CN107994934B - Safe transmission method of untrusted relay network based on symbol separation and beam forming - Google Patents
Safe transmission method of untrusted relay network based on symbol separation and beam forming Download PDFInfo
- Publication number
- CN107994934B CN107994934B CN201711118285.9A CN201711118285A CN107994934B CN 107994934 B CN107994934 B CN 107994934B CN 201711118285 A CN201711118285 A CN 201711118285A CN 107994934 B CN107994934 B CN 107994934B
- Authority
- CN
- China
- Prior art keywords
- relay
- relays
- equal
- noise
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 47
- 238000000926 separation method Methods 0.000 title claims abstract description 27
- 238000000034 method Methods 0.000 title claims abstract description 20
- 239000011159 matrix material Substances 0.000 claims description 30
- 239000013598 vector Substances 0.000 claims description 29
- 239000000654 additive Substances 0.000 claims description 15
- 238000013461 design Methods 0.000 claims description 14
- 230000000996 additive effect Effects 0.000 claims description 12
- 230000003321 amplification Effects 0.000 claims description 11
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 11
- 238000000354 decomposition reaction Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 5
- 238000013507 mapping Methods 0.000 claims description 4
- 230000009365 direct transmission Effects 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 13
- 238000011160 research Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 3
- 102100026758 Serine/threonine-protein kinase 16 Human genes 0.000 description 2
- 101710184778 Serine/threonine-protein kinase 16 Proteins 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 101100391182 Dictyostelium discoideum forI gene Proteins 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/026—Co-operative diversity, e.g. using fixed or mobile stations as relays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/086—Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
The invention provides a safe transmission method of an untrusted relay network based on symbol separation and beam forming, which comprises the steps of selecting two relays with strongest channel gains to respectively send a real part and an imaginary part of useful symbol separation, then designing directional beam forming, and enabling the two selected relays to receive the real part and the imaginary part of a useful signal to the maximum extent so as to ensure that an untrusted relay node R cannot eavesdrop useful information, and simultaneously enabling a target node R to receive the real part and the imaginary part of the useful signalUseful information can be decoded, so that the safe transmission performance of the network is improved. The method improves the reliability of network transmission while minimizing the decoding capability of the untrusted relay, and has important significance for improving the safe transmission performance of the system.
Description
Technical Field
The invention relates to a safe transmission method of an untrusted relay network.
Background
In recent years, due to the openness of wireless communication, wireless signals are easily intercepted, tampered and interfered, so that a great threat is brought to the secure communication of users, and the security problem of wireless networks is receiving more and more attention. Unlike conventional encryption mechanisms, Physical-Layer Security (Physical-Layer Security) has the advantages of lower computational complexity and saving time and spectrum resources. As the security of wireless communication is more and more improved, physical layer security has gained wide attention in both theoretical research and practical applications.
With the shortage of communication resources and the development of relay selection technology, the introduction of relay selection technology into the physical layer security model has attracted more and more attention. In an actual application system, how to select an optimal relay from a plurality of potential relays, thereby effectively utilizing system resources, improving the Bit Error Rate (BER) performance of the system and optimizing the network performance becomes a problem of concern. If the relay node itself is not trusted, it becomes more complicated how to design an efficient secure transmission scheme. Therefore, for the application scenarios of multiple antennas and multiple untrusted relays, a safe transmission scheme design based on symbol separation and beam forming is developed, which has important significance for improving system safety and improving system error rate.
Document 1, "Spectral efficiency protocols for half-duplex decoding relays [ IEEE Journal on Selected Areas in Communications, vol.25, No.2, pp.379-389,2007 ]" aims at an authentic relay network to obtain a conclusion that cooperative relaying can improve the reachable rate of a system, and proposes a bidirectional relay transmission scheme, which can complete information exchange between two source nodes in two time slots, thereby effectively improving the spectrum efficiency.
Document 2 "On the roaming power allocation for secure amplification and forwarding of wireless communication in a two-hop wireless relay network with an eavesdropping node" discusses secure communication in the two-hop wireless relay network. In order to prevent an eavesdropper from intercepting useful information, the destination node sends interference noise, which is beneficial to protecting the source information from eavesdropping and simultaneously ensuring reliable decoding by the destination node.
Document 3 "Cooperation with an undirected relay: a secret permanent [ ieee transactions on Information Theory, vol.56, No.8, pp.3807-3827,2009 ]" for a single-antenna unidirectional untrusted relay network, it is demonstrated that using a target cooperative interference (DJ) scheme for using an untrusted relay node in communication results in a higher achievable safe rate than simply treating it as an eavesdropping node.
Document 4 "Secure beamforming for MIMO two-way communications with undirected Relay [ IEEE Transactions on Signal Processing, vol.62, No.9, pp.2185-2199,2014 ]" mainly studies the beam forming design in a multi-antenna, single Relay system, with the help of an untrusted Relay node, the source node and the destination node exchanging messages. The relay node is used as a signal repeater and a potential eavesdropper, and the safety rate of the system can be obviously improved by utilizing the beam forming technology.
Document 6, "Relay selection for secure communication networks with undirected nodes [ IEEE Transactions on Signal Processing, vol.11, No.11, pp.2466-2476,2016 ]" mainly studies that a target node sends a cooperative interference Signal, so as to avoid an untrusted Relay node from stealing useful information, thereby improving the security of a physical layer.
Currently, related to the research on the physical layer security technology is mainly to develop an optimization design for eavesdropping nodes, and a relay network itself is trusted (as in documents 1 and 2), while research on an untrusted relay system is very little. Next, the existing research is mainly directed to the case where the source and the sink are single antennas (see document 3). Furthermore, the existing research mainly aims at the beamforming technology of the single relay network (as in document 4). In addition, the existing documents mainly study the cooperative interference at the source node or the destination node to improve the physical layer safety (as documents 5 and 6), but part of the transmission power is wasted.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a safe transmission method of an untrusted relay network based on symbol separation and beam forming, which is optimally designed from the angles of a safe transmission scheme, relay selection, symbol separation, beam forming and the like, effectively reduces the capability of the untrusted relay for decoding useful information, improves the transmission reliability of the whole communication link, and realizes information safe transmission under the application scene of multiple antennas and multiple untrusted relays by utilizing the physical layer safety technology.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
step one, in a first time slot of an information transmission process, completing relay selection, precoding design, symbol separation and beam forming, specifically comprising the following contents:
(1) for a source nodeN untrusted relay nodesAnd a destination nodeFormed multi-antenna, multi-untrusted relay network, assumingIs provided with L antennas, and the L antennas are arranged,z antennas are arranged, all relays are single antennas, L is more than or equal to N and more than or equal to 2,andthere is no direct transmission link between them, allThe nodes all work in a half-duplex mode, and all the nodes receive noise with the mean value of 0 and the variance of N0Additive complex gaussian noise of (1); channel vector according to ith relayTwo relays with the strongest channel gain are selectedAndwherein i is more than or equal to 1, m, N is more than or equal to N, and m is not equal to N;
(2) definition except forToAnd fromToThe channel matrixes of all other relays are respectivelyAnd obtained by singular value decompositionWherein,is composed ofA diagonal matrix of all the singular values,andis a unitary matrix; decomposing matrix V to obtain V ═ V1V2]WhereinAnd V is2The column of (a) is a subspace of (b)A null space of (a); suppose thatRepresentation matrix V2J is more than or equal to 1 and less than or equal to L-N +1, and designing precoding vectors
In the same way, obtain andof the orthogonal basis matrix Representation matrix T2K is more than or equal to 1 and less than or equal to L-N +1, and designing precoding vectors
(3)Mapping a bit stream into one using M-ary modulation techniquesComplex signal of unit powerWhereinAndare respectively complex signalsReal and imaginary parts of, constructed using symbol separation techniques and beamforming techniquesIs sent outWherein,Psto representThe transmission power of (a); at the selection ofAndthe positions respectively receive the real part and the imaginary part of a useful signal and superpose additive complex Gaussian noise, other unselected relays can only receive the additive complex Gaussian noise, and the signals received by the relay nodes are expressed as
step two, in a second time slot of the information transmission process, completing relay amplification forwarding, source node cooperative interference and combined reception, wherein the specific contents are as follows:
(1) selected relayAndamplifying the forwarded signal toAndwherein, mumAnd mumTo representAndthe amplification factor of (a) is,and andis composed ofAndthe transmit power of (a);
Wherein,is thatTotal equivalent noise; by means of the method of regular inversion,to decode useful informationIs estimated value ofWherein,andrespectively representAndis determined by the estimated value of (c),is thatAndthe equivalent channel matrix in between is used,
the invention has the beneficial effects that: aiming at the problem of safe transmission of an untrusted multi-relay network, a safe transmission scheme based on symbol separation and beam forming is provided, the decoding capability of an untrusted relay is minimized, meanwhile, the reliability of network transmission is improved, and the method has important significance for improving the safe transmission performance of a system.
