CN106374980A - Safe transmission method in MIMO Y eavesdropping network based on real interference alignment - Google Patents

Safe transmission method in MIMO Y eavesdropping network based on real interference alignment Download PDF

Info

Publication number
CN106374980A
CN106374980A CN201610602799.0A CN201610602799A CN106374980A CN 106374980 A CN106374980 A CN 106374980A CN 201610602799 A CN201610602799 A CN 201610602799A CN 106374980 A CN106374980 A CN 106374980A
Authority
CN
China
Prior art keywords
signal
user
relaying
matrix
noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610602799.0A
Other languages
Chinese (zh)
Inventor
廖学文
樊晔
高贞贞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201610602799.0A priority Critical patent/CN106374980A/en
Publication of CN106374980A publication Critical patent/CN106374980A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/022Site diversity; Macro-diversity
    • H04B7/024Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0037Inter-user or inter-terminal allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0076Allocation utility-based

Abstract

The invention discloses a safe transmission method in an MIMO Y eavesdropping network based on real interference alignment. According to the method, through utilization of a real interference alignment technology and an artificial noise technology, through construction of useful signal precoding matrixes and interference suppression matrixes, inter-user interference signals at legal user positions are located in null spaces of receiving suppression matrixes; and noise signals are completely eliminated through linear combination. Moreover, through construction of a noise signal coding matrix at a relay position, the noise signals are completely aligned to receiving signal spaces of eavesdropping users, so the eavesdropping users cannot eavesdrop the signals and the whole multi-user eavesdropping network can obtain multiple safe communication channels.

Description

A kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method
Technical field
The invention belongs to safety of physical layer field in radio communication and in particular to a kind of based on doing solid work the mimo disturbing alignment Y eavesdrops the safe transmission method in network.
Background technology
In recent years, the safety problem in radio communication progressively becomes study hotspot.Traditional AES is mainly used in Upper layer network, in transmitting terminal, using key come encryption information, plaintext is converted into ciphertext;In receiving terminal, deciphered using key Information, ciphertext is converted in plain text.Listener-in can analyze in plain text according to the ciphertext receiving.Therefore, AES needs constantly Improve and increase the length of key to tackle the ever-increasing computing capability of computer.Safety of physical layer technology is as to encryption skill The a kind of of art supplements, and has progressively been applied to wireless network and ad-hoc network.Its core concept is using legitimate channel and eavesdropping Different physical characteristics between channel are realizing safe transmission.At present, many researchs all concentrate on safety of physical layer technology, dimension Receive and demonstrate legitimate correspondence both sides first under conditions of there is no shared key, still can obtain perfect secure communications, with When point out, under discrete memoryless channel(DMC) model, safe rate is the difference of legitimate channel speed and tapping channel speed, and Propose wiener tapping channel model, this lays a good foundation for later research, existing document is generalized to Gaussian channel mould Type, broadcast channel model, all obtain identical safe rate formula.
In multi-user's eavesdropping network, the problem of the reliability and security of existence information transmission simultaneously.Dry between user Disturb the transmitting procedure inevitably affecting this system, thus reducing the data fluxion that system can be transmitted, i.e. degree of freedom (dof).Therefore, in order to weaken inter-user interference, interference alignment techniques cause extensive concern.The ultimate principle of interference alignment It is to less interference space it is desirable to signal, independent of this space, is then recovered by simple ZF by interference vector compression Desired signal, so that numerous user can communicate in the signal space of low-dimensional simultaneously.Prior art proposes to need less sky The interference alignment algorithm of line number, this algorithm can obtain and tradition interference alignment algorithm identical degree of freedom.It should be noted that We have found that cooperation signal scrambling technique is perfectly in harmony in thinking with interference alignment techniques.As the crucial skill in safety of physical layer One of art, cooperation signal scrambling technique typically the noise signal of transmission is placed in the kernel of channel so as to not disturb useful letter Number, only weaken the received signal to noise ratio at eavesdropping end;And disturb alignment also to expect receiving useful signal and interference signal End separates.Therefore, there is scholar's research to realize multi-user using interference alignment techniques and eavesdrop the secure communication in network.As In prior art, author combines the non-zero safety realizing k user Gaussian interference channel using interference alignment and network coding technique Data fluxion, i.e. (secrecy degree of freedom).
For the eavesdropping network of the multi-user containing relaying, technology is had to point out, it is possible to use interference alignment techniques are whole to realize The secure communication of individual system.The secrecy that the double jump that x.he and a.yener have studied with unreliable relaying is eavesdropped in network is free The problem of degree.But, the research in the secrecy degree of freedom that multichannel is relayed with eavesdropping network at this stage has also lacked.One typical case K user multichannel relaying eavesdropping network be mimo y tapping channel, in mimo y network, all users are multi-antenna nodes, Each user expects to be communicated by relaying with other all users, because its traffic model is similar in alphabetical " y ", and Its communication mode is by the way of one-to-many, therefore it is named as " y model ".Its communication process mainly contains multiple access and accesses (mac) stage and broadcast (bc) stage.In the mac stage, each user sends k-1 signal to relaying, simultaneously at relaying Carry out signal alignment;In the bc stage, k (k-1)/2 signal after alignment is broadcast to all users by relaying, and each user passes through certainly Interference elimination can obtain desired signal.In the present invention, we will propose a kind of to lead to based on doing solid work the safety disturbing alignment techniques Letter scheme, by designing pre-coding matrix, AF panel matrix and man made noise's encoder matrix, realizes the multi-user containing relaying and steals Listen the secure communication of system.
Content of the invention
It is an object of the invention to overcoming above-mentioned deficiency, provide a kind of based on do solid work disturb alignment mimo y eavesdropping network in Safe transmission method, k user mimo y eavesdropping network in, carried out by the pam constellation symbol that all users are sent Precoding, and relay the man made noise's signal after sending coding, combine and disturb alignment techniques and the signal scrambling technique that cooperates using doing solid work, In the case that user meets Power Limitation with via node, realize whole network transfer of security data stream.
In order to achieve the above object, the present invention comprises the following steps:
Step one, before starting transmission signal, each user needs to select useful signal from pam constellation, at relaying The noise signal sending also is taken from a pam constellation;
Step 2, according to known global channel status information, each sends user and designs it according to interference aligned condition Related pre-coding matrix;
It is assumed that all users and node are all full-duplex modes, all users send the letter after coding to relaying to step 3 Number, relaying sends first time man made noise's signal simultaneously;
Step 4, man made noise is broadcasted simultaneously to all users with the useful signal amplifying by relaying again;
Step 5, each user receiving twice after signal, is manually made an uproar by what linear combining eliminated that relaying sent Acoustical signal, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains Obtain traffic rate necessarily.
The concrete grammar of described step one is as follows:
Disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assume user uiIssue user uj's Signal sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0,
In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through pre- Encoder matrix vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited toTherefore, quδ and a in expression formulauγ in expression formula takes in the many class values meeting power limitation condition Any one group on the occasion of;
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1), It is taken from another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,
Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1);So, relaying place sends Man made noise isIts sending signal Power Limitation is e [tr (zzh)]≤βp;Therefore, qrIn expression formula δ and arγ in expression formula take in the many class values meeting power limitation condition any one group on the occasion of.
The concrete grammar of described step 2 is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 use The signal at family, needs to design pre-coding matrix v in each useri,It is tieed up by k-1 m × 1 Precoding vector vijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, that is, vijsij;The dimension in the space that the n root antenna at relaying is opened be less than k (k-1) individual symbolic number when, part signal can in Continue place's generation aliasing, in order to avoid above-mentioned condition, using interference alignment techniques, when the antenna number of each node meetsWhen, by all paired signal such as sijWith sjiSnap in the same dimension of relaying, Now, the individual useful signal of k (k-1) can be comprised in relayingIn dimension space, that is, need to meet equation:
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is User uiTo relaying, it is relayed to user uiReal channel matrix;Now, aliasing will not occur at relaying between each signal;
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, design man made noise's letter Number pre-coding matrix tiSo that its satisfactionI.e.
Wherein,I=1,2 ..., k represent between eavesdropping end and user, between eavesdropping end and relaying respectively Real channel matrix, giIt is the equivalent vector of the same dimension after tapping channel;Then encoded man made noise's signal It is expressed as
The concrete grammar of described step 3 is as follows:
All users by encode after signal xiBe sent to via node, then relay reception to signal be:
In formula:
nrLocal white Gaussian noise at relaying;
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and steals relaying simultaneously Listen end, now, the signal that user received in this stage is
In formula:
Artifact power's partition coefficient at β relaying.
User ujIn the local white Gaussian noise in mac stage, noise variance is
The concrete grammar of described step 4 is as follows:
After relaying receives k (k-1) individual signal, it is amplified being transmitted to all users, forward signal is xr=α yr, its Middle α is the amplification coefficient at relaying, and the Power Limitation sending useful signal isMeanwhile, further Secondary transmission and mac stage identical man made noise's signal, now, the receipt signal in this stage for each user is
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is
The concrete grammar of described step 5 is as follows:
The first step, the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, the letter after being merged Number it is:
Note:So, yjIn do not comprise man made noise z, validated user will not be disturbed by man made noise The impact of signal;
After above-mentioned described interference alignment, by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalWith doing of other users Disturb signal
Second step, designs the reception suppression matrix of each user;After carrying out spacing wave alignment, user ujNeed into one Step receives suppression matrix f with (k-1) × m dimensioni=[f1if2i...fi-1,ifi+1,i...fki]tTo yjCarry out disturbing ZF, just receive To useful signal, that is, need to use fjPremultiplication is with yj,
In formula:
Dimension equivalent received suppression matrix;
Equivalent received suppresses matrix pjSelection principle be
Wherein, the kernel of null { a } representing matrix a;Upper two formulas represent pjIt is taken fromKernel, and pjDo not existKernel in;
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is;Assume each conjunction Csi known to method node, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause This, necessarily set up when meeting interference aligned condition;In order to ensure existing,Represent ?There is a n × n- (k-1) in matrix and tie up kernel, be designated as q;Assume that q is by a series of n × 1 rank null vector q institutes group Become, that is,pjIt is written as the form of column vector, pj=[pj,1pj,2...pj,k-1];Now, and if only if has matrix a, It is made to meet a=[pj,1pj,2...pj,k-1qj], during rank (a)=k, this means that selected pjIt is independently of kernel, I.e.In sum, the reception suppression matrix p at userjOr fjAlways exist;
So, under any circumstance, all choose qualified reception and suppress matrix, then eliminated by self-interference, user ujDemodulate the signal receiving, that is,
In formula:
User ujLegitimate receipt signal;
User ujLegal signal pre-coding matrix;
3rd step: using Maximum Likelihood Detection scheme detection signal;
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, using Maximum Likelihood Detection side Method draws estimation signal,
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
Compared with prior art, the present invention is using doing solid work alignment techniques and the man made noise's technology of disturbing, by being configured with letter Number pre-coding matrix is with AF panel matrix it is achieved that at validated user, inter-user interference signal is in reception suppression matrix Kernel at, noise signal is completely eliminated by linear combining;Construct noise signal encoder matrix additionally by relaying, will In the perfectly aligned receipt signal space to eavesdropping user of noise signal, reach make its cannot tapped signal purpose, thus whole Individual multi-user's eavesdropping network can obtain multiple secure communication channels.
Brief description
Fig. 1 eavesdrops the schematic diagram in model mac stage for the present invention;
Fig. 2 eavesdrops the schematic diagram in model bc stage for the present invention;
Fig. 3 is the FB(flow block) of the present invention.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings.
The present invention propose a kind of using do solid work disturb alignment techniques with cooperate scramble safety of physical layer scheme, the program employing Amplification forwarding agreement, based on the physical channel of multi-user-relaying-multi-user, carries out precoding at user, sends at relaying Man made noise, this noise disturbs external eavesdropping node in the case of not disturbing user, in the bar of each user node Power Limitation Under part, obtain whole secure communication channels.
The present invention considers a mimo y eavesdropping model, a total of k user, and each user has m root antenna, relaying There is n root antenna at place, relays realization by an af and be in communication with each other between multiple users, and system contains an eavesdropping node, each The power of user's sending signal is pi, the transmit power of all users and be p, at relaying send artificial noise signal power be β p, the power forwarding legal signal is (1- β) p, and wherein β is the power partition coefficient at relaying, 0 < β < 1.Entirely it is transmitted across Journey is described as follows:
As shown in Figure 1, Figure 2 and Figure 3, the invention provides a kind of disturb alignment techniques and the signal scrambling technique that cooperates based on doing solid work Safe transmission method of physical layer in k user mimo y eavesdropping system, comprises the following steps:
1) before starting transmission signal, each user needs to select useful signal from pam constellation, sends at relaying Noise signal is also taken from a pam constellation;
In the following analysis, in order to disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assumes User uiIssue user ujSignal sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0, In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through pre-coding matrix vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited to Therefore, quδ and a in expression formulauγ in expression formula just can take in the many class values meeting power limitation condition any one group Value.
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1), its It is taken from another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1), subsequently we need right tiIt is designed.So, the man made noise of relaying place transmission isIts sending signal Power Limitation is e [tr(zzh)]≤βp.Therefore, qrδ and a in expression formularγ in expression formula can take the many class values meeting power limitation condition In any one group on the occasion of.
2) according to known global channel status information, each sends user needs to design its phase according to interference aligned condition The pre-coding matrix closing;It is also required at relaying design artificial noise code matrix, concrete grammar is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 use The signal at family, needs to design pre-coding matrix v in each useri,It is by k-1 m × 1 The precoding vector v of dimensionijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, that is, vijsij.The dimension in the space that the n root antenna at relaying is opened be less than k (k-1) individual symbolic number when, part signal can in Continue place's generation aliasing, and in order to avoid above-mentioned condition, we adopt interference alignment techniques, when the antenna number of each node meetsWhen, by all paired signal such as sijWith sjiSnap in the same dimension of relaying, Now, the individual useful signal of k (k-1) can be comprised in relayingIn dimension space, that is, need to meet equation
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is User uiTo relaying, it is relayed to user uiReal channel matrix.Now, aliasing will not occur at relaying between each signal.
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, we design and manually make an uproar The pre-coding matrix t of acoustical signaliSo that its satisfactionI.e.
Wherein,I=1,2 ..., k represent between eavesdropping end and user, between eavesdropping end and relaying respectively Real channel matrix, giIt is the equivalent vector of the same dimension after tapping channel.Then encoded man made noise's signal It is expressed as
3) assume that all users and node are all full-duplex modes, in the first stage, all users send coding to relaying Signal afterwards, the first time man made noise's signal of relaying transmission simultaneously;In second stage, relaying is again by man made noise and amplification Useful signal be broadcasted simultaneously to all users;
Concrete communication process is divided into step, and detailed process is as follows:
Step 1 (mac stage): all users by encode after signal xiIt is sent to via node, then relay reception arrives Signal is:
In formula:
nrLocal white Gaussian noise at relaying.
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and steals relaying simultaneously Listen end, now, the signal that user received in this stage is
In formula:
User ujIn the local white Gaussian noise in mac stage, noise variance is
Step 2 (bc stage): after relaying receives k (k-1) individual signal, be amplified being transmitted to all users, forward Signal is xr=α yr, wherein α is the amplification coefficient at relaying, and the Power Limitation sending useful signal isMeanwhile, transmission again and mac stage identical man made noise's signal, now, each user Receipt signal in this stage is
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is σ j 2 .
4) each user is receiving twice after signal, eliminates the sent man made noise's letter of relaying by linear combining Number, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains one Fixed traffic rate.Specifically comprise the following steps that
Step 1: the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, after being merged Signal is:
Note:So, yjIn do not comprise man made noise z, validated user will not be disturbed by man made noise The impact of signal.
After above-mentioned described interference alignment, can be by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalWith doing of other users Disturb signal
Step 2: design the reception suppression matrix of each user.After carrying out spacing wave alignment, user ujNeed into one Step receives suppression matrix f with (k-1) × m dimensioni=[f1if2i...fi-1,ifi+1,i...fki]tTo yjCarry out disturb ZF so that it may To receive useful signal, that is, need to use fjPremultiplication is with yj,
In formula:
(k-1) × n dimension equivalent received suppression matrix.
Equivalent received suppresses matrix pjSelection principle be
Wherein, the kernel of null { a } representing matrix a.Upper two formulas represent pjIt is taken fromKernel, and pjDo not existKernel in.
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is.Assume each conjunction Csi known to method node, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause This, necessarily set up when meeting interference aligned condition.In order to ensure existing, it was noted thatThis representsThere is a n × n- (k-1) in matrix and tie up kernel, be designated as q.Assume that q is made up of a series of n × 1 rank null vector q, that is,pjCan be written as the form of column vector, pj= [pj,1pj,2...pj,k-1].Now, and if only if has matrix a so as to meet a=[pj,1pj,2...pj,k-1qj], rank (a)= During k, this means that selected pjIt is independently of kernel, that is,In sum, the reception suppression square at user Battle array pjOr fjAlways exist.
So, under any circumstance, we all can choose qualified reception and suppress matrix, then are disappeared by self-interference Remove, user ujThe signal receiving can be demodulated, that is,
In formula:
User ujLegitimate receipt signal.
User ujLegal signal pre-coding matrix.
Step 3: using Maximum Likelihood Detection scheme detection signal.
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, using Maximum Likelihood Detection side Method draws estimation signal,
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
In sum, whole multi-user's relaying eavesdropping network can realize secure communication.
5) in order to verify the performance of the present invention, we will analyze under this programme, system institute from information-theoretical angle The number of obtainable secure data flow, i.e. the secrecy degree of freedom of derivation whole system.When secure data flow amount is more than zero, Whole system can be with secure communication.Specifically comprise the following steps that
Step 1: the data fluxion of first derivation validated user communication.The information rate that each user obtains is:
In formula:
The mutual information of two stochastic variable a and b of i (a, b);
H () comentropy.
Wherein, due to sjIn k-1 symbol be equiprobable to come from pam constellation c (au,qu), therefore h (sj)=log (2qu+1)k-1.In addition, we use Markov ChainTo limit with Fano inequalityIt is wrong The upper bound of probability is by mistake:
In formula: ηγWith piUnrelated on the occasion of.Herein it will be assumed that pi=p/k, therefore, validated user and fast Rate is expressed asI.e.
rsum≥k log(2qu+1)k-1-k-k pru(e)log(2qu+1)k-1
We are to rsumValue carry out finding limit under conditions of high signal/noise ratio, you can to obtain the legal number of whole system According to fluxion,
This represents, when each user sends k-1 data, the legal data fluxion of k user of whole system is k (k-1).
Step 2: the data fluxion that analysis eavesdropping end can intercept.Letter twice first received by analysis eavesdropping end Number.In the mac stage, eavesdropping the signal received by end is:
Wherein:
Eavesdrop end this Earth noise when first time receiving signal, noise variance is
In the bc stage, the signal that eavesdropping end receives for the second time is:
Wherein:
Eavesdrop end this Earth noise when receiving signal for the second time, noise variance is
For eavesdropping end, we cannot learn its interception method used, therefore, in the present invention it will be assumed that eavesdropping end Take a kind of method most useful for eavesdropping, that is, it can carry out linear combining to received signal twice.Assume listener-in Receiving matrix can be utilizedMerge tapped signal twice in order to obtain the eavesdropping signal to noise ratio of maximum, that is,The demodulated signal at eavesdropping end is represented as
In formula:
siThe sending signal of each user,
neEavesdropping end this Earth noise of equivalence, that is,
WhenWhen, the signal that eavesdropping end receives can be expressed as again
Section 1 in above formula represents the impact for each subscriber signal for the interference signal.We will be right with interference for signal Together in a dimension, so eavesdropping end cannot identify useful signal, just cannot eavesdrop.Now, eavesdropping information rate is
Work as w1≠0,w2≠ 0,Can be represented as
Now:
For eavesdropping end, orderThe equivalent expression of the number of tapping channel For:
This shows, eavesdropping end at most can interceptIndividual data flow, wherein symbolRepresent and take downwards Whole.
Step 3: weed out the data flow of eavesdropping in legitimate traffic, remaining is safe and secret data flow Number, when whole system has the data flow of safety, whole system can securely communicate.Therefore, k user mbwc model The minima of secure data fluxion is
This shows, when number of users is more than three, the data fluxion that system is obtained in that is minimum to beIndividual, wherein SymbolExpression rounds up.By proving, this data fluxion is always on the occasion of that is, whole system has the number of secure communication According to stream, the safety of system is ensured.
Proposed by the invention in k user mimo y tapping channel, disturb alignment techniques and the scrambling skill that cooperates based on doing solid work The scheme of the secure communication of art has the advantage that
The program, be applied to the eavesdropping network of the multidirectional relaying of multi-user, is directed to the precoding of different user by design Matrix, noise code matrix and receive suppression matrix, under the communication pattern of full duplex pass through design sending method it is achieved that The secure communication of whole system, this compensate for the vacancy of security of system in junction network.
Knowable to above-mentioned performance proves, the number of the safe lane that the method obtains is consistently greater than zero, and this also indicates that entirely System can realize secure communication.

Claims (6)

1. a kind of eavesdrop the safe transmission method in network it is characterised in that including following based on doing solid work the mimo y disturbing alignment Step:
Step one, before starting transmission signal, each user needs to select useful signal from pam constellation, sends at relaying Noise signal be also taken from a pam constellation;
Step 2, according to known global channel status information, each sends user and designs its correlation according to interference aligned condition Pre-coding matrix;
It is assumed that all users and node are all full-duplex modes, all users send the signal after coding to relaying to step 3, with Shi Zhongji sends first time man made noise's signal;
Step 4, man made noise is broadcasted simultaneously to all users with the useful signal amplifying by relaying again;
Step 5, each user is receiving twice after signal, eliminates the sent man made noise's letter of relaying by linear combining Number, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains one Fixed traffic rate.
2. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method, It is characterized in that, the concrete grammar of described step one is as follows:
Disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assume user uiIssue user ujSignal Sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0,
In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through precoding Matrix vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited toTherefore, quδ and a in expression formulauγ in expression formula takes in the many class values meeting power limitation condition Any one group on the occasion of;
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1), it is taken from In another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,
Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1);So, what relaying place sent is artificial Noise isIts sending signal Power Limitation is e [tr (zzh)]≤βp;Therefore, qrδ in expression formula with arγ in expression formula take in the many class values meeting power limitation condition any one group on the occasion of.
3. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method, It is characterized in that, the concrete grammar of described step 2 is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 user's Signal, needs to design pre-coding matrix v in each useri,Its by k-1 m × 1 tie up pre- Coding vector vijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, i.e. vijsij;When When the dimension in the space that the n root antenna at relaying is opened is less than k (k-1) individual symbolic number, part signal can occur at relaying Aliasing, in order to avoid above-mentioned condition, using interference alignment techniques, when the antenna number of each node meetsm≥k-1, During 2m > n, by all paired signal such as sijWith sjiSnap in the same dimension of relaying, now, the individual useful letter of k (k-1) Number can be comprised in relayingIn dimension space, that is, need to meet equation:
h u i r v i j = h u j r v j i = u i , j , i &notequal; j , i , j = 1 , 2 , ... k
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is user uiTo relaying, it is relayed to user uiReal channel matrix;Now, aliasing will not occur at relaying between each signal;
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, design artificial noise signal Pre-coding matrix tiSo that its satisfactionI.e.
t i = h r e h h u i e v i
Wherein,I=1,2 ..., k represent the real channel between eavesdropping end and user, between eavesdropping end and relaying respectively Matrix, giIt is the equivalent vector of the same dimension after tapping channel;Then encoded man made noise's signal is expressed as
4. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method, It is characterized in that, the concrete grammar of described step 3 is as follows:
All users by encode after signal xiBe sent to via node, then relay reception to signal be:
y r = σ i = 1 k h u i r x i + n r
In formula:
nrLocal white Gaussian noise at relaying;
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and eavesdrops end to relaying simultaneously, Now, the signal that user received in this stage is
y j [ 1 ] = h ru j z + n j [ 1 ] , i = 1 , 2 , ... , k
In formula:
Artifact power's partition coefficient at β relaying.
User ujIn the local white Gaussian noise in mac stage, noise variance is
5. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method, It is characterized in that, the concrete grammar of described step 4 is as follows:
After relaying receives k (k-1) individual signal, it is amplified being transmitted to all users, forward signal is xr=α yr, wherein α For the amplification coefficient at relaying, the Power Limitation sending useful signal isMeanwhile, again Send and mac stage identical man made noise's signal, now, the receipt signal in this stage for each user is
y j [ 2 ] = h ru j x r + n j [ 2 ] = h ru j [ α ( σ i = 1 k h u i r x i + n r ) + z ] + n j [ 2 ] = αh ru j σ i = 1 k h u i r x i + h ru j z + α ~ h ru j n r + n j [ 2 ]
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is
6. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method, It is characterized in that, the concrete grammar of described step 5 is as follows:
The first step, the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, and the signal after being merged is:
y j = y j [ 2 ] - y j [ 1 ] = αh r j σ i = 1 k h i r x i + n ~ j
Note:So, yjIn do not comprise man made noise z, validated user will not be subject to man made noise's interference signal Impact;
After above-mentioned described interference alignment, by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
y j = αh ru j u r s r + n ~ j = αh ru j ( u ~ j s ~ j + u &overbar; j s &overbar; j ) + n ~ j
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalInterference signal with other users
Second step, designs the reception suppression matrix of each user;After carrying out spacing wave alignment, user ujNeed to use further (k-1) × m dimension receives suppression matrix fi=[f1if2i... fi-1,ifi+1,i... fki]tTo yjCarry out disturbing ZF, just receive To useful signal, that is, need to use fjPremultiplication is with yj,
y ^ j = αf j h ru j ( u ~ j s ~ j + u &overbar; j s &overbar; j ) + n ~ j = αp j u ~ j s ~ j + αp j u &overbar; j s &overbar; j + n ~ j ·
In formula:
(k-1) × n dimension equivalent received suppression matrix;
Equivalent received suppresses matrix pjSelection principle be
p j ⊂ n u l l { u &overbar; j }
p j &notsubset; n u l l { u ~ j }
Wherein, the kernel of null { a } representing matrix a;Upper two formulas represent pjIt is taken fromKernel, and pjDo not exist's In kernel;
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is;Assume each legitimate node Known csi, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause This, necessarily set up when meeting interference aligned condition;In order to ensure existing,Represent ?There is a n × n- (k-1) in matrix and tie up kernel, be designated as q;Assume that q is by a series of n × 1 rank null vector q institutes group Become, that is,pjIt is written as the form of column vector, pj=[pj,1pj,2... pj,k-1];Now, and if only if has matrix A is so as to meet a=[pj,1pj,2... pj,k-1qj], during rank (a)=k, this means that selected pjIt is independently of zero Space, that is,In sum, the reception suppression matrix p at userjOr fjAlways exist;
So, under any circumstance, all choose qualified reception and suppress matrix, then eliminated by self-interference, user ujDemodulation Go out the signal receiving, that is,
y ^ j = αp j u ~ j s j + n ~ j
In formula:
User ujLegitimate receipt signal;
User ujLegal signal pre-coding matrix;
3rd step: using Maximum Likelihood Detection scheme detection signal;
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, obtained using maximum likelihood detection method Go out to estimate signal,
s ^ j = argmin s j &element; χ | | y ^ j - αp j u ~ j s ^ j | | 2
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
CN201610602799.0A 2016-07-27 2016-07-27 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment Pending CN106374980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610602799.0A CN106374980A (en) 2016-07-27 2016-07-27 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610602799.0A CN106374980A (en) 2016-07-27 2016-07-27 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment

Publications (1)

Publication Number Publication Date
CN106374980A true CN106374980A (en) 2017-02-01

Family

ID=57879153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610602799.0A Pending CN106374980A (en) 2016-07-27 2016-07-27 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment

Country Status (1)

Country Link
CN (1) CN106374980A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972912A (en) * 2017-03-06 2017-07-21 东华大学 Secret communication method based on feedback under a kind of MIMO tapping channels
CN107994934A (en) * 2017-11-14 2018-05-04 西北工业大学 Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
CN108429708A (en) * 2018-03-19 2018-08-21 江苏科技大学 Multi-user interference is aligned network green secret communication method
CN109348503A (en) * 2018-11-20 2019-02-15 广东工业大学 A kind of monitor method of wireless communication link, device, equipment and system
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method
CN109526014A (en) * 2017-09-19 2019-03-26 株式会社东芝 Wireless communication device and wireless communications method
CN110430566A (en) * 2019-07-26 2019-11-08 西北工业大学 A kind of more junction network safe transmission methods of double bounce based on collection of energy
CN111669206A (en) * 2020-05-21 2020-09-15 中国联合网络通信集团有限公司 Signal detection method and device
CN111817758A (en) * 2020-07-21 2020-10-23 上海交通大学 Discrete modulation signal MIMO transmission method
CN111934863A (en) * 2020-08-11 2020-11-13 南方电网科学研究院有限责任公司 Secret key sharing method based on artificial noise and safety coding in edge calculation
CN112533197A (en) * 2020-11-19 2021-03-19 哈尔滨工业大学 Artificial noise assisted physical layer security method based on interference management
CN113595675A (en) * 2021-06-09 2021-11-02 西安电子科技大学 Interference management method and system for maximizing safe data transmission rate
CN114286336A (en) * 2021-12-30 2022-04-05 重庆邮电大学 Multi-cell network secure transmission method based on artificial noise
CN114710231A (en) * 2022-04-18 2022-07-05 电子科技大学 Safety communication method based on artificial noise

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420679A (en) * 2011-09-30 2012-04-18 北京邮电大学 Relay collaborative precoding-based multi-user two-way communication method
CN103248414A (en) * 2013-04-17 2013-08-14 重庆邮电大学 Method for multi-relay two-hop transmission based on interference alignment and beamforming

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420679A (en) * 2011-09-30 2012-04-18 北京邮电大学 Relay collaborative precoding-based multi-user two-way communication method
CN102420679B (en) * 2011-09-30 2014-11-19 北京邮电大学 Relay collaborative precoding-based multi-user two-way communication method
CN103248414A (en) * 2013-04-17 2013-08-14 重庆邮电大学 Method for multi-relay two-hop transmission based on interference alignment and beamforming

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YE FAN 等: "Physical Layer Security Based on Real Interference Alignment in K-User MIMO Y Wiretap Channels", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 *
朱茂娟 等: "基于实干扰对齐技术的两用户中继辅助信道的安全自由度分析", 《重庆邮电大学学报(自然科学版)》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972912A (en) * 2017-03-06 2017-07-21 东华大学 Secret communication method based on feedback under a kind of MIMO tapping channels
CN106972912B (en) * 2017-03-06 2020-05-26 东华大学 Secret communication method based on feedback under MIMO interception channel
CN109526014A (en) * 2017-09-19 2019-03-26 株式会社东芝 Wireless communication device and wireless communications method
CN107994934B (en) * 2017-11-14 2020-10-27 西北工业大学 Safe transmission method of untrusted relay network based on symbol separation and beam forming
CN107994934A (en) * 2017-11-14 2018-05-04 西北工业大学 Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
CN108429708A (en) * 2018-03-19 2018-08-21 江苏科技大学 Multi-user interference is aligned network green secret communication method
CN109348503B (en) * 2018-11-20 2021-11-26 广东工业大学 Monitoring method, device, equipment and system for wireless communication link
CN109348503A (en) * 2018-11-20 2019-02-15 广东工业大学 A kind of monitor method of wireless communication link, device, equipment and system
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method
CN109450507B (en) * 2018-12-03 2021-05-11 华侨大学 Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method
CN110430566A (en) * 2019-07-26 2019-11-08 西北工业大学 A kind of more junction network safe transmission methods of double bounce based on collection of energy
CN111669206A (en) * 2020-05-21 2020-09-15 中国联合网络通信集团有限公司 Signal detection method and device
CN111817758A (en) * 2020-07-21 2020-10-23 上海交通大学 Discrete modulation signal MIMO transmission method
CN111934863A (en) * 2020-08-11 2020-11-13 南方电网科学研究院有限责任公司 Secret key sharing method based on artificial noise and safety coding in edge calculation
CN111934863B (en) * 2020-08-11 2024-01-09 南方电网科学研究院有限责任公司 Key sharing method based on artificial noise and security coding in edge calculation
CN112533197A (en) * 2020-11-19 2021-03-19 哈尔滨工业大学 Artificial noise assisted physical layer security method based on interference management
CN113595675A (en) * 2021-06-09 2021-11-02 西安电子科技大学 Interference management method and system for maximizing safe data transmission rate
CN113595675B (en) * 2021-06-09 2024-01-23 西安电子科技大学 Interference management method and system for maximizing safe data transmission rate
CN114286336A (en) * 2021-12-30 2022-04-05 重庆邮电大学 Multi-cell network secure transmission method based on artificial noise
CN114286336B (en) * 2021-12-30 2023-10-13 重庆邮电大学 Multi-cell network safe transmission method based on artificial noise
CN114710231A (en) * 2022-04-18 2022-07-05 电子科技大学 Safety communication method based on artificial noise
CN114710231B (en) * 2022-04-18 2023-09-19 电子科技大学 Safety communication method based on artificial noise

Similar Documents

Publication Publication Date Title
CN106374980A (en) Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
Ximenes et al. Semi-blind receivers for non-regenerative cooperative MIMO communications based on nested PARAFAC modeling
CN104378757B (en) A kind of method that safety of physical layer is ensured in the more interference eavesdropping networks of more relayings
CN104540124B (en) A kind of more relaying safety of physical layer methods of known eavesdropping end channel information
Ding et al. A general relaying transmission protocol for MIMO secrecy communications
CN104469755A (en) Physical layer security transmission method for keeping relay and jamming node selection result secret
CN104320826A (en) Chance relay-selection method for cooperative communication network under tapping environment
Mekkawy et al. Secure relay selection for two way amplify-and-forward untrusted relaying networks
Xie et al. Spatial modulation in two-way network coded channels: Performance and mapping optimization
CN102694628A (en) Interference suppression method for multi-user MIMO collaborative relay system
Wyrembelski et al. Physical layer integration of private, common, and confidential messages in bidirectional relay networks
CN102752080B (en) A kind of anti-eavesdrop coded method based on physical layer
Hu et al. Legitimate eavesdropping in two-way AF relay networks
Ouyang et al. Destination assisted jamming and beamforming for improving the security of AF relay systems
CN104065462B (en) There is the process of signal transmission method of diversity gain under relaying interference channel
CN105141559B (en) A kind of safe transmission method of physical layer in OFDM amplification forwarding relay system
Wicaksana et al. On the diversity-multiplexing tradeoff of amplify-and-forward half-duplex relaying
CN108631825A (en) Enhance two-way AF relay cooperatives wireless communication system physical layer safe transmission method
Zhang et al. Achievable rate analysis for multi-pair two-way massive MIMO full-duplex relay systems
CN111385004B (en) Same-frequency simultaneous full-duplex communication system and method based on spatial modulation
Vaze et al. Cascaded orthogonal space–time block codes for wireless multi-hop relay networks
CN103401657A (en) Non-differential distributed space-time coding method for cooperative communication partially-coherent network
Yan et al. Distributed precoding for OFDM in two-way relaying communications
Zhang et al. Physical layer security in cognitive relay networks with multiple antennas
Salem et al. Improving physical layer security of af relay networks via beam-forming and jamming

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170201

WD01 Invention patent application deemed withdrawn after publication