Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

D2D Heterogeneous Cellular Security Transmission Method Based on Statistical QoS Guarantee

A secure transmission and cellular technology, applied in security devices, machine-to-machine/machine-type communication services, network traffic/resource management, etc., can solve the problem of inaccurate response to delay-sensitive security requirements, legitimate users losing transmission opportunities, and Difficult to describe issues such as delay-sensitive security requirements

Active Publication Date: 2020-06-19
XI AN JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical wireless communication systems, for example, in 5G wireless communication networks, this metric cannot accurately reflect the delay-sensitive security requirements for the following reasons: First, a highly randomly changing wireless environment cannot always guarantee a positive Secrecy capacity, so that legitimate users will lose some transmission opportunities, resulting in a decrease in the transmission rate
Secondly, cellular users and D2D users may have different service requirements, or these users may have different service requirements at different times, which will result in different delay-sensitive security requirements
However, it is difficult to describe different delay-sensitive security requirements using only secrecy capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • D2D Heterogeneous Cellular Security Transmission Method Based on Statistical QoS Guarantee
  • D2D Heterogeneous Cellular Security Transmission Method Based on Statistical QoS Guarantee
  • D2D Heterogeneous Cellular Security Transmission Method Based on Statistical QoS Guarantee

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0018] In the present invention, we use statistical queue analysis theory to protect different statistical delay QoS and D2D delay-sensitive security guarantees for uplink spectrum resource communication protection of D2D multiplexing cellular network in 5G network. Specifically, based on the statistical queue analysis theory, the statistical delay QoS and delay-sensitive security requirements can be described by the queue length threshold violation probability. By using the theory of effective capacity and effective bandwidth, we can further transform the violation probability constraint of the transmission data queue length threshold of all users into an equivalent maximum reachable rate requirement, and transform the eavesdropping data queue length threshold violation probability constraint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a D2D heterogeneous cellular security transmission method based on statistical QoS guarantee, comprising the steps of: establishing a non-convex optimization problem, the optimization problem aims at maximizing the sum of the effective capacity of the cellular link and the D2D link and Subject to the following constraints: a), delay-sensitive security of D2D user transmitters; b) average and peak transmit power constraints of cellular user transmitters; c) average and peak transmit power constraints of D2D user transmitters; step 2 , Solving the non-convex optimization problem, looking for the transmit power P of the cellular user transmitter that maximizes the sum of the effective capacity of the cellular link and the D2D link c (h,θ) and the transmit power P of the D2D user transmitter d (h, θ); the transmit power P of the cellular user transmitter c (h,θ) and the transmit power P of the D2D user transmitter d (h,θ) is the optimal solution of a non-convex optimization problem as a power allocation scheme for D2D heterogeneous cellular networks. Compared with the fixed power scheme and the constant power transmission scheme of cellular users, the sum and effective capacity of the entire heterogeneous network applying this scheme is larger.

Description

technical field [0001] The invention belongs to the technical field of physical layer security transmission in 5G networks, and in particular relates to a D2D heterogeneous cellular security transmission method based on statistical QoS guarantee. Background technique [0002] In order to achieve very attractive system performance of the next generation wireless communication network (5G wireless communication network), the communication technology about 5G has received extensive attention from industry and academia in recent years. The evolution of key technologies of 5G is manifested by improving different system performance indicators, such as spectral efficiency, QoS (Quality of Service) and secure transmission of information, etc. Spectrum efficiency in 5G networks can be improved in frequency / time / space domains. Because D2D (Device-to-Device) communication reuses the spectrum resources of cellular users and allows two devices with close physical distances to communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/70H04W28/24H04W52/26H04W52/38H04W12/00H04W52/36
CPCH04W4/70H04W28/24H04W52/265H04W52/267H04W52/383H04W12/00H04W52/367
Inventor 王熠晨徐文文杨子欢王璐
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products