CN104320777A - Multi-antenna system communication safety improving method based on beam forming - Google Patents

Multi-antenna system communication safety improving method based on beam forming Download PDF

Info

Publication number
CN104320777A
CN104320777A CN201410604128.9A CN201410604128A CN104320777A CN 104320777 A CN104320777 A CN 104320777A CN 201410604128 A CN201410604128 A CN 201410604128A CN 104320777 A CN104320777 A CN 104320777A
Authority
CN
China
Prior art keywords
legitimate
modulation
information
legal
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410604128.9A
Other languages
Chinese (zh)
Other versions
CN104320777B (en
Inventor
唐杰
文红
蒋屹新
宋欢欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Original Assignee
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China, Research Institute of Southern Power Grid Co Ltd filed Critical University of Electronic Science and Technology of China
Priority to CN201410604128.9A priority Critical patent/CN104320777B/en
Publication of CN104320777A publication Critical patent/CN104320777A/en
Application granted granted Critical
Publication of CN104320777B publication Critical patent/CN104320777B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming

Abstract

The invention discloses a multi-antenna system communication safety improving method based on beam forming. The method includes the following steps that a legal receiver sends a channel estimation sequence, and a legal sender estimates channel information of legal communication according to the sequence; the legal sender is multiplied by a weight when sending the information; in the communication process, an MPSK modulation method with symmetric symbol sets is adopted for modulation; the receiver demodulates signals by means of maximum likelihood; when a legal sender antenna is larger than a legal receiver antenna, a weight coefficient is processed by means of an array redundancy advantage, and finally the sent signals are obtained. The method has the advantages that higher safety is obtained at less cost than a traditional safety and physical layer safety system; by means of the array redundancy advantage, the weight coefficient of the sent signals is processed, the situation that an eavesdropping party attacks in a blind equalization mode is further prevented, and safety is improved.

