Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing physical layer security and power optimization of full-duplex communication system

A technology for physical layer security and communication system, applied in the field of full-duplex communication system security, can solve the problem of not fully exploiting the full-duplex system and the communication security of the same-frequency full-duplex system, and achieve the effect of improving the transmission efficiency

Active Publication Date: 2016-12-07
XIAMEN UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims at the current full-duplex physical layer security research by adding artificial noise to realize the safe transmission of the full-duplex system, and does not fully explore the characteristics of the full-duplex system at the same time and frequency in order to improve and optimize the full-duplex system Insufficient communication security, providing a full-duplex communication system to achieve physical layer security method, in this method, the physical layer security model of the full-duplex communication system without the assistance of artificial noise and other interfering nodes is constructed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing physical layer security and power optimization of full-duplex communication system
  • Method for realizing physical layer security and power optimization of full-duplex communication system
  • Method for realizing physical layer security and power optimization of full-duplex communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] Such as figure 2 Shown is the schematic diagram of the full-duplex communication model that the present invention adopts, and the number of transmitting antennas is N in this system, and the number of receiving antennas is the full-duplex base station of M, a sending end Tx, a receiving end Rx, N is all The number of transmitting antennas of the duplex base station, M is the number of receiving antennas of the full-duplex base station, both are integers greater than or equal to 1, assuming that the self-interference of the full-duplex base station is completely eliminated;

[0028] 1. Firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing physical layer security and power optimization of a full-duplex communication system. A model fully utilizes the characteristic of same frequency at the same time of the full-duplex communication system, and assistance from man-made noise and other interference nodes is unnecessary, so that the transmission efficiency of a full-duplex base station is further increased, and the transmission power of the base station is optimized under the condition that the full-duplex system information transmission is guaranteed to reach to a target secure rate. The method mainly comprises the steps of constructing a physical layer security model of the full-duplex communication system; constructing a convex optimization model based on a secure rate required by the system; and finally converting a non-convex problem which is difficult to solve into a convex optimization problem which is easy to solve by utilizing an SDP theory and an S-Procedure theory, thereby finding an optimal beam forming vector and optimizing the transmission power of the base station. According to the method for realizing physical layer security and power optimization of the full-duplex communication system, the minimum transmission power of the base station is guaranteed and all the transmission power of the base station is guaranteed to be used for transmission of effective signals under the condition of secure transmission of the full-duplex system, and the transmission power of the full-duplex base station is accordingly optimized.

Description

technical field [0001] The invention relates to the security field of a full-duplex communication system, in particular to a method for realizing physical layer security and power optimization of a full-duplex communication system. Background technique [0002] As one of the key candidate technologies for the physical layer of 5G communication, full-duplex transmission technology has been written into the IMT-2020 technical framework. [0003] One of the key factors affecting the performance of full-duplex transmission is the strong self-interference signal caused by the transmitting antenna of the same communication device to the receiving antenna. At present, most of the research is focused on the self-interference cancellation technology of the full-duplex system and has a better Effectiveness, which provides a feasible basis for the application of full-duplex technology. However, in these studies, the discussion of full-duplex secure transmission mechanism is rarely inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W52/24H04W52/26H04B7/06
Inventor 赵彩丹太梦思云黄联芬施芝元
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products