Cognitive radio network physical layer secure transmission method based on matching theory

A technology of cognitive wireless network and physical layer security, which is applied in the field of physical layer security transmission of cognitive wireless network based on matching theory

Active Publication Date: 2020-11-13
SOUTHEAST UNIV +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these studies mostly focus on the auxiliary scenario under a single primary user, which results in the monopoly of the primary user's interests, because the secondary user will choose to accept the primary user's request to obtain spectrum resources as much as possible, and is in a disadvantaged position

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cognitive radio network physical layer secure transmission method based on matching theory
  • Cognitive radio network physical layer secure transmission method based on matching theory
  • Cognitive radio network physical layer secure transmission method based on matching theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0079] The present invention provides a method for secure physical layer transmission of cognitive wireless networks based on matching theory, which can use spectrum resources as incentives to pass multiple Sub-iterative matching enables multiple primary and secondary users to cooperate with each other. The secondary users obtain spectrum resources through the confidential transmission of the cooperative primary user. While improving the confidentiality rate of the primary user, the system throughput is effectively improved.

[0080] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cognitive radio network physical layer secure transmission method based on a matching theory. The method comprises the following steps that primary and secondary users are matched in a network according to a distributed matching method; the successfully paired primary user performs transmission in the (1-alpha) * T time slot time according to the secrecy rate obtained by matching under the assistance of the paired secondary user, and the successfully paired secondary user performs own transmission in the remaining alpha * T time slot time. If the direct transmission secrecy rate of the unmatched main user is higher than the minimum secrecy rate requirement, the unmatched main user transmits in T time slot time at the direct transmission secrecy rate. According to the method, the spectrum resources are utilized to excite the primary users and the secondary users to achieve the matching relation, the secondary users obtain the spectrum resources by cooperating with secret transmission of the primary users, and more transmission opportunities are created for the secondary users while the secret rate of the primary users is increased. All users participating incooperative security transmission can obtain more reasonable spectrum resources, and the enthusiasm of secondary users to participate in cooperation is fully aroused.

Description

technical field [0001] The invention belongs to the field of cognitive radio communication, and relates to a wireless network physical layer security transmission method, in particular to a cognitive wireless network physical layer security transmission method based on matching theory. Background technique [0002] With the rapid development of wireless communication technology, the shortage of spectrum resources has become increasingly prominent. Cognitive radio technology, as an effective method to alleviate the problem of spectrum resource shortage, has received more and more attention and research. Cognitive radio technology aims to enable unlicensed users to share the spectrum resources of licensed users on the basis of ensuring the quality of service of licensed users, thereby improving the efficiency of spectrum utilization. [0003] The promotion and use of cognitive radio technology can effectively improve the utilization rate of existing spectrum resources, but it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W72/04H04W72/08H04W12/12H04W12/02H04B17/382H04W16/14
CPCH04W72/0453H04W72/0446H04W12/02H04B17/382H04W16/14H04W72/543H04W72/541H04W72/542Y02D30/70
Inventor 潘志文周田刘楠尤肖虎
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products