CN103354463A - Cooperative wave beam formation method capable of improving physical layer security based on null space - Google Patents

Cooperative wave beam formation method capable of improving physical layer security based on null space Download PDF

Info

Publication number
CN103354463A
CN103354463A CN2013102479675A CN201310247967A CN103354463A CN 103354463 A CN103354463 A CN 103354463A CN 2013102479675 A CN2013102479675 A CN 2013102479675A CN 201310247967 A CN201310247967 A CN 201310247967A CN 103354463 A CN103354463 A CN 103354463A
Authority
CN
China
Prior art keywords
node
eavesdropping
nodes
vector
centerdot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102479675A
Other languages
Chinese (zh)
Other versions
CN103354463B (en
Inventor
葛建华
林梅露
高明
杨烨
岳安军
程勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201310247967.5A priority Critical patent/CN103354463B/en
Publication of CN103354463A publication Critical patent/CN103354463A/en
Application granted granted Critical
Publication of CN103354463B publication Critical patent/CN103354463B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a cooperative wave beam formation method capable of improving physical layer security based on null space. In the prior art, a safety transmission problem when there is a plurality of eavesdropping nodes in a relay network can not be guaranteed. By using the method of the invention, the above problem is mainly solved. The method comprises the steps that 1) a source node sends confidential information to all the relay nodes and a relay carries out weighting processing on a received signal and then forwards to a destination node and the eavesdropping nodes; 2) a received signal to noise ratio of the destination node and the eavesdropping nodes is calculated; 3) according to the received signal to noise ratio, a safe rate of the destination node is calculated; 4) according to the signal after the weighting processing which is performed by the relay, consumption of relay total power and the power is calculated so as to obtain a power constraint; 5) the null space of an equivalent channel matrix of the eavesdropping nodes is calculated so as to obtain a space constraint; 6) under the condition that the power constraint and the space constraint are satisfied, an optimal wave beam shaping weight vector is designed; 7) the optimal wave beam shaping weight vector is distributed to each relay node. By using the method of the invention, the safe rate of the relay network where the plurality of eavesdropping nodes exist can be effectively increased.

Description

Strengthen the cooperative beam formation method of physical layer safety based on kernel
Technical field
The invention belongs to wireless communication technology field, further relate to when existing a plurality of listener-ins and each via node to have self power constraint in the wireless relay network, the cooperative beam manufacturing process can be used for strengthening in the NGBW cooperation communication system physical layer safety.
Background technology
In order to satisfy the requirement of 3GPP Long Term Evolution LTE High Data Rate and high power system capacity, multiple-input and multiple-output MIMO technology is widely used in the up-downgoing system of LTE.The MIMO technology can take full advantage of the space diversity except time, frequency diversity of being brought by many antennas on the transceiver, effectively improves the quality that receives signal and improves message transmission rate.And for single antenna equipment, road has been paved in the application that is introduced as MIMO of cooperating relay technology, and the cooperating relay technology can be considered as a kind of virtual MIMO in essence.Therefore, the many technological expansion in the mimo system can be obtained space diversity and spatial multiplexing gain simultaneously in cooperative relay system.Wherein, cooperative beam is shaped and has obtained broad research as an important technology.Its basic thought is the restore one's right value by adjustment relay forwarding signal, and namely distributed beam forming weight vector forms a virtual beams of aiming at receiving terminal, and then improves signal to noise ratio, power system capacity or coverage.
In addition, along with progressively application and the development of LTE system, the syncretization of its communication system, the high speed of the rate of information throughput are so that traditional link layer security algorithm has run into very large challenge in LTE.And the physical layer safe practice does not rely on upper layer data with it and encrypts and safe and reliable communication is provided and receives much concern.The spatial degrees of freedom that tradition MIMO and distributed MIMO technology all can utilize many antennas to bring effectively weakens the listener-in to the interception of confidential information.Wherein, cooperative beam is shaped and has been proved to be to strengthen a kind of effective ways of physical layer safety, and it maximizes the security of system transmission rate by the weight vector of choose reasonable beam forming.
For the wireless relay network that adopts amplification forwarding AF agreement, the people such as L.Dong are at " Improving wireless physical layer security via cooperative relays " (IEEE Trans.Signal Process., vol.58, no.3, pp.1875-1888, a kind of cooperative beam shaping scheme that strengthens physical layer safety based on kernel has been proposed Mar.2010), but this scheme has only been considered the constraint of relaying gross power, and each relaying may have self power constraint in practice.For this reason, for the constrained situation of each relaying self power, the people such as J.Zhang are at " Relay beamforming strategies for physical-layer security(in Proc.44 ThConference on Information Sciences and Systems, Princeton, Mar.2010, pp.1-6) " in the design that a kind of iterative algorithm carries out cooperative beam shaping weight vector has been proposed.But this algorithm is only applicable to exist in the network single listener-in's situation, and is difficult to be applied to have in the NGBW cooperation communication system a plurality of listener-ins' situation.
Summary of the invention
The object of the invention is to for the deficiencies in the prior art, a kind of cooperative beam formation method that strengthens physical layer safety based on kernel is proposed, in junction network, to exist a plurality of eavesdropping nodes and each via node to satisfy under the condition of self power constraint, the effective safe speed of elevator system.
For achieving the above object, concrete steps of the present invention comprise as follows:
1) cooperating relay was transmitted in two stages:
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y r
1b) in second stage, via node is y to the received signal rBe weighted processing, obtain signal x to be transmitted r(w)=D (y r) w, wherein w is for needing the junction waves beam shaping weight vector of design, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, and the signal that the note destination node receives is y d(w), remember that the signal that j eavesdropping node receives is y E, j(w), E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node;
2) according to above-mentioned reception signal y d(w) and y E, j(w), calculate the received signal to noise ratio γ of destination node d(w) and j the eavesdropping node received signal to noise ratio γ E, j(w);
3) according to above-mentioned received signal to noise ratio γ d(w) and γ E, j(w), calculate the safe speed of destination node R s ( w ) = 1 2 min j { log ( 1 + γ d ( w ) ) - log ( 1 + γ e , j ( w ) ) } ;
4) according to step 1b) in treat forward signal x r(w), calculate the consumption of via node gross power || x r(w) || 2Consumption with i via node self power | x R, i(w) | 2, and will || x r(w) || 2≤ P TotWith | x R, i(w) | 2≤ P iAs the power constraint condition of design junction waves beam shaping weight vector, wherein x R, i(w) expression x r(w) i element, P TotThe total power thresholds of all via nodes, P iThe power threshold of i via node self, this P TotAnd P iSet generation by actual cooperation communication system,
Figure BDA00003376107900031
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node;
5) calculate the kernel U that all eavesdrop the node equivalent channel matrixes, with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R s(w), || x r(w) || 2With | x R, i(w) | 2Be rewritten as R s(v), || x r(v) || 2With | x R, i(v) | 2, and will be converted into to the design of w design to v;
6) satisfy above-mentioned || x r(v) || 2≤ P TotWith | x R, i(v) | 2≤ P iConstraint under, design vector v is so that safe speed R s(v) maximization obtains optimal design v *, and according to the space constraint of w=Uv in the step 5), obtaining optimal beam shaping weight vector is w *=Uv *
7) according to optimal beam shaping weight vector w *, with w *In i element
Figure BDA00003376107900033
Distribute to i via node.
The present invention compared with prior art has the following advantages
The present invention is owing to design the beam forming weight vector in the kernel of a plurality of eavesdropping node equivalent channel matrixes, and the beam forming weight vector that obtains optimum under the prerequisite that satisfies each via node self power constraint designs, guaranteed that not only each via node can work under self power threshold of default, and Effective Raise the safe speed when having a plurality of eavesdropping node in the cooperative relay system.
Description of drawings
Fig. 1 is the system model figure that the present invention is suitable for;
Fig. 2 is workflow diagram of the present invention;
Fig. 3 is the present invention and existing methodical safe speed comparison diagram.
Embodiment
With reference to the accompanying drawings and in conjunction with example the present invention is described further.
With reference to Fig. 1, the system model that the present invention adopts is by a source node S, a destination node D, K via node and M eavesdrop node composition, wherein K〉M.Each node all is equipped with single antenna, and adopts the half-duplex mode of operation.Suppose that all channels all experience separate flat Rayleigh fading, do not have the link that direct transfers between source node and the destination node, and source node can obtain the global channel state information.For representing conveniently, source node is expressed as f to the channel vector of all via nodes, all via nodes are expressed as g to the channel vector of destination node, and all via nodes are expressed as h to m the channel vector of eavesdropping node j, wherein,
Figure BDA00003376107900032
E represents to contain the set of all eavesdropping nodes.The reception noise of supposing each Nodes is additive white Gaussian noise, and the obedience average is that zero variance is 1 multiple Gaussian Profile.Because via node is operated in semiduplex mode, whole cooperation transmission process is divided into two stages.Phase I, source node is given all via node speech amplifier confidential informations; Second stage, via node adopt based on the host-host protocol of AF and transmit the information of source node to destination node and eavesdropping node.
With reference to Fig. 2, performing step of the present invention is as follows:
Step 1: cooperating relay was transmitted in two stages.
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y r, this receives signal y rCan be expressed as vector form:
y r = Δ [ y r , 1 , . . . , y r , i , . . . y r , K ] T = P s fs + n r ,
Wherein, s represents confidential information, P sThe average transmit power of source node, y R, iThe reception signal that represents i via node place,
Figure BDA00003376107900042
The expression source node is to the channel vector of all via nodes, f iRepresent source node to the channel information of i via node,
Figure BDA00003376107900043
The reception noise vector of expression via node, n R, iThe reception noise that represents i via node,
Figure BDA00003376107900044
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node, () TThe operation that transposition is got in expression;
1b) in second stage, via node is y to the received signal rBe weighted processing, obtain signal x to be transmitted r(w), this signal x to be transmitted r(w) can be expressed as vector form:
x r ( w ) = Δ [ x r , 1 ( w ) , . . . , x r , i ( w ) , . . . , x r , K ( w ) ] T = D ( y r ) w ,
Wherein, x R, i(w) i via node place of expression treats forward signal, y rBe the signal of via node reception,
Figure BDA00003376107900046
Expression needs the junction waves beam shaping weight vector of design, w iBe i the weights that relaying need to design,
Figure BDA00003376107900047
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, the signal y that the note destination node receives d(w) and j the signal y that the eavesdropping node receives E, j(w) be respectively:
y d ( w ) = g H x r ( w ) + n d = P s g H D ( f ) ws + n r T D H ( g ) w + n d ,
y e , j ( w ) = h j H x r ( w ) + n e , j = P s h j H D ( f ) ws + n r T D H ( h j ) w + n e , j ,
Wherein,
Figure BDA00003376107900052
Represent that all via nodes are to the channel vector of destination node, g iBe the channel information that i via node arrives destination node, Represent that all via nodes are to the channel vector of j eavesdropping node, h I, jBe that i via node is to the channel information of j eavesdropping node, n dThe reception noise of expression destination node, n E, iThe reception noise that represents j eavesdropping node,
Figure BDA00003376107900054
E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node, () HThe conjugate transpose of matrix, () are got in expression TThe operation that transposition is got in expression.
Step 2: according to above-mentioned reception signal y d(w) and y E, j(w), calculate the received signal to noise ratio γ of destination node d(w) and j the eavesdropping node received signal to noise ratio γ E, j(w) be respectively:
γ d ( w ) = P s w H D ( f ) gg H D H ( f ) w 1 + w H D ( gg H ) w ,
γ e , j ( w ) = P s w H D ( f ) h j h j H D H ( f ) w 1 + w H D ( h j h j H ) w .
Step 3: according to above-mentioned received signal to noise ratio γ d(w) and γ E, j(w), calculate the safe speed R of destination node s(w) be:
R s ( w ) = 1 2 min j ( log ( 1 + P s w H D ( f ) gg H D H ( f ) w 1 + w H D ( gg H ) w ) - log ( 1 + P s w H D ( f ) h j h j H D H ( f ) w 1 + w H D ( h j h j H ) w ) )
Wherein, log () the expression end is 2 logarithmic function.
Step 4: according to step 1b) treats forward signal x in r(w), calculate the total power consumption at via node place || x r(w) || 2With self power consumption | x R, i(w) | 2Be respectively:
||x r(w)|| 2=Tr(D H(y r)D(y r)ww H)=Tr((P sD(f)D H(f)+I K)ww H),
| x r , i ( w ) | 2 = e i T ( D H ( y r ) D ( y r ) ww H ) e i = e i T ( ( P s D ( f ) D H ( f ) + I K ) ww H ) e i ,
Wherein, incite somebody to action || x r(w) || 2≤ P TotWith | x R, i(w) | 2≤ P iAs total power constraint and self power constraint of design junction waves beam shaping weight vector, P TotThe total power thresholds of all via nodes, P kThe power threshold of k via node self, this P TotAnd P kSet generation by actual cooperation communication system, matrix trace, e are got in Tr () expression iRepresent that i element is 1 unit column vector,
Figure BDA00003376107900066
I KThe unit matrix of expression K * K, K is the number of via node, and satisfies K〉constraint of M, wherein M is the number of eavesdropping node.
Step 5: the kernel U that calculates all eavesdropping node equivalent channel matrixes:
5a) calculating j the equivalent channel vector of eavesdropping node is
Figure BDA00003376107900067
With all forms of eavesdropping the equivalent channel vector matrix of being write as of nodes be h 1 H D ( f ) · · · h j H D ( f ) · · · h M H D ( f ) ,
Wherein, f represents that source node arrives the channel vector of all via nodes, h jRepresent all via nodes to the channel vector of j eavesdropping node,
Figure BDA00003376107900062
E represents to contain the set of all eavesdropping nodes, and M is the number of eavesdropping node, () HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation;
5b) utilize the encapsulation function null () of MATLAB software, calculate the kernel U of above-mentioned eavesdropping node equivalent channel matrix:
U = null ( h 1 H D ( f ) · · · h j H D ( f ) · · · h M H D ( f ) ) .
Step 6: with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R s(w), || x r(w) || 2With | x R, i(w) | 2Be rewritten as R s(v), || x r(v) || 2With | x R, i(v) | 2, namely R s ( v ) = 1 2 min j ( log ( 1 + P s v H U H D ( f ) gg H D H ( f ) Uv 1 + v H U H D ( gg H ) Uv ) - log ( 1 + P s v H U H D ( f ) h j h j H D H ( f ) Uv 1 + v H U H D ( h j h j H ) Uv ) ) ,
||x r(v)|| 2=Tr(D H(y r)D(y r)Uvv HU H)=Tr((P sD(f)D H(f)+I K)Uvv HU H),
| x r , i ( v ) | 2 = e i T ( D H ( y r ) D ( y r ) Uvv H U H ) e i = e i T ( ( P s D ( f ) D H ( f ) + I K ) Uvv H U H ) e i ,
Wherein, v is for needing the vector of design, and the design of w namely is converted into design to v.
Step 7: satisfying || x r(v) || 2≤ P TotWith | x R, i(v) | 2≤ P iConstraint under, maximize safe speed R s(v), obtain optimal design v *, and according to the space constraint of above-mentioned w=Uv, obtaining optimal beam shaping weight vector is w *=Uv *
Step 8: according to optimal beam shaping weight vector w *, with w *In i element
Figure BDA00003376107900071
Distribute to i via node.
Effect of the present invention can further specify by following emulation:
1, simulation parameter is set:
All channels all independently produce and obey average is 0, and variance is 1 multiple Gaussian Profile.Via node number K=10, eavesdropping node number M=5.Suppose that when the numbering i of relaying node is odd number this relaying self power threshold is P i=0.5P TotK, when the numbering i of relaying node was even number, this relaying self power threshold was P i=2P TotK, wherein P TotRelaying gross power threshold value for actual cooperation communication system.
2, simulation result:
The present invention and the existing cooperative beam method of formationing that strengthens physical layer safety based on kernel have been carried out the emulation comparison to safe speed under above-mentioned simulated conditions, simulation result as shown in Figure 3.
As can be seen from Figure 3, the via node gross power threshold value P to setting Tot, the present invention compares existing cooperative beam formation method based on kernel enhancing physical layer safety, and energy is the safe speed of elevator system obviously, and the effect that promotes is along with source node transmitting power P sIncrease and increase.

Claims (4)

1. one kind strengthens the cooperative beam formation method of physical layer safety based on kernel, may further comprise the steps:
1) cooperating relay was transmitted in two stages:
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y r
1b) in second stage, via node is y to the received signal rBe weighted processing, obtain signal x to be transmitted r(w)=D (y r) w, wherein w is for needing the junction waves beam shaping weight vector of design, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, and the signal that the note destination node receives is y d(w), remember that the signal that j eavesdropping node receives is y E, j(w),
Figure FDA00003376107800011
E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node;
2) according to above-mentioned reception signal y d(w) and y E, j(w), calculate the received signal to noise ratio γ of destination node d(w) and j the eavesdropping node received signal to noise ratio γ E, j(w);
3) according to above-mentioned received signal to noise ratio γ d(w) and γ E, j(w), calculate the safe speed of destination node R s ( w ) = 1 2 min j { log ( 1 + γ d ( w ) ) - log ( 1 + γ e , j ( w ) ) } ;
4) according to step 1b) in treat forward signal x r(w), calculate the consumption of via node gross power || x r(w) || 2Consumption with i via node self power | x R, i(w) | 2, and will || x r(w) || 2≤ P TotWith | x R, i(w) | 2≤ P iAs the power constraint condition of design junction waves beam shaping weight vector, wherein x R, i(w) expression x r(w) i element, P TotThe total power thresholds of all via nodes, P iThe power threshold of i via node self, this P TotAnd P iSet generation by actual cooperation communication system,
Figure FDA00003376107800013
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node;
5) calculate the kernel U that all eavesdrop the node equivalent channel matrixes, with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R s(w), || x r(w) || 2With | x R, i(w) | 2Be rewritten as R s(v), || x r(v) || 2With | x R, i(v) | 2, and will be converted into to the design of w design to v;
6) satisfy above-mentioned || x r(v) || 2≤ P TotWith | x R, i(v) | 2≤ P iConstraint under, design vector v is so that safe speed R s(v) maximization obtains optimal design v *, and according to the space constraint of w=Uv in the step 5), obtaining optimal beam shaping weight vector is w *=Uv *
7) according to optimal beam shaping weight vector w *, with w *In i element
Figure FDA00003376107800024
Distribute to i via node.
2. according to claim 1ly strengthen the cooperative beam formation method of physical layer safety, wherein step 2 based on kernel) the received signal to noise ratio γ of described calculating destination node d(w) and j the eavesdropping node received signal to noise ratio γ E, j(w), undertaken by following formula
γ d ( w ) = P s w H D ( f ) gg H D H ( f ) w 1 + w H D ( gg H ) w
γ e , j ( w ) = P s w H D ( f ) h j h j H D H ( f ) w 1 + w H D ( h j h j H ) w
Wherein, P sThe transmitting power of expression source node, f represents that source node arrives the channel vector of all via nodes, g represents that all via nodes are to the channel vector of destination node, h jRepresent that all via nodes are to the channel vector of j eavesdropping node, () TTranspose of a matrix, () are got in expression HThe conjugate transpose of matrix is got in expression.
3. according to claim 1ly strengthen the cooperative beam formation method of physical layer safety, the wherein consumption of the described calculating via node of step 4) gross power based on kernel || x r(w) || 2Consumption with k via node self power | x R, i(w) | 2, undertaken by following formula
||x r(w)|| 2=Tr(D H(y r)D(y r)ww H)=Tr((P sD(f)D H(f)+I K)ww H)
| x r , i ( w ) | 2 = e i T ( D H ( y r ) D ( y r ) ww H ) e i = e i T ( ( P s D ( f ) D H ( f ) + I K ) ww H ) e i
Wherein, P sThe transmitting power of expression source node, f represents that source node arrives the channel vector of all via nodes, matrix trace, () are got in Tr () expression HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation, e iRepresent that i element is 1 unit column vector, I KThe unit matrix of expression K * K, K is the number of via node, and satisfies the constraint of K>M, wherein M is the number of eavesdropping node.
4. according to claim 1ly strengthen the cooperative beam method of formationing of physical layer safety based on kernel, wherein the described calculating of step 5) all eavesdrop the kernel U of node equivalent channel matrixes, carry out as follows:
5a) calculate j the equivalent channel vector of eavesdropping node
Figure FDA00003376107800031
And with forms of the equivalent channel vector matrix of being write as of all eavesdropping nodes be h 1 H D ( f ) · · · h j H D ( f ) · · · h M H D ( f ) ,
Wherein, f represents that source node arrives the channel vector of all via nodes, h jRepresent all via nodes to the channel vector of j eavesdropping node,
Figure FDA00003376107800033
E represents to contain the set of all eavesdropping nodes, and M is the number of eavesdropping node, () HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation;
5b) utilize the encapsulation function null () of MATLAB software, calculate the kernel U of above-mentioned eavesdropping node equivalent channel matrix:
U = null ( h 1 H D ( f ) · · · h j H D ( f ) · · · h M H D ( f ) ) .
CN201310247967.5A 2013-06-20 2013-06-20 The cooperative beam formation method of safety of physical layer is strengthened based on kernel Expired - Fee Related CN103354463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310247967.5A CN103354463B (en) 2013-06-20 2013-06-20 The cooperative beam formation method of safety of physical layer is strengthened based on kernel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310247967.5A CN103354463B (en) 2013-06-20 2013-06-20 The cooperative beam formation method of safety of physical layer is strengthened based on kernel

Publications (2)

Publication Number Publication Date
CN103354463A true CN103354463A (en) 2013-10-16
CN103354463B CN103354463B (en) 2016-03-02

Family

ID=49310793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310247967.5A Expired - Fee Related CN103354463B (en) 2013-06-20 2013-06-20 The cooperative beam formation method of safety of physical layer is strengthened based on kernel

Country Status (1)

Country Link
CN (1) CN103354463B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580815A (en) * 2013-10-17 2014-02-12 华南理工大学 Asynchronous underwater full-rate cooperative communication method
CN104917558A (en) * 2015-06-19 2015-09-16 电子科技大学 Method for establishing unconditionally secure communication model based on combination of beam forming and security coding
CN106059705A (en) * 2016-05-17 2016-10-26 北京邮电大学 Relay physical layer safe transmission method
CN106792660A (en) * 2017-03-06 2017-05-31 北京理工大学 A kind of remote safety of physical layer energy-collecting method
CN106788643A (en) * 2016-12-29 2017-05-31 中国人民解放军理工大学 A kind of safe method for precoding of multi-user to end-to-end relay system
CN106921418A (en) * 2017-03-31 2017-07-04 南京邮电大学 A kind of relay cooperative method for precoding based on imperfect channel state information
US10305866B2 (en) 2014-11-25 2019-05-28 Huawei Technologies Co., Ltd. Data transmission method, base station and user equipment
CN110149135A (en) * 2019-04-15 2019-08-20 上海师范大学 Multipair extensive MIMO bilateral relay network method for communication transmission and control device
CN111262803A (en) * 2020-03-04 2020-06-09 广州番禺职业技术学院 Physical layer secure communication method, device and system based on deep learning
CN114697103A (en) * 2022-03-25 2022-07-01 电子科技大学 Physical layer secure transmission transmitting weight vector calculation method based on mirror image operation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136682A (en) * 2006-08-28 2008-03-05 株式会社Ntt都科摩 Relay node and relay method
US20090040960A1 (en) * 2007-08-08 2009-02-12 Samsung Electronics Co., Ltd. Space frequency block code signal processing system
CN102231641A (en) * 2011-07-21 2011-11-02 西安电子科技大学 MIMO (Multiple Input Multiple Output) step-by-step parallel detection method
CN102938686A (en) * 2012-11-21 2013-02-20 西安电子科技大学 Decode-and-forward cooperative communication method with high-order diversity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136682A (en) * 2006-08-28 2008-03-05 株式会社Ntt都科摩 Relay node and relay method
US20090040960A1 (en) * 2007-08-08 2009-02-12 Samsung Electronics Co., Ltd. Space frequency block code signal processing system
CN102231641A (en) * 2011-07-21 2011-11-02 西安电子科技大学 MIMO (Multiple Input Multiple Output) step-by-step parallel detection method
CN102938686A (en) * 2012-11-21 2013-02-20 西安电子科技大学 Decode-and-forward cooperative communication method with high-order diversity

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580815A (en) * 2013-10-17 2014-02-12 华南理工大学 Asynchronous underwater full-rate cooperative communication method
US10305866B2 (en) 2014-11-25 2019-05-28 Huawei Technologies Co., Ltd. Data transmission method, base station and user equipment
CN104917558A (en) * 2015-06-19 2015-09-16 电子科技大学 Method for establishing unconditionally secure communication model based on combination of beam forming and security coding
CN104917558B (en) * 2015-06-19 2018-02-16 电子科技大学 Based on beam forming and the united unconditional security traffic model method for building up of safe coding
CN106059705A (en) * 2016-05-17 2016-10-26 北京邮电大学 Relay physical layer safe transmission method
CN106059705B (en) * 2016-05-17 2018-10-26 北京邮电大学 A kind of relaying safe transmission method of physical layer
CN106788643A (en) * 2016-12-29 2017-05-31 中国人民解放军理工大学 A kind of safe method for precoding of multi-user to end-to-end relay system
CN106788643B (en) * 2016-12-29 2020-01-07 中国人民解放军理工大学 Safety pre-coding method for multi-user to end-to-end relay system
CN106792660A (en) * 2017-03-06 2017-05-31 北京理工大学 A kind of remote safety of physical layer energy-collecting method
CN106921418A (en) * 2017-03-31 2017-07-04 南京邮电大学 A kind of relay cooperative method for precoding based on imperfect channel state information
CN106921418B (en) * 2017-03-31 2020-08-25 南京邮电大学 Relay cooperative precoding method based on non-ideal channel state information
CN110149135A (en) * 2019-04-15 2019-08-20 上海师范大学 Multipair extensive MIMO bilateral relay network method for communication transmission and control device
CN111262803A (en) * 2020-03-04 2020-06-09 广州番禺职业技术学院 Physical layer secure communication method, device and system based on deep learning
CN111262803B (en) * 2020-03-04 2022-08-26 广州番禺职业技术学院 Physical layer secure communication method, device and system based on deep learning
CN114697103A (en) * 2022-03-25 2022-07-01 电子科技大学 Physical layer secure transmission transmitting weight vector calculation method based on mirror image operation

Also Published As

Publication number Publication date
CN103354463B (en) 2016-03-02

Similar Documents

Publication Publication Date Title
CN103354463B (en) The cooperative beam formation method of safety of physical layer is strengthened based on kernel
CN106059705B (en) A kind of relaying safe transmission method of physical layer
CN102355661B (en) Non-regenerative-relay-mode-based relay forwarding control method and device
CN105515717A (en) Cooperative relay security transmission method based on artificial noise interference
CN104378757A (en) Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network
EP3267617B1 (en) Signal sending method and device
CN106533516A (en) Physical layer security transmission method for multi-antenna multi-relay cognitive wiretapping network
CN101252418A (en) Self-adapting transmitting method using channel statistical information in multi-aerial transmission system
CN103856299B (en) Signal safe transmission method of MIMO amplifying forwarding relay network
CN105246158A (en) Energy efficiency maximization multi-antenna relay system power allocation method based on high signal-to-noise ratio
CN103906198A (en) Relay selection and power distribution method for amplifying-and-forwarding collaborative network
CN105471775A (en) Low complexity channel estimation method in large scale MIMO system
CN104539334A (en) Method for forming wave beam supporting multiple users to high-speed communication based on SWIPT
CN104717035A (en) Interference alignment method of cellular network based on D2D communication
CN105162503A (en) Multi-user beam forming and antenna selection joint-design method in massive multiple-input multiple-output (MIMO) system
Hoydis et al. Outage performance of cooperative small-cell systems under Rician fading channels
Abdulateef et al. Performance analyses of channel estimation and precoding for massive MIMO downlink in the TDD system
CN112804168B (en) Tensor chain decomposition-based millimeter wave relay system channel estimation method
CN105007248B (en) A kind of downlink precoding method of MIMO Full-duplex cellular systems
CN103269242B (en) A kind of uplink coordinated junction waves beam forming method based on convex optimization
CN102801456A (en) Combined downlink precoding method of single-cell relay communication cellular system
CN108173575A (en) multiple-input and multiple-output relay antenna design method
CN104093143A (en) Self-adaptive cooperation method in physical layer safety communication
CN103259586B (en) A kind of multi-hop cooperating relay beam-forming method based on genetic algorithm
CN105656530A (en) Method and system for improving security rate of MIMO security communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20210620