CN106374980A - Safe transmission method in MIMO Y eavesdropping network based on real interference alignment - Google Patents
Safe transmission method in MIMO Y eavesdropping network based on real interference alignment Download PDFInfo
- Publication number
- CN106374980A CN106374980A CN201610602799.0A CN201610602799A CN106374980A CN 106374980 A CN106374980 A CN 106374980A CN 201610602799 A CN201610602799 A CN 201610602799A CN 106374980 A CN106374980 A CN 106374980A
- Authority
- CN
- China
- Prior art keywords
- signal
- user
- relaying
- matrix
- noise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0037—Inter-user or inter-terminal allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0076—Allocation utility-based
Abstract
The invention discloses a safe transmission method in an MIMO Y eavesdropping network based on real interference alignment. According to the method, through utilization of a real interference alignment technology and an artificial noise technology, through construction of useful signal precoding matrixes and interference suppression matrixes, inter-user interference signals at legal user positions are located in null spaces of receiving suppression matrixes; and noise signals are completely eliminated through linear combination. Moreover, through construction of a noise signal coding matrix at a relay position, the noise signals are completely aligned to receiving signal spaces of eavesdropping users, so the eavesdropping users cannot eavesdrop the signals and the whole multi-user eavesdropping network can obtain multiple safe communication channels.
Description
Technical field
The invention belongs to safety of physical layer field in radio communication and in particular to a kind of based on doing solid work the mimo disturbing alignment
Y eavesdrops the safe transmission method in network.
Background technology
In recent years, the safety problem in radio communication progressively becomes study hotspot.Traditional AES is mainly used in
Upper layer network, in transmitting terminal, using key come encryption information, plaintext is converted into ciphertext;In receiving terminal, deciphered using key
Information, ciphertext is converted in plain text.Listener-in can analyze in plain text according to the ciphertext receiving.Therefore, AES needs constantly
Improve and increase the length of key to tackle the ever-increasing computing capability of computer.Safety of physical layer technology is as to encryption skill
The a kind of of art supplements, and has progressively been applied to wireless network and ad-hoc network.Its core concept is using legitimate channel and eavesdropping
Different physical characteristics between channel are realizing safe transmission.At present, many researchs all concentrate on safety of physical layer technology, dimension
Receive and demonstrate legitimate correspondence both sides first under conditions of there is no shared key, still can obtain perfect secure communications, with
When point out, under discrete memoryless channel(DMC) model, safe rate is the difference of legitimate channel speed and tapping channel speed, and
Propose wiener tapping channel model, this lays a good foundation for later research, existing document is generalized to Gaussian channel mould
Type, broadcast channel model, all obtain identical safe rate formula.
In multi-user's eavesdropping network, the problem of the reliability and security of existence information transmission simultaneously.Dry between user
Disturb the transmitting procedure inevitably affecting this system, thus reducing the data fluxion that system can be transmitted, i.e. degree of freedom
(dof).Therefore, in order to weaken inter-user interference, interference alignment techniques cause extensive concern.The ultimate principle of interference alignment
It is to less interference space it is desirable to signal, independent of this space, is then recovered by simple ZF by interference vector compression
Desired signal, so that numerous user can communicate in the signal space of low-dimensional simultaneously.Prior art proposes to need less sky
The interference alignment algorithm of line number, this algorithm can obtain and tradition interference alignment algorithm identical degree of freedom.It should be noted that
We have found that cooperation signal scrambling technique is perfectly in harmony in thinking with interference alignment techniques.As the crucial skill in safety of physical layer
One of art, cooperation signal scrambling technique typically the noise signal of transmission is placed in the kernel of channel so as to not disturb useful letter
Number, only weaken the received signal to noise ratio at eavesdropping end;And disturb alignment also to expect receiving useful signal and interference signal
End separates.Therefore, there is scholar's research to realize multi-user using interference alignment techniques and eavesdrop the secure communication in network.As
In prior art, author combines the non-zero safety realizing k user Gaussian interference channel using interference alignment and network coding technique
Data fluxion, i.e. (secrecy degree of freedom).
