Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

D2D heterogeneous cellular secure transmission method based on QoS guarantee counting

A secure transmission and cellular technology, applied in security devices, machine-to-machine/machine-type communication services, network traffic/resource management, etc., can solve difficult to describe delay-sensitive security requirements, transmission rate reduction, legitimate users Issues such as lost launch opportunities

Active Publication Date: 2018-08-03
XI AN JIAOTONG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical wireless communication systems, for example, in 5G wireless communication networks, this metric cannot accurately reflect the delay-sensitive security requirements for the following reasons: First, a highly randomly changing wireless environment cannot always guarantee a positive Secrecy capacity, so that legitimate users will lose some transmission opportunities, resulting in a decrease in the transmission rate
Secondly, cellular users and D2D users may have different service requirements, or these users may have different service requirements at different times, which will result in different delay-sensitive security requirements
However, it is difficult to describe different delay-sensitive security requirements using only secrecy capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • D2D heterogeneous cellular secure transmission method based on QoS guarantee counting
  • D2D heterogeneous cellular secure transmission method based on QoS guarantee counting
  • D2D heterogeneous cellular secure transmission method based on QoS guarantee counting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0018] In the present invention, we use statistical queue analysis theory to protect different statistical delay QoS and D2D delay-sensitive security guarantees for uplink spectrum resource communication protection of D2D multiplexing cellular network in 5G network. Specifically, based on the statistical queue analysis theory, the statistical delay QoS and delay-sensitive security requirements can be described by the queue length threshold violation probability. By using the theory of effective capacity and effective bandwidth, we can further transform the violation probability constraint of the transmission data queue length threshold of all users into an equivalent maximum reachable rate requirement, and transform the eavesdropping data queue length threshold violation probability constraint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a D2D heterogeneous cellular secure transmission method based on QoS guarantee counting. The method comprises the steps that 1, a non-convex optimization problem is set up, wherein the optimization problem aims at maximizing the sum of the effective capacity of a cellular link and the effective capacity of a D2D link and is limited by the following constraint conditions ofthe delay-sensitive security of D2D user transmitters, the average sum peak transmitting power limitation of cellular user transmitters and the average sum peak transmitting power limitation of the D2D user transmitters; and 2, the non-convex optimization problem is solved to find the cellular user transmitter transmitting power Pc (h, theta) and the D2D user transmitter transmitting power Pd (h,theta) which can enable the sum of the effective capacity of the cellular link and the effective capacity of the D2D link to be maximum, wherein the cellular user transmitter transmitting power Pc (h,theta) and the D2D user transmitter transmitting power Pd (h, theta) are the optimal solution of the non-convex optimization problem and serve as the power distribution scheme of a D2D heterogeneouscellular network. Compared with a fixed power scheme and a cellular user constant transmitting scheme, the effective capacity sum of the overall heterogeneous network applying the scheme is greater.

Description

technical field [0001] The invention belongs to the technical field of physical layer security transmission in 5G networks, and in particular relates to a D2D heterogeneous cellular security transmission method based on statistical QoS guarantee. Background technique [0002] In order to achieve very attractive system performance of the next generation wireless communication network (5G wireless communication network), the communication technology about 5G has received extensive attention from industry and academia in recent years. The evolution of key technologies of 5G is manifested by improving different system performance indicators, such as spectral efficiency, QoS (Quality of Service) and secure transmission of information, etc. Spectrum efficiency in 5G networks can be improved in frequency / time / space domains. Because D2D (Device-to-Device) communication reuses the spectrum resources of cellular users and allows two devices with close physical distances to communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/70H04W28/24H04W52/26H04W52/38H04W12/00H04W52/36
CPCH04W4/70H04W28/24H04W52/265H04W52/267H04W52/383H04W12/00H04W52/367
Inventor 王熠晨徐文文杨子欢王璐
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products