Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blocking attack prediction method and system for wireless energy transmission communication network

A technology of wireless energy transmission and communication network, which is applied in the field of jamming attack prediction of wireless energy transmission communication network, and can solve the problem that there is no method for accurately predicting the attacker's attack behavior

Active Publication Date: 2020-12-01
SHENZHEN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing research on wireless energy transfer communication networks, there is no method to accurately predict the attacker's attack behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blocking attack prediction method and system for wireless energy transmission communication network
  • Blocking attack prediction method and system for wireless energy transmission communication network
  • Blocking attack prediction method and system for wireless energy transmission communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0028] figure 1 is a schematic diagram showing a communication network model of a wireless energy transfer communication network involved in an example of the present disclosure. In some examples, such as figure 1 As shown, the base station can have one. Users can include at least one. The base station and each user are equipped with an antenna. In addition, the base station and all users work in the same frequency band. Attackers can include at least one.

[0029] In some examples, figure 1 In the signal model shown, a base station (su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This disclosure describes a method for predicting a jamming attack on a wireless energy transfer communication network, including the base station performing channel estimation, calculating the first credible throughput and assigning a transmission time period to each user. The assignment result is notified to the user through broadcasting, and the attacker listens As a result of the allocation, the user with the longest transmission time period is taken as the target user, and the preset interference power is set based on the transmission time period of the target user. When the first credible throughput reaches the first threshold, the base station transmits energy to the user, and the user receives energy And transmit a data signal to the base station, when the target user transmits the data signal, the attacker transmits an interference signal, the base station calculates the security outage probability, the second credible throughput and the cost-performance ratio based on the received data signal, and compares the second credible throughput of the target user Signal throughput and the second threshold required by the system, and compare the cost-performance ratio of the target user with the third threshold to predict the attack, and only decode the received signal if both thresholds are satisfied.

Description

technical field [0001] The present disclosure relates to the technical field of wireless communication, and in particular to a method and system for predicting a blocking attack in a wireless energy transmission communication network. Background technique [0002] A wireless powered communication network (WPCN) is a communication network that obtains energy by collecting signals in the environment, and uses the obtained energy as an energy supply for a user terminal. A wireless power transmission communication network (WPCN) includes a base station and a user (that is, a user end). Each time a data signal transmission is completed between the base station and the user, it mainly includes four stages, namely, channel estimation, time allocation, energy transmission and information transmission. [0003] When there is an attacker in a wireless power transmission communication network (WPCN), the attack method of the attacker affects the final performance of the WPCN. In parti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04L29/06H04W12/122
CPCH04L63/1416H04W12/00H04K3/45H04K3/43H04K3/224H04K3/94H04K3/222H04K2203/16
Inventor 谢宁胡吉
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products