For the eavesdropping network of the multi-user containing relaying, technology is had to point out, it is possible to use interference alignment techniques are whole to realize
The secure communication of individual system.The secrecy that the double jump that x.he and a.yener have studied with unreliable relaying is eavesdropped in network is free
The problem of degree.But, the research in the secrecy degree of freedom that multichannel is relayed with eavesdropping network at this stage has also lacked.One typical case
K user multichannel relaying eavesdropping network be mimo y tapping channel, in mimo y network, all users are multi-antenna nodes,
Each user expects to be communicated by relaying with other all users, because its traffic model is similar in alphabetical " y ", and
Its communication mode is by the way of one-to-many, therefore it is named as " y model ".Its communication process mainly contains multiple access and accesses
(mac) stage and broadcast (bc) stage.In the mac stage, each user sends k-1 signal to relaying, simultaneously at relaying
Carry out signal alignment;In the bc stage, k (k-1)/2 signal after alignment is broadcast to all users by relaying, and each user passes through certainly
Interference elimination can obtain desired signal.In the present invention, we will propose a kind of to lead to based on doing solid work the safety disturbing alignment techniques
Letter scheme, by designing pre-coding matrix, AF panel matrix and man made noise's encoder matrix, realizes the multi-user containing relaying and steals
Listen the secure communication of system.
Content of the invention
It is an object of the invention to overcoming above-mentioned deficiency, provide a kind of based on do solid work disturb alignment mimo y eavesdropping network in
Safe transmission method, k user mimo y eavesdropping network in, carried out by the pam constellation symbol that all users are sent
Precoding, and relay the man made noise's signal after sending coding, combine and disturb alignment techniques and the signal scrambling technique that cooperates using doing solid work,
In the case that user meets Power Limitation with via node, realize whole network transfer of security data stream.
In order to achieve the above object, the present invention comprises the following steps:
Step one, before starting transmission signal, each user needs to select useful signal from pam constellation, at relaying
The noise signal sending also is taken from a pam constellation;
Step 2, according to known global channel status information, each sends user and designs it according to interference aligned condition
Related pre-coding matrix;
It is assumed that all users and node are all full-duplex modes, all users send the letter after coding to relaying to step 3
Number, relaying sends first time man made noise's signal simultaneously;
Step 4, man made noise is broadcasted simultaneously to all users with the useful signal amplifying by relaying again;
Step 5, each user receiving twice after signal, is manually made an uproar by what linear combining eliminated that relaying sent
Acoustical signal, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains
Obtain traffic rate necessarily.
The concrete grammar of described step one is as follows:
Disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assume user uiIssue user uj's
Signal sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0,
In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through pre-
Encoder matrix vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited toTherefore, quδ and a in expression formulauγ in expression formula takes in the many class values meeting power limitation condition
Any one group on the occasion of;
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1),
It is taken from another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,
Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1);So, relaying place sends
Man made noise isIts sending signal Power Limitation is e [tr (zzh)]≤βp;Therefore, qrIn expression formula
δ and arγ in expression formula take in the many class values meeting power limitation condition any one group on the occasion of.
The concrete grammar of described step 2 is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 use
The signal at family, needs to design pre-coding matrix v in each useri,It is tieed up by k-1 m × 1
Precoding vector vijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, that is,
vijsij;The dimension in the space that the n root antenna at relaying is opened be less than k (k-1) individual symbolic number when, part signal can in
Continue place's generation aliasing, in order to avoid above-mentioned condition, using interference alignment techniques, when the antenna number of each node meetsWhen, by all paired signal such as sijWith sjiSnap in the same dimension of relaying,
Now, the individual useful signal of k (k-1) can be comprised in relayingIn dimension space, that is, need to meet equation:
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is
User uiTo relaying, it is relayed to user uiReal channel matrix;Now, aliasing will not occur at relaying between each signal;
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, design man made noise's letter
Number pre-coding matrix tiSo that its satisfactionI.e.
Wherein,I=1,2 ..., k represent between eavesdropping end and user, between eavesdropping end and relaying respectively
Real channel matrix, giIt is the equivalent vector of the same dimension after tapping channel;Then encoded man made noise's signal
It is expressed as
The concrete grammar of described step 3 is as follows:
All users by encode after signal xiBe sent to via node, then relay reception to signal be:
In formula:
nrLocal white Gaussian noise at relaying;
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and steals relaying simultaneously
Listen end, now, the signal that user received in this stage is
In formula:
Artifact power's partition coefficient at β relaying.
User ujIn the local white Gaussian noise in mac stage, noise variance is
The concrete grammar of described step 4 is as follows:
After relaying receives k (k-1) individual signal, it is amplified being transmitted to all users, forward signal is xr=α yr, its
Middle α is the amplification coefficient at relaying, and the Power Limitation sending useful signal isMeanwhile, further
Secondary transmission and mac stage identical man made noise's signal, now, the receipt signal in this stage for each user is
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is
The concrete grammar of described step 5 is as follows:
The first step, the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, the letter after being merged
Number it is:
Note:So, yjIn do not comprise man made noise z, validated user will not be disturbed by man made noise
The impact of signal;
After above-mentioned described interference alignment, by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalWith doing of other users
Disturb signal
Second step, designs the reception suppression matrix of each user;After carrying out spacing wave alignment, user ujNeed into one
Step receives suppression matrix f with (k-1) × m dimensioni=[f1if2i...fi-1,ifi+1,i...fki]tTo yjCarry out disturbing ZF, just receive
To useful signal, that is, need to use fjPremultiplication is with yj,
In formula:
Dimension equivalent received suppression matrix;
Equivalent received suppresses matrix pjSelection principle be
Wherein, the kernel of null { a } representing matrix a;Upper two formulas represent pjIt is taken fromKernel, and pjDo not existKernel in;
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is;Assume each conjunction
Csi known to method node, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause
This, necessarily set up when meeting interference aligned condition;In order to ensure existing,Represent
?There is a n × n- (k-1) in matrix and tie up kernel, be designated as q;Assume that q is by a series of n × 1 rank null vector q institutes group
Become, that is,pjIt is written as the form of column vector, pj=[pj,1pj,2...pj,k-1];Now, and if only if has matrix a,
It is made to meet a=[pj,1pj,2...pj,k-1qj], during rank (a)=k, this means that selected pjIt is independently of kernel,
I.e.In sum, the reception suppression matrix p at userjOr fjAlways exist;
So, under any circumstance, all choose qualified reception and suppress matrix, then eliminated by self-interference, user
ujDemodulate the signal receiving, that is,
In formula:
User ujLegitimate receipt signal;
User ujLegal signal pre-coding matrix;
3rd step: using Maximum Likelihood Detection scheme detection signal;
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, using Maximum Likelihood Detection side
Method draws estimation signal,
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
Compared with prior art, the present invention is using doing solid work alignment techniques and the man made noise's technology of disturbing, by being configured with letter
Number pre-coding matrix is with AF panel matrix it is achieved that at validated user, inter-user interference signal is in reception suppression matrix
Kernel at, noise signal is completely eliminated by linear combining;Construct noise signal encoder matrix additionally by relaying, will
In the perfectly aligned receipt signal space to eavesdropping user of noise signal, reach make its cannot tapped signal purpose, thus whole
Individual multi-user's eavesdropping network can obtain multiple secure communication channels.
Brief description
Fig. 1 eavesdrops the schematic diagram in model mac stage for the present invention;
Fig. 2 eavesdrops the schematic diagram in model bc stage for the present invention;
Fig. 3 is the FB(flow block) of the present invention.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings.
The present invention propose a kind of using do solid work disturb alignment techniques with cooperate scramble safety of physical layer scheme, the program employing
Amplification forwarding agreement, based on the physical channel of multi-user-relaying-multi-user, carries out precoding at user, sends at relaying
Man made noise, this noise disturbs external eavesdropping node in the case of not disturbing user, in the bar of each user node Power Limitation
Under part, obtain whole secure communication channels.
The present invention considers a mimo y eavesdropping model, a total of k user, and each user has m root antenna, relaying
There is n root antenna at place, relays realization by an af and be in communication with each other between multiple users, and system contains an eavesdropping node, each
The power of user's sending signal is pi, the transmit power of all users and be p, at relaying send artificial noise signal power be
β p, the power forwarding legal signal is (1- β) p, and wherein β is the power partition coefficient at relaying, 0 < β < 1.Entirely it is transmitted across
Journey is described as follows:
As shown in Figure 1, Figure 2 and Figure 3, the invention provides a kind of disturb alignment techniques and the signal scrambling technique that cooperates based on doing solid work
Safe transmission method of physical layer in k user mimo y eavesdropping system, comprises the following steps:
1) before starting transmission signal, each user needs to select useful signal from pam constellation, sends at relaying
Noise signal is also taken from a pam constellation;
In the following analysis, in order to disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assumes
User uiIssue user ujSignal sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0,
In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through pre-coding matrix
vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited to
Therefore, quδ and a in expression formulauγ in expression formula just can take in the many class values meeting power limitation condition any one group
Value.
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1), its
It is taken from another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1), subsequently we need right
tiIt is designed.So, the man made noise of relaying place transmission isIts sending signal Power Limitation is e
[tr(zzh)]≤βp.Therefore, qrδ and a in expression formularγ in expression formula can take the many class values meeting power limitation condition
In any one group on the occasion of.
2) according to known global channel status information, each sends user needs to design its phase according to interference aligned condition
The pre-coding matrix closing;It is also required at relaying design artificial noise code matrix, concrete grammar is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 use
The signal at family, needs to design pre-coding matrix v in each useri,It is by k-1 m × 1
The precoding vector v of dimensionijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, that is,
vijsij.The dimension in the space that the n root antenna at relaying is opened be less than k (k-1) individual symbolic number when, part signal can in
Continue place's generation aliasing, and in order to avoid above-mentioned condition, we adopt interference alignment techniques, when the antenna number of each node meetsWhen, by all paired signal such as sijWith sjiSnap in the same dimension of relaying,
Now, the individual useful signal of k (k-1) can be comprised in relayingIn dimension space, that is, need to meet equation
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is
User uiTo relaying, it is relayed to user uiReal channel matrix.Now, aliasing will not occur at relaying between each signal.
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, we design and manually make an uproar
The pre-coding matrix t of acoustical signaliSo that its satisfactionI.e.
Wherein,I=1,2 ..., k represent between eavesdropping end and user, between eavesdropping end and relaying respectively
Real channel matrix, giIt is the equivalent vector of the same dimension after tapping channel.Then encoded man made noise's signal
It is expressed as
3) assume that all users and node are all full-duplex modes, in the first stage, all users send coding to relaying
Signal afterwards, the first time man made noise's signal of relaying transmission simultaneously;In second stage, relaying is again by man made noise and amplification
Useful signal be broadcasted simultaneously to all users;
Concrete communication process is divided into step, and detailed process is as follows:
Step 1 (mac stage): all users by encode after signal xiIt is sent to via node, then relay reception arrives
Signal is:
In formula:
nrLocal white Gaussian noise at relaying.
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and steals relaying simultaneously
Listen end, now, the signal that user received in this stage is
In formula:
User ujIn the local white Gaussian noise in mac stage, noise variance is
Step 2 (bc stage): after relaying receives k (k-1) individual signal, be amplified being transmitted to all users, forward
Signal is xr=α yr, wherein α is the amplification coefficient at relaying, and the Power Limitation sending useful signal isMeanwhile, transmission again and mac stage identical man made noise's signal, now, each user
Receipt signal in this stage is
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is
4) each user is receiving twice after signal, eliminates the sent man made noise's letter of relaying by linear combining
Number, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains one
Fixed traffic rate.Specifically comprise the following steps that
Step 1: the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, after being merged
Signal is:
Note:So, yjIn do not comprise man made noise z, validated user will not be disturbed by man made noise
The impact of signal.
After above-mentioned described interference alignment, can be by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalWith doing of other users
Disturb signal
Step 2: design the reception suppression matrix of each user.After carrying out spacing wave alignment, user ujNeed into one
Step receives suppression matrix f with (k-1) × m dimensioni=[f1if2i...fi-1,ifi+1,i...fki]tTo yjCarry out disturb ZF so that it may
To receive useful signal, that is, need to use fjPremultiplication is with yj,
In formula:
(k-1) × n dimension equivalent received suppression matrix.
Equivalent received suppresses matrix pjSelection principle be
Wherein, the kernel of null { a } representing matrix a.Upper two formulas represent pjIt is taken fromKernel, and pjDo not existKernel in.
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is.Assume each conjunction
Csi known to method node, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause
This, necessarily set up when meeting interference aligned condition.In order to ensure existing, it was noted thatThis representsThere is a n × n- (k-1) in matrix and tie up kernel, be designated as
q.Assume that q is made up of a series of n × 1 rank null vector q, that is,pjCan be written as the form of column vector, pj=
[pj,1pj,2...pj,k-1].Now, and if only if has matrix a so as to meet a=[pj,1pj,2...pj,k-1qj], rank (a)=
During k, this means that selected pjIt is independently of kernel, that is,In sum, the reception suppression square at user
Battle array pjOr fjAlways exist.
So, under any circumstance, we all can choose qualified reception and suppress matrix, then are disappeared by self-interference
Remove, user ujThe signal receiving can be demodulated, that is,
In formula:
User ujLegitimate receipt signal.
User ujLegal signal pre-coding matrix.
Step 3: using Maximum Likelihood Detection scheme detection signal.
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, using Maximum Likelihood Detection side
Method draws estimation signal,
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
In sum, whole multi-user's relaying eavesdropping network can realize secure communication.
5) in order to verify the performance of the present invention, we will analyze under this programme, system institute from information-theoretical angle
The number of obtainable secure data flow, i.e. the secrecy degree of freedom of derivation whole system.When secure data flow amount is more than zero,
Whole system can be with secure communication.Specifically comprise the following steps that
Step 1: the data fluxion of first derivation validated user communication.The information rate that each user obtains is:
In formula:
The mutual information of two stochastic variable a and b of i (a, b);
H () comentropy.
Wherein, due to sjIn k-1 symbol be equiprobable to come from pam constellation c (au,qu), therefore h (sj)=log
(2qu+1)k-1.In addition, we use Markov ChainTo limit with Fano inequalityIt is wrong
The upper bound of probability is by mistake:
In formula: ηγWith piUnrelated on the occasion of.Herein it will be assumed that pi=p/k, therefore, validated user and fast
Rate is expressed asI.e.
rsum≥k log(2qu+1)k-1-k-k pru(e)log(2qu+1)k-1
We are to rsumValue carry out finding limit under conditions of high signal/noise ratio, you can to obtain the legal number of whole system
According to fluxion,
This represents, when each user sends k-1 data, the legal data fluxion of k user of whole system is k
(k-1).
Step 2: the data fluxion that analysis eavesdropping end can intercept.Letter twice first received by analysis eavesdropping end
Number.In the mac stage, eavesdropping the signal received by end is:
Wherein:
Eavesdrop end this Earth noise when first time receiving signal, noise variance is
In the bc stage, the signal that eavesdropping end receives for the second time is:
Wherein:
Eavesdrop end this Earth noise when receiving signal for the second time, noise variance is
For eavesdropping end, we cannot learn its interception method used, therefore, in the present invention it will be assumed that eavesdropping end
Take a kind of method most useful for eavesdropping, that is, it can carry out linear combining to received signal twice.Assume listener-in
Receiving matrix can be utilizedMerge tapped signal twice in order to obtain the eavesdropping signal to noise ratio of maximum, that is,The demodulated signal at eavesdropping end is represented as
In formula:
siThe sending signal of each user,
neEavesdropping end this Earth noise of equivalence, that is,
WhenWhen, the signal that eavesdropping end receives can be expressed as again
Section 1 in above formula represents the impact for each subscriber signal for the interference signal.We will be right with interference for signal
Together in a dimension, so eavesdropping end cannot identify useful signal, just cannot eavesdrop.Now, eavesdropping information rate is
Work as w1≠0,w2≠ 0,Can be represented as
Now:
For eavesdropping end, orderThe equivalent expression of the number of tapping channel
For:
This shows, eavesdropping end at most can interceptIndividual data flow, wherein symbolRepresent and take downwards
Whole.
Step 3: weed out the data flow of eavesdropping in legitimate traffic, remaining is safe and secret data flow
Number, when whole system has the data flow of safety, whole system can securely communicate.Therefore, k user mbwc model
The minima of secure data fluxion is
This shows, when number of users is more than three, the data fluxion that system is obtained in that is minimum to beIndividual, wherein
SymbolExpression rounds up.By proving, this data fluxion is always on the occasion of that is, whole system has the number of secure communication
According to stream, the safety of system is ensured.
Proposed by the invention in k user mimo y tapping channel, disturb alignment techniques and the scrambling skill that cooperates based on doing solid work
The scheme of the secure communication of art has the advantage that
The program, be applied to the eavesdropping network of the multidirectional relaying of multi-user, is directed to the precoding of different user by design
Matrix, noise code matrix and receive suppression matrix, under the communication pattern of full duplex pass through design sending method it is achieved that
The secure communication of whole system, this compensate for the vacancy of security of system in junction network.
Knowable to above-mentioned performance proves, the number of the safe lane that the method obtains is consistently greater than zero, and this also indicates that entirely
System can realize secure communication.
Claims (6)
1. a kind of eavesdrop the safe transmission method in network it is characterised in that including following based on doing solid work the mimo y disturbing alignment
Step:
Step one, before starting transmission signal, each user needs to select useful signal from pam constellation, sends at relaying
Noise signal be also taken from a pam constellation;
Step 2, according to known global channel status information, each sends user and designs its correlation according to interference aligned condition
Pre-coding matrix;
It is assumed that all users and node are all full-duplex modes, all users send the signal after coding to relaying to step 3, with
Shi Zhongji sends first time man made noise's signal;
Step 4, man made noise is broadcasted simultaneously to all users with the useful signal amplifying by relaying again;
Step 5, each user is receiving twice after signal, eliminates the sent man made noise's letter of relaying by linear combining
Number, and suppress matrix to demodulate useful signal using the reception meeting certain restrictive condition, thus whole system obtains one
Fixed traffic rate.
2. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method,
It is characterized in that, the concrete grammar of described step one is as follows:
Disturb alignment techniques using doing solid work, all of channel is real channel matrix, and assume user uiIssue user ujSignal
Sending signal sijIt is taken from pam constellation c (a defined belowu,qu), that is,
c(au,qu)=au{-qu,-qu+1,...,qu-1,qu}
In formula:
quOne and number of users k and each user's transmit power piRelated on the occasion of, for δ > 0,
auThe sending signal making each user meets the real number that transmit power limits, for γ > 0,
In the above description, each user uiThe signal s sendingi=[si1,si2,...,sik]t∈r(k-1)×1It is through precoding
Matrix vi∈rm×(k-1)Signal x after codingi∈rm×1, that is,Therefore transmit power is limited toTherefore, quδ and a in expression formulauγ in expression formula takes in the many class values meeting power limitation condition
Any one group on the occasion of;
In mbwc mimo y model, relay sent interference noise bi∈rk(k-1)×1Comprise the individual symbol of k (k-1), it is taken from
In another pam constellation c (ar,qr), that is,
c(ar,qr)=ar{-qr,-qr+1,...,qr-1,qr}
In formula:
qrOne to number of users k and relaying transmit power p related on the occasion of, for δ > 0,
arSo that sending signal meets the real number of transmit power restriction at relaying, for γ > 0,
Sending biNeed it is encoded, encoder matrix is t beforei∈rn×k(k-1);So, what relaying place sent is artificial
Noise isIts sending signal Power Limitation is e [tr (zzh)]≤βp;Therefore, qrδ in expression formula with
arγ in expression formula take in the many class values meeting power limitation condition any one group on the occasion of.
3. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method,
It is characterized in that, the concrete grammar of described step 2 is as follows:
In order to eliminate produced inter-user interference during k user intercommunication, and demodulate and come from other k-1 user's
Signal, needs to design pre-coding matrix v in each useri,Its by k-1 m × 1 tie up pre-
Coding vector vijComposition, each precoding vector vijWill be to each signal sjiCarry out linear predictive coding, i.e. vijsij;When
When the dimension in the space that the n root antenna at relaying is opened is less than k (k-1) individual symbolic number, part signal can occur at relaying
Aliasing, in order to avoid above-mentioned condition, using interference alignment techniques, when the antenna number of each node meetsm≥k-1,
During 2m > n, by all paired signal such as sijWith sjiSnap in the same dimension of relaying, now, the individual useful letter of k (k-1)
Number can be comprised in relayingIn dimension space, that is, need to meet equation:
Wherein, what the vector of the same dimension after channel was equivalent is denoted as ui,j,I=1,2 ..., k is user
uiTo relaying, it is relayed to user uiReal channel matrix;Now, aliasing will not occur at relaying between each signal;
At relaying, in order to ensure to expect that legal signal can not be ravesdropping, as known gcsi, design artificial noise signal
Pre-coding matrix tiSo that its satisfactionI.e.
Wherein,I=1,2 ..., k represent the real channel between eavesdropping end and user, between eavesdropping end and relaying respectively
Matrix, giIt is the equivalent vector of the same dimension after tapping channel;Then encoded man made noise's signal is expressed as
4. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method,
It is characterized in that, the concrete grammar of described step 3 is as follows:
All users by encode after signal xiBe sent to via node, then relay reception to signal be:
In formula:
nrLocal white Gaussian noise at relaying;
When all users are to relaying sending signal, the man made noise z for β p for the broadcasting power to user and eavesdrops end to relaying simultaneously,
Now, the signal that user received in this stage is
In formula:
Artifact power's partition coefficient at β relaying.
User ujIn the local white Gaussian noise in mac stage, noise variance is
5. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method,
It is characterized in that, the concrete grammar of described step 4 is as follows:
After relaying receives k (k-1) individual signal, it is amplified being transmitted to all users, forward signal is xr=α yr, wherein α
For the amplification coefficient at relaying, the Power Limitation sending useful signal isMeanwhile, again
Send and mac stage identical man made noise's signal, now, the receipt signal in this stage for each user is
In formula:
User ujIn the local white Gaussian noise in bc stage, noise variance is
6. according to claim 1 a kind of based on do solid work disturb alignment mimo y eavesdrop network in safe transmission method,
It is characterized in that, the concrete grammar of described step 5 is as follows:
The first step, the signal twice that legitimate receipt end is received with eavesdropping end is weighted merging, and the signal after being merged is:
Note:So, yjIn do not comprise man made noise z, validated user will not be subject to man made noise's interference signal
Impact;
After above-mentioned described interference alignment, by yjAgain it is expressed as the stacking pattern of two groups of pair signals:
In formula:
Interference alignment matrix;
Dimension relaying pair signals,
For user uj, signal that it receives is divided into two parts, required useful signalInterference signal with other users
Second step, designs the reception suppression matrix of each user;After carrying out spacing wave alignment, user ujNeed to use further
(k-1) × m dimension receives suppression matrix fi=[f1if2i... fi-1,ifi+1,i... fki]tTo yjCarry out disturbing ZF, just receive
To useful signal, that is, need to use fjPremultiplication is with yj,
In formula:
(k-1) × n dimension equivalent received suppression matrix;
Equivalent received suppresses matrix pjSelection principle be
Wherein, the kernel of null { a } representing matrix a;Upper two formulas represent pjIt is taken fromKernel, and pjDo not exist's
In kernel;
In order to choose the matrix p meeting mentioned above principlejIt is necessary first to clearly such matrix whether there is;Assume each legitimate node
Known csi, above formula is equivalent toIn order to meet this condition, the antenna number at relaying must is fulfilled forAnd this condition is already contained in the feasibility condition of interference alignment, that is,Cause
This, necessarily set up when meeting interference aligned condition;In order to ensure existing,Represent
?There is a n × n- (k-1) in matrix and tie up kernel, be designated as q;Assume that q is by a series of n × 1 rank null vector q institutes group
Become, that is,pjIt is written as the form of column vector, pj=[pj,1pj,2... pj,k-1];Now, and if only if has matrix
A is so as to meet a=[pj,1pj,2... pj,k-1qj], during rank (a)=k, this means that selected pjIt is independently of zero
Space, that is,In sum, the reception suppression matrix p at userjOr fjAlways exist;
So, under any circumstance, all choose qualified reception and suppress matrix, then eliminated by self-interference, user ujDemodulation
Go out the signal receiving, that is,
In formula:
User ujLegitimate receipt signal;
User ujLegal signal pre-coding matrix;
3rd step: using Maximum Likelihood Detection scheme detection signal;
In user ujPlace, estimated signal is denoted asWhen known receipt signalWhen, obtained using maximum likelihood detection method
Go out to estimate signal,
Wherein,
χ is sjThe set being taken, has (2qu+1)k-1Kind;
argmin||a||2The minima of two norms of matrix a.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602799.0A CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602799.0A CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106374980A true CN106374980A (en) | 2017-02-01 |
Family
ID=57879153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610602799.0A Pending CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106374980A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972912A (en) * | 2017-03-06 | 2017-07-21 | 东华大学 | Secret communication method based on feedback under a kind of MIMO tapping channels |
CN107994934A (en) * | 2017-11-14 | 2018-05-04 | 西北工业大学 | Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
CN109348503A (en) * | 2018-11-20 | 2019-02-15 | 广东工业大学 | A kind of monitor method of wireless communication link, device, equipment and system |
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
CN109526014A (en) * | 2017-09-19 | 2019-03-26 | 株式会社东芝 | Wireless communication device and wireless communications method |
CN110430566A (en) * | 2019-07-26 | 2019-11-08 | 西北工业大学 | A kind of more junction network safe transmission methods of double bounce based on collection of energy |
CN111669206A (en) * | 2020-05-21 | 2020-09-15 | 中国联合网络通信集团有限公司 | Signal detection method and device |
CN111817758A (en) * | 2020-07-21 | 2020-10-23 | 上海交通大学 | Discrete modulation signal MIMO transmission method |
CN111934863A (en) * | 2020-08-11 | 2020-11-13 | 南方电网科学研究院有限责任公司 | Secret key sharing method based on artificial noise and safety coding in edge calculation |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN113595675A (en) * | 2021-06-09 | 2021-11-02 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN114286336A (en) * | 2021-12-30 | 2022-04-05 | 重庆邮电大学 | Multi-cell network secure transmission method based on artificial noise |
CN114710231A (en) * | 2022-04-18 | 2022-07-05 | 电子科技大学 | Safety communication method based on artificial noise |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420679A (en) * | 2011-09-30 | 2012-04-18 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
-
2016
- 2016-07-27 CN CN201610602799.0A patent/CN106374980A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420679A (en) * | 2011-09-30 | 2012-04-18 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN102420679B (en) * | 2011-09-30 | 2014-11-19 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
Non-Patent Citations (2)
Title |
---|
YE FAN 等: "Physical Layer Security Based on Real Interference Alignment in K-User MIMO Y Wiretap Channels", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 * |
朱茂娟 等: "基于实干扰对齐技术的两用户中继辅助信道的安全自由度分析", 《重庆邮电大学学报(自然科学版)》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972912A (en) * | 2017-03-06 | 2017-07-21 | 东华大学 | Secret communication method based on feedback under a kind of MIMO tapping channels |
CN106972912B (en) * | 2017-03-06 | 2020-05-26 | 东华大学 | Secret communication method based on feedback under MIMO interception channel |
CN109526014A (en) * | 2017-09-19 | 2019-03-26 | 株式会社东芝 | Wireless communication device and wireless communications method |
CN107994934B (en) * | 2017-11-14 | 2020-10-27 | 西北工业大学 | Safe transmission method of untrusted relay network based on symbol separation and beam forming |
CN107994934A (en) * | 2017-11-14 | 2018-05-04 | 西北工业大学 | Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
CN109348503B (en) * | 2018-11-20 | 2021-11-26 | 广东工业大学 | Monitoring method, device, equipment and system for wireless communication link |
CN109348503A (en) * | 2018-11-20 | 2019-02-15 | 广东工业大学 | A kind of monitor method of wireless communication link, device, equipment and system |
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
CN109450507B (en) * | 2018-12-03 | 2021-05-11 | 华侨大学 | Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method |
CN110430566A (en) * | 2019-07-26 | 2019-11-08 | 西北工业大学 | A kind of more junction network safe transmission methods of double bounce based on collection of energy |
CN111669206A (en) * | 2020-05-21 | 2020-09-15 | 中国联合网络通信集团有限公司 | Signal detection method and device |
CN111817758A (en) * | 2020-07-21 | 2020-10-23 | 上海交通大学 | Discrete modulation signal MIMO transmission method |
CN111934863A (en) * | 2020-08-11 | 2020-11-13 | 南方电网科学研究院有限责任公司 | Secret key sharing method based on artificial noise and safety coding in edge calculation |
CN111934863B (en) * | 2020-08-11 | 2024-01-09 | 南方电网科学研究院有限责任公司 | Key sharing method based on artificial noise and security coding in edge calculation |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN113595675A (en) * | 2021-06-09 | 2021-11-02 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN113595675B (en) * | 2021-06-09 | 2024-01-23 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN114286336A (en) * | 2021-12-30 | 2022-04-05 | 重庆邮电大学 | Multi-cell network secure transmission method based on artificial noise |
CN114286336B (en) * | 2021-12-30 | 2023-10-13 | 重庆邮电大学 | Multi-cell network safe transmission method based on artificial noise |
CN114710231A (en) * | 2022-04-18 | 2022-07-05 | 电子科技大学 | Safety communication method based on artificial noise |
CN114710231B (en) * | 2022-04-18 | 2023-09-19 | 电子科技大学 | Safety communication method based on artificial noise |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106374980A (en) | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment | |
Ximenes et al. | Semi-blind receivers for non-regenerative cooperative MIMO communications based on nested PARAFAC modeling | |
CN104378757B (en) | A kind of method that safety of physical layer is ensured in the more interference eavesdropping networks of more relayings | |
CN104540124B (en) | A kind of more relaying safety of physical layer methods of known eavesdropping end channel information | |
Ding et al. | A general relaying transmission protocol for MIMO secrecy communications | |
CN104469755A (en) | Physical layer security transmission method for keeping relay and jamming node selection result secret | |
CN104320826A (en) | Chance relay-selection method for cooperative communication network under tapping environment | |
Mekkawy et al. | Secure relay selection for two way amplify-and-forward untrusted relaying networks | |
Xie et al. | Spatial modulation in two-way network coded channels: Performance and mapping optimization | |
CN102694628A (en) | Interference suppression method for multi-user MIMO collaborative relay system | |
Wyrembelski et al. | Physical layer integration of private, common, and confidential messages in bidirectional relay networks | |
CN102752080B (en) | A kind of anti-eavesdrop coded method based on physical layer | |
Hu et al. | Legitimate eavesdropping in two-way AF relay networks | |
Ouyang et al. | Destination assisted jamming and beamforming for improving the security of AF relay systems | |
CN104065462B (en) | There is the process of signal transmission method of diversity gain under relaying interference channel | |
CN105141559B (en) | A kind of safe transmission method of physical layer in OFDM amplification forwarding relay system | |
Wicaksana et al. | On the diversity-multiplexing tradeoff of amplify-and-forward half-duplex relaying | |
CN108631825A (en) | Enhance two-way AF relay cooperatives wireless communication system physical layer safe transmission method | |
Zhang et al. | Achievable rate analysis for multi-pair two-way massive MIMO full-duplex relay systems | |
CN111385004B (en) | Same-frequency simultaneous full-duplex communication system and method based on spatial modulation | |
Vaze et al. | Cascaded orthogonal space–time block codes for wireless multi-hop relay networks | |
CN103401657A (en) | Non-differential distributed space-time coding method for cooperative communication partially-coherent network | |
Yan et al. | Distributed precoding for OFDM in two-way relaying communications | |
Zhang et al. | Physical layer security in cognitive relay networks with multiple antennas | |
Salem et al. | Improving physical layer security of af relay networks via beam-forming and jamming |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170201 |
|
WD01 | Invention patent application deemed withdrawn after publication |