Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cognitive security transmission method based on wireless information and power joint transmission

A technology of secure transmission and joint transmission, which is applied in the field of cognitive security transmission based on the joint transmission of wireless information and power, and can solve the problems of lack of spectrum resources for cognitive users.

Active Publication Date: 2019-10-11
NORTHWESTERN POLYTECHNICAL UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In cognitive radio networks, authorized users face the security threat of eavesdropping, while cognitive users lack spectrum resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cognitive security transmission method based on wireless information and power joint transmission
  • Cognitive security transmission method based on wireless information and power joint transmission
  • Cognitive security transmission method based on wireless information and power joint transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention provides a cognitive security transmission method based on joint transmission of wireless information and power. Considering a five-node transmission network, the authorized user transmitting terminal PT wants to transmit information safely and reliably to the authorized user receiving terminal PT. Eve will Eavesdropping on PT's transmission data. A PT has M antennas. Cognitive user ST uses the decoding and forwarding mechanism to send authorized user private information, and cognitive user SJ uses energy harvesting mechanism to receive energy information, and then transmits cooperative interference information to protect the safe transmission of authorized user information. After the authorized user completes the transmission, the cognitive user ST uses the frequency spectrum to send cognitive user information. For this scheme, we analyze the transmission outage probability and security outage probability of the network, and optimally allocate ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cognitive security transmission method based on wireless information and power joint transmission. The method comprises the following steps of transmitting private information and energy information in a time slot; enabling a cognitive user ST to assist in safely forwarding private information of an authorized user in a time slot by adopting a decoding forwarding relay protocol, meanwhile, enabling a cognitive user SJ to harvest a radio frequency spectrum signal containing the energy in the step S1 by utilizing an energy harvesting technology, and then assist in safely transmitting the private information of the authorized user by adopting a cooperative interference mechanism; enabling a cognitive user ST to uses the remaining time slot T-t1 to send cognitive information to a cognitive receiver SR.. The cognitive user can provide help for safe transmission of private information of the authorized user, and the authorized user can improve a part of spectrum resources to cognitive transmission, so that win-win of the authorized user and the cognitive user is realized and development requirement of next-generation cognitive radio network safety is met.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a scheme design of secure transmission of a cognitive radio network, in particular to a cognitive security transmission method based on joint transmission of wireless information and power. Background technique [0002] The rapid development of wireless communication technology has brought about a large-scale improvement of wireless communication equipment and services, resulting in very crowded limited spectrum. However, the traditional fixed spectrum allocation strategy can not make full use of the licensed spectrum due to the dynamic use of spectrum by users in time and space. Cognitive radio technology allows cognitive users to dynamically access the network and effectively control the interference caused to the authorized user network, thereby improving the spectrum utilization of the network. [0003] Due to the broadcast characteristics of the wireless commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W16/14H04W72/04H04W12/03
CPCH04W16/14H04W72/0446H04W72/0473H04W12/03
Inventor 王大伟宋睿王佳欣李立欣耿杰
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products