CN106656405A - Method for minimizing system confidentiality interruption probability using energy station - Google Patents

Method for minimizing system confidentiality interruption probability using energy station Download PDF

Info

Publication number
CN106656405A
CN106656405A CN201610908280.5A CN201610908280A CN106656405A CN 106656405 A CN106656405 A CN 106656405A CN 201610908280 A CN201610908280 A CN 201610908280A CN 106656405 A CN106656405 A CN 106656405A
Authority
CN
China
Prior art keywords
node
energy station
energy
theta
receiving node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610908280.5A
Other languages
Chinese (zh)
Other versions
CN106656405B (en
Inventor
钟财军
姜鑫
张朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN201610908280.5A priority Critical patent/CN106656405B/en
Publication of CN106656405A publication Critical patent/CN106656405A/en
Application granted granted Critical
Publication of CN106656405B publication Critical patent/CN106656405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming

Abstract

The invention relates to a method for minimizing system confidentiality interruption probability using energy station, comprising: 1) transmitting by an energy station wireless energy to a source node prior to a Theta T time wherein theta represents a time allocation factor ranging from zero (not included) and one (not included) and T represents a time slot; 2) estimating the channel state information of a communication system by the energy station through the listening of the pilot frequencies at the source node, a legal receiving node and an eavesdropping receiving node; through the utilization of the estimated and obtained channel state information, designing a corresponding best beam former w2 by the energy station; 4) in the coming (1-theta)T time, transmitting by the source node the wireless signals to the legal receiving node and eavesdropping by the eavesdropping receiving node the wireless signals; and using the beam former w2 by the energy station to transmit wireless interfering signals to the legal receiving node and the eavesdropping receiving node so as to minimize the system confidentiality interruption probability. According to the invention, an energy station is used to make the physical layers more secure, therefore, raising the confidentiality security performance of the entire communication system substantially.

Description

A kind of method that utilization energy station minimizes system secrecy outage probability
Technical field
The present invention relates to the communications field, and in particular to a kind of utilization energy station minimizes the side of system secrecy outage probability Method.
Background technology
With developing rapidly for wireless communication technology, various Wireless Telecom Equipments are sharply increased, thing followed channel radio Letter safety issue is also on the rise.Traditional secure wireless communication mechanism is mainly the associated encryption skill based on cryptography Art, but with the rapid lifting of Computing ability, the secrecy basis of this technology becomes no longer firm, safety of physical layer skill Art is arisen at the historic moment.
Radio communication safety of physical layer technology is from information-theoretical angle, the uniqueness and reciprocity using physical channel Property realizing that information is encrypted, identification validated user etc., it is intended to realize unconditional security.Chinese invention patent publication number (CN103986545A) a kind of safe transmission method of physical layer for SIMO wireless communication systems is disclosed, expects to receive first Fang Fanxiang launches random reference signal, and then launch party is entered after line shuffle to symbol to be transmitted using the reference signal for receiving and sent out Penetrate, finally expect that recipient is docked the collection of letters number and is demodulated to obtain the information of launch party's transmission using known reference signal.Value Obtain, it is noted that the patent of invention only discloses launch party and perfect can receive expects the reverse random reference signal of recipient Situation, does not account for the scene of limited channel status information feedback.
On the other hand, continuing to bring out with emerging wireless traffic, the cruising time of mobile communication equipment is increasingly becoming shadow Ring the key factor of Consumer's Experience.Under the constantly ripe background of wireless energy transmission technology, researcher is proposed in communication Fixed supply station is disposed in network, energy is provided for the mobile device in network using wireless energy transmission technology.Currently, to the greatest extent Pipe introduces the novel wireless communication network architecture of supply station and has caused international extensive concern, but correlative study work to be still in Starting stage, the application to supply station is limited only to provide energy for mobile device, not yet fully excavates the potential of supply station.
The content of the invention
Present invention aims to the deficiencies in the prior art, there is provided one kind is minimized in system secrecy using energy station The method of disconnected probability, using energy station safety of physical layer performance is lifted.
To solve above-mentioned technical problem, technical scheme provided by the present invention is:
A kind of method that utilization energy station minimizes system secrecy outage probability, described communication system include source node, Legitimate receipt node, eavesdropping receiving node and energy station;Described energy station is configured with NJRoot antenna, NJ≥1;Described source section Point is configured with NSRoot antenna, NS≥1;Described legitimate receipt node and eavesdropping receiving node configuration single antenna, specifically include as Lower step:
1) energy station in front θ T times to source node transmit wireless energy, 0<θ<1 represents time distribution factor, and T is represented One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and eavesdropping the pilot tone of receiving node In channel condition information;
3) channel condition information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
4) in rear (1- θ) T time, to legitimate receipt node-node transmission wireless signal, eavesdropping receiving node is to institute for source node The wireless signal stated is eavesdropped, while energy station adopts beamformer w2Pass to legitimate receipt node and eavesdropping receiving node Defeated wireless interference signal, to minimize the secrecy outage probability of system.
Described secrecy interruption is referred to:When the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
Described communication system carries out energy transmission respectively according to time distribution factor θ in a time slot T and information is passed It is defeated;In front θ T times, energy station to source node transmits wireless energy;In rear (1- θ) T time, source node is to legitimate receipt Node-node transmission wireless signal, eavesdropping receiving node is eavesdropped to described wireless signal, while energy station is to legitimate receipt section Point and eavesdropping receiving node transmitting wireless interference signal.
Described energy station and source node constitutes wireless energy transfer subsystem;Described source node, legitimate receipt node Transmission of wireless signals subsystem is constituted with eavesdropping receiving node;Described energy station, legitimate receipt node and eavesdropping receiving node Constitute wireless interference signal transmission subsystem.
Described step 2) in channel condition information include:Energy station and source node, source node and legitimate receipt node, source Node is believed with eavesdropping receiving node, energy station and legitimate receipt node and energy station with the channel status of eavesdropping receiving node Breath.
Described step 3) in optimum beam figuration device w2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The maximum transmission power of energy station and the noise power of legitimate receipt node are represented respectively;η is represented Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are represented respectively Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station With the channel condition information of eavesdropping receiving node;T and ' represent transposition and conjugate operation symbol respectively.
Described optimal launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding Conversion, utilizes Conjugate transposition oeprator is represented, while omitting the constraints that W orders are 1, following shape is converted into Formula:
S.t.tr (W)=1
Wherein, tr () is represented and is sought mark oeprator.
Using Charnes-Cooper Transformation Theorems, resulting optimum beam figuration device w2Established rules by solution following convex half Draw optimization problem to obtain with reference to the method for linear search;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Described convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, it is optimum Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2Obtained by carrying out singular value decomposition to Z Arrive.
Compared with the existing technology, beneficial effects of the present invention are embodied in:
(1) present invention provides a kind of method that utilization energy station minimizes system secrecy outage probability, is carried using energy station Safety of physical layer performance is risen, wireless energy transmission technology is introduced in original tapping channel classical model, by energy station Energy is provided to the device end in system, a kind of wider, the more practical model of range of application is established, it is to avoid traditional mould Type is merely able to be applied to the constraint of low power consumption wireless device terminal, effectively improves the endurance of device end.
(2) in the present invention energy station while energy is provided for terminal, it is also possible to launch as interference source and disturb Signal.The channel condition information obtained using estimation, energy station adjusts and obtains corresponding optimum beam figuration device w2So that Interference signal is producing less impact to eavesdropping while receiving node produces larger interference on legal receiving node, so as to significantly Lift the secret and safe performance of whole communication system.
Description of the drawings
Fig. 1 is the schematic diagram of the communication system in embodiment;
Fig. 2 is to minimize the method flow diagram of system secrecy outage probability using energy station in embodiment;
Fig. 3 is the relation curve that the secrecy Outage probability of distributed antenna after optimizing in embodiment changes with main channel average signal-to-noise ratio Figure.
Specific embodiment
The present invention is further described with reference to embodiment and Figure of description.
Embodiment
As shown in figure 1, communication system include source node, a legitimate receipt node, an eavesdropping receiving node and One energy station that can launch interference;The energy utilization efficiency of source node is 80%, and time distribution factor is 0.5, energy station Multiple antennas number is 4, and the multiple antennas number of source node is 2.Legitimate receipt node and eavesdropping receiving node configuration single antenna.Its In, energy station and source node constitute wireless energy transfer subsystem;Source node, legitimate receipt node and eavesdropping receiving node are constituted Transmission of wireless signals subsystem;Energy station, legitimate receipt node and eavesdropping receiving node constitute wireless interference signal transmission subsystem System.
As shown in Fig. 2 the method for minimizing system secrecy outage probability using energy station, specifically includes following steps:
1) energy station in front θ T times to source node transmit wireless energy, 0<θ<1 represents time distribution factor, and T is represented One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and eavesdropping the pilot tone of receiving node In channel condition information;
3) channel condition information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
4) in rear (1- θ) T time, to legitimate receipt node-node transmission wireless signal, eavesdropping receiving node is to institute for source node The wireless signal stated is eavesdropped, while energy station adopts beamformer w2Pass to legitimate receipt node and eavesdropping receiving node Defeated wireless interference signal, to minimize the secrecy outage probability of system.
Communication system carries out respectively energy transmission and information transfer in a time slot T according to time distribution factor θ;Front In θ T times, energy station to source node transmits wireless energy;In rear (1- θ) T time, source node is to legitimate receipt node-node transmission Wireless signal, eavesdropping receiving node is eavesdropped to described wireless signal, while energy station is to legitimate receipt node and eavesdropping Receiving node launches wireless interference signal, and when the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
Described step 2) in channel condition information include:Energy station and source node, source node and legitimate receipt node, source Node is believed with eavesdropping receiving node, energy station and legitimate receipt node and energy station with the channel status of eavesdropping receiving node Breath.
Described step 3) in optimum beam figuration device w2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The maximum transmission power of energy station and the noise power of legitimate receipt node are represented respectively;η is represented Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are represented respectively Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station With the channel condition information of eavesdropping receiving node;T and ' represent transposition and conjugate operation symbol respectively.
Described optimal launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding Conversion, utilizes Conjugate transposition oeprator is represented, while omitting the constraints that W orders are 1, is converted into as follows Form:
S.t.tr (W)=1
Wherein, tr () is represented and is sought mark oeprator.
Using Charnes-Cooper Transformation Theorems, resulting optimum beam figuration device w2Established rules by solution following convex half Draw optimization problem to obtain with reference to the method for linear search;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Described convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, it is optimum Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2Obtained by carrying out singular value decomposition to Z Arrive.
Performance evaluation
The performance change of system in prove embodiment, the present embodiment is carried out point using secrecy Outage probability of distributed antenna parameter Analysis.Fig. 3 is the graph of relation that the secrecy Outage probability of distributed antenna after optimizing in the present embodiment changes with main channel average signal-to-noise ratio.
Here, we adopt other two kinds of basic schemes as reference:With reference to one i.e. transmission antenna selection strategy, using institute The channel condition information of acquisition, selects one to disturb legal receiving node minimum antenna transmission wireless interference signal;Reference Two i.e. high specific sending strategy, utilizes obtained channel condition information, and antenna alignment eavesdropping receiving node transmitting is wireless dry Signal is disturbed, to cause larger interference to it.
By contrast it is found that the best performance under optimum beam figuration device strategy, has thus confirmed the method for designing Validity.Simultaneously from figure 3, it can be seen that with the increase of main channel average signal-to-noise ratio, the secrecy outage probability of system is not Disconnected to reduce, i.e. the performance of system is constantly lifted.
The preferred embodiment of the present invention is the foregoing is only, not to limit the present invention, all spirit in the present invention Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (6)

1. a kind of method that utilization energy station minimizes system secrecy outage probability, described communication system includes source node, closes Method receiving node, eavesdropping receiving node and energy station;Described energy station is configured with NJRoot antenna, NJ≥1;Described source node It is configured with NSRoot antenna, NS≥1;Described legitimate receipt node and eavesdropping receiving node configures single antenna, it is characterised in that Specifically include following steps:
1) energy station in front θ T times to source node transmit wireless energy, 0<θ<1 represents time distribution factor, and T represents one Time slot;
2) energy station by intercept source node, legitimate receipt node and eavesdropping receiving node pilot tone, estimate communication system in Channel condition information;
3) channel condition information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
4) in rear (1- θ) T time, to legitimate receipt node-node transmission wireless signal, eavesdropping receiving node is to described for source node Wireless signal is eavesdropped, while energy station adopts beamformer w2To legitimate receipt node and eavesdropping receiving node transmission nothing Line interference signal, to minimize the secrecy outage probability of system.
2. the method that utilization energy station according to claim 1 minimizes system secrecy outage probability, it is characterised in that institute The energy station stated and source node constitute wireless energy transfer subsystem;Described source node, legitimate receipt node and eavesdropping are received Node constitutes transmission of wireless signals subsystem;Described energy station, legitimate receipt node and eavesdropping receiving node constitute wireless dry Disturb signal transmission subsystem.
3. the method that utilization energy station according to claim 1 minimizes system secrecy outage probability, it is characterised in that institute The step of stating 2) in channel condition information include:Energy station and source node, source node and legitimate receipt node, source node and eavesdropping Receiving node, energy station and legitimate receipt node and energy station and the channel condition information for eavesdropping receiving node.
4. the method that utilization energy station according to claim 1 minimizes system secrecy outage probability, it is characterised in that institute The step of stating 3) in optimum beam figuration device w2Its object function is expressed as with constraints:
m a x w 2 1 + &eta; N J &theta; 1 - &theta; | | h S D | | 2 | | H J S | | 2 | h J D T w 2 | 2 + N 0 P S 1 + &eta; N J &theta; 1 - &theta; | h S E T h S D &prime; | 2 | | h S D | | 2 | | H J S | | 2 | h J E T w 2 | 2
s.t.||w2| |=1
Wherein, PSAnd N0The maximum transmission power of energy station and the noise power of legitimate receipt node are represented respectively;η represents wireless Radio frequency energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source node are represented respectively, Source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station with steal Listen the channel condition information of receiving node;T and respectively expression transposition and conjugate operation symbol.
5. the method that utilization energy station according to claim 4 minimizes system secrecy outage probability, it is characterised in that institute The optimal launching beam figuration device w for stating2Its object function is converted with constraints by the method for semidefinite decoding, is utilized Conjugate transposition oeprator is represented, while omitting the constraints that W orders are 1, following form is converted into:
m a x W 1 + &eta; N J &theta; 1 - &theta; | | h S D | | 2 | | H J S | | 2 t r ( Wh J D &prime; h J D T ) + N 0 P S 1 + &eta; N J &theta; 1 - &theta; | h S E T h S D &prime; | 2 | | h S D | | 2 | | H J S | | 2 t r ( Wh J E &prime; h J E T )
S.t.tr (W)=1
Wherein, tr () is represented and is sought mark oeprator.
6. the method that utilization energy station according to claim 5 minimizes system secrecy outage probability, it is characterised in that profit Use Charnes-Cooper Transformation Theorems, resulting optimum beam figuration device w2By the following convex Semidefinite Programming optimization problem of solution Obtain with reference to the method for linear search;
Wherein, linear search is following problem:
m i n y 1 + F ( y ) 1 + &eta; N J &theta; 1 - &theta; | | h S D | | 2 | | H J S | | 2 y
s . t . y &Element; &lsqb; N 0 P S , N 0 P S + | | h J D | | 2 &rsqb; ,
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
m i n Z , s &eta; N J &theta; 1 - &theta; | h S E T h S D &prime; | 2 | | h S D | | 2 | | H J S | | 2 s
S.t.s > 0
Tr (Z)=s
t r ( Zh J E &prime; h J E T ) = 1
t r ( Zh J D &prime; h J D T ) = s * ( y - N 0 P S )
Described convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal solution Z It is matrix that order is 1, and meetsThat is optimum beam figuration device w2Obtained by carrying out singular value decomposition to Z.
CN201610908280.5A 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station Active CN106656405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Publications (2)

Publication Number Publication Date
CN106656405A true CN106656405A (en) 2017-05-10
CN106656405B CN106656405B (en) 2018-11-06

Family

ID=58856803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908280.5A Active CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Country Status (1)

Country Link
CN (1) CN106656405B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108966222A (en) * 2018-04-28 2018-12-07 深圳大学 Physical layer authentication method and system based on adaptive concealment agreement
CN108966223A (en) * 2018-04-28 2018-12-07 深圳大学 Physical layer authentication method and system based on single-bit concealment agreement
CN109039412A (en) * 2018-07-23 2018-12-18 西安交通大学 A kind of safe transmission method of physical layer based on random wave bundle figuration
CN109361486A (en) * 2018-09-26 2019-02-19 南京邮电大学 A kind of wireless frequency spectrum shared system safety of physical layer method for optimizing based on energy acquisition power supply
CN112153674A (en) * 2020-08-17 2020-12-29 西安交通大学 Communication system power distribution method, device, terminal and readable storage medium
CN113055063A (en) * 2021-03-10 2021-06-29 浙江大学 Low interception relay communication system based on spatial field digital modulation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd Method and device for analyzing ieee1394 bus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd Method and device for analyzing ieee1394 bus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CAIJUN ZHONG等: "secrecy performance of wirelessly powered wiretap channels", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 *
XIN JIANG等: "power beacon assisted wiretap channels with jamming", 《IEEE TRANSACTIONS ON WIRELESS COMMUNICATION》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108966222A (en) * 2018-04-28 2018-12-07 深圳大学 Physical layer authentication method and system based on adaptive concealment agreement
CN108966223A (en) * 2018-04-28 2018-12-07 深圳大学 Physical layer authentication method and system based on single-bit concealment agreement
CN108966222B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on self-adaptive covert protocol
CN108966223B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on single-bit covert protocol
CN109039412A (en) * 2018-07-23 2018-12-18 西安交通大学 A kind of safe transmission method of physical layer based on random wave bundle figuration
CN109039412B (en) * 2018-07-23 2020-07-28 西安交通大学 Physical layer safe transmission method based on random beam forming
CN109361486A (en) * 2018-09-26 2019-02-19 南京邮电大学 A kind of wireless frequency spectrum shared system safety of physical layer method for optimizing based on energy acquisition power supply
CN112153674A (en) * 2020-08-17 2020-12-29 西安交通大学 Communication system power distribution method, device, terminal and readable storage medium
CN112153674B (en) * 2020-08-17 2022-02-11 西安交通大学 Communication system power distribution method, device, terminal and readable storage medium
CN113055063A (en) * 2021-03-10 2021-06-29 浙江大学 Low interception relay communication system based on spatial field digital modulation

Also Published As

Publication number Publication date
CN106656405B (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN106656405A (en) Method for minimizing system confidentiality interruption probability using energy station
Zhou et al. Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint
CN105744516B (en) A kind of communication system and method promoting safety of physical layer performance using energy station
CN104320826A (en) Chance relay-selection method for cooperative communication network under tapping environment
CN105491563B (en) Method and system for improving security rate of MISO security communication system by utilizing artificial noise
CN105119645A (en) Receiving antenna space hopping secret communication method in MIMO system
CN110113752B (en) Millimeter wave safety communication method based on channel sparsity measurement
CN104270227B (en) Based on the empty safe transmission method of physical layer for moving keying in MISO system
CN106992803A (en) A kind of man made noise precoding safe transmission method of full duplex relaying system
CN112311520A (en) Method for constructing full-duplex direction modulation wireless network
Gao et al. Joint antenna selection and power allocation for secure co-time co-frequency full-duplex massive MIMO systems
CN112688725B (en) MIMO physical layer safe transmission method based on constellation diagram
CN106411911A (en) Method for maximizing monitoring non-interruption probability of system based on active monitoring
CN106302545A (en) A kind of method maximizing system monitoring non-interrupted probability
CN105813081A (en) Method for selecting relay nodes capable of enhancing security performance of cognitive relay network
CN102752080A (en) Anti-eavesdrop coding method based on physical layer
Guo et al. On the mutual information and constellation design criterion of spatial modulation MIMO systems
CN109889337A (en) A kind of joint intertexture encryption method based on physical layer key
CN106507345A (en) A kind of wireless relay communication method based on game theoretic safety of physical layer
CN105099640A (en) Joint time-frequency duplex shared channel characteristic obtaining method
CN114024591B (en) Relay cooperation non-orthogonal multiple access system and information transmission method
CN105656530A (en) Method and system for improving security rate of MIMO security communication system
CN103002440B (en) Wireless communication security transmission method utilizing random combination rotation of transmitting antenna array
CN115484604A (en) Cooperative active attack performance evaluation method based on RIS
CN114501580A (en) Cooperative rate segmentation network security transmission method with untrusted relay threat

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant