CN101902265A - Safe transmission method of physical layer in wireless communication - Google Patents
Safe transmission method of physical layer in wireless communication Download PDFInfo
- Publication number
- CN101902265A CN101902265A CN 201010234330 CN201010234330A CN101902265A CN 101902265 A CN101902265 A CN 101902265A CN 201010234330 CN201010234330 CN 201010234330 CN 201010234330 A CN201010234330 A CN 201010234330A CN 101902265 A CN101902265 A CN 101902265A
- Authority
- CN
- China
- Prior art keywords
- base station
- symbol
- channel
- rand
- desired user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Radio Transmission System (AREA)
Abstract
The invention discloses a safe transmission method of a physical layer in wireless communication, which is characterized by comprising the following steps of: a single-antenna desired user firstly transmits unencrypted request information to a multi-antenna base station; the base station receives the request information and estimates a signal path between the base station and the desired user with a frequency piloting sequence; the base station modulates bit to be transmitted into a constellation point symbol b (n) with a known phase position modulating mode, designs a fast-variable weighting coefficient, weights the constellation point symbol b (n) to be transmitted, and transmits the weighted symbol on selected Jrand antennas according appointed gross power; the desired user receives the weighted symbol, i.e. a weighting symbol, and decodes with a maximum likelihood method; and a wiretap user fast changes the weighting coefficient due to the process of the base station, can not decode with a blind equalization method, and can not decode with the maximum likelihood method, so that the method finally realizes the safe transmission.
Description
Technical field
The present invention relates to wireless communication system, the safe transmission method of physical layer in particularly a kind of wireless communication system.
Background technology
In recent years, various wireless communication technologys emerge in an endless stream, and the appearance of these technology has terminal equipments such as computer, mobile phone and moves the ability that inserts, and have solved the line restriction of traditional wired access, and the access scheme of various efficient high-speeds is provided for the user.Along with improving constantly of the message transmission rate of wireless communication system support, wireless user's scale constantly enlarges, and wireless communication system progressively replaces the inexorable trend that traditional wired communication system has become Communication Development aspect a lot.Simultaneously, along with radio communication extensively popularizing aspect civilian, the secure wireless communication problem that relates to trade secret becomes more and more important.
In wireless communication system, because the broadcast characteristic of electromagnetic signal propagation and the opening of wireless channel, signal is propagated arbitrarily in the space by radio wave, lost the constraint of " wired ", make the receiver be in arbitrarily in the coverage just can receive the information that transmitter is launched by any line, other users that the communication information very easily is supposed to beyond the user obtain.In this sense, wireless communication system has bigger potential safety hazard than traditional wired communication system, how to prevent the wireless leakage of information, ensures that the fail safe of radio communication is also just more important.
At in May, 2007 JOURNAL OF COMMUNICATIONS, VOL.2, a kind of aerial array redundancy of utilizing, the wireless security transmission method that carries out random weighting to transmitting are proposed in the article of delivering on the NO.3 that is entitled as " Using Antenna Array Redundancy and Channel Diversity for SecureWireless Transmissions ".The design criterion of weight coefficient W is H
HW=||H||, wherein H is that transmitting terminal arrives the channel that expectation receives the user.Under this criterion, select to obey the W of a certain distribution at random, make and can directly use maximum-likelihood decoding to obtain information to received signal at the desired user end.Because transmitting terminal is different from the desired user channel to eavesdropping user's channel, the W of change at random can make it to obtain information from disorder reception planisphere, thereby guarantee safe transmission eavesdropping signal constellation which that the user receives scramble at random.Yet, the subject matter of this random weighting method is that power utilization is too low, this is because the randomization of array weight coefficient causes the excessive dispersion of transmit signal power in the space, and the signal power that finally causes arriving desired user is not enough, has reduced the communication quality of desired user.
Summary of the invention
The design that the present invention is directed to above-mentioned random weighting coefficient causes the low excessively problem of power utilization, a kind of radio physical layer safe transmission method of selecting transmitting antenna is at random proposed, this method make signal that the base station sends at the desired user place all the time with superimposed to obtain the highest transmitting gain, power utilization is very high; For the eavesdropping user, demodulating information effectively, thus reach the purpose of secure communication.
For reaching above purpose, the present invention adopts following technical scheme to be achieved:
It is right that safe transmission method of physical layer in a kind of radio communication, the model of communication system of employing are communicate by letter as expectation in cover multi-antenna base station and a single antenna mobile terminal, and another many antennas mobile terminal is characterized in that as eavesdropping the user, comprises the steps:
A) the single antenna desired user at first sends the unencrypted solicited message to the base station, and this solicited message comprises the pilot frequency sequence that is used for channel estimating simultaneously, and pilot frequency sequence is all known symbol of receiving-transmitting sides;
B) base station receives solicited message, utilizes pilot frequency sequence to estimate channel h between them
AB(n), channel estimating adopts the channel estimation methods of existing band pilot tone, considers that time division duplex and channel become slowly, and the base station is identical with desired user to the channel of base station direction to the channel of desired user direction, is h
AB(n);
C) the base station bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., preceding at each emission b (n), need be from all J root antennas picked at random J
RandThe root antenna, J
Rand<J utilizes this J
RandThe channel I of root antenna
Rand(n) h
AB(n), design weight coefficient
Weight coefficient is changed fast, be weighted, at last the J that is choosing according to the symbol after specifying gross power with weighting to sent constellation point symbol b (n)
RandLaunch on the root antenna.I wherein
Rand(n) be the selection matrix at random of a J * J dimension, wherein I
Rand(n) random arrangement J on the diagonal
RandIndividual 1, all the other elements are 0;
D) desired user receives the symbol after the weighting, and promptly the weighting symbol utilizes the maximum likelihood method decoding;
E) the eavesdropping user receives the symbol after the weighting, makes weight coefficient change fast because handle the base station, and the eavesdropping user can't utilize the blind balance method decoding, if also utilize the maximum likelihood method decoding, then the error rate is 50%, has finally realized safe transmission.
In the said method, in the described step b), the channel estimation methods of existing band pilot tone is LS channel estimating, MMSE channel estimating or its improved method.
In the described step c), adopt the Ditital modulation method of BPSK (two-phase PSK) or QPSK (quarternary phase-shift keying (QPSK)) when phase modulation method; Then in the step d), desired user utilizes maximum likelihood method decoding simplified formula to be
Wherein x (n) expression is corresponding to a kind of constellation point of phase modulation method, and y (n) represents the signal that desired user receives.
Compare with the method for existing guarantee secure wireless communication, the invention has the beneficial effects as follows:
1, under the environment that channel becomes slowly, can stop the eavesdropping user to obtain information, reach safety so that equivalent channel changes fast.The tradition beamforming algorithm can form the wave beam that points to desired user, other directions is formed suppress.Yet its weight coefficient is along with channel variation, and under channel change situation slowly, weight coefficient is also constant substantially, and the listener-in just can utilize blind balance method to obtain the information of making a start.The present invention introduces on the basis of traditional beamforming algorithm and selects aerial array at random, even channel becomes slowly, because the different antenna array of each selection, therefore cause the equivalent channel of communicating pair to change fast, thereby make blind equalization algorithm lose efficacy, the eavesdropping user can't obtain the emission symbol of base station, thereby has guaranteed secure communication.
2, transmitting at the desired user place with superimposed of base station reaches higher power utilization.In the described article of background technology, mentioned the safing method of weight coefficient that designs at random, but the randomization of array weight coefficient causes the excessive dispersion of transmit signal power in the space in this method, the signal power that finally causes arriving desired user is not enough, has reduced the communication quality of desired user.The present invention launches to reach the fast-changing at random purpose of equivalent channel by the some antennas of each picked at random, the selection of weight coefficient adopts distributed launching beam to form, make signal that each array element sends at the desired user place all the time with superimposed to obtain the highest transmitting gain.This is to focus on same acceptance point transmitting at the desired user place with superimposed essence, and power utilization is very high.
3, under the situation of base station same transmit gross power, this patent method can reach higher signal to noise ratio at the desired user end, thereby the decoding performance of desired user is improved.
Description of drawings
Fig. 1 is the system model of the related safe transmission of the inventive method.
Fig. 2 is the weighting of base station symbol of the present invention and sends schematic diagram.
Fig. 3 is that the base station is selected the aerial array schematic diagram at random.
Fig. 4 is the error rate and transmit power curve contrast figure in existing method and the inventive method wireless transmission.
Fig. 5 is signal to noise ratio and transmit power curve contrast figure in existing method and the inventive method wireless transmission.
Embodiment
The present invention is described further below in conjunction with accompanying drawing and instantiation.
The system model that the present invention relates to safe transmission as shown in Figure 1, base station Alice has many antennas, desired user Bob uses single antenna, eavesdropping user Eve sets up many antennas in order to obtain information.Here choose base station J=8 antenna in concrete the enforcement, desired user 1 antenna, eavesdropping user 4 antennas.The meaning of secure communication is that the symbol of the base station user that only wishes to be supposed to obtains, and does not wish that being eavesdropped the user obtains.Here it is passive eavesdropping the user, i.e. its eavesdropping information is not to the spatial emission signal.In addition, generally require the transceiver channel can reciprocity in this wireless security mode, when channel became slowly, this reciprocity can be fully guaranteed by time division duplex (TDD).In the communication process, Bob at first sends pilot frequency sequence to Alice, estimates channel h between the two for Alice
AB(n).Alice estimates channel h
AB(n) after, the bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., design weight coefficient then, be assigned to each antenna after constellation point symbol b (n) is weighted and launch, the modulation system of employing is BPSK or QPSK.That adopt in the present embodiment is QPSK, and concrete weighting and transmission flow are as shown in Figure 2.The method for designing of weight coefficient: also become slowly for fear of weight coefficient when channel becomes slowly, Alice need be in all J antennas picked at random J
Rand=4 antennas utilize this J then
RandThe channel design weight coefficient of root antenna, concrete formula is as follows
I
Rand(n) be the selection matrix at random of a J * J dimension, wherein I
Rand(n) random arrangement J on the diagonal
RandIndividual 1, all the other elements are 0.I
Rand(n) effect makes that equivalent channel all changes, thereby has avoided Eve to obtain information when sending each symbol b (n).Particularly, select the aerial array schematic diagram at random as shown in Figure 3, when sending n symbol, select certain J at random
RandRoot antenna (J
Rand<J), when sending next symbol, select J again at random
RandThe root antenna, by that analogy.Change along with sending symbol n among Fig. 3, the aerial array of selection also changes.After generating weight coefficient, Alice is assigned to J to the symbol b (n) that is mapped as constellation point
RandLaunch behind the weight coefficient by the weighting respective antenna on the root antenna.If total transmitting power is P, through behind the wireless channel, the symbol that desired user Bob receives is
ν
Bob(n) for the noise of Bob end, suppose the noise Gaussian distributed.Remove The noise, the phase place of receiving symbol does not have deviation, the estimated value that Bob can directly utilize the method for maximum-likelihood decoding to obtain launching symbol b (n)
Because the channel h between base station and the eavesdropping user
AE(n) be different from the direct channel h of base station and desired user
AB(n), signal is through h
AE(n) symbol of back arrival eavesdropping user side is
v
Eve(n) noise of holding for Eve.Even do not consider noise, the information that Eve receives is the scramble at random to amplitude and the phase place of former symbol b (n), this makes Eve can not use as the maximum likelihood of desired user Bob and directly deciphers, also can't use the such blind equalization algorithm of CMA (constant modulus algorithm) to obtain information, thereby guarantee the safe transmission of information.What Eve we can be interpreted as can not be utilized the CMA blind balance method to obtain information:
Suppose that blind equalization algorithm needs iteration N step to restrain, this just requires Eve will receive N symbol at least, and if channel remains unchanged in the duration substantially at L symbol at most, then the algorithm necessary condition that can restrain is N≤L.In other words, Eve just can't correctly estimate channel when L<N.Because Alice selects J at random in J root antenna at every turn
RandRoot uses, and channel just has
Plant different possibilities, wherein
The expression number of combinations.For iterative algorithm can be restrained, at first to guarantee in N step iteration, to use with a kind of channel, promptly Eve need receive
Individual symbol.If guarantee that channel exists
Individual symbol changed in the duration, promptly
Eve just can't correctly estimate channel so.Therefore, as long as the antenna number of using is abundant, just can make
Enough big, thus make
Final assurance listener-in can't acquisition of information.
Fig. 4 is the comparison diagram of the error rate of this patent method and background technology method (reference method) under the different transmission power with transmit power curve.Along with the increase of transmitting power, the error rate of Bob can significantly reduce, and this patent method can obtain the error rate lower than reference method under the identical situation of transmitting power.
For what being interpreted as under the same transmit gross power, the this patent method can be obtained the performance better than reference method (Bob has the lower error rate), and Fig. 5 provides this patent method and the signal to noise ratio contrast of reference method at different receiving terminals under identical total transmitting power.As can be seen from the figure, using this patent method why can allow Bob obtain the lower error rate is because this method makes the received signal to noise ratio of Bob compare reference method improve a lot (5dB), because two kinds of methods all do not have to do particular processing at Eve, the received signal to noise ratio of Eve is identical under these two kinds of situations.
So far, can verify the useful effect of the safe transmission of this patent method during ensureing radio communication from technical scheme and simulation result.
Claims (3)
1. the safe transmission method of physical layer in the radio communication, the model of communication system that adopts be a cover multi-antenna base station with a single antenna mobile terminal communicate by letter as expectation right, another many antennas mobile terminal is characterized in that as the eavesdropping user, comprises the steps:
A) the single antenna desired user at first sends the unencrypted solicited message to the base station, and this solicited message comprises the pilot frequency sequence that is used for channel estimating simultaneously, and pilot frequency sequence is all known symbol of receiving-transmitting sides;
B) base station receives solicited message, utilizes pilot frequency sequence to estimate channel h between them
AB(n), channel estimating adopts the channel estimation methods of existing band pilot tone, considers that time division duplex and channel become slowly, and the base station is identical with desired user to the channel of base station direction to the channel of desired user direction, is h
AB(n);
C) the base station bit that will send utilizes known a kind of phase modulation method to be modulated to constellation point symbol b (n), n=1,2,3 ..., preceding at each emission b (n), need be from all J root antennas picked at random J
RandThe root antenna, J
Rand<J utilizes this J
RandThe channel I of root antenna
Rand(n) h
AB(n), design weight coefficient
Weight coefficient is changed fast, be weighted, at last the J that is choosing according to the symbol after specifying gross power with weighting to sent constellation point symbol b (n)
RandLaunch on the root antenna.I wherein
Rand(n) be the selection matrix at random of a J * J dimension, I
Rand(n) random arrangement J on the diagonal
RandIndividual 1, all the other elements are 0;
D) desired user receives the symbol after the weighting, and promptly the weighting symbol utilizes the maximum likelihood method decoding;
E) the eavesdropping user receives the symbol after the weighting, makes weight coefficient change fast because handle the base station, and the eavesdropping user can't utilize the blind balance method decoding, if also utilize the maximum likelihood method decoding, then the error rate is 50%, has finally realized safe transmission.
2. the safe transmission method of physical layer in the radio communication as claimed in claim 1 is characterized in that, in the described step b), the channel estimation methods of existing band pilot tone is LS channel estimating, MMSE channel estimating or its improved method.
3. the safe transmission method of physical layer in the radio communication as claimed in claim 1 is characterized in that, in the described step c), adopts the Ditital modulation method of BPSK or QPSK when phase modulation method; Then in the step d), desired user utilizes maximum likelihood method decoding simplified formula to be
Wherein x (n) expression is corresponding to a kind of constellation point of phase modulation method, and y (n) represents the signal that desired user receives.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010234330 CN101902265A (en) | 2010-07-22 | 2010-07-22 | Safe transmission method of physical layer in wireless communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010234330 CN101902265A (en) | 2010-07-22 | 2010-07-22 | Safe transmission method of physical layer in wireless communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101902265A true CN101902265A (en) | 2010-12-01 |
Family
ID=43227501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010234330 Pending CN101902265A (en) | 2010-07-22 | 2010-07-22 | Safe transmission method of physical layer in wireless communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101902265A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102158857A (en) * | 2011-05-27 | 2011-08-17 | 中国人民解放军信息工程大学 | Wireless channel encryption method under disturbance condition and device |
CN102158858A (en) * | 2011-05-27 | 2011-08-17 | 中国人民解放军信息工程大学 | Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy |
CN102611488A (en) * | 2012-03-30 | 2012-07-25 | 山东大学 | Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system |
CN102752080A (en) * | 2012-07-03 | 2012-10-24 | 西安交通大学 | Anti-eavesdrop coding method based on physical layer |
WO2013000174A1 (en) * | 2011-06-30 | 2013-01-03 | 北京邮电大学 | Method for generating consistent cryptographic key based on wireless channel features |
CN102970068A (en) * | 2012-10-22 | 2013-03-13 | 西安交通大学 | Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication |
CN103002440A (en) * | 2012-12-06 | 2013-03-27 | 西安交通大学 | Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array |
CN103067042A (en) * | 2012-12-14 | 2013-04-24 | 中国人民解放军信息工程大学 | Secret communication method and antenna equipment |
CN103236877A (en) * | 2013-04-19 | 2013-08-07 | 西安交通大学 | Weight value feedback reversal training method used for safety wireless communication |
CN104994496A (en) * | 2015-06-26 | 2015-10-21 | 西安交通大学 | Physical layer secure transmission method based on distributed spatial modulation |
CN105282739A (en) * | 2015-11-13 | 2016-01-27 | 西安交通大学 | Point-to-point secret key negotiation method based on physical layer pilot frequency presetting |
CN105812037A (en) * | 2016-03-07 | 2016-07-27 | 西安交通大学 | Noise-eliminating safe transmission method based on receiving end spatial modulation |
CN106130935A (en) * | 2016-06-30 | 2016-11-16 | 西安交通大学 | A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary |
CN106850021A (en) * | 2017-02-03 | 2017-06-13 | 中国科学院信息工程研究所 | Radio communication safety of physical layer implementation method and device based on polarization precoding |
CN108337675A (en) * | 2018-01-24 | 2018-07-27 | 大连理工大学 | A kind of safety of physical layer communication means based on Waveform Design suitable for a single aerial system |
CN108988881A (en) * | 2018-09-30 | 2018-12-11 | 电子科技大学 | A kind of wavelet transformation amendment blind balance method based on dual channel model |
US10305866B2 (en) | 2014-11-25 | 2019-05-28 | Huawei Technologies Co., Ltd. | Data transmission method, base station and user equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1394399A (en) * | 2000-08-30 | 2003-01-29 | 松下电器产业株式会社 | Data transmitting apparatus, radio communication system and radio communication method |
-
2010
- 2010-07-22 CN CN 201010234330 patent/CN101902265A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1394399A (en) * | 2000-08-30 | 2003-01-29 | 松下电器产业株式会社 | Data transmitting apparatus, radio communication system and radio communication method |
Non-Patent Citations (1)
Title |
---|
《西安交通大学学报》 20100630 穆鹏程等 无线通信中使用随机天线阵列的物理层安全传输方法 第1-2节 1-3 第44卷, 第6期 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102158857B (en) * | 2011-05-27 | 2013-07-10 | 中国人民解放军信息工程大学 | Wireless channel encryption method under disturbance condition and device |
CN102158858A (en) * | 2011-05-27 | 2011-08-17 | 中国人民解放军信息工程大学 | Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy |
CN102158857A (en) * | 2011-05-27 | 2011-08-17 | 中国人民解放军信息工程大学 | Wireless channel encryption method under disturbance condition and device |
CN102158858B (en) * | 2011-05-27 | 2013-10-02 | 中国人民解放军信息工程大学 | Method and device for encrypting MMSE (minimum mean square error) pre-equalization wireless channel based on multipath redundancy |
WO2013000174A1 (en) * | 2011-06-30 | 2013-01-03 | 北京邮电大学 | Method for generating consistent cryptographic key based on wireless channel features |
US9002011B2 (en) | 2011-06-30 | 2015-04-07 | Beijing University Of Posts And Telecommunications | Method for generating consistent cryptographic key based on wireless channel features |
CN102611488A (en) * | 2012-03-30 | 2012-07-25 | 山东大学 | Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system |
CN102611488B (en) * | 2012-03-30 | 2014-04-30 | 山东大学 | Beam forming optimization method for improving secrecy performance of decoding and transmitting cooperative system |
CN102752080B (en) * | 2012-07-03 | 2016-12-21 | 西安交通大学 | A kind of anti-eavesdrop coded method based on physical layer |
CN102752080A (en) * | 2012-07-03 | 2012-10-24 | 西安交通大学 | Anti-eavesdrop coding method based on physical layer |
CN102970068B (en) * | 2012-10-22 | 2014-11-05 | 西安交通大学 | Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication |
CN102970068A (en) * | 2012-10-22 | 2013-03-13 | 西安交通大学 | Distributed multi-antenna gap receiving and sending method for security and secrecy wireless communication |
CN103002440A (en) * | 2012-12-06 | 2013-03-27 | 西安交通大学 | Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array |
CN103002440B (en) * | 2012-12-06 | 2014-12-10 | 西安交通大学 | Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array |
CN103067042A (en) * | 2012-12-14 | 2013-04-24 | 中国人民解放军信息工程大学 | Secret communication method and antenna equipment |
CN103067042B (en) * | 2012-12-14 | 2015-08-19 | 中国人民解放军信息工程大学 | A kind of secret communication method and antenna equipment |
CN103236877B (en) * | 2013-04-19 | 2015-07-01 | 西安交通大学 | Weight value feedback reversal training method used for safety wireless communication |
CN103236877A (en) * | 2013-04-19 | 2013-08-07 | 西安交通大学 | Weight value feedback reversal training method used for safety wireless communication |
US10305866B2 (en) | 2014-11-25 | 2019-05-28 | Huawei Technologies Co., Ltd. | Data transmission method, base station and user equipment |
CN104994496B (en) * | 2015-06-26 | 2018-10-30 | 西安交通大学 | Safe transmission method of physical layer based on distributed spatial modulation |
CN104994496A (en) * | 2015-06-26 | 2015-10-21 | 西安交通大学 | Physical layer secure transmission method based on distributed spatial modulation |
CN105282739A (en) * | 2015-11-13 | 2016-01-27 | 西安交通大学 | Point-to-point secret key negotiation method based on physical layer pilot frequency presetting |
CN105282739B (en) * | 2015-11-13 | 2018-12-07 | 西安交通大学 | A kind of point-to-point cryptographic key negotiation method presetting based on physical layer pilot |
CN105812037A (en) * | 2016-03-07 | 2016-07-27 | 西安交通大学 | Noise-eliminating safe transmission method based on receiving end spatial modulation |
CN105812037B (en) * | 2016-03-07 | 2019-02-05 | 西安交通大学 | Noise based on receiving end spatial modulation eliminates safe transmission method |
CN106130935A (en) * | 2016-06-30 | 2016-11-16 | 西安交通大学 | A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary |
CN106130935B (en) * | 2016-06-30 | 2019-04-12 | 西安交通大学 | A kind of adaptive anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary |
CN106850021A (en) * | 2017-02-03 | 2017-06-13 | 中国科学院信息工程研究所 | Radio communication safety of physical layer implementation method and device based on polarization precoding |
CN108337675A (en) * | 2018-01-24 | 2018-07-27 | 大连理工大学 | A kind of safety of physical layer communication means based on Waveform Design suitable for a single aerial system |
CN108988881A (en) * | 2018-09-30 | 2018-12-11 | 电子科技大学 | A kind of wavelet transformation amendment blind balance method based on dual channel model |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101902265A (en) | Safe transmission method of physical layer in wireless communication | |
Guan et al. | Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not? | |
Chen et al. | Multi-antenna relay aided wireless physical layer security | |
Cavers | Single-user and multiuser adaptive maximal ratio transmission for Rayleigh channels | |
Yan et al. | Secret channel training to enhance physical layer security with a full-duplex receiver | |
CN105007578B (en) | Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system | |
Varade et al. | BER comparison of Rayleigh fading, Rician fading and AWGN channel using chaotic communication based MIMO-OFDM system | |
Hafez et al. | Secure spatial multiple access using directional modulation | |
CN105119645A (en) | Receiving antenna space hopping secret communication method in MIMO system | |
Alves et al. | Enhanced physical layer security through transmit antenna selection | |
CN105933040A (en) | Secure transmission method adopting information source and relay-combined transmitting antenna selection | |
CN106470064A (en) | Send deversity scheme and equipment | |
Adachi et al. | Recent advances in single‐carrier distributed antenna network | |
Ban et al. | A practical antenna selection technique in multiuser massive MIMO networks | |
Yang et al. | Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise | |
Hafez et al. | Secure multiple-users transmission using multi-path directional modulation | |
Saleh et al. | Improving communication reliability in vehicular networks using diversity techniques | |
CN102201893B (en) | Method for estimating capacity of multi-antenna multicast system based on maximum and minimum beam forming | |
CN102457324A (en) | Downlink multi-user multi-path beamforming method and device in FDD (Frequency Division Duplexing) system | |
CN107666682A (en) | The transmission method and device of communication channel, system | |
CN103002440B (en) | Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array | |
CN106301492B (en) | A kind of data transmission method and device based on SM-MIMO | |
Shi et al. | Physical layer security techniques for data transmission for future wireless networks | |
CN108337023B (en) | Secure communication method based on multi-user multi-antenna communication system and secret beam forming design | |
CN107846464A (en) | A kind of multiple antennas Internet of Things information transferring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20101201 |