Relay-assisted non-orthogonal multiple access cooperative network safety communication method

A non-orthogonal multiple access and cooperative network technology, applied in transmission monitoring, electrical components, radio transmission systems, etc., can solve problems such as information exposure, achieve the effects of improving security, reducing the probability of security interruption, and suppressing eavesdropping

Active Publication Date: 2020-06-05
湖南红船科技有限公司
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional method is to use a key to encrypt information, but the security of this technology largely depends on the skill and complexity of the mathematical algorithm used to generate the key. If an eavesdropper uses an effective mathematical method to crack the key, the information will be lost. fully exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay-assisted non-orthogonal multiple access cooperative network safety communication method
  • Relay-assisted non-orthogonal multiple access cooperative network safety communication method
  • Relay-assisted non-orthogonal multiple access cooperative network safety communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The implementation of a relay-assisted non-orthogonal multiple access cooperative network security communication method, firstly, in a double-source and double-sink NOMA network, the relay R is used as the information forwarding node, and the information transmission is divided into sub-source T 1 and T 2 Broadcast to relay R, and forward from relay R to destination user U 1 and U 2 Two phase transfer. The confidentiality rate threshold of each information is r 1 = r 2 =0.5, it is assumed that the channel between each node of the system is affected by Rayleigh fading. Set the lengths of the paths from the two information transmitters to the relay as 12m and 20m, the distances from the eavesdroppers to them are 20m and 12m respectively, and the distance from the relay to the destination user U 1 , U 2 , and the distances of the eavesdroppers are 80m, 20m and 16m respectively. Relay R uses one of the antennas to receive information. According to the working princi...

Embodiment 2

[0037] The new method of cooperative communication in user wireless network provided by the present invention can obtain the optimal power allocation coefficient α of artificial noise 5 , so that the system can reach the lowest SOP, so high EST transmission can be realized, and it can be applied to the fifth generation mobile communication system network with high confidentiality throughput to improve the transmission security of such systems.

[0038] The specific implementation is that the relay R is used as the information forwarding node, and the information is transmitted from the source T 1 and T 2 Broadcast to relay R, and then forward from relay R to destination user U 1 and U 2 . The channel between each node of the system is affected by Rayleigh fading, set T 1 and T 2 The path length to the relay is 12m and 20m, and the eavesdropper distance T 1 and T 2 20m and 12m respectively, relay R to destination user U 1 , U 2 , and the distances of the eavesdroppers ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a relay-assisted non-orthogonal multiple access cooperative network security communication method, and belongs to the field of network security. According to the method, a relay R is used as an information forwarding node; the communication process is divided into two stages: the first stage is the process from two information sources T1 and T2 to a relay R, and the secondstage is the process that information is transmitted from the relay R to target users U1 and U2 in a downlink mode; artificial noise is introduced in the second stage, the eavesdropping process of aneavesdropper is disturbed, and the safety of information transmission is guaranteed. And the two information sources T1 and T2 continue to send the next information, the communication process is stilldivided into two sections for transmission, and the transmission is forwarded by the relay R. According to the invention, on the one hand, the information transmission link of an NOMA network formedby a cooperative relay is established; on the other hand, the artificial noise is introduced by using the physical layer security technology, so the security of the communication system is improved, the security interruption probability is reduced, and an important technical reference is provided for the security performance design of the NOMA network.

Description

technical field [0001] The invention relates to the security field of a non-orthogonal multiple access (NOMA) network, more specifically, relates to a full-duplex decoding-forwarding relay-assisted security communication of the NOMA network with artificial noise cooperation. Background technique [0002] In the forthcoming fifth generation (5G) mobile communication, the traditional orthogonal multiple access technology is not only constrained by limited spectrum efficiency, but also faces the limitation brought by complex orthogonal resource scheduling. In order to allow the system to accommodate more system access and business types, and to meet the key indicators of ultra-low latency and massive users, NOMA is a non-orthogonal multiple access network oriented to the characteristics of 5G mobile communication networks. into technology. This technology distinguishes the pros and cons of each channel of the user at the base station, and based on this, different transmit powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/155H04B7/0456H04B17/382
CPCH04B7/0456H04B7/15585H04B17/382
Inventor 李冬冬赵楠邹德岳李轩衡
Owner 湖南红船科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products