CN104519499A - Method for forming security cooperation beams in amplifying and forwarding wireless relay networks - Google Patents

Method for forming security cooperation beams in amplifying and forwarding wireless relay networks Download PDF

Info

Publication number
CN104519499A
CN104519499A CN201410803788.XA CN201410803788A CN104519499A CN 104519499 A CN104519499 A CN 104519499A CN 201410803788 A CN201410803788 A CN 201410803788A CN 104519499 A CN104519499 A CN 104519499A
Authority
CN
China
Prior art keywords
sigma
beta
alpha
log
source node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410803788.XA
Other languages
Chinese (zh)
Inventor
李国兵
张艺珍
吕刚明
张国梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201410803788.XA priority Critical patent/CN104519499A/en
Publication of CN104519499A publication Critical patent/CN104519499A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • H04W16/28Cell structures using beam steering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/155Ground-based stations
    • H04B7/15528Control of operation parameters of a relay station to exploit the physical medium
    • H04B7/1555Selecting relay station antenna mode, e.g. selecting omnidirectional -, directional beams, selecting polarizations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a method for forming security cooperation beams in amplifying and forwarding wireless relay networks. The method includes steps of 1), acquiring accessible information speeds I<1> at first source nodes T<i>, accessible information speeds I<2> at second source nodes T<2> and accessible information rates at eavesdroppers E<k> in the amplifying and forwarding wireless relay networks; 2), constructing optimization problems for controlling single relay power according to security and rate maximization criteria, converting the optimization problems into semi-definite programming problems, acquiring the optimal matrixes x<opt> by the aid of iteration processes and then acquiring the optimal security and rates according to the optimal matrixes x<opt>. The matrixes x<opt> meet an equation of rank(X<opt>)=1. The method has the advantages that the maximum security and rates for forming the security cooperation beams in the amplifying and forwarding wireless relay networks can be implemented by the aid of the method, accordingly the probability that the eavesdroppers steal information of legal users can be obviously reduced, and the spectral efficiency of security communication can be improved.

Description

A kind of method of security cooperation wave beam forming in amplification forwarding wireless relay network
Technical field
The invention belongs to wireless communication field, relate to the method for security cooperation wave beam forming in a kind of amplification forwarding wireless relay network.
Background technology
The intrinsic opening of wireless channel accelerates the development of wireless communication system, but too increases the probability be ravesdropping simultaneously.Safety of physical layer to obtain at secure communications as a kind of method of raising safety newly and pays close attention to widely.Compared with traditional high rise building safety scheme, the advantage of safety of physical layer is that overhead is little, protocol stack simple and complexity is lower, is therefore suitable for distributed relay network element.Up-to-date research shows, cooperation distributed node can improve safe rate significantly.
Research at present about safety of physical layer is mainly concentrated in mimo systems, and the distributed relay that cooperates can improve safe rate significantly.In distributed relay network, the secure communication of one-way junction cooperative beam figuration is suggested.Along with the development of secure communication, in order to improve spectrum efficiency, network scenarios has been extended to bilateral relay network.And the scheme of the suboptimum about secure communication has been proposed in bilateral network, such as, the kernel cooperative beam figuration when known listener-in's channel condition information and the man made noise's scheme when unknown listener-in's channel condition information.But the optimization aim in above scheme is all and speed instead of safety and speed.Also been proposed the research of the general approach of the kernel wave beam forming in the restriction of source node through-put power based on this, Optimality Criteria is safety and speed.But more than research is only suitable for the scene of an existence listener-in.In addition, in amplification forwarding bilateral relay network, propose a kind of integration and cooperation wave beam forming of suboptimum and the scheme of man made noise, the program can obtain higher safety and speed.
In sum, in amplification forwarding bilateral relay network, the research about the linear arrangement of secure communication is necessary.
Summary of the invention
The object of the invention is to the shortcoming overcoming above-mentioned prior art, provide the method for security cooperation wave beam forming in a kind of amplification forwarding wireless relay network, the method can realize the figuration of security cooperation wave beam in amplification forwarding wireless relay network, remarkable reduction listener-in steals the informational probability of proper user, improves the spectrum efficiency of secure communication.
For achieving the above object, in amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming comprises the following steps:
Comprise the following steps:
1) in amplification forwarding wireless relay network, first source node T 1and second source node T 2by one group of relaying R nexchange message, listener-in E kbe passive, and attempt illegal wiretapping first source node T 1with second source node T 2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T 1place can reach information rate I 1, second source node T 2place can reach information rate I 2and listener-in E kplace can reach information rate be respectively
I 1 = 1 2 log ( 1 + P 2 w H R fg w w H R ff w + 1 + f R T &Sigma; f R * ) - - - ( 9 )
I 2 = 1 2 log ( 1 + P 1 w H R fg w w H R gg w + 1 + g R T &Sigma; g R * ) - - - ( 10 )
I E k = 1 2 log ( &gamma; k + w H V k w w H R c k c k w + 1 + c E k T &Sigma; c E k * ) - - - ( 11 )
Wherein P 1be first source node T 1average transmit power, P 2be second source node T 2average transmit power, w is wave beam formed matrix, f rbe first source node T 1to the channel of all relayings, f eto the first source node T 1to the channel of listener-in, g rbe second source node T 2to the channel of all relayings, g ebe second source node T 2to the channel of listener-in, c efor being relayed to the quasistatic fading coefficients of listener-in, for being relayed to the quasistatic fading coefficients of a kth listener-in, r ff=diag (| f r, 1| 2, | f r, 2| 2..., | f r, N| 2), R c k c k = diag ( | c E k , 1 | 2 , | c E k , 2 | 2 , . . . , | c E k , N | 2 ) , a fg=f Rοg R R fg = a fg a fg H , R gg=diag(|f g,1| 2,|f g,2| 2,...,|f g,N| 2), V k = ( P 1 P 2 | g E k | 2 + P 1 ) R c k f + ( P 1 P 2 | f E k | 2 + P 2 ) R c k g - P 1 P 2 f E k g E k * a c k g a c k f H - P 1 P 2 f E k * g E k a c k f a c k g H , R c k f = a c f f a c k f H , R c k g = a c f g a c k g H ;
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Q 1 : max w , &Sigma; min k { I 1 + I 2 - I E k } ,
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n
Wherein, x rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise, p rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Q 2 : max w , &Sigma; min k 1 + w H ( R ff + P 2 R fg ) w + f R T &Sigma; f R * 1 + w H R ff w + f R T &Sigma; f R * &CenterDot; 1 + w H ( R gg + P 1 R fg ) w + g R T &Sigma;g R * 1 + w H R gg w + g R T &Sigma;g R * &CenterDot; 1 + w H R c k c k w + c E k T &Sigma;c E k * w H ( &gamma; k R c k c k + V k ) w + &gamma; k ( 1 + c E k T &Sigma;c E k * )
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n ,
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix X by the method for iteration opt, the matrix X of wherein said optimum optmeet rank (X opt)=1, then according to the matrix X of described optimum optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
2, the method for security cooperation wave beam forming in amplification forwarding wireless relay network according to claim 1, is characterized in that, if B 1=R ff+ P 2r fg, B 2=R gg+ P 1r fg, &sigma; 1 2 = 1 + f R T &Sigma;f R * , &sigma; 2 2 = 1 + g R T &Sigma;g R * , &sigma; 3 k 2 = 1 + c E k T &Sigma;c E k * , C 1=R ff, C 2=R ggwith then optimization problem Q2 can be expressed as
Q 3 : max min w , &Sigma; , k w H B 1 w + &sigma; 1 2 w H C 1 w + &sigma; 1 2 &CenterDot; w H B 2 w + &sigma; 2 2 w H C 2 w + &sigma; 2 2 &CenterDot; w H B 3 k w + &sigma; 3 k 2 w H C 3 k w + &gamma; k &sigma; 3 k 2 ;
s . t . [ w H ( P 1 R ff + P 2 R gg + &sigma; 2 I ) w + &Sigma; ] n , n &le; P R n , &ForAll; n .
Make X=ww h, then optimization problem Q3 can abbreviation be:
Q 4 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - log ( &beta; 1 ) - log ( &beta; 2 ) - log ( &beta; 3 k )
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ;
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
X≥0,rαnk{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order log ( &beta; j ) = log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) , j = 1,2,3 k , β j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
Q 5 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - t 1 - t 2 - t 3 k
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2 ;
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k
Work as β j, 0j, opttime, log (β j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
Q 6 : min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k &tau;
s.t.-(log(α 1)+log(α 2)+log(α 3k))+t 1+t 2+t 3k<=τ
[ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ;
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k .
Optimization problem Q6 is step 2) in semi definite programming problem.
The present invention has following beneficial effect:
In amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming considers the situation of multiple listener-in, the optimization problem of the single relay power control of standard construction is maximized according to safety and speed, and this optimization problem is changed into semi definite programming problem by linear approximation, optimum safety and speed is obtained again by the method for iteration, then optimum safety and speed is obtained described in basis, and then significantly reduce the informational probability that listener-in steals proper user, improve the spectrum efficiency of secure communication.
Accompanying drawing explanation
When Fig. 1 is relaying number N=20 in emulation experiment, safety and speed are with P rchange;
Fig. 2 works as P in emulation experiment rduring=20dBW, safety and speed are with the variation diagram of iterations.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
Obtain first source node T 1place can reach information rate I 1, second source node T 2place can reach information rate I 2and listener-in E kplace can reach information rate method specifically comprise the following steps:
At amplification forwarding wireless relay network, first source node T 1with second source node T 2by one group of relaying R nexchange message, n=1,2 ..., N, listener-in E kpassive, k=1,2 ..., K, and attempt illegal wiretapping first source node T 1place and second source node T 2the information at place, in system, all nodes only have an antenna, and are all semiduplex;
F rbe first source node T 1to the channel of all relayings, f eto the first source node T 1to the channel of listener-in, g rbe second source node T 2to the channel of all relayings, g ebe second source node T 2to the channel of listener-in, c efor being relayed to the quasistatic fading coefficients of listener-in, global channel state information (CSI) is known;
Transmission is divided into two time slots, at time slot 1, and first source node T 1with second source node T 2simultaneously to repeat transmitted information, then the signal vector received at relaying place is
y R = P 1 f R s 1 + P 2 g R s 2 + n R , - - - ( 1 )
Wherein, P 1and P 2the average transmit power of first source node and second source node respectively, s 1and s 2the transmitting information of first source node and second source node respectively.If E [| s m| 2]=1, m=1,2, n rbe relaying place average be 0, the additive white Gaussian noise of unit covariance, therefore, in a kth information that listener-in place receives is
y E k ( 1 ) = P 1 f E k s 1 + P 2 g E k s 2 + n E k ( 1 ) , - - - ( 2 )
Wherein, listener-in E kthe average at place is 0, the additive white Gaussian noise of unit covariance.
At time slot 2, relaying carries out wave beam forming first to the received signal and adds man made noise, then signal can be expressed as after treatment
x R=Wy R+n a, (3)
Wherein, wave beam formed matrix n afor man made noise, and covariance matrix ∑>=0;
Then relaying resends x r, first source node T 1with second source node T 2the signal that place receives can be expressed as
y T 1 = P 2 f R T Wg R s 2 + P 1 f R T Wf R s 1 + n &OverBar; T 1 , - - - ( 4 )
y T 2 = P 1 g R T Wf R s 1 + P 2 g R T Wg R s 2 + n &OverBar; T 2 . - - - ( 5 )
In like manner, listener-in E kthe signal that place receives is
y E k ( 2 ) = P 1 c E k T Wf R s 1 + P 2 c E k T Wg R s 2 + n &OverBar; E k ( 2 ) , - - - ( 6 )
Wherein, n &OverBar; T 1 = f R T W + f R T n a + n T 1 , n &OverBar; T 2 = g R T W + g R T n a + n T 2 , n &OverBar; E k ( 2 ) = c E k T W + c E k T n a + n E k ( 2 ) ; with t respectively 1, T 2and E kthe average at place is 0, the additive noise of unit covariance.
Information after self-interference is eliminated desired by source node can be expressed as
y T 1 = P 2 w H a fg s 2 + n &OverBar; T 1 , - - - ( 7 )
y T 2 = P 1 w H a fg s 1 + n &OverBar; T 2 , - - - ( 8 )
Wherein, a fg=f rο g r, w=[w 1, w 2..., w n] t;
Then T 1, T 2and E kreached at the information rate at place can be expressed as easily
I 1 = 1 2 log ( 1 + P 2 w H R fg w w H R ff w + 1 + f R T &Sigma; f R * ) , - - - ( 9 )
I 2 = 1 2 log ( 1 + P 1 w H R fg w w H R gg w + 1 + g R T &Sigma; g R * ) , - - - ( 10 )
I E k = 1 2 log ( &gamma; k + w H V k w w H R c k c k w + 1 + c E k T &Sigma; c E k * ) , - - - ( 11 )
Wherein P 1be first source node T 1average transmit power, P 2be second source node T 2average transmit power, w is wave beam formed matrix, f rbe first source node T 1to the channel of all relayings, f eto the first source node T 1to the channel of listener-in, g rbe second source node T 2to the channel of all relayings, g ebe second source node T 2to the channel of listener-in, c efor being relayed to the quasistatic fading coefficients of listener-in, for being relayed to the quasistatic fading coefficients of a kth listener-in, r ff=diag (| f r, 1| 2, | f r, 2| 2..., | f r, N| 2), a fg=f rο g r, R c k c k = diag ( | c E k , 1 | 2 , | c E k , 2 | 2 , . . . , | c E k , N | 2 ) , R fg = a fg a fg H , R gg=diag(|f g,1| 2,|f g,2| 2,...,|f g,N| 2), V k = ( P 1 P 2 | g E k | 2 + P 1 ) R c k f + ( P 1 P 2 | f E k | 2 + P 2 ) R c k g - P 1 P 2 f E k R c k f = a c f f a c k f H , R c k g = a c f g a c k g H ;
In amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming comprises the following steps:
1) in amplification forwarding wireless relay network, first source node T 1and second source node T 2by one group of relaying R nexchange message, listener-in E kpassive, and attempt illegal wiretapping first source node T 1with second source node T 2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T 1place can reach information rate I 1, second source node T 2place can reach information rate I 2and listener-in E kplace can reach information rate be respectively
I 1 = 1 2 log ( 1 + P 2 w H R fg w w H R ff w + 1 + f R T &Sigma; f R * ) - - - ( 9 )
I 2 = 1 2 log ( 1 + P 1 w H R fg w w H R gg w + 1 + g R T &Sigma; g R * ) - - - ( 10 )
I E k = 1 2 log ( &gamma; k + w H V k w w H R c k c k w + 1 + c E k T &Sigma; c E k * ) - - - ( 11 )
Wherein P 1be first source node T 1average transmit power, P 2be second source node T 2average transmit power, w is wave beam formed matrix, f rbe first source node T 1to the channel of all relayings, f eto the first source node T 1to the channel of listener-in, g rbe second source node T 2to the channel of all relayings, g ebe second source node T 2to the channel of listener-in, c efor being relayed to the quasistatic fading coefficients of listener-in, for being relayed to the quasistatic fading coefficients of a kth listener-in, r ff=diag (| f r, 1| 2, | f r, 2| 2..., | f r, N| 2), a fg=f rο g r, R c k c k = diag ( | c E k , 1 | 2 , | c E k , 2 | 2 , . . . , | c E k , N | 2 ) , R fg = a fg a fg H , R gg=diag(|f g,1| 2,|f g,2| 2,...,|f g,N| 2); V k = ( P 1 P 2 | g E k | 2 + P 1 ) R c k f + ( P 1 P 2 | f E k | 2 + P 2 ) R c k g - P 1 P 2 f E k R c k f = a c f f a c k f H , R c k g = a c f g a c k g H ;
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Q 1 : max w , &Sigma; min k { I 1 + I 2 - I E k } ,
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n
Wherein, x rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise, p rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Q 2 : max w , &Sigma; min k 1 + w H ( R ff + P 2 R fg ) w + f R T &Sigma; f R * 1 + w H R ff w + f R T &Sigma; f R * &CenterDot; 1 + w H ( R gg + P 1 R fg ) w + g R T &Sigma;g R * 1 + w H R gg w + g R T &Sigma;g R * &CenterDot; 1 + w H R c k c k w + c E k T &Sigma;c E k * w H ( &gamma; k R c k c k + V k ) w + &gamma; k ( 1 + c E k T &Sigma;c E k * ) ,
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n .
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix X by the method for iteration opt, the matrix X of wherein said optimum optmeet rank (X opt)=1, then according to the matrix X of described optimum optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
Wherein, if B 1=R ff+ P 2r fg, B 2=R gg+ P 1r fg, &sigma; 2 2 = 1 + g R T &Sigma;g R * , &sigma; 3 k 2 = 1 + c E k T &Sigma;c E k * , C 1=R ff, C 2=R ggwith C 3 k = &gamma; k R c k c k + V k , Then optimization problem Q2 can be expressed as
Q 3 : max min w , &Sigma; , k w H B 1 w + &sigma; 1 2 w H C 1 w + &sigma; 1 2 w H B 2 w + &sigma; 2 2 w H C 2 w + &sigma; 2 2 w H B 3 k w + &sigma; 3 k 2 w H C 3 k w + &gamma; k &sigma; 3 k 2 ;
s . t . [ w H ( P 1 R ff + P 2 R gg + &sigma; 2 I ) w + &Sigma; ] n , n &le; P R n , &ForAll; n .
Make X=ww h, then optimization problem Q3 can abbreviation be:
Q 4 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - log ( &beta; 1 ) - log ( &beta; 2 ) - log ( &beta; 3 k )
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ;
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
X≥0,rαnk{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order log ( &beta; j ) = log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) , j = 1,2,3 k , β j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
Q 5 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - t 1 - t 2 - t 3 k
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2 ;
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k
Work as β j, 0j, opttime, log (β j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
Q 6 : min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k &tau;
s.t.-(log(α 1)+log(α 2)+log(α 3k))+t 1+t 2+t 3k<=τ
[ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ;
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k .
Optimization problem Q6 is step 2) in semi definite programming problem.
In order to prove that the optimal solution that Q6 obtains meets rank (X opt)=1, first considers a following problem
R 1 : min X , &Sigma; , u 1 , u 2 , u 3 k , t 1 , t 2 , t 3 k , k - u 1 - u 2 - u 3 k + t 1 + t 2 + t 3 k
s . t . [ w H ( P 1 R ff + P 2 R gg + &sigma; 2 I ) w + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ,
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2 ,
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2 ,
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k .
log ( &alpha; j , 0 ) + 1 &alpha; j , 0 ( &alpha; j - &alpha; j , 0 ) &le; u j , j = 1,2,3 k .
Construct Lagrangian and obtain KKT condition and be
&psi; = ( 1 &beta; 1,0 - 1 &alpha; 1,0 ) R ff + ( 1 &beta; 2,0 - 1 &alpha; 2,0 ) R gg + ( &gamma; k &beta; 3 k , 0 - 1 &alpha; 3 k , 0 ) R c k c k - ( P 2 &alpha; 1,0 + P 1 &alpha; 2,0 ) R fg T + 1 &beta; 3 k , 0 V k T + d 1 P 1 R ff + d 1 P 2 R gg + d 1 I ,
&Gamma; = ( 1 &beta; 1,0 - 1 &alpha; 1,0 ) ( f R f R H ) T + ( 1 &beta; 2,0 - 1 &alpha; 2,0 ) ( g R g R H ) T + ( &gamma; k &beta; 3 k , 0 - 1 &alpha; 3 k , 0 ) ( c R c R H ) T + d 1 I .
Carry out abbreviation to ψ can obtain
&psi; = D ( &Gamma; ) - ( P 2 &alpha; 1,0 + P 1 &alpha; 2,0 ) R fg T + 1 &beta; 3 k , 0 V k T + d 1 P 1 R ff + d 1 P 2 R gg . - - - ( 12 )
Then (12) formula is substituted into ψ X=0 can obtain
[ D ( &Gamma; ) + 1 &beta; 3 k , 0 V k T + d 1 ( P 1 R ff + P 2 R gg ) ] X = [ ( P 2 &alpha; 1,0 + P 1 &alpha; 2,0 ) R fg T ] X . ,
Wherein, [ D ( &Gamma; ) + 1 &beta; 3 k , 0 V k T + d 1 ( P 1 R ff + P 2 R gg ) ] > 0 , Therefore can obtain
rank ( X ) = rank ( [ D ( &Gamma; ) + 1 &beta; 3 k , 0 V k T + d 1 ( P 1 R ff + P 2 R gg ) ] X ) = rank ( [ ( P 2 &alpha; 1,0 + P 1 &alpha; 2,0 ) R fg T ] X ) &le; rank ( R fg ) = 1 . ,
Namely the solution X in R1 meets rank (X)=1;
Because the problem after lax so by Q 3the X obtained optmeet rank (X opt)=1.
Emulation experiment
In simulations, P 1=P 2=20dBW, wherein, P rbe the gross power of all relayings, in addition, all channel coefficients are all averages is in simulations 0, the gaussian random matrix of unit covariance, and the SCA method simultaneously carried in we and document carries out the performance contrasting to assess safety and speed.
Different relay power P is compared in Fig. 1 rtime safety and speed, as can be seen from Figure 1, safety and speed increase with the increase of relaying place power, and when relay power is larger, the method in this programme is significantly better than SCA algorithm; In addition, we find in simulations, and when listener-in's number increases, the method in this programme is stablized than SCA method, and this is also corresponding with the result in document.Compared for when channel is fixed in Fig. 2, safety and speed are with the change of iterations, and as can be seen from Figure 2, the method in the present invention can converge to maximum safety and speed faster; In addition, safety and speed increase with the increase of relaying number.

Claims (2)

1. the method for security cooperation wave beam forming in amplification forwarding wireless relay network, is characterized in that, comprise the following steps:
1) in amplification forwarding wireless relay network, first source node T 1and second source node T 2by one group of relaying R nexchange message, listener-in E kbe passive, and attempt illegal wiretapping first source node T 1with second source node T 2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T 1place can reach information rate I 1, second source node T 2place can reach information rate I 2and listener-in E kplace can reach information rate be respectively
I 1 = 1 2 log ( 1 + P 2 w H R fg w w H R ff w + 1 + f R T &Sigma; f R * ) - - - ( 9 )
I 2 = 1 2 log ( 1 + P 1 w H R fg w w H R gg w + 1 + g R T &Sigma; g R * ) - - - ( 10 )
I E k = 1 2 log ( &gamma; k + w H V k w w H R c k c k w + 1 + c E k T &Sigma; c E k * ) - - - ( 11 )
Wherein P 1be first source node T 1average transmit power, P 2be second source node T 2average transmit power, w is wave beam formed matrix, f rbe first source node T 1to the channel of all relayings, f eto the first source node T 1to the channel of listener-in, g rbe second source node T 2to the channel of all relayings, g ebe second source node T 2to the channel of listener-in, c efor being relayed to the quasistatic fading coefficients of listener-in, for being relayed to the quasistatic fading coefficients of a kth listener-in, R ff = diag ( | f R , 1 | 2 , | f R , 2 | 2 , . . . , | f R , N | 2 ) , R c k , c k = diag ( | c E k , 1 | 2 , | c E k , 2 | 2 , . . . , | c E k , N | 2 ) , a fg=f rog R R fg = a fg a fg H , R gg = diag ( | f g , 1 | 2 , | f g , 2 | 2 , . . . , | f g , N | 2 ) , a c k f = c E k o f R , a c k , g = c E k o g R , V k = ( P 1 P 2 | g E k | 2 + P 1 ) R c k f + ( P 1 P 2 | f E k | 2 + P 2 ) R c k g - P 1 P 2 f E k g E k * a c k g a c k f H - P 1 P 2 f E k * g E k a c k f a c k g H , R c k f = a c k f a c k H , R c k g = a c k g a c k g H ;
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Q 1 : max w , &Sigma; min k { I 1 + I 2 - I E k } ,
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n
Wherein, x rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise, p rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Q 2 : max w , &Sigma; min k 1 + w H ( R ff + P 2 R fg ) w + f R T &Sigma; f R * 1 + w H R ff w + f R T &Sigma; f R * &CenterDot; 1 + w H ( R gg + P 1 R fg ) w + g R T &Sigma; g R * 1 + w H R gg w + g R T &Sigma; g R * &CenterDot; 1 + w H R c k , c k w + c E k T &Sigma; c E k * w H ( &gamma; k R c k c k + V k ) w + &gamma; k ( 1 + c E k T &Sigma; c E k * )
s . t . [ x R H x R ] n , n &le; P R n , &ForAll; n .
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix x by the method for iteration opt, the matrix x of wherein said optimum optmeet rank (x opt)=1, then according to the matrix x of described optimum optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
2. the method for security cooperation wave beam forming in amplification forwarding wireless relay network according to claim 1, is characterized in that, if B 1=R ff+ P 2r fg, B 2=R gg+ P 1r fg, &sigma; 1 2 = 1 + f R T &Sigma; f R * , &sigma; 2 2 = 1 + g R T &Sigma; g R * , &sigma; 3 k 2 = 1 + c E k T &Sigma; c E k * , C 1=R ff, C 2=R ggwith then optimization problem Q2 can be expressed as
Q 3 : max min w , &Sigma; , k w H B 1 w + &sigma; 1 2 w H C 1 w + &sigma; 2 2 &CenterDot; w H B 2 w + &sigma; 2 2 w H C 2 w + &sigma; 2 2 &CenterDot; w H B 3 k w + &sigma; 3 k 2 w H C 3 k w + &gamma; k &sigma; 3 k 2 ;
s . t . [ w H ( P 1 R ff + P 2 R gg + &sigma; 2 I ) w + &Sigma; ] n , n &le; P R n , &ForAll; n .
Make X=ww h, then optimization problem Q3 can abbreviation be:
Q 4 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - log ( &beta; 1 ) - log ( &beta; 2 ) - log ( &beta; 3 k )
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
x≥0,rank{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order j=1,2,3k, β j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
Q 5 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k log ( &alpha; 1 ) + log ( &alpha; 2 ) + log ( &alpha; 3 k ) - t 1 - t 2 - t 3 k
s . t . [ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k
Work as β j, 0j, opttime, log (β j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
Q 6 : max min X , &Sigma; , &alpha; 1 , &alpha; 2 , &alpha; 3 k , &beta; 1 , &beta; 2 , &beta; 3 k , k &tau;
s.t.-(log(α 1)+log(α 2)+log(α 3k))+t 1+t 2+t 3k<=τ
[ ( P 1 R ff + P 2 R gg + &sigma; 2 I ) X + &Sigma; ] n , n &le; P R n , &ForAll; n
&alpha; 1 = tr ( B 1 X ) + &sigma; 1 2 , &alpha; 2 = tr ( B 2 X ) + &sigma; 2 2 ;
&alpha; 3 k = tr ( B 3 k X ) + &sigma; 3 k 2 , &beta; 1 = tr ( C 1 X ) + &sigma; 1 2
&beta; 2 = tr ( C 2 X ) + &sigma; 2 2 , &beta; 3 k = tr ( C 3 k X ) + &gamma; k &sigma; 3 k 2
log ( &beta; j , 0 ) + 1 &beta; j , 0 ( &beta; j - &beta; j , 0 ) &le; t j , j = 1,2,3 k .
Optimization problem Q6 is step 2) in semi definite programming problem.
CN201410803788.XA 2014-12-19 2014-12-19 Method for forming security cooperation beams in amplifying and forwarding wireless relay networks Pending CN104519499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410803788.XA CN104519499A (en) 2014-12-19 2014-12-19 Method for forming security cooperation beams in amplifying and forwarding wireless relay networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410803788.XA CN104519499A (en) 2014-12-19 2014-12-19 Method for forming security cooperation beams in amplifying and forwarding wireless relay networks

Publications (1)

Publication Number Publication Date
CN104519499A true CN104519499A (en) 2015-04-15

Family

ID=52794100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410803788.XA Pending CN104519499A (en) 2014-12-19 2014-12-19 Method for forming security cooperation beams in amplifying and forwarding wireless relay networks

Country Status (1)

Country Link
CN (1) CN104519499A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967991A (en) * 2015-05-06 2015-10-07 西安交通大学 Secure communication method among multiple pairs of users in bidirectional relay network
CN106068032A (en) * 2016-05-20 2016-11-02 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN109768815A (en) * 2019-01-18 2019-05-17 北京邮电大学 Non-trusted bi-directional relaying multi-antenna cooperative communication means and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259575A (en) * 2013-04-19 2013-08-21 南京邮电大学 Linear processing optimization method based on multi-antenna two-way relay wireless communication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259575A (en) * 2013-04-19 2013-08-21 南京邮电大学 Linear processing optimization method based on multi-antenna two-way relay wireless communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GUOBING LI ET AL: "High-rate relay beamforming for simultaneous wireless information and power transfer", 《ELECTRONICS LETTERS》 *
MEILU LIN ET AL: "Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks", 《IEEE COMMUNICATIONS LETTERS》 *
YIZHEN ZHANG ET AL: "Relay Deployment for AF-MIMO Two-Way Relaying Networks with Antenna Selection", 《JOURNAL OF COMMUNICATIONS 》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967991A (en) * 2015-05-06 2015-10-07 西安交通大学 Secure communication method among multiple pairs of users in bidirectional relay network
CN106068032A (en) * 2016-05-20 2016-11-02 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN109768815A (en) * 2019-01-18 2019-05-17 北京邮电大学 Non-trusted bi-directional relaying multi-antenna cooperative communication means and device
CN109768815B (en) * 2019-01-18 2020-11-03 北京邮电大学 Non-trust bidirectional relay multi-antenna cooperative communication method, device and storage medium

Similar Documents

Publication Publication Date Title
CN104469755A (en) Physical layer security transmission method for keeping relay and jamming node selection result secret
CN104378757B (en) A kind of method that safety of physical layer is ensured in the more interference eavesdropping networks of more relayings
CN106059705B (en) A kind of relaying safe transmission method of physical layer
CN104540124B (en) A kind of more relaying safety of physical layer methods of known eavesdropping end channel information
CN103354463B (en) The cooperative beam formation method of safety of physical layer is strengthened based on kernel
CN106374980A (en) Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN103546210B (en) Based on the method for precoding that safe rate is optimized in multi-base station cooperative scene
CN103856299B (en) Signal safe transmission method of MIMO amplifying forwarding relay network
CN104519499A (en) Method for forming security cooperation beams in amplifying and forwarding wireless relay networks
CN106533606A (en) Physical layer secure transmission method for single-antenna amplification forwarding relay network
CN105246158A (en) Energy efficiency maximization multi-antenna relay system power allocation method based on high signal-to-noise ratio
CN105744516A (en) Communication system and method for improving security performance of physical layer by energy station
CN103152086A (en) Method for processing beam forming robustness signal on relay end of bi-direction multi-relay system
Xie et al. Training design and channel estimation in uplink cloud radio access networks
CN110650480B (en) Wireless network relay and interference node selection method facing safe communication
CN102752080A (en) Anti-eavesdrop coding method based on physical layer
CN104936251A (en) Optimal power distribution based relay selection method and system of security cooperation
CN104539334A (en) Method for forming wave beam supporting multiple users to high-speed communication based on SWIPT
CN106788661B (en) A kind of protocol self-adapting handover security transmission method of full duplex opportunistic relaying
CN105007248B (en) A kind of downlink precoding method of MIMO Full-duplex cellular systems
Wang et al. Multicast secrecy rate maximization for reconfigurable intelligent surface backscatter communication
CN103199962A (en) Signal processing method for safe capacity in Coordinated Multi-Point Transmission (CoMP) system
CN103297108B (en) A kind of uplink beam manufacturing process of Multi-source multi-relay collaborative network
Tu et al. Performance statistics of broadcasting networks with receiver diversity and fountain codes
CN102769517B (en) A kind of relay and control method of reliable feedback channel information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150415