Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Untrusted relay network secure transmission method based on opportunity type wireless energy collection

A secure transmission and relay network technology, applied in the field of secure transmission based on opportunistic wireless energy harvesting untrusted relay networks, can solve the problem of energy harvesting and secure communication of untrusted relay nodes with limited energy, It cannot describe the nonlinear characteristics of the energy harvesting circuit well, and limits the safe transmission performance of the system, etc.

Active Publication Date: 2019-09-06
HUAQIAO UNIVERSITY
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the traditional cooperative relay communication network, the interference of external eavesdropping nodes on the system is considered, while the untrusted devices inside the system are ignored, which greatly limits the secure transmission performance of the system
At the same time, in the existing literature, the cooperative communication network only studies the security of the physical layer, or the wireless energy harvesting of energy-limited nodes, and does not simultaneously study the energy harvesting and secure communication of energy-limited untrusted relay nodes.
In addition, in most communication networks, the receiving terminal generally only has a single destination node or randomly selects a user from a multi-user diversity network as a legal information receiving terminal, and does not use an opportunistic multi-user selection scheme to select the Nth th is the best destination node, so it cannot evaluate the security transmission performance of the system network very well
Moreover, the current wireless energy adopts the linear energy harvesting method in the network, and its energy harvesting efficiency is a fixed constant, which cannot well describe the nonlinear characteristics of the energy harvesting circuit in the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Untrusted relay network secure transmission method based on opportunity type wireless energy collection
  • Untrusted relay network secure transmission method based on opportunity type wireless energy collection
  • Untrusted relay network secure transmission method based on opportunity type wireless energy collection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] see figure 1 with figure 2 As shown, the present invention proposes an untrusted relay network secure transmission method based on opportunistic wireless energy harvesting, which is applied to an untrusted relay network secure transmission system. The system includes a source node S, an energy-limited Relay node R, a friendly interference node FJ, and K destination nodes D k , where k∈{1,...,K}; all nodes in the system are equipped with a single antenna, and work in half-duplex mode; the information transmission process from the source node to the destination node is completed within a time slot T .

[0068] Specifically, a secure transmission method based on opportunistic wireless energy harvesting in an untrusted relay network includes:

[0069] Step a, in the first time slot αT, the source uses power P S transmit information to the cooperative relay, while the friendly interfering node with power P J Sending artificial noise reduces the eavesdropping channel ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an untrusted relay network secure transmission method based on an opportunity type wireless energy collection. The method is applied to a secure transmission system of an untrusted relay network, and the system comprises an information source node S, an energy-limited relay node R, a friendly interference node FJ and K destination nodes Dk (k belongs to {1,and the like, K}), wherein all nodes in the system are configured with single antennas and work in a half-duplex mode. The information transmission process from the source node to the destination node is completed ina time slot T. According to the method, a TPSR protocol is adopted on the cooperative relay, so that the energy collection efficiency can be improved; besides, an external interference node is adoptedto send artificial noise for cooperative interference, and an OS (Opportunistic Scheduling) strategy is adopted to select an Nth optimal destination node from the multi-user diversity network as an information receiving node. And the security transmission performance of the system network can be well evaluated.

Description

technical field [0001] The invention relates to the field of wireless communication and physical layer security, in particular to a method for secure transmission of an untrusted relay network based on opportunistic wireless energy collection. Background technique [0002] In the traditional cooperative relay communication network, the interference of external eavesdropping nodes on the system is considered, while the untrusted devices inside the system are ignored, which greatly limits the secure transmission performance of the system. At the same time, in the existing literature, the cooperative communication network only studies the security of the physical layer, or the wireless energy harvesting of energy-limited nodes, and does not study the energy harvesting and secure communication of energy-limited untrusted relay nodes at the same time. In addition, in most communication networks, the receiving terminal generally only has a single destination node or randomly selec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W40/16H04L29/06
CPCH04W12/009H04W40/16H04L69/26Y02D30/70
Inventor 彭盛亮赵睿欧阳大亮李元健杨裕琳徐伟
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products