CN111049552B - Multi-hop data secure transmission method, device and equipment based on power line communication - Google Patents

Multi-hop data secure transmission method, device and equipment based on power line communication Download PDF

Info

Publication number
CN111049552B
CN111049552B CN201911380136.9A CN201911380136A CN111049552B CN 111049552 B CN111049552 B CN 111049552B CN 201911380136 A CN201911380136 A CN 201911380136A CN 111049552 B CN111049552 B CN 111049552B
Authority
CN
China
Prior art keywords
power line
matrix
communication
hop
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911380136.9A
Other languages
Chinese (zh)
Other versions
CN111049552A (en
Inventor
张思建
林国营
张晓平
王鹏
曾争
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Power Technology Co Ltd
Original Assignee
China Southern Power Grid Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Power Technology Co Ltd filed Critical China Southern Power Grid Power Technology Co Ltd
Priority to CN201911380136.9A priority Critical patent/CN111049552B/en
Publication of CN111049552A publication Critical patent/CN111049552A/en
Application granted granted Critical
Publication of CN111049552B publication Critical patent/CN111049552B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/86Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Power Engineering (AREA)
  • Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention relates to a multi-hop data safe transmission method, a device and equipment based on power line communication, which comprises the steps of obtaining channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model; establishing a power line communication system model according to the actual channel model; inputting the combined receiving and transmitting matrix into a power line communication system model to obtain a target function; performing optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model; the power line is enabled to transmit data at a safe rate, so that safe communication is guaranteed, and data stealing by eavesdropping users is prevented. The technical problem of low safety of data transmission under a multi-hop broadband power line communication system in the prior art is solved.

Description

Multi-hop data secure transmission method, device and equipment based on power line communication
Technical Field
The invention relates to the technical field of data transmission safety, in particular to a multi-hop data safety transmission method, device and equipment based on power line communication.
Background
The multi-hop broadband power line communication is that a power line is used as a medium for signal transmission, when a signal is sent, data is modulated by using a modulation technology, the signal carrying information is loaded on a current, and then the signal is transmitted by using the power line; when receiving signal at receiving end, the received signal is passed through filter, then the modulated signal is taken out, then the original communication signal can be obtained by means of demodulation technology, and transferred into telephone or computer to implement information transmission.
At present, power lines are distributed in each household, the popularization range is extremely wide, a special line does not need to be additionally arranged, if the power lines are used as media to realize communication between a mobile terminal and an electric energy meter in a transformer area, the cost of acquiring electric energy data by a power grid is reduced, and the use value of the power lines can be improved. However, communication data between a mobile terminal and an electric energy meter in a cell is huge, so that huge and important data are transmitted on a power line with broadcasting characteristics, security and confidentiality transmission of the communication data is required, and how to realize confidentiality and security of data transmission on the power line is particularly important for ensuring physical layer security of multi-hop broadband power line communication.
Therefore, how to implement the physical layer security of the multi-hop broadband power line communication and ensure that the mobile terminal in the station area can perform secure communication with the electric energy meter becomes an important technical problem to be urgently solved by the technical personnel in the field.
Disclosure of Invention
The embodiment of the invention provides a multi-hop data secure transmission method, a device and equipment based on power line communication, which are used for solving the technical problems that in the prior art, the security of data transmission in a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
a multi-hop data secure transmission method based on power line communication is applied to communication data transmission between a mobile terminal and an electric energy meter in a distribution room, and comprises the following steps:
s1, acquiring channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model;
s2, establishing a power line communication system model according to the actual channel model;
s3, inputting the combined receiving and transmitting matrix into the power line communication system model to obtain a target function;
and S4, carrying out optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model.
Preferably, the communication parameters include the number of paths of each of the communication channels, transmission distances of the paths, signal frequencies, and communication nodes:
wherein the communication node is operable to eavesdrop on transmission data on the communication channel by a user.
Preferably, the actual channel model of the multi-hop broadband power line is according to the following formula:
Figure BDA0002341978280000021
where i is the number of the path, giA (f, d) is a natural number having a weight coefficient of not more than 1 for each pathi) Is the attenuation coefficient, alpha, of the communication channel0、α1And k is an attenuation parameter, k is 0.5-1, diIs the transmission distance of the ith path, τiFor the time delay on path i
Figure BDA0002341978280000022
c0Is the speed of light,. epsilonrIs the dielectric constant of the multi-hop broadband power line.
Preferably, the power line communication system model comprises a transmitting end, a relay end and a receiving end, and the mean value of all the communication nodes for receiving data is zero and the variance σ is based on additive white gaussian noise2And processing to obtain a channel matrix of a link among the transmitting end, the relay and the receiving end.
Preferably, the joint transceiving matrix comprises a transmitting precoding matrix, a relay coding matrix and a receiving filtering matrix; the objective function comprises the constraints of all transmitting powers, the constraints of the number of communication channels and the constraints of the mean square error of an eavesdropping user, and when the constraints of the transmitting powers of a transmitting end and an interrupting end are met, the objective function is as follows:
Figure BDA0002341978280000023
s.t.∶MSEe,k≥εk
Figure BDA0002341978280000024
Figure BDA0002341978280000025
wherein K is a natural number of not less than 1, { UkIs the transmit precoding matrix, { V }mIs the relay coding matrix, { W }kIs the receive filter matrix, { W }e,kThe reception filtering matrix, MSE, of the eavesdropping userkMean square error, MSE, of data transmitted over the multi-hop broadband power line for a receiving ende,kFor the mean square error of the eavesdropping user on the transmitted data,
Figure BDA0002341978280000031
is the transmission power of the transmitting end,
Figure BDA0002341978280000032
for interrupting the transmission power of the terminal, PskIs the maximum transmission power, P, of the transmitting endrmIs the maximum transmission power of the interrupt terminal, epsilonkIs MSEe,kIs measured.
Preferably, the step of performing an optimized solution on the objective function according to the iterative distributed algorithm includes:
s41, setting initial values for matrix variables of the transmitting pre-coding matrix and the relay coding matrix, and calculating an optimal linear matrix of the receiving filter matrix by adopting the iterative distributed algorithm;
s42, solving to obtain an optimized receiving filter matrix of the eavesdropping user according to the objective function;
s43, based on the optimal linear matrix, the optimal receiving filter matrix and the relay coding matrix obtained in the step S41 through iteration, calculating by adopting the iterative distributed algorithm to obtain an optimized transmitting precoding matrix;
and S44, calculating by adopting the iterative distributed algorithm to obtain an optimized relay coding matrix based on the optimal linear matrix, the optimized receiving filter matrix and the optimized transmitting precoding matrix.
Preferably, the computing step according to the iterative distributed algorithm comprises:
s01, initializing, setting an iteration counter n to be 0, and setting the mean square error TMSE of a receiving end(n)Setting a matrix variable of the transmit precoding matrix and the relay coding matrix to an initial value of 0
Figure BDA0002341978280000033
And
Figure BDA0002341978280000034
s02, the transmitting pre-coding matrix obtained according to the objective function
Figure BDA0002341978280000035
And the relay coding matrix
Figure BDA0002341978280000036
Calculating to obtain the receiving filter matrix of the eavesdropping user
Figure BDA0002341978280000037
And said receive filter matrix
Figure BDA0002341978280000038
S03. obtained by iteration in step S02
Figure BDA0002341978280000039
And
Figure BDA00023419782800000310
and
Figure BDA00023419782800000311
optimizing the objective function to obtain an updated transmission precoding matrix
Figure BDA00023419782800000312
S04. according to the obtained
Figure BDA00023419782800000313
And
Figure BDA00023419782800000314
optimizing and updating the objective function to obtain
Figure BDA00023419782800000315
And calculating the mean square error TMSE of the receiving end(n+1)
S05. if TMSE(n+1)-TMSE(n)Xi is less than or equal to xi, and the calculation of the iterative distributed algorithm is ended; if TMSE(n+1)-TMSE(n)>ξ, n ═ n +1, said step S02 is performed;
where ξ is the difference in values between a given two iterations.
Preferably, the communication rates of the eavesdropping user and a legal user receiving end are solved according to the optimal linear matrix, the optimized relay coding matrix and the optimized transmitting precoding matrix, and the safe rate of the legal user receiving end for transmitting data through the multi-hop broadband power line is obtained according to the following formula, wherein the safe rate is greater than 0; the formula for the safe rate is:
RateDk=max(0,comDk)-max(0,comE),k=1,......k
wherein, comDkAnd the comE is the communication rate of the interception user.
The invention also provides a multi-hop data safety transmission device based on power line communication, which is applied to the communication data transmission between the mobile terminal and the electric energy meter in a transformer area and comprises the following steps:
the actual channel model unit is used for constructing channel transfer functions corresponding to the communication channels one by one according to the acquired channel state information and communication parameters of the communication channels on the multi-hop broadband power line, and the communication parameters are combined with an MK model to construct an actual channel model for the channel transfer functions;
the power line communication system model unit is used for establishing a power line communication system model according to the actual channel model;
establishing an objective function unit for inputting the combined transceiving matrix into the power line communication system model to obtain an objective function;
and the computing unit is used for carrying out optimization solution by adopting an iterative distributed algorithm according to the objective function to obtain the safe rate of multi-hop data safe transmission on the power line communication system model.
The invention also provides a device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the multi-hop data secure transmission method based on power line communication according to the instruction in the program code.
According to the technical scheme, the embodiment of the invention has the following advantages:
1. the multi-hop data safe transmission method based on power line communication comprises the steps of obtaining channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model; establishing a power line communication system model according to the actual channel model; inputting the combined receiving and transmitting matrix into a power line communication system model to obtain a target function; and performing optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model. According to the multi-hop data secure transmission method based on the power line communication, the secure rate of the multi-hop data secure transmission of the power line communication is obtained through the joint transceiving matrix and the objective function optimized by the iterative distribution algorithm, so that the power line performs data transmission at the secure rate, the secure communication is ensured, and the condition that a wiretap user steals data is prevented. The technical problems that in the prior art, the safety of data transmission in a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal are solved;
2. the multi-hop data safety transmission device based on the power line communication constructs an actual channel model through an actual channel model unit, a combined receiving and transmitting matrix is input into a power line communication system model through a target function establishing unit to obtain a target function, and then a computing unit is used for optimizing according to the target function through an iterative distributed algorithm to solve and obtain the safety rate of multi-hop data safety transmission, so that the power line carries out data transmission at the safety rate, the safety communication is guaranteed, and a wiretap user is prevented from stealing data. The technical problems that in the prior art, the safety of data transmission under a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating steps of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 2 is a graph of amplitude-frequency characteristics of a communication channel MK model of 5 paths of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 3 is a block diagram of data transmission of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 4 is a block diagram of a transmission data multi-hop broadband power line communication system according to a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 5 is a block diagram of a multi-hop broadband power line communication system according to a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 6 is a flowchart of a step of performing optimization solution on an objective function of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 7 is a frame diagram of steps of an iterative distributed algorithm calculation of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 8 is a graph illustrating a trend of a safety rate and a communication rate of a multi-hop data safety transmission method based on power line communication according to an embodiment of the present invention.
Fig. 9 is a convergence diagram of an iterative distribution algorithm of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
Fig. 10 is a block diagram of a multi-hop data security transmission apparatus based on power line communication according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the present application, for the interpretation of data:
relaying: is a transmission path between two switching centers, and a trunk is a physical connection carrying multiple logical links.
Electric energy meter: the device for metering the electric energy of the low-voltage user can generate various electric energy data.
Physical layer-the lowest layer in a computer network model, provides mechanical, electrical, functional, and canonical features for the creation, maintenance, and teardown of the physical links needed to transmit data.
Shannon theorem: the upper limit (bits per second) of the channel information transfer rate is given in relation to the channel signal-to-noise ratio and the bandwidth.
The physical layer security is always concentrated on the multi-hop relay network and is used for resisting an external eavesdropper, and the existing technology for preventing the eavesdropper from stealing information by the multi-hop relay network and improving the security of the multi-hop relay network comprises the following steps:
firstly, a combined relay and interference selection scheme is proposed to improve the security of the multihop relay network, but only one node is selected as a relay, and all nodes are not fully utilized.
And secondly, the problem of safe resource allocation by adopting a two-hop single-relay network is that under the condition that an eavesdropper exists, a cooperative interference technology is considered and not applied, and a safety enhancement algorithm of the communication of the Internet of things exposed to the eavesdropper is forcibly used in transmission design.
Thirdly, the problem of improving the safety of important data in the Internet of things is researched, and eavesdroppers can combine the observations of the eavesdroppers and extremely decode signals. In the presence of cellular interference, in a relay-assisted internet of things system, when the Mean Square Error (MSE) at a legitimate receiver is at a low value and the MSE at an eavesdropper is large, the precoding matrix is optimized.
Although physical layer security of multihop relay networks has been widely studied, the resulting physical layer security problem remains a significant challenge when relay networks face interference. A joint power control and beamforming algorithm is proposed in current physical layer security studies for multi-hop relay networks to minimize the total transmission power while keeping the signal-to-interference-plus-noise ratio (SINR) at each receiver above a desired threshold and by an iterative distributed algorithm for jointly designing transmit precoding matrices and receive filter matrices for secure communication over MIMO interference channels by an eavesdropper.
The above-described researches on the data transmission security of the multi-hop relay network are theoretically researched, and no consideration is given to the data transmission of the multi-hop relay network realized by adopting a power line in practice.
Therefore, the embodiment of the application provides a multi-hop data secure transmission method, a device and equipment based on power line communication, and is used for solving the technical problems that in the prior art, the security of data transmission in a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal.
The first embodiment is as follows:
fig. 1 is a flowchart illustrating steps of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a multi-hop data secure transmission method based on power line communication, which is applied to communication data transmission between a mobile terminal and an electric energy meter in a distribution room, and includes the following steps:
s1, acquiring channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model;
s2, establishing a power line communication system model according to the actual channel model;
s3, inputting the combined receiving and transmitting matrix into a power line communication system model to obtain a target function;
and S4, performing optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model.
In the power system, the station area refers to a power supply range or area of (one) transformer. The mobile terminal can be a PC, a computer, a mobile phone, a palm computer and the like.
In the step S1 of the embodiment of the present invention, channel state information and communication parameters of a communication channel (BPLC) on the multi-hop broadband power line are first obtained, and channel transfer functions corresponding to the respective power lines are constructed according to the communication parameters, that is, several channel transfer functions are constructed to use several differential channels of the multi-hop broadband power line. The BPLC communication channel has strong frequency selective attenuation characteristics, related parameters of an MK model are obtained from field measurement data on the multi-hop broadband power line communication channel through the MK model, and the MK model of the BPLC channel is established, wherein the signal frequency range used by the MK model is 500 kHz-20 MHz.
It should be noted that the MK Model is described in the Power Line Channel in the High Frequency Range Multi-Path Signal transmission Model (a Multi-Path Signal Propagation Model) published in manfrad · emermann and claus · dus, and in this embodiment, the construction and operation principle of the MK Model are not explained. In this embodiment, a BPLC communication channel simulation of 5 paths of a multi-hop broadband power line communication channel is performed, and a communication channel attenuation parameter α is taken0=0,α1=1.5×10-9s/m,k=1,εr=3.8,c0=3.0×108m/s, channel parameters are shown in Table 1 below:
TABLE 1 communication channel MK model parameter Table for 5 paths
Figure BDA0002341978280000081
Fig. 2 is a graph of amplitude-frequency characteristics of a communication channel MK model of 5 paths of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 2, as can be known from an MK model amplitude-frequency characteristic graph, the frequency fading characteristics of each communication channel on the multi-hop broadband power line are obtained, that is, the attenuation increases with the increase of the frequency; meanwhile, serious frequency selective fading exists in a partial frequency range of the signal frequency, so that the channel characteristics of the communication channel can be obtained, and an actual channel model is constructed.
Fig. 3 is a block diagram of data transmission of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 3, in the data transmission of the power line communication in the embodiment of the present invention, a data signal is sent by a signal source, the data signal is encoded by an encoder to obtain an encoded data transmission signal, the data transmission signal is transmitted to a decoder by using a main channel of the power line for decoding, and a legitimate user obtains the data signal transmitted on the power line. If the eavesdropping user eavesdrops the data signal transmitted in the power line, the eavesdropping user eavesdrops the data transmission signal through an eavesdropping channel. Specifically, because the communication channel of the multi-hop broadband power line has the existence of the eavesdropping user, the constructed actual channel model is the eavesdropping channel model.
Fig. 4 is a block diagram of a transmission data multi-hop broadband power line communication system of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention, and fig. 5 is a block diagram of a multi-hop broadband power line communication system of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 4 and 5, in step S2 of the embodiment of the present invention, since the actual channel model requires data transmission through the multi-hop broadband power line communication system, K transmitting terminals are adopted to attempt to transmit data to corresponding receiving terminals with the help of M relay nodes, and since the differential channel of the power line is at most 4, the value of K is at most 4. The power line communication system model comprises a transmitting end, a relay and a receiving end, wherein the set of the transmitting end, the relay, the receiving end and the corresponding transmitting end-receiving end pair is expressed as { Sk}、{Rm}、{Dk}and{(Sk,Dk) -wherein K1.. said., K; m1. The eavesdropping user is denoted by E. Furthermore, the transmitting end { Sk}, Relay { Rm}, receiving end { DkBoth the eavesdropping user and the twitter user are provided with Tk、Qm、NkAnd NeA communication channel. Assuming that the communication paths between all the communication nodes undergo slow changesThe actual channel model, and all receiving communication nodes receive a mean of zero and a variance of σ2And (2) Additive White Gaussian Noise (AWGN), and using Hkm、GmkAnd GmeDenotes Sk-Rm、Rm-DkAnd Rm-a channel matrix of the E-link.
It should be noted that, if an eavesdropping user tries to steal secret data from the power line, the direct connection between the transmitting end and the receiving end is negligible according to the path loss of the power line and the limitation of the transmission power. Because the eavesdropping user needs to be close to the receiving end and far away from the transmitting end when stealing data from the power line, when the eavesdropping user is far away, the eavesdropping user can not hear the signal of the transmitting end easily, therefore, the communication safety protection needs to be carried out on the link between the relay and the eavesdropping user, and the link between the transmitting end and the eavesdropping user is ignored. When one of the transmitting terminals transmits a signal to a corresponding receiving terminal and the other transmitting terminals synchronously transmit the signal, an interference channel exists in the system.
In the embodiment of the invention, a joint transceiving matrix is introduced into a power line communication system model to obtain an objective function for realizing the safety of a multi-hop broadband power line communication physical layer, and the objective function is optimized and solved by adopting an iterative distributed algorithm to obtain the safety rate of multi-hop data safety transmission on the power line communication system model.
It should be noted that the joint transceiving matrix includes a transmit precoding matrix, a relay coding matrix, and a receive filtering matrix. In the multi-hop broadband power line communication realized in the presence of an eavesdropping user, the safety of the communication between a mobile terminal of a platform area and an electric energy meter is ensured, the transmitting end and a relay are limited by transmitting power, an iterative distributed algorithm is adopted to optimize a transmitting pre-coding matrix, a relay coding matrix and a receiving filter matrix, and the mean square error of the eavesdropping user is larger than that of a legal user, so that the safety rate of multi-hop data safety transmission on a power line communication system model is calculated. Under the condition that an eavesdropping user exists, the safe speed of the power line communication multi-hop data safe transmission is obtained through the transmitting pre-coding matrix, the relay coding matrix, the receiving filter matrix and the objective function optimized by the iterative distribution algorithm, so that the power line carries out data transmission at the safe speed, and the safe communication is ensured.
The invention provides a multi-hop data safe transmission method based on power line communication, which comprises the steps of obtaining channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model; establishing a power line communication system model according to the actual channel model; inputting the combined receiving and transmitting matrix into a power line communication system model to obtain a target function; and performing optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model. According to the multi-hop data secure transmission method based on the power line communication, the secure rate of the multi-hop data secure transmission of the power line communication is obtained through the joint transceiving matrix and the objective function optimized by the iterative distribution algorithm, so that the power line performs data transmission at the secure rate, the secure communication is ensured, and the condition that a wiretap user steals data is prevented. The technical problems that in the prior art, the safety of data transmission under a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal are solved.
In one embodiment of the present invention, the communication parameters include the number of paths of each communication channel, the transmission distance of the paths, the signal frequency, and the communication node;
wherein the communication node can be used for eavesdropping a user stealing transmission data on the communication channel.
In one embodiment of the present invention, the actual channel model of the multi-hop broadband power line is determined according to the following formula:
Figure BDA0002341978280000101
Figure BDA0002341978280000111
where i is the number of the path, giA (f, d) is a natural number having a weight coefficient of not more than 1 for each pathi) For the attenuation coefficient of the communication channel, alpha0、α1And k is an attenuation parameter, k is 0.5-1, diIs the transmission distance of the ith path, τiFor the time delay on path i
Figure BDA0002341978280000112
c0Is the speed of light,. epsilonrIs the dielectric constant of the multi-hop broadband power line.
It should be noted that the magnitude of the attenuation coefficient of the communication channel is determined by the path length and frequency of the communication channel.
In an embodiment of the present invention, the objective function includes constraints of each transmission power, constraints of the number of communication channels, and constraints of mean square error of eavesdropping users, and when the transmission power constraints of the transmitting end and the interrupting end are satisfied, the following formula (13) of the objective function is:
Figure BDA0002341978280000113
s.t.∶MSEe,k≥εk
Figure BDA0002341978280000114
Figure BDA0002341978280000115
wherein K is a natural number of not less than 1, { UkIs the transmit precoding matrix, { V }mIs the relay coding matrix, { W }kIs the receive filter matrix, { W }e,kThe reception filtering matrix, MSE, of the eavesdropping userkMean square error, MSE, of data transmitted over the multi-hop broadband power line for a receiving ende,kIs that it isThe eavesdropping user's mean square error on the transmitted data,
Figure BDA0002341978280000116
is the transmission power of the transmitting end,
Figure BDA0002341978280000117
for interrupting the transmission power of the terminal, PskIs the maximum transmission power, P, of the transmitting endrmIs the maximum transmit power at the interrupt end, s.t. is an abbreviation for subject to ∈kIs MSEe,kIs measured. Specifically, { Uk}、{Vm}、{WkThe destination matrix of the joint receiving and sending matrix needing optimized solution, { We,kAnd the eavesdropping user designs an optimal filter matrix suitable for the eavesdropping user according to self conditions. Wherein s.t. means in the formula (13)
Figure BDA0002341978280000118
Subject to MSEe,k≥εk
Figure BDA0002341978280000119
And
Figure BDA00023419782800001110
constraints of these three formulas.
It should be noted that, in the process of transmitting data through the multi-hop broadband power line, the communication between the transmitting end and the corresponding receiving end is completed through two time slots. In the first time slot, the transmitting end SkData skIs sent to the relay RmThen relay RmReceives the input signal using its receiving communication channel and forwards the signal y in a second time slotrmIs sent to a corresponding receiving end DkThe eavesdropping user then eavesdrops on the secret data at this time. In relay RmAnd a receiving end DkAnd the reception signal of the eavesdropping user can be expressed as follows:
Figure BDA0002341978280000121
Figure BDA0002341978280000122
Figure BDA0002341978280000123
wherein the content of the first and second substances,
Figure BDA0002341978280000124
is a relay RmA received signal of (a);
Figure BDA0002341978280000125
is a receiving end DkA received signal of (a); y ise∈CNe×1Is to intercept the received signal of the user;
Figure BDA0002341978280000126
is a transmitting terminal SkAnd relay RmA communication channel coefficient matrix therebetween;
Figure BDA0002341978280000127
is a relay RmAnd a receiving end DkA communication channel coefficient matrix therebetween;
Figure BDA0002341978280000128
is a relay RmA communication channel coefficient matrix between the eavesdropping user and the eavesdropping user;
Figure BDA0002341978280000129
is at the transmitting end SkIs transmitted signal Sk
Figure BDA00023419782800001210
And
Figure BDA00023419782800001211
is in the relay RmAnd a receiving end DkAnd additive white Gaussian noise of the eavesdropping user, both of whichThe value is zero and the variance is respectively
Figure BDA00023419782800001212
And
Figure BDA00023419782800001213
in order to minimize the total Mean Square Error (MSE) of a receiving end to realize safe communication, a transmitting pre-coding matrix, a relay coding matrix and a receiving filter matrix are jointly designed to be optimized and solved to obtain a target matrix under the constraint condition of transmitting power of a transmitting end and a relay. In particular, in transmitting data skPreviously, a transmit precoding matrix U was usedkTo the transmitting terminal SkTransmitted data skAnd (6) coding is carried out. Also, a relay coding matrix V is usedmFor relay RmTransmitted data yrmAnd (6) coding is carried out. Then at relay RmReceiving end DkAnd the received signal of the eavesdropping user can be re-expressed as:
Figure BDA00023419782800001214
Figure BDA00023419782800001215
Figure BDA00023419782800001216
using a linear receive filter matrix WkTo process the receiving end DkWhile eavesdropping users will also use the filter matrix We,kTo handle the own received signal of the eavesdropping user. Thus, the receiving end DkAnd eavesdropping on the user-pair data skThe measured values of (a) can be expressed as:
Figure BDA00023419782800001217
Figure BDA0002341978280000131
wherein, WkAnd We,kAre each Nk×Tk、Ne×TkThe receive filter matrix of (1). Suppose a transmitting end SkTransmitted data skThe covariance matrix of the signal is
Figure BDA0002341978280000132
Therefore, at the receiving end D can be obtained from the formula (7)kFor data skMean square error MSE of signalkComprises the following steps:
Figure BDA0002341978280000133
likewise, data s of eavesdropping user can be obtainedkMean square error MSE of signale,kComprises the following steps:
Figure BDA0002341978280000134
the transmit power limit at the transmitting end and the relay can be expressed as:
Figure BDA0002341978280000135
Figure BDA0002341978280000136
wherein P isskAnd PrmIs shown at the transmitting end SkAnd relay RmThe maximum transmit power of.
In the case where an eavesdropping user exists, a signal from the transmitting end may leak to the eavesdropper. Considering the worst case, assume that an eavesdropper can compute the linear reception matrix We,kTo minimize itMean square error MSE of its owne,kAnd it knows all the channel state information. Therefore, an optimal transmission precoding matrix (U) needs to be designedkAnd a relay coding matrix (V)mAnd a receive filter matrix WkMinimizing the total MSE of all receivers and making the MSEe,kIs kept at a given threshold value epsilonk(K1.... K.) above, while satisfying the transmit power constraints of the transmitting end and the relay.
According to the characteristics of the objective function, a transmitting pre-coding matrix, a relay coding matrix and a receiving filtering matrix are designed in a combined mode so as to reduce the total Mean Square Error (MSE) of all legal receivers and enable the MSE of eavesdropping userse,kAt a given threshold value epsilonkAnd (K) above, the physical layer safety of multi-hop broadband power line communication is ensured, and the data safety transmission between the mobile terminal in the station area and the electric energy meter is ensured.
Fig. 6 is a flowchart of a step of performing optimization solution on an objective function of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 6, in an embodiment of the present invention, the step of performing an optimized solution on the objective function according to the iterative distributed algorithm includes:
s41, setting initial values for matrix variables of the transmitting pre-coding matrix and the relay coding matrix, and calculating an optimal linear matrix of the receiving filter matrix by adopting the iterative distributed algorithm;
s42, solving to obtain an optimized receiving filter matrix of the eavesdropping user according to the objective function;
s43, based on the optimal linear matrix, the optimal receiving filter matrix and the relay coding matrix obtained in the step S41 through iteration, calculating by adopting the iterative distributed algorithm to obtain an optimized transmitting precoding matrix;
and S44, calculating by adopting the iterative distributed algorithm to obtain an optimized relay coding matrix based on the optimal linear matrix, the optimized receiving filter matrix and the optimized transmitting precoding matrix.
Because the formula (13) has a plurality of matrix variables, an iterative distributed algorithm is adopted to solve and obtain the optimal target matrix of the transmitting pre-coding matrix, the relay coding matrix and the receiving filter matrix. The iterative distributed algorithm calculates the other matrix variable by the two matrix variables obtained by the previous iteration and sequentially loops. The objective function can be expressed in terms of the total mean square error TMSE, as follows:
Figure BDA0002341978280000141
it should be noted that, in the first iterative computation of the transmitting pre-coding matrix, the relay coding matrix and the receiving filter matrix by using the iterative distributed algorithm, the { U } is set firstkAnd { V }mThe initial value of { W } is calculatedkThe optimal solution of. Then, in the next iteration, we use the { U ] obtained in the last iterationkAnd { V }mTo calculate the optimal Wk}。
As can be seen from equation (13) for the objective function, { WkAnd { W }e,kIndependent of transmit power constraints at the transmitting end and the relay. By a linear MMSE receiver, an optimal linear receiving matrix { W) for minimizing the total mean square error MSE of a receiving end can be obtainedk},{We,kThe formula of is:
Figure BDA0002341978280000142
similarly, { We,kThe formula of is:
Figure BDA0002341978280000151
precoding matrix for transmission { UkIs solved, in particular, a reception filtering matrix { W) obtained according to equations (15) and (16)kAnd { W }e,kAfter, can be according to { W }k}、{We,kGet from last iterationIs (V) { VmSolving by adopting an iterative distributed algorithm to obtain a transmitting precoding matrix (U) of the iterationk}. For further analysis, the TMSE of equation (14) may be expressed specifically as:
Figure BDA0002341978280000152
definition of
Figure BDA0002341978280000153
Equation (17) can be simplified as:
Figure BDA0002341978280000154
definition of
Figure BDA0002341978280000155
Equation (18) is simplified as:
Figure BDA0002341978280000156
wherein
Figure BDA0002341978280000157
And gamma and the matrix variable { U }kIt is irrelevant and can therefore be considered as a constant. Definition of
Figure BDA0002341978280000158
Then equation (19) can be further expressed as:
Figure BDA0002341978280000159
to simplify the above solving process, the following transformation formula is introduced, and the formula is:
tr(AHB)=(vec(A))Hvec(B),
Figure BDA00023419782800001510
Figure BDA00023419782800001511
definition of
Figure BDA00023419782800001512
And
Figure BDA00023419782800001513
wherein
Figure BDA00023419782800001514
Equation (20) may be replaced with:
TMSE=uHωu-ψu-uHψH+γ (21)
wherein
Figure BDA00023419782800001516
Figure BDA00023419782800001515
Similarly, the mean square error MSE of the eavesdropping usere,kCan be expressed as:
Figure BDA0002341978280000161
wherein the content of the first and second substances,
Figure BDA0002341978280000162
Figure BDA0002341978280000163
Figure BDA0002341978280000164
and
Figure BDA0002341978280000165
due to the fact that
Figure BDA0002341978280000166
In the case of power limitation at the transmitting end, equation (11) can be expressed as:
Figure BDA0002341978280000167
equation (23) can be simplified as:
uHρu≤Psk,k=1,…,K (24)
wherein
Figure BDA0002341978280000168
From equations (21), (22) and (24), the transmit precoding matrix { U ] is obtainedkThe optimization formula of can be expressed as:
Figure BDA0002341978280000169
transmitting precoding matrix { U }kThe optimization formula (25) of (9) is a quadratic constraint quadratic programming problem, and compared with the problem of the objective function formula (13), the optimization formula (25) can be obtained by CVX of MATLAB toolbox.
For relay coding matrix VmSolving the optimization formula, specifically, the above-mentioned optimized formula is obtained because of { W }k}、{We,kAnd { U }kAll obtained, the total mean square error TMSE of the receiver can be expressed as:
Figure BDA00023419782800001610
wherein the content of the first and second substances,
Figure BDA00023419782800001611
definition, V ═ bd(V1,V2,…,VM),
Figure BDA00023419782800001612
Figure BDA00023419782800001613
The total mean square error TMSE at the receiver end of equation (26) is then reduced to:
Figure BDA00023419782800001614
Figure BDA0002341978280000171
definition v ═ vec (v), then equation (27) can be further simplified as:
TMSE=vHΩv-Ov-vHOH+vHμv+β (28)
wherein the content of the first and second substances,
Figure BDA0002341978280000172
similarly, the mean square error MSE of the eavesdropping usere,kCan be expressed as:
Figure BDA0002341978280000173
wherein the content of the first and second substances,
Figure BDA0002341978280000174
Figure BDA0002341978280000175
due to the fact that
Figure BDA0002341978280000176
And
Figure BDA0002341978280000177
wherein the content of the first and second substances,
Figure BDA0002341978280000178
Figure BDA0002341978280000179
the power limit at the relay can be expressed as:
vHλv≤Prm,m=1,…,M (30)
wherein the content of the first and second substances,
Figure BDA00023419782800001710
from equations (28), (29) and (30), the relay coding matrix { V }mThe optimization formula of can be expressed as:
Figure BDA00023419782800001711
wherein, relay coding matrix { VmThe optimization formula (31) of (1) is a quadratic constraint quadratic programming problem, and compared with the formula (13) of the objective function, the optimization formula (31) can be obtained by CVX of MATLAB tool box.
Fig. 7 is a frame diagram of steps of an iterative distributed algorithm calculation of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
In one embodiment of the invention, the computing step according to the iterative distributed algorithm comprises:
s01, initializing, setting an iteration counter n to be 0, and setting the mean square error TMSE of a receiving end(n)Setting a matrix variable of the transmit precoding matrix and the relay coding matrix to an initial value of 0
Figure BDA0002341978280000181
And
Figure BDA0002341978280000182
s02, the transmitting pre-coding matrix obtained according to the objective function
Figure BDA0002341978280000183
And the relay coding matrix
Figure BDA0002341978280000184
Calculating to obtain the receiving filter matrix of the eavesdropping user
Figure BDA0002341978280000185
And said receive filter matrix
Figure BDA0002341978280000186
S03. obtained by iteration in step S02
Figure BDA0002341978280000187
And
Figure BDA0002341978280000188
and
Figure BDA0002341978280000189
optimizing the objective function to obtain an updated transmission precoding matrix
Figure BDA00023419782800001810
S04. according to the obtained
Figure BDA00023419782800001811
And
Figure BDA00023419782800001812
optimizing and updating the objective function to obtain
Figure BDA00023419782800001813
And calculating the mean square error TMSE of the receiving end(n+1)
S05. if TMSE(n+1)-TMSE(n)Xi less than or equal toBundling the iterative distributed algorithm computations; if TMSE(n+1)-TMSE(n)>ξ, n ═ n +1, said step S02 is performed;
where ξ is the difference in values between a given two iterations.
It should be noted that, according to the iterative distributed algorithm, the transmission precoding matrix { U }is obtainedkAnd a relay coding matrix (V)mAnd a receive filter matrix WkH, where n represents the nth iteration.
In an embodiment of the present invention, the communication rate between the eavesdropping user and the legal user receiving end is solved according to the optimal linear matrix, the optimized relay coding matrix and the optimized transmitting precoding matrix, and the safe rate of the legal user receiving end for transmitting data through the multi-hop broadband power line is obtained according to the following formula, where the safe rate is greater than 0; the formula for the safe rate is:
RateDk=max(0,comDk)-max(0,comE),k=1,......k
wherein, comDkAnd the comE is the communication rate of the interception user.
It should be noted that, as known from shannon theory, secure communication can be realized only when the secure rate is greater than 0. At the receiving end DkThe communication rate with the eavesdropping user can be expressed as:
Figure BDA00023419782800001814
Figure BDA00023419782800001815
according to the theory principle, the physical layer safety of the multi-hop broadband power line communication system can be finally realized.
Fig. 8 is a graph illustrating a trend of a safety rate and a communication rate of a multi-hop data safety transmission method based on power line communication according to an embodiment of the present invention.
As shown in fig. 8, the number of channels of all communication nodes is 3, and as compared with the conventional method, it can be known from fig. 8 that the proposed algorithm can ensure that the security rate increases with the increase of SNR, the communication rates of three links are close, the security rate is similar, and there is almost no difference between three legitimate users. It can be known from fig. 8 that the achieved security rate is lower than the communication rate, because the destination matrix calculated by using the iterative distributed algorithm sacrifices part of the communication rate in order to achieve the security of data transmission.
Fig. 9 is a convergence diagram of an iterative distribution algorithm of a multi-hop data secure transmission method based on power line communication according to an embodiment of the present invention.
According to K3, 4, 5, M3 and PSk=PrmThe number of channels of all communication nodes is 3, 20 dB. As can be seen in fig. 9, TMSE gradually decreases as the number of iterations increases until convergence. Specifically, the TMSE always converges within the range of 2-4 iterations, and in addition, as the number of legal transceiving pairs increases, the convergence speed of the algorithm decreases, and the TMSE increases, because more legal transceiving pairs increase the system complexity and the interference between each legal transceiving pair, resulting in more iterations being required to achieve convergence, while increasing the TMSE.
Example two:
fig. 10 is a block diagram of a multi-hop data security transmission apparatus based on power line communication according to an embodiment of the present invention.
As shown in fig. 10, an embodiment of the present invention provides a multi-hop data security transmission apparatus based on power line communication, which is applied to communication data transmission between a mobile terminal and an electric energy meter in a distribution room, and includes:
the actual channel model unit 101 is configured to construct channel transfer functions corresponding to each communication channel one to one according to the acquired channel state information and communication parameters of each communication channel on the multi-hop broadband power line, and each communication parameter is combined with the MK model to construct an actual channel model for each channel transfer function;
a power line communication system model unit 102, configured to establish a power line communication system model according to an actual channel model;
an objective function establishing unit 103, configured to input the joint transceiving matrix into a power line communication system model to obtain an objective function;
and the calculating unit 104 is configured to perform optimization solution by using an iterative distributed algorithm according to the objective function to obtain a safety rate of multi-hop data safety transmission on the power line communication system model.
It should be noted that the communication parameters, the MK model, the actual channel model, the power line communication system model, the joint transceiving matrix, the objective function, and the solution to the safe rate have been described in detail in the embodiments, but are not described in the embodiments
The multi-hop data safety transmission device based on the power line communication provided by the invention constructs an actual channel model through an actual channel model unit, a combined transceiving matrix is input into a power line communication system model by adopting a target function establishing unit to obtain a target function, and the safety rate of multi-hop data safety transmission is obtained by solving through a computing unit according to the target function by adopting iterative distributed algorithm optimization, so that the power line performs data transmission at the safety rate, the safety communication is ensured, and an eavesdropping user is prevented from stealing data. The technical problems that in the prior art, the safety of data transmission under a multi-hop broadband power line communication system is low, and communication data in the power line communication system is easy to steal are solved.
Example three:
the embodiment of the invention provides equipment, which comprises a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the multi-hop data secure transmission method based on power line communication according to an instruction in a program code.
It should be noted that the processor is configured to execute the steps in the embodiment of the multi-hop data secure transmission method based on power line communication, such as the steps S1 to S4 shown in fig. 1, according to the instructions in the program code. Alternatively, the processor, when executing the computer program, implements the functions of each module/unit in each device embodiment described above, for example, the functions of units 101 to 104 shown in fig. 10.
Illustratively, a computer program may be partitioned into one or more modules/units, which are stored in a memory and executed by a processor to accomplish the present application. One or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of a computer program in a terminal device.
The terminal device may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor, a memory. Those skilled in the art will appreciate that the terminal device is not limited and may include more or fewer components than those shown, or some components may be combined, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage may be an internal storage unit of the terminal device, such as a hard disk or a memory of the terminal device. The memory may also be an external storage device of the terminal device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal device. Further, the memory may also include both an internal storage unit of the terminal device and an external storage device. The memory is used for storing computer programs and other programs and data required by the terminal device. The memory may also be used to temporarily store data that has been output or is to be output.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A multi-hop data secure transmission method based on power line communication is applied to communication data transmission between a mobile terminal and an electric energy meter in a distribution room, and is characterized by comprising the following steps:
s1, acquiring channel state information and communication parameters of each communication channel on a multi-hop broadband power line, constructing channel transfer functions corresponding to each communication channel one by one according to each communication parameter, and constructing an actual channel model for each channel transfer function by combining each communication parameter with an MK model;
s2, establishing a power line communication system model according to the actual channel model;
s3, inputting the combined receiving and transmitting matrix into the power line communication system model to obtain a target function;
s4, performing optimization solution on the objective function by adopting an iterative distributed algorithm to obtain the safe rate of multi-hop data safe transmission on the power line communication system model;
the joint transceiving matrix comprises a transmitting precoding matrix, a relay coding matrix and a receiving filtering matrix; the objective function comprises the constraints of all transmitting powers, the constraints of the number of communication channels and the constraints of the mean square error of an eavesdropping user, and when the constraints of the transmitting powers of a transmitting end and an interrupting end are met, the objective function is as follows:
Figure FDA0003046282210000011
s.t.:MSEe,k≥εk
Figure FDA0003046282210000012
Figure FDA0003046282210000013
wherein K is a natural number of not less than 1, { UkIs the transmit precoding matrix, { V }mIs the relay coding matrix, { W }kIs the receive filter matrix, { W }e,kThe reception filtering matrix, MSE, of the eavesdropping userkMean square error, MSE, of data transmitted over the multi-hop broadband power line for a receiving ende,kFor the mean square error of the eavesdropping user on the transmitted data,
Figure FDA0003046282210000014
is the transmission power of the transmitting end,
Figure FDA0003046282210000015
for interrupting the transmission power of the terminal, PskIs the maximum transmission power, P, of the transmitting endrmIs the maximum transmission power of the interrupt terminal, epsilonkIs MSEe,kIs measured.
2. The multi-hop data secure transmission method based on power line communication according to claim 1, wherein the communication parameters include the number of paths of each of the communication channels, the transmission distance of the paths, the signal frequency, and the communication nodes; wherein the communication node is operable to eavesdrop on transmission data on the communication channel by a user.
3. The secure multi-hop data transmission method based on power line communication according to claim 2, wherein the actual channel model of the multi-hop broadband power line is defined as follows:
Figure FDA0003046282210000021
Figure FDA0003046282210000022
where i is the number of the path, giA (f, d) is a natural number having a weight coefficient of not more than 1 for each pathi) Is the attenuation coefficient, alpha, of the communication channel0、α1And k is an attenuation parameter, k is 0.5-1, diIs the transmission distance of the ith path, τiFor the time delay on path i
Figure FDA0003046282210000023
c0Is the speed of light,. epsilonrIs the dielectric constant of the multi-hop broadband power line.
4. The secure multi-hop data transmission method based on power line communication as claimed in claim 2, wherein the power line communication system model comprises a transmitting endThe average value of all the communication nodes for receiving data is zero and the variance sigma is based on additive white Gaussian noise2And processing to obtain a channel matrix of a link among the transmitting end, the relay and the receiving end.
5. The multi-hop data secure transmission method based on power line communication according to claim 1, wherein the step of performing optimized solution on the objective function according to the iterative distributed algorithm comprises:
s41, setting initial values for matrix variables of the transmitting pre-coding matrix and the relay coding matrix, and calculating an optimal linear matrix of the receiving filter matrix by adopting the iterative distributed algorithm;
s42, solving to obtain an optimized receiving filter matrix of the eavesdropping user according to the objective function;
s43, based on the optimal linear matrix, the optimal receiving filter matrix and the relay coding matrix obtained in the step S41 through iteration, calculating by adopting the iterative distributed algorithm to obtain an optimized transmitting precoding matrix;
and S44, calculating by adopting the iterative distributed algorithm to obtain an optimized relay coding matrix based on the optimal linear matrix, the optimized receiving filter matrix and the optimized transmitting precoding matrix.
6. The secure multi-hop data transmission method based on power line communication according to claim 5, wherein the calculating step according to the iterative distributed algorithm comprises:
s01, initializing, setting an iteration counter n to be 0, and setting the mean square error TMSE of a receiving end(n)Setting a matrix variable of the transmit precoding matrix and the relay coding matrix to an initial value of 0
Figure FDA0003046282210000024
And
Figure FDA0003046282210000025
s02, the transmitting pre-coding matrix obtained according to the objective function
Figure FDA0003046282210000026
And the relay coding matrix
Figure FDA0003046282210000027
Calculating to obtain the receiving filter matrix of the eavesdropping user
Figure FDA0003046282210000028
And said receive filter matrix
Figure FDA0003046282210000029
S03. obtained by iteration in step S02
Figure FDA00030462822100000210
And
Figure FDA00030462822100000211
and
Figure FDA00030462822100000212
optimizing the objective function to obtain an updated transmission precoding matrix
Figure FDA0003046282210000031
S04. according to the obtained
Figure FDA0003046282210000032
And
Figure FDA0003046282210000033
optimizing and updating the objective function to obtain
Figure FDA0003046282210000034
And calculating the mean square error TMSE of the receiving end(n+1)
S05. if TMSE(n+1)-TMSE(n)Xi is less than or equal to xi, and the calculation of the iterative distributed algorithm is ended; if TMSE(n+1)-TMSE(n)>ξ, n ═ n +1, said step S02 is performed;
where ξ is the difference in values between a given two iterations.
7. The secure multi-hop data transmission method based on power line communication according to claim 5, wherein the communication rates of the eavesdropping user and the legal user receiving end are solved according to the optimal linear matrix, the optimized relay coding matrix and the optimized transmitting pre-coding matrix, and the secure rate of the legal user receiving end for transmitting data through the multi-hop broadband power line is obtained according to the following formula, and the secure rate is greater than 0; the formula for the safe rate is:
RateDk=max(0,comDk)-max(0,comE),k=1,......k
wherein, comDkAnd the comE is the communication rate of the interception user.
8. A multi-hop data safety transmission device based on power line communication is applied to communication data transmission between a mobile terminal and an electric energy meter in a transformer area, and is characterized by comprising the following components:
the actual channel model unit is used for constructing channel transfer functions corresponding to the communication channels one by one according to the acquired channel state information and communication parameters of the communication channels on the multi-hop broadband power line, and the communication parameters are combined with an MK model to construct an actual channel model for the channel transfer functions;
the power line communication system model unit is used for establishing a power line communication system model according to the actual channel model;
establishing an objective function unit for inputting the combined transceiving matrix into the power line communication system model to obtain an objective function;
the computing unit is used for carrying out optimization solution by adopting an iterative distributed algorithm according to the objective function to obtain the safe rate of multi-hop data safe transmission on the power line communication system model;
the joint transceiving matrix comprises a transmitting precoding matrix, a relay coding matrix and a receiving filtering matrix; the objective function comprises the constraints of all transmitting powers, the constraints of the number of communication channels and the constraints of the mean square error of an eavesdropping user, and when the constraints of the transmitting powers of a transmitting end and an interrupting end are met, the objective function is as follows:
Figure FDA0003046282210000041
s.t.:MSEe,k≥εk
Figure FDA0003046282210000042
Figure FDA0003046282210000043
wherein K is a natural number of not less than 1, { UkIs the transmit precoding matrix, { V }mIs the relay coding matrix, { W }kIs the receive filter matrix, { W }e,kThe reception filtering matrix, MSE, of the eavesdropping userkMean square error, MSE, of data transmitted over the multi-hop broadband power line for a receiving ende,kFor the mean square error of the eavesdropping user on the transmitted data,
Figure FDA0003046282210000044
is the transmission power of the transmitting end,
Figure FDA0003046282210000045
for interrupting the transmission power of the terminal, PskIs the maximum transmission power, P, of the transmitting endrmIs the maximum transmission power of the interrupt terminal, epsilonkIs MSEe,kIs measured.
9. The multi-hop data safety transmission equipment based on the power line communication is characterized by comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the multi-hop data secure transmission method based on power line communication according to any one of claims 1 to 7 according to instructions in the program code.
CN201911380136.9A 2019-12-27 2019-12-27 Multi-hop data secure transmission method, device and equipment based on power line communication Active CN111049552B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911380136.9A CN111049552B (en) 2019-12-27 2019-12-27 Multi-hop data secure transmission method, device and equipment based on power line communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911380136.9A CN111049552B (en) 2019-12-27 2019-12-27 Multi-hop data secure transmission method, device and equipment based on power line communication

Publications (2)

Publication Number Publication Date
CN111049552A CN111049552A (en) 2020-04-21
CN111049552B true CN111049552B (en) 2021-06-29

Family

ID=70239346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911380136.9A Active CN111049552B (en) 2019-12-27 2019-12-27 Multi-hop data secure transmission method, device and equipment based on power line communication

Country Status (1)

Country Link
CN (1) CN111049552B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714065B (en) * 2021-01-13 2022-02-25 广州技象科技有限公司 Multi-stage jump transmission method and device for electricity consumption data
CN114285438B (en) * 2021-12-19 2023-08-22 广东电力通信科技有限公司 Dual-mode communication configuration method for 230M and power line carrier terminal
CN115733835B (en) * 2023-01-10 2023-04-28 南京科讯次元信息科技有限公司 Unidirectional oversized file transmission data processing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560843A (en) * 2013-11-08 2014-02-05 成都立鑫新技术科技有限公司 Power line information monitoring method and monitoring device thereof
CN107888251A (en) * 2017-08-25 2018-04-06 国网山东省电力公司莱芜供电公司 The physical layer communication method and apparatus of multiple-input and multiple-output electric line communication system
CN108551357A (en) * 2018-04-19 2018-09-18 南方电网科学研究院有限责任公司 A kind of coding-decoding method and device of electric line communication system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437867B (en) * 2011-10-19 2014-01-15 上海炜呈智能电力科技有限责任公司 Power line communication equipment based on channel cognitive technology
US9495865B2 (en) * 2014-11-24 2016-11-15 At&T Intellectual Property I, L.P. Power-line communications
CN109525984B (en) * 2018-10-16 2022-03-01 西安电子科技大学 Method for improving safety rate of untrusted relay energy-carrying communication system
CN110572872B (en) * 2019-09-05 2022-05-17 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560843A (en) * 2013-11-08 2014-02-05 成都立鑫新技术科技有限公司 Power line information monitoring method and monitoring device thereof
CN107888251A (en) * 2017-08-25 2018-04-06 国网山东省电力公司莱芜供电公司 The physical layer communication method and apparatus of multiple-input and multiple-output electric line communication system
CN108551357A (en) * 2018-04-19 2018-09-18 南方电网科学研究院有限责任公司 A kind of coding-decoding method and device of electric line communication system

Also Published As

Publication number Publication date
CN111049552A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
CN111049552B (en) Multi-hop data secure transmission method, device and equipment based on power line communication
CN108234072B (en) Method and apparatus for sub-block decoding of data signal
CN103516407A (en) Transmission mode selection method, antenna transmitting and receiving combination determination method, apparatus and system thereof
CN107040341B (en) Apparatus and method for reordering subblock decoding
CN107276716B (en) Method and apparatus for decoding data signal
CN111614419A (en) NOMA-based high-safety unloading resource allocation method for mobile edge computing network task
US20150229459A1 (en) Interference Cancellation in TDD Massive MIMO Wireless Systems
CN112333702A (en) Optimization method for delay minimization based on safe NOMA moving edge calculation
KR101904011B1 (en) Recursive sub-block decoding
CN107172701A (en) A kind of power distribution method of non-orthogonal multiple access system
TW201635736A (en) Signal detection method and device
EP3229428B1 (en) Methods and devices for sequential sphere decoding
Peng et al. Performance analysis and optimization for RIS-assisted multi-user massive MIMO systems with imperfect hardware
Antonioli et al. On the energy efficiency of cell-free systems with limited fronthauls: Is coherent transmission always the best alternative?
Mahboubi et al. Layered interference alignment: Achieving the total DOF of MIMO X-channels
CN108365916B (en) Method and apparatus for sub-block decoding data signal
CN112566159B (en) Enhanced small cell downlink communication method based on MIMO-NOMA
KR100932260B1 (en) Decoding device and method for multiple input multiple output system
Taghizadeh et al. Quantization-aided secrecy: FD C-RAN communications with untrusted radios
Maleki et al. Distributed robust beamforming in multi-user relay network
Hasabelnaby et al. Multi-pair computation for c-ran with intra-cloud and inter-cloud communications
Tian et al. Relay-aided interference alignment for the X channel with limited CSI
Liang et al. Cooperative amplify-and-forward beamforming for OFDM systems with multiple relays
Liu et al. On secret key generation from multiple observations of wireless channels
CN109768815B (en) Non-trust bidirectional relay multi-antenna cooperative communication method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 501-503, annex building, Huaye building, No.1-3 Chuimao new street, Xihua Road, Yuexiu District, Guangzhou City, Guangdong Province 510000

Applicant after: China Southern Power Grid Power Technology Co.,Ltd.

Address before: Room 501-503, annex building, Huaye building, No.1-3 Chuimao new street, Xihua Road, Yuexiu District, Guangzhou City, Guangdong Province 510000

Applicant before: GUANGDONG ELECTRIC POWER SCIENCE RESEARCH INSTITUTE ENERGY TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant