A Secure Transmission Method Based on Symbol Separation and Beamforming in Untrusted Relay Networks

A relay network and secure transmission technology, applied in transmission systems, radio transmission systems, location diversity, etc., can solve problems such as cooperative interference and waste of transmission power

Active Publication Date: 2020-10-27
NORTHWESTERN POLYTECHNICAL UNIV +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the existing literature mainly studies cooperative interference at the source node or destination node to improve physical layer security (such as literature 5, 6), but part of the transmit power is wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Transmission Method Based on Symbol Separation and Beamforming in Untrusted Relay Networks
  • A Secure Transmission Method Based on Symbol Separation and Beamforming in Untrusted Relay Networks
  • A Secure Transmission Method Based on Symbol Separation and Beamforming in Untrusted Relay Networks

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0052] The specific embodiment of the present invention comprises the following steps:

[0053] first time slot

[0054] In the first time slot of information transmission, operations such as relay selection, precoding design, symbol separation and beamforming, and relay reception are completed respectively. The detailed process is described as follows:

[0055] Define channel matrix means from Channel vector (1≤i≤N) to the i-th relay.

[0056] (1) Relay selection. According to the channel vector Calculate channel gain (||·|| 2 represents the 2-norm of a vector). Select the two relays with the strongest channel gain, namely largest two trunks and Wherein, 1≤i, m, n≤N and m≠n.

[0057](2) Precoding vector and design. for design, it is necessary to send to Ensure that other relays cannot receive in order to guarantee Transmission Security. Similarly, for design, it is necessary to send to Ensure that other relays cannot receive in order ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe transmission method based on symbol division and beam forming for an untrusted relay network. The method is characterized in that two relays with the highest channel gains are selected to respectively send real parts and imaginary parts that are obtained through division of useful symbols; directional beam forming is then designed to ensure that the two selected relays can maximally receive the real parts and the imaginary parts of the useful signals, so that an untrusted relay node R cannot intercept useful information; and a target node D can obtain the useful information through decoding, so that the safe transmission performance of a network is improved. The method provided by the invention has the advantages that the decoding capability of the untrusted relay is minimized, and the network transmission reliability is improved, so that great significance in improving the safe transmission performance of a system is achieved.

Description

technical field [0001] The invention relates to a secure transmission method of an untrustworthy relay network. Background technique [0002] In recent years, due to the openness of wireless communication, wireless signals are easy to be eavesdropped, tampered with and interfered, which poses a great threat to users' secure communication, and the security of wireless networks has received more and more attention. Different from traditional encryption mechanisms, physical-layer security (Physical-Layer Security) has the advantages of low computational complexity and saving time and spectrum resources. As the problem of improving the security of wireless communication becomes more and more urgent, physical layer security has been widely paid attention in both theoretical research and practical application. [0003] With the shortage of communication resources and the development of relay selection technology, the introduction of relay selection technology into the physical la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/0456H04B7/06H04B7/08H04B7/026
CPCH04B7/026H04B7/0456H04B7/0617H04B7/086
Inventor 姚如贵蒋朋飞陆亚南左晓亚徐娟马科维
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products