Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Wireless energy supply full duplex relay cooperation secret transmission method and system

A wireless energy supply and confidential transmission technology, applied in the field of communication systems, can solve the problems of information leakage, difficulty for legitimate communication users to obtain perfect eavesdropping channel status information, system security performance degradation, etc., and achieve the effect of multiplexing

Active Publication Date: 2020-06-30
SHANDONG NORMAL UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In actual communication systems, in order to achieve effective eavesdropping and not be discovered by legitimate users, eavesdropping users often keep silent or hide their existence, and do not actively feed back or give accurate eavesdropping channel information to legitimate users, so it is difficult for legitimate communication users Obtaining perfect eavesdropping channel state information
This uncertainty factor will lead to serious information leakage and a significant reduction in system security performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless energy supply full duplex relay cooperation secret transmission method and system
  • Wireless energy supply full duplex relay cooperation secret transmission method and system
  • Wireless energy supply full duplex relay cooperation secret transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Such as figure 1 As shown, this embodiment provides a secure transmission method for wireless powered full-duplex relay cooperation, and the specific steps include:

[0034] S1: The relay receives the energy signal sent by the source to harvest energy;

[0035] S2: The relay receives the information carrying the privacy signal sent by the source, uses the harvested energy to forward the information to the legitimate receiver, and eavesdrops on the user to receive the information;

[0036] S3: Calculate the lower bound of the secrecy rate under the imperfect eavesdropping channel state according to the information received by the legal receiver and the eavesdropping user;

[0037] S4: Construct the optimization problem of maximizing the secrecy rate according to the energy beam, information beam, time division factor and power allocation factor;

[0038] S5: Decompose the non-convex optimization problem into three sub-optimization problems, and use the iterative conver...

Embodiment 2

[0088] This embodiment provides a secure transmission system for full-duplex relay cooperation with wireless power supply, such as Image 6As shown, including a wireless power supply full-duplex cooperative relay model and a secure transmission module;

[0089] The wireless power supply full-duplex cooperative relay model includes a source, a legal receiver, a relay, and an eavesdropping user;

[0090] The relay receives the energy signal sent by the information source, and performs energy harvesting;

[0091] The relay receives the information carrying the privacy signal sent by the information source, uses the harvested energy to forward the information to the legal receiving end, and eavesdrops on the user to receive the information;

[0092] In this system, the information source is equipped with N antennas, which is a multi-antenna information source; all receivers, legal receivers and eavesdropping users are equipped with only one antenna due to terminal space constrain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless energy supply full duplex relay cooperation secret transmission method and system, and the method comprises the steps of enabling a relay to receive an energy signaltransmitted by an information source, and carry out the harvesting of energy; enabling the relay to receive the information which is sent by the information source and carries the private signal, forward the information to a legal receiving end by utilizing the harvested energy, and enabling an eavesdropping user to receive the information; calculating a secrecy rate lower bound in an imperfect eavesdropping channel state according to the information received by the legal receiving end and the eavesdropping user; and constructing an optimization problem of maximizing the secrecy rate, calculating an optimal solution of the optimization problem by adopting an iterative convergence optimization method, and performing information secrecy transmission according to the optimal secrecy rate onthe basis that the obtained optimal secrecy rate meets the lower bound of the secrecy rate. According to the method, the secrecy rate is maximized under the condition that the estimation error threshold value of the eavesdropping channel is known, and compared with an existing method, the method not only considers the influence of imperfect acquisition of the state information of the eavesdroppingchannel on information security transmission, but also considers the reuse of energy-limited relay antenna resources.

Description

technical field [0001] The present invention relates to the technical field of communication systems, in particular to a secure transmission method and system for wireless power supply full-duplex relay cooperation. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] Physical Layer Security (PLS, Physical Layer Security) is a key technology to ensure the secure transmission of information in future wireless communication systems. Cooperative relay is an important technical means of physical layer security technology. It can build a virtual multi-antenna (MIMO) system with the help of relay nodes, provide more space resources for secure communication systems, realize directional information transmission, and reduce information leakage. But in actual communication, the relay node may be a battery-powered mobile user in the cellular network, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04W24/02H04W24/06H04W40/10H04W40/22
CPCH04W24/02H04W24/06H04W40/10H04W40/22H04W12/02H04W12/03Y02D30/70
Inventor 王政乔静萍田杰边际
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products