CN106211143A - A kind of safe transmission discrete power control method based on fountain codes - Google Patents

A kind of safe transmission discrete power control method based on fountain codes Download PDF

Info

Publication number
CN106211143A
CN106211143A CN201610552068.XA CN201610552068A CN106211143A CN 106211143 A CN106211143 A CN 106211143A CN 201610552068 A CN201610552068 A CN 201610552068A CN 106211143 A CN106211143 A CN 106211143A
Authority
CN
China
Prior art keywords
fountain
gamma
power
fountain codes
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610552068.XA
Other languages
Chinese (zh)
Other versions
CN106211143B (en
Inventor
杜清河
熊新雷
孙黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201610552068.XA priority Critical patent/CN106211143B/en
Publication of CN106211143A publication Critical patent/CN106211143A/en
Application granted granted Critical
Publication of CN106211143B publication Critical patent/CN106211143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/241TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account channel quality metrics, e.g. SIR, SNR, CIR, Eb/lo
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/26TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service]
    • H04W52/267TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service] taking into account the information rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of safe transmission discrete power control method based on fountain codes, comprising the following steps: 1) each time slot transmitting terminal uses fountain codes to encode, and speed R (μ | γ) of maximum when obtaining transmit powers μ different under instantaneous signal-to-noise ratio γ according to the long L of bag of fountain codes;2) optimal varied rate λ of the speed that unit power is increased in each time slot under transmitting terminal calculates at power-limited condition according to the maximum rate R (μ | γ) when different signal to noise ratios*With transmission number ω maximum in each time slot;3) system is according to the instantaneous signal-to-noise ratio γ of user feedback, determines to send number i of fountain codes packet, and distributes corresponding power μ.The inventive method takes full advantage of in fountain coding transmitting procedure without the transmitting feature retransmitted, it is designed with the power control scheme of beneficially lifting legitimate receipt end speed by receiving the instantaneous signal-to-noise ratio of validated user feedback at transmitting terminal, thus makes receiving terminal have the speed of maximum under the premise that security is guaranteed.

Description

A kind of safe transmission discrete power control method based on fountain codes
Technical field:
The invention belongs to wireless communication technology field, be specifically related to a kind of safe transmission discrete power control based on fountain codes Method processed, this control method utilizes fountain codes technology to reduce in wireless data transmission and eavesdrops the intercept probability of user and carry The efficiency of transmission of high transmitting terminal.
Background technology:
Compared with cable communication system, the opening of cordless communication network makes its safe transmission problem more thorny, this It is because listener-in and is prone to intercept the confidential data of wireless device end.The potential safety existed for listener-in in wireless network Risk, existing upper layer network protocol layer uses encryption technology to guarantee that data are not ravesdropping, but the realization of encryption technology is Based on listener-in's computing capability limited it is assumed that and when eavesdropping user side computing capability unrestricted, then safety cannot ensure. Additionally, key management mechanism is also difficult to realization for dynamic wireless network.
Meanwhile, fountain codes is as a kind of emerging transmitting technology received much concern, and it uses the side of random coded Formula, produces new fountain codes symbol continually, and each new fountain codes symbol carries certain useful information for receiving terminal, After user receives the most just acknowledgement decoding of enough fountain codes symbols, transmitting terminal just stops coding, then front relative to coding with regard to really For the forward error correction of constant bit rate, the code check of fountain codes is unfixed, and fountain codes is also known as no-rate codes.Therefore in wireless biography After defeated transmitting terminal introduces fountain codes, by utilizing two controllable parameters (degree and the selected information bag in fountain codes cataloged procedure Sequence number), be designed with beneficially promote validated user decoding rate verification packet encoder scheme, thus ensure validated user end prior to Eavesdropping end successfully decoded.Traditional fountain codes delivery plan, the state difference of validated user ratio eavesdropping when, have employed phase The power control scheme closed, it is ensured that the safety of data transmission;But validated user is better than eavesdropping User Status when, Do not take any measures to improve transmitting terminal transfer rate.
Summary of the invention:
It is an object of the invention to the shortcoming overcoming above-mentioned prior art, it is provided that a kind of safe transmission based on fountain codes Discrete power control method, the method can be effectively reduced the intercept probability of eavesdropping user and improve the transmission effect of transmitting terminal Rate.
For reaching above-mentioned purpose, the present invention adopts the following technical scheme that and realizes:
A kind of safe transmission discrete power control method based on fountain codes, carries out wireless data transmission using fountain codes Before, transmitting terminal first has to secret file to be passed is divided into k the fountain codes packet s being associated1,s2,...,sk, and The a length of L of bag of each fountain codes, the method comprises the following steps:
1) each time slot transmitting terminal uses fountain codes coded method to complete the cataloged procedure of a fountain bag, and according to instantaneous Signal to noise ratio γ obtains maximum speed R under different transmit powers μ (μ | γ);
2) when transmitting terminal calculates power limited according to the maximum rate R (μ | γ) under different signal to noise ratios in each time slot Speed optimal varied rate λ when unit power increases*And transmission number ω that in each time slot, fountain codes is maximum;
3) system is according to the instantaneous signal-to-noise ratio γ of user feedback, calculates and sends different number when current instantaneous signal-to-noise ratio γ The subgradient of power corresponding to mesh fountain codes packet is interval, and judges iptimum speed rate of change λ*Which it is belonging to send number The subgradient of mesh fountain codes power is interval, and transmitting terminal is according to λ*Affiliated interval judgement sends number i of fountain codes packet, meter Calculate and send the power μ that i fountain bag needs to distribute(i)
The present invention is further improved by, step 1) in obtain the tool of maximum rate R under different transmit power μ (μ | γ) Body step is as follows:
Bandwidth B that 1-1) first transmitting terminal is allocated according to user and the long L of bag of fountain codes, obtain specifying instantaneous noise The power needed than transmitting terminal when sending different number of fountain codes j under γ:
μ ( j ) = 1 γ ( 2 j L B T - 1 )
What now j represented is the number of the fountain codes packet sent, and the span of j is whole natural number;
1-2) under specifying instantaneous signal-to-noise ratio γ, the speed obtained of different transmit powersIt is (iL, μ(j)) convex Combination, in order to maximize transmit power, is taken at speed R maximum in the case of identical transmit power (μ | γ), obtains:
R ( &mu; | &gamma; ) = L &gamma; 2 j L B T ( 2 L B T - 1 ) &mu; , &mu; ( j ) &le; &mu; < &mu; ( j + 1 )
The maximum number sending fountain bag in the most each time slot is not have conditional, and scope is whole natural number.
The present invention is further improved by, step 2) in iptimum speed rate of change λ*With the maximum sent in each time slot What fountain codes number ω determined specifically comprises the following steps that
2-1) the Lagrangian formula of foundation maximization user's average speed:
L ( &mu; , &lambda; ) = &Integral; - &infin; + &infin; R ( &mu; | &gamma; ) p ( &gamma; ) d &gamma; - &lambda; &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma;
Maximize transfer rate and set up Lagrangian optimize formula time, power meets restrictive condition:
E &lsqb; &mu; &rsqb; = &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma; &le; 1
The most normalized power is less than equal to mean power;
2-2) carry out numerical computations according to Lagrangian to solve and obtain, when increasing unit power, optimal speed change Rate λ*
2-3) according to maximum rate rate of change λ*, obtain transmitting terminal transmission fountain codes packet and reach maximum channel capacity Time, transmission number ω that in each time slot, fountain codes is maximum.
The present invention is further improved by, step 3) determine that transmitting terminal sends the concrete of fountain codes packet number operation Step is as follows:
3-1) obtain the subgradient when different power μ according to rate equation R (μ) interval:
&part; R ( &mu; ) = { L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; } &mu; ( j ) < &mu; < &mu; ( j + 1 ) &lsqb; L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( j ) , j = 1 , 2 , ... &omega; - 1 ( - &infin; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( &omega; ) &lsqb; L &gamma; 2 L B T - 1 - &lambda; , + &infin; ) &mu; = &mu; ( 0 )
Wherein, j represent under not carrying out signal to noise ratio γ specified before power control the fountain bag that may send Number, the bag of what L represented is fountain bag is long, bandwidth that user is allocated that what B represented is, T is the slot length of flat fading channel, ω represents that maximum sends the minima of fountain bag number when reaching maximum channel capacity when specifying and wrapping long L, and transmitting terminal is sending The when of the number of different fountain bags, transmitting terminal can distribute corresponding power μ, and under different power, speed R (μ) has phase The subgradient answered is interval
3-2) judge λ*Belong in the number j subgradient interval of the fountain codes sending how many numbers, according to λ*Affiliated time ladder Degree interval, transmitting terminal determines to send number i of fountain codes packet, and what wherein i represented is transmitting terminal after overpower control Determine the number of the fountain bag sent, simultaneously to the transmitting terminal corresponding power of distribution:
&mu; ( i ) = 1 &gamma; ( 2 i L B T - 1 )
If 3-3) transmitting terminal receives Bob data and decoded feedback, then return to step 1);Otherwise file not by Bob has decoded, and returns to 3-2).
Compared with traditional scheme, the present invention, validated user is better than eavesdropping User Status when, uses power to control Method, is different from traditional scheme and only sends a fountain bag.When the status information of validated user is good time, calculate legal use The noise γ gradient next time interval that family is currentThen optimal transmission rate λ is judged*Fall interval in which subgradient, with This number i determining to send fountain bag, transmitting terminal calculates, according to number i of fountain bag, the power μ that transmitting terminal is allocated simultaneously(i)。 The number of the fountain bag sent in each time slot of the present invention is greater than equal to 1, and therefore the speed of traditional scheme is this The minimum-rate of the lower limit of bright speed, the i.e. present invention is exactly the speed of traditional scheme.When validated user and eavesdropping user can connect Receive a fountain bag, but the status information of validated user may insure that the when that validated user receiving at least 2 fountain bags, In traditional scheme, transmitting terminal only sends 1 fountain bag, validated user and eavesdropping user and all receives this fountain bag.And in the present invention, Validated user can receive 2 fountain bags, and eavesdropping user can only receive 1 fountain bag, and validated user was received before eavesdropping user To the number of the fountain bag that decoding needs, validated user can receive safely file.The present invention makes full use of the shape of validated user State information determines the number of the fountain codes that transmitting terminal is to be sent.Further increase in the case of the speed improving transmitting terminal The safety of system.Currently available technology is not involved with the technology of this respect.
Accompanying drawing illustrates:
Fig. 1 is the system model figure of the present invention;
Fig. 2 is the realization mechanism figure (operational flowchart) of the present invention;
Fig. 3 is that under the inventive method difference bag length, single time-slot throughput changes schematic diagram in K value;
Fig. 4 is single time-slot throughput comparison diagram under the long L of difference bag of the present invention;
Fig. 5 is that the inventive method L is not both intercept probability comparison diagram;
Fig. 6 is the intercept probability comparison diagram of the fountain bag number that the inventive method file is divided into;
Intercept probability comparison diagram when Fig. 7 is the inventive method Eve position difference.
Detailed description of the invention:
The present invention is described in further detail with being embodied as example below in conjunction with the accompanying drawings.
Fountain codes uses a kind of linear coding and decoding mode, and transmitting terminal can be allowed to produce coded identification continually, directly Just stop coding sending to receiving the feedback that user is properly received, be a kind of chnnel coding increasing transmission reliability.When wireless Transmission transmitting terminal use fountain codes coding after, transmitting terminal receive validated user be properly received file feedback just stop transmission Fountain codes packet.
The core concept of the present invention is that transmitting terminal uses fountain codes coded method to k letter in wireless data transmission Breath bag encodes, and is designed with beneficially lifting using the instantaneous signal-to-noise ratio of legitimate receipt end feedback as the foundation that power controls The scheme of transmission rate, thus ensure that validated user end is prior to eavesdropping end successfully decoded.Compared with the coded system of tradition fountain codes, The present invention program can be according to legal instantaneous signal-to-noise ratio, and the number that transmitting terminal sends in single time slot fountain codes is done in real time Ground adjusts, and can significantly improve the speed that in wireless data transmission, receiving terminal receives, meanwhile reduce eavesdropping user Intercept probability.
With reference to Fig. 1, the system model figure of the present invention is described in detail below:
Consider a wireless transmitting system comprising three nodes, one of them source node Alice, a destination node Bob and listener-in Eve.Private data file is issued Bob by Alice attempt, and meanwhile Eve can eavesdrop sent literary composition Part information.Before wireless data transmission, first secret file to be sent is divided into and is associated with each other the k wrapping a length of L by Alice Individual packet, then Alice uses fountain codes coded method to encode k information bag.Bob and Eve attempts to obtain foot Enough purpose fountain codes packets are to recover original secret data file.K information is completed when Bob end receives enough fountain bags The decoding of bag, then need to send feedback information to Alice end and inform that it terminates coding and sends.Like this, stop sending out when Alice end When sending fountain bag, if Eve end is not fully complete the decoding of k information bag, then the transmission of this private data file security is ensured.
In Fig. 1, Alice → Bob link is legitimate channel and Alice → Eve link is tapping channel, these two wireless communication Road is all modeled as block flat Rayleigh fading channel, and in the sending time slots of the most each bag, channel coefficients keeps constant, different time-gap Between independent change.Channel coefficients h between node i and node jijIt is that a zero-mean, variance areCirculation Symmetric complex stochastic variable, wherein dijRepresenting the distance between node i and node j, α is path loss coefficient.The additivity of receiving terminal The variance of white Gaussian noise n is N0.If the power that Alice end sends verification bag isThen the reception SNR of receiving terminal j can be with table It is shown as γAj=ρ | hAj|2, andExpression system SNR.
With reference to Fig. 2, the realization mechanism figure (operational flowchart) of the present invention specifically comprises the following steps that
It should be understood that before wireless data transmission, first secret file to be sent is divided into each other by transmitting terminal K the information bag (s being associated1,s2,...,sk), and a length of L of bag of each fountain codes, the transmission of following each time slot comprises Following steps:
1) each time slot transmitting terminal uses novel fountain code encoding method to complete the cataloged procedure of a fountain bag, and according to Maximum speed R that instantaneous signal-to-noise ratio γ obtains obtaining under different transmit powers μ (μ | γ);
2) transmitting terminal calculates under power-limited condition each according to the maximum rate R (μ | γ) under different signal to noise ratios Transmission number ω maximum in the optimal varied rate λ * of speed and each time slot when unit power increases in time slot;
3) system is according to the instantaneous signal-to-noise ratio γ of user feedback, calculates and sends different number when current instantaneous signal-to-noise ratio γ During mesh fountain codes packet, the subgradient of correspondence power is interval, and judges iptimum speed rate of change λ * is belonging to send which number The subgradient of mesh fountain codes power is interval, and transmitting terminal sends the number of fountain codes packet according to the interval judgement belonging to λ *, with And distribute corresponding power.
Step 1) in obtain specifically comprising the following steps that of maximum rate under different transmit power
Bandwidth B that 1-1) first transmitting terminal is allocated according to user and the long L of bag of fountain codes, specifying instantaneous signal-to-noise ratio γ Under transmitting terminal needs when obtaining sending different number of fountain codes j power:
&mu; ( j ) = 1 &gamma; ( 2 j L B T - 1 ) , j = 0 , 1 , 2 , ...
What now j represented is the number of the fountain codes packet sent, and the span of j is whole natural number.
1-2) under specifying instantaneous signal-to-noise ratio γ, the speed obtained of different transmit powersIt is (iL, μ(j)) Convex combination.In order to maximize transmit power, it is taken at speed R maximum in the case of identical transmit power (μ | γ), obtains:
R ( &mu; | &gamma; ) = L &gamma; 2 j L B T ( 2 L B T - 1 ) &mu; , &mu; ( j ) &le; &mu; < &mu; ( j + 1 ) , j = 0 , 1 , 2 , ...
In the most each time slot send fountain bag maximum number be do not have conditional.
Step 2) in iptimum speed rate of change λ*The concrete step determined with maximum fountain codes number i sent in each time slot Rapid as follows:
2-1) the Lagrangian formula of foundation maximization user's average speed:
L ( &mu; , &lambda; ) = &Integral; - &infin; + &infin; R ( &mu; | &gamma; ) p ( &gamma; ) d &gamma; - &lambda; &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma;
Maximizing transfer rate and when setting up, power needs to meet restrictive condition:
E &lsqb; &mu; &rsqb; = &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma; &le; 1
The most normalized power is less than equal to mean power.
2-2) carry out numerical computations according to Lagrangian to solve and obtain, when increasing unit power, optimal speed change Rate λ*
2-3) according to maximum rate rate of change λ*, when transmitting terminal transmission fountain codes packet reaches maximum channel capacity, often Minima ω of the number of the maximum fountain code data bag sent in individual time slot.
Step 2) in the core of fountain codes coded method be: the bandwidth B being allocated according to user and the long L of fountain bag bag Obtain rate gain λ optimal under unit power*With upper limit ω that fountain codes packet in each time slot sends number.
Step 3) determine that transmitting terminal sends specifically comprising the following steps that of fountain codes packet number operation
3-1) obtain the subgradient when different power according to rate equation interval:
&part; R ( &mu; ) = { L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; } &mu; ( j ) < &mu; < &mu; ( j + 1 ) &lsqb; L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( j ) , j = 1 , 2 , ... &omega; - 1 ( - &infin; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( &omega; ) &lsqb; L &gamma; 2 L B T - 1 - &lambda; , + &infin; ) &mu; = &mu; ( 0 )
Here the fountain bag that may send under not carrying out signal to noise ratio γ specified before power control that j represents Number, the bag of what L represented is fountain bag is long, and bandwidth that user is allocated that what B represented is, T is that the time slot of flat fading channel is long Degree, ω represents that maximum sends the minima of fountain bag number when reaching maximum channel capacity when specifying and wrapping long L, and transmitting terminal is being sent out The when of sending the number of different fountain bags, transmitting terminal can distribute corresponding power μ, and under different power, speed R (μ) has Corresponding subgradient is interval
3-2) judge λ*Belong in the number j differential interval of the fountain codes sending how many numbers.According to affiliated subgradient Interval, transmitting terminal determines to send number i of fountain codes packet, simultaneously to the transmitting terminal corresponding power of distribution:
&mu; ( i ) = 1 &gamma; ( 2 i L B T - 1 )
If 3-3) transmitting terminal receives Bob data and decoded feedback, then return to step 1;Otherwise file not by Bob has decoded, and returns to 3-2).
Step 3) in different signal to noise ratios under send fountain codes counting method core be: according to the instantaneous noise of user Determine that transmitting terminal sends number i of fountain codes in current time slots and distributes corresponding power μ than γ(i), at validated user Bob ratio is under listener-in's Eve channel condition, and transmitting terminal uses Poewr control method of the present invention, as long as appointing in sending the period of file The number of the fountain bag that the middle Bob that anticipates receives is more than Eve, then just than Eve first by file decoding more out, Eve end is or not Bob By secret file decoding out can so make to have fully ensured that the safety of file while maximizing speed.
In sum, the main realization mechanism of the present invention is that Alice uses fountain codes to compile in wireless data transmission Code method k information bag is encoded, and using Bob feedback the bag sequence number set of decoded information as encode power, if In respect of being beneficial to promote the verification packet encoder scheme of Bob end decoding rate, thus ensure that Bob end is prior to Eve end successfully decoded.This volume The core of code scheme is will to decode in set D all elements and do not decode some element in set and carry out XOR, according to stealing As long as the fading characteristic Eve end listening channel has a unsuccessful decoding of element in D, then Eve must solve remaining information bag, The most now Eve end is eavesdropped unsuccessfully.
In Fig. 3 emulation, along with K value constantly increases, the data volume that validated user receives in time slot T the most constantly increases Greatly.Meanwhile, the data volume of the reception of Bob end does not ad infinitum increase along with the increase of K, but levels off to one surely Definite value.In simulations, under the long L of each bag, there is minima ω of a K reaching maximum rate, the most each time slot sends spray The maximum of spring code packet there is no need to exceed this value, exceedes this value to speed when Bob time slot maximum sends number Improve and there is no effect.And can be definite value Γ at the product of the long L of ω value and bag, the value of ω is greater than product divided by bag The smallest positive integral of long L.
In the emulation of Fig. 4, Alice uses the different long L of bag to send fountain codes packet, and along with the increase of L, Bob is at list The data volume received in digit time slot reduces constantly.When the value wrapping long L is more than Γ, the value of K is 1 the most always, now single The data volume that in individual time slot, Bob can receive is declining, because could send data when Bob instantaneous channel capacity is greater than L Bag, this causes the outage probability that Bob is the biggest.
In emulation in Fig. 5, the intercept probability of Eve when Alice uses difference bag length to be transmitted.In emulation, file quilt The fountain codes packet being divided into k is to wrap long L the longest, and intercept probability is the lowest.Simultaneously in the long L of identical bag, a file is divided into The number of fountain codes packet the most, intercept probability is the least.
Being divided into the increase of fountain bag number along with a file in Fig. 6, scheme proposed by the invention is cut listener-in Obtain probability aspect and be much better than traditional benchmark scheme;Intercept probability reduces with the increase of fountain bag number.
In Fig. 7, along with the increase of Eve end position, the intercept probability of power control scheme of the present invention is significantly lower than tradition side The intercept probability of case.When the position of Eve is to during close to 1.7, and the scheme that power of the present invention controls makes the intercept probability of Eve end connect It is bordering on 0;When the when of being closely located to 1.0 of Eve end, the solution of the present invention is much better than traditional scheme, can keep good safety Property.
In sum, the inventive method is decoded into power, Alice end efficiency of transmission three at listener-in's intercept probability, Eve end Individual aspect is superior to traditional benchmark scheme.

Claims (4)

1. a safe transmission discrete power control method based on fountain codes, it is characterised in that carry out nothing using fountain codes Before the transmission of line data, transmitting terminal first has to secret file to be passed is divided into k the fountain codes packet s being associated1, s2,...,sk, and a length of L of bag of each fountain codes, the method comprises the following steps:
1) each time slot transmitting terminal uses fountain codes coded method to complete the cataloged procedure of a fountain bag, and according to instantaneous noise Maximum speed R under different transmit powers μ (μ | γ) is obtained than γ;
2) unit in each time slot when transmitting terminal calculates power limited according to the maximum rate R (μ | γ) under different signal to noise ratios Speed optimal varied rate λ when power increases*And transmission number ω that in each time slot, fountain codes is maximum;
3) system is according to the instantaneous signal-to-noise ratio γ of user feedback, calculates and sends different number spray when current instantaneous signal-to-noise ratio γ The subgradient of power corresponding to spring code packet is interval, and judges iptimum speed rate of change λ*Which it is belonging to send number spray The subgradient of spring code power is interval, and transmitting terminal is according to λ*Affiliated interval judgement sends number i of fountain codes packet, calculates and sends out I fountain bag is sent to need the power μ of distribution(i)
Safe transmission discrete power control method based on fountain codes the most according to claim 1, it is characterised in that step 1) specifically comprising the following steps that of maximum rate R under different transmit power μ (μ | γ) is obtained in
Bandwidth B that 1-1) first transmitting terminal is allocated according to user and the long L of bag of fountain codes, obtain specifying instantaneous signal-to-noise ratio γ The power that during lower transmission different number of fountain codes j, transmitting terminal needs:
&mu; ( j ) = 1 &gamma; ( 2 j L B T - 1 )
What now j represented is the number of the fountain codes packet sent, and the span of j is whole natural number;
1-2) under specifying instantaneous signal-to-noise ratio γ, the speed obtained of different transmit powersIt is (iL, μ(j)) convex group Close, in order to maximize transmit power, be taken at speed R maximum in the case of identical transmit power (μ | γ), obtain:
R ( &mu; | &gamma; ) = L &gamma; 2 j L B T ( 2 L B T - 1 ) &mu; , &mu; ( j ) &le; &mu; < &mu; ( j + 1 )
The maximum number sending fountain bag in the most each time slot is not have conditional, and scope is whole natural number.
Safe transmission discrete power control method based on fountain codes the most according to claim 1, it is characterised in that step 2) iptimum speed rate of change λ in*With specifically comprising the following steps that maximum fountain codes number ω sent in each time slot determines
2-1) the Lagrangian formula of foundation maximization user's average speed:
L ( &mu; , &lambda; ) = &Integral; - &infin; + &infin; R ( &mu; | &gamma; ) p ( &gamma; ) d &gamma; - &lambda; &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma;
Maximize transfer rate and set up Lagrangian optimize formula time, power meets restrictive condition:
E &lsqb; &mu; &rsqb; = &Integral; - &infin; + &infin; &mu; ( &gamma; ) p ( &gamma; ) d &gamma; &le; 1
The most normalized power is less than equal to mean power;
2-2) carry out numerical computations according to Lagrangian to solve and obtain, when increasing unit power, optimal speed rate of change λ*
2-3) according to maximum rate rate of change λ*, obtain transmitting terminal and send fountain codes packet when reaching maximum channel capacity, each Transmission number ω that in time slot, fountain codes is maximum.
Safe transmission discrete power control method based on fountain codes the most according to claim 1, it is characterised in that step 3) determine that transmitting terminal sends specifically comprising the following steps that of fountain codes packet number operation
3-1) obtain the subgradient when different power μ according to rate equation R (μ) interval:
&part; R ( &mu; ) = { L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; } &mu; ( j ) < &mu; < &mu; ( j + 1 ) &lsqb; L &gamma; 2 j L B T ( 2 L B T - 1 ) - &lambda; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( j ) , j = 1 , 2 , ... &omega; - 1 ( - &infin; , L &gamma; 2 ( j - 1 ) L B T ( 2 L B T - 1 ) - &lambda; &rsqb; &mu; = &mu; ( &omega; ) &lsqb; L &gamma; 2 L B T - 1 - &lambda; , + &infin; ) &mu; = &mu; ( 0 )
Wherein, j represents the number of the fountain bag that may send under not carrying out signal to noise ratio γ specified before power control, L Represent is that the bag of fountain bag is long, and bandwidth that user is allocated that what B represented is, T is the slot length of flat fading channel, ω table Showing that when reaching maximum channel capacity when specifying and wrapping long L, maximum sends the minima of fountain bag number, transmitting terminal is sending difference The number of fountain bag when transmitting terminal can distribute corresponding power μ, under different power, speed R (μ) has accordingly Subgradient is interval
3-2) judge λ*Belong in the number j subgradient interval of the fountain codes sending how many numbers, according to λ*Affiliated subgradient district Between, transmitting terminal determines to send number i of fountain codes packet, and what wherein i represented is that transmitting terminal determines after overpower control The number of the fountain bag sent, simultaneously to the transmitting terminal corresponding power of distribution:
&mu; ( i ) = 1 &gamma; ( 2 i L B T - 1 )
If 3-3) transmitting terminal receives Bob data and decoded feedback, then return to step 1);Otherwise file is not by Bob Decoding completes, and returns to 3-2).
CN201610552068.XA 2016-07-13 2016-07-13 A kind of safe transmission discrete power control method based on fountain codes Active CN106211143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610552068.XA CN106211143B (en) 2016-07-13 2016-07-13 A kind of safe transmission discrete power control method based on fountain codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610552068.XA CN106211143B (en) 2016-07-13 2016-07-13 A kind of safe transmission discrete power control method based on fountain codes

Publications (2)

Publication Number Publication Date
CN106211143A true CN106211143A (en) 2016-12-07
CN106211143B CN106211143B (en) 2019-07-23

Family

ID=57478051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610552068.XA Active CN106211143B (en) 2016-07-13 2016-07-13 A kind of safe transmission discrete power control method based on fountain codes

Country Status (1)

Country Link
CN (1) CN106211143B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535563A (en) * 2019-08-30 2019-12-03 西安交通大学 A kind of wireless security transmission method based on fountain codes control and data interlock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427586A (en) * 2011-12-06 2012-04-25 南京邮电大学 Power and relay combination optimization method based on Fountain code and cooperation communication method thereof
CN103532663A (en) * 2013-09-12 2014-01-22 北京理工大学 Frequency hopping fountain code system and transmission method thereof
US8873371B2 (en) * 2012-09-28 2014-10-28 Broadcom Corporation User equipment optimization for multimedia broadcast multicast service
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427586A (en) * 2011-12-06 2012-04-25 南京邮电大学 Power and relay combination optimization method based on Fountain code and cooperation communication method thereof
US8873371B2 (en) * 2012-09-28 2014-10-28 Broadcom Corporation User equipment optimization for multimedia broadcast multicast service
CN103532663A (en) * 2013-09-12 2014-01-22 北京理工大学 Frequency hopping fountain code system and transmission method thereof
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535563A (en) * 2019-08-30 2019-12-03 西安交通大学 A kind of wireless security transmission method based on fountain codes control and data interlock

Also Published As

Publication number Publication date
CN106211143B (en) 2019-07-23

Similar Documents

Publication Publication Date Title
CN105306168B (en) Method for guaranteeing secure transmission of wireless data based on fountain codes
Wu et al. Performance of hybrid-ARQ in block-fading channels: A fixed outage probability analysis
CN107360568B (en) Method for realizing symmetric encryption and guaranteeing wireless data secure transmission by utilizing fountain codes
CN104640110B (en) A kind of Symmetric key generation method based on the characteristic of channel in terminal direct connection communication
CN104320826A (en) Chance relay-selection method for cooperative communication network under tapping environment
Sun et al. Fountain-coding-based secure communications exploiting outage prediction and limited feedback
CN102075931A (en) Information theoretical security-based key agreement method in satellite network
CN107148015A (en) A kind of continuous encryption safe transmission method of physical layer constructed based on polarization code
Li et al. Security enhanced via dynamic fountain code design for wireless delivery
CN110535563A (en) A kind of wireless security transmission method based on fountain codes control and data interlock
CN105553618A (en) Secure image transmission method based on fountain code and self-adaptive resource distribution
Du et al. Security enhancement for multicast over internet of things by dynamically constructed fountain codes
CN103297197A (en) Distributed relay erasure coding method for mobile delay tolerant network
CN109951240A (en) The physical layer secret communication transmission method of wiretap channel based on polar code
CN104284375B (en) A kind of method of wireless network rate adaptation regulation
CN106899524B (en) Safety access method based on channel estimating and user QoS
CN109462456B (en) Streaming media safe transmission method based on error code diffusion and noise aggregation
CN107222284B (en) The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things
CN109257743A (en) The method that WTC-I is constructed by steady BSBC when no channel state information
CN109617655A (en) A kind of polarization code wireless data safe transmission method based on random scrambling code auxiliary
CN106059642A (en) Distributed antenna system cross-layer design method based on incomplete estimated information
CN106211143A (en) A kind of safe transmission discrete power control method based on fountain codes
Sharma et al. Physical layer security of ami data transmission in smart grid environment
CN107612669A (en) User&#39;s matching method for non-orthogonal multiple system
Shi et al. Effective capacity for renewal service processes with applications to HARQ systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant