CN114826344B - Secret communication method based on cognitive radio in industrial Internet environment - Google Patents

Secret communication method based on cognitive radio in industrial Internet environment Download PDF

Info

Publication number
CN114826344B
CN114826344B CN202210392002.4A CN202210392002A CN114826344B CN 114826344 B CN114826344 B CN 114826344B CN 202210392002 A CN202210392002 A CN 202210392002A CN 114826344 B CN114826344 B CN 114826344B
Authority
CN
China
Prior art keywords
matrix
ris
secondary terminal
terminal
representing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210392002.4A
Other languages
Chinese (zh)
Other versions
CN114826344A (en
Inventor
张军
赵慧妤
许文婉
朱洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202210392002.4A priority Critical patent/CN114826344B/en
Publication of CN114826344A publication Critical patent/CN114826344A/en
Application granted granted Critical
Publication of CN114826344B publication Critical patent/CN114826344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • H04B7/0486Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting taking channel rank into account
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0619Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
    • H04B7/0636Feedback format
    • H04B7/0639Using selective indices, e.g. of a codebook, e.g. pre-distortion matrix index [PMI] or for beam selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a secret communication method based on cognitive radio in an industrial Internet environment, which is characterized in that in a large-scale multiple-input multiple-output cognitive radio wireless safety transmission system, a direct link between a secondary transmitter and a main terminal, a secondary terminal and an eavesdropper is blocked by an obstacle, communication can be carried out only through a reflection link assisted by RIS, and a transmission beam matrix, a reflection phase shift matrix and secondary terminal transmission power are designed according to an alternative optimization algorithm until the transmission power of the secondary terminal converges, so that the minimum transmission power is obtained; the remaining power is calculated, used to transmit the artificial noise signal, and an artificial noise transmit beam matrix is designed. The invention can relieve the problem of scarcity of the frequency spectrum under the condition that only the main terminal and the secondary terminal count the CSI and the unknown eavesdropper CSI are known, effectively improve the utilization rate of the frequency spectrum, effectively avoid the interference of artificial noise on the secondary terminal, ensure the communication quality of the secondary terminal and improve the safety performance of the system.

Description

Secret communication method based on cognitive radio in industrial Internet environment
Technical Field
The invention belongs to the field of industrial Internet, and particularly relates to a secret communication method based on cognitive radio, wherein the channel state information (Channel State Information, CSI) of an eavesdropper is unknown.
Background
With the overall advancement of new generation artificial intelligence, the "intelligent+" era has come. The industrial Internet forms intelligent application solutions for intelligent production, networking collaboration, personalized customization, service transformation and the like of different industrial scenes by taking data-driven intelligent decision as a core according to the capabilities of deep perception, intelligent analysis, high-efficiency processing, integrated intercommunication and the like, and the industrial Internet also goes into a new 2.0 development stage. Many resources of society including construction of smart cities and factories are gradually turned to informatization and dataization. The number of services in wireless systems has increased exponentially over the last two decades, the spectrum becoming a very scarce resource, and the concept of cognitive radio has therefore been proposed. It can utilize spectrum sensing and sharing techniques, alleviate the problem of spectrum resource scarcity, and is considered one of the most promising techniques. However, cognitive radio networks are limited by numerous security issues, such as: the master terminal of the physical layer interferes with and eavesdrops. Eavesdropping is a passive attack of the physical layer, which brings great security risks to the cognitive radio network due to the broadcast nature of the wireless channel.
The artificial noise technology is a means for improving the confidentiality of a system commonly used in physical layer security, and the main method is to add designed artificial noise into a transmitting signal in advance, and inhibit an eavesdropper on the premise of not interfering normal communication of a legal terminal, thereby achieving the effect of improving the confidentiality of the system.
Disclosure of Invention
The invention aims to solve the technical problem of overcoming the defects of the prior art and providing a secret communication method based on cognitive radio in an industrial Internet of things environment, which ensures normal communication of a secondary terminal and ensures that the interference of a secondary transmitter to a main terminal is within a certain threshold, and by alternately optimizing ideas, designing a RIS reflection phase shift matrix and a transmission beam matrix, optimizing the minimum transmission power of the secondary terminal, then interfering an eavesdropper through artificial noise, and designing a transmission beam matrix of the artificial noise, the safety performance of a system is improved.
The invention provides a secret communication method based on cognitive radio in an industrial Internet of things environment, which comprises the following steps:
s1, constructing a secret communication transmission system based on cognitive radio, which is applicable to an industrial Internet environment, wherein the system comprises a main transmitter, a main terminal with M antennas, a secondary transmitter with D antennas, a secondary terminal with N antennas, an eavesdropper with E antennas and an RIS integrating L low-power consumption reflecting units, direct links between the secondary transmitter and the main terminal, between the secondary terminal and the eavesdropper are blocked by barriers, and in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflecting link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a set threshold value, and a transmitting beam matrix initial value is set as a unit matrix;
s2, designing an RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal;
s3, designing a transmitting beam matrix according to the RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal, and calculating the transmitting power of the secondary terminal;
s4, repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value;
s5, designing a transmission beam matrix of artificial noise according to the minimum transmission power of the secondary terminal so as to achieve the purpose of inhibiting an eavesdropper and improving the safety performance of the system.
Further, in said step S1, the secondary transmitter is to RIS, RIS to the primary terminal, RIS to the secondary terminal, RIS to the eavesdropper' S channel G t The method comprises the following steps of:
Figure BDA0003596001040000021
wherein G is 0 Representing the secondary transmitter to RIS channel, G 1 Representing the channel of RIS to the master terminal, G 2 Representing the channel of RIS to secondary terminal, G 3 Representing the RIS channel to an eavesdropper,
Figure BDA0003596001040000022
represents deterministic line-of-sight components of the channel, +.>
Figure BDA0003596001040000023
Representing the non-line-of-sight component of the channel.
The received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Representing a useful signal with an average value of 0 transmitted by a secondary transmitter, transmitting a beam matrix
Figure BDA0003596001040000024
E {. Cndot. } represents the expectation of the matrix, (. Cndot.) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is complex Gaussian white noise obeying independent same distribution, the mean value is 0, and the variance is sigma 2 ;Φ=diag([φ 1 ,φ2 2 ,...φ l ...,φ L ] T ) Is a RIS reflective phase shift matrix, wherein φ l Is the reflection coefficient of the first reflection unit and +.>
Figure BDA0003596001040000025
j is an imaginary unit, θ l Is the amplitude of the first reflection unit and θ l ∈[0,2π)。
Setting the initial value of the transmission beam matrix Q as I M ,I M Representing an M x M identity matrix.
Further, the step S2 includes the steps of:
s201, calculating the rate of the secondary terminal with respect to the interference power constraint E { tr (G 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)
Figure BDA0003596001040000026
Wherein P is I Is the maximum interference power threshold at the primary terminal; e {. Cndot. } represents the expectation of the matrix, tr (. Cndot.) represents the trace of the matrix; the interference power constraint inequality left-hand expression is specifically as follows:
Figure BDA0003596001040000031
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The spatial correlation matrix of the base station transmit antennas, the RIS reflection units, respectively.
Figure BDA0003596001040000032
The specific expression of (2) is as follows:
Figure BDA0003596001040000033
wherein A is Lagrangian multiplier and v is such that Q satisfies trQ.ltoreq.MP T Parameters, P T Is the total transmit power of the system, lambda is a parameter that causes Q to meet the interference power constraint, R u (Q, Φ) is the rate of the secondary terminal, and the specific expression is as follows:
Figure BDA0003596001040000034
R 2 is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an l×l identity matrix.
Figure BDA0003596001040000035
Is an equivalent channel parameter based on the system part CSI, and the specific expression is as follows:
Figure BDA0003596001040000036
Figure BDA0003596001040000037
Figure BDA0003596001040000038
Figure BDA0003596001040000039
in addition, { F, Γ, Θ, XI, ψ, ζ } are auxiliary variables, and can be obtained by the following expression:
Figure BDA00035960010400000310
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
Figure BDA00035960010400000311
Figure BDA00035960010400000312
Figure BDA0003596001040000041
s202, setting an initial projection gradient parameter mu and updating:
Figure BDA0003596001040000042
wherein mu * For updated projection gradient parameters, delta is the iteration step length of gradient rise, and delta=0.1 is taken;
s203, order
Figure BDA0003596001040000043
Calculating phase parameter θ of RIS reflective phase shift matrix * =[φ 12 ,...φ l ...,φ L ] T Wherein->
Figure BDA0003596001040000044
Is->
Figure BDA0003596001040000045
Concerns phi l For any of l=1, 2,..:
Figure BDA0003596001040000046
wherein E is ll Is a matrix with values of 1 except for the first row and the first column, and the rest values are all 0, and gamma is an auxiliary function, and the specific expression is as follows:
Figure BDA0003596001040000047
s204, calculating RIS reflection phase shift matrix phi * =diag(θ * ) Calculating the rate R of the secondary terminal of the current iteration step u (Q,Φ * ) If the rate increment value of the secondary terminal is smaller than the set threshold value, outputting the RIS reflection phase shift matrix of the current iteration step as an optimal RIS reflection phase shift matrix phi opt Otherwise, S202 is returned.
Further, the step S3 includes the steps of:
s301, transmitting beam matrix Q * The method comprises the following steps:
Figure BDA0003596001040000048
wherein K and Λ Q Is an auxiliary variable, the expression of which is as follows:
Figure BDA0003596001040000051
Figure BDA0003596001040000052
wherein max { a, b } represents the greater number of a and b, V K Sum lambda K Is by means of alignment of
Figure BDA0003596001040000053
Auxiliary variable obtained by decomposing characteristic values, +.>
Figure BDA0003596001040000054
Performing eigenvalue decompositionThe expression is->
Figure BDA0003596001040000055
S302, setting the upper limit P of the transmission power of the secondary terminal u And a lower limit P d Calculating the intermediate value of the two
Figure BDA0003596001040000056
S303, calculating the rate R of the secondary terminal u (Q *opt ) And compared with the normal communication rate requirement γ=3, if R u (Q *opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid
Further, the step S5 includes the steps of:
s501, calculating the residual power according to the minimum transmission power of the secondary terminal: p (P) r =P T -P min
S502, artificial noise transmission beam matrix:
Figure BDA0003596001040000057
wherein X is a statistical CSI expression of the secondary terminal, U AN Is that all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) represents the rank of the matrix. The specific expression of X is as follows:
Figure BDA0003596001040000058
compared with the prior art, the technical scheme provided by the invention has the following technical effects:
(1) The invention is more fit with reality, namely, under the condition that only the secondary terminal is known to count the CSI and the unknown eavesdropper is known, the RIS reflection phase shift matrix, the transmission beam matrix and the minimum transmission power of the secondary terminal are designed through the alternative optimization thought, artificial noise is introduced to inhibit the eavesdropper, and the transmission beam matrix of the artificial noise is designed according to the minimum transmission power of the secondary terminal, so that the invention is more true than the condition of the known eavesdropper CSI;
(2) The invention adopts the cognitive radio technology, utilizes spectrum sensing and sharing, ensures that the main transmitter, the main terminal, the secondary transmitter and the secondary terminal can communicate in the same frequency band, saves spectrum resources, relieves the problem of scarcity of spectrum, and simultaneously improves the safety performance of the system by design optimization.
Drawings
FIG. 1 is a flow chart of the present invention.
Fig. 2 is a schematic diagram of a system according to the present invention.
Detailed Description
The technical scheme of the invention is further described in detail below with reference to the accompanying drawings: the present embodiment is implemented on the premise of the technical scheme of the present invention, and a detailed implementation manner and a specific operation process are provided, but the protection rights of the present invention are not limited to the following embodiments.
The embodiment provides a secret communication method based on cognitive radio for safe transmission in an industrial Internet of things environment, which is characterized in that under the condition that normal communication of a secondary terminal and interference of a secondary transmitter to a main terminal is guaranteed to be within a certain threshold, an RIS reflection phase shift matrix and a transmission beam matrix are designed through an alternating optimization idea, minimum transmission power of the secondary terminal is optimized, then an eavesdropper is interfered through artificial noise, and a transmission beam matrix of the artificial noise is designed, so that the safety performance of a system is improved. As shown in fig. 1, the method specifically comprises the following steps:
step 1: constructing a cognitive radio secret communication system suitable for unknown eavesdropper CSI; as shown in fig. 2, the system includes a main transmitter, a main terminal having M antennas, a secondary transmitter having D antennas, a secondary terminal having N antennas, an eavesdropper having E antennas, and an RIS integrating L low power reflective units. The direct link between the secondary transmitter and the main terminal, the secondary terminal and the eavesdropper is blocked by the barrier, in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflection link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a certain threshold value, and a transmission beam matrix initial value is set, comprising the following steps:
step 1.1: secondary transmitter to RIS, RIS to primary terminal, RIS to secondary terminal, RIS to eavesdropper channel G t The method comprises the following steps of:
Figure BDA0003596001040000061
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure BDA0003596001040000062
represents deterministic line-of-sight components of the channel, +.>
Figure BDA0003596001040000063
Representing the non-line-of-sight component of the channel. The received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Representing a useful signal with an average value of 0 transmitted by a secondary transmitter, transmitting a beam matrix
Figure BDA0003596001040000064
(·) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is complex Gaussian white noise obeying independent same distribution, the mean value is 0, and the variance is sigma 2 ;Φ=diag([φ 1 ,φ2 2 ,...φl l ...,φL L ] T ) Is a RIS reflective phase shift matrix, wherein φ l Is the reflection coefficient and->
Figure BDA0003596001040000071
j is an imaginary unit, phi l Is the amplitude and θ of the RIS reflection unit l ∈[0,2π)。
Step 1.2: given an initial transmit beam matrix q=i M Wherein I M Is an m×m identity matrix;
step 2: in a large-scale multiple-input multiple-output cognitive radio secure communication system, designing a RIS reflective phase shift matrix by using statistical CSI, comprising the following steps:
step 2.1: given an initial transmit beam matrix q=i M Wherein I M Is an m×m identity matrix;
step 2.2: calculating secondary terminal rate with respect to interference power constraint E { tr (G) 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)
Figure BDA0003596001040000072
Wherein P is I Is the maximum interference power threshold at the primary terminal; e {. Cndot. } represents the expectation of the matrix, tr (. Cndot.) represents the trace of the matrix; the interference power constraint inequality left-hand expression is specifically as follows:
Figure BDA0003596001040000073
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The spatial correlation matrices of the base station transmit antennas and the RIS reflection units, respectively.
Figure BDA0003596001040000074
The specific expression of (2) is as follows:
Figure BDA0003596001040000075
where A is Lagrangian multiplier and v is Q * Satisfy trQ * ≤MP T Parameters, P T Is the total transmit power, lambda is Q * Parameters meeting interference power constraints, R u (Q, Φ) is the rate of the secondary terminal, and the specific expression is as follows:
Figure BDA0003596001040000076
wherein R is 2 Is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an l×l identity matrix.
Figure BDA0003596001040000077
Is an equivalent channel parameter based on the system part CSI, and the specific expression is as follows:
Figure BDA0003596001040000078
Figure BDA0003596001040000081
Figure BDA0003596001040000082
Figure BDA0003596001040000083
in addition, { F, Γ, Θ, XI, ψ, Γ } are auxiliary variables, and can be obtained by the following expression:
Figure BDA0003596001040000084
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
Figure BDA0003596001040000085
Figure BDA0003596001040000086
Figure BDA0003596001040000087
step 2.3: take the initial projection gradient parameter μ=0.5 and update μ *
Figure BDA0003596001040000088
Wherein mu * The updated projection gradient parameter is that delta is the iteration step length of gradient rise, and delta=0.1 is taken;
step 2.4: order the
Figure BDA0003596001040000089
Calculating phase parameter θ of RIS reflective phase shift matrix * =[φ 12 ,...φ l ...,φ L ] T Wherein->
Figure BDA00035960010400000810
Is->
Figure BDA00035960010400000811
Concerns phi l For any of l=1, 2,..:
Figure BDA00035960010400000812
wherein E is ll Is a matrix with values of 1 except for the first row and the first column, and the rest values are all 0, and gamma is an auxiliary function, and the specific expression is as follows:
Figure BDA0003596001040000091
step 2.5: calculating RIS reflection phase shift matrix as phi * =diag(θ * ) Calculating the rate R of the secondary terminal u (Q,Φ * ) Until the rate increase value is smaller than a threshold value, obtaining an optimal reflection phase shift matrix phi opt
Step 3: according to the RIS reflection phase shift matrix, a transmission beam matrix is designed by using statistical CSI, and the transmission power of a secondary terminal is calculated, and the method specifically comprises the following steps:
step 3.1: transmit beam matrix Q * The method comprises the following steps:
Figure BDA0003596001040000092
wherein K and Λ Q Is an auxiliary variable, the expression of which is as follows:
Figure BDA0003596001040000093
Figure BDA0003596001040000094
wherein max { a, b } represents the greater number of a and b, V K Sum lambda K Is by means of alignment of
Figure BDA0003596001040000095
Performing eigenvalue decomposition->
Figure BDA0003596001040000096
The resulting auxiliary variable.
Step 3.2: setting an upper power limit P u And lower power limit P d Calculating the intermediate value between the two
Figure BDA0003596001040000097
Step 3.3: according to step 2,The RIS reflection phase shift matrix and the transmission beam matrix obtained in the step 3.1 calculate the rate R of the secondary terminal u (Q *opt ) And compared with the normal communication rate requirement γ=3, if R u (Q *opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid
Step 4: repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value.
Step 5: according to the minimum transmitting power of the secondary terminal, designing an artificial noise transmitting wave beam matrix, comprising the following steps:
step 5.1: calculating the residual power according to the minimum transmission power: p (P) r =P T -P min
Step 5.2: artificial noise transmit beam matrix:
Figure BDA0003596001040000101
wherein X is a statistical CSI expression of the secondary terminal, U AN The columns of (a) are all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) represents the rank of the matrix, and the specific expression of X is as follows:
Figure BDA0003596001040000102
in the large-scale multi-input multi-output cognitive radio wireless safety communication system, the direct links among the secondary transmitter, the main terminal, the secondary terminal and the eavesdropper are blocked by the barrier, and communication can be carried out only through the RIS-assisted reflection link. In order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, the interference of the secondary transmitter to the main terminal is required to be ensured to be within a certain threshold value, and the communication quality of the secondary terminal is required to be ensured. According to the invention, on the premise that only the statistical CSI of the main terminal and the secondary terminal and the CSI of the unknown eavesdropper are known, the problem of scarcity of the frequency spectrum is relieved, the utilization rate of the frequency spectrum is effectively improved, the interference of artificial noise to the secondary terminal can be effectively avoided, the communication quality of the secondary terminal is ensured, and the safety performance of the system is improved.
The foregoing is merely illustrative of the embodiments of the present invention, and the scope of the present invention is not limited thereto, and any person skilled in the art will appreciate that modifications and substitutions are within the scope of the present invention, and the scope of the present invention is defined by the appended claims.

Claims (3)

1. A secret communication method based on cognitive radio in an industrial internet environment, comprising the steps of:
s1, constructing a secret communication transmission system based on cognitive radio, which is applicable to an industrial Internet environment, wherein the system comprises a main transmitter, a main terminal with M antennas, a secondary transmitter with D antennas, a secondary terminal with N antennas, an eavesdropper with E antennas and an RIS integrating L low-power consumption reflecting units, direct links between the secondary transmitter and the main terminal, between the secondary terminal and the eavesdropper are blocked by barriers, and in order to enable the secondary transmitter and the secondary terminal to communicate with the main transmitter and the main terminal in the same frequency band, an RIS auxiliary reflecting link is established, the interference of the secondary transmitter to the main terminal is ensured to be within a set threshold value, and a transmitting beam matrix initial value is set as a unit matrix;
s2, designing an RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal;
s3, designing a transmitting beam matrix according to the RIS reflection phase shift matrix by using the statistical CSI of the secondary terminal, and calculating the transmitting power of the secondary terminal;
s4, repeating the steps S2 and S3 until the power of the secondary terminal converges, and obtaining the minimum transmitting power of the secondary terminal; wherein the convergence condition is that the decrease amount of the secondary terminal transmission power is smaller than a predetermined value;
s5, designing a transmission beam matrix of artificial noise according to the minimum transmission power of the secondary terminal so as to achieve the purpose of inhibiting an eavesdropper and improving the safety performance of the system;
the step S3 includes the steps of:
s301, transmitting beam matrix Q * The method comprises the following steps:
Figure FDA0004232616610000021
wherein K and A Q Is an auxiliary variable:
Figure FDA0004232616610000022
Figure FDA0004232616610000023
wherein max { a, b } represents the greater number of a and b; v (V) K Sum lambda K Is by means of alignment of
Figure FDA0004232616610000024
Auxiliary variable obtained by decomposing characteristic values, +.>
Figure FDA0004232616610000025
The expression for performing eigenvalue decomposition is +.>
Figure FDA0004232616610000026
S302, setting the upper limit of the transmission power of the secondary terminalP u And a lower limit P d Calculating the intermediate value of the two
Figure FDA0004232616610000027
S303, calculating the rate R of the secondary terminal u (Q * ,Φ opt ) If R is u (Q * ,Φ opt ) > gamma is P u =P mid Otherwise let P d =P mid Returning to S302 until R u (Q * ,Φ opt ) When =γ, the minimum transmission power P of the secondary terminal is obtained min =P mid The method comprises the steps of carrying out a first treatment on the surface of the Wherein γ represents the normal communication rate requirement;
the step S5 includes the steps of:
s501, calculating the residual power according to the minimum transmission power of the secondary terminal: p (P) r =P T -P min The method comprises the steps of carrying out a first treatment on the surface of the Wherein P is T Is the total transmit power of the system;
s502, the transmission beam matrix of the artificial noise is as follows:
Figure FDA0004232616610000028
wherein, X is the statistical CSI of the secondary terminal:
Figure FDA0004232616610000029
U AN the columns of (1) are all M-rank (X) eigenvectors corresponding to zero eigenvalues of X, rank (·) representing the rank of the matrix; g 0 Representing the secondary transmitter to RIS channel, G 2 Representing the channel of the RIS to the secondary terminal,
Figure FDA0004232616610000031
representing deterministic line-of-sight components of the channel, t=0, 1,2,3, Φ is the RIS reflection phase shift matrix, R 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 Is the spatial correlation matrix of the base station transmitting antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas.
2. The method for secret communication based on cognitive radio in an industrial internet environment according to claim 1, wherein in step S1, the secondary transmitter to RIS, RIS to the primary terminal, RIS to the secondary terminal, RIS to the eavesdropper' S channel G t The method comprises the following steps of:
Figure FDA0004232616610000032
wherein G is 0 Representing the secondary transmitter to RIS channel, G 1 Representing the channel of RIS to the master terminal, G 2 Representing the channel of RIS to secondary terminal, G 3 Representing the RIS channel to an eavesdropper,
Figure FDA0004232616610000033
represents deterministic line-of-sight components of the channel, +.>
Figure FDA0004232616610000034
Representing the non-line-of-sight component of the channel;
the received signal of the secondary terminal is:
y u =(G 2 ΦG 0 )(s u +s AN )+z u
wherein s is u Useful signal representing a mean value of 0 transmitted by a secondary transmitter, transmitting a beam matrix
Figure FDA0004232616610000035
E {. Cndot. } represents the expectation of the matrix, (. Cndot.) H Representing a conjugate transpose of the matrix; s is(s) AN Representing an artificial noise signal; z u Is subject to independent same distribution, and has mean value of 0 and variance of sigma 2 Complex gaussian white noise of (a); Φ=diag ([ Φ) 1 ,φ 2 ,...φ l ...,φ L ] T ) Is a RIS reflective phase shift matrix, phi l Is the reflection coefficient of the first reflection unit, < ->
Figure FDA0004232616610000036
j is an imaginary unit, θ l Is the amplitude of the first reflection unit, l=1, 2,;
setting the initial value of the transmission beam matrix Q as I M ,I M Representing an M x M identity matrix.
3. The method for secure communication based on cognitive radio in an industrial internet environment according to claim 2, wherein said step S2 comprises the steps of:
s201, calculating the rate of the secondary terminal with respect to the interference power constraint E { tr (G 1 ΦG 0 Q(G 1 ΦG 0 ) H )}≤MP I Lagrangian function of (C)
Figure FDA0004232616610000047
Wherein P is I Is the maximum interference power threshold at the primary terminal; tr (·) represents the trace of the matrix;
Figure FDA0004232616610000041
wherein R is 0 Is the spatial correlation matrix of the receiving antenna of the base station, T 0 、T 1 The space correlation matrixes of the base station transmitting antenna and the RIS reflecting unit are respectively;
Figure FDA0004232616610000042
the specific expression of (2) is as follows:
Figure FDA0004232616610000043
wherein A is Lagrangian multiplier and v is such that Q satisfies trQ.ltoreq.MP T Is used for the control of the temperature of the liquid crystal display device,P T is the total transmit power of the system, lambda is a parameter that causes Q to meet the interference power constraint, R u (Q, Φ) is the rate of the secondary terminal:
Figure FDA0004232616610000044
wherein R is 2 Is the spatial correlation matrix of the secondary terminal receiving antenna, T 2 Is the spatial correlation matrix of the secondary transmitter transmit antennas, I N Is an N x N identity matrix, I L Is an L x L identity matrix;
Figure FDA0004232616610000045
is based on the equivalent channel parameters of the system part CSI:
Figure FDA0004232616610000046
Figure FDA0004232616610000051
Figure FDA0004232616610000052
Figure FDA0004232616610000053
{ F, Γ, Θ, ε, ψ, Γ } is an auxiliary variable:
Figure FDA0004232616610000054
Θ=I L +b 1 ΨR 0
Ξ=σ 2 I N +b 2 R 2
Figure FDA0004232616610000055
Figure FDA0004232616610000056
Figure FDA0004232616610000057
s202, setting an initial projection gradient parameter mu and updating:
Figure FDA0004232616610000058
wherein mu * For updated projection gradient parameters, delta is the iteration step of gradient rise;
s203, order
Figure FDA0004232616610000059
Calculating phase parameter θ of RIS reflective phase shift matrix * =[φ 1 ,φ 2 ,...φ l ...,φ L ] T Wherein->
Figure FDA00042326166100000510
Representation->
Figure FDA00042326166100000511
Concerns phi l For any l:
Figure FDA0004232616610000061
wherein E is ll Is a matrix with all the element values 0 except for the element value 1 of the first row and the first column, y is an auxiliary function:
Figure FDA0004232616610000062
s204, calculating RIS reflection phase shift matrix phi * =diag(θ * ) Calculating the rate R of the secondary terminal of the current iteration step u (Q,Φ * ) If the rate increment value up to the secondary terminal is smaller than the threshold value, outputting the RIS reflection phase shift matrix of the current iteration step as an optimal RIS reflection phase shift matrix phi opt Otherwise, S202 is returned.
CN202210392002.4A 2022-04-14 2022-04-14 Secret communication method based on cognitive radio in industrial Internet environment Active CN114826344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210392002.4A CN114826344B (en) 2022-04-14 2022-04-14 Secret communication method based on cognitive radio in industrial Internet environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210392002.4A CN114826344B (en) 2022-04-14 2022-04-14 Secret communication method based on cognitive radio in industrial Internet environment

Publications (2)

Publication Number Publication Date
CN114826344A CN114826344A (en) 2022-07-29
CN114826344B true CN114826344B (en) 2023-07-04

Family

ID=82536992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210392002.4A Active CN114826344B (en) 2022-04-14 2022-04-14 Secret communication method based on cognitive radio in industrial Internet environment

Country Status (1)

Country Link
CN (1) CN114826344B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114337762A (en) * 2021-12-28 2022-04-12 南京邮电大学 RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9654272B2 (en) * 2013-03-08 2017-05-16 Electronics & Telecommunications Research Institute Method for multi-input multi-output communication in large-scale antenna system
WO2018084622A1 (en) * 2016-11-03 2018-05-11 엘지전자 주식회사 Method for transmitting and receiving channel state information in wireless communication system and apparatus therefor

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114337762A (en) * 2021-12-28 2022-04-12 南京邮电大学 RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI

Also Published As

Publication number Publication date
CN114826344A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
Zhou et al. Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint
Zhang et al. Large system achievable rate analysis of RIS-assisted MIMO wireless communication with statistical CSIT
Liu et al. Intelligent reflecting surface aided MISO uplink communication network: Feasibility and power minimization for perfect and imperfect CSI
Ihsan et al. Energy-efficient IRS-aided NOMA beamforming for 6G wireless communications
Khan et al. Joint spectrum and energy optimization of NOMA-enabled small-cell networks with QoS guarantee
Chu et al. Resource allocation for IRS-assisted wireless-powered FDMA IoT networks
Hu et al. Joint beamformer design for wireless fronthaul and access links in C-RANs
Gao et al. Outage-constrained energy efficiency maximization for RIS-assisted WPCNs
Yang et al. Mode modulation for wireless communications with a twist
CN112911587B (en) Method for safely unloading anti-eavesdropping task by using physical layer under MEC-D2D environment
Huang et al. Unsupervised learning-inspired power control methods for energy-efficient wireless networks over fading channels
Hu et al. Secure downlink transmission in the Internet of Things: How many antennas are needed?
CN114337762A (en) RIS auxiliary cognitive radio wireless safety communication transmission method utilizing partial CSI
Xu et al. Statistically robust transceiver design for multi-RIS assisted multi-user MIMO systems
Wang et al. Intelligent omni-surface enhanced aerial secure offloading
Forouzanmehr et al. Energy efficiency maximization for IRS-assisted uplink systems: Joint resource allocation and beamforming design
CN113395096A (en) Physical layer secure transmission method based on deep learning in FDD system
Park et al. Completion time minimization of fog-RAN-assisted federated learning with rate-splitting transmission
Mohamadi et al. Low-complexity ADMM-based algorithm for robust multi-group multicast beamforming in large-scale systems
Ji et al. A robust IRS-aided wireless information surveillance design with bounded channel errors
Gharagezlou et al. Secrecy sum rate analysis and power allocation with OSTBC and artificial noise for MIMO systems
Zhang et al. Deep reinforcement learning for secrecy energy efficiency maximization in ris-assisted networks
Li et al. CSI-Impaired Secure Resource Allocation for SWIPT-Enabled Full-Duplex Consumer Internet of Things Networks in Smart Healthcare
CN114826344B (en) Secret communication method based on cognitive radio in industrial Internet environment
Song et al. PLS-based secrecy transmission for VANETs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant