Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure transmission method based on relay strategy selection and resource allocation in relay OFDM (Orthogonal Frequency Division Multiplexing) network

A technology of resource allocation and relay strategy, applied in the direction of advanced technology, electrical components, climate sustainability, etc., can solve poor performance, unfavorable users to receive data correctly, relay OFDM network security throughput does not take multi-user into account Issues such as the fairness of scheduling can be achieved to reduce the probability of security interruption and ensure the security of information transmission

Inactive Publication Date: 2017-06-27
XI AN JIAOTONG UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Because of the advantages of relay technology in physical layer security technology, some scholars have studied the eavesdropping channel model under relay OFDM network, and the research shows that the relay OFDM network security throughput can be obtained through relay selection, resource allocation and other technologies However, there are two problems in this research. The first problem is that maximizing the security throughput of multi-user relay OFDM network does not take into account the fairness of multi-user scheduling, which may cause users with good channel status to occupy the spectrum all the time. Users with poor resources and poor channel conditions cannot access the network for a long time. The second problem is that most of the existing relay OFDM nodes only use AF or DF relay protocol, and the performance of DF relay protocol is poor under low signal-to-noise ratio. Although the forwarding method of the AF relay protocol is relatively simple, the relay node also amplifies the noise signal, which is not conducive to the correct reception of data by the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method based on relay strategy selection and resource allocation in relay OFDM (Orthogonal Frequency Division Multiplexing) network
  • Secure transmission method based on relay strategy selection and resource allocation in relay OFDM (Orthogonal Frequency Division Multiplexing) network
  • Secure transmission method based on relay strategy selection and resource allocation in relay OFDM (Orthogonal Frequency Division Multiplexing) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with the accompanying drawings.

[0041] The present invention considers an eavesdropping channel model of a multi-user relay OFDM network, the relay OFDM system has M mutually independent subcarriers, each subcarrier only bears the data of one authorized user, and the system can provide services for N users (N ≤M), assuming that there is an eavesdropper trying to eavesdrop on the information of N users in the system, assuming that the relay node adopts the hybrid relay protocol, when the relay node is relatively close to the source node, the node pair can choose the way of decoding and forwarding (Decode-and-Forward, DF); if the relay node is relatively close to the destination node, the node pair can choose the Amplify-and-Forward (AF) transmission mode.

[0042] All data transmission in the network is carried out in a time-slotted manner, and each time slot is divided into two sub-slots. The relay ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure transmission method based on relay strategy selection and resource allocation in a relay OFDM (Orthogonal Frequency Division Multiplexing) network. A communication system model employed by the method comprises a sending node S, N destination receiving nodes (D <1>...D <N >), an eavesdropping node Eve and K relay nodes. The method comprises the steps of for data transmission of each time, in a second time slot, after relay strategy selection and resource allocation, sending data to the relay nodes by the sending node S; and in a second time slot, selecting one of the K relay nodes as a forwarding node to forward the data received in the first time slot to the destination node D, and moreover, eavesdropping information sent to N users by the eavesdropping node Eve. Compared with traditional modes of merely employing AF (Amplify-and-Forward) or DF (Decode-and-Forward), the method has the advantages that a lower private interruption probability is obtained in a relay strategy selection mode, and the performance difference between the method and the two traditional modes is more remarkable under a high signal to noise ratio.

Description

Technical field: [0001] The invention belongs to the technical field of physical layer security in a relay OFDM network, and in particular relates to a secure transmission method based on relay strategy selection and resource allocation in a relay OFDM network. Background technique: [0002] At present, Orthogonal Frequency Division Multiplexing (OFDM) technology is widely used in various wireless communications due to its high spectrum utilization rate, strong anti-multipath fading ability, and ability to provide users with high-speed data services. system. In order to improve the security of the OFDM system, the traditional method is to use the key encryption mechanism to encrypt the information. However, with the improvement of terminal processing capabilities, the design, distribution and management of keys by traditional key encryption mechanisms have become more difficult, and the implementation has become increasingly difficult. Therefore, there have been many liter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/22H04W72/04H04K3/00
CPCH04K3/82H04W40/22H04W72/0453Y02D30/70
Inventor 任品毅周先文杜清河
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products