CN106656405B - A method of minimizing system secrecy outage probability using energy station - Google Patents

A method of minimizing system secrecy outage probability using energy station Download PDF

Info

Publication number
CN106656405B
CN106656405B CN201610908280.5A CN201610908280A CN106656405B CN 106656405 B CN106656405 B CN 106656405B CN 201610908280 A CN201610908280 A CN 201610908280A CN 106656405 B CN106656405 B CN 106656405B
Authority
CN
China
Prior art keywords
receiving node
energy
energy station
node
eavesdropping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610908280.5A
Other languages
Chinese (zh)
Other versions
CN106656405A (en
Inventor
钟财军
姜鑫
张朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN201610908280.5A priority Critical patent/CN106656405B/en
Publication of CN106656405A publication Critical patent/CN106656405A/en
Application granted granted Critical
Publication of CN106656405B publication Critical patent/CN106656405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及一种利用能量站最小化系统保密中断概率的方法,包括:1)能量站在前θT时间内向源节点传输无线能量,0<θ<1表示时间分配因子,T表示一个时隙;2)能量站通过侦听源节点、合法接收节点和窃听接收节点的导频,估计通信系统中的信道状态信息;3)能量站利用估计得到的信道状态信息,设计相应的最佳波束赋形器w2;4)在后(1‑θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站采用波束赋形器w2向合法接收节点和窃听接收节点传输无线干扰信号,以最小化系统的保密中断概率。该方法利用能量站提升物理层安全性能,从而大幅提升整个通信系统的保密安全性能。

The present invention relates to a method for minimizing system security interruption probability by utilizing an energy station, comprising: 1) the energy station transmits wireless energy to a source node within the previous θT time, 0<θ<1 represents a time allocation factor, and T represents a time slot; 2) The energy station estimates the channel state information in the communication system by listening to the pilots of the source node, the legitimate receiving node, and the eavesdropping receiving node; 3) The energy station uses the estimated channel state information to design the corresponding optimal beamforming device w 2 ; 4) within the following (1‑θ)T time, the source node transmits a wireless signal to the legal receiving node, and the eavesdropping receiving node eavesdrops on the wireless signal, and the energy station uses the beamformer w 2 to The legitimate receiving node and the eavesdropping receiving node transmit wireless interference signals to minimize the system's confidentiality interruption probability. In this method, the energy station is used to improve the security performance of the physical layer, thereby greatly improving the confidentiality and security performance of the entire communication system.

Description

一种利用能量站最小化系统保密中断概率的方法A Method of Minimizing the System Confidentiality Outage Probability Using Energy Station

技术领域technical field

本发明涉及通信领域,具体涉及一种利用能量站最小化系统保密中断概率的方法。The invention relates to the field of communications, in particular to a method for minimizing the system security interruption probability by using an energy station.

背景技术Background technique

随着无线通信技术的飞速发展,各种无线通信设备急剧增加,随之而来的无线通信安全性问题也日趋严重。传统的无线通信安全机制主要是以密码学为基础的相关加密技术,但随着计算机运算能力的迅速提升,这项技术的保密基础变得不再牢靠,物理层安全技术应运而生。With the rapid development of wireless communication technology, various wireless communication devices have increased dramatically, and the security problems of wireless communication have become increasingly serious. The traditional wireless communication security mechanism is mainly related to encryption technology based on cryptography, but with the rapid improvement of computer computing power, the confidentiality foundation of this technology has become unreliable, and physical layer security technology has emerged as the times require.

无线通信物理层安全技术从信息论的角度出发,利用物理信道的唯一性和互易性,来实现信息加密,辨识合法用户等,旨在实现无条件安全。中国发明专利公开号(CN103986545A)公开了一种用于SIMO无线通信系统的物理层安全传输方法,首先期望接收方反向发射随机参考信号,然后发射方使用接收到的参考信号对待传输符号进行置乱后发射,最后期望接收方利用已知参考信号对接收信号进行解调以获得发射方传输的信息。值得指出的是,该发明专利仅公开了发射方能够完美接收到期望接收方反向随机参考信号的情况,没有考虑有限信道状态信息反馈的场景。From the perspective of information theory, the physical layer security technology of wireless communication uses the uniqueness and reciprocity of physical channels to realize information encryption and identify legitimate users, aiming to achieve unconditional security. Chinese Invention Patent Publication No. (CN103986545A) discloses a physical layer secure transmission method for a SIMO wireless communication system. First, the receiver is expected to transmit a random reference signal in reverse, and then the transmitter uses the received reference signal to set the symbols to be transmitted. After random transmission, the receiver is expected to demodulate the received signal with known reference signals to obtain the information transmitted by the transmitter. It is worth pointing out that this invention patent only discloses the situation that the transmitter can perfectly receive the reverse random reference signal of the desired receiver, and does not consider the scenario of limited channel state information feedback.

另一方面,随着新兴无线业务的不断涌现,移动通信设备的续航时间逐渐成为影响用户体验的关键因素。在无线能量传输技术不断成熟的背景下,研究人员提出了在通信网络中安置固定的供电站,利用无线能量传输技术为网络中的移动设备提供能量。当前,尽管引入供电站的新型无线通信网络架构已引起国际上的广泛关注,但相关研究工作尚处在起步阶段,对供电站的应用仅仅局限于为移动设备提供能量,尚未充分发掘供电站的潜能。On the other hand, with the continuous emergence of emerging wireless services, the battery life of mobile communication devices has gradually become a key factor affecting user experience. In the context of the continuous maturity of wireless energy transmission technology, researchers have proposed to install fixed power stations in the communication network, and use wireless energy transmission technology to provide energy for mobile devices in the network. At present, although the new wireless communication network architecture introduced into the power station has attracted widespread international attention, the relevant research work is still in its infancy. The application of the power station is only limited to providing energy for mobile devices, and the potential of the power station has not been fully explored. potential.

发明内容Contents of the invention

本发明的目的在于针对现有技术的不足,提供一种利用能量站最小化系统保密中断概率的方法,利用能量站提升物理层安全性能。The purpose of the present invention is to address the deficiencies of the prior art, to provide a method for minimizing the system security interruption probability by using the energy station, and to improve the security performance of the physical layer by using the energy station.

为解决上述技术问题,本发明所提供的技术方案为:In order to solve the problems of the technologies described above, the technical solution provided by the present invention is:

一种利用能量站最小化系统保密中断概率的方法,所述的通信系统包括源节点、合法接收节点、窃听接收节点和能量站;所述的能量站配置有NJ根天线,NJ≥1;所述的源节点配置有NS根天线,NS≥1;所述的合法接收节点和窃听接收节点配置单根天线,具体包括如下步骤:A method for minimizing the probability of interruption of system security by utilizing an energy station, wherein the communication system includes a source node, a legitimate receiving node, an eavesdropping receiving node, and an energy station; the energy station is configured with N J antennas, N J ≥ 1 ; The source node is configured with N S root antennas, N S ≥ 1; the legal receiving node and the eavesdropping receiving node are configured with a single antenna, which specifically includes the following steps:

1)能量站在前θT时间内向源节点传输无线能量,0<θ<1表示时间分配因子,T表示一个时隙;1) The energy station transmits wireless energy to the source node within the previous θT time, 0<θ<1 represents the time allocation factor, and T represents a time slot;

2)能量站通过侦听源节点、合法接收节点和窃听接收节点的导频,估计通信系统中的信道状态信息;2) The energy station estimates the channel state information in the communication system by listening to the pilot frequency of the source node, the legal receiving node and the eavesdropping receiving node;

3)能量站利用估计得到的信道状态信息,设计相应的最佳波束赋形器w23) The energy station uses the estimated channel state information to design the corresponding optimal beamformer w 2 ;

4)在后(1-θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站采用波束赋形器w2向合法接收节点和窃听接收节点传输无线干扰信号,以最小化系统的保密中断概率。4) In the later (1-θ)T time, the source node transmits the wireless signal to the legal receiving node, and the eavesdropping receiving node eavesdrops on the wireless signal, and at the same time, the energy station uses the beamformer w 2 to transmit the wireless signal to the legal receiving node and Eavesdropping on the wireless interference signal transmitted by the receiving node to minimize the system's confidentiality interruption probability.

所述的保密中断是指:当系统的保密容量小于给定的信息传输速率时,保密中断。The secrecy interruption refers to: when the secrecy capacity of the system is less than a given information transmission rate, the secrecy is interrupted.

所述的通信系统在一个时隙T中按照时间分配因子θ分别进行能量传输和信息传输;在前θT时间内,能量站向源节点传输无线能量;在后(1-θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站向合法接收节点和窃听接收节点发射无线干扰信号。The communication system performs energy transmission and information transmission respectively according to the time allocation factor θ in a time slot T; in the first θT time, the energy station transmits wireless energy to the source node; in the latter (1-θ)T time, The source node transmits wireless signals to the legal receiving node, and the eavesdropping receiving node eavesdrops on the wireless signal, and at the same time, the energy station transmits wireless interference signals to the legal receiving node and the eavesdropping receiving node.

所述的能量站和源节点构成无线能量传输子系统;所述的源节点、合法接收节点和窃听接收节点构成无线信号传输子系统;所述的能量站、合法接收节点和窃听接收节点构成无线干扰信号传输子系统。The energy station and the source node constitute a wireless energy transmission subsystem; the source node, the legal receiving node and the wiretapping receiving node constitute a wireless signal transmission subsystem; the energy station, the legal receiving node and the wiretapping receiving node constitute a wireless energy transmission subsystem; Interfering with the signal transmission subsystem.

所述的步骤2)中信道状态信息包括:能量站与源节点、源节点与合法接收节点、源节点与窃听接收节点、能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息。The channel state information in step 2) includes: energy station and source node, source node and legitimate receiving node, source node and eavesdropping receiving node, energy station and legal receiving node, and channel state information of energy station and eavesdropping receiving node.

所述的步骤3)中最佳波束赋形器w2其目标函数与约束条件分别表示为:The objective function and constraints of the optimal beamformer w2 in the step 3 ) are respectively expressed as:

s.t.||w2||=1st||w 2 ||=1

其中,PS和N0分别表示能量站的最大发射功率和合法接收节点的噪声功率;η表示无线射频信号能量转化为电能的能量转换效率;HJS,hSD,hSE,hJD和hJE分别表示能量站与源节点,源节点与合法接收节点,源节点与窃听接收节点,能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息;T 和′分别表示转置和共轭运算符号。Among them, P S and N 0 respectively represent the maximum transmission power of the energy station and the noise power of the legal receiving node; η represents the energy conversion efficiency of radio frequency signal energy into electric energy; H JS , h SD , h SE , h JD and h JE represents the channel state information of the energy station and the source node, the source node and the legal receiving node, the source node and the eavesdropping receiving node, the energy station and the legal receiving node, and the energy station and the eavesdropping receiving node; Yoke operation symbol.

所述的最佳发射波束赋形器w2其目标函数与约束条件通过半定松弛的方法进行转化,利用 表示共轭转置运算符号,同时省略W秩为1的约束条件,转化为如下形式:The objective function and constraints of the optimal transmit beamformer w 2 are converted by semidefinite relaxation method, using Represents the symbol of the conjugate transpose operation, while omitting the constraint condition that the rank of W is 1, it is transformed into the following form:

s.t.tr(W)=1s.t.tr(W)=1

W≥0 W≥0

其中,tr()代表求迹运算符号。Among them, tr() represents the trace operation symbol.

利用Charnes-Cooper转化定理,所得到的最佳波束赋形器w2通过解如下凸半定规划优化问题结合一维搜索的方法得到;Using the Charnes-Cooper transformation theorem, the optimal beamformer w 2 is obtained by solving the following convex semidefinite programming optimization problem combined with a one-dimensional search method;

其中,一维搜索为如下问题:Among them, one-dimensional search is the following problem:

其中,F(y)为如下凸半定规划优化问题的解:Among them, F(y) is the solution of the following convex semidefinite programming optimization problem:

s.t.s>0s.t.s > 0

tr(Z)=str(Z)=s

Z≥0, Z≥0,

所述的凸半定规划优化问题通过MATLAB软件中的CVX工具包进行求解;其中,最优解Z是秩为1的矩阵,且满足即最佳波束赋形器w2通过对Z进行奇异值分解得到。The convex semidefinite programming optimization problem is solved by the CVX toolkit in the MATLAB software; wherein, the optimal solution Z is a matrix with a rank of 1, and satisfies That is, the optimal beamformer w 2 is obtained by performing singular value decomposition on Z.

同现有技术相比,本发明的有益效果体现在:Compared with the prior art, the beneficial effects of the present invention are reflected in:

(1)本发明提供一种利用能量站最小化系统保密中断概率的方法,利用能量站提升物理层安全性能,在原有的窃听信道经典模型中引入了无线能量传输技术,通过能量站向系统中的设备终端提供能量,建立了一种应用范围更广、更为实际的模型,避免了传统模型只能够适用于小功耗无线设备终端的约束,有效提升了设备终端的续航能力。(1) The present invention provides a method for using energy stations to minimize the probability of system confidentiality interruption, using energy stations to improve the security performance of the physical layer, introducing wireless energy transmission technology into the original classic model of eavesdropping channels, and sending energy to the system through energy stations The equipment terminal provides energy, and a model with a wider application range and more practical is established, which avoids the constraint that the traditional model can only be applied to low-power wireless equipment terminals, and effectively improves the battery life of the equipment terminal.

(2)本发明中能量站在为终端提供能量的同时,也可以作为一个干扰源发射干扰信号。利用估计得到的信道状态信息,能量站调整并得到所对应的最佳波束赋形器w2,使得干扰信号在对窃听接收节点产生较大干扰的同时对合法接收节点产生较小影响,从而大幅提升整个通信系统的保密安全性能。(2) In the present invention, the energy station can also transmit interference signals as an interference source while providing energy for the terminal. Using the estimated channel state information, the energy station adjusts and obtains the corresponding optimal beamformer w 2 , so that the interference signal has a large interference on the eavesdropping receiving node and has a small impact on the legitimate receiving node, thereby greatly Improve the confidentiality and security performance of the entire communication system.

附图说明Description of drawings

图1为实施例中的通信系统的示意图;Fig. 1 is the schematic diagram of the communication system in the embodiment;

图2为实施例中利用能量站最小化系统保密中断概率的方法流程图;Fig. 2 is a flow chart of a method for minimizing system security interruption probability by utilizing an energy station in an embodiment;

图3为实施例中优化后的保密中断概率性能随主信道平均信噪比变化的关系曲线图。Fig. 3 is a graph showing the relationship between the optimized secrecy outage probability performance and the change of the average signal-to-noise ratio of the main channel in the embodiment.

具体实施方式Detailed ways

下面结合实施例和说明书附图对本发明作更进一步的说明。Below in conjunction with embodiment and accompanying drawing, the present invention will be further described.

实施例Example

如图1所示,通信系统包括一个源节点、一个合法接收节点、一个窃听接收节点和一个可发射干扰的能量站;源节点的能量利用效率为80%,时间分配因子为0.5,能量站的多天线数目为4,源节点的多天线数目为2。合法接收节点和窃听接收节点配置单根天线。其中,能量站和源节点构成无线能量传输子系统;源节点、合法接收节点和窃听接收节点构成无线信号传输子系统;能量站、合法接收节点和窃听接收节点构成无线干扰信号传输子系统。As shown in Figure 1, the communication system includes a source node, a legitimate receiving node, an eavesdropping receiving node, and an energy station that can transmit interference; the energy utilization efficiency of the source node is 80%, the time allocation factor is 0.5, and the energy station’s The number of multi-antennas is 4, and the number of multi-antennas of the source node is 2. The legitimate receiving node and the eavesdropping receiving node are configured with a single antenna. Among them, the energy station and the source node constitute the wireless energy transmission subsystem; the source node, the legal receiving node and the eavesdropping receiving node constitute the wireless signal transmission subsystem; the energy station, the legal receiving node and the eavesdropping receiving node constitute the wireless interference signal transmission subsystem.

如图2所示,利用能量站最小化系统保密中断概率的方法,具体包括如下步骤:As shown in Figure 2, the method of using the energy station to minimize the probability of system confidentiality interruption includes the following steps:

1)能量站在前θT时间内向源节点传输无线能量,0<θ<1表示时间分配因子,T表示一个时隙;1) The energy station transmits wireless energy to the source node within the previous θT time, 0<θ<1 represents the time allocation factor, and T represents a time slot;

2)能量站通过侦听源节点、合法接收节点和窃听接收节点的导频,估计通信系统中的信道状态信息;2) The energy station estimates the channel state information in the communication system by listening to the pilot frequency of the source node, the legal receiving node and the eavesdropping receiving node;

3)能量站利用估计得到的信道状态信息,设计相应的最佳波束赋形器w23) The energy station uses the estimated channel state information to design the corresponding optimal beamformer w 2 ;

4)在后(1-θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站采用波束赋形器w2 向合法接收节点和窃听接收节点传输无线干扰信号,以最小化系统的保密中断概率。4) In the later (1-θ)T time, the source node transmits the wireless signal to the legal receiving node, and the eavesdropping receiving node eavesdrops on the wireless signal, and at the same time, the energy station uses the beamformer w 2 to transmit the wireless signal to the legal receiving node and Eavesdropping on the wireless interference signal transmitted by the receiving node to minimize the system's confidentiality interruption probability.

通信系统在一个时隙T中按照时间分配因子θ分别进行能量传输和信息传输;在前θT时间内,能量站向源节点传输无线能量;在后(1-θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站向合法接收节点和窃听接收节点发射无线干扰信号,当系统的保密容量小于给定的信息传输速率时,保密中断。The communication system performs energy transmission and information transmission respectively according to the time allocation factor θ in a time slot T; in the first θT time, the energy station transmits wireless energy to the source node; in the later (1-θ)T time, the source node transmits wireless energy to The legal receiving node transmits the wireless signal, and the eavesdropping receiving node eavesdrops on the wireless signal. At the same time, the energy station transmits the wireless interference signal to the legal receiving node and the eavesdropping receiving node. When the confidentiality capacity of the system is less than the given information transmission rate, the confidentiality interruption.

所述的步骤2)中信道状态信息包括:能量站与源节点、源节点与合法接收节点、源节点与窃听接收节点、能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息。The channel state information in step 2) includes: energy station and source node, source node and legitimate receiving node, source node and eavesdropping receiving node, energy station and legal receiving node, and channel state information of energy station and eavesdropping receiving node.

所述的步骤3)中最佳波束赋形器w2其目标函数与约束条件分别表示为:The objective function and constraints of the optimal beamformer w2 in the step 3 ) are respectively expressed as:

s.t.||w2||=1st||w 2 ||=1

其中,PS和N0分别表示能量站的最大发射功率和合法接收节点的噪声功率;η表示无线射频信号能量转化为电能的能量转换效率;HJS,hSD,hSE,hJD和hJE分别表示能量站与源节点,源节点与合法接收节点,源节点与窃听接收节点,能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息;T 和′分别表示转置和共轭运算符号。Among them, P S and N 0 respectively represent the maximum transmission power of the energy station and the noise power of the legal receiving node; η represents the energy conversion efficiency of radio frequency signal energy into electric energy; H JS , h SD , h SE , h JD and h JE represents the channel state information of the energy station and the source node, the source node and the legal receiving node, the source node and the eavesdropping receiving node, the energy station and the legal receiving node, and the energy station and the eavesdropping receiving node; Yoke operation symbol.

所述的最佳发射波束赋形器w2其目标函数与约束条件通过半定松弛的方法进行转化,利用 表示共轭转置运算符号,同时省略W秩为1的约束条件,转化为如下形式:The objective function and constraints of the optimal transmit beamformer w 2 are converted by semidefinite relaxation method, using Represents the symbol of the conjugate transpose operation, while omitting the constraint condition that the rank of W is 1, it is transformed into the following form:

s.t.tr(W)=1s.t.tr(W)=1

W≥0 W≥0

其中,tr()代表求迹运算符号。Among them, tr() represents the trace operation symbol.

利用Charnes-Cooper转化定理,所得到的最佳波束赋形器w2通过解如下凸半定规划优化问题结合一维搜索的方法得到;Using the Charnes-Cooper transformation theorem, the optimal beamformer w 2 is obtained by solving the following convex semidefinite programming optimization problem combined with a one-dimensional search method;

其中,一维搜索为如下问题:Among them, one-dimensional search is the following problem:

其中,F(y)为如下凸半定规划优化问题的解:Among them, F(y) is the solution of the following convex semidefinite programming optimization problem:

s.t.s>0s.t.s > 0

tr(Z)=str(Z)=s

Z≥0, Z≥0,

所述的凸半定规划优化问题通过MATLAB软件中的CVX工具包进行求解;其中,最优解Z是秩为1的矩阵,且满足即最佳波束赋形器w2通过对Z进行奇异值分解得到。The convex semidefinite programming optimization problem is solved by the CVX toolkit in the MATLAB software; wherein, the optimal solution Z is a matrix with a rank of 1, and satisfies That is, the optimal beamformer w 2 is obtained by performing singular value decomposition on Z.

性能分析performance analysis

为证明实施例中系统的性能变化,本实施例采用保密中断概率性能参数进行分析。图3为本实施例中优化后的保密中断概率性能随主信道平均信噪比变化的关系曲线图。In order to prove the performance change of the system in the embodiment, this embodiment adopts the confidential outage probability performance parameter for analysis. FIG. 3 is a graph showing the relationship between the optimized confidentiality outage probability performance and the change of the average signal-to-noise ratio of the main channel in this embodiment.

在此,我们采用其他两种基础策略作为参照:参照一即发送天线选择策略,利用所获得的信道状态信息,选择一根对合法接收节点干扰最小的天线传输无线干扰信号;参照二即最大比发送策略,利用所获得的信道状态信息,将天线对准窃听接收节点发射无线干扰信号,以对其造成较大的干扰。Here, we use two other basic strategies as references: reference one is the transmitting antenna selection strategy, using the obtained channel state information to select an antenna with the least interference to the legitimate receiving node to transmit wireless interference signals; reference two is the maximum ratio The sending strategy uses the obtained channel state information to point the antenna at the eavesdropping receiving node to transmit wireless interference signals, so as to cause greater interference to it.

通过对比可以发现,最佳波束赋形器策略下的性能最优,由此印证了该设计方法的有效性。同时从图3中可以看出,随着主信道平均信噪比的增加,系统的保密中断概率不断减小,即系统的性能不断提升。Through comparison, it can be found that the performance under the optimal beamformer strategy is the best, thus confirming the effectiveness of the design method. At the same time, it can be seen from Figure 3 that with the increase of the average signal-to-noise ratio of the main channel, the system's confidentiality outage probability is continuously reduced, that is, the system performance is continuously improved.

以上所述仅为本发明的优选实施方式,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention should be included in the protection scope of the present invention within.

Claims (5)

1.一种利用能量站最小化系统保密中断概率的方法,其通信系统包括源节点、合法接收节点、窃听接收节点和能量站;所述的能量站配置有NJ根天线,NJ≥1;所述的源节点配置有NS根天线,NS≥1;所述的合法接收节点和窃听接收节点配置单根天线,其特征在于,具体包括如下步骤:1. A method for utilizing an energy station to minimize system security interruption probability, its communication system includes a source node, a legal receiving node, an eavesdropping receiving node and an energy station; the energy station is configured with N J root antennas, N J ≥ 1 ; The source node is configured with N S root antennas, N S ≥ 1; the legal receiving node and the eavesdropping receiving node are configured with a single antenna, which is characterized in that it specifically includes the following steps: 1)能量站在前θT时间内向源节点传输无线能量,0<θ<1表示时间分配因子,T表示一个时隙;1) The energy station transmits wireless energy to the source node within the previous θT time, 0<θ<1 represents the time allocation factor, and T represents a time slot; 2)能量站通过侦听源节点、合法接收节点和窃听接收节点的导频,估计通信系统中的信道状态信息;2) The energy station estimates the channel state information in the communication system by listening to the pilot frequency of the source node, the legal receiving node and the eavesdropping receiving node; 3)能量站利用估计得到的信道状态信息,设计相应的最佳波束赋形器w23) The energy station uses the estimated channel state information to design the corresponding optimal beamformer w 2 ; 所述最佳波束赋形器w2其目标函数与约束条件分别表示为: The objective function and constraints of the optimal beamformer w2 are expressed as: s.t.||w2||=1st||w 2 ||=1 其中,PS和N0分别表示能量站的最大发射功率和合法接收节点的噪声功率;η表示无线射频信号能量转化为电能的能量转换效率;HJS,hSD,hSE,hJD和hJE分别表示能量站与源节点,源节点与合法接收节点,源节点与窃听接收节点,能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息;T和′分别表示转置和共轭运算符号;Among them, P S and N 0 respectively represent the maximum transmission power of the energy station and the noise power of the legal receiving node; η represents the energy conversion efficiency of radio frequency signal energy into electric energy; H JS , h SD , h SE , h JD and h JE represents the channel state information of the energy station and the source node, the source node and the legal receiving node, the source node and the eavesdropping receiving node, the energy station and the legal receiving node, and the energy station and the eavesdropping receiving node; yoke symbol; 4)在后(1-θ)T时间内,源节点向合法接收节点传输无线信号,窃听接收节点对所述的无线信号进行窃听,同时能量站采用波束赋形器w2向合法接收节点和窃听接收节点传输无线干扰信号,以最小化系统的保密中断概率。4) In the later (1-θ)T time, the source node transmits the wireless signal to the legal receiving node, and the eavesdropping receiving node eavesdrops on the wireless signal, and at the same time, the energy station uses the beamformer w 2 to transmit the wireless signal to the legal receiving node and Eavesdropping on the wireless interference signal transmitted by the receiving node to minimize the system's confidentiality interruption probability. 2.根据权利要求1所述的利用能量站最小化系统保密中断概率的方法,其特征在于,所述的能量站和源节点构成无线能量传输子系统;所述的源节点、合法接收节点和窃听接收节点构成无线信号传输子系统;所述的能量站、合法接收节点和窃听接收节点构成无线干扰信号传输子系统。2. The method for utilizing energy stations to minimize system security interruption probability according to claim 1, wherein said energy stations and source nodes constitute a wireless energy transmission subsystem; said source nodes, legal receiving nodes and The eavesdropping receiving node constitutes a wireless signal transmission subsystem; the energy station, the legal receiving node and the eavesdropping receiving node constitute a wireless interference signal transmission subsystem. 3.根据权利要求1所述的利用能量站最小化系统保密中断概率的方法,其特征在于,所述的步骤2)中信道状态信息包括:能量站与源节点、源节点与合法接收节点、源节点与窃听接收节点、能量站与合法接收节点以及能量站与窃听接收节点的信道状态信息。3. The method for minimizing system security interruption probability using energy stations according to claim 1, wherein the channel state information in said step 2) includes: energy stations and source nodes, source nodes and legitimate receiving nodes, The channel state information of the source node and the eavesdropping receiving node, the energy station and the legitimate receiving node, and the energy station and the eavesdropping receiving node. 4.根据权利要求1所述的利用能量站最小化系统保密中断概率的方法,其特征在于,所述的最佳发射波束赋形器w2其目标函数与约束条件通过半定松弛的方法进行转化,利用 表示共轭转置运算符号,同时省略W秩为1的约束条件,转化为如下形式:4. The method for utilizing energy stations to minimize system secrecy outage probability according to claim 1, characterized in that, the objective function and constraint conditions of the optimal transmit beamformer w 2 are performed by a semidefinite relaxation method convert, utilize Represents the symbol of the conjugate transpose operation, while omitting the constraint condition that the rank of W is 1, it is transformed into the following form: s.t.tr(W)=1s.t.tr(W)=1 W≥0W≥0 其中,tr()代表求迹运算符号。Among them, tr() represents the trace operation symbol. 5.根据权利要求4所述的利用能量站最小化系统保密中断概率的方法,其特征在于,利用Charnes-Cooper转化定理,所得到的最佳波束赋形器w2通过解如下凸半定规划优化问题结合一维搜索的方法得到;5. The method for utilizing energy stations to minimize the system's confidentiality outage probability according to claim 4, characterized in that, using the Charnes-Cooper transformation theorem, the obtained optimal beamformer w 2 is solved by the following convex semidefinite programming The optimization problem is obtained by combining the method of one-dimensional search; 其中,一维搜索为如下问题:Among them, one-dimensional search is the following problem: 其中,F(y)为如下凸半定规划优化问题的解:Among them, F(y) is the solution of the following convex semidefinite programming optimization problem: s.t.s>0s.t.s > 0 tr(Z)=str(Z)=s Z≥0,Z≥0, 所述的凸半定规划优化问题通过MATLAB软件中的CVX工具包进行求解;其中,最优解Z是秩为1的矩阵,且满足即最佳波束赋形器w2通过对Z进行奇异值分解得到。The convex semidefinite programming optimization problem is solved by the CVX toolkit in the MATLAB software; wherein, the optimal solution Z is a matrix with a rank of 1, and satisfies That is, the optimal beamformer w 2 is obtained by performing singular value decomposition on Z.
CN201610908280.5A 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station Active CN106656405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Publications (2)

Publication Number Publication Date
CN106656405A CN106656405A (en) 2017-05-10
CN106656405B true CN106656405B (en) 2018-11-06

Family

ID=58856803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908280.5A Active CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Country Status (1)

Country Link
CN (1) CN106656405B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108966222B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on self-adaptive covert protocol
CN108966223B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on single-bit covert protocol
CN109039412B (en) * 2018-07-23 2020-07-28 西安交通大学 A Physical Layer Security Transmission Method Based on Random Beamforming
CN109361486B (en) * 2018-09-26 2019-08-16 南京邮电大学 A kind of wireless frequency spectrum shared system safety of physical layer method for optimizing based on energy acquisition power supply
CN112153674B (en) * 2020-08-17 2022-02-11 西安交通大学 Communication system power distribution method, device, terminal and readable storage medium
CN113055063A (en) * 2021-03-10 2021-06-29 浙江大学 Low interception relay communication system based on spatial field digital modulation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd IEEE 1394 bus analysis method and apparatus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd IEEE 1394 bus analysis method and apparatus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
power beacon assisted wiretap channels with jamming;xin jiang等;《IEEE transactions on wireless communication》;20160227;第15卷(第12期);全文 *
secrecy performance of wirelessly powered wiretap channels;Caijun zhong等;《IEEE transactions on communications》;20160718;第64卷(第9期);全文 *

Also Published As

Publication number Publication date
CN106656405A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106656405B (en) A method of minimizing system secrecy outage probability using energy station
CN105744516B (en) A kind of communication system and method promoting safety of physical layer performance using energy station
CN110113752B (en) Millimeter-wave secure communication method based on channel sparsity measurement
CN104581960B (en) A kind of multi-user Cooperation jamming power distribution method under secrecy outage probability constraint
CN106656287A (en) Two robust beam forming methods for MISO wiretap channel based on interruption probability constraints
CN104883741B (en) A kind of resource allocation algorithm of cognitive radio networks
CN103780356B (en) A kind of method for designing of the two-stage precoding of cognitive MIMO communication system
CN105491563B (en) Method and system for improving security rate of MISO security communication system by utilizing artificial noise
CN105007578A (en) Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system
CN110149127B (en) NOMA technology-based precoding vector optimization method for D2D communication system
CN107172705A (en) The wireless beam optimization method and system for taking energy heterogeneous network
CN107171764A (en) A kind of wireless safe transmission method and system for taking energy heterogeneous network
CN103546210B (en) Based on the method for precoding that safe rate is optimized in multi-base station cooperative scene
CN110062377A (en) Power splitting factor and beam forming combined optimization method in capable of communicating are taken safely
CN114222289A (en) An intelligent reflective surface-assisted full-duplex wireless energy-carrying network secure communication method
CN113473388B (en) A NOMA full-duplex user cooperative secure transmission method based on artificial noise
CN109660553A (en) Downlink safe transmission strategy based on time reversal technology
CN107070520B (en) D2D communication interference alignment method based on cascade precoding and ESINR (orthogonal inverse Fourier transform) criterion
Mukhlif et al. Energy harvesting for efficient 5g networks
CN106357315B (en) An energy-efficient resource allocation method for large multi-antenna networks with incomplete CSI
Nguyen et al. Performance on cognitive broadcasting networks employing Fountain codes and maximal ratio transmission
CN106911376A (en) A kind of wireless energy drives transmission method and device
CN108900449A (en) The interference alignment schemes of multiple cell MIMO-IMAC
CN110198182B (en) A wireless energy carrying system and maximum safe rate calculation method
CN110034808B (en) An enhanced spatial modulation transmission method for railway communication antenna grouping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant