Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes

A technology of physical layer security and interfering nodes, which is applied in the field of wireless cooperative physical layer security implementation based on the optimal layout of interfering nodes, can solve the problems of no key research, limited effect of cooperative physical layer security, and low security capacity.

Active Publication Date: 2021-05-18
XIDIAN UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method focuses on what kind of incentive strategies the cooperative jamming nodes adopt at different locations to maximize physical layer security. Although the method also considers the location of the cooperative jamming nodes, it does not focus on how to actively deploy cooperative jamming artificially. Nodes, optimally select the position of the cooperative interference node, resulting in low secrecy capacity that can be provided, and the effect on the realization of cooperative physical layer security is very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes
  • Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes
  • Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0060] refer to figure 1 , the present invention comprises the following steps:

[0061] Step 1) Build a collaborative physical layer security system:

[0062] Construct a transceiver node pair (s 1 , d 1 ),(s 2 , d 2 ),...,(s n , d n),...,(s N , d N ), M cooperative interference nodes j 1 , j 2 ,...,j m ,...,j M and the cooperative physical layer security system of the eavesdropping node E, where, s n Indicates the nth source node, d n Indicates the nth destination node, j m Indicates the mth cooperative interference node, N≥M≥1; at time t, the cooperative interference node j m The position is L m (t), to (s 1 , d 1 ),(s 2 , d 2 ),...,(s n , d n ),...,(s N , d N ) provides cooperative jamming service, let j m The sending and receiving nodes served at the current moment are expressed as p m (t) represent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a cooperative physical layer security implementation method based on the optimized layout of interference nodes, which is used for the technical problem that the received and received nodes have relatively small confidentiality capacity in the prior art, and the implementation steps are as follows: building a cooperative physical layer security system; Measure the channel gain between different nodes; calculate the channel capacity between nodes; calculate the sum of the secret capacity provided by the cooperative interference node; establish and solve the layout optimization model of the cooperative interference node based on the sum of the secret capacity; Solve the layout of the results and provide collaborative interference services to achieve collaborative physical layer security. The invention can be applied to different fields such as wireless communication security, cooperative interference and secret communication.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a method for implementing security of a cooperative physical layer, in particular to a method for implementing security of a wireless cooperative physical layer based on optimized layout of interference nodes, which can be applied to wireless communication security, cooperative interference, and confidential communication, etc. field. Background technique [0002] Due to the poor reliability of wireless communication links, the rapid growth of computing power of eavesdroppers, and the limited computing power of wireless terminals, key encryption security technology based on computational complexity can no longer guarantee the security of wireless communication networks. In order to make up for the shortcomings of key encryption security technology, physical layer security technology is proposed as an important means of wireless communication security. From the persp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W24/02H04W28/02
CPCH04W12/02H04W24/02H04W28/0226
Inventor 宗汝杨汉卿郭彦涛高兴波何立火路文陈垚
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products