CN106131824B - Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means - Google Patents
Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means Download PDFInfo
- Publication number
- CN106131824B CN106131824B CN201610394936.6A CN201610394936A CN106131824B CN 106131824 B CN106131824 B CN 106131824B CN 201610394936 A CN201610394936 A CN 201610394936A CN 106131824 B CN106131824 B CN 106131824B
- Authority
- CN
- China
- Prior art keywords
- stage
- signal
- variance
- transmitting terminal
- noise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03993—Noise whitening
Abstract
The invention discloses a kind of cordless communication network allied signal feedbacks and man made noise's safety of physical layer communication means, comprising: the information of need for confidentiality is issued legitimate receipt end by first stage, transmitting terminal.Second stage after legitimate receipt end receives information, mixes a certain amount of man made noise, and mixed signal is fed back to transmitting terminal in received information.Phase III, the signal fed back is sent to receiving end by transmitting terminal, man made noise of the legitimate receipt end due to known second stage, so it can eliminate man made noise, and eavesdropping end cannot be eliminated, thus performance will receive the reduction of man made noise, to realize the secure communication between transmitting terminal and receiving end.There is no antenna advantage on legal communication equipment in this scenario, without external aid, does not eavesdrop any channel information at end, can guarantee the secure communication between legitimate device, the present invention has superiority in terms of communication security.
Description
Technical field
The invention belongs to wireless communication fields, are related to safe transmission scheme, and in particular to combine letter in cordless communication network
Number feedback with man made noise design safety of physical layer communication plan.
Background technique
Due to the broadcast characteristic of wireless communication, the communication between equipment and equipment is easy to be eavesdropped end eavesdropping.Although passing
The safety of physical layer scheme of system can effectively promote the safety of communication to a certain extent, but it still remains some lack
Point.For example, eavesdropping the transient channel information or statistic channel information at end known to one, transmitting terminal.But it is in fact, complete for one
Entirely passively for earwig's (i.e. earwig does not send any information, only receives information), legitimate user is difficult to obtain its channel
Information.Two, transmitting terminal or legitimate receipt end need to have more antennas than eavesdropping end.In practice, it one side transmitting terminal or connects
Receiving end may can not configure mutiple antennas due to size and cost, and on the other hand, the advantage on antenna amount is obvious
It is inequitable to eavesdropping for end, because more antennas can be used in it.Three, transmitting terminal and legitimate receipt end need outside
The help of cooperative node (for example, relaying).In practice, it is likely that there is no external aid, perhaps this aid itself
Be exactly it is insecure, it may decode the information of legitimate user.
Summary of the invention
Potential in above-mentioned existing program in order to solve the problems, such as, the invention proposes a kind of new safety of physical layer schemes to come
Realize the communication security between equipment.
The present invention is realized by following technical proposals.
The cordless communication network allied signal feedback and man made noise's safety of physical layer provided according to embodiments of the present invention is logical
Letter method, includes the following steps:
First stage, transmitting terminal use channel inversion technique, mix in the information s of need for confidentiality and be with variance
Man made noise w1, send first stage signal xa1, guarantee that sending signal meets first stage power limitIt is legal to connect
Receiving end receives first stage informationAnd first stage Signal to Interference plus Noise Ratio is received accordinglyTermination is eavesdropped to receive including needing
The information s to be maintained secrecy and mixes and be with varianceMan made noise w1InformationIt eavesdrops and holds and receive corresponding first rank
Section receives Signal to Interference plus Noise Ratio
Second stage, legitimate receipt end also use channel inversion technique, to transmitting terminal feedback signal xb, this feedback signal
It is that the first stage information received is terminated based on legitimate receiptIn feedback signal including need for confidentiality information s, mix
It is with varianceMan made noise w1, and mix and a certain amount of be with varianceGauss man made noise w2, guarantee anti-
Feedback signal meets second stage power limitAnd mixed signal is fed back into transmitting terminal;Transmitting terminal is received the
