CN114826344B - Secret communication method based on cognitive radio in industrial Internet environment - Google Patents
Secret communication method based on cognitive radio in industrial Internet environment Download PDFInfo
- Publication number
- CN114826344B CN114826344B CN202210392002.4A CN202210392002A CN114826344B CN 114826344 B CN114826344 B CN 114826344B CN 202210392002 A CN202210392002 A CN 202210392002A CN 114826344 B CN114826344 B CN 114826344B
- Authority
- CN
- China
- Prior art keywords
- matrix
- ris
- secondary terminal
- terminal
- representing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
- H04B7/0486—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting taking channel rank into account
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0636—Feedback format
- H04B7/0639—Using selective indices, e.g. of a codebook, e.g. pre-distortion matrix index [PMI] or for beam selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a secret communication method based on cognitive radio in an industrial Internet environment, which is characterized in that in a large-scale multiple-input multiple-output cognitive radio wireless safety transmission system, a direct link between a secondary transmitter and a main terminal, a secondary terminal and an eavesdropper is blocked by an obstacle, communication can be carried out only through a reflection link assisted by RIS, and a transmission beam matrix, a reflection phase shift matrix and secondary terminal transmission power are designed according to an alternative optimization algorithm until the transmission power of the secondary terminal converges, so that the minimum transmission power is obtained; the remaining power is calculated, used to transmit the artificial noise signal, and an artificial noise transmit beam matrix is designed. The invention can relieve the problem of scarcity of the frequency spectrum under the condition that only the main terminal and the secondary terminal count the CSI and the unknown eavesdropper CSI are known, effectively improve the utilization rate of the frequency spectrum, effectively avoid the interference of artificial noise on the secondary terminal, ensure the communication quality of the secondary terminal and improve the safety performance of the system.
Description
Technical Field
The invention belongs to the field of industrial Internet, and particularly relates to a secret communication method based on cognitive radio, wherein the channel state information (Channel State Information, CSI) of an eavesdropper is unknown.
Background
With the overall advancement of new generation artificial intelligence, the "intelligent+" era has come. The industrial Internet forms intelligent application solutions for intelligent production, networking collaboration, personalized customization, service transformation and the like of different industrial scenes by taking data-driven intelligent decision as a core according to the capabilities of deep perception, intelligent analysis, high-efficiency processing, integrated intercommunication and the like, and the industrial Internet also goes into a new 2.0 development stage. Many resources of society including construction of smart cities and factories are gradually turned to informatization and dataization. The number of services in wireless systems has increased exponentially over the last two decades, the spectrum becoming a very scarce resource, and the concept of cognitive radio has therefore been proposed. It can utilize spectrum sensing and sharing techniques, alleviate the problem of spectrum resource scarcity, and is considered one of the most promising techniques. However, cognitive radio networks are limited by numerous security issues, such as: the master terminal of the physical layer interferes with and eavesdrops. Eavesdropping is a passive attack of the physical layer, which brings great security risks to the cognitive radio network due to the broadcast nature of the wireless channel.
The artificial noise technology is a means for improving the confidentiality of a system commonly used in physical layer security, and the main method is to add designed artificial noise into a transmitting signal in advance, and inhibit an eavesdropper on the premise of not interfering normal communication of a legal terminal, thereby achieving the effect of improving the confidentiality of the system.
Disclosure of Invention
The invention aims to solve the technical problem of overcoming the defects of the prior art and providing a secret communication method based on cognitive radio in an industrial Internet of things environment, which ensures normal communication of a secondary terminal and ensures that the interference of a secondary transmitter to a main terminal is within a certain threshold, and by alternately optimizing ideas, designing a RIS reflection phase shift matrix and a transmission beam matrix, optimizing the minimum transmission power of the secondary terminal, then interfering an eavesdropper through artificial noise, and designing a transmission beam matrix of the artificial noise, the safety performance of a system is improved.
The invention provides a secret communication method based on cognitive radio in an industrial Internet of things environment, which comprises the following steps:
s1, constructing a secret communication transmission system based on cognitive radio, which is applicable to an industrial Internet environment, wherein the system comprises a main transmitter, a main terminal with M antennas, a secondary transmitter with D antennas, a secondary terminal with N antennas, an eavesdropper with E antennas and an RIS integrating L low-power consumption reflecting units, direct links between the secondary transmitter and the main terminal, between the secondary terminal and the eavesdropper are blocked by barriers, and in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflecting link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a set threshold value, and a transmitting beam matrix initial value is set as a unit matrix;
s2, designing an RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal;
s3, designing a transmitting beam matrix according to the RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal, and calculating the transmitting power of the secondary terminal;
s4, repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value;
s5, designing a transmission beam matrix of artificial noise according to the minimum transmission power of the secondary terminal so as to achieve the purpose of inhibiting an eavesdropper and improving the safety performance of the system.
Further, in said step S1, the secondary transmitter is to RIS, RIS to the primary terminal, RIS to the secondary terminal, RIS to the eavesdropper' S channel G t The method comprises the following steps of:
wherein G is 0 Representing the secondary transmitter to RIS channel, G 1 Representing the channel of RIS to the master terminal, G 2 Representing the channel of RIS to secondary terminal, G 3 Representing the RIS channel to an eavesdropper,represents deterministic line-of-sight components of the channel, +.>Representing the non-line-of-sight component of the channel.
The received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Representing a useful signal with an average value of 0 transmitted by a secondary transmitter, transmitting a beam matrixE {. Cndot. } represents the expectation of the matrix, (. Cndot.) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is complex Gaussian white noise obeying independent same distribution, the mean value is 0, and the variance is sigma 2 ;Φ=diag([φ 1 ,φ2 2 ,...φ l ...,φ L ] T ) Is a RIS reflective phase shift matrix, wherein φ l Is the reflection coefficient of the first reflection unit and +.>j is an imaginary unit, θ l Is the amplitude of the first reflection unit and θ l ∈[0,2π)。
Setting the initial value of the transmission beam matrix Q as I M ,I M Representing an M x M identity matrix.
Further, the step S2 includes the steps of:
s201, calculating the rate of the secondary terminal with respect to the interference power constraint E { tr (G 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)Wherein P is I Is the maximum interference power threshold at the primary terminal; e {. Cndot. } represents the expectation of the matrix, tr (. Cndot.) represents the trace of the matrix; the interference power constraint inequality left-hand expression is specifically as follows:
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The spatial correlation matrix of the base station transmit antennas, the RIS reflection units, respectively.The specific expression of (2) is as follows:
wherein A is Lagrangian multiplier and v is such that Q satisfies trQ.ltoreq.MP T Parameters, P T Is the total transmit power of the system, lambda is a parameter that causes Q to meet the interference power constraint, R u (Q, Φ) is the rate of the secondary terminal, and the specific expression is as follows:
R 2 is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an l×l identity matrix.Is an equivalent channel parameter based on the system part CSI, and the specific expression is as follows:
in addition, { F, Γ, Θ, XI, ψ, ζ } are auxiliary variables, and can be obtained by the following expression:
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
s202, setting an initial projection gradient parameter mu and updating:
wherein mu * For updated projection gradient parameters, delta is the iteration step length of gradient rise, and delta=0.1 is taken;
s203, orderCalculating phase parameter θ of RIS reflective phase shift matrix * =[φ 1 ,φ 2 ,...φ l ...,φ L ] T Wherein->Is->Concerns phi l For any of l=1, 2,..:
wherein E is ll Is a matrix with values of 1 except for the first row and the first column, and the rest values are all 0, and gamma is an auxiliary function, and the specific expression is as follows:
s204, calculating RIS reflection phase shift matrix phi * =diag(θ * ) Calculating the rate R of the secondary terminal of the current iteration step u (Q,Φ * ) If the rate increment value of the secondary terminal is smaller than the set threshold value, outputting the RIS reflection phase shift matrix of the current iteration step as an optimal RIS reflection phase shift matrix phi opt Otherwise, S202 is returned.
Further, the step S3 includes the steps of:
s301, transmitting beam matrix Q * The method comprises the following steps:
wherein K and Λ Q Is an auxiliary variable, the expression of which is as follows:
wherein max { a, b } represents the greater number of a and b, V K Sum lambda K Is by means of alignment ofAuxiliary variable obtained by decomposing characteristic values, +.>Performing eigenvalue decompositionThe expression is->
S302, setting the upper limit P of the transmission power of the secondary terminal u And a lower limit P d Calculating the intermediate value of the two
S303, calculating the rate R of the secondary terminal u (Q * ,Φ opt ) And compared with the normal communication rate requirement γ=3, if R u (Q * ,Φ opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid 。
Further, the step S5 includes the steps of:
s501, calculating the residual power according to the minimum transmission power of the secondary terminal: p (P) r =P T -P min ;
S502, artificial noise transmission beam matrix:
wherein X is a statistical CSI expression of the secondary terminal, U AN Is that all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) represents the rank of the matrix. The specific expression of X is as follows:
compared with the prior art, the technical scheme provided by the invention has the following technical effects:
(1) The invention is more fit with reality, namely, under the condition that only the secondary terminal is known to count the CSI and the unknown eavesdropper is known, the RIS reflection phase shift matrix, the transmission beam matrix and the minimum transmission power of the secondary terminal are designed through the alternative optimization thought, artificial noise is introduced to inhibit the eavesdropper, and the transmission beam matrix of the artificial noise is designed according to the minimum transmission power of the secondary terminal, so that the invention is more true than the condition of the known eavesdropper CSI;
(2) The invention adopts the cognitive radio technology, utilizes spectrum sensing and sharing, ensures that the main transmitter, the main terminal, the secondary transmitter and the secondary terminal can communicate in the same frequency band, saves spectrum resources, relieves the problem of scarcity of spectrum, and simultaneously improves the safety performance of the system by design optimization.
Drawings
FIG. 1 is a flow chart of the present invention.
Fig. 2 is a schematic diagram of a system according to the present invention.
Detailed Description
The technical scheme of the invention is further described in detail below with reference to the accompanying drawings: the present embodiment is implemented on the premise of the technical scheme of the present invention, and a detailed implementation manner and a specific operation process are provided, but the protection rights of the present invention are not limited to the following embodiments.
The embodiment provides a secret communication method based on cognitive radio for safe transmission in an industrial Internet of things environment, which is characterized in that under the condition that normal communication of a secondary terminal and interference of a secondary transmitter to a main terminal is guaranteed to be within a certain threshold, an RIS reflection phase shift matrix and a transmission beam matrix are designed through an alternating optimization idea, minimum transmission power of the secondary terminal is optimized, then an eavesdropper is interfered through artificial noise, and a transmission beam matrix of the artificial noise is designed, so that the safety performance of a system is improved. As shown in fig. 1, the method specifically comprises the following steps:
step 1: constructing a cognitive radio secret communication system suitable for unknown eavesdropper CSI; as shown in fig. 2, the system includes a main transmitter, a main terminal having M antennas, a secondary transmitter having D antennas, a secondary terminal having N antennas, an eavesdropper having E antennas, and an RIS integrating L low power reflective units. The direct link between the secondary transmitter and the main terminal, the secondary terminal and the eavesdropper is blocked by the barrier, in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflection link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a certain threshold value, and a transmission beam matrix initial value is set, comprising the following steps:
step 1.1: secondary transmitter to RIS, RIS to primary terminal, RIS to secondary terminal, RIS to eavesdropper channel G t The method comprises the following steps of:
wherein, the liquid crystal display device comprises a liquid crystal display device,represents deterministic line-of-sight components of the channel, +.>Representing the non-line-of-sight component of the channel. The received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Representing a useful signal with an average value of 0 transmitted by a secondary transmitter, transmitting a beam matrix(·) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is complex Gaussian white noise obeying independent same distribution, the mean value is 0, and the variance is sigma 2 ;Φ=diag([φ 1 ,φ2 2 ,...φl l ...,φL L ] T ) Is a RIS reflective phase shift matrix, wherein φ l Is the reflection coefficient and->j is an imaginary unit, phi l Is the amplitude and θ of the RIS reflection unit l ∈[0,2π)。
Step 1.2: given an initial transmit beam matrix q=i M Wherein I M Is an m×m identity matrix;
step 2: in a large-scale multiple-input multiple-output cognitive radio secure communication system, designing a RIS reflective phase shift matrix by using statistical CSI, comprising the following steps:
step 2.1: given an initial transmit beam matrix q=i M Wherein I M Is an m×m identity matrix;
step 2.2: calculating secondary terminal rate with respect to interference power constraint E { tr (G) 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)Wherein P is I Is the maximum interference power threshold at the primary terminal; e {. Cndot. } represents the expectation of the matrix, tr (. Cndot.) represents the trace of the matrix; the interference power constraint inequality left-hand expression is specifically as follows:
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The spatial correlation matrices of the base station transmit antennas and the RIS reflection units, respectively.The specific expression of (2) is as follows:
where A is Lagrangian multiplier and v is Q * Satisfy trQ * ≤MP T Parameters, P T Is the total transmit power, lambda is Q * Parameters meeting interference power constraints, R u (Q, Φ) is the rate of the secondary terminal, and the specific expression is as follows:
wherein R is 2 Is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an l×l identity matrix.
Is an equivalent channel parameter based on the system part CSI, and the specific expression is as follows:
in addition, { F, Γ, Θ, XI, ψ, Γ } are auxiliary variables, and can be obtained by the following expression:
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
step 2.3: take the initial projection gradient parameter μ=0.5 and update μ * :
Wherein mu * The updated projection gradient parameter is that delta is the iteration step length of gradient rise, and delta=0.1 is taken;
step 2.4: order theCalculating phase parameter θ of RIS reflective phase shift matrix * =[φ 1 ,φ 2 ,...φ l ...,φ L ] T Wherein->Is->Concerns phi l For any of l=1, 2,..:
wherein E is ll Is a matrix with values of 1 except for the first row and the first column, and the rest values are all 0, and gamma is an auxiliary function, and the specific expression is as follows:
step 2.5: calculating RIS reflection phase shift matrix as phi * =diag(θ * ) Calculating the rate R of the secondary terminal u (Q,Φ * ) Until the rate increase value is smaller than a threshold value, obtaining an optimal reflection phase shift matrix phi opt 。
Step 3: according to the RIS reflection phase shift matrix, a transmission beam matrix is designed by using statistical CSI, and the transmission power of a secondary terminal is calculated, and the method specifically comprises the following steps:
step 3.1: transmit beam matrix Q * The method comprises the following steps:
wherein K and Λ Q Is an auxiliary variable, the expression of which is as follows:
wherein max { a, b } represents the greater number of a and b, V K Sum lambda K Is by means of alignment ofPerforming eigenvalue decomposition->The resulting auxiliary variable.
Step 3.2: setting an upper power limit P u And lower power limit P d Calculating the intermediate value between the two
Step 3.3: according to step 2,The RIS reflection phase shift matrix and the transmission beam matrix obtained in the step 3.1 calculate the rate R of the secondary terminal u (Q * ,Φ opt ) And compared with the normal communication rate requirement γ=3, if R u (Q * ,Φ opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid 。
Step 4: repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value.
Step 5: according to the minimum transmitting power of the secondary terminal, designing an artificial noise transmitting wave beam matrix, comprising the following steps:
step 5.1: calculating the residual power according to the minimum transmission power: p (P) r =P T -P min ;
Step 5.2: artificial noise transmit beam matrix:
wherein X is a statistical CSI expression of the secondary terminal, U AN The columns of (a) are all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) represents the rank of the matrix, and the specific expression of X is as follows:
in the large-scale multi-input multi-output cognitive radio wireless safety communication system, the direct links among the secondary transmitter, the main terminal, the secondary terminal and the eavesdropper are blocked by the barrier, and communication can be carried out only through the RIS-assisted reflection link. In order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, the interference of the secondary transmitter to the main terminal is required to be ensured to be within a certain threshold value, and the communication quality of the secondary terminal is required to be ensured. According to the invention, on the premise that only the statistical CSI of the main terminal and the secondary terminal and the CSI of the unknown eavesdropper are known, the problem of scarcity of the frequency spectrum is relieved, the utilization rate of the frequency spectrum is effectively improved, the interference of artificial noise to the secondary terminal can be effectively avoided, the communication quality of the secondary terminal is ensured, and the safety performance of the system is improved.
The foregoing is merely illustrative of the embodiments of the present invention, and the scope of the present invention is not limited thereto, and any person skilled in the art will appreciate that modifications and substitutions are within the scope of the present invention, and the scope of the present invention is defined by the appended claims.
Claims (3)
1. A secret communication method based on cognitive radio in an industrial internet environment, comprising the steps of:
s1, constructing a secret communication transmission system based on cognitive radio, which is applicable to an industrial Internet environment, wherein the system comprises a main transmitter, a main terminal with M antennas, a secondary transmitter with D antennas, a secondary terminal with N antennas, an eavesdropper with E antennas and an RIS integrating L low-power consumption reflecting units, direct links between the secondary transmitter and the main terminal, between the secondary terminal and the eavesdropper are blocked by barriers, and in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflecting link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a set threshold value, and a transmitting beam matrix initial value is set as a unit matrix;
s2, designing an RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal;
s3, designing a transmitting beam matrix according to the RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal, and calculating the transmitting power of the secondary terminal;
s4, repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value;
s5, designing a transmission beam matrix of artificial noise according to the minimum transmission power of the secondary terminal so as to achieve the purpose of inhibiting an eavesdropper and improving the safety performance of the system;
the step S3 includes the steps of:
s301, transmitting beam matrix Q * The method comprises the following steps:
wherein K and A Q Is an auxiliary variable:
wherein max { a, b } represents the greater number of a and b; v (V) K Sum lambda K Is by means of alignment ofAuxiliary variable obtained by decomposing characteristic values, +.>The expression for performing eigenvalue decomposition is +.>
S302, setting the upper limit of the transmission power of the secondary terminalP u And a lower limit P d Calculating the intermediate value of the two
S303, calculating the rate R of the secondary terminal u (Q * ,Φ opt ) If R is u (Q * ,Φ opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u (Q * ,Φ opt ) When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid The method comprises the steps of carrying out a first treatment on the surface of the Wherein γ represents the normal communication rate requirement;
the step S5 includes the steps of:
s501, calculating the residual power according to the minimum transmission power of the secondary terminal: p (P) r =P T -P min The method comprises the steps of carrying out a first treatment on the surface of the Wherein P is T Is the total transmit power of the system;
s502, the transmission beam matrix of the artificial noise is as follows:
wherein, X is the statistical CSI of the secondary terminal:
U AN the columns of (1) are all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) representing the rank of the matrix; g 0 Representing the secondary transmitter to RIS channel, G 2 Representing the channel of the RIS to the secondary terminal,representing deterministic line-of-sight components of the channel, t=0, 1,2,3, Φ is the RIS reflection phase shift matrix, R 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 Is the spatial correlation matrix of the base station transmitting antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas.
2. The method for secret communication based on cognitive radio in an industrial internet environment according to claim 1, wherein in step S1, the secondary transmitter to RIS, RIS to the primary terminal, RIS to the secondary terminal, RIS to the eavesdropper' S channel G t The method comprises the following steps of:
wherein G is 0 Representing the secondary transmitter to RIS channel, G 1 Representing the channel of RIS to the master terminal, G 2 Representing the channel of RIS to secondary terminal, G 3 Representing the RIS channel to an eavesdropper,represents deterministic line-of-sight components of the channel, +.>Representing the non-line-of-sight component of the channel;
the received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Useful signal representing a mean value of 0 transmitted by a secondary transmitter, transmitting a beam matrixE {. Cndot. } represents the expectation of the matrix, (. Cndot.) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is subject to independent same distribution, and has mean value of 0 and variance of sigma 2 Complex gaussian white noise of (a); Φ=diag ([ Φ) 1 ,φ 2 ,...φ l ...,φ L ] T ) Is a RIS reflective phase shift matrix, phi l Is the reflection coefficient of the first reflection unit, < ->j is an imaginary unit, θ l Is the amplitude of the first reflection unit, l=1, 2,;
setting the initial value of the transmission beam matrix Q as I M ,I M Representing an M x M identity matrix.
3. The method for secure communication based on cognitive radio in an industrial internet environment according to claim 2, wherein said step S2 comprises the steps of:
s201, calculating the rate of the secondary terminal with respect to the interference power constraint E { tr (G 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)Wherein P is I Is the maximum interference power threshold at the primary terminal; tr (·) represents the trace of the matrix;
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The space correlation matrixes of the base station transmitting antenna and the RIS reflecting unit are respectively;the specific expression of (2) is as follows:
wherein A is Lagrangian multiplier and v is such that Q satisfies trQ.ltoreq.MP T Is used for the control of the temperature of the liquid crystal display device,P T is the total transmit power of the system, lambda is a parameter that causes Q to meet the interference power constraint, R u (Q, Φ) is the rate of the secondary terminal:
wherein R is 2 Is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an L x L identity matrix;is based on the equivalent channel parameters of the system part CSI:
{ F, Γ, Θ, ε, ψ, Γ } is an auxiliary variable:
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
s202, setting an initial projection gradient parameter mu and updating:
wherein mu * For updated projection gradient parameters, delta is the iteration step of gradient rise;
s203, orderCalculating phase parameter θ of RIS reflective phase shift matrix * =[φ 1 ,φ 2 ,...φ l ...,φ L ] T Wherein->Representation->Concerns phi l For any l:
wherein E is ll Is a matrix with all the element values 0 except for the element value 1 of the first row and the first column, y is an auxiliary function:
s204, calculating RIS reflection phase shift matrix phi * =diag(θ * ) Calculating the rate R of the secondary terminal of the current iteration step u (Q,Φ * ) If the rate increment value up to the secondary terminal is smaller than the threshold value, outputting the RIS reflection phase shift matrix of the current iteration step as an optimal RIS reflection phase shift matrix phi opt Otherwise, S202 is returned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210392002.4A CN114826344B (en) | 2022-04-14 | 2022-04-14 | Secret communication method based on cognitive radio in industrial Internet environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210392002.4A CN114826344B (en) | 2022-04-14 | 2022-04-14 | Secret communication method based on cognitive radio in industrial Internet environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114826344A CN114826344A (en) | 2022-07-29 |
CN114826344B true CN114826344B (en) | 2023-07-04 |
Family
ID=82536992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210392002.4A Active CN114826344B (en) | 2022-04-14 | 2022-04-14 | Secret communication method based on cognitive radio in industrial Internet environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114826344B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114337762A (en) * | 2021-12-28 | 2022-04-12 | 南京邮电大学 | RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9654272B2 (en) * | 2013-03-08 | 2017-05-16 | Electronics & Telecommunications Research Institute | Method for multi-input multi-output communication in large-scale antenna system |
WO2018084622A1 (en) * | 2016-11-03 | 2018-05-11 | 엘지전자 주식회사 | Method for transmitting and receiving channel state information in wireless communication system and apparatus therefor |
-
2022
- 2022-04-14 CN CN202210392002.4A patent/CN114826344B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114337762A (en) * | 2021-12-28 | 2022-04-12 | 南京邮电大学 | RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI |
Also Published As
Publication number | Publication date |
---|---|
CN114826344A (en) | 2022-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint | |
Zhang et al. | Large system achievable rate analysis of RIS-assisted MIMO wireless communication with statistical CSIT | |
Liu et al. | Intelligent reflecting surface aided MISO uplink communication network: Feasibility and power minimization for perfect and imperfect CSI | |
Ihsan et al. | Energy-efficient IRS-aided NOMA beamforming for 6G wireless communications | |
Khan et al. | Joint spectrum and energy optimization of NOMA-enabled small-cell networks with QoS guarantee | |
Chu et al. | Resource allocation for IRS-assisted wireless-powered FDMA IoT networks | |
Hu et al. | Joint beamformer design for wireless fronthaul and access links in C-RANs | |
Gao et al. | Outage-constrained energy efficiency maximization for RIS-assisted WPCNs | |
Yang et al. | Mode modulation for wireless communications with a twist | |
CN112911587B (en) | Method for safely unloading anti-eavesdropping task by using physical layer under MEC-D2D environment | |
Huang et al. | Unsupervised learning-inspired power control methods for energy-efficient wireless networks over fading channels | |
Hu et al. | Secure downlink transmission in the Internet of Things: How many antennas are needed? | |
CN114337762A (en) | RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI | |
Xu et al. | Statistically robust transceiver design for multi-RIS assisted multi-user MIMO systems | |
Wang et al. | Intelligent omni-surface enhanced aerial secure offloading | |
Forouzanmehr et al. | Energy efficiency maximization for IRS-assisted uplink systems: Joint resource allocation and beamforming design | |
CN113395096A (en) | Physical layer secure transmission method based on deep learning in FDD system | |
Park et al. | Completion time minimization of fog-RAN-assisted federated learning with rate-splitting transmission | |
Mohamadi et al. | Low-complexity ADMM-based algorithm for robust multi-group multicast beamforming in large-scale systems | |
Ji et al. | A robust IRS-aided wireless information surveillance design with bounded channel errors | |
Gharagezlou et al. | Secrecy sum rate analysis and power allocation with OSTBC and artificial noise for MIMO systems | |
Zhang et al. | Deep reinforcement learning for secrecy energy efficiency maximization in ris-assisted networks | |
Li et al. | CSI-Impaired Secure Resource Allocation for SWIPT-Enabled Full-Duplex Consumer Internet of Things Networks in Smart Healthcare | |
CN114826344B (en) | Secret communication method based on cognitive radio in industrial Internet environment | |
Song et al. | PLS-based secrecy transmission for VANETs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |