Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-service transmission power allocation method against random eavesdropping

A distribution method and transmission power technology, applied in the field of information technology security, can solve problems such as the inability to guarantee the positive security rate of a secure transmission link

Active Publication Date: 2020-08-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the random fluctuation of the wireless channel, it cannot be guaranteed that the secure transmission link will always maintain a stable and fixed positive security rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-service transmission power allocation method against random eavesdropping
  • A multi-service transmission power allocation method against random eavesdropping
  • A multi-service transmission power allocation method against random eavesdropping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0058] The invention is an improvement of the multi-service transmission power allocation method against random eavesdropping. At present, the anti-random eavesdropping multi-service transmission power allocation methods are all based on the approximate power allocation method under the assumption of a large-scale antenna system. However, in an actual edge computing system, the number of antenna configurations is small, and directly adopting the power allocation method in a large-scale antenna system will seriously reduce the security performance of the system. The present invention adopts an iterative optimization algorithm, which can correctly reflect the optimal power distribution under each antenna configuration, thereby realizing the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-service transmission power allocation method against random eavesdropping. In an edge computing system, multiple terminal devices are connected to the edge side, and the edge computing device Alice simultaneously provides services for the confidential service terminal Bob and the public service terminal. Moreover, the edge computing device Alice uses a part of the transmission power to transmit artificial noise signals to help secure communication links resist randomly distributed eavesdropping terminal attacks. Under the limitation of public data transmission rate and security transmission rate, the present invention uses iterative optimization algorithm to gradually approach the optimal power distribution ratio of the edge computing system, meets the transmission requirements of system confidential signals and public signals, minimizes the probability of security interruption, and improves the system safety performance.

Description

technical field [0001] The invention belongs to the field of information technology security, in particular to a multi-service transmission power allocation method against random eavesdropping. Background technique [0002] By deploying edge computing devices near the terminal side, edge computing can enable terminals or sensor nodes to transmit their own data to edge computing devices nearby. The edge computing device performs local processing after obtaining data, and provides services such as real-time control and feedback, and provides real-time control and network planning for massive terminals. However, the security requirements of massive terminal devices with weak computing capabilities have become a major security challenge for edge computing. Generally, the computing power of edge computing devices is much higher than that of terminal devices. It is very important to use the computing power of edge computing side to carry out the design of physical feature securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/02H04W24/02H04W72/04H04B17/336H04B17/382H04W12/03
CPCH04W12/02H04W24/02H04W72/0473H04B17/336H04B17/382H04W12/03Y02D30/70
Inventor 宋欢欢文红毛中麒
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA