Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer secure wireless relay communication method based on game theory

A physical layer security and wireless relay technology, applied in wireless communication, security devices, sustainable communication technology, etc., can solve the problems of high encryption algorithm complexity, expensive key management, brute force cracking, etc., to solve the problem of anti-eavesdropping , Improve security capacity, reduce the effect of eavesdropping probability

Inactive Publication Date: 2017-03-15
FUJIAN NORMAL UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid development of computer hardware technology, the use of a single key to encrypt transmission may be cracked by violence.
Although the key encryption method can obtain better information security performance, the complexity of the encryption algorithm is often relatively high.
However, measures such as improving the strength of the encryption algorithm and updating the key in time need to consume a lot of energy and computing costs.
[0003] At the same time, the following challenges are still faced in wireless network security communication: (1) Due to the broadcast characteristics of wireless channels, it is easier for eavesdroppers and attackers to intercept information transmission (especially the transmission of keys) or reduce the transmission quality of the channel; ( 2) Due to the lack of distributed network infrastructure, key distribution is very difficult; (3) Mobile networks have a dynamic topology, for example, mobile ad hoc multi-hop networks (Ad Hoc Network), making key management extremely expensive; (4) Most wireless terminals (such as mobile phones, sensor nodes, etc.) are powered by batteries, and the limited energy makes the high-energy public key algorithm system useless
It is worth noting that in the process of continuous development and innovation of wireless network security, the physical layer at the bottom of the network protocol stack has been ignored; (5) due to the passive nature of eavesdropping, trust-based mechanisms are no longer applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secure wireless relay communication method based on game theory
  • Physical layer secure wireless relay communication method based on game theory
  • Physical layer secure wireless relay communication method based on game theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Such as Figure 1-5 As shown in one of them, the present invention discloses a wireless relay communication method based on game theory physical layer security, which includes the following steps:

[0037] Step 1. Define the communication model:

[0038] Such as figure 2 As shown, set a primary user that needs other users to communicate cooperatively, the primary user is the source node; multiple secondary users that can carry out cooperative communication, multiple secondary users are relay nodes; multiple eavesdropping data packets transmitted by secondary users The eavesdropping user; more than one destination node receiving the data packet; the source node sends the data packet to the relay node through the main channel with power P, the relay node sends the data packet to the destination node through the main channel with power O, and the eavesdropping user uses power O eavesdrops on the data packets forwarded by the secondary user through the eavesdropping chan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer secure wireless relay communication method based on a game theory. The physical layer secure wireless relay communication method comprises the steps of: step 1, defining a communication model; step 2, defining security capacity of a physical layer; step 3, defining a primary user revenue function Up; step 4, defining a secondary user revenue function Ur; step 5, and establishing a game model. The physical layer secure wireless relay communication method can increase the security capacity by selecting the optimal relay, can select the optimal power for information transmission through power control, thereby achieving the effect of improving energy efficiency of the system. The physical layer secure wireless relay communication method has the effects of reducing eavesdropping probability and improving the energy efficiency of the system, solves the anti-eavesdropping problem in the broadcast environment, and is very suitable for the application scene with energy-constrained and distributed features and the like.

Description

technical field [0001] The invention relates to the technical field of wireless relay communication, in particular to a physical layer security wireless relay communication method based on game theory. Background technique [0002] As a core issue of wireless communication, wireless network security has always been the focus of people's attention, and it is also a prerequisite for the large-scale popularization and application of wireless networks. In wireless networks, the purpose of secure communication mainly includes two aspects: 1) reliability, to ensure that the destination receiver can receive the original information of the source sender; 2) security, to ensure that the sent message will not be tampered with by any third party steal to. The traditional method to solve the wireless network security problem is to encrypt the transmission information, and use different strengths of encryption depending on the importance of the transmission information. Data security i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L12/24
CPCH04L41/145H04W12/02Y02D30/70
Inventor 许力方禾苏彬庭林晖周赵斌
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products