Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for improving D2D communication security, and computer readable storage medium

A technology of communication security and equipment, applied in the field of wireless communication, can solve the problems of large distance, eavesdropping CU, etc., and achieve the effects of improving communication security, increasing interference, and improving system frequency utilization

Active Publication Date: 2021-10-12
SHENZHEN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the spectral efficiency of the D2D network has been effectively improved, however, D2D communication security also faces some challenges, for example, illegal users eavesdropping on CU information
To address the above problems, the existing solution is to interfere with illegal users by introducing artificial noise or cooperative interference. However, this method will cause some additional overhead, and there is a large distance between the efficiency and the actual application requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for improving D2D communication security, and computer readable storage medium
  • Method and device for improving D2D communication security, and computer readable storage medium
  • Method and device for improving D2D communication security, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the scope of protection of this application.

[0027] In this specification, adjectives such as first and second may only be used to distinguish one element or action from another without necessarily requiring or implying any actual such relationship or order. Reference to an element or component or step (etc.) should not be construed as being limited to only one of the element, component, or step, but may be one or more of the element, component, or step, etc., where the circumstances permit.

[0028] In this spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of wireless communication, and provides a method and device for improving D2D communication security, and a computer readable storage medium, so as to enhance the security of a D2D communication system with low cost and high efficiency. The method comprises the following steps: determining a signal-to-interference-and-noise ratio [gamma]b of CU equipment, a signal-to-interference-and-noise ratio [gamma]d of a D2D link and a signal-to-interference-and-noise ratio [gamma]e of illegal user equipment EVE according to the transmitting power of cellular user CU equipment, the transmitting power of a D2D pair transmitting end DTX and channels among the CU equipment, the DTX, a D2D pair receiving end DRX, a base station BS, an intelligent reflection surface IRS and the EVE; calculating the safety rate Cb of the CU equipment according to the signal to interference plus noise ratio [gamma]b of the CU equipment and the signal to interference plus noise ratio [gamma]e of the EVE; and maximizing the safety rate Cb of the CU equipment by taking the minimum value of the signal to interference and noise ratio [gamma]d of the D2D link, the maximum value of the transmitting power of the DTX and the maximum value of the transmitting power of the CU when the CU equipment, the DTX, the DRX, the BS and the IRS communicate as constraint conditions. According to the technical scheme provided by the invention, the advantage of combining D2D communication and IRS is exerted, and the communication security of the CU equipment is effectively improved.

Description

technical field [0001] The present invention relates to the field of wireless communication, and in particular to a method, device, device and computer-readable storage medium for enhancing D2D communication security. Background technique [0002] With the increasingly prominent security issues in wireless communication systems, the requirements for the security performance of the system are gradually increasing. As a key wireless technology, Device-to-Device (D2D) allows a user to communicate with neighboring users who reuse the spectrum resources of Cellular Users (CUs). Although the spectral efficiency of the D2D network has been effectively improved, however, D2D communication security also faces some challenges, for example, illegal users eavesdropping on CU information. For the above problems, the existing solution is to interfere with illegal users by introducing artificial noise or cooperative interference. However, this method will cause some additional overhead, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W52/24H04W52/36H04W76/28
CPCH04W52/241H04W52/243H04W52/367H04W76/28Y02D30/70
Inventor 钱恭斌郑屿平何春龙李兴泉
Owner SHENZHEN UNIV