CN108684037B - OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion - Google Patents

OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion Download PDF

Info

Publication number
CN108684037B
CN108684037B CN201810308296.1A CN201810308296A CN108684037B CN 108684037 B CN108684037 B CN 108684037B CN 201810308296 A CN201810308296 A CN 201810308296A CN 108684037 B CN108684037 B CN 108684037B
Authority
CN
China
Prior art keywords
subcarrier
signal
channel
pairing
ofdm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810308296.1A
Other languages
Chinese (zh)
Other versions
CN108684037A (en
Inventor
李国兵
董秋里
吕刚明
张国梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201810308296.1A priority Critical patent/CN108684037B/en
Publication of CN108684037A publication Critical patent/CN108684037A/en
Application granted granted Critical
Publication of CN108684037B publication Critical patent/CN108684037B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2626Arrangements specific to the transmitter only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2697Multicarrier modulation systems in combination with other modulation techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Radio Transmission System (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an OFDM safe transmission method combining subcarrier pairing and signal inversion, which utilizes known channel state information to rearrange the serial numbers of each subcarrier, divides the subcarrier into two parts by taking a middle point as a boundary, and sets the first half part as a poor carrier and the second half part as a good carrier. And defining a pairing mapping relation between the poor channel and the good channel, respectively sending an inversion signal and a useful signal, and carrying out joint receiving by a receiving end. The average bit error rate of the system and a lower bound of the secrecy capacity of the system are deduced by using the theorem theory of order statistics, simulation verification is carried out, and a simulation result shows that the scheme realizes a good anti-eavesdropping effect, meets good safety transmission requirements, and has certain stability and practicability.

Description

OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion
Technical Field
The invention belongs to the technical field of wireless communication physical layer security, and particularly relates to an OFDM (orthogonal frequency division multiplexing) security transmission strategy combining subcarrier pairing and signal inversion, which is suitable for various communication networks.
Background
The natural openness and broadcastability of wireless communication systems presents a significant challenge to the security of transmissions. In order to ensure the communication security, the traditional method is to use the security mechanism of a wired network for reference and realize security protection at the high level of a protocol, and the method assumes that an eavesdropper has limited computing capacity and cannot crack in a short time. However, with the development of high-speed computers, the traditional encryption mode is threatened. The Physical Layer Security (PLS) technology is produced as a security method for assisting an upper layer in the field of secure communication, and the method directly prevents an eavesdropper from intercepting useful information by using the physical layer attribute, namely the uniqueness of a wireless channel, as a guide of information theory security. Compared with the traditional upper layer security scheme, the physical layer security has the advantages of low system overhead, simple protocol stack and low complexity, and is therefore widely concerned.
Orthogonal Frequency Division Multiplexing (OFDM), as a suitable solution standard for many major wireless and wireline communication physical layers, is widely adopted by LTE and Wi-Fi systems today, as it can be extended to large bandwidth applications, and has high spectral efficiency and low data complexity, well meeting the 5G requirements. Therefore, it is a necessary trend that research on OFDM technology puts more and higher innovative requirements. The OFDM system has uniqueness, each carrier can be subjected to different fading, so that each carrier has different transmission capacity, based on the uniqueness, the throughput of the system can be improved through reasonable resource (carrier and power) distribution, the power consumption can be reduced, the resource utilization rate can be improved, channel characteristics of two communication parties can be influenced while the resources are distributed, and the essence that the physical layer safety can be implemented is the difference of the wireless communication channel characteristics, so that different resource distribution shows channel differences of different degrees to influence the safety of the system. However, the traditional resource allocation usually considers how to increase the capacity and reduce the bit error rate spread, and does not consider the secrecy capacity of the system too much. Therefore, it is necessary to consider a physical layer security technique under the OFDM system.
Different from the previous scheme, the research for improving the system performance through subcarrier selection and pairing is also multiple, and because of differences among subcarrier channels, each time a channel is realized, a channel with a poor transmission environment and a channel with a good transmission environment are presented, so that the subcarrier selection and pairing have certain research value. However, it can be seen that most subcarrier matching schemes are applied in a relay or multi-relay scenario, and carriers of two time slots are paired and combined, which is very similar to the multi-antenna selection. In simple single-hop transmission systems, similar schemes are rare. In fact, due to different carrier transmission environments, the better channel and the poorer channel can be jointly operated, and the safety performance of the system can be further improved under the condition of reducing the complexity of the system. In addition, in actual transmission, due to imperfect reciprocity of channels, certain reciprocity errors are necessarily brought, and most schemes do not consider the influence brought by the reciprocity errors.