Description

A kind of method of the raising multiaerial system communication security based on beam forming
Technical field
The present invention relates to wireless communication system security technology area, particularly relate to a kind of method of the raising multiaerial system communication security based on beam forming.
Background technology
The safety attention always of radio communication.Recently the mobile radio network developed rapidly makes it easily suffer the attack of the side of eavesdropping due to the broadcast characteristic of its wireless signal.Traditional safe practice based on password does not utilize radio communication physical layer characteristic when considering safety problem, when solving the modern various wireless network secure problem developed rapidly (as radio sensing network etc.) unable to do what one wishes.
Current multiple antennas safety of physical layer technology is based upon on some unpractical hypothesis bases mostly.Great majority need to know the channel information of eavesdropping side and legitimate correspondence both sides based on the method hypothesis legitimate sender sending beam forming, and this is difficult to realize in practical communication.The fail safe of man made noise's class methods of the array redundancy method that LI proposes and Goel is then be based upon on tapping channel and the strict irrelevant basis of legitimate channel, if the channel information of eavesdropping side and legitimate correspondence channel information is very close or the side's of eavesdropping obtaining portion divides legal channel information, its fail safe cannot ensure.
In layer security research, MIMO man made noise and upper stream password combine by H.WEN, but the method security performance fails to reach actual demand.The cross-layer scheme that STBC is combined with upper strata key can be reached good security performance, but its Space Time Coding needs fixing dual-mode antenna number of combinations to make it in practical application scene, receive a definite limitation.
Summary of the invention
Object of the present invention is overcoming the deficiencies in the prior art, a kind of method of the raising multiaerial system communication security based on beam forming is provided, adopt the safe practice that in mimo system, beam forming is combined with upper strata key, upper strata key is utilized to coordinate the beam forming technique of physical layer, even if also have no idea correct demodulation under eavesdropping side obtains legitimate correspondence both sides accurate channel information condition, thus ensure that eavesdropping side cannot obtain any useful information from physical layer.And the random decay fast rapidly of the transmission signal of physical layer, and be submerged in screen upper strata key in noise, make eavesdropping side comparatively legacy communications system be more difficult to attack acquisition key by blind estimate mode.
The object of the invention is to be achieved through the following technical solutions: a kind of method of the raising multiaerial system communication security based on beam forming, comprises the following steps:
S1: before a communication, legitimate receipt direction legitimate sender transmitting channel estimated sequence, legitimate sender estimates the channel information H of legitimate correspondence according to the channel estimation sequence received bA, according to the reciprocity of TDD system channel, draw H bA=H aB, this sequencal estimation H steals in eavesdropping side bE, cannot according to retrieval channel information H bAand H aE;
S2: legitimate sender sends information s (n), is multiplied by weight w (n), the information x (n) finally sent=w (n) s (n) when sending information s (n); In process of transmitting, legitimate correspondence both sides share binary sequence Q control=(q 1, q 2..., q n), q i∈ GF (2), I efor diagonal entry is the N of 1 rdimension unit matrix, order
if q i = 0 , H A w i 0 = I E if q i = 1 , H A w i 1 = - I E
w 0 = { w 1 0 , w 2 0 . . . , w n 0 } , w 1 = { w 1 1 , w 2 1 . . . , w n 1 } ;
S3: in communication process, adopts and has the MPSK modulation system of symmetrical symbols collection, namely to modulation glossary of symbols S, to wherein any one modulation symbol s i∈ S, total exist one the mapping of constellation symbol and modulation bit is by following criterion:
U i=(u 1,u 2,...u M) i→s i
U j = U i ⊕ ( 1,1 , . . . 1 ) → s j = - s i
Wherein, M is order of modulation, U i(i=1,2 ..., M) for M-bit wait adjust bit vectors;
S4: work as U imapping symbols s iin time, ensures and U ihamming distance vectorial U farthest jbe mapped to-s i, ensure that the average Hamming distance of bit vectors that adjacent symbol is corresponding is minimum, then legitimate receipt side receives signal y simultaneously rn () utilizes maximum-likelihood demodulation s ias follows:
s ^ i = arg s i ∈ S min | | y r - I E s i | | 2
if q i = 0 , s ‾ i = s ^ i if q i = 1 , s ‾ i = - s ^ i ;
Meanwhile, eavesdropping side receives signal y e, the signal received with the same manner demodulation:
s ^ i = arg s i ∈ S min | | y e - I E s i | | 2 = arg s i ∈ S min | | H E w i s ( n ) + v E - I E s i | | 2 ;
S5: as legitimate sender antenna N tbe greater than legitimate receipt side antenna N rtime, become when order sends weight coefficient; Utilize array redundancy advantage, at each symbol sending time slots i for weight coefficient make following process:
H A = [ H 0 H 1 ] , w = w 0 w 1
Then have,
H A w = H 0 w 0 + H 1 w 1 = ( ± 1 q i ) I E
x ( n ) = w · s ( n ) = w 0 s ( n ) w 1 s ( n ) = x 0 ( n ) x 1 ( n ) ;
Wherein, if q i = 0 , ( ± 1 q i ) = 1 if q i = 1 , ( ± 1 q i ) = - 1 ; H 0for N r× N rsubmatrix, H 1for N r× (N t-N r) submatrix; Make x 1(n)=w 1n () s (n) is stochastic variable, and obey gaussian random distribution, average μ, covariance matrix Σ; So solve an equation and can obtain x 0 ( n ) = H 0 - 1 [ ( ± 1 q i ) I E s ( n ) - H 1 x 1 ( n ) ] ;
S6: finally can send signal:
x ( n ) = H 0 - 1 [ ( ± 1 q i ) I E s ( n ) - H 1 x 1 ( n ) ] x 1 ( n ) .
The beneficial effect of technical solution of the present invention is: the safe practice that in a kind of mimo system, beam forming is combined with upper strata key, upper strata key is utilized to coordinate the beam forming technique of physical layer, even if also have no idea correct demodulation under eavesdropping side obtains legitimate correspondence both sides accurate channel information condition, thus ensure that eavesdropping side cannot obtain any useful information from physical layer.And the random decay fast rapidly of the transmission signal of physical layer, and be submerged in noise to have screened upper strata key, make eavesdropping side comparatively legacy communications system be more difficult to attack acquisition key by blind estimate mode, the method obtains than conventional security and the higher fail safe of safety of physical layer system with less cost.This method adopts array redundancy advantage, processes, prevent eavesdropping side from utilizing blind equalization mode to attack further, improve fail safe transmission signal weight coefficient.
Accompanying drawing explanation
Fig. 1 is communication scenes figure of the present invention;
Fig. 2 is structural representation of the present invention;
Fig. 3 is the BER performance map when eavesdropping side obtains top level control secret key;
Fig. 4 is the BER performance map when eavesdropping side obtains precise channel information;
Fig. 5 is when eavesdropping side's channel is very close to BER performance map during legitimate correspondence both sides;
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail, but protection scope of the present invention is not limited to the following stated.
Based on a method for the raising multiaerial system communication security of beam forming, comprise the following steps:
S1: as shown in Figure 1, communication scenes: suppose legitimate correspondence transmit leg Alice, N tfor transmit leg transmitting antenna, legitimate correspondence recipient Bob, N rfor recipient's reception antenna, the side of eavesdropping Eve, N efor the side's of eavesdropping reception antenna, legitimate correspondence both sides also do not know the existence of Eve.Before a communication, Bob is first to Alice transmitting channel estimated sequence, and Alice is according to the channel information H of the sequencal estimation legitimate correspondence received bA, according to TDD system channel reciprocity, H bA=H aB, and Eve can steal this sequencal estimation H bE, but cannot according to this retrieval H bAand H aE;
S2: as shown in Figure 2, legitimate sender sends information s (n), is multiplied by weight w (n), the information x (n) finally sent=w (n) s (n) when sending information s (n); In process of transmitting, legitimate correspondence both sides share binary sequence Q control=(q 1, q 2..., q n), q i∈ GF (2), I efor diagonal entry is the N of 1 rdimension unit matrix, order
if q i = 0 , H A w i 0 = I E if q i = 1 , H A w i 1 = - I E
w 0 = { w 1 0 , w 2 0 . . . , w n 0 } , w 1 = { w 1 1 , w 2 1 . . . , w n 1 } ;
S3: in communication process, adopts and has the MPSK modulation system of symmetrical symbols collection, namely to modulation glossary of symbols S, to wherein any one modulation symbol s i∈ S, total exist one the mapping of constellation symbol and modulation bit is by following criterion:
U i=(u 1,u 2,...u M) i→s i
U j = U i ⊕ ( 1,1 , . . . 1 ) → s j = - s i ;
Wherein, M is order of modulation, U i(i=1,2 ..., M) for M-bit wait adjust bit vectors;
S4: work as U imapping symbols s iin time, ensures and U ihamming distance vectorial U farthest jbe mapped to-s i, ensure that the average Hamming distance of bit vectors that adjacent symbol is corresponding is minimum, then legitimate receipt side receives signal y simultaneously rn () utilizes maximum-likelihood demodulation s ias follows:
s ^ i = arg s i ∈ S min | | y r - I E s i | | 2
if q i = 0 , s ‾ i = s ^ i if q i = 1 , s ‾ i = - s ^ i ;
Meanwhile, eavesdropping side receives signal y e, the signal received with the same manner demodulation:
s ^ i = arg s i ∈ S min | | y e - I E s i | | 2 = arg s i ∈ S min | | H E w i s ( n ) + v E - I E s i | | 2 ;
S5: as legitimate sender antenna N tbe greater than legitimate receipt side antenna N rtime, become when order sends weight coefficient; Utilize array redundancy advantage, at each symbol sending time slots i for weight coefficient make following process:
H A = [ H 0 H 1 ] , w = w 0 w 1
Then have,
H A w = H 0 w 0 + H 1 w 1 = ( ± 1 q i ) I E
x ( n ) = w · s ( n ) = w 0 s ( n ) w 1 s ( n ) = x 0 ( n ) x 1 ( n ) ;
Wherein, if q i = 0 , ( ± 1 q i ) = 1 if q i = 1 , ( ± 1 q i ) = - 1 ; H 0for N r× N rsubmatrix, H 1for N r× (N t-N r) submatrix; Make x 1(n)=w 1n () s (n) is stochastic variable, and obey gaussian random distribution, average μ, covariance matrix Σ; So solve an equation and can obtain x 0 ( n ) = H 0 - 1 [ ( ± 1 q i ) I E s ( n ) - H 1 x 1 ( n ) ] ;
S6: finally can send signal:
x ( n ) = H 0 - 1 [ ( ± 1 q i ) I E s ( n ) - H 1 x 1 ( n ) ] x 1 ( n ) .
As shown in Figure 3, Eve (K) represents performance curve during Eve acquisition top level control key, namely when eavesdropping side obtains top level control key, the method that the present invention proposes still can ensure that eavesdropping side cannot any information of demodulation, the error rate is tending towards 0.5, and in similar cross-layer system or conventional cipher safety, eavesdropping side is once obtain entirely collapsing of key means safe system.
As shown in Figure 4, in figure, CB is the inventive method, and AN is physical layer man made noise method, and AR is physical layer random array redundancy method; In figure (424), (426) represent recipient's antenna, transmit leg antenna, the side's of eavesdropping number of antennas i.e. (N rn tn e); When eavesdropping side obtains precise channel information, AR (array redundancy method) during method and conventional physical that the present invention proposes are safe, AN (man made noise's method) systems approach Performance comparision, still can ensure that eavesdropping side cannot demodulation, and conventional physical safety method eavesdropping side can recover partial information.
As shown in Figure 5, in figure 10 °, 20 °, 45 ° represent the similarity of eavesdropping side's channel and legitimate channel respectively; When eavesdropping side's channel is very close to legitimate correspondence both sides, with traditional AR (array redundancy), AN (man made noise) method Performance comparision, the method that the present invention proposes still can ensure that eavesdropping side cannot demodulation, and conventional physical safety method eavesdropping side can recover partial information.

Claims (1)

1., based on a method for the raising multiaerial system communication security of beam forming, it is characterized in that: comprise the following steps:
S1: before a communication, legitimate receipt direction legitimate sender transmitting channel estimated sequence, legitimate sender estimates the channel information H of legitimate correspondence according to the channel estimation sequence received bA, according to the reciprocity of TDD system channel, draw H bA=H aB, this sequencal estimation H steals in eavesdropping side bE, cannot according to retrieval channel information H bAand H aE;
S2: legitimate sender sends information s (n), is multiplied by weight w (n), the information x (n) finally sent=w (n) s (n) when sending information s (n); In process of transmitting, legitimate correspondence both sides share binary sequence Q control=(q 1, q 2..., q n), q i∈ GF (2), I efor diagonal entry is the N of 1 rdimension unit matrix, order
if q i = 0 , H A w i 0 = I E if q i = 1 , H A W i 1 = - I E W 0 = { w 1 0 , w 2 0 . . . , w n 0 } , W 1 = { w 1 1 , w 2 1 . . . , w n 1 } ;
S3: in communication process, adopts and has the MPSK modulation system of symmetrical symbols collection, namely to modulation glossary of symbols S, to wherein any one modulation symbol s i∈ S, total exist one the mapping of constellation symbol and modulation bit is by following criterion:
U i=(u 1,u 2,...u M) i→s i
U j = U i ⊕ ( 1,1 , . . . , ) → s j = - s i ;
Wherein, M is order of modulation, U i(i=1,2 ..., M) for M-bit wait adjust bit vectors;
S4: work as U imapping symbols s iin time, ensures and U ihamming distance vectorial U farthest jbe mapped to-s i, ensure that the average Hamming distance of bit vectors that adjacent symbol is corresponding is minimum, then legitimate receipt side receives signal y simultaneously rn () utilizes maximum-likelihood demodulation s ias follows:
s ^ i = arg s i ∈ S min | | y r - I E s i | | 2
if q i = 0 , s ‾ i = s ^ i if q i = 1 s ‾ i = - s ^ i ;
Meanwhile, eavesdropping side receives signal y e, the signal received with the same manner demodulation:
s ^ i = arg s i ∈ S min | | y e - I E S i | | 2 = arg s i ∈ S min | | H E w i s ( n ) + v E - I E s i | | 2 ;
S5: as legitimate sender antenna N tbe greater than legitimate receipt side antenna N rtime, become when order sends weight coefficient; Utilize array redundancy advantage, at each symbol sending time slots i for weight coefficient make following process:
H A = [ H 0 H 1 ] , w = w 0 w 1
Then have,
H A w = H 0 w 0 + H 1 w 1 = ( ± 1 qi ) I E x ( n ) = w · s ( n ) = w 0 s ( n ) w 1 s ( n ) = x 0 ( n ) x 1 ( n ) ;
Wherein, if q i = 0 , ( ± 1 qi ) = 1 if q i = 1 , ( ± 1 qi ) = - 1 ; H 0for N r× N rsubmatrix, H 1for N r× (N t-N r) submatrix; Make x 1(n)=w 1n () s (n) is stochastic variable, and obey gaussian random distribution, average μ, covariance matrix Σ; So solve an equation and can obtain x 0(n)=H 0 -1[(± 1 qi) I es (n)-H 1x 1(n)];
S6: finally can send signal:
x ( n ) = H 0 - 1 [ ( ± 1 qi ) I E s ( n ) - H 1 x 1 ( n ) ] x 1 ( n ) .
CN201410604128.9A 2014-10-30 2014-10-30 A kind of method of the raising multiaerial system communication security based on beam forming Active CN104320777B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410604128.9A CN104320777B (en) 2014-10-30 2014-10-30 A kind of method of the raising multiaerial system communication security based on beam forming

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410604128.9A CN104320777B (en) 2014-10-30 2014-10-30 A kind of method of the raising multiaerial system communication security based on beam forming

Publications (2)

Publication Number Publication Date
CN104320777A true CN104320777A (en) 2015-01-28
CN104320777B CN104320777B (en) 2017-10-10

Family

ID=52375930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410604128.9A Active CN104320777B (en) 2014-10-30 2014-10-30 A kind of method of the raising multiaerial system communication security based on beam forming

Country Status (1)

Country Link
CN (1) CN104320777B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657698A (en) * 2015-12-24 2016-06-08 电子科技大学 Security transmission method based on cooperation interferences in multi-cell network
WO2016150145A1 (en) * 2015-03-23 2016-09-29 华为技术有限公司 Signal sending method and device
CN106533517A (en) * 2015-09-15 2017-03-22 上海贝尔股份有限公司 Method for carrying out wave beam formation, device and base station
CN106612503A (en) * 2016-12-27 2017-05-03 国网能源研究院 Safety communication method and device
CN109565673A (en) * 2016-08-12 2019-04-02 日本电气株式会社 Enhance related equipment, method, system, program and recording medium with wave beam and safety
CN110233647A (en) * 2019-06-24 2019-09-13 西北工业大学 Modulate safety Enhancement Method in direction based on multi-antenna array
CN111263363A (en) * 2020-01-16 2020-06-09 电子科技大学 High-strength safe transmission method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001067633A1 (en) * 2000-03-09 2001-09-13 Motorola, Inc. A method and apparatus for antenna array beamforming
CN1753550A (en) * 2004-09-20 2006-03-29 北京三星通信技术研究有限公司 Utilize beam shaping to strengthen the method and apparatus that framing signal sends
CN101778072A (en) * 2010-01-25 2010-07-14 华为技术有限公司 Multicarrier and multi-antenna signal sending method and transmitter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001067633A1 (en) * 2000-03-09 2001-09-13 Motorola, Inc. A method and apparatus for antenna array beamforming
CN1753550A (en) * 2004-09-20 2006-03-29 北京三星通信技术研究有限公司 Utilize beam shaping to strengthen the method and apparatus that framing signal sends
CN101778072A (en) * 2010-01-25 2010-07-14 华为技术有限公司 Multicarrier and multi-antenna signal sending method and transmitter

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
唐杰,潘绯,廖润发,宋欢欢,文红: "多天线通信物理层安全可靠传输技术研究进展", 《信息安全与技术》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016150145A1 (en) * 2015-03-23 2016-09-29 华为技术有限公司 Signal sending method and device
US9960880B2 (en) 2015-03-23 2018-05-01 Huawei Technologies Co., Ltd. Signal sending method and device
CN106533517A (en) * 2015-09-15 2017-03-22 上海贝尔股份有限公司 Method for carrying out wave beam formation, device and base station
CN105657698A (en) * 2015-12-24 2016-06-08 电子科技大学 Security transmission method based on cooperation interferences in multi-cell network
CN105657698B (en) * 2015-12-24 2019-01-22 电子科技大学 Safe transmission method based on cooperation interference in multicell network
CN109565673B (en) * 2016-08-12 2022-02-18 日本电气株式会社 Device, method, system, program and recording medium relating to beam and security enhancement
CN109565673A (en) * 2016-08-12 2019-04-02 日本电气株式会社 Enhance related equipment, method, system, program and recording medium with wave beam and safety
US11265704B2 (en) 2016-08-12 2022-03-01 Nec Corporation Security key generation for communications between base station and terminal based on beam selection
CN106612503A (en) * 2016-12-27 2017-05-03 国网能源研究院 Safety communication method and device
CN106612503B (en) * 2016-12-27 2020-07-03 国网能源研究院有限公司 Method and device for secure communication
CN110233647B (en) * 2019-06-24 2021-07-16 西北工业大学 Direction modulation security enhancement method based on multiple antenna arrays
CN110233647A (en) * 2019-06-24 2019-09-13 西北工业大学 Modulate safety Enhancement Method in direction based on multi-antenna array
CN111263363A (en) * 2020-01-16 2020-06-09 电子科技大学 High-strength safe transmission method

Also Published As

Publication number Publication date
CN104320777B (en) 2017-10-10

Similar Documents

Publication Publication Date Title
CN104320777B (en) A kind of method of the raising multiaerial system communication security based on beam forming
CN104917558B (en) Based on beam forming and the united unconditional security traffic model method for building up of safe coding
CN105790818B (en) A kind of safe transmission method of physical layer for resisting eavesdropping node steal information
CN103986545B (en) Physical layer safety transmission method used for SIMO wireless communication system
CN105119645A (en) Receiving antenna space hopping secret communication method in MIMO system
CN104270227B (en) Based on the empty safe transmission method of physical layer for moving keying in MISO system
CN104994496B (en) Safe transmission method of physical layer based on distributed spatial modulation
CN106131026B (en) The method for precoding of safety of physical layer transmission is realized in single-carrier frequency domain equalization system
CN111065096B (en) Physical layer encryption transmission system and method for wireless communication
CN100555924C (en) The sending, receiving method of quasi-orthogonal space time block code, equipment and communication system
CN102215484A (en) Broadband wireless channel encryption method and device based on random time inversion
CN106685639B (en) Sequence cipher encryption safe transmission method based on artificial noise addition in 5G communication system
CN108683443B (en) A kind of spatial modulation safe transmission method of physical layer based on kernel
CN105577329A (en) Physical layer secure transmission method based on spatial modulation
CN105471806A (en) Interference avoidance and secure transmission method based on signal alignment for use in collaborative device-to-device (D2D) system
CN110233701A (en) Wirelessly communicate the decoding method of physical layer communication safety
US9048975B2 (en) Method and apparatus for soft-decision detection in 2×2 MIMO system
CN205610681U (en) Wireless relay transmission system based on physical layer safety
CN105812037A (en) Noise-eliminating safe transmission method based on receiving end spatial modulation
CN106059713A (en) Method for constructing first-class wiretap channel through BSBC (Binary Symmetric Broadcast Channel)
CN102647258B (en) Cross-layer enhancing safety processing method of wireless communication MIMO (Multi-Input Multi-Output) system
CN101335599A (en) Space relativity resisting method and apparatus for spatial multiplexing system of wireless network
CN109996231A (en) A kind of secret communication method in multiaerial system
CN106209710A (en) A kind of method building first kind tapping channel under BI AWGN broadcast channel
Tang et al. A MIMO cross-layer precoding security communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant