CN106059705A - Relay physical layer safe transmission method - Google Patents

Relay physical layer safe transmission method Download PDF

Info

Publication number
CN106059705A
CN106059705A CN201610326446.2A CN201610326446A CN106059705A CN 106059705 A CN106059705 A CN 106059705A CN 201610326446 A CN201610326446 A CN 201610326446A CN 106059705 A CN106059705 A CN 106059705A
Authority
CN
China
Prior art keywords
node
alpha
noise
matrix
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610326446.2A
Other languages
Chinese (zh)
Other versions
CN106059705B (en
Inventor
王强
齐航
王怡
杨丽娜
董敏华
韦伟
胡鑫
黄健欧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201610326446.2A priority Critical patent/CN106059705B/en
Publication of CN106059705A publication Critical patent/CN106059705A/en
Application granted granted Critical
Publication of CN106059705B publication Critical patent/CN106059705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Radio Relay Systems (AREA)

Abstract

The invention provides a relay physical level safe transmission method and belongs to the field of communication. According to the invention, a relay node is, while under a full duplex working mode, is configured with a plurality of antennas, and adopts decode-and-forward protocol. The method designs a pre-coded array to be an artificial noise, and allows the relay node to transmit a hybrid signal of an expectation signal and the artificial noise to an object node at each time slot. A bugging node can bug the hybrid signal. The object node can eliminate the designed artificial noise from the hybrid signal so as to decode the expectation signal, while the bugging node fails to do the decoding. According to the invention, the method also derives and acquires the safety rate of the system, acquires the optimal power allocation polity between the expectation signal and the artificial noise. According to the invention, the method can effectively deal with bugging behavior and explicitly increase safety property of the system.

Description

A kind of relaying safe transmission method of physical layer
Technical field
The present invention relates to the communications field, relay safe transmission method of physical layer particularly to one.
Background technology
Safety of physical layer application in wireless communications causes considerable concern recently, because from information-theoretical viewpoint On see, it is not necessary to upper layer data encryption be also possible to prevent to be ravesdropping.Along with safety of physical layer research is goed deep into, its research Model is the most complicated, and wherein the safety of physical layer of relay system is one of focus in recent years.
Cooperating relay communication is one of effective ways improving safe rate.Cooperating relay (cooperative Relaying, CR) can strengthen the security performance from source node to destination node, and the interference (cooperative that cooperates Jamming, CJ) it is that eavesdropping node is disturbed by the mode by man made noise (artificial noise, AN).And be correlated with The scheme of mixing CR and CJ that document proposes, and the power of the relaying between CR and CJ is distributed maximize safe rate and [join Examine file 1:C.Wang, H.-M.Wang, and X.-G.Xia, " Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,”IEEE Trans.Wireless Commun.,vol.14,no.2,pp.589-605,Feb.2015].But, most of existing researchs Focus on half-duplex relaying (half duplex relay, HDR), seldom touch full duplex relaying (full duplex Relay, FDR), the especially situation of multiple antennas full duplex relaying.
Traditional equipment general work in a half-duplex mode, and full duplex technology have become as 5G communication key technology One of.Half-duplex refers under same time slot, the function that equipment can only be transmitted or receive, and full duplex is then with for the moment Under gap, the function that equipment can be transmitted simultaneously and receive, thus the twice of almost half-duplex spectrum efficiency.FDR overcomes HDR The defect of intrinsic spectrum efficiency, but there is relatively strong self-interference signal in full duplex transmission.Existing relevant technology shows When self-interference is suppressed significantly, FDR has more preferable security performance than HDR.
Summary of the invention
The present invention, in order to overcome the deficiencies in the prior art, relays for full duplex, it is provided that a kind of relaying safety of physical layer Transmission method, can be described as Full Duplex Hybrid Relaying-and-Jamming, referred to as FDHRJ with English.This The relaying work of inventive method in a full-duplex mode, is equipped with many antennas, uses decoding to forward (decode-and- Forward, DF) agreement.
A kind of relaying safe transmission method of physical layer of the present invention, the relay system applied includes a single antenna source Node S, a M root antenna relay node R, a single antenna eavesdropping node E, and single antenna destination node D.M is big In the integer of 1.If the experience block decline of all channels, i.e. channel transfer characteristic keep constant on fixing character cycle, and phase The most independent average of obeying is 0, and variance is the multiple Gauss distribution of 1.Source node S to via node R, source node S to eavesdropping node E, Via node R is respectively to destination node D, via node R to the channel transfer matrix of eavesdropping node E WhereinRepresent complex field.(·)H,(·)T,(·)*,(·)-1Represent respectively The conjugate transpose of matrix, transposition, conjugation, take inverse operation.| | and | | | | represent absolute value of a complex number and the model of matrix respectively Number.The determinant of det () representing matrix.E () represents the mathematic expectaion of stochastic variable.[x]+=max (x, 0).Concrete step Suddenly include:
Step 1, in t, single antenna source node S sends desired signal x to via node Rs(t)。
Step 2, in t, via node R receives the desired signal x sent from source node S in the t-1 moments(t-1), Simultaneously as via node uses the agreement of decoding forwarding and is operated in full-duplex mode, the letter that therefore via node can forward Number be
x r ( t ) = α w 1 x s ( t - 1 ) + 1 - α w 2 z ( t )
Wherein, α ∈ (0,1) is the power allocation factor between desired signal and man made noise;w2= HFor the man made noise of design, wherein HFor matrix hrdThe column vector of the orthogonal basis of kernel, can obtain hrdw2=0
Z (t)=[z1(t),z2(t),...,zM-1(t)]TIt is system noise, wherein zm(t), m=1,2 ..., M-1 is only The vertical multiple Gaussian random variable with distribution, average is zero, and variance isNoise section w2z(t) The spatial isotropy launched, does not affects destination node D.xs(t-1) the most separate with z (t).
The signal y that via node R can receiver(t) be:
y r ( t ) = P s h s r x s ( t ) + P r h r r x r ( t ) + n r ( t )
Wherein,Represent the via node R remaining self-interference after self-interference technology for eliminating, if hrrIt is Independent Rayleigh distribution variable.PsIt is the transmitting power of source node.PrIt is the transmitting power of via node.nrT () is t relaying Additive noise at node, in matrix, each element is independent identically distributed multiple Gaussian random variable, and average is zero, and variance is
Step 3, in t, destination node D receives signal yd(t) be:
y d ( t ) = P r h r d x r ( t ) + n d ( t ) = αP r h r d w 1 x s ( t - 1 ) + n d ( t )
Wherein, ndT () is the additive noise at t destination node, in matrix, each element is independent identically distributed Multiple Gaussian random variable, average is zero, and variance is
Step 4, in t, eavesdropping node E receives signal ye(t) be:
y e ( t ) = P s h s e x s ( t ) + P r h r e x r ( t ) + n e ( t ) = P s h s e x s ( t ) + αP r h r e w 1 x s ( t - 1 ) + ( 1 - α ) P r h r e w 2 z ( t ) + n e ( t )
Wherein, neT () is the additive noise at t eavesdropping node, in matrix, each element is independent identically distributed Multiple Gaussian random variable, average is zero, and variance is
Step 5, it is thus achieved that the achievable rate R of source node S to via node RsrFor:
R s r = log 2 ( 1 + P s h s r H ( I + P r h r r H h r r ) - 1 h s r )
Obtain the via node R achievable rate R to destination node DrdFor:
Rrd=log2(1+αPr||hrdw1||2)
Obtain the achievable rate R of tapping channeleFor:
R e ≈ log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 )
Obtain security of system speed RsFor:
R s = [ log 2 ( 1 + min ( P s h s r H ( I + P r h r r H h r r ) - 1 h s r , αP r | | h r d w 1 | | 2 ) ) - log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 ) ] +
Step 6, utilizes two way classification, and the optimal power allocation obtaining security of system speed is
α o p t = P s h s r H ( I + P r h r r H h r r ) - 1 h s r P r | | h r d w 1 | | 2
Wherein I is unit matrix, according to αoptCarry out the power distribution between desired signal and man made noise.
Advantages of the present invention with have the active effect that the inventive method devises pre-coding matrix conduct at via node Human disturbance, relays in a full-duplex mode and sends desired signal and Human disturbance at each time slot simultaneously, and destination node is permissible Decode desired signal, and eliminate the adverse effect of Human disturbance, and eavesdrop node and cannot accomplish this point.The inventive method is also The safe rate of derivation acquisition system, obtains the optimal power allocation strategy between desired signal and man made noise.Use this Inventive method can be effective against eavesdropping behavior, is obviously improved the security performance of system.
Accompanying drawing explanation
Fig. 1 is the model schematic of the relay system safety of physical layer of the embodiment of the present invention;
Fig. 2 is to work as Ps2=20dB, Pr2During=30dB, FDHRJ uses optimal power allocation, and FDHRJ uses average merit Rate distribution and the security of system speed schematic diagram changed with antenna number without three kinds of schemes of man made noise;
Fig. 3 is to work as Ps2=15dB, γsereDuring=-25dB, FDHRJ uses optimal power allocation, and FDHRJ uses Average power allocation and the security of system speed schematic diagram changed with relay power without three kinds of schemes of man made noise.
Detailed description of the invention
Describe embodiments of the present invention in detail below in conjunction with drawings and Examples, whereby how the present invention is applied Technological means solves technical problem, and the process that realizes reaching relevant art effect can fully understand and implement according to this.This Shen Please each feature in embodiment and embodiment, can be combined with each other under not colliding premise, the technical scheme formed All within protection scope of the present invention.
Fig. 1 is the illustraton of model of the relay system safety of physical layer of the embodiment of the present invention.Described relay system includes one Single antenna source node S, a M root antenna relay node R, a single antenna eavesdropping node E, single antenna destination node D;M For the integer more than 1.If the experience block decline of all channels, i.e. channel transfer characteristic keep constant on fixing character cycle, And separate obedience average is 0, variance is the multiple Gauss distribution of 1.Source node S is to via node R, and source node S is to eavesdropping joint Point E, via node R to destination node D, via node R are expressed as to the channel transfer matrix of eavesdropping node EWhereinRepresent complex field.(·)H,(·)T,(·)*, (·)-1The conjugate transpose of representing matrix respectively, transposition, conjugation, take inverse operation.| | and | | | | represent the absolute of plural number respectively Value and norm of matrix.The determinant of det () representing matrix.E () represents the mathematic expectaion of stochastic variable.
The relaying safe transmission method of physical layer of the present invention includes that step 1 is to step 6.Illustrate below each to realize step.
Step 1, in t, single antenna source node S sends desired signal x to via node RsT (), now eavesdrops node This signal can also be intercepted.
Step 2, in t, multiple antennas via node R can receive the expectation letter sent from source node S in the t-1 moment Number xs(t-1), simultaneously as via node uses the agreement of decoding forwarding and is operated in full-duplex mode, therefore via node exists The signal that t can forward is xrT (), is expressed as:
x r ( t ) = α w 1 x s ( t - 1 ) + 1 - α w 2 z ( t ) - - - ( 1 )
Wherein, α ∈ (0,1) is the power allocation factor between desired signal and man made noise;w2= HThe man made noise designed for the present invention, wherein HFor matrix hrdThe column vector of the orthogonal basis of kernel, can obtain hrdw2= 0.Z (t)=[z1(t),z2(t),...,zM-1(t)]TIt is system noise, wherein zm(t), m=1,2 ..., M-1 is independent with dividing The multiple Gaussian random variable of cloth, average is zero, and variance isIM-1Unit square for M-1 dimension Battle array.Noise section w2The spatial isotropy that z (t) launches, does not affects destination node D.xs(t-1) simultaneously mutual with z (t) Independent.The signal y that via node R can receiverT (), is expressed as:
y r ( t ) = P s h s r x s ( t ) + P r h r r x r ( t ) + n r ( t ) - - - ( 2 )
Wherein,Represent the via node R remaining self-interference after self-interference technology for eliminating, it is assumed that it It is through effectively suppression, so hrrIt is considered independent Rayleigh distribution variable.PsIt is the transmitting power of source node.PrIn being Continue the transmitting power of node.nrT () is the additive noise at via node, in matrix, each element is independent identically distributed multiple Gaussian random variable, average is zero, and variance is
Step 3, in t, destination node receives signal ydT () is expressed as:
y d ( t ) = P r h r d x r ( t ) + n d ( t ) = αP r h r d w 1 x s ( t - 1 ) + n d ( t ) - - - ( 3 )
Wherein, ndT () is the additive noise at t destination node, matrix ndT in (), each element is independent with dividing The multiple Gaussian random variable of cloth, average is zero, and variance is
Step 4, in t, eavesdropping node receives signal ye(t) be:
y e ( t ) = P s h s e x s ( t ) + P r h r e x r ( t ) + n e ( t ) = P s h s e x s ( t ) + αP r h r e w 1 x s ( t - 1 ) + ( 1 - α ) P r h r e w 2 z ( t ) + n e ( t ) - - - ( 4 )
Wherein, neT () is the additive noise at t eavesdropping node E, noise matrix neT each element in () is only The vertical multiple Gaussian random variable with distribution, average is zero, and variance is
Step 5, is derived by the source node S achievable rate R to via node Rsr, via node R to destination node D can Reach speed Rrd, the achievable rate R of tapping channeleIt is respectively as follows:
R s r = log 2 ( 1 + P s h s r H ( I + P r h r r H h r r ) - 1 h s r ) - - - ( 5 )
Rrd=log2(1+αPr||hrdw1||2) (6)
R e ≈ log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 ) - - - ( 7 )
Security of system speed RsFor:
R s = [ log 2 ( 1 + min ( P s h s r H ( I + P r h r r H h r r ) - 1 h s r , αP r | | h r d w 1 | | 2 ) ) - log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 ) ] + - - - ( 8 )
Wherein, [x]+=max (x, 0), represents the higher value in taking both 0 and x.
Step 6, utilizes two way classification, obtains optimal power allocation α of security of system speedoptFor:
α o p t = P s h s r H ( I + P r h r r H h r r ) - 1 h s r P r | | h r d w 1 | | 2 - - - ( 9 )
Wherein, I is unit matrix.According to the α o obtainedptCarry out the power distribution between desired signal and man made noise, i.e. α=α is substituted in formula (1)optObtain forward signal xr(t)。
Fig. 2 and Fig. 3 is the simulation result of the inventive method.Assume that channel gain is γsr=| | hsr||2rd=| | hrd| |2se=| hse|2re=| | hre||2rr=| | hrr||2sere=0dB, γrr=-40dB, if noise power
Fig. 2 is the result that safe rate changes with relay antenna number.Wherein FDHRJ opt represents and uses optimal power allocation FDHRJ strategy, FDHRJ opt the most currently preferred relaying safe transmission method of physical layer;FDHRJ ave represents to use and puts down All FDHRJ strategies of power distribution, No AN represents and does not use FDHRJ strategy.On the whole, safe rate is along with relay antenna Number increase and increase.Work as γse=-25dB and γre=-15dB, the safe rate increasing degree of three kinds of contrast schemes and γsereThe situation of=-15dB is similar to, but works as γse=-15dB and γre=-25dB, FDHRJ opt has the fastest safety The increasing degree of speed, FDHRJ ave is also good than the performance of No AN scheme.In sum, FDHRJ side proposed by the invention Case is an advantage over other two kinds contrast schemes.
The safe rate of Fig. 3 display system first increases with total transmitting power of relaying and subtracts afterwards.Now it is configured to M=4, γse= γre=-25dB.Owing to the channel speed of trunk channel is to take channel speed less in S → R and R → D, certain at channel In the case of, work as PrTime less, the signal to noise ratio of the R → D signal to noise ratio less than S → R, now trunk channel speed is by PrDetermine, can be with Pr Increase and increase;Work as PrIncrease to and PsTime close, the speed of trunk channel depends on this link of S → R.Due to relaying The existence of self-interference channel, can cause trunk channel speed with PrIncrease and reduce;For tapping channel, along with Pr's Increase, both can increase the useful signal that eavesdropping node is received, also can increase its interference signal received, the most not Can be with PrIncrease and produce large change.As it is shown on figure 3, in the case of channel status is stable, work as PrTime less, FDHRJ exists Use αoptTime consistent with the effect without man made noise's scheme, but work as PrAfter increasing to about 11dB, use αopt's FDHRJ scheme to be much better than other two kinds of contrast schemes.To sum up analyzing and understand, the safe rate of system can always launch merit with relaying The increase of rate and first increase and subtract afterwards, when without man made noise, eavesdropping node will not receive the interference signal of middle secondary, at this moment Its tapping channel speed can be along with PrIncrease have significantly increase, therefore in FIG. 3, it is seen that this curve of No AN exists Second half section can be more faster than what other two curves declined.
In sum, the relay system safety of physical layer mode that the embodiment of the present invention provides, use the present invention to propose FDHRJ scheme, at via node, devise pre-coding matrix as Human disturbance, relay in a full-duplex mode each Time slot sends desired signal and Human disturbance simultaneously, and destination node can decode desired signal, and eliminates Human disturbance not Profit impact, and eavesdrop node and cannot accomplish this point.The most under the model, it is thus achieved that the safe rate of system, have studied the phase Hope the optimal power allocation strategy between signal and man made noise, use proposed scheme can be obviously improved the safety of system Energy.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, common about technical field Technical staff, without departing from the spirit and scope of the present invention, it is also possible to make a variety of changes and modification, therefore own The technical scheme of equivalent falls within scope of the invention, and the scope of patent protection of the present invention should be defined by the claims.

Claims (2)

1. a relaying safe transmission method of physical layer, it is characterised in that relay system model used includes a single antenna Source node S, the via node R of a M root antenna, a single antenna eavesdropping node E and single antenna destination node D;M is Integer more than 1;Via node uses the agreement of decoding forwarding and is operated in full-duplex mode;The experience block decline of all channels, Channel transfer characteristic keeps constant on fixing character cycle, and separate obedience average is 0, and variance is the multiple Gauss of 1 Distribution;If source node S is to via node R, source node S to eavesdropping node E, via node R to destination node D and relaying joint Point R is respectively to the channel transfer matrix of eavesdropping node E Table Give instructions in reply number field;
Described transmission method comprises the steps:
Step 1, in t, single antenna source node S sends desired signal x to via node Rs(t);
Step 2, in t, via node R receives the signal x sent from source node S in the t-1 moments(t-1), relaying joint The signal x that point forwardsr(t) be:
x r ( t ) = α w 1 x s ( t - 1 ) + 1 - α w 2 z ( t )
Wherein, α is the power allocation factor between desired signal and man made noise, α ∈ (0,1);w1、w2For manually making an uproar of design Sound,w2=H, HFor matrix hrdThe column vector of the orthogonal basis of kernel, hrdw2=0;Z (t) is system noise Sound, z (t)=[z1(t),z2(t),...,zM-1(t)]T, xs(t-1) separate with z (t);Noise section w2The sky that z (t) launches Between isotropism, do not affect destination node D;(·)H、(·)TThe conjugate transpose of representing matrix, transposition respectively, | | | | table Show norm of matrix;
The signal y that via node R receives in tr(t) be:
y r ( t ) = P s h s r x s ( t ) + P r h r r x r ( t ) + n r ( t )
Wherein,Represent the via node R remaining self-interference after self-interference technology for eliminating, if hrrIt is independent Rayleigh distributed variable;PsIt is the transmitting power of source node S, PrIt is the transmitting power of via node R;nrT () is t relaying joint Additive noise at Dian, noise matrix nrT in (), each element is independent identically distributed multiple Gaussian random variable, average is Zero, variance is
Step 3, in t, destination node D receives signal yd(t) be:
y d ( t ) = P r h r d x r ( t ) + n d ( t ) = αP r h r d w 1 x s ( t - 1 ) + n d ( t )
Wherein, ndT () is the additive noise at t destination node, matrix ndT in (), each element is independent identically distributed Multiple Gaussian random variable;
Step 4, in t, eavesdropping node E receives signal ye(t) be:
y e ( t ) = P s h s e x s ( t ) + P r h r e x r ( t ) + n e ( t ) = P s h s e x s ( t ) + αP r h r e w 1 x s ( t - 1 ) + ( 1 - α ) P r h r e w 2 z ( t ) + n e ( t )
Wherein, neT () is the additive noise at t eavesdropping node E, noise matrix neT each element in () is independent same The multiple Gaussian random variable of distribution;
Step 5, it is thus achieved that the achievable rate R of source node S to via node RsrFor:
R s r = log 2 ( 1 + P s h s r H ( I + P r h r r H h r r ) - 1 h s r )
Wherein, ()-1Representing matrix take inverse operation;
Obtain the via node R achievable rate R to destination node DrdFor:
Rrd=log2(1+αPr||hrdw1||2)
Obtain the achievable rate R of tapping channeleFor:
R e ≈ log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 )
Wherein, | | represent and seek absolute value of a complex number;
Obtain security of system speed RsFor:
R s = [ log 2 ( 1 + min ( P s h s r H ( I + P r h r r H h r r ) - 1 h s r , αP r | | h r d w 1 | | 2 ) ) - log 2 ( 1 + P s | h s e | 2 + αP r | | h r e w 1 | | 2 1 - α M - 1 P r | | h r e w 2 | | 2 + 1 ) ] +
Step 6, utilizes two way classification, obtains optimal power allocation α of security of system speedoptFor:
α o p t = P s h s r H ( I + P r h r r H h r r ) - 1 h s r P r | | h r d w 1 | | 2
Wherein I is unit matrix, according to αoptCarry out the power distribution between desired signal and man made noise.
A kind of relaying safe transmission method of physical layer the most according to claim 1, it is characterised in that described system noise Element z in z (t)m(t), m=1,2 ..., M-1, is independent identically distributed multiple Gaussian random variable, and its average is zero, variance ForE () represents the mathematic expectaion of stochastic variable, IM-1Unit matrix for M-1 dimension.
CN201610326446.2A 2016-05-17 2016-05-17 A kind of relaying safe transmission method of physical layer Active CN106059705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610326446.2A CN106059705B (en) 2016-05-17 2016-05-17 A kind of relaying safe transmission method of physical layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610326446.2A CN106059705B (en) 2016-05-17 2016-05-17 A kind of relaying safe transmission method of physical layer

Publications (2)

Publication Number Publication Date
CN106059705A true CN106059705A (en) 2016-10-26
CN106059705B CN106059705B (en) 2018-10-26

Family

ID=57176939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610326446.2A Active CN106059705B (en) 2016-05-17 2016-05-17 A kind of relaying safe transmission method of physical layer

Country Status (1)

Country Link
CN (1) CN106059705B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533496A (en) * 2016-12-30 2017-03-22 西安交通大学 Unreliable relay full duplex communication method based on interference cooperation
CN106792660A (en) * 2017-03-06 2017-05-31 北京理工大学 A kind of remote safety of physical layer energy-collecting method
CN106992803A (en) * 2017-05-04 2017-07-28 华侨大学 A kind of man made noise precoding safe transmission method of full duplex relaying system
CN107248875A (en) * 2017-05-12 2017-10-13 东南大学 A kind of multiple antennas relay system safety of physical layer design method based on signal to noise ratio
CN107425887A (en) * 2017-05-02 2017-12-01 西北工业大学 A kind of beam-forming method in the insincere junction network of multiple antennas
CN109088696A (en) * 2018-09-12 2018-12-25 西安交通大学 A kind of MBM safe transmission method of physical layer based on man made noise
CN109361440A (en) * 2018-11-26 2019-02-19 中国人民解放军陆军工程大学 Physical layer security pre-coding method and decoding method for downlink network of Internet of things
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method
CN109698741A (en) * 2018-12-17 2019-04-30 电子科技大学 A kind of novel full-duplex communication transmitter and receiver design method
CN109743729A (en) * 2019-02-23 2019-05-10 重庆邮电大学 A kind of security transmission method for wirelessly taking energy cooperative system
CN109861784A (en) * 2018-12-10 2019-06-07 南京理工大学 Full duplex receiver covert communications implementation method based on channel distribution information
CN110149135A (en) * 2019-04-15 2019-08-20 上海师范大学 Multipair extensive MIMO bilateral relay network method for communication transmission and control device
CN113422668A (en) * 2021-06-15 2021-09-21 河南科技大学 Cooperative communication transmission method based on crisp-resistant relay
CN114301567A (en) * 2021-12-28 2022-04-08 绿盟科技集团股份有限公司 Communication method and device based on artificial noise

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365242A (en) * 2008-08-29 2009-02-11 同济大学 Method and system based on mobile prediction and group switching
CN103199959A (en) * 2013-04-12 2013-07-10 南京邮电大学 Network coding method in collaborative communication
CN103354463A (en) * 2013-06-20 2013-10-16 西安电子科技大学 Cooperative wave beam formation method capable of improving physical layer security based on null space
CN103856299A (en) * 2014-01-20 2014-06-11 西安交通大学 Signal safe transmission method of MIMO amplifying forwarding relay network
CN104093143A (en) * 2014-07-14 2014-10-08 电子科技大学 Self-adaptive cooperation method in physical layer safety communication
CN104283629A (en) * 2014-09-02 2015-01-14 电子科技大学 Channel safety transmission method
CN104469755A (en) * 2014-12-08 2015-03-25 西安理工大学 Physical layer security transmission method for keeping relay and jamming node selection result secret
CN104540124A (en) * 2014-12-19 2015-04-22 山东大学 Multi-relay physical layer safety method based on known eavesdropping end channel information
CN105141559A (en) * 2015-06-30 2015-12-09 西安交通大学 Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system
CN105245269A (en) * 2015-10-26 2016-01-13 西安电子科技大学 Signal energy synchronous transmission relay transmission method in physical layer safety communication
CN105375956A (en) * 2015-10-26 2016-03-02 西安电子科技大学 Queue cache relay transmission method in physical layer safety communication
CN105516997A (en) * 2015-12-06 2016-04-20 桂林电子科技大学 Physical layer safe cognition relay communication method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365242A (en) * 2008-08-29 2009-02-11 同济大学 Method and system based on mobile prediction and group switching
CN103199959A (en) * 2013-04-12 2013-07-10 南京邮电大学 Network coding method in collaborative communication
CN103354463A (en) * 2013-06-20 2013-10-16 西安电子科技大学 Cooperative wave beam formation method capable of improving physical layer security based on null space
CN103856299A (en) * 2014-01-20 2014-06-11 西安交通大学 Signal safe transmission method of MIMO amplifying forwarding relay network
CN104093143A (en) * 2014-07-14 2014-10-08 电子科技大学 Self-adaptive cooperation method in physical layer safety communication
CN104283629A (en) * 2014-09-02 2015-01-14 电子科技大学 Channel safety transmission method
CN104469755A (en) * 2014-12-08 2015-03-25 西安理工大学 Physical layer security transmission method for keeping relay and jamming node selection result secret
CN104540124A (en) * 2014-12-19 2015-04-22 山东大学 Multi-relay physical layer safety method based on known eavesdropping end channel information
CN105141559A (en) * 2015-06-30 2015-12-09 西安交通大学 Physical layer secure transmission method in OFDM (orthogonal frequency division multiplexing) amplify-and-forward relay system
CN105245269A (en) * 2015-10-26 2016-01-13 西安电子科技大学 Signal energy synchronous transmission relay transmission method in physical layer safety communication
CN105375956A (en) * 2015-10-26 2016-03-02 西安电子科技大学 Queue cache relay transmission method in physical layer safety communication
CN105516997A (en) * 2015-12-06 2016-04-20 桂林电子科技大学 Physical layer safe cognition relay communication method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533496A (en) * 2016-12-30 2017-03-22 西安交通大学 Unreliable relay full duplex communication method based on interference cooperation
CN106792660A (en) * 2017-03-06 2017-05-31 北京理工大学 A kind of remote safety of physical layer energy-collecting method
CN107425887A (en) * 2017-05-02 2017-12-01 西北工业大学 A kind of beam-forming method in the insincere junction network of multiple antennas
CN107425887B (en) * 2017-05-02 2020-05-12 西北工业大学 Beam forming method in multi-antenna untrusted relay network
CN106992803A (en) * 2017-05-04 2017-07-28 华侨大学 A kind of man made noise precoding safe transmission method of full duplex relaying system
CN107248875B (en) * 2017-05-12 2020-04-24 东南大学 Signal-to-noise ratio-based physical layer security design method for multi-antenna relay system
CN107248875A (en) * 2017-05-12 2017-10-13 东南大学 A kind of multiple antennas relay system safety of physical layer design method based on signal to noise ratio
CN109088696A (en) * 2018-09-12 2018-12-25 西安交通大学 A kind of MBM safe transmission method of physical layer based on man made noise
CN109361440A (en) * 2018-11-26 2019-02-19 中国人民解放军陆军工程大学 Physical layer security pre-coding method and decoding method for downlink network of Internet of things
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method
CN109450507B (en) * 2018-12-03 2021-05-11 华侨大学 Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method
CN109861784A (en) * 2018-12-10 2019-06-07 南京理工大学 Full duplex receiver covert communications implementation method based on channel distribution information
CN109698741A (en) * 2018-12-17 2019-04-30 电子科技大学 A kind of novel full-duplex communication transmitter and receiver design method
CN109743729A (en) * 2019-02-23 2019-05-10 重庆邮电大学 A kind of security transmission method for wirelessly taking energy cooperative system
CN109743729B (en) * 2019-02-23 2021-09-28 重庆邮电大学 Secret transmission method of wireless energy-carrying cooperative system
CN110149135A (en) * 2019-04-15 2019-08-20 上海师范大学 Multipair extensive MIMO bilateral relay network method for communication transmission and control device
CN113422668A (en) * 2021-06-15 2021-09-21 河南科技大学 Cooperative communication transmission method based on crisp-resistant relay
CN113422668B (en) * 2021-06-15 2022-05-27 河南科技大学 Cooperative communication transmission method based on crisp-resistant relay
CN114301567A (en) * 2021-12-28 2022-04-08 绿盟科技集团股份有限公司 Communication method and device based on artificial noise
CN114301567B (en) * 2021-12-28 2023-07-28 绿盟科技集团股份有限公司 Communication method and device based on artificial noise

Also Published As

Publication number Publication date
CN106059705B (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN106059705A (en) Relay physical layer safe transmission method
CN109743729B (en) Secret transmission method of wireless energy-carrying cooperative system
Letafati et al. Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay
Zhu et al. Outage probability of dual-hop multiple antenna AF systems with linear processing in the presence of co-channel interference
CN105657839B (en) The power distribution method of full duplex multicarrier security system based on qos requirement
CN109548013A (en) A kind of mobile edge calculations system constituting method of the NOMA with anti-eavesdropping ability
CN106992803A (en) A kind of man made noise precoding safe transmission method of full duplex relaying system
CN109890031A (en) A kind of more relaying non-orthogonal multiple system safe transmission schemes based on man made noise
Wang et al. Relay selection of full‐duplex decode‐and‐forward relaying over Nakagami‐m fading channels
Alves et al. On the performance of secure full-duplex relaying under composite fading channels
CN110299934A (en) A kind of security transmission method for wirelessly taking energy full duplex relaying system
Wang et al. Full-duplex user relaying for NOMA system with self-energy recycling
CN110519756A (en) Physical layer safety transmission method of full duplex relay network
Feng et al. User and relay selection with artificial noise to enhance physical layer security
Fang et al. Massive MIMO for full-duplex cellular two-way relay network: A spectral efficiency study
Anokye et al. Achievable sum-rate analysis of massive MIMO full-duplex wireless backhaul links in heterogeneous cellular networks
CN104467935B (en) The data transmission method and device of full duplex base station
CN104202277B (en) A kind of design method for the linear transceiver of secondary user network for recognizing junction network
Feng et al. Physical layer security enhancement in multi-user multi-full-duplex-relay networks
CN105007248A (en) Downlink pre-coding method of MIMO full-duplex cellular system
Rauniyar et al. Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks
Qu et al. Secure transmission in massive MIMO system with specular component-based beamforming and artificial noise over ricean fading channel
Liu et al. Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection
Long et al. Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node
Song Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading Channel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant