A Cognitive Security Transmission Method Based on Joint Transmission of Wireless Information and Power

A technology of secure transmission and joint transmission, which is applied in the field of cognitive security transmission based on joint transmission of wireless information and power, and can solve problems such as lack of spectrum resources for cognitive users

Active Publication Date: 2020-06-30
NORTHWESTERN POLYTECHNICAL UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In cognitive radio networks, authorized users face the security threat of eavesdropping, while cognitive users lack spectrum resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Cognitive Security Transmission Method Based on Joint Transmission of Wireless Information and Power
  • A Cognitive Security Transmission Method Based on Joint Transmission of Wireless Information and Power
  • A Cognitive Security Transmission Method Based on Joint Transmission of Wireless Information and Power

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention provides a cognitive security transmission method based on joint transmission of wireless information and power. Considering a five-node transmission network, the authorized user transmitting terminal PT wants to transmit information safely and reliably to the authorized user receiving terminal PT. Eve will Eavesdropping on PT's transmission data. A PT has M antennas. Cognitive user ST uses the decoding and forwarding mechanism to send authorized user private information, and cognitive user SJ uses energy harvesting mechanism to receive energy information, and then transmits cooperative interference information to protect the safe transmission of authorized user information. After the authorized user completes the transmission, the cognitive user ST uses the frequency spectrum to send cognitive user information. For this scheme, we analyze the transmission outage probability and security outage probability of the network, and optimally allocate ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cognitive security transmission method based on joint transmission of wireless information and power, which transmits private information and energy information in a time slot; a cognitive user ST adopts a decoding and forwarding relay protocol in a time slot to assist secure forwarding of authorized users Confidential information, at the same time, the cognitive user SJ uses energy harvesting technology to harvest the RF spectrum signal containing energy in step S1, and then uses the cooperative interference mechanism to assist the authorized user to transmit private information securely; the cognitive user ST uses the remaining time slot T‑t 1 Send the cognitive information to the cognitive receiver SR. Cognitive users can provide assistance for the secure transmission of authorized users' private information, and authorized users can increase part of the spectrum resources for cognitive transmission, so as to achieve a win-win situation for authorized users and cognitive users, thereby adapting to the development needs of the next generation of cognitive radio network security .

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a scheme design of secure transmission of a cognitive radio network, in particular to a cognitive security transmission method based on joint transmission of wireless information and power. Background technique [0002] The rapid development of wireless communication technology has brought about a large-scale improvement of wireless communication equipment and services, resulting in very crowded limited spectrum. However, the traditional fixed spectrum allocation strategy can not make full use of the licensed spectrum due to the dynamic use of spectrum by users in time and space. Cognitive radio technology allows cognitive users to dynamically access the network and effectively control the interference caused to the authorized user network, thereby improving the spectrum utilization of the network. [0003] Due to the broadcast characteristics of the wireless commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W16/14H04W72/04H04W12/03
CPCH04W16/14H04W72/0446H04W72/0473H04W12/03
Inventor 王大伟宋睿王佳欣李立欣耿杰
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products