Disclosure of Invention
The invention aims to provide an OFDM (orthogonal frequency division multiplexing) secure transmission strategy for combining subcarrier pairing and signal inversion, which is suitable for various transmission networks, in a simple classical eavesdropping single-antenna model. The method fully utilizes the uniqueness of the subcarrier, greatly increases the bit error rate of an eavesdropper, obtains better safety performance, and can still keep better system performance under the condition of existence of reciprocity errors.
In order to achieve the purpose, the invention adopts the following technical scheme to realize the purpose:
an OFDM safety transmission strategy combining subcarrier pairing and signal inversion comprises the following steps:
(1) the sending end rearranges the serial numbers of all sub-carriers according to the known channel state information and the sequence from small to large of the square of the channel coefficient modulus value to obtain a new channel coefficient sequence of the sub-carriers, divides the new channel coefficient sequence into two parts by taking a middle point as a boundary, sets the first half part as a poor carrier and the second half part as a good carrier;
(2) copying a useful signal containing N/2 bits to be transmitted and carrying out inversion operation, sequentially placing the useful signal to be transmitted in a carrier wave with good back half part according to a reverse order mode for transmission, sequentially placing the inverted signal in a carrier wave with poor front half part for transmission, and jointly forming an original OFDM symbol with N bits;
(3) according to a certain pairing mapping relation, pairing and combining a good subcarrier and a poor subcarrier in a one-to-one correspondence manner;
(4) the receiving end carries out equalization processing on the received original OFDM symbol information, then the information in the two matched subcarriers is jointly received in sequence by adopting a maximum ratio combining mode to obtain the Kth subcarrier output signal-to-noise ratio gammasymbol_KWherein K ═ 1, 2.., N/2;
(5) in the case of power equalization, the average bit error rate p of the scheme under a classical interception model and a lower bound C of the system secret capacity are obtained by using the theorem of order statistics.
Further, in the step (1), the subcarrier sequence numbers (1, 2., N) are rearranged to obtain a new group of channel sequence numbers, where N is the number of subcarriers, and is implemented by the following steps:
1a) obtaining the channel state information of each transmission by using a channel state information feedback system;
1b) extracting channel coefficient [ h ] of each carrier wave1,h2,...,hN]Calculating the square | h of each sub-carrier coefficient modulus valuei|2Wherein i is 1, 2.. times.n; according to | hi|2Rearranging the sequence numbers of the subcarriers according to the sequence from small to large to obtain a group of channel coefficient sequences of new subcarriers with channel states from bad to good: [ h ] of(1),h(2),...,h(N)];
1c) The channel coefficient sequence of the new subcarrier is simply divided into two parts, and the second half part is a good carrier [ h(N),h(N-1),...,h(N/2)]The first half being the differential carrier [ h ](1),h(2),...,h(N/2)]。
Further, in step (2), the original OFDM symbol is generated by:
2a) BPSK modulating useful signal to obtain modulated useful signal [ x1,x2,...,xN/2];
2b) The modulated useful signals are copied and rotated by 180 ℃ respectively, and the signals after rotation are defined as inversion signals [ x'1,x′2,...,x′N/2];
2c) The modulated useful signal and the inverted signal are combined to form an OFDM symbol to be transmitted.
Further, in step 2c), the modulated useful signal and the inverted signal are combined by the following method:
according to the pairing method in the step (3), the signal is subjected to channel coefficient sequence [ h ] of a new subcarrier(1),h(2),...,h(N/2)]Are combined to obtain N bits [ x'1,x′2,...,x′N/2,xN/2,...,x2,x1]And arranging each bit according to the actual carrier position corresponding to the new subcarrier channel coefficient sequence in sequence to obtain the required transmission OFDM symbol.
Further, in the step (3), the defined mapping relationship specifically includes the following processes:
according to the mapping relation:
g=N-k+1
pairing the kth subcarrier with the corresponding g subcarrier, where k is 1, 2.
Further, in the step (4), the output signal-to-noise ratio gamma of the Kth sub-carrier is obtainedsymbol_KThe specific method comprises the following steps:
4a) the equalization processing method is that the received signal y in each carrier channel is processediMultiplying the conjugate of the channel coefficient at the receiving end
Figure BDA0001621645750000032
4b) Adopting a maximum ratio combination mode to carry out combined receiving to obtain the output signal-to-noise ratio gamma of each pair of subcarrierssymbol_K
Figure BDA0001621645750000031
Wherein | h(k)|2And | h(g)|2The squares of the channel coefficient modulus values of the kth subcarrier and the g subcarrier, respectively, k being 1, 2., N/2, g being N/2, N/2+ 1., N; n is a radical of0Noise for each branchAcoustic power spectral density, P0Is the average power of each subcarrier, gamma0Is the signal to noise ratio.
Further, in the step (5), the specific method for obtaining the system average bit error rate p is as follows:
substituting x for | h(k)|2Y instead of | h(g)|2Then a received symbol x for each pair of subcarriers can be obtainedkError rate pKComprises the following steps:
Figure BDA0001621645750000041
wherein f isXY(x, y) is | h(k)|2,|h(g)|2The joint probability density function of (1), E]Meaning that the averaging function is taken, the Q function satisfies the following definition,
Figure BDA0001621645750000042
according to the theorem of order statistics, the method comprises the following steps:
Figure BDA0001621645750000043
the average bit error rate of the system is:
Figure BDA0001621645750000044
further, in the step (5), a specific method for obtaining a lower bound C of the system secret capacity is as follows:
defining an eavesdropping rate C of an eavesdropperEThe formula:
Figure BDA0001621645750000045
wherein gamma isE,K=γ0(max(|hE,(k)|2,|hE,(g)|2)),γE,KFor the received signal-to-noise ratio, | h, of the eavesdropperE,(k)|2,|hE,(g)|2Respectively eavesdropping the square of the modulus values of the coefficients of the two receiving channels of the kth symbol for an eavesdropper;
a lower bound C for the system's privacy capacity is:
Figure BDA0001621645750000046
wherein C isDIndicates the receiving rate of a legitimate receiver]+Indicating the receiving rate C of the legitimate receiverDLess than the eavesdropping rate C of an eavesdropperEA lower bound C of the system privacy capacity is 0.
Compared with the prior art, the invention has the following characteristics:
1. the system model is simple and is suitable for various communication structure networks;
2. the theoretical values of the system average bit error rate and the secrecy rate under the scheme are deduced by combining the order statistics theorem;
3. the design scheme effectively utilizes the channel with poor performance to improve the system safety;
4. the OFDM subcarrier characteristics are fully utilized, and the average error rate performance of the system is effectively improved;
5. the performance change condition of the system under the imperfect reciprocity of the channel is fully analyzed, the tolerance to reciprocity errors is high, and the practicability of the scheme is further proved.
Drawings
FIG. 1 is a system model of the present invention;
FIG. 2 is a graph comparing the theoretical and simulated values of the bit error rate of the proposed scheme;
FIG. 3 is a graph of system safety capacity as a function of signal to noise ratio;
fig. 4 is a graph of system bit error rate as a function of reciprocity error variance.
Detailed Description
The invention is further described in detail below with reference to the drawings and examples, but the invention is not limited thereto.
Referring to fig. 1, the present invention is an OFDM secure transmission strategy combining subcarrier pairing and signal inversion, and the specific steps are as follows:
step 1, determining a rearranged subcarrier sequence.
1.1, obtaining the channel state information of each transmission by using a channel state information feedback system;
1.2 extracting the channel coefficient [ h ] of each carrier wave1,h2,...,hN]Calculating the square | h of each sub-carrier coefficient modulus valuei|2Wherein i ═ 1, 2.., N. According to | hi|2Rearranging the sequence numbers of the subcarriers according to the sequence from small to large to obtain a group of channel coefficient sequences of new subcarriers with channel states from bad to good: [ h ] of(1),h(2),...,h(N)];
1.3 simply divide the channel coefficient sequence of the new sub-carrier into two parts, the second half is the good carrier [ h(N),h(N-1),...,h(N/2)]The first half being the differential carrier [ h ](1),h(2),...,h(N/2)]。
Step 2, determining OFDM symbol to be transmitted
2.1 BPSK-modulating the useful signal to obtain a modulated useful signal [ x1,x2,...,xN/2];
2.2 the modulated useful signals are copied and rotated by 180 ℃ respectively, and the signals after rotation are called inversion signals [ x'1,x′2,...,x′N/2];
2.3 combining the modulated useful signal and the reversal signal, according to the pairing mapping relation in the step 2, the signal is according to the new channel coefficient sequence [ h ] of the subcarrier(1),h(2),...,h(N/2)]Are combined to obtain [ x'1,x′2,...,x′N/2,xN/2,...,x2,x1]And obtaining the OFDM symbol to be transmitted by each bit corresponding to the real position of each carrier.
And step 3, determining the pairing mapping relationship.
The worst channel and the best channel are paired and combined in sequence, namely the channel coefficients are h respectively(k)And h(g)And pairing corresponding subcarriers.
The pairing mapping relation is as follows:
g=N-k+1
and pairing the kth subcarrier with the corresponding g subcarrier, wherein k is 1, 2.
Step 4, obtaining the output signal-to-noise ratio of each pair of subcarriers
4.1 selecting any pair of subcarriers according to the pairing mapping relation in the step 2, wherein the information received by the two channels under the condition of equal power is as follows:
Figure BDA0001621645750000061
Figure BDA0001621645750000062
4.2, each path of signal is equalized at the receiving end, and the equalization is multiplied by the conjugate of the channel coefficient:
Figure BDA0001621645750000063
Figure BDA0001621645750000064
4.3 obtaining the output signal-to-noise ratio of each pair of subcarriers:
Figure BDA0001621645750000065
wherein, | h(k)|2And | h(g)|2The squares of the channel coefficient modulus values of the kth subcarrier and the g subcarrier, respectively, k being 1, 2., N/2, g being N/2, N/2+ 1., N; n is a radical of0For the noise power spectral density, P, of each branch0Is the average power of each subcarrier, gamma0Is the signal to noise ratio.
Step 5, obtaining the average error rate of the system and a lower bound C of the secret capacity of the system
5.1 obtaining | h(k)|2,|h(g)|2Is a joint probability density function fXY(x,y)
Selecting any pair of subcarriers according to the pairing mapping relation in the step 2, wherein the information received by the two channels under the condition of equal power is as follows: the transmission channel we use is a complex gaussian rayleigh channel, | hi|2Compliance parameter of
Figure BDA0001621645750000071
Is distributed exponentially of (1), then | hi|2(for ease of writing, replace by variable t, | h in the following(k)|2And | h(g)|2Respectively, x and y) and the distribution function at t > 0 are:
Figure BDA0001621645750000072
Figure BDA0001621645750000073
from the theorem of order statistics, we can find | h(k)|2,|h(g)|2The joint probability density distribution function of (a) is:
Figure BDA0001621645750000074
the theorem of the order statistics is as follows:
let the total X have a continuous distribution function F (X) with a distribution density f (X) (a < X < b), X1,X2,...,XnIs a simple random sample of capacity n from the total X, X(1)<X(2)<...<X(n)Is composed of simple random samples X1,X2,...,XnThe resulting order statistic, (X)(i),X(j)) (1. ltoreq. i < j. ltoreq. n) has a combined density of:
Figure BDA0001621645750000075
5.2 we can get the received symbol x for each pair of subcarrierskThe bit error rate of (a) is:
Figure BDA0001621645750000076
wherein f isXY(x, y) is | h(k)|2,|h(g)|2The joint probability density function of (1), E]Representing an averaging function, the Q function satisfies the following definition:
Figure BDA0001621645750000077
the average bit error rate of the system is:
Figure BDA0001621645750000081
5.3 because the eavesdropping end receiving situation can not be completely known, it is somewhat difficult to accurately solve the secrecy capacity of the system. Here, we assume that an eavesdropper has good eavesdropping capability, can know the channel where the OFDM symbol to be transmitted each time, but cannot distinguish which is the inverted signal and which is the useful signal, so he can only guess the channel where the useful information is transmitted with good signal