A Security Access Strategy in Heterogeneous Networks with Maximum Security Capacity

A security capacity and heterogeneous network technology, applied in the field of physical layer security and security access strategy in heterogeneous networks, can solve problems such as small-scale fading and co-band interference without consideration, and achieve the effect of improving security performance

Active Publication Date: 2021-10-01
ARMY ENG UNIV OF PLA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Literature [7] comprehensively studied the maximum received power access and maximum security capacity access strategies, but also did not consider the small-scale fading and co-band interference issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Security Access Strategy in Heterogeneous Networks with Maximum Security Capacity
  • A Security Access Strategy in Heterogeneous Networks with Maximum Security Capacity
  • A Security Access Strategy in Heterogeneous Networks with Maximum Security Capacity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Embodiment 1 simulates the relationship between user connection probability and base station density, and compares the present invention with the maximum security capacity access strategy and the strategy in document [1].

[0060] pass figure 2 It can be found that the connection performance of the user brought by the access strategy proposed by the present invention can be well described by the theoretical formula in the present invention. The connection performance brought by the proposed strategy can approach the maximum security capacity access strategy, which is better than the strategy in literature [8]. At the same time, with the increase of base station density, the connection probability of users decreases, but the decreasing trend is slow.

Embodiment 2

[0061] The second embodiment simulates the relationship between the user's security probability and the base station density, and compares the present invention with the maximum security capacity access strategy and the strategy in document [8].

[0062] pass image 3 It can be found that the security performance of the user brought by the access strategy proposed in the present invention can be well described by the theoretical formula in the present invention. The security performance brought by the proposed strategy can approach the maximum security capacity access strategy, which is better than the strategy in literature [8]. At the same time, with the increase of base station density, the security probability of users is significantly improved.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security access strategy in a heterogeneous network with maximum security capacity, which belongs to the information security technology in the field of wireless communication, involves physical layer security technology, assuming that the base station can know the location information of potential eavesdroppers and users, The base station with the maximum security capacity can be used to obtain better security performance. Considering a large amount of co-band interference that may exist in a heterogeneous network, the present invention designs a simple and practical access strategy. The present invention performs base station access based on the maximum security capacity criterion to improve the security performance that users can obtain, so that The user's security performance approaches the user's security performance under the maximum security capacity criterion.

Description

technical field [0001] The invention belongs to information security technology in the field of wireless communication, relates to physical layer security technology, and is a security access strategy in a heterogeneous network with maximum security capacity. Background technique [0002] The rapid development of wireless communication technology has brought great convenience to people's life, but due to its inherent openness, wireless communication is vulnerable to outside eavesdropping, which poses a serious threat to communication security. How to prevent important information from illegal eavesdropping and ensure the security of communication is one of the hot issues in the field of communication research. [0003] There are two main types of current information security technology (document [1]): one is the traditional security strategy based on cryptography, and the other is the security strategy based on physical layer security technology. Traditional security strate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/20
CPCH04W48/20
Inventor 高媛媛王世界李亦高臧国珍沙楠郭明喜刘笑辰张广娜黄晟王小雨
Owner ARMY ENG UNIV OF PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products