Cooperative physical layer security implementation method based on interference node optimization layout

A technology of physical layer security and interfering nodes, which is applied in the field of wireless cooperative physical layer security implementation based on the optimal layout of interfering nodes, can solve the problems of no key research, low security capacity, and limited effect of cooperative physical layer security implementation.

Active Publication Date: 2019-12-13
XIDIAN UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method focuses on what kind of incentive strategies the cooperative jamming nodes adopt at different locations to maximize physical layer security. Although the method also considers the location of the cooperative jamming nodes, it does not focus on how to actively deploy cooperative jamming artificially. Nodes, optimally select the position of the cooperative interference node, resulting in low secrecy capacity that can be provided, and the effect on the realization of cooperative physical layer security is very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative physical layer security implementation method based on interference node optimization layout
  • Cooperative physical layer security implementation method based on interference node optimization layout
  • Cooperative physical layer security implementation method based on interference node optimization layout

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0060] refer to figure 1 , the present invention comprises the following steps:

[0061] Step 1) Build a collaborative physical layer security system:

[0062] Construct a transceiver node pair (s 1 , d 1 ),(s 2 , d 2 ),...,(s n , d n),...,(s N , d N ), M cooperative interference nodes j 1 ,j 2 ,...,j m ,...,j M and the cooperative physical layer security system of the eavesdropping node E, where, s n Indicates the nth source node, d n Indicates the nth destination node, j m Indicates the mth cooperative interference node, N≥M≥1; at time t, the cooperative interference node j m The position is L m (t), to (s 1 , d 1 ),(s 2 , d 2 ),...,(s n , d n ),...,(s N , d N ) provides cooperative jamming service, let j m The sending and receiving nodes served at the current moment are expressed as p m (t) represents...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cooperative physical layer security implementation method based on interference node optimization layout, which is used for solving the technical problem of small confidentialcapacity acquired by transceiving node pairs in the prior art, and comprises the following implementation steps of: constructing a cooperative physical layer security system; measuring the channel gain between different nodes; calculating the channel capacity between the nodes; calculating the sum of confidential capacities provided by the cooperative interference nodes; establishing a cooperative interference node layout optimization model based on the sum of confidential capacities, and solving the cooperative interference node layout optimization model; and arranging the cooperative interference nodes and providing cooperative interference service according to a solving result, so as to achieve cooperative physical layer security. The method can be applied to different fields of wireless communication security, cooperative interference, secret communication and the like.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a method for implementing security of a cooperative physical layer, in particular to a method for implementing security of a wireless cooperative physical layer based on optimized layout of interference nodes, which can be applied to wireless communication security, cooperative interference, and confidential communication, etc. field. Background technique [0002] Due to the poor reliability of wireless communication links, the rapid growth of computing power of eavesdroppers, and the limited computing power of wireless terminals, key encryption security technology based on computational complexity can no longer guarantee the security of wireless communication networks. In order to make up for the shortcomings of key encryption security technology, physical layer security technology is proposed as an important means of wireless communication security. From the persp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W24/02H04W28/02
CPCH04W12/02H04W24/02H04W28/0226
Inventor 宗汝杨汉卿郭彦涛高兴波何立火路文陈垚
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products