Two-stage feedback signal ya, transmitting terminal can be being with varianceMan made noise w1Disappear;End is eavesdropped to receive in second stage
The signal y arrivede2, eavesdropping end cannot be the man made noise w having1Disappear;It eavesdrops termination and receives corresponding second stage and receive and believe
Dry make an uproar compares γe2;
Phase III, transmitting terminal still use channel inversion technique, are sent in the letter in feedback signal including need for confidentiality
Breath s, it is with varianceGauss man made noise w2, and be contaminated with variance and beGauss man made noise w3Signal
Guarantee that sending signal meets power limitLegitimate receipt end receives second stage signalIt receiving end can be w2Disappear
Fall;Legitimate receipt termination receives corresponding second stage and receives Signal to Interference plus Noise RatioEavesdrop the reception phase III signal at endEavesdropping end cannot be w2Disappear, w2Sufficiently large damage is caused to end is eavesdropped;Eavesdrop the corresponding phase III reception letter of termination
Dry make an uproar compares γe3;
It is by introducing additional first stage varianceGauss man made noise w1, second stage variance beHeight
This man made noise w2It is with phase III varianceGauss man made noise w3, and guarantee that second stage feedback signal meets simultaneously
Second stage power limitAnd first stage and phase III send signal and meet first stage power limitAnd to makeAnd then it shouldPower limit should be all larger than setting
Power threshold p0, so thatWithLess than power limit Less than power limitTo realize transmitting terminal
Secure communication between receiving end.
Further, in the first stage, work as channel coefficients | hAB|2Greater than interrupt threshold γ0When, transmitting terminal uses channel
Inversion technique sends signal: xa1=(s+w1)/hAB。
Further, the power limit of transmitting terminalS and w1Variance must satisfy
Further, in the first stage, legitimate receipt termination receives first stage information:
Eavesdrop the information that termination receives the first stage:
Further, in second stage, meet condition in channel coefficients | hBA|2>γ0When, to transmitting terminal feedback signal:
Further, in second stage, transmission terminates at the feedback signal that second stage receives and is
Transmitting terminal can be w1Disappear, disappear w1Reception signal afterwards is
But eavesdrop the signal y that end is received in second stagee2, eavesdropping end cannot be the man made noise w having1Disappear;Steathily
The signal y for listening end to receivee2For
Further, in the phase III, when channel coefficients meet | hAB|2>γ0When, send signal:
In phase III, the signal that legitimate receipt end receives second stage is
Receiving end, which receives signal, to be become
At this point, the reception phase III signal for eavesdropping end is
Further, receiving Signal to Interference plus Noise Ratio accordingly at the legitimate receipt end in the first and third stage is
The white Gaussian noise at end is eavesdropped in the first, second and third stageWhen, eavesdropping end received signal to noise ratio is
The invention has the following beneficial technical effects:
By introducing additional first stage Gauss man made noise w1, second stage Gauss man made noise w2And the phase III
Gauss man made noise w3, and guarantee that second stage feedback signal meets power limit and first stage and phase III simultaneously
It sends signal and meets power limit, and the reception Signal to Interference plus Noise Ratio at legitimate receipt end to be made to be greater than the Signal to Interference plus Noise Ratio for eavesdropping end, i.e.,And then the limitation of the first, second and third stage power should be all larger than the power threshold p of setting0, so that the
One, two, triphasic man made noise's variance is respectively less than power limit, to realize that the safety between transmitting terminal and receiving end is logical
Letter.
In the solution of the present invention, legal communication equipment does not have the advantage on antenna, and (i.e. all users are only single
Antenna), without external aid, do not eavesdrop any channel information (additive white Gaussian noise water including eavesdropping end at end
It is flat), but secure communication still may be implemented, the present invention has superiority in terms of communication security.
Detailed description of the invention
Fig. 1 is system model figure of the invention;
Fig. 2 is variation diagram of the safe capacity with general power ratio shared by noise power;
Fig. 3 is safe capacity with the variation diagram for sending power;
Fig. 4 is variation diagram of the safe capacity with interrupt threshold.
Specific embodiment
The invention will be described in further detail with reference to the accompanying drawings and examples, but is not intended as doing invention any limit
The foundation of system.
Cordless communication network allied signal feedback of the present invention and man made noise's safety of physical layer communication means, provide this first
The system model of invention, illustraton of model is as shown in attached drawing 1:
There are three nodes in system, a transmitting terminal, a legitimate receipt end and one eavesdrop end.All equipment are all
Only single antenna.The signal that transmitting terminal issues legitimate receipt end can be received by eavesdropping end, can also receive legitimate receipt end
Feed back to the signal of transmitting terminal.From transmitting terminal to legitimate receipt end, from legitimate receipt end to transmitting terminal, from transmitting terminal to eavesdropping
End, is respectively h from legitimate receipt end to the channel for eavesdropping endAB, hBA, hAEAnd hBE.Wherein, hABAnd hBAIt is 0 mean value unit variance
Cyclic Symmetry multiple Gauss channel, and undergo quasi-static decline, i.e., channel remains unchanged whithin a period of time.Transmitting terminal and conjunction
The transimission power of method receiving end is no more than P respectivelyaAnd Pb.Transmitting terminal and all additive white Gaussian noises at legitimate receipt end are all returned
One turns to 0 mean value and unit variance.It transmitting terminal, legitimate receipt end and eavesdrops end and both knows about hABAnd hBAAccurate information.It eavesdrops
End knows oneself channel (i.e. hAEAnd hBE) accurate information.But transmitting terminal, legitimate receipt end do not know hAE、hBEAnd it steals
Listen the additive white Gaussian noise at endAny information.
Steps are as follows for the safety of physical layer communication means of cordless communication network allied signal feedback and man made noise:
First stage: transmitting terminal uses channel inversion technique, works as channel coefficients | hAB|2Greater than interrupt threshold γ0(i.e. | hAB
|2>γ0) when, mix in the information s of need for confidentiality and is with varianceMan made noise w1, send first stage signal xa1,
Transmission signal is xa1=(s+w1)/hAB。
Wherein, s is the information of need for confidentiality, w1It is the Gauss man made noise mixed the first stage, its mean value is 0, side
Difference ishABIt is channel of the transmitting terminal to receiving end, is normalized to obey the circulation of 0 mean value unit variance in the present invention
Symmetric complex channel.Due to the power limit of transmitting terminalS and w1Variance must satisfy
Wherein,For the variance of the information of need for confidentiality, PaFor the instantaneous transmission power limit of transmitting terminal,And it can be found that this whole average power limitIt is and interrupt threshold γ0There are close ties
's.In addition,
To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2's
Probability density function, and obey the exponential distribution that parameter is 1, i.e.,
P (x)=e-x。
Legitimate receipt termination receives the information of first stage and is
Wherein,It is the additive white Gaussian noise of legitimate receipt end in the first stage, mean value 0, variance isMeanwhile
Legitimate receipt end receives Signal to Interference plus Noise Ratio accordingly
Eavesdropping the first stage information that termination receives is
Wherein, hAEIt is transmitting terminal to the channel for eavesdropping end, ne1It is the additive white Gaussian noise eavesdropped Duan in the first stage,
Mean value is 0, and variance is
Meanwhile eavesdropping the corresponding reception Signal to Interference plus Noise Ratio γ of terminatione1。
Second stage: legitimate receipt end also uses channel inversion technique, and meets condition in channel coefficients | hBA|2>γ0
When, feedback signalThis feedback signal is to terminate the first stage received based on legitimate receipt
Receive signalInformation s including need for confidentiality, mix and be with varianceMan made noise w1, and mix a certain amount of
Variance isGauss man made noise w2, w2It is its mean value of Gauss man made noise that is mingled in feedback signal is 0.α be for
Guarantee that feedback signal meets power limitThen there is following formula,
Wherein, PbFor the instantaneous transmission power limit of transmitting terminal,To send signal power limitation,In addition,
To seek 1/ | hBA|2Average value, wherein q (x) is channel coefficients | hBA|2's
Probability density function.Q (x) is channel coefficients | hBA|2Probability density function, and obey parameter be 1 exponential distribution, i.e. q
(x)=e-x.Thus it is possible to the expression formula of α is obtained,
Therefore, it sends and terminates at the feedback signal that second stage receives and be
Wherein, naIt is the additive white Gaussian noise of transmitting terminal, mean value 0, variance isBecause of w1It is that transmitting terminal oneself exists
The man made noise that first stage sends, it is to know w1Exact value.Meanwhile the value of α is disclosed, i.e. system all devices
(including eavesdropping end) both knows about the occurrence of α.So transmitting terminal can be w in second stage1Disappear.Then, disappear w1Afterwards
Receiving signal is
End, which is eavesdropped, in the signal that second stage receives is
Wherein,It is to eavesdrop end in the additive white Gaussian noise of second stage, mean value 0, variance isNotice w1
It is unknown to eavesdrop end.It cannot be w so eavesdropping end1Disappear, so that it, which receives signal, will receive w1Damage.Meanwhile eavesdropping end
Meet corresponding reception Signal to Interference plus Noise Ratio γe2。
Consider that channel is quasi-static, i.e. phase III and first stage hABIt remains unchanged.Then, transmitting terminal is in third rank
Duan Yiran uses channel inversion technique, when channel coefficients meet | hAB|2>γ0When, send signal
w3It is the Gauss man made noise being mingled in feedback signal, its mean value is 0, and variance is For the w that disappears1Reception letter afterwards
Number, β is to guarantee to send signal and meet power limitIt must satisfy
Therefore, β can be expressed as
Then, the second stage signal that phase III legitimate receipt end receives is
Wherein,It is additive white Gaussian noise of the legitimate receipt end in the phase III, mean value 0, variance isDue to
w2It is the signal that receiving end feeds back to transmitting terminal in second stage, it is that receiving end is known.Meanwhile and since β is public
It opens, i.e., all devices (including eavesdropping end) both know about its exact value.So receiving end can be w in the phase III2Disappear,
It, which receives signal, becomes
Meanwhile legitimate receipt end receives Signal to Interference plus Noise Ratio accordingly
At this point, the reception signal for eavesdropping end is
Wherein,It is the additive white Gaussian noise eavesdropped Duan in the phase III, mean value 0, variance ishAE,2It is to eavesdrop
The channel in the phase III is held, since transmitting terminal is not aware that the channel information for eavesdropping end, so h hereAE,2With the first rank
The h of sectionAEIt is not necessarily identical.W is not known due to eavesdropping end2Value, in this stage, it cannot be w2Disappear, to will receive w2
Damage.Meanwhile eavesdropping the corresponding reception Signal to Interference plus Noise Ratio γ of terminatione3。
The man made noise w feedbacked just because of legitimate receipt end in second stage2It can be by it certainly in the phase III
Oneself disappears, but cannot be eavesdropped end and disappeared, and the present invention is allowed to design suitable w2To eavesdrop end cause it is sufficiently large
Damage, to realize secure communication.Specific w2Design is by meeting following formulaTo embody
's.
Receiving Signal to Interference plus Noise Ratio accordingly according to formula (3) and (14) available legitimate receipt end is
Similarly, it is according to formula (4), (10) and (15) available received signal to noise ratio for eavesdropping end
The channel information at end is eavesdropped since transmitting terminal is not aware that, the white Gaussian noise including eavesdropping endBeing how many is also
It is ignorant.So the present invention consider one kind for legitimate user the case where worst, i.e.,Then, it eavesdrops
The reception Signal to Interference plus Noise Ratio at end can be expressed as
Assuming that legitimate receipt end and eavesdrop end all using maximum-ratio combing receiver, then legitimate receipt end and the appearance at end is eavesdropped
Amount is respectively
And
Wherein, Pno_outRefer to that there is no the probability of interruption using when channel inversion technique in three phases, it is specific
It can be expressed asOnly have not interrupting for the first two-stage general here
It is because the channel of phase III and first stage are the same, as long as the first stage can transmit signal, third rank that rate, which is multiplied,
Duan Yiding can be transmitted.
Thus it is possible to obtain the interrupt threshold γ in some fixation0Under, the safe capacity of system is
By traversing all possible γ0,Available maximum safe capacity is
In order to enable information can safe transmission, then must assure that safe capacity be greater than 0.Formula (21) are observed it is found that wanting
So that safe capacity is greater than 0, then must satisfy
Without loss of generality, the additive white Gaussian noise at legitimate receipt end and transmitting terminal is normalized, i.e.,Cause
This, above-mentioned condition can be expressed as
As long as this inequality is set up, then system can realize safe transmission.Meanwhile this formula gives this hair
Bright middle w2Specific mentality of designing.
In order to which theoretically proof scheme has carried out following analysis in the superiority for realizing secure context, the present invention.
Without loss of generality, it is assumed that there are identical power limit, i.e. P in transmitting terminal and legitimate receipt enda=PbAndDue in given γ0In the case where,WithIt is constant, so with a unified symbol
P indicates, i.e.,Simultaneously, it is assumed that the variance for the man made noise that first stage and second stage are sent is
It is identical, i.e.,The man made noise w of phase III3It is intended merely to introduce uncertain, it is possible to considerTherefore, the left side and the right of above-mentioned inequality can be expressed as
Wherein, x < p.Safe capacity can be expressed as a result,
From this expression formula, it can be concluded that, as long as f (x) > h (x), safe rate can be greater than 0.F (x) > h (x) meaning
Send man made noise be enough to protect the information of need for confidentiality.The case where limit is to be used to almost all of available power
Serve as man made noise, and these man made noises just can protect the secret signal slightly larger than 0, i.e., as x → p,When, Cs→0+.Wherein Cs→0+It can be converted toI.e.This formula can further be write as
Wherein, f (p)=h (p)=0.According to the definition of derivative, above-mentioned formula can be write as f ' (p)=h ' (p), here f '
(p) and h ' (p) respectively indicates f (x) and derivative of the h (x) at x=p.Solve equation f ' (p)=h ' (p), it can be deduced that p=p0=
5.913.As long as it means that power p > p0=5.913, it there is man made noiseSo that transmitting terminal and reception
End can be with secure communication.
Results showed that advantage of the invention, it means even if eavesdropping end in more advantageous than legitimate receipt end for this
Position (such as eavesdrop end clutch method end closer), there is no antenna advantage, without external aid, as long as there is enough transmission function
Safety still may be implemented in rate.And in traditional safety approach, not by antenna advantage or external aid, as long as stealing
It listens end channel quality better than legitimate receipt end, even when being power for infinity, can not realize safe transmission.
In order to verify effect of the present invention in terms of secure communication from emulation, attached drawing 2,3,4 gives specific emulation
As a result.
Attached drawing 2 gives safe capacity with the variation of general power ratio shared by noise power.As can be seen that selection is suitable
Noise power can make safe capacity be greater than 0, and safe capacity can be made to become with the ratio that noise power accounts for general power
Change, when ratio is 0.6 or so, safe capacity reaches maximum.
Attached drawing 3 gives safe capacity under different artifact powers with the variation for sending power.Obviously, function is sent
Rate is bigger, and safe capacity is bigger, and the almost linear increase in high s/n ratio.
Attached drawing 4 gives the curve that safe capacity changes with interrupt threshold.It can be seen that with the increase of interrupt threshold,
Safe capacity first increases and then decreases.Suitable thresholding is selected, safe capacity can be made to reach maximum.
To sum up, the shortcomings that the present invention overcomes traditional schemes is not eavesdropping end channel information, is not having antenna advantage, with
And that secure communication still not may be implemented in the case where external aid.
The present invention is not limited to the above embodiments, on the basis of technical solution disclosed by the invention, the skill of this field
For art personnel according to disclosed technology contents, one can be made to some of which technical characteristic by not needing creative labor
A little replacements and deformation, these replacements and deformation are within the scope of the invention.
Claims (7)
1. a kind of cordless communication network allied signal feedback and man made noise's safety of physical layer communication means, which is characterized in that packet
Include following step:
First stage, transmitting terminal use channel inversion technique, mix in the information s of need for confidentiality and be with varianceIt is artificial
Noise w1, send first stage signal xa1, guarantee that sending signal meets first stage power limitLegitimate receipt termination
Receive first stage informationAnd first stage Signal to Interference plus Noise Ratio is received accordinglyTermination is eavesdropped to receive including needing to protect
Close information s and mixes and be with varianceMan made noise w1First stage informationIt eavesdrops and holds and receive accordingly
First stage receives Signal to Interference plus Noise Ratio
Second stage, legitimate receipt end also use channel inversion technique, to transmitting terminal feedback signal xb, this feedback signal is base
The first stage information received is terminated in legitimate receiptIn feedback signal including need for confidentiality information s, mix with side
Difference isMan made noise w1, and mix and a certain amount of be with varianceGauss man made noise w2, guarantee feedback signal
Meet second stage power limitAnd mixed signal is fed back into transmitting terminal;Transmitting terminal is received in second stage
Feedback signal ya, transmitting terminal can be being with varianceMan made noise w1Disappear;End is eavesdropped to receive in second stage signal
ye2, eavesdropping end cannot be the man made noise w having1Disappear;It eavesdrops termination and receives corresponding second stage reception Signal to Interference plus Noise Ratio
γe2;
Phase III, transmitting terminal still use channel inversion technique, be sent in feedback signal including need for confidentiality information s,
It is with varianceGauss man made noise w2, and be contaminated with variance and beGauss man made noise w3SignalGuarantee
It sends signal and meets power limitLegitimate receipt end receives second stage signalIt receiving end can be w2Disappear;It closes
Method receiving end receives corresponding second stage and receives Signal to Interference plus Noise RatioIt eavesdrops end and receives phase III signalEavesdrop end
It cannot be w2Disappear, w2Sufficiently large damage is caused to end is eavesdropped;Eavesdrop the corresponding phase III reception Signal to Interference plus Noise Ratio of termination
γe3;
It is by introducing additional first stage varianceGauss man made noise w1, second stage variance beHigh this person
Work noise w2It is with phase III varianceGauss man made noise w3, and guarantee that second stage feedback signal meets second simultaneously
Stage power limitationAnd first stage and phase III send signal and meet first stage power limit
And to makeAnd then it shouldPower limit should be all larger than the power threshold of setting
p0, so thatWithLess than power limitLess than power limitTo realize transmitting terminal and reception
Secure communication between end;
In the first stage, work as channel coefficients | hAB|2Greater than interrupt threshold γ0When, transmitting terminal is sent using channel inversion technique
Signal:
xa1=(s+w1)/hAB
Wherein, s is the information of need for confidentiality, w1It is the Gauss man made noise mixed the first stage, its mean value is 0, and variance ishABIt is channel of the transmitting terminal to receiving end;
The power limit of transmitting terminalS and w1Variance must satisfy
Wherein,For the variance of the information of need for confidentiality, PaFor the instantaneous transmission power limit of transmitting terminal,To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2Probability density
Function.
2. the method according to claim 1, wherein legitimate receipt termination receives first in the first stage
Session information:
Wherein, hABFor the channel of transmitting terminal to receiving end,For the additive white Gaussian noise of legitimate receipt end in the first stage,
Value is 0, and variance is
It eavesdrops termination and receives first stage information:
Wherein, hAEIt is transmitting terminal to the channel for eavesdropping end, ne1It is the additive white Gaussian noise eavesdropped Duan in the first stage, mean value is
0, variance is
3. the method according to claim 1, wherein meeting condition in channel coefficients in the second stage | hBA
|2> γ0When, to transmitting terminal feedback signal:
α is to guarantee that feedback signal meets power limitCoefficient,It indicates are as follows:
Wherein,For the variance of the information of need for confidentiality, PbFor the instantaneous transmission power limit of transmitting terminal,To send letter
Number power limit,To seek 1/ | hBA|2Average value, wherein q (x) is channel coefficients | hBA|2
Probability density function.
4. the method according to claim 1, wherein transmission terminates at second stage receipts in the second stage
To feedback signal be
Wherein, naIt is the additive white Gaussian noise of transmitting terminal, mean value 0, variance isα is the coefficient for meeting power limit, table
It is shown as:
Wherein,For the variance of the information of need for confidentiality,For the variance yields of the additive white Gaussian noise of receiving end,To seek 1/ | hAB|2Average value, wherein p (x) is channel coefficients | hAB|2Probability density
Function;
Transmitting terminal can be w1Disappear, disappear w1Reception signal afterwards is
But eavesdrop the signal y that end is received in second stagee2, eavesdropping end cannot be the man made noise w having1Disappear;Eavesdrop end
Receive second stage signal ye2For
Wherein,It is to eavesdrop end in the additive white Gaussian noise of second stage, mean value 0, variance ishBEIt is that receiving end is arrived
The channel at end is eavesdropped,For the additive white Gaussian noise of legitimate receipt end in the first stage, mean value 0, variance is
5. the method according to claim 1, wherein in the phase III, when channel coefficients meet | hAB|2>
γ0When, send signal:
Wherein,For the w that disappears1Reception signal afterwards, β are to guarantee to send signal and meet power limitSystem
Number,It indicates are as follows:
Wherein,For the variance of the information of need for confidentiality,To seek 1/ | hAB|2Be averaged
Value, wherein p (x) is channel coefficients | hAB|2Probability density function.
6. the method according to claim 1, wherein in the phase III, legitimate receipt end receive second
Stage signal is
Wherein,It is additive white Gaussian noise of the legitimate receipt end in the phase III, mean value 0, variance is
Receiving end, which receives signal, to be become
At this point, the reception phase III signal for eavesdropping end is
Wherein,It is the additive white Gaussian noise eavesdropped Duan in the phase III, mean value 0, variance ishAE,2It is to eavesdrop end to exist
The channel of phase III.
7. the method according to claim 1, wherein the legitimate receipt end in the first and third stage receives accordingly
Signal to Interference plus Noise Ratio are as follows:
The white Gaussian noise at end is eavesdropped in the first, second and third stageWhen, eavesdropping end reception Signal to Interference plus Noise Ratio is
Wherein,For the variance of the information of need for confidentiality,For the variance of the additive white Gaussian noise of transmitting terminal,It is legal
The variance of the additive white Gaussian noise of receiving end in the first stage, α are to guarantee that feedback signal meets power limitCoefficient, β are to guarantee to send signal and meeting power limitCoefficient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394936.6A CN106131824B (en) | 2016-06-06 | 2016-06-06 | Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394936.6A CN106131824B (en) | 2016-06-06 | 2016-06-06 | Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106131824A CN106131824A (en) | 2016-11-16 |
CN106131824B true CN106131824B (en) | 2019-07-19 |
Family
ID=57270147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610394936.6A Active CN106131824B (en) | 2016-06-06 | 2016-06-06 | Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106131824B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106535177B (en) * | 2016-11-22 | 2019-07-05 | 浙江工业大学 | A kind of concealed communication method based on autoregression man made noise |
CN107017960B (en) * | 2017-03-24 | 2019-04-12 | 北京航空航天大学 | A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code |
CN107437963B (en) * | 2017-07-05 | 2020-10-20 | 深圳大学 | Distributed safe beam forming method and device based on feedback control |
CN107395260B (en) * | 2017-07-05 | 2020-12-01 | 深圳大学 | Distributed safe beam forming method and device based on artificial noise |
CN107360544B (en) * | 2017-07-05 | 2019-10-01 | 深圳大学 | The position of mobile equipment control method and device of dynamic noise based on Signal to Interference plus Noise Ratio |
WO2019006693A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Mobile device position control method and apparatus based on dynamic noise of channel information |
WO2019006714A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Distributed secure beamforming method and apparatus based on artificial noise |
CN107396307B (en) * | 2017-07-05 | 2019-12-31 | 深圳大学 | Mobile equipment position control method and device based on dynamic noise of channel information |
WO2019006715A1 (en) * | 2017-07-05 | 2019-01-10 | 深圳大学 | Distributed secure beamforming method and apparatus based on feedback control |
CN113746766B (en) * | 2021-06-23 | 2023-04-14 | 西安交通大学 | Channel self-adaptive noise aggregation wireless secure transmission method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883741A (en) * | 2015-04-09 | 2015-09-02 | 南京邮电大学 | Resource allocation algorithm for cognitive radio network |
CN105141559A (en) * | 2015-06-30 | 2015-12-09 | 西安交通大学 | Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system |
CN105263135A (en) * | 2015-07-24 | 2016-01-20 | 南京邮电大学 | Robustness safety design method for multiple input multiple output (MIMO) communication system |
CN105282739A (en) * | 2015-11-13 | 2016-01-27 | 西安交通大学 | Point-to-point secret key negotiation method based on physical layer pilot frequency presetting |
CN105491563A (en) * | 2015-12-31 | 2016-04-13 | 南方电网科学研究院有限责任公司 | Method and system for improving MISO security communication system safety rate by means of artificial noise |
-
2016
- 2016-06-06 CN CN201610394936.6A patent/CN106131824B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883741A (en) * | 2015-04-09 | 2015-09-02 | 南京邮电大学 | Resource allocation algorithm for cognitive radio network |
CN105141559A (en) * | 2015-06-30 | 2015-12-09 | 西安交通大学 | Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system |
CN105263135A (en) * | 2015-07-24 | 2016-01-20 | 南京邮电大学 | Robustness safety design method for multiple input multiple output (MIMO) communication system |
CN105282739A (en) * | 2015-11-13 | 2016-01-27 | 西安交通大学 | Point-to-point secret key negotiation method based on physical layer pilot frequency presetting |
CN105491563A (en) * | 2015-12-31 | 2016-04-13 | 南方电网科学研究院有限责任公司 | Method and system for improving MISO security communication system safety rate by means of artificial noise |
Also Published As
Publication number | Publication date |
---|---|
CN106131824A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106131824B (en) | Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means | |
Xi et al. | Instant and robust authentication and key agreement among mobile devices | |
Liu et al. | Multiple-input multiple-output Gaussian broadcast channels with confidential messages | |
Mo et al. | Secure beamforming for MIMO two-way communications with an untrusted relay | |
Wang et al. | Security enhancement of cooperative single carrier systems | |
CN106452503B (en) | Full duplex relaying safe transmission method based on power distribution energy acquisition technology | |
Wang et al. | Strategic antieavesdropping game for physical layer security in wireless cooperative networks | |
CN105915472B (en) | Power distribution method in collaborative network based on man made noise | |
Ekrem et al. | Capacity region of Gaussian MIMO broadcast channels with common and confidential messages | |
CN106131941B (en) | Cooperate non-ideal collaborative network power distribution method of the estimation based on man made noise of channel | |
CN106992836B (en) | Full duplex scrambling transmission method in a kind of untrusted junction network | |
CN104581960B (en) | A kind of multi-user Cooperation jamming power distribution method under secrecy outage probability constraint | |
Alves et al. | Enhanced physical layer security through transmit antenna selection | |
Alves et al. | On the performance of secure full-duplex relaying under composite fading channels | |
CN109067437A (en) | A kind of full duplex cooperation scrambling safe transmission method based on the selection of direct path optimal user | |
Ara et al. | A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer | |
Mei et al. | GSVD-based precoding in MIMO systems with integrated services | |
CN109660553A (en) | Downlink safe transmission strategy based on time reversal technology | |
Lai et al. | Key generation from wireless channels | |
CN107171775B (en) | Hybrid duplex transmission method for improving physical layer security in cognitive relay network | |
CN105099640A (en) | Joint time-frequency duplex shared channel characteristic obtaining method | |
CN106254029B (en) | The cooperation interference method of analog network coding system | |
Zhang et al. | Secrecy capacity optimization in coordinated multi-point processing | |
CN105392143B (en) | A kind of frequency spectrum access method that authorized user and cognitive user QoS based on power distribution ensure | |
Li et al. | Cooperative jamming secure scheme for untrusted full-duplex relay system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |