terminals according to the first transmitting power set and the second transmitting power set when the traversal confidentiality and rate are maximum. A communication and interference cooperation mode isadopted, so that the decoding performance of the unauthorized terminal is reduced. The traversal confidentiality and rate are maximized, the transmitting power of confidential signals and the transmitting power of interference signals are balanced, the influence on the receiving performance of the authorization terminal is reduced, and the security of unmanned aerial vehicle formation network communication is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and system for secure communication of UAV formation network based on active interference. Background technique [0002] In recent years, the research and application of UAVs are growing exponentially. Due to the mobility of UAVs, UAVs can be used for agile communication; based on the high flexibility of UAVs, UAVs can be used as mobile base stations in the air to enhance communication capacity and expand coverage, especially in special In common communication scenarios, such as earthquakes, tsunamis and traffic control, etc.; and usually the research and manufacturing costs of UAVs are relatively low, and they can assist in the completion of important services in 5G wireless communications, such as high-speed transmission. However, under actual communication conditions, the working environment of drones is often very complicated, and the design of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04K1/10H04B7/185H04W52/26
CPCH04B7/18506H04K1/10H04W52/267
Inventor 冯伟王宣宣葛宁
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products