Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorized user safe transmission oriented power distribution method in cognitive wireless network

A technology for authorized users and cognitive users, which is applied in the field of power allocation for secure transmission of authorized users, and can solve problems such as cognitive user performance impact and perception errors

Active Publication Date: 2016-09-21
XI AN JIAOTONG UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But due to the existence of perceptual errors, the performance of cognitive users is greatly affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorized user safe transmission oriented power distribution method in cognitive wireless network
  • Authorized user safe transmission oriented power distribution method in cognitive wireless network
  • Authorized user safe transmission oriented power distribution method in cognitive wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0096] The present invention considers an Overlay network, such as figure 1 shown. The authorized user network is composed of an authorized user sending end (PT) and an authorized user receiving end (PR). At the same time, authorized users face the threat of eavesdropping by an eavesdropping end (EV). A cognitive user consists of a cognitive sender (SN) and a cognitive receiver (AN). Cognitive users use the Overlay method to access the network. Cognitive users perceive the spectrum occupancy and determine the transmission power. Due to the existence of perception errors, the transmissions of cognitive users interfere with the transmissions of authorized users. Considering that the cognitive user's transmission can also interfere with the authorized user's eavesdropping end, the authorized...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorized user safe transmission oriented power distribution method in a cognitive wireless network. The system has four states according to a channel occupation state and a perception result. The transmission rate of a cognitive user and the safe transmission rate and the safe outage probability thereof of the authorized user are computed under each state. Under the constraint of the safe outage probability of the authorized user, the average transmission rate of the cognitive user is maximized so as to obtain the power distribution under each system state. Compared with the comparison scheme, the purposed scheme can guarantee the safe transmission of the authorized user while improving the transmission rate of the cognitive user.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, relates to cognitive user power allocation and authorized user security transmission scheme design, in particular to a power allocation method for authorized user security transmission in a cognitive wireless network. Background technique [0002] With the increase of wireless devices and wireless transmission requirements, available wireless spectrum resources are becoming increasingly scarce. However, the traditional fixed spectrum allocation scheme does not take into account the difference in space and time spectrum usage by users, resulting in a waste of spectrum resources. Cognitive radio technology allows cognitive users without licensed spectrum to use idle or underutilized wireless spectrum resources, thereby improving spectrum utilization. [0003] In cognitive radio networks, cognitive users use spectrum sensing to obtain spectrum opportunities. But due to the presence ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W72/04H04B17/382H04W12/08
CPCH04B17/382H04W12/00H04W72/0473Y02D30/70
Inventor 任品毅王大伟杜清河孙黎王熠晨
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products