CN103354463A - Cooperative wave beam formation method capable of improving physical layer security based on null space - Google Patents
Cooperative wave beam formation method capable of improving physical layer security based on null space Download PDFInfo
- Publication number
- CN103354463A CN103354463A CN2013102479675A CN201310247967A CN103354463A CN 103354463 A CN103354463 A CN 103354463A CN 2013102479675 A CN2013102479675 A CN 2013102479675A CN 201310247967 A CN201310247967 A CN 201310247967A CN 103354463 A CN103354463 A CN 103354463A
- Authority
- CN
- China
- Prior art keywords
- node
- eavesdropping
- nodes
- vector
- centerdot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a cooperative wave beam formation method capable of improving physical layer security based on null space. In the prior art, a safety transmission problem when there is a plurality of eavesdropping nodes in a relay network can not be guaranteed. By using the method of the invention, the above problem is mainly solved. The method comprises the steps that 1) a source node sends confidential information to all the relay nodes and a relay carries out weighting processing on a received signal and then forwards to a destination node and the eavesdropping nodes; 2) a received signal to noise ratio of the destination node and the eavesdropping nodes is calculated; 3) according to the received signal to noise ratio, a safe rate of the destination node is calculated; 4) according to the signal after the weighting processing which is performed by the relay, consumption of relay total power and the power is calculated so as to obtain a power constraint; 5) the null space of an equivalent channel matrix of the eavesdropping nodes is calculated so as to obtain a space constraint; 6) under the condition that the power constraint and the space constraint are satisfied, an optimal wave beam shaping weight vector is designed; 7) the optimal wave beam shaping weight vector is distributed to each relay node. By using the method of the invention, the safe rate of the relay network where the plurality of eavesdropping nodes exist can be effectively increased.
Description
Technical field
The invention belongs to wireless communication technology field, further relate to when existing a plurality of listener-ins and each via node to have self power constraint in the wireless relay network, the cooperative beam manufacturing process can be used for strengthening in the NGBW cooperation communication system physical layer safety.
Background technology
In order to satisfy the requirement of 3GPP Long Term Evolution LTE High Data Rate and high power system capacity, multiple-input and multiple-output MIMO technology is widely used in the up-downgoing system of LTE.The MIMO technology can take full advantage of the space diversity except time, frequency diversity of being brought by many antennas on the transceiver, effectively improves the quality that receives signal and improves message transmission rate.And for single antenna equipment, road has been paved in the application that is introduced as MIMO of cooperating relay technology, and the cooperating relay technology can be considered as a kind of virtual MIMO in essence.Therefore, the many technological expansion in the mimo system can be obtained space diversity and spatial multiplexing gain simultaneously in cooperative relay system.Wherein, cooperative beam is shaped and has obtained broad research as an important technology.Its basic thought is the restore one's right value by adjustment relay forwarding signal, and namely distributed beam forming weight vector forms a virtual beams of aiming at receiving terminal, and then improves signal to noise ratio, power system capacity or coverage.
In addition, along with progressively application and the development of LTE system, the syncretization of its communication system, the high speed of the rate of information throughput are so that traditional link layer security algorithm has run into very large challenge in LTE.And the physical layer safe practice does not rely on upper layer data with it and encrypts and safe and reliable communication is provided and receives much concern.The spatial degrees of freedom that tradition MIMO and distributed MIMO technology all can utilize many antennas to bring effectively weakens the listener-in to the interception of confidential information.Wherein, cooperative beam is shaped and has been proved to be to strengthen a kind of effective ways of physical layer safety, and it maximizes the security of system transmission rate by the weight vector of choose reasonable beam forming.
For the wireless relay network that adopts amplification forwarding AF agreement, the people such as L.Dong are at " Improving wireless physical layer security via cooperative relays " (IEEE Trans.Signal Process., vol.58, no.3, pp.1875-1888, a kind of cooperative beam shaping scheme that strengthens physical layer safety based on kernel has been proposed Mar.2010), but this scheme has only been considered the constraint of relaying gross power, and each relaying may have self power constraint in practice.For this reason, for the constrained situation of each relaying self power, the people such as J.Zhang are at " Relay beamforming strategies for physical-layer security(in Proc.44
ThConference on Information Sciences and Systems, Princeton, Mar.2010, pp.1-6) " in the design that a kind of iterative algorithm carries out cooperative beam shaping weight vector has been proposed.But this algorithm is only applicable to exist in the network single listener-in's situation, and is difficult to be applied to have in the NGBW cooperation communication system a plurality of listener-ins' situation.
Summary of the invention
The object of the invention is to for the deficiencies in the prior art, a kind of cooperative beam formation method that strengthens physical layer safety based on kernel is proposed, in junction network, to exist a plurality of eavesdropping nodes and each via node to satisfy under the condition of self power constraint, the effective safe speed of elevator system.
For achieving the above object, concrete steps of the present invention comprise as follows:
1) cooperating relay was transmitted in two stages:
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y
r
1b) in second stage, via node is y to the received signal
rBe weighted processing, obtain signal x to be transmitted
r(w)=D (y
r) w, wherein w is for needing the junction waves beam shaping weight vector of design, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, and the signal that the note destination node receives is y
d(w), remember that the signal that j eavesdropping node receives is y
E, j(w),
E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node;
2) according to above-mentioned reception signal y
d(w) and y
E, j(w), calculate the received signal to noise ratio γ of destination node
d(w) and j the eavesdropping node received signal to noise ratio γ
E, j(w);
3) according to above-mentioned received signal to noise ratio γ
d(w) and γ
E, j(w), calculate the safe speed of destination node
4) according to step 1b) in treat forward signal x
r(w), calculate the consumption of via node gross power || x
r(w) ||
2Consumption with i via node self power | x
R, i(w) |
2, and will || x
r(w) ||
2≤ P
TotWith | x
R, i(w) |
2≤ P
iAs the power constraint condition of design junction waves beam shaping weight vector, wherein x
R, i(w) expression x
r(w) i element, P
TotThe total power thresholds of all via nodes, P
iThe power threshold of i via node self, this P
TotAnd P
iSet generation by actual cooperation communication system,
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node;
5) calculate the kernel U that all eavesdrop the node equivalent channel matrixes, with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R
s(w), || x
r(w) ||
2With | x
R, i(w) |
2Be rewritten as R
s(v), || x
r(v) ||
2With | x
R, i(v) |
2, and will be converted into to the design of w design to v;
6) satisfy above-mentioned || x
r(v) ||
2≤ P
TotWith | x
R, i(v) |
2≤ P
iConstraint under, design vector v is so that safe speed R
s(v) maximization obtains optimal design v
*, and according to the space constraint of w=Uv in the step 5), obtaining optimal beam shaping weight vector is w
*=Uv
*
7) according to optimal beam shaping weight vector w
*, with w
*In i element
Distribute to i via node.
The present invention compared with prior art has the following advantages
The present invention is owing to design the beam forming weight vector in the kernel of a plurality of eavesdropping node equivalent channel matrixes, and the beam forming weight vector that obtains optimum under the prerequisite that satisfies each via node self power constraint designs, guaranteed that not only each via node can work under self power threshold of default, and Effective Raise the safe speed when having a plurality of eavesdropping node in the cooperative relay system.
Description of drawings
Fig. 1 is the system model figure that the present invention is suitable for;
Fig. 2 is workflow diagram of the present invention;
Fig. 3 is the present invention and existing methodical safe speed comparison diagram.
Embodiment
With reference to the accompanying drawings and in conjunction with example the present invention is described further.
With reference to Fig. 1, the system model that the present invention adopts is by a source node S, a destination node D, K via node and M eavesdrop node composition, wherein K〉M.Each node all is equipped with single antenna, and adopts the half-duplex mode of operation.Suppose that all channels all experience separate flat Rayleigh fading, do not have the link that direct transfers between source node and the destination node, and source node can obtain the global channel state information.For representing conveniently, source node is expressed as f to the channel vector of all via nodes, all via nodes are expressed as g to the channel vector of destination node, and all via nodes are expressed as h to m the channel vector of eavesdropping node
j, wherein,
E represents to contain the set of all eavesdropping nodes.The reception noise of supposing each Nodes is additive white Gaussian noise, and the obedience average is that zero variance is 1 multiple Gaussian Profile.Because via node is operated in semiduplex mode, whole cooperation transmission process is divided into two stages.Phase I, source node is given all via node speech amplifier confidential informations; Second stage, via node adopt based on the host-host protocol of AF and transmit the information of source node to destination node and eavesdropping node.
With reference to Fig. 2, performing step of the present invention is as follows:
Step 1: cooperating relay was transmitted in two stages.
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y
r, this receives signal y
rCan be expressed as vector form:
Wherein, s represents confidential information, P
sThe average transmit power of source node, y
R, iThe reception signal that represents i via node place,
The expression source node is to the channel vector of all via nodes, f
iRepresent source node to the channel information of i via node,
The reception noise vector of expression via node, n
R, iThe reception noise that represents i via node,
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node, ()
TThe operation that transposition is got in expression;
1b) in second stage, via node is y to the received signal
rBe weighted processing, obtain signal x to be transmitted
r(w), this signal x to be transmitted
r(w) can be expressed as vector form:
Wherein, x
R, i(w) i via node place of expression treats forward signal, y
rBe the signal of via node reception,
Expression needs the junction waves beam shaping weight vector of design, w
iBe i the weights that relaying need to design,
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, the signal y that the note destination node receives
d(w) and j the signal y that the eavesdropping node receives
E, j(w) be respectively:
Wherein,
Represent that all via nodes are to the channel vector of destination node, g
iBe the channel information that i via node arrives destination node,
Represent that all via nodes are to the channel vector of j eavesdropping node, h
I, jBe that i via node is to the channel information of j eavesdropping node, n
dThe reception noise of expression destination node, n
E, iThe reception noise that represents j eavesdropping node,
E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node, ()
HThe conjugate transpose of matrix, () are got in expression
TThe operation that transposition is got in expression.
Step 2: according to above-mentioned reception signal y
d(w) and y
E, j(w), calculate the received signal to noise ratio γ of destination node
d(w) and j the eavesdropping node received signal to noise ratio γ
E, j(w) be respectively:
Step 3: according to above-mentioned received signal to noise ratio γ
d(w) and γ
E, j(w), calculate the safe speed R of destination node
s(w) be:
Wherein, log () the expression end is 2 logarithmic function.
Step 4: according to step 1b) treats forward signal x in
r(w), calculate the total power consumption at via node place || x
r(w) ||
2With self power consumption | x
R, i(w) |
2Be respectively:
||x
r(w)||
2=Tr(D
H(y
r)D(y
r)ww
H)=Tr((P
sD(f)D
H(f)+I
K)ww
H),
Wherein, incite somebody to action || x
r(w) ||
2≤ P
TotWith | x
R, i(w) |
2≤ P
iAs total power constraint and self power constraint of design junction waves beam shaping weight vector, P
TotThe total power thresholds of all via nodes, P
kThe power threshold of k via node self, this P
TotAnd P
kSet generation by actual cooperation communication system, matrix trace, e are got in Tr () expression
iRepresent that i element is 1 unit column vector,
I
KThe unit matrix of expression K * K, K is the number of via node, and satisfies K〉constraint of M, wherein M is the number of eavesdropping node.
Step 5: the kernel U that calculates all eavesdropping node equivalent channel matrixes:
5a) calculating j the equivalent channel vector of eavesdropping node is
With all forms of eavesdropping the equivalent channel vector matrix of being write as of nodes be
Wherein, f represents that source node arrives the channel vector of all via nodes, h
jRepresent all via nodes to the channel vector of j eavesdropping node,
E represents to contain the set of all eavesdropping nodes, and M is the number of eavesdropping node, ()
HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation;
5b) utilize the encapsulation function null () of MATLAB software, calculate the kernel U of above-mentioned eavesdropping node equivalent channel matrix:
Step 6: with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R
s(w), || x
r(w) ||
2With | x
R, i(w) |
2Be rewritten as R
s(v), || x
r(v) ||
2With | x
R, i(v) |
2, namely
||x
r(v)||
2=Tr(D
H(y
r)D(y
r)Uvv
HU
H)=Tr((P
sD(f)D
H(f)+I
K)Uvv
HU
H),
Wherein, v is for needing the vector of design, and the design of w namely is converted into design to v.
Step 7: satisfying || x
r(v) ||
2≤ P
TotWith | x
R, i(v) |
2≤ P
iConstraint under, maximize safe speed R
s(v), obtain optimal design v
*, and according to the space constraint of above-mentioned w=Uv, obtaining optimal beam shaping weight vector is w
*=Uv
*
Step 8: according to optimal beam shaping weight vector w
*, with w
*In i element
Distribute to i via node.
Effect of the present invention can further specify by following emulation:
1, simulation parameter is set:
All channels all independently produce and obey average is 0, and variance is 1 multiple Gaussian Profile.Via node number K=10, eavesdropping node number M=5.Suppose that when the numbering i of relaying node is odd number this relaying self power threshold is P
i=0.5P
TotK, when the numbering i of relaying node was even number, this relaying self power threshold was P
i=2P
TotK, wherein P
TotRelaying gross power threshold value for actual cooperation communication system.
2, simulation result:
The present invention and the existing cooperative beam method of formationing that strengthens physical layer safety based on kernel have been carried out the emulation comparison to safe speed under above-mentioned simulated conditions, simulation result as shown in Figure 3.
As can be seen from Figure 3, the via node gross power threshold value P to setting
Tot, the present invention compares existing cooperative beam formation method based on kernel enhancing physical layer safety, and energy is the safe speed of elevator system obviously, and the effect that promotes is along with source node transmitting power P
sIncrease and increase.
Claims (4)
1. one kind strengthens the cooperative beam formation method of physical layer safety based on kernel, may further comprise the steps:
1) cooperating relay was transmitted in two stages:
1a) in the phase I, source node is to all via node speech amplifier confidential informations, and the signal that via node receives is y
r
1b) in second stage, via node is y to the received signal
rBe weighted processing, obtain signal x to be transmitted
r(w)=D (y
r) w, wherein w is for needing the junction waves beam shaping weight vector of design, and D () expression becomes diagonal matrix with vector transformation;
1c) destination node and eavesdropping node receive the signal of relay forwarding, and the signal that the note destination node receives is y
d(w), remember that the signal that j eavesdropping node receives is y
E, j(w),
E represents to contain the set of all eavesdropping nodes, and M represents to eavesdrop the number of node;
2) according to above-mentioned reception signal y
d(w) and y
E, j(w), calculate the received signal to noise ratio γ of destination node
d(w) and j the eavesdropping node received signal to noise ratio γ
E, j(w);
3) according to above-mentioned received signal to noise ratio γ
d(w) and γ
E, j(w), calculate the safe speed of destination node
4) according to step 1b) in treat forward signal x
r(w), calculate the consumption of via node gross power || x
r(w) ||
2Consumption with i via node self power | x
R, i(w) |
2, and will || x
r(w) ||
2≤ P
TotWith | x
R, i(w) |
2≤ P
iAs the power constraint condition of design junction waves beam shaping weight vector, wherein x
R, i(w) expression x
r(w) i element, P
TotThe total power thresholds of all via nodes, P
iThe power threshold of i via node self, this P
TotAnd P
iSet generation by actual cooperation communication system,
C represents to contain the set of all via nodes, and K represents to eavesdrop the number of node;
5) calculate the kernel U that all eavesdrop the node equivalent channel matrixes, with the space constraints of w=Uv as design junction waves beam shaping weight vector, utilize this space constraint w with above-mentioned R
s(w), || x
r(w) ||
2With | x
R, i(w) |
2Be rewritten as R
s(v), || x
r(v) ||
2With | x
R, i(v) |
2, and will be converted into to the design of w design to v;
6) satisfy above-mentioned || x
r(v) ||
2≤ P
TotWith | x
R, i(v) |
2≤ P
iConstraint under, design vector v is so that safe speed R
s(v) maximization obtains optimal design v
*, and according to the space constraint of w=Uv in the step 5), obtaining optimal beam shaping weight vector is w
*=Uv
*
2. according to claim 1ly strengthen the cooperative beam formation method of physical layer safety, wherein step 2 based on kernel) the received signal to noise ratio γ of described calculating destination node
d(w) and j the eavesdropping node received signal to noise ratio γ
E, j(w), undertaken by following formula
Wherein, P
sThe transmitting power of expression source node, f represents that source node arrives the channel vector of all via nodes, g represents that all via nodes are to the channel vector of destination node, h
jRepresent that all via nodes are to the channel vector of j eavesdropping node, ()
TTranspose of a matrix, () are got in expression
HThe conjugate transpose of matrix is got in expression.
3. according to claim 1ly strengthen the cooperative beam formation method of physical layer safety, the wherein consumption of the described calculating via node of step 4) gross power based on kernel || x
r(w) ||
2Consumption with k via node self power | x
R, i(w) |
2, undertaken by following formula
||x
r(w)||
2=Tr(D
H(y
r)D(y
r)ww
H)=Tr((P
sD(f)D
H(f)+I
K)ww
H)
Wherein, P
sThe transmitting power of expression source node, f represents that source node arrives the channel vector of all via nodes, matrix trace, () are got in Tr () expression
HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation, e
iRepresent that i element is 1 unit column vector, I
KThe unit matrix of expression K * K, K is the number of via node, and satisfies the constraint of K>M, wherein M is the number of eavesdropping node.
4. according to claim 1ly strengthen the cooperative beam method of formationing of physical layer safety based on kernel, wherein the described calculating of step 5) all eavesdrop the kernel U of node equivalent channel matrixes, carry out as follows:
5a) calculate j the equivalent channel vector of eavesdropping node
And with forms of the equivalent channel vector matrix of being write as of all eavesdropping nodes be
Wherein, f represents that source node arrives the channel vector of all via nodes, h
jRepresent all via nodes to the channel vector of j eavesdropping node,
E represents to contain the set of all eavesdropping nodes, and M is the number of eavesdropping node, ()
HThe conjugate transpose of matrix is got in expression, and D () expression becomes diagonal matrix with vector transformation;
5b) utilize the encapsulation function null () of MATLAB software, calculate the kernel U of above-mentioned eavesdropping node equivalent channel matrix:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310247967.5A CN103354463B (en) | 2013-06-20 | 2013-06-20 | The cooperative beam formation method of safety of physical layer is strengthened based on kernel |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310247967.5A CN103354463B (en) | 2013-06-20 | 2013-06-20 | The cooperative beam formation method of safety of physical layer is strengthened based on kernel |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103354463A true CN103354463A (en) | 2013-10-16 |
CN103354463B CN103354463B (en) | 2016-03-02 |
Family
ID=49310793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310247967.5A Expired - Fee Related CN103354463B (en) | 2013-06-20 | 2013-06-20 | The cooperative beam formation method of safety of physical layer is strengthened based on kernel |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103354463B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580815A (en) * | 2013-10-17 | 2014-02-12 | 华南理工大学 | Asynchronous underwater full-rate cooperative communication method |
CN104917558A (en) * | 2015-06-19 | 2015-09-16 | 电子科技大学 | Method for establishing unconditionally secure communication model based on combination of beam forming and security coding |
CN106059705A (en) * | 2016-05-17 | 2016-10-26 | 北京邮电大学 | Relay physical layer safe transmission method |
CN106792660A (en) * | 2017-03-06 | 2017-05-31 | 北京理工大学 | A kind of remote safety of physical layer energy-collecting method |
CN106788643A (en) * | 2016-12-29 | 2017-05-31 | 中国人民解放军理工大学 | A kind of safe method for precoding of multi-user to end-to-end relay system |
CN106921418A (en) * | 2017-03-31 | 2017-07-04 | 南京邮电大学 | A kind of relay cooperative method for precoding based on imperfect channel state information |
US10305866B2 (en) | 2014-11-25 | 2019-05-28 | Huawei Technologies Co., Ltd. | Data transmission method, base station and user equipment |
CN110149135A (en) * | 2019-04-15 | 2019-08-20 | 上海师范大学 | Multipair extensive MIMO bilateral relay network method for communication transmission and control device |
CN111262803A (en) * | 2020-03-04 | 2020-06-09 | 广州番禺职业技术学院 | Physical layer secure communication method, device and system based on deep learning |
CN114697103A (en) * | 2022-03-25 | 2022-07-01 | 电子科技大学 | Physical layer secure transmission transmitting weight vector calculation method based on mirror image operation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136682A (en) * | 2006-08-28 | 2008-03-05 | 株式会社Ntt都科摩 | Relay node and relay method |
US20090040960A1 (en) * | 2007-08-08 | 2009-02-12 | Samsung Electronics Co., Ltd. | Space frequency block code signal processing system |
CN102231641A (en) * | 2011-07-21 | 2011-11-02 | 西安电子科技大学 | MIMO (Multiple Input Multiple Output) step-by-step parallel detection method |
CN102938686A (en) * | 2012-11-21 | 2013-02-20 | 西安电子科技大学 | Decode-and-forward cooperative communication method with high-order diversity |
-
2013
- 2013-06-20 CN CN201310247967.5A patent/CN103354463B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136682A (en) * | 2006-08-28 | 2008-03-05 | 株式会社Ntt都科摩 | Relay node and relay method |
US20090040960A1 (en) * | 2007-08-08 | 2009-02-12 | Samsung Electronics Co., Ltd. | Space frequency block code signal processing system |
CN102231641A (en) * | 2011-07-21 | 2011-11-02 | 西安电子科技大学 | MIMO (Multiple Input Multiple Output) step-by-step parallel detection method |
CN102938686A (en) * | 2012-11-21 | 2013-02-20 | 西安电子科技大学 | Decode-and-forward cooperative communication method with high-order diversity |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580815A (en) * | 2013-10-17 | 2014-02-12 | 华南理工大学 | Asynchronous underwater full-rate cooperative communication method |
US10305866B2 (en) | 2014-11-25 | 2019-05-28 | Huawei Technologies Co., Ltd. | Data transmission method, base station and user equipment |
CN104917558A (en) * | 2015-06-19 | 2015-09-16 | 电子科技大学 | Method for establishing unconditionally secure communication model based on combination of beam forming and security coding |
CN104917558B (en) * | 2015-06-19 | 2018-02-16 | 电子科技大学 | Based on beam forming and the united unconditional security traffic model method for building up of safe coding |
CN106059705A (en) * | 2016-05-17 | 2016-10-26 | 北京邮电大学 | Relay physical layer safe transmission method |
CN106059705B (en) * | 2016-05-17 | 2018-10-26 | 北京邮电大学 | A kind of relaying safe transmission method of physical layer |
CN106788643A (en) * | 2016-12-29 | 2017-05-31 | 中国人民解放军理工大学 | A kind of safe method for precoding of multi-user to end-to-end relay system |
CN106788643B (en) * | 2016-12-29 | 2020-01-07 | 中国人民解放军理工大学 | Safety pre-coding method for multi-user to end-to-end relay system |
CN106792660A (en) * | 2017-03-06 | 2017-05-31 | 北京理工大学 | A kind of remote safety of physical layer energy-collecting method |
CN106921418A (en) * | 2017-03-31 | 2017-07-04 | 南京邮电大学 | A kind of relay cooperative method for precoding based on imperfect channel state information |
CN106921418B (en) * | 2017-03-31 | 2020-08-25 | 南京邮电大学 | Relay cooperative precoding method based on non-ideal channel state information |
CN110149135A (en) * | 2019-04-15 | 2019-08-20 | 上海师范大学 | Multipair extensive MIMO bilateral relay network method for communication transmission and control device |
CN111262803A (en) * | 2020-03-04 | 2020-06-09 | 广州番禺职业技术学院 | Physical layer secure communication method, device and system based on deep learning |
CN111262803B (en) * | 2020-03-04 | 2022-08-26 | 广州番禺职业技术学院 | Physical layer secure communication method, device and system based on deep learning |
CN114697103A (en) * | 2022-03-25 | 2022-07-01 | 电子科技大学 | Physical layer secure transmission transmitting weight vector calculation method based on mirror image operation |
Also Published As
Publication number | Publication date |
---|---|
CN103354463B (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103354463B (en) | The cooperative beam formation method of safety of physical layer is strengthened based on kernel | |
CN106059705B (en) | A kind of relaying safe transmission method of physical layer | |
CN102355661B (en) | Non-regenerative-relay-mode-based relay forwarding control method and device | |
CN105515717A (en) | Cooperative relay security transmission method based on artificial noise interference | |
CN104378757A (en) | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network | |
EP3267617B1 (en) | Signal sending method and device | |
CN106533516A (en) | Physical layer security transmission method for multi-antenna multi-relay cognitive wiretapping network | |
CN101252418A (en) | Self-adapting transmitting method using channel statistical information in multi-aerial transmission system | |
CN103856299B (en) | Signal safe transmission method of MIMO amplifying forwarding relay network | |
CN105246158A (en) | Energy efficiency maximization multi-antenna relay system power allocation method based on high signal-to-noise ratio | |
CN103906198A (en) | Relay selection and power distribution method for amplifying-and-forwarding collaborative network | |
CN105471775A (en) | Low complexity channel estimation method in large scale MIMO system | |
CN104539334A (en) | Method for forming wave beam supporting multiple users to high-speed communication based on SWIPT | |
CN104717035A (en) | Interference alignment method of cellular network based on D2D communication | |
CN105162503A (en) | Multi-user beam forming and antenna selection joint-design method in massive multiple-input multiple-output (MIMO) system | |
Hoydis et al. | Outage performance of cooperative small-cell systems under Rician fading channels | |
Abdulateef et al. | Performance analyses of channel estimation and precoding for massive MIMO downlink in the TDD system | |
CN112804168B (en) | Tensor chain decomposition-based millimeter wave relay system channel estimation method | |
CN105007248B (en) | A kind of downlink precoding method of MIMO Full-duplex cellular systems | |
CN103269242B (en) | A kind of uplink coordinated junction waves beam forming method based on convex optimization | |
CN102801456A (en) | Combined downlink precoding method of single-cell relay communication cellular system | |
CN108173575A (en) | multiple-input and multiple-output relay antenna design method | |
CN104093143A (en) | Self-adaptive cooperation method in physical layer safety communication | |
CN103259586B (en) | A kind of multi-hop cooperating relay beam-forming method based on genetic algorithm | |
CN105656530A (en) | Method and system for improving security rate of MIMO security communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160302 Termination date: 20210620 |