Robust security optimization design method of wireless energy-carrying security communication system

A technology of secure communication and wireless energy carrying, which is applied in the field of information technology security to achieve the effect of improving the security rate

Inactive Publication Date: 2020-06-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The safe rate maximization problem of multi-antenna legal users under the norm-bounded channel uncertainty model has not been studied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Robust security optimization design method of wireless energy-carrying security communication system
  • Robust security optimization design method of wireless energy-carrying security communication system
  • Robust security optimization design method of wireless energy-carrying security communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0024] The present invention is an improvement to the security optimization design scheme of the edge computing security communication system based on wireless energy carrying. Since the complex non-convex security optimization problem is difficult to solve, the physical layer security under the current norm-bounded channel uncertainty model The transmission method is relatively simple, and usually only artificial noise is used to assist the safety communication link for safety enhancement. The present invention utilizes the secondary user transceiver link to further enhance the security performance of the communication system, specifically:

[0025] Such as figure 1 As shown, a robust security optimization design method for a wireless ene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a robust security optimization design method for a wireless energy-carrying security communication system. The method comprises the steps that in a frequency division multiplexing system, edge computing equipment obtains channel estimation information through a rate-limited quantitative feedback link, and a channel quantization error of the edge computing equipment is usually in an ellipsoid model; under a norm bounded channel uncertainty model, edge-side main user equipment PT of an authorized frequency band is considered to transmit a secret signal to a main user receiving terminal PR, and illegal terminals respectively eavesdrop the secret signal; a secondary ST-SR link of an unlicensed frequency band shares the same frequency band with the edge-side main user equipment through spectrum adaptive sensing; and the ST-SR link realizes simultaneous transfer of energy and information through an energy-carrying communication mode. With the help of the ST-SR link, the security performance of the PT-PR link is improved. According to the invention, by optimizing the covariance matrix of the transmitted signal and the power division factor of the secondary user receiving terminal, the safety rate of the wireless energy-carrying edge computing communication system is improved.

Description

technical field [0001] The invention belongs to the field of information technology security, and in particular relates to a robust security optimization design method for a wireless portable energy security communication system. Background technique [0002] In the context of massive IoT devices, there are few new frequency resources available for emerging wireless services and products. There are many communication redundant and unused spectrum resources in the time domain, frequency domain and air domain of the current communication system. Spectrum sharing cognitive radio is considered as a promising communication technology. Different from the traditional communication system that only transmits information to the target users, as a new communication method that cross-integrates communication technology and power transmission technology, wireless energy-carrying communication transmits traditional information signals to target users, and provides energy-harvesting capa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W52/26H04W52/34H04W72/04H04W72/08H04W12/02H04B17/382H04L25/02H04B5/00H04W16/14
CPCH04W52/267H04W52/265H04W52/346H04W72/0473H04W72/0453H04W12/02H04B17/382H04L25/0224H04B5/0037H04W16/14H04W12/03H04W72/543H04W72/542
Inventor 宋欢欢文红张腾月
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products