CN106131824B - Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means - Google Patents

Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means Download PDF

Info

Publication number
CN106131824B
CN106131824B CN201610394936.6A CN201610394936A CN106131824B CN 106131824 B CN106131824 B CN 106131824B CN 201610394936 A CN201610394936 A CN 201610394936A CN 106131824 B CN106131824 B CN 106131824B
Authority
CN
China
Prior art keywords
stage
signal
variance
transmitting terminal
noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610394936.6A
Other languages
Chinese (zh)
Other versions
CN106131824A (en
Inventor
任品毅
贺宏亮
孙黎
王熠晨
杜清河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201610394936.6A priority Critical patent/CN106131824B/en
Publication of CN106131824A publication Critical patent/CN106131824A/en
Application granted granted Critical
Publication of CN106131824B publication Critical patent/CN106131824B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03993Noise whitening

Abstract

The invention discloses a kind of cordless communication network allied signal feedbacks and man made noise's safety of physical layer communication means, comprising: the information of need for confidentiality is issued legitimate receipt end by first stage, transmitting terminal.Second stage after legitimate receipt end receives information, mixes a certain amount of man made noise, and mixed signal is fed back to transmitting terminal in received information.Phase III, the signal fed back is sent to receiving end by transmitting terminal, man made noise of the legitimate receipt end due to known second stage, so it can eliminate man made noise, and eavesdropping end cannot be eliminated, thus performance will receive the reduction of man made noise, to realize the secure communication between transmitting terminal and receiving end.There is no antenna advantage on legal communication equipment in this scenario, without external aid, does not eavesdrop any channel information at end, can guarantee the secure communication between legitimate device, the present invention has superiority in terms of communication security.

Description

Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means
Technical field
The invention belongs to wireless communication fields, are related to safe transmission scheme, and in particular to combine letter in cordless communication network Number feedback with man made noise design safety of physical layer communication plan.
Background technique
Due to the broadcast characteristic of wireless communication, the communication between equipment and equipment is easy to be eavesdropped end eavesdropping.Although passing The safety of physical layer scheme of system can effectively promote the safety of communication to a certain extent, but it still remains some lack Point.For example, eavesdropping the transient channel information or statistic channel information at end known to one, transmitting terminal.But it is in fact, complete for one Entirely passively for earwig's (i.e. earwig does not send any information, only receives information), legitimate user is difficult to obtain its channel Information.Two, transmitting terminal or legitimate receipt end need to have more antennas than eavesdropping end.In practice, it one side transmitting terminal or connects Receiving end may can not configure mutiple antennas due to size and cost, and on the other hand, the advantage on antenna amount is obvious It is inequitable to eavesdropping for end, because more antennas can be used in it.Three, transmitting terminal and legitimate receipt end need outside The help of cooperative node (for example, relaying).In practice, it is likely that there is no external aid, perhaps this aid itself Be exactly it is insecure, it may decode the information of legitimate user.
Summary of the invention
Potential in above-mentioned existing program in order to solve the problems, such as, the invention proposes a kind of new safety of physical layer schemes to come Realize the communication security between equipment.
The present invention is realized by following technical proposals.
The cordless communication network allied signal feedback and man made noise's safety of physical layer provided according to embodiments of the present invention is logical Letter method, includes the following steps:
First stage, transmitting terminal use channel inversion technique, mix in the information s of need for confidentiality and be with variance Man made noise w1, send first stage signal xa1, guarantee that sending signal meets first stage power limitIt is legal to connect Receiving end receives first stage informationAnd first stage Signal to Interference plus Noise Ratio is received accordinglyTermination is eavesdropped to receive including needing The information s to be maintained secrecy and mixes and be with varianceMan made noise w1InformationIt eavesdrops and holds and receive corresponding first rank Section receives Signal to Interference plus Noise Ratio
Second stage, legitimate receipt end also use channel inversion technique, to transmitting terminal feedback signal xb, this feedback signal It is that the first stage information received is terminated based on legitimate receiptIn feedback signal including need for confidentiality information s, mix It is with varianceMan made noise w1, and mix and a certain amount of be with varianceGauss man made noise w2, guarantee anti- Feedback signal meets second stage power limitAnd mixed signal is fed back into transmitting terminal;Transmitting terminal is received the Two-stage feedback signal ya, transmitting terminal can be being with varianceMan made noise w1Disappear;End is eavesdropped to receive in second stage The signal y arrivede2, eavesdropping end cannot be the man made noise w having1Disappear;It eavesdrops termination and receives corresponding second stage and receive and believe Dry make an uproar compares γe2
Phase III, transmitting terminal still use channel inversion technique, are sent in the letter in feedback signal including need for confidentiality Breath s, it is with varianceGauss man made noise w2, and be contaminated with variance and beGauss man made noise w3Signal Guarantee that sending signal meets power limitLegitimate receipt end receives second stage signalIt receiving end can be w2Disappear Fall;Legitimate receipt termination receives corresponding second stage and receives Signal to Interference plus Noise RatioEavesdrop the reception phase III signal at endEavesdropping end cannot be w2Disappear, w2Sufficiently large damage is caused to end is eavesdropped;Eavesdrop the corresponding phase III reception letter of termination Dry make an uproar compares γe3
It is by introducing additional first stage varianceGauss man made noise w1, second stage variance beHeight This man made noise w2It is with phase III varianceGauss man made noise w3, and guarantee that second stage feedback signal meets simultaneously Second stage power limitAnd first stage and phase III send signal and meet first stage power limitAnd to makeAnd then it shouldPower limit should be all larger than setting Power threshold p0, so thatWithLess than power limit Less than power limitTo realize transmitting terminal Secure communication between receiving end.
Further, in the first stage, work as channel coefficients | hAB|2Greater than interrupt threshold γ0When, transmitting terminal uses channel Inversion technique sends signal: xa1=(s+w1)/hAB
Further, the power limit of transmitting terminalS and w1Variance must satisfy
Further, in the first stage, legitimate receipt termination receives first stage information:
Eavesdrop the information that termination receives the first stage:
Further, in second stage, meet condition in channel coefficients | hBA|20When, to transmitting terminal feedback signal:
Further, in second stage, transmission terminates at the feedback signal that second stage receives and is
Transmitting terminal can be w1Disappear, disappear w1Reception signal afterwards is
But eavesdrop the signal y that end is received in second stagee2, eavesdropping end cannot be the man made noise w having1Disappear;Steathily The signal y for listening end to receivee2For
Further, in the phase III, when channel coefficients meet | hAB|20When, send signal:
In phase III, the signal that legitimate receipt end receives second stage is
Receiving end, which receives signal, to be become
At this point, the reception phase III signal for eavesdropping end is
Further, receiving Signal to Interference plus Noise Ratio accordingly at the legitimate receipt end in the first and third stage is
The white Gaussian noise at end is eavesdropped in the first, second and third stageWhen, eavesdropping end received signal to noise ratio is
The invention has the following beneficial technical effects:
By introducing additional first stage Gauss man made noise w1, second stage Gauss man made noise w2And the phase III Gauss man made noise w3, and guarantee that second stage feedback signal meets power limit and first stage and phase III simultaneously It sends signal and meets power limit, and the reception Signal to Interference plus Noise Ratio at legitimate receipt end to be made to be greater than the Signal to Interference plus Noise Ratio for eavesdropping end, i.e.,And then the limitation of the first, second and third stage power should be all larger than the power threshold p of setting0, so that the One, two, triphasic man made noise's variance is respectively less than power limit, to realize that the safety between transmitting terminal and receiving end is logical Letter.
In the solution of the present invention, legal communication equipment does not have the advantage on antenna, and (i.e. all users are only single Antenna), without external aid, do not eavesdrop any channel information (additive white Gaussian noise water including eavesdropping end at end It is flat), but secure communication still may be implemented, the present invention has superiority in terms of communication security.
Detailed description of the invention
Fig. 1 is system model figure of the invention;
Fig. 2 is variation diagram of the safe capacity with general power ratio shared by noise power;
Fig. 3 is safe capacity with the variation diagram for sending power;
Fig. 4 is variation diagram of the safe capacity with interrupt threshold.
Specific embodiment
The invention will be described in further detail with reference to the accompanying drawings and examples, but is not intended as doing invention any limit The foundation of system.
Cordless communication network allied signal feedback of the present invention and man made noise's safety of physical layer communication means, provide this first The system model of invention, illustraton of model is as shown in attached drawing 1:
There are three nodes in system, a transmitting terminal, a legitimate receipt end and one eavesdrop end.All equipment are all Only single antenna.The signal that transmitting terminal issues legitimate receipt end can be received by eavesdropping end, can also receive legitimate receipt end Feed back to the signal of transmitting terminal.From transmitting terminal to legitimate receipt end, from legitimate receipt end to transmitting terminal, from transmitting terminal to eavesdropping End, is respectively h from legitimate receipt end to the channel for eavesdropping endAB, hBA, hAEAnd hBE.Wherein, hABAnd hBAIt is 0 mean value unit variance Cyclic Symmetry multiple Gauss channel, and undergo quasi-static decline, i.e., channel remains unchanged whithin a period of time.Transmitting terminal and conjunction The transimission power of method receiving end is no more than P respectivelyaAnd Pb.Transmitting terminal and all additive white Gaussian noises at legitimate receipt end are all returned One turns to 0 mean value and unit variance.It transmitting terminal, legitimate receipt end and eavesdrops end and both knows about hABAnd hBAAccurate information.It eavesdrops End knows oneself channel (i.e. hAEAnd hBE) accurate information.But transmitting terminal, legitimate receipt end do not know hAE、hBEAnd it steals Listen the additive white Gaussian noise at endAny information.
Steps are as follows for the safety of physical layer communication means of cordless communication network allied signal feedback and man made noise:
First stage: transmitting terminal uses channel inversion technique, works as channel coefficients | hAB|2Greater than interrupt threshold γ0(i.e. | hAB |20) when, mix in the information s of need for confidentiality and is with varianceMan made noise w1, send first stage signal xa1, Transmission signal is xa1=(s+w1)/hAB
Wherein, s is the information of need for confidentiality, w1It is the Gauss man made noise mixed the first stage, its mean value is 0, side Difference ishABIt is channel of the transmitting terminal to receiving end, is normalized to obey the circulation of 0 mean value unit variance in the present invention Symmetric complex channel.Due to the power limit of transmitting terminalS and w1Variance must satisfy
Wherein,For the variance of the information of need for confidentiality, PaFor the instantaneous transmission power limit of transmitting terminal,And it can be found that this whole average power limitIt is and interrupt threshold γ0There are close ties 's.In addition,
To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2's Probability density function, and obey the exponential distribution that parameter is 1, i.e.,
P (x)=e-x
Legitimate receipt termination receives the information of first stage and is
Wherein,It is the additive white Gaussian noise of legitimate receipt end in the first stage, mean value 0, variance isMeanwhile Legitimate receipt end receives Signal to Interference plus Noise Ratio accordingly
Eavesdropping the first stage information that termination receives is
Wherein, hAEIt is transmitting terminal to the channel for eavesdropping end, ne1It is the additive white Gaussian noise eavesdropped Duan in the first stage, Mean value is 0, and variance is
Meanwhile eavesdropping the corresponding reception Signal to Interference plus Noise Ratio γ of terminatione1
Second stage: legitimate receipt end also uses channel inversion technique, and meets condition in channel coefficients | hBA|20 When, feedback signalThis feedback signal is to terminate the first stage received based on legitimate receipt Receive signalInformation s including need for confidentiality, mix and be with varianceMan made noise w1, and mix a certain amount of Variance isGauss man made noise w2, w2It is its mean value of Gauss man made noise that is mingled in feedback signal is 0.α be for Guarantee that feedback signal meets power limitThen there is following formula,
Wherein, PbFor the instantaneous transmission power limit of transmitting terminal,To send signal power limitation,In addition,
To seek 1/ | hBA|2Average value, wherein q (x) is channel coefficients | hBA|2's Probability density function.Q (x) is channel coefficients | hBA|2Probability density function, and obey parameter be 1 exponential distribution, i.e. q (x)=e-x.Thus it is possible to the expression formula of α is obtained,
Therefore, it sends and terminates at the feedback signal that second stage receives and be
Wherein, naIt is the additive white Gaussian noise of transmitting terminal, mean value 0, variance isBecause of w1It is that transmitting terminal oneself exists The man made noise that first stage sends, it is to know w1Exact value.Meanwhile the value of α is disclosed, i.e. system all devices (including eavesdropping end) both knows about the occurrence of α.So transmitting terminal can be w in second stage1Disappear.Then, disappear w1Afterwards Receiving signal is
End, which is eavesdropped, in the signal that second stage receives is
Wherein,It is to eavesdrop end in the additive white Gaussian noise of second stage, mean value 0, variance isNotice w1 It is unknown to eavesdrop end.It cannot be w so eavesdropping end1Disappear, so that it, which receives signal, will receive w1Damage.Meanwhile eavesdropping end Meet corresponding reception Signal to Interference plus Noise Ratio γe2
Consider that channel is quasi-static, i.e. phase III and first stage hABIt remains unchanged.Then, transmitting terminal is in third rank Duan Yiran uses channel inversion technique, when channel coefficients meet | hAB|20When, send signal w3It is the Gauss man made noise being mingled in feedback signal, its mean value is 0, and variance is For the w that disappears1Reception letter afterwards Number, β is to guarantee to send signal and meet power limitIt must satisfy
Therefore, β can be expressed as
Then, the second stage signal that phase III legitimate receipt end receives is
Wherein,It is additive white Gaussian noise of the legitimate receipt end in the phase III, mean value 0, variance isDue to w2It is the signal that receiving end feeds back to transmitting terminal in second stage, it is that receiving end is known.Meanwhile and since β is public It opens, i.e., all devices (including eavesdropping end) both know about its exact value.So receiving end can be w in the phase III2Disappear, It, which receives signal, becomes
Meanwhile legitimate receipt end receives Signal to Interference plus Noise Ratio accordingly
At this point, the reception signal for eavesdropping end is
Wherein,It is the additive white Gaussian noise eavesdropped Duan in the phase III, mean value 0, variance ishAE,2It is to eavesdrop The channel in the phase III is held, since transmitting terminal is not aware that the channel information for eavesdropping end, so h hereAE,2With the first rank The h of sectionAEIt is not necessarily identical.W is not known due to eavesdropping end2Value, in this stage, it cannot be w2Disappear, to will receive w2 Damage.Meanwhile eavesdropping the corresponding reception Signal to Interference plus Noise Ratio γ of terminatione3
The man made noise w feedbacked just because of legitimate receipt end in second stage2It can be by it certainly in the phase III Oneself disappears, but cannot be eavesdropped end and disappeared, and the present invention is allowed to design suitable w2To eavesdrop end cause it is sufficiently large Damage, to realize secure communication.Specific w2Design is by meeting following formulaTo embody 's.
Receiving Signal to Interference plus Noise Ratio accordingly according to formula (3) and (14) available legitimate receipt end is
Similarly, it is according to formula (4), (10) and (15) available received signal to noise ratio for eavesdropping end
The channel information at end is eavesdropped since transmitting terminal is not aware that, the white Gaussian noise including eavesdropping endBeing how many is also It is ignorant.So the present invention consider one kind for legitimate user the case where worst, i.e.,Then, it eavesdrops The reception Signal to Interference plus Noise Ratio at end can be expressed as
Assuming that legitimate receipt end and eavesdrop end all using maximum-ratio combing receiver, then legitimate receipt end and the appearance at end is eavesdropped Amount is respectively
And
Wherein, Pno_outRefer to that there is no the probability of interruption using when channel inversion technique in three phases, it is specific It can be expressed asOnly have not interrupting for the first two-stage general here It is because the channel of phase III and first stage are the same, as long as the first stage can transmit signal, third rank that rate, which is multiplied, Duan Yiding can be transmitted.
Thus it is possible to obtain the interrupt threshold γ in some fixation0Under, the safe capacity of system is
By traversing all possible γ0,Available maximum safe capacity is
In order to enable information can safe transmission, then must assure that safe capacity be greater than 0.Formula (21) are observed it is found that wanting So that safe capacity is greater than 0, then must satisfy
Without loss of generality, the additive white Gaussian noise at legitimate receipt end and transmitting terminal is normalized, i.e.,Cause This, above-mentioned condition can be expressed as
As long as this inequality is set up, then system can realize safe transmission.Meanwhile this formula gives this hair Bright middle w2Specific mentality of designing.
In order to which theoretically proof scheme has carried out following analysis in the superiority for realizing secure context, the present invention.
Without loss of generality, it is assumed that there are identical power limit, i.e. P in transmitting terminal and legitimate receipt enda=PbAndDue in given γ0In the case where,WithIt is constant, so with a unified symbol P indicates, i.e.,Simultaneously, it is assumed that the variance for the man made noise that first stage and second stage are sent is It is identical, i.e.,The man made noise w of phase III3It is intended merely to introduce uncertain, it is possible to considerTherefore, the left side and the right of above-mentioned inequality can be expressed as
Wherein, x < p.Safe capacity can be expressed as a result,
From this expression formula, it can be concluded that, as long as f (x) > h (x), safe rate can be greater than 0.F (x) > h (x) meaning Send man made noise be enough to protect the information of need for confidentiality.The case where limit is to be used to almost all of available power Serve as man made noise, and these man made noises just can protect the secret signal slightly larger than 0, i.e., as x → p,When, Cs→0+.Wherein Cs→0+It can be converted toI.e.This formula can further be write as
Wherein, f (p)=h (p)=0.According to the definition of derivative, above-mentioned formula can be write as f ' (p)=h ' (p), here f ' (p) and h ' (p) respectively indicates f (x) and derivative of the h (x) at x=p.Solve equation f ' (p)=h ' (p), it can be deduced that p=p0= 5.913.As long as it means that power p > p0=5.913, it there is man made noiseSo that transmitting terminal and reception End can be with secure communication.
Results showed that advantage of the invention, it means even if eavesdropping end in more advantageous than legitimate receipt end for this Position (such as eavesdrop end clutch method end closer), there is no antenna advantage, without external aid, as long as there is enough transmission function Safety still may be implemented in rate.And in traditional safety approach, not by antenna advantage or external aid, as long as stealing It listens end channel quality better than legitimate receipt end, even when being power for infinity, can not realize safe transmission.
In order to verify effect of the present invention in terms of secure communication from emulation, attached drawing 2,3,4 gives specific emulation As a result.
Attached drawing 2 gives safe capacity with the variation of general power ratio shared by noise power.As can be seen that selection is suitable Noise power can make safe capacity be greater than 0, and safe capacity can be made to become with the ratio that noise power accounts for general power Change, when ratio is 0.6 or so, safe capacity reaches maximum.
Attached drawing 3 gives safe capacity under different artifact powers with the variation for sending power.Obviously, function is sent Rate is bigger, and safe capacity is bigger, and the almost linear increase in high s/n ratio.
Attached drawing 4 gives the curve that safe capacity changes with interrupt threshold.It can be seen that with the increase of interrupt threshold, Safe capacity first increases and then decreases.Suitable thresholding is selected, safe capacity can be made to reach maximum.
To sum up, the shortcomings that the present invention overcomes traditional schemes is not eavesdropping end channel information, is not having antenna advantage, with And that secure communication still not may be implemented in the case where external aid.
The present invention is not limited to the above embodiments, on the basis of technical solution disclosed by the invention, the skill of this field For art personnel according to disclosed technology contents, one can be made to some of which technical characteristic by not needing creative labor A little replacements and deformation, these replacements and deformation are within the scope of the invention.

Claims (7)

1. a kind of cordless communication network allied signal feedback and man made noise's safety of physical layer communication means, which is characterized in that packet Include following step:
First stage, transmitting terminal use channel inversion technique, mix in the information s of need for confidentiality and be with varianceIt is artificial Noise w1, send first stage signal xa1, guarantee that sending signal meets first stage power limitLegitimate receipt termination Receive first stage informationAnd first stage Signal to Interference plus Noise Ratio is received accordinglyTermination is eavesdropped to receive including needing to protect Close information s and mixes and be with varianceMan made noise w1First stage informationIt eavesdrops and holds and receive accordingly First stage receives Signal to Interference plus Noise Ratio
Second stage, legitimate receipt end also use channel inversion technique, to transmitting terminal feedback signal xb, this feedback signal is base The first stage information received is terminated in legitimate receiptIn feedback signal including need for confidentiality information s, mix with side Difference isMan made noise w1, and mix and a certain amount of be with varianceGauss man made noise w2, guarantee feedback signal Meet second stage power limitAnd mixed signal is fed back into transmitting terminal;Transmitting terminal is received in second stage Feedback signal ya, transmitting terminal can be being with varianceMan made noise w1Disappear;End is eavesdropped to receive in second stage signal ye2, eavesdropping end cannot be the man made noise w having1Disappear;It eavesdrops termination and receives corresponding second stage reception Signal to Interference plus Noise Ratio γe2
Phase III, transmitting terminal still use channel inversion technique, be sent in feedback signal including need for confidentiality information s, It is with varianceGauss man made noise w2, and be contaminated with variance and beGauss man made noise w3SignalGuarantee It sends signal and meets power limitLegitimate receipt end receives second stage signalIt receiving end can be w2Disappear;It closes Method receiving end receives corresponding second stage and receives Signal to Interference plus Noise RatioIt eavesdrops end and receives phase III signalEavesdrop end It cannot be w2Disappear, w2Sufficiently large damage is caused to end is eavesdropped;Eavesdrop the corresponding phase III reception Signal to Interference plus Noise Ratio of termination γe3
It is by introducing additional first stage varianceGauss man made noise w1, second stage variance beHigh this person Work noise w2It is with phase III varianceGauss man made noise w3, and guarantee that second stage feedback signal meets second simultaneously Stage power limitationAnd first stage and phase III send signal and meet first stage power limit And to makeAnd then it shouldPower limit should be all larger than the power threshold of setting p0, so thatWithLess than power limitLess than power limitTo realize transmitting terminal and reception Secure communication between end;
In the first stage, work as channel coefficients | hAB|2Greater than interrupt threshold γ0When, transmitting terminal is sent using channel inversion technique Signal:
xa1=(s+w1)/hAB
Wherein, s is the information of need for confidentiality, w1It is the Gauss man made noise mixed the first stage, its mean value is 0, and variance ishABIt is channel of the transmitting terminal to receiving end;
The power limit of transmitting terminalS and w1Variance must satisfy
Wherein,For the variance of the information of need for confidentiality, PaFor the instantaneous transmission power limit of transmitting terminal,To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2Probability density Function.
2. the method according to claim 1, wherein legitimate receipt termination receives first in the first stage Session information:
Wherein, hABFor the channel of transmitting terminal to receiving end,For the additive white Gaussian noise of legitimate receipt end in the first stage, Value is 0, and variance is
It eavesdrops termination and receives first stage information:
Wherein, hAEIt is transmitting terminal to the channel for eavesdropping end, ne1It is the additive white Gaussian noise eavesdropped Duan in the first stage, mean value is 0, variance is
3. the method according to claim 1, wherein meeting condition in channel coefficients in the second stage | hBA |2> γ0When, to transmitting terminal feedback signal:
α is to guarantee that feedback signal meets power limitCoefficient,It indicates are as follows:
Wherein,For the variance of the information of need for confidentiality, PbFor the instantaneous transmission power limit of transmitting terminal,To send letter Number power limit,To seek 1/ | hBA|2Average value, wherein q (x) is channel coefficients | hBA|2 Probability density function.
4. the method according to claim 1, wherein transmission terminates at second stage receipts in the second stage To feedback signal be
Wherein, naIt is the additive white Gaussian noise of transmitting terminal, mean value 0, variance isα is the coefficient for meeting power limit, table It is shown as:
Wherein,For the variance of the information of need for confidentiality,For the variance yields of the additive white Gaussian noise of receiving end,To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2Probability density Function;
Transmitting terminal can be w1Disappear, disappear w1Reception signal afterwards is
But eavesdrop the signal y that end is received in second stagee2, eavesdropping end cannot be the man made noise w having1Disappear;Eavesdrop end Receive second stage signal ye2For
Wherein,It is to eavesdrop end in the additive white Gaussian noise of second stage, mean value 0, variance ishBEIt is that receiving end is arrived The channel at end is eavesdropped,For the additive white Gaussian noise of legitimate receipt end in the first stage, mean value 0, variance is
5. the method according to claim 1, wherein in the phase III, when channel coefficients meet | hAB|2> γ0When, send signal:
Wherein,For the w that disappears1Reception signal afterwards, β are to guarantee to send signal and meet power limitSystem Number,It indicates are as follows:
Wherein,For the variance of the information of need for confidentiality,To seek 1/ | hAB|2Be averaged Value, wherein p (x) is channel coefficients | hAB|2Probability density function.
6. the method according to claim 1, wherein in the phase III, legitimate receipt end receive second Stage signal is
Wherein,It is additive white Gaussian noise of the legitimate receipt end in the phase III, mean value 0, variance is
Receiving end, which receives signal, to be become
At this point, the reception phase III signal for eavesdropping end is
Wherein,It is the additive white Gaussian noise eavesdropped Duan in the phase III, mean value 0, variance ishAE,2It is to eavesdrop end to exist The channel of phase III.
7. the method according to claim 1, wherein the legitimate receipt end in the first and third stage receives accordingly Signal to Interference plus Noise Ratio are as follows:
The white Gaussian noise at end is eavesdropped in the first, second and third stageWhen, eavesdropping end reception Signal to Interference plus Noise Ratio is
Wherein,For the variance of the information of need for confidentiality,For the variance of the additive white Gaussian noise of transmitting terminal,It is legal The variance of the additive white Gaussian noise of receiving end in the first stage, α are to guarantee that feedback signal meets power limitCoefficient, β are to guarantee to send signal and meeting power limitCoefficient.
CN201610394936.6A 2016-06-06 2016-06-06 Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means Active CN106131824B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610394936.6A CN106131824B (en) 2016-06-06 2016-06-06 Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610394936.6A CN106131824B (en) 2016-06-06 2016-06-06 Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means

Publications (2)

Publication Number Publication Date
CN106131824A CN106131824A (en) 2016-11-16
CN106131824B true CN106131824B (en) 2019-07-19

Family

ID=57270147

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610394936.6A Active CN106131824B (en) 2016-06-06 2016-06-06 Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means

Country Status (1)

Country Link
CN (1) CN106131824B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535177B (en) * 2016-11-22 2019-07-05 浙江工业大学 A kind of concealed communication method based on autoregression man made noise
CN107017960B (en) * 2017-03-24 2019-04-12 北京航空航天大学 A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code
CN107437963B (en) * 2017-07-05 2020-10-20 深圳大学 Distributed safe beam forming method and device based on feedback control
CN107395260B (en) * 2017-07-05 2020-12-01 深圳大学 Distributed safe beam forming method and device based on artificial noise
CN107360544B (en) * 2017-07-05 2019-10-01 深圳大学 The position of mobile equipment control method and device of dynamic noise based on Signal to Interference plus Noise Ratio
WO2019006693A1 (en) * 2017-07-05 2019-01-10 深圳大学 Mobile device position control method and apparatus based on dynamic noise of channel information
WO2019006714A1 (en) * 2017-07-05 2019-01-10 深圳大学 Distributed secure beamforming method and apparatus based on artificial noise
CN107396307B (en) * 2017-07-05 2019-12-31 深圳大学 Mobile equipment position control method and device based on dynamic noise of channel information
WO2019006715A1 (en) * 2017-07-05 2019-01-10 深圳大学 Distributed secure beamforming method and apparatus based on feedback control
CN113746766B (en) * 2021-06-23 2023-04-14 西安交通大学 Channel self-adaptive noise aggregation wireless secure transmission method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883741A (en) * 2015-04-09 2015-09-02 南京邮电大学 Resource allocation algorithm for cognitive radio network
CN105141559A (en) * 2015-06-30 2015-12-09 西安交通大学 Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system
CN105263135A (en) * 2015-07-24 2016-01-20 南京邮电大学 Robustness safety design method for multiple input multiple output (MIMO) communication system
CN105282739A (en) * 2015-11-13 2016-01-27 西安交通大学 Point-to-point secret key negotiation method based on physical layer pilot frequency presetting
CN105491563A (en) * 2015-12-31 2016-04-13 南方电网科学研究院有限责任公司 Method and system for improving MISO security communication system safety rate by means of artificial noise

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883741A (en) * 2015-04-09 2015-09-02 南京邮电大学 Resource allocation algorithm for cognitive radio network
CN105141559A (en) * 2015-06-30 2015-12-09 西安交通大学 Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system
CN105263135A (en) * 2015-07-24 2016-01-20 南京邮电大学 Robustness safety design method for multiple input multiple output (MIMO) communication system
CN105282739A (en) * 2015-11-13 2016-01-27 西安交通大学 Point-to-point secret key negotiation method based on physical layer pilot frequency presetting
CN105491563A (en) * 2015-12-31 2016-04-13 南方电网科学研究院有限责任公司 Method and system for improving MISO security communication system safety rate by means of artificial noise

Also Published As

Publication number Publication date
CN106131824A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106131824B (en) Cordless communication network allied signal feedback and man made noise&#39;s safety of physical layer communication means
Xi et al. Instant and robust authentication and key agreement among mobile devices
Liu et al. Multiple-input multiple-output Gaussian broadcast channels with confidential messages
Mo et al. Secure beamforming for MIMO two-way communications with an untrusted relay
Wang et al. Security enhancement of cooperative single carrier systems
CN106452503B (en) Full duplex relaying safe transmission method based on power distribution energy acquisition technology
Wang et al. Strategic antieavesdropping game for physical layer security in wireless cooperative networks
CN105915472B (en) Power distribution method in collaborative network based on man made noise
Ekrem et al. Capacity region of Gaussian MIMO broadcast channels with common and confidential messages
CN106131941B (en) Cooperate non-ideal collaborative network power distribution method of the estimation based on man made noise of channel
CN106992836B (en) Full duplex scrambling transmission method in a kind of untrusted junction network
CN104581960B (en) A kind of multi-user Cooperation jamming power distribution method under secrecy outage probability constraint
Alves et al. Enhanced physical layer security through transmit antenna selection
Alves et al. On the performance of secure full-duplex relaying under composite fading channels
CN109067437A (en) A kind of full duplex cooperation scrambling safe transmission method based on the selection of direct path optimal user
Ara et al. A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer
Mei et al. GSVD-based precoding in MIMO systems with integrated services
CN109660553A (en) Downlink safe transmission strategy based on time reversal technology
Lai et al. Key generation from wireless channels
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
CN105099640A (en) Joint time-frequency duplex shared channel characteristic obtaining method
CN106254029B (en) The cooperation interference method of analog network coding system
Zhang et al. Secrecy capacity optimization in coordinated multi-point processing
CN105392143B (en) A kind of frequency spectrum access method that authorized user and cognitive user QoS based on power distribution ensure
Li et al. Cooperative jamming secure scheme for untrusted full-duplex relay system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant