A relay-assisted non-orthogonal multiple access cooperative network security communication method

A non-orthogonal multiple access, cooperative network technology, applied in transmission monitoring, electrical components, radio transmission systems, etc., can solve problems such as information exposure, and achieve the effect of improving security and reducing the probability of security interruption

Active Publication Date: 2021-07-16
湖南红船科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional method is to use a key to encrypt information, but the security of this technology largely depends on the skill and complexity of the mathematical algorithm used to generate the key. If an eavesdropper uses an effective mathematical method to crack the key, the information will be lost. fully exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A relay-assisted non-orthogonal multiple access cooperative network security communication method
  • A relay-assisted non-orthogonal multiple access cooperative network security communication method
  • A relay-assisted non-orthogonal multiple access cooperative network security communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The implementation of a relay-assisted non-orthogonal multiple access cooperative network security communication method, firstly, in a double-source and double-sink NOMA network, the relay R is used as the information forwarding node, and the information transmission is divided into sub-source T 1 and T 2 Broadcast to relay R, and forward from relay R to destination user U 1 and U 2 Two phase transfer. The confidentiality rate threshold of each information is r 1 = r 2 =0.5, it is assumed that the channel between each node of the system is affected by Rayleigh fading. Set the lengths of the paths from the two information transmitters to the relay as 12m and 20m, the distances from the eavesdroppers to them are 20m and 12m respectively, and the distance from the relay to the destination user U 1 , U 2 , and the distances of the eavesdroppers are 80m, 20m and 16m respectively. Relay R uses one of the antennas to receive information. According to the working princi...

Embodiment 2

[0037] The new method of cooperative communication in user wireless network provided by the present invention can obtain the optimal power allocation coefficient α of artificial noise 5 , so that the system can reach the lowest SOP, so high EST transmission can be realized, and it can be applied to the fifth generation mobile communication system network with high confidentiality throughput to improve the transmission security of such systems.

[0038] The specific implementation is that the relay R is used as the information forwarding node, and the information is transmitted from the source T 1 and T 2 Broadcast to relay R, and then forward from relay R to destination user U 1 and U 2 . The channel between each node of the system is affected by Rayleigh fading, set T 1 and T 2 The path length to the relay is 12m and 20m, and the eavesdropper distance T 1 and T 2 20m and 12m respectively, relay R to destination user U 1 , U 2 , and the distances of the eavesdroppers ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A relay-assisted non-orthogonal multiple access cooperative network security communication method belongs to the field of network security. In this method, the relay R is used as the information forwarding node, and the communication process is divided into two stages. The first stage is two sources T 1 and T 2 The process to the relay R, the second stage is the downlink transmission of information from the relay R to the destination user U 1 and U 2 In the second stage, artificial noise is introduced to interfere with the eavesdropper's eavesdropping process and ensure the security of information transmission. Two sources T 1 and T 2 The information source continues to send the next message, and the communication process is still divided into two sections for transmission, which is forwarded and transmitted by the relay R. On the one hand, the present invention establishes the information transmission link of the NOMA network composed of cooperative relay; Safety performance design provides important technical reference.

Description

technical field [0001] The invention relates to the security field of a non-orthogonal multiple access (NOMA) network, more specifically, relates to a full-duplex decoding-forwarding relay-assisted security communication of the NOMA network with artificial noise cooperation. Background technique [0002] In the forthcoming fifth generation (5G) mobile communication, the traditional orthogonal multiple access technology is not only constrained by limited spectrum efficiency, but also faces the limitation brought by complex orthogonal resource scheduling. In order to allow the system to accommodate more system access and business types, and to meet the key indicators of ultra-low latency and massive users, NOMA is a non-orthogonal multiple access network oriented to the characteristics of 5G mobile communication networks. into technology. This technology distinguishes the pros and cons of each channel of the user at the base station, and based on this, different transmit powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/155H04B7/0456H04B17/382
CPCH04B7/0456H04B7/15585H04B17/382
Inventor 李冬冬赵楠邹德岳李轩衡
Owner 湖南红船科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products