CN101902265A - Safe transmission method of physical layer in wireless communication - Google Patents

Safe transmission method of physical layer in wireless communication Download PDF

Info

Publication number
CN101902265A
CN101902265A CN 201010234330 CN201010234330A CN101902265A CN 101902265 A CN101902265 A CN 101902265A CN 201010234330 CN201010234330 CN 201010234330 CN 201010234330 A CN201010234330 A CN 201010234330A CN 101902265 A CN101902265 A CN 101902265A
Authority
CN
China
Prior art keywords
base station
symbol
channel
rand
desired user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201010234330
Other languages
Chinese (zh)
Inventor
穆鹏程
殷勤业
王文杰
张建国
姜红艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN 201010234330 priority Critical patent/CN101902265A/en
Publication of CN101902265A publication Critical patent/CN101902265A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Radio Transmission System (AREA)

Abstract

The invention discloses a safe transmission method of a physical layer in wireless communication, which is characterized by comprising the following steps of: a single-antenna desired user firstly transmits unencrypted request information to a multi-antenna base station; the base station receives the request information and estimates a signal path between the base station and the desired user with a frequency piloting sequence; the base station modulates bit to be transmitted into a constellation point symbol b (n) with a known phase position modulating mode, designs a fast-variable weighting coefficient, weights the constellation point symbol b (n) to be transmitted, and transmits the weighted symbol on selected Jrand antennas according appointed gross power; the desired user receives the weighted symbol, i.e. a weighting symbol, and decodes with a maximum likelihood method; and a wiretap user fast changes the weighting coefficient due to the process of the base station, can not decode with a blind equalization method, and can not decode with the maximum likelihood method, so that the method finally realizes the safe transmission.

Description

Safe transmission method of physical layer in the radio communication
Technical field
The present invention relates to wireless communication system, the safe transmission method of physical layer in particularly a kind of wireless communication system.
Background technology
In recent years, various wireless communication technologys emerge in an endless stream, and the appearance of these technology has terminal equipments such as computer, mobile phone and moves the ability that inserts, and have solved the line restriction of traditional wired access, and the access scheme of various efficient high-speeds is provided for the user.Along with improving constantly of the message transmission rate of wireless communication system support, wireless user's scale constantly enlarges, and wireless communication system progressively replaces the inexorable trend that traditional wired communication system has become Communication Development aspect a lot.Simultaneously, along with radio communication extensively popularizing aspect civilian, the secure wireless communication problem that relates to trade secret becomes more and more important.
In wireless communication system, because the broadcast characteristic of electromagnetic signal propagation and the opening of wireless channel, signal is propagated arbitrarily in the space by radio wave, lost the constraint of " wired ", make the receiver be in arbitrarily in the coverage just can receive the information that transmitter is launched by any line, other users that the communication information very easily is supposed to beyond the user obtain.In this sense, wireless communication system has bigger potential safety hazard than traditional wired communication system, how to prevent the wireless leakage of information, ensures that the fail safe of radio communication is also just more important.
At in May, 2007 JOURNAL OF COMMUNICATIONS, VOL.2, a kind of aerial array redundancy of utilizing, the wireless security transmission method that carries out random weighting to transmitting are proposed in the article of delivering on the NO.3 that is entitled as " Using Antenna Array Redundancy and Channel Diversity for SecureWireless Transmissions ".The design criterion of weight coefficient W is H HW=||H||, wherein H is that transmitting terminal arrives the channel that expectation receives the user.Under this criterion, select to obey the W of a certain distribution at random, make and can directly use maximum-likelihood decoding to obtain information to received signal at the desired user end.Because transmitting terminal is different from the desired user channel to eavesdropping user's channel, the W of change at random can make it to obtain information from disorder reception planisphere, thereby guarantee safe transmission eavesdropping signal constellation which that the user receives scramble at random.Yet, the subject matter of this random weighting method is that power utilization is too low, this is because the randomization of array weight coefficient causes the excessive dispersion of transmit signal power in the space, and the signal power that finally causes arriving desired user is not enough, has reduced the communication quality of desired user.
Summary of the invention
The design that the present invention is directed to above-mentioned random weighting coefficient causes the low excessively problem of power utilization, a kind of radio physical layer safe transmission method of selecting transmitting antenna is at random proposed, this method make signal that the base station sends at the desired user place all the time with superimposed to obtain the highest transmitting gain, power utilization is very high; For the eavesdropping user, demodulating information effectively, thus reach the purpose of secure communication.
For reaching above purpose, the present invention adopts following technical scheme to be achieved:
It is right that safe transmission method of physical layer in a kind of radio communication, the model of communication system of employing are communicate by letter as expectation in cover multi-antenna base station and a single antenna mobile terminal, and another many antennas mobile terminal is characterized in that as eavesdropping the user, comprises the steps:
A) the single antenna desired user at first sends the unencrypted solicited message to the base station, and this solicited message comprises the pilot frequency sequence that is used for channel estimating simultaneously, and pilot frequency sequence is all known symbol of receiving-transmitting sides;
B) base station receives solicited message, utilizes pilot frequency sequence to estimate channel h between them AB(n), channel estimating adopts the channel estimation methods of existing band pilot tone, considers that time division duplex and channel become slowly, and the base station is identical with desired user to the channel of base station direction to the channel of desired user direction, is h AB(n);
C) the base station bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., preceding at each emission b (n), need be from all J root antennas picked at random J RandThe root antenna, J Rand<J utilizes this J RandThe channel I of root antenna Rand(n) h AB(n), design weight coefficient
Figure BDA0000023606290000021
Weight coefficient is changed fast, be weighted, at last the J that is choosing according to the symbol after specifying gross power with weighting to sent constellation point symbol b (n) RandLaunch on the root antenna.I wherein Rand(n) be the selection matrix at random of a J * J dimension, wherein I Rand(n) random arrangement J on the diagonal RandIndividual 1, all the other elements are 0;
D) desired user receives the symbol after the weighting, and promptly the weighting symbol utilizes the maximum likelihood method decoding;
E) the eavesdropping user receives the symbol after the weighting, makes weight coefficient change fast because handle the base station, and the eavesdropping user can't utilize the blind balance method decoding, if also utilize the maximum likelihood method decoding, then the error rate is 50%, has finally realized safe transmission.
In the said method, in the described step b), the channel estimation methods of existing band pilot tone is LS channel estimating, MMSE channel estimating or its improved method.
In the described step c), adopt the Ditital modulation method of BPSK (two-phase PSK) or QPSK (quarternary phase-shift keying (QPSK)) when phase modulation method; Then in the step d), desired user utilizes maximum likelihood method decoding simplified formula to be
Figure BDA0000023606290000031
Wherein x (n) expression is corresponding to a kind of constellation point of phase modulation method, and y (n) represents the signal that desired user receives.
Compare with the method for existing guarantee secure wireless communication, the invention has the beneficial effects as follows:
1, under the environment that channel becomes slowly, can stop the eavesdropping user to obtain information, reach safety so that equivalent channel changes fast.The tradition beamforming algorithm can form the wave beam that points to desired user, other directions is formed suppress.Yet its weight coefficient is along with channel variation, and under channel change situation slowly, weight coefficient is also constant substantially, and the listener-in just can utilize blind balance method to obtain the information of making a start.The present invention introduces on the basis of traditional beamforming algorithm and selects aerial array at random, even channel becomes slowly, because the different antenna array of each selection, therefore cause the equivalent channel of communicating pair to change fast, thereby make blind equalization algorithm lose efficacy, the eavesdropping user can't obtain the emission symbol of base station, thereby has guaranteed secure communication.
2, transmitting at the desired user place with superimposed of base station reaches higher power utilization.In the described article of background technology, mentioned the safing method of weight coefficient that designs at random, but the randomization of array weight coefficient causes the excessive dispersion of transmit signal power in the space in this method, the signal power that finally causes arriving desired user is not enough, has reduced the communication quality of desired user.The present invention launches to reach the fast-changing at random purpose of equivalent channel by the some antennas of each picked at random, the selection of weight coefficient adopts distributed launching beam to form, make signal that each array element sends at the desired user place all the time with superimposed to obtain the highest transmitting gain.This is to focus on same acceptance point transmitting at the desired user place with superimposed essence, and power utilization is very high.
3, under the situation of base station same transmit gross power, this patent method can reach higher signal to noise ratio at the desired user end, thereby the decoding performance of desired user is improved.
Description of drawings
Fig. 1 is the system model of the related safe transmission of the inventive method.
Fig. 2 is the weighting of base station symbol of the present invention and sends schematic diagram.
Fig. 3 is that the base station is selected the aerial array schematic diagram at random.
Fig. 4 is the error rate and transmit power curve contrast figure in existing method and the inventive method wireless transmission.
Fig. 5 is signal to noise ratio and transmit power curve contrast figure in existing method and the inventive method wireless transmission.
Embodiment
The present invention is described further below in conjunction with accompanying drawing and instantiation.
The system model that the present invention relates to safe transmission as shown in Figure 1, base station Alice has many antennas, desired user Bob uses single antenna, eavesdropping user Eve sets up many antennas in order to obtain information.Here choose base station J=8 antenna in concrete the enforcement, desired user 1 antenna, eavesdropping user 4 antennas.The meaning of secure communication is that the symbol of the base station user that only wishes to be supposed to obtains, and does not wish that being eavesdropped the user obtains.Here it is passive eavesdropping the user, i.e. its eavesdropping information is not to the spatial emission signal.In addition, generally require the transceiver channel can reciprocity in this wireless security mode, when channel became slowly, this reciprocity can be fully guaranteed by time division duplex (TDD).In the communication process, Bob at first sends pilot frequency sequence to Alice, estimates channel h between the two for Alice AB(n).Alice estimates channel h AB(n) after, the bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., design weight coefficient then, be assigned to each antenna after constellation point symbol b (n) is weighted and launch, the modulation system of employing is BPSK or QPSK.That adopt in the present embodiment is QPSK, and concrete weighting and transmission flow are as shown in Figure 2.The method for designing of weight coefficient: also become slowly for fear of weight coefficient when channel becomes slowly, Alice need be in all J antennas picked at random J Rand=4 antennas utilize this J then RandThe channel design weight coefficient of root antenna, concrete formula is as follows
w ( n ) = I rand ( n ) h AB ( n ) | | I rand ( n ) h AB ( n ) | | - - - ( 1 )
I Rand(n) be the selection matrix at random of a J * J dimension, wherein I Rand(n) random arrangement J on the diagonal RandIndividual 1, all the other elements are 0.I Rand(n) effect makes that equivalent channel all changes, thereby has avoided Eve to obtain information when sending each symbol b (n).Particularly, select the aerial array schematic diagram at random as shown in Figure 3, when sending n symbol, select certain J at random RandRoot antenna (J Rand<J), when sending next symbol, select J again at random RandThe root antenna, by that analogy.Change along with sending symbol n among Fig. 3, the aerial array of selection also changes.After generating weight coefficient, Alice is assigned to J to the symbol b (n) that is mapped as constellation point RandLaunch behind the weight coefficient by the weighting respective antenna on the root antenna.If total transmitting power is P, through behind the wireless channel, the symbol that desired user Bob receives is
x Bob ( n ) = b ( n ) P I rand ( n ) h AB H ( n ) | | I rand ( n ) h AB ( n ) | | h AB ( n ) + v Bob ( n ) = b ( n ) P | | I rand ( n ) h AB ( n ) | | + v Bob ( n ) - - - ( 2 )
ν Bob(n) for the noise of Bob end, suppose the noise Gaussian distributed.Remove The noise, the phase place of receiving symbol does not have deviation, the estimated value that Bob can directly utilize the method for maximum-likelihood decoding to obtain launching symbol b (n)
Figure BDA0000023606290000052
Because the channel h between base station and the eavesdropping user AE(n) be different from the direct channel h of base station and desired user AB(n), signal is through h AE(n) symbol of back arrival eavesdropping user side is
x Eve ( n ) = b ( n ) P I rand ( n ) h AB H ( n ) | | I rand ( n ) h AB ( n ) | | h AE ( n ) + v Eve ( n ) - - - ( 3 )
v Eve(n) noise of holding for Eve.Even do not consider noise, the information that Eve receives is the scramble at random to amplitude and the phase place of former symbol b (n), this makes Eve can not use as the maximum likelihood of desired user Bob and directly deciphers, also can't use the such blind equalization algorithm of CMA (constant modulus algorithm) to obtain information, thereby guarantee the safe transmission of information.What Eve we can be interpreted as can not be utilized the CMA blind balance method to obtain information:
Suppose that blind equalization algorithm needs iteration N step to restrain, this just requires Eve will receive N symbol at least, and if channel remains unchanged in the duration substantially at L symbol at most, then the algorithm necessary condition that can restrain is N≤L.In other words, Eve just can't correctly estimate channel when L<N.Because Alice selects J at random in J root antenna at every turn RandRoot uses, and channel just has
Figure BDA0000023606290000054
Plant different possibilities, wherein The expression number of combinations.For iterative algorithm can be restrained, at first to guarantee in N step iteration, to use with a kind of channel, promptly Eve need receive
Figure BDA0000023606290000056
Individual symbol.If guarantee that channel exists
Figure BDA0000023606290000057
Individual symbol changed in the duration, promptly
Figure BDA0000023606290000058
Eve just can't correctly estimate channel so.Therefore, as long as the antenna number of using is abundant, just can make
Figure BDA0000023606290000059
Enough big, thus make
Figure BDA00000236062900000510
Final assurance listener-in can't acquisition of information.
Fig. 4 is the comparison diagram of the error rate of this patent method and background technology method (reference method) under the different transmission power with transmit power curve.Along with the increase of transmitting power, the error rate of Bob can significantly reduce, and this patent method can obtain the error rate lower than reference method under the identical situation of transmitting power.
For what being interpreted as under the same transmit gross power, the this patent method can be obtained the performance better than reference method (Bob has the lower error rate), and Fig. 5 provides this patent method and the signal to noise ratio contrast of reference method at different receiving terminals under identical total transmitting power.As can be seen from the figure, using this patent method why can allow Bob obtain the lower error rate is because this method makes the received signal to noise ratio of Bob compare reference method improve a lot (5dB), because two kinds of methods all do not have to do particular processing at Eve, the received signal to noise ratio of Eve is identical under these two kinds of situations.
So far, can verify the useful effect of the safe transmission of this patent method during ensureing radio communication from technical scheme and simulation result.

Claims (3)

1. the safe transmission method of physical layer in the radio communication, the model of communication system that adopts be a cover multi-antenna base station with a single antenna mobile terminal communicate by letter as expectation right, another many antennas mobile terminal is characterized in that as the eavesdropping user, comprises the steps:
A) the single antenna desired user at first sends the unencrypted solicited message to the base station, and this solicited message comprises the pilot frequency sequence that is used for channel estimating simultaneously, and pilot frequency sequence is all known symbol of receiving-transmitting sides;
B) base station receives solicited message, utilizes pilot frequency sequence to estimate channel h between them AB(n), channel estimating adopts the channel estimation methods of existing band pilot tone, considers that time division duplex and channel become slowly, and the base station is identical with desired user to the channel of base station direction to the channel of desired user direction, is h AB(n);
C) the base station bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., preceding at each emission b (n), need be from all J root antennas picked at random J RandThe root antenna, J Rand<J utilizes this J RandThe channel I of root antenna Rand(n) h AB(n), design weight coefficient
Figure FDA0000023606280000011
Weight coefficient is changed fast, be weighted, at last the J that is choosing according to the symbol after specifying gross power with weighting to sent constellation point symbol b (n) RandLaunch on the root antenna.I wherein Rand(n) be the selection matrix at random of a J * J dimension, I Rand(n) random arrangement J on the diagonal RandIndividual 1, all the other elements are 0;
D) desired user receives the symbol after the weighting, and promptly the weighting symbol utilizes the maximum likelihood method decoding;
E) the eavesdropping user receives the symbol after the weighting, makes weight coefficient change fast because handle the base station, and the eavesdropping user can't utilize the blind balance method decoding, if also utilize the maximum likelihood method decoding, then the error rate is 50%, has finally realized safe transmission.
2. the safe transmission method of physical layer in the radio communication as claimed in claim 1 is characterized in that, in the described step b), the channel estimation methods of existing band pilot tone is LS channel estimating, MMSE channel estimating or its improved method.
3. the safe transmission method of physical layer in the radio communication as claimed in claim 1 is characterized in that, in the described step c), adopts the Ditital modulation method of BPSK or QPSK when phase modulation method; Then in the step d), desired user utilizes maximum likelihood method decoding simplified formula to be
Figure FDA0000023606280000021
Wherein x (n) expression is corresponding to a kind of constellation point of phase modulation method, and y (n) represents the signal that desired user receives.
CN 201010234330 2010-07-22 2010-07-22 Safe transmission method of physical layer in wireless communication Pending CN101902265A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010234330 CN101902265A (en) 2010-07-22 2010-07-22 Safe transmission method of physical layer in wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010234330 CN101902265A (en) 2010-07-22 2010-07-22 Safe transmission method of physical layer in wireless communication

Publications (1)

Publication Number Publication Date
CN101902265A true CN101902265A (en) 2010-12-01

Family

ID=43227501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010234330 Pending CN101902265A (en) 2010-07-22 2010-07-22 Safe transmission method of physical layer in wireless communication

Country Status (1)

Country Link
CN (1) CN101902265A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158857A (en) * 2011-05-27 2011-08-17 中国人民解放军信息工程大学 Wireless channel encryption method under disturbance condition and device
CN102158858A (en) * 2011-05-27 2011-08-17 中国人民解放军信息工程大学 Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy
CN102611488A (en) * 2012-03-30 2012-07-25 山东大学 Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system
CN102752080A (en) * 2012-07-03 2012-10-24 西安交通大学 Anti-eavesdrop coding method based on physical layer
WO2013000174A1 (en) * 2011-06-30 2013-01-03 北京邮电大学 Method for generating consistent cryptographic key based on wireless channel features
CN102970068A (en) * 2012-10-22 2013-03-13 西安交通大学 Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication
CN103002440A (en) * 2012-12-06 2013-03-27 西安交通大学 Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array
CN103067042A (en) * 2012-12-14 2013-04-24 中国人民解放军信息工程大学 Secret communication method and antenna equipment
CN103236877A (en) * 2013-04-19 2013-08-07 西安交通大学 Weight value feedback reversal training method used for safety wireless communication
CN104994496A (en) * 2015-06-26 2015-10-21 西安交通大学 Physical layer secure transmission method based on distributed spatial modulation
CN105282739A (en) * 2015-11-13 2016-01-27 西安交通大学 Point-to-point secret key negotiation method based on physical layer pilot frequency presetting
CN105812037A (en) * 2016-03-07 2016-07-27 西安交通大学 Noise-eliminating safe transmission method based on receiving end spatial modulation
CN106130935A (en) * 2016-06-30 2016-11-16 西安交通大学 A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
CN106850021A (en) * 2017-02-03 2017-06-13 中国科学院信息工程研究所 Radio communication safety of physical layer implementation method and device based on polarization precoding
CN108337675A (en) * 2018-01-24 2018-07-27 大连理工大学 A kind of safety of physical layer communication means based on Waveform Design suitable for a single aerial system
CN108988881A (en) * 2018-09-30 2018-12-11 电子科技大学 A kind of wavelet transformation amendment blind balance method based on dual channel model
US10305866B2 (en) 2014-11-25 2019-05-28 Huawei Technologies Co., Ltd. Data transmission method, base station and user equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1394399A (en) * 2000-08-30 2003-01-29 松下电器产业株式会社 Data transmitting apparatus, radio communication system and radio communication method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1394399A (en) * 2000-08-30 2003-01-29 松下电器产业株式会社 Data transmitting apparatus, radio communication system and radio communication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《西安交通大学学报》 20100630 穆鹏程等 无线通信中使用随机天线阵列的物理层安全传输方法 第1-2节 1-3 第44卷, 第6期 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158857B (en) * 2011-05-27 2013-07-10 中国人民解放军信息工程大学 Wireless channel encryption method under disturbance condition and device
CN102158858A (en) * 2011-05-27 2011-08-17 中国人民解放军信息工程大学 Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy
CN102158857A (en) * 2011-05-27 2011-08-17 中国人民解放军信息工程大学 Wireless channel encryption method under disturbance condition and device
CN102158858B (en) * 2011-05-27 2013-10-02 中国人民解放军信息工程大学 Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy
WO2013000174A1 (en) * 2011-06-30 2013-01-03 北京邮电大学 Method for generating consistent cryptographic key based on wireless channel features
US9002011B2 (en) 2011-06-30 2015-04-07 Beijing University Of Posts And Telecommunications Method for generating consistent cryptographic key based on wireless channel features
CN102611488A (en) * 2012-03-30 2012-07-25 山东大学 Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system
CN102611488B (en) * 2012-03-30 2014-04-30 山东大学 Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system
CN102752080B (en) * 2012-07-03 2016-12-21 西安交通大学 A kind of anti-eavesdrop coded method based on physical layer
CN102752080A (en) * 2012-07-03 2012-10-24 西安交通大学 Anti-eavesdrop coding method based on physical layer
CN102970068B (en) * 2012-10-22 2014-11-05 西安交通大学 Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication
CN102970068A (en) * 2012-10-22 2013-03-13 西安交通大学 Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication
CN103002440A (en) * 2012-12-06 2013-03-27 西安交通大学 Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array
CN103002440B (en) * 2012-12-06 2014-12-10 西安交通大学 Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array
CN103067042A (en) * 2012-12-14 2013-04-24 中国人民解放军信息工程大学 Secret communication method and antenna equipment
CN103067042B (en) * 2012-12-14 2015-08-19 中国人民解放军信息工程大学 A kind of secret communication method and antenna equipment
CN103236877B (en) * 2013-04-19 2015-07-01 西安交通大学 Weight value feedback reversal training method used for safety wireless communication
CN103236877A (en) * 2013-04-19 2013-08-07 西安交通大学 Weight value feedback reversal training method used for safety wireless communication
US10305866B2 (en) 2014-11-25 2019-05-28 Huawei Technologies Co., Ltd. Data transmission method, base station and user equipment
CN104994496B (en) * 2015-06-26 2018-10-30 西安交通大学 Safe transmission method of physical layer based on distributed spatial modulation
CN104994496A (en) * 2015-06-26 2015-10-21 西安交通大学 Physical layer secure transmission method based on distributed spatial modulation
CN105282739A (en) * 2015-11-13 2016-01-27 西安交通大学 Point-to-point secret key negotiation method based on physical layer pilot frequency presetting
CN105282739B (en) * 2015-11-13 2018-12-07 西安交通大学 A kind of point-to-point cryptographic key negotiation method presetting based on physical layer pilot
CN105812037A (en) * 2016-03-07 2016-07-27 西安交通大学 Noise-eliminating safe transmission method based on receiving end spatial modulation
CN105812037B (en) * 2016-03-07 2019-02-05 西安交通大学 Noise based on receiving end spatial modulation eliminates safe transmission method
CN106130935A (en) * 2016-06-30 2016-11-16 西安交通大学 A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
CN106130935B (en) * 2016-06-30 2019-04-12 西安交通大学 A kind of adaptive anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
CN106850021A (en) * 2017-02-03 2017-06-13 中国科学院信息工程研究所 Radio communication safety of physical layer implementation method and device based on polarization precoding
CN108337675A (en) * 2018-01-24 2018-07-27 大连理工大学 A kind of safety of physical layer communication means based on Waveform Design suitable for a single aerial system
CN108988881A (en) * 2018-09-30 2018-12-11 电子科技大学 A kind of wavelet transformation amendment blind balance method based on dual channel model

Similar Documents

Publication Publication Date Title
CN101902265A (en) Safe transmission method of physical layer in wireless communication
Guan et al. Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?
Chen et al. Multi-antenna relay aided wireless physical layer security
Cavers Single-user and multiuser adaptive maximal ratio transmission for Rayleigh channels
Yan et al. Secret channel training to enhance physical layer security with a full-duplex receiver
CN105007578B (en) Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system
Varade et al. BER comparison of Rayleigh fading, Rician fading and AWGN channel using chaotic communication based MIMO-OFDM system
Hafez et al. Secure spatial multiple access using directional modulation
CN105119645A (en) Receiving antenna space hopping secret communication method in MIMO system
Alves et al. Enhanced physical layer security through transmit antenna selection
CN105933040A (en) Secure transmission method adopting information source and relay-combined transmitting antenna selection
CN106470064A (en) Send deversity scheme and equipment
Adachi et al. Recent advances in single‐carrier distributed antenna network
Ban et al. A practical antenna selection technique in multiuser massive MIMO networks
Yang et al. Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise
Hafez et al. Secure multiple-users transmission using multi-path directional modulation
Saleh et al. Improving communication reliability in vehicular networks using diversity techniques
CN102201893B (en) Method for estimating capacity of multi-antenna multicast system based on maximum and minimum beam forming
CN102457324A (en) Downlink multi-user multi-path beamforming method and device in FDD (Frequency Division Duplexing) system
CN107666682A (en) The transmission method and device of communication channel, system
CN103002440B (en) Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array
CN106301492B (en) A kind of data transmission method and device based on SM-MIMO
Shi et al. Physical layer security techniques for data transmission for future wireless networks
CN108337023B (en) Secure communication method based on multi-user multi-antenna communication system and secret beam forming design
CN107846464A (en) A kind of multiple antennas Internet of Things information transferring method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101201