Drawings
FIG. 1 is a diagram of a multi-antenna, multi-untrusted relay network communication model;
fig. 2 is a comparison of error rate performance at the relay node and at the destination node for different schemes.
Detailed Description
The present invention will be further described with reference to the following drawings and examples, which include, but are not limited to, the following examples.
The invention provides a novel safe transmission scheme of an untrusted relay network based on symbol separation and beam forming, which comprises the steps of selecting two relays with strongest channel gains to respectively send a real part and an imaginary part of useful symbol separation, then designing directional beam forming, and enabling the two selected relays to receive the real part and the imaginary part of a useful signal to the maximum extent so as to ensure that an untrusted relay node R cannot eavesdrop useful information, and simultaneously enabling a target node R to receive the real part and the imaginary part of the useful signalUseful information can be decoded, so that the safe transmission performance of the network is improved.
In the invention, the relay network is not trusted and can eavesdrop useful information. In the invention, a single antenna is expanded to a multi-antenna research, multiple relays are selected, corresponding beam forming precoding is designed, a safety scheme design based on the combination of symbol separation and beam forming is developed from another angle aiming at the application scenes of multiple antennas and multiple untrusted relays, signals are divided into a real part and an imaginary part to be respectively transmitted, and useful signals are sent to the best relay to be amplified and forwarded by utilizing a beam forming technology, so that the error rate of a system is reduced while the safety is improved.
The channel model studied by the invention is a multi-antenna multi-untrusted relay network with three nodes, and the communication principle of the relay network is shown in fig. 1. The model consists of a source nodeN untrusted relay nodesAnd a destination nodeAnd (4) forming. Suppose thatIs provided with L antennas, and the L antennas are arranged,and all relays are single-antenna and L is more than or equal to N and more than or equal to 2. Due to the long-distance transmission or the shadow effect,andthere is no direct link between them, soAndcan only pass throughCommunication is performed. In the present invention, it is assumed that all nodes operate in half-duplex mode, and that all nodes receive noise with mean 0 and variance N0Additive complex gaussian noise.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
step one, in a first time slot of an information transmission process, respectively completing operations such as relay selection, precoding design, symbol separation, beam forming and the like:
(1) and (4) relay selection. According to channel vectorSelecting the channel with the strongest gain, i.e.(||·||22 norm representing vector) of the maximum two relaysAndwherein i is more than or equal to 1, m, N is more than or equal to N, and m is not equal to N,represents fromThe channel vector to the i-th relay,andrespectively representing the mth and nth relays.
(2) Precoding vectorsAndand (5) designing. Define fromToTo and fromToThe channel matrixes of all other relays are respectivelyAndcan be expressed as
Obtained by singular value decompositionWherein,is composed ofA diagonal matrix of all the singular values,andis a unitary matrix. Further decomposing the matrix V may result in V ═ V1V2]WhereinAnd V is2The column of (a) is a subspace of (b)Of zero space, i.e.Suppose thatRepresentation matrix V2Is 1 < j < L-N +1), the invention maximizesTo maximize reception and thereby design precoding vectorsNamely, it is
In the same way, can obtainOf the orthogonal basis matrix Representation matrix T2One column vector (1. ltoreq. k. ltoreq.L-N +1), the invention maximizesTo maximize reception and thereby design precoding vectorsNamely, it is
(3) Symbol separation and beamforming.Mapping the bit stream into a complex signal of unit power by using M-ary modulation technology (MPSK or QAM modulation)WhereinAndare respectively complex signalsReal and imaginary parts of (c). Then, constructed using symbol separation techniques and beamforming techniquesIs sent outWherein,(Psto representThe transmission power of),andis the precoding vector designed by the present invention.
In accordance with the above symbol separation, beamforming and precoding design, at the selectionAndthe positions respectively receive the real part and the imaginary part of the useful signal and superpose the additive complex Gaussian noise, other unselected relays can only receive the additive complex Gaussian noise, namely the signal received by the relay node can be expressed as
Wherein,is shown inThe received additive complex Gaussian noise has a mean value of 0 and a variance of N0,i=1,…,N。
And step two, in a second time slot of the information transmission process, respectively finishing the operations of relay amplification forwarding, source node cooperative interference and combined receiving.
(1) And (5) relay amplification forwarding. Selected relayAndamplifying the forwarded signal toAndwherein, mumAnd munTo representAndthe amplification factor of, the power constraint needs to be satisfiedAnd andis composed ofAndthe transmit power of. In fact, it is possible to use,andthe real and imaginary parts of the useful signal contaminated by the repeating noise are amplified separately. At this time, all other unselected relays can hear the signalAnd
(2) and source node cooperative interference. To prevent eavesdropping of useful signals by other unselected relays [5 ]]By the source nodeAnd sending the artificial noise to all the relay nodes.It should be noted that, due to long distance transmission or shadowing effects,andthere is no direct-transfer link between them,the artificial noise cannot be received, so the artificial noise does not interfereNormal reception.
Wherein,is thatThe total equivalent noise. By means of the method of regular inversion,to decode useful informationIs estimated value of(wherein,andrespectively representAndestimated value of) can be expressed as
the specific implementation mode of the invention comprises the following steps:
first time slot
In the first time slot of information transmission, operations such as relay selection, precoding design, symbol separation and beam forming, relay reception and the like are respectively completed, and the detailed process is described as follows:
(1) And (4) relay selection. According to channel vectorCalculating channel gain(||·||2Representing the 2 norm of the vector). Selecting the two relays with the strongest channel gains, i.e.Maximum two relaysAndwherein i is more than or equal to 1, m, N is more than or equal to N, and m is not equal to N.
(2) Precoding vectorsAndand (5) designing. For theIs designed to beIs sent toEnsuring that other relays do not receiveThereby ensuring thatSecurity of the transmission. In the same way, forIs designed to beIs sent toEnsuring that other relays do not receiveThereby ensuring thatSecurity of the transmission. Based on the fact that the precoding vector is constructed by using a null space methodAnd
For those in formula (1)Singular value decomposition is carried out to obtainWherein,is composed ofThe diagonal matrix of all singular values can be further divided intoAndis a unitary matrix. The decomposition matrix V may be given as V ═ V1V2]WhereinAnd V is2The column of (a) is a subspace of (b)Of zero space, i.e.In the same way, can obtainA set of orthogonal basis matrices corresponding to the null space ofSuppose thatRepresentation matrix V2A column vector (j is more than or equal to 1 and less than or equal to L-N +1),representation matrix T2One column vector (1. ltoreq. k. ltoreq.L-N +1), the invention maximizesAndto maximize reception and thereby design precoding vectorsAndis composed of
(3) Symbol separation and beamforming.Mapping useful information bit stream information into complex signal with unit power by using M-ary modulation technology (MPSK or QAM modulation)WhereinAndare respectively complex signalsReal and imaginary parts of (c). Then, constructed using symbol separation techniques and beamforming techniquesIs transmitted as a signal xsAnd will be useful signalsRespectively, the real and imaginary signals of the selected relayAndassuming that the real and imaginary parts are transmitted with equal power,is transmitted as a signal xsCan be expressed as
Wherein,is shown in the relayThe mean value of the additive complex Gaussian noise is 0 and the variance is N0,i=1,…,N。
The signals received at the N-th relay node are 1, … according to the previous symbol separation, beamforming and precoding designIs composed of
Due to precoding vectorsAndwhen i is not equal to m,when i ≠ n, the signal is,the signal received by the relay can be expressed as:
the real part and the imaginary part of the useful signal are directionally transmitted respectively by using the symbol separation and the beam forming technology. It can be seen from the simulated figure 2 that the relay is in the middle of the simulationIn the relay, the received signal lacks a real partLack of imaginary part in the received signal, in the case of communication systems using QPSK modulation, in the relayAnda relatively large error rate, approximately 0.25dB, is achieved. At other relays, the received signal is only additive white gaussian noise and does not contain any useful information.
Second time slot
In the second time slot of information transmission, the operations of relay amplification forwarding, source node cooperative interference and combined reception are respectively completed, and the detailed process is described as follows:
(1) and (5) relay amplification forwarding. Selected relayAndamplifying the forwarded signal toAndwherein, mumAnd munTo representAndthe amplification factor of, the power constraint needs to be satisfiedAnd andis composed ofAndthe transmit power of.
(2) And source node cooperative interference. In fact, it is possible to use,andthe real and imaginary parts of the useful signal contaminated by the repeating noise are amplified separately. At this time, all other unselected relays can hear the signalAndto prevent eavesdropping of useful signals by other unselected relays [5 ]]By the source nodeAnd sending the artificial noise to all the relay nodes. It should be noted that, due to long distance transmission or shadowing effects,andthere is no direct-transfer link between them,the artificial noise cannot be received, so the artificial noise does not interfereNormal reception.
(3) And combining and receiving. Suppose that the signal forwarded to the destination node by the ith relay isThen at the destination nodeTo the received signal forwarded by the ith relayIs composed of
Wherein,is thatAt the time of the reception of the additive complex gaussian noise,is the ith relay toThe channel vector of (2).
By means of the method of regular inversion,to decode useful informationIs estimated value of(wherein,andrespectively representAndestimated value of) can be expressed as
the invention simulates the error rate performance of the proposed relay selection scheme. In the scheme, QPSK modulation technology is adopted, and a source nodeAnd destination nodeThe number of antennas of (1) is L-8 and Z-2, respectively. Assuming a repeating network with 4 independent channels, the output power is set to(i ═ 1,2, 3, 4); all received noise powers are assumed to be N0By changing from 1 to 1Transmission power P ofsTo adjust the signal-to-noise ratio (SNR). All simulations were run 10000 times independently using a fading channel model. To show the performance advantages of the proposed symbol separation and beamforming with channel selection scheme of the present invention, we introduce two other commonly used security transmission schemes for comparison. The first is an artificial noise scheme (document [5 ]]Denoted as "AN scheme"), source nodeSending signal to relay node with strongest channel gain, carrying out equivalent power distribution in artificial noise and useful signal to obtain higher safety (when the proportion of power distribution is slightly changed, its safety is not affected), supposing that the signal is distributed to transmission signalHas a power of 0.55PsThe power allocated to the artificial noise is 0.45Ps. The second scheme is a destination node cooperative interference scheme (document [ 6]]Denoted as "DJ protocol"),the power of the transmitted interference signal is 0.5Ps. It should be noted that the above AN scheme, DJ scheme and the proposed scheme of the present invention, in the second time slot,a cooperative jamming signal must be transmitted to prevent the useful signal forwarded by the selected relay from being eavesdropped by other relays.
Figure 2 compares the BER performance at the relay and at the destination node for the proposed scheme of the present invention with the AN scheme, the DJ scheme. In the AN and DJ schemes, there is a high error rate at the untrusted relay, however, due to the waste of part of the transmission power in transmitting artificial noise or cooperative interference, the error rate performance at the destination node is poor, 0.125 and 0.07 respectively; the scheme provided by the invention has good safety, the error rate is larger at the selected relay, and due to the orthogonal transmission of the beam forming technology, the transmission power P is carried outsThe error rate performance at the destination node is obviously improved. Therefore, the scheme provided by the invention has obvious improvement on the safety of the untrusted relay and the reliability of the destination node.
And (4) conclusion: aiming at the application scenario of safe transmission of multiple antennas and multiple untrusted relays, the invention provides a new scheme combining symbol separation and beam forming technologies, and the safe transmission of information in an untrusted multiple relay network is ensured. Compared with the existing AN or DJ scheme, the scheme provided by the invention realizes higher BER performance of the relay node and lower BER performance of the destination node, and can obtain reliable system safe transmission.
Claims (1)
1. A safe transmission method of an untrusted relay network based on symbol separation and beam forming is characterized by comprising the following steps:
step one, in a first time slot of an information transmission process, completing relay selection, precoding design, symbol separation and beam forming, specifically comprising the following contents:
(1) for a source nodeN untrusted relay nodesAnd a destination nodeFormed multi-antenna, multi-untrusted relay network, assumingIs provided with L antennas, and the L antennas are arranged,z antennas are arranged, all relays are single antennas, L is more than or equal to N and more than or equal to 2,andthere is no direct transmission link between them, all nodes work in half-duplex mode, and all the nodes receive noise with mean value 0 and variance N0Additive complex gaussian noise of (1); channel vector according to ith relayTwo relays with the strongest channel gain are selectedAndwherein 1 is less than or equal to i, m and nN is less than or equal to N, and m is not equal to N;
(2) definition except forToAnd fromToThe channel matrixes of all other relays are respectivelyAndwherein the subscriptAndrespectively representing a set {1, 1., m-1, m +1, …, N } except m and N, and a set {1, 1., N +1, …, N } obtained by singular value decompositionWherein,is composed ofA diagonal matrix of all the singular values,andis a unitary matrix; decomposing matrix V to obtain V ═ V1V2]WhereinAnd V is2The column of (a) is a subspace of (b)A null space of (a); suppose thatRepresentation matrix V21 ≦ j ≦ L-N +1 by maximizingDesigning precoding vectors
In the same way, obtain andof the orthogonal basis matrix Representation matrix T2K is more than or equal to 1 and less than or equal to L-N +1, and designing precoding vectors
Suppose thatRepresentation matrix T21 ≦ k ≦ L-N +1 by maximizingDesigning precoding vectorsIs composed of
(3)Mapping a bit stream into a complex signal of one unit power by using M-ary modulation techniqueWhereinAndare respectively complex signalsReal and imaginary parts of, constructed using symbol separation techniques and beamforming techniquesIs sent outWherein,Psto representThe transmission power of (a); at the selection ofAndthe positions respectively receive the real part and the imaginary part of a useful signal and superpose additive complex Gaussian noise, other unselected relays can only receive the additive complex Gaussian noise, and the signals received by the relay nodes are expressed as
step two, in a second time slot of the information transmission process, completing relay amplification forwarding, source node cooperative interference and combined reception, wherein the specific contents are as follows:
(1) selected relayAndamplifying the forwarded signal toAndwherein, mumAnd munTo representAndthe amplification factor of (a) is,and andis composed ofAndthe transmit power of (a);
Wherein,representing a destination nodeReceive from m and n relay nodesAnd) The signal of (a) is received,anddenotes the m-th and n-th relay nodes (And) To the destination nodeOf the channel vector ndRepresenting a destination nodeThe received noise vector is then used to determine the noise vector,is thatTotal equivalent noise; by means of the method of regular inversion,to decode useful informationIs estimated value ofWherein,andrespectively representAndis determined by the estimated value of (c),is thatAndthe equivalent channel matrix in between is used,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711118285.9A CN107994934B (en) | 2017-11-14 | 2017-11-14 | Safe transmission method of untrusted relay network based on symbol separation and beam forming |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711118285.9A CN107994934B (en) | 2017-11-14 | 2017-11-14 | Safe transmission method of untrusted relay network based on symbol separation and beam forming |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107994934A CN107994934A (en) | 2018-05-04 |
CN107994934B true CN107994934B (en) | 2020-10-27 |
Family
ID=62030300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711118285.9A Active CN107994934B (en) | 2017-11-14 | 2017-11-14 | Safe transmission method of untrusted relay network based on symbol separation and beam forming |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107994934B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109586772B (en) * | 2019-01-08 | 2021-02-09 | 五邑大学 | Multi-antenna wireless relay MIMO system and transmission method thereof |
CN115102591B (en) * | 2022-08-25 | 2023-01-20 | 北京智芯微电子科技有限公司 | Beam forming method, device and equipment based on water back injection and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
CN105515717A (en) * | 2015-11-30 | 2016-04-20 | 华侨大学 | Cooperative relay security transmission method based on artificial noise interference |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106788643A (en) * | 2016-12-29 | 2017-05-31 | 中国人民解放军理工大学 | A kind of safe method for precoding of multi-user to end-to-end relay system |
EP3202052A1 (en) * | 2014-09-29 | 2017-08-09 | Telefonaktiebolaget LM Ericsson (publ) | Interference and/or power reduction for multiple relay nodes using cooperative beamforming |
-
2017
- 2017-11-14 CN CN201711118285.9A patent/CN107994934B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3202052A1 (en) * | 2014-09-29 | 2017-08-09 | Telefonaktiebolaget LM Ericsson (publ) | Interference and/or power reduction for multiple relay nodes using cooperative beamforming |
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
CN105515717A (en) * | 2015-11-30 | 2016-04-20 | 华侨大学 | Cooperative relay security transmission method based on artificial noise interference |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106788643A (en) * | 2016-12-29 | 2017-05-31 | 中国人民解放军理工大学 | A kind of safe method for precoding of multi-user to end-to-end relay system |
Non-Patent Citations (1)
Title |
---|
Lun Dong;Zhu Han;Athina P. Petropulu;H. Vincent Poor.Improving Wireless Physical Layer Security via Cooperating Relays.《IEEE Transactions on Signal Processing》.2009, * |
Also Published As
Publication number | Publication date |
---|---|
CN107994934A (en) | 2018-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109743729B (en) | Secret transmission method of wireless energy-carrying cooperative system | |
Ntranos et al. | Cellular interference alignment | |
Serafimovski et al. | Dual-hop spatial modulation (Dh-SM) | |
CN106059705B (en) | A kind of relaying safe transmission method of physical layer | |
CN107124245B (en) | Full duplex one-way junction self-interference suppressing method based on combined transceiving beam forming | |
Liu et al. | Artificial-noise-aided transmission in multi-antenna relay wiretap channels with spatially random eavesdroppers | |
US20040192395A1 (en) | Co-channel wireless communication methods and systems using nonsymmetrical alphabets | |
Gong et al. | Intelligent reflecting surface aided secure communications for NOMA networks | |
Rui et al. | On the performance of full-duplex relaying with relay selection | |
CN105636215B (en) | The interference neutralization method dynamically distributed based on power | |
Karavolos et al. | HST-NNC: A novel hybrid satellite-terrestrial communication with NOMA and network coding systems | |
Khan et al. | Modulation based non-orthogonal multiple access for 5G resilient networks | |
Wang et al. | Multicast secrecy rate maximization for reconfigurable intelligent surface backscatter communication | |
CN107994934B (en) | Safe transmission method of untrusted relay network based on symbol separation and beam forming | |
Nguyen et al. | Short packet communications for cooperative UAV-NOMA-based IoT systems with SIC imperfections | |
Afana et al. | Distributed beamforming for two-way DF relay cognitive networks under primary–secondary mutual interference | |
CN108631825B (en) | Physical layer safety transmission method for enhancing bidirectional AF relay cooperation wireless communication system | |
Wei et al. | Design of generalized analog network coding for a multiple-access relay channel | |
CN106230476A (en) | Information secure transmission method based on non-associating man made noise in insincere relay system | |
Maham et al. | Interference analysis and management for spatially reused cooperative multihop wireless networks | |
Ibrahim et al. | Multiway distributed wireless relay network with projected binary quantization | |
Tian et al. | Relay-aided interference alignment for the X channel with limited CSI | |
CN107425887B (en) | Beam forming method in multi-antenna untrusted relay network | |
Huang et al. | Joint decode-and-forward and cooperative jamming for secure wireless communications | |
Li et al. | Joint source-and-relay beamforming for multiple-input multiple-output systems with single-antenna distributed relays |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |