Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for improving security rate of MIMO security communication system

A technology for secure rate and secure communication, applied in the field of improving the secure rate of a MIMO secure communication system, and can solve the problems of increasing hardware cost and system complexity, etc.

Active Publication Date: 2016-06-08
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the MIMO (Multiple-Input Multiple-Output) secure communication system, although the multiplexing gain and diversity gain brought by MIMO technology are obtained, the cost of hardware and the complexity of the system are also greatly increased.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving security rate of MIMO security communication system
  • Method and system for improving security rate of MIMO security communication system
  • Method and system for improving security rate of MIMO security communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] Such as figure 1 As shown, the secure communication system includes a transmitter, a legal receiver and an eavesdropper. The secure rate of a secure communication system is defined as the difference between the rate received by the legitimate receiver and the rate received by all eavesdroppers. For the sake of simplicity, the transmitter is called Alice, the legal receiver is Bob, and the eavesdropper is Eve. The antenna numbers of Alice, Bob and Eve are M, N respectively 1 and N 2 , where M≥N 2. Considering the narrowband transmission of the signal on a slow fading channel, the channel responses from Alice to Bob and Alice to Eve are: and

[0091] Such as figure 2 As shown, a method for improving the security rate of a MIMO security communication system includes:

[0092] S10: The legitimate transmitter sends information to the legitimate receiver and eavesdropper.

[0093] Among them, the signal sent by the legal transmitter is: Where M is the number of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for improving a security rate of an MIMO security communication system. The method for improving the security rate of the MIMO security communication system is used for realizing the maximal security rate under the constraint of the maximal transmitting power of a transmitting terminal and the number of non-zero elements in an antenna sub-array matrix by using joint beamforming and antenna sub-array forming strategies, so that the relatively high security rate can be obtained under the condition of greatly reducing the cost of the system hardware.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for improving the security rate of a MIMO security communication system. Background technique [0002] In recent years, information security has gradually become a hot issue in the field of wireless communication. Due to the broadcast characteristics of the wireless communication medium, information in the communication network is easily intercepted by eavesdroppers. Traditional secure communication is realized by applying an encryption protocol on the upper layer of the network system (for example: network layer) under the assumption that the physical layer is error-free. For example, the application of data encryption methods, computer network security and Internet security protocols. However, in a wireless communication environment, the distribution and management of keys will be very expensive and vulnerable to attacks, which makes it difficult to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B7/04
CPCH04B7/0452
Inventor 黄建理陈华军蒋屹新董旭柱郭晓斌许爱东陈富汉陈立明蒙家晓张福铮关泽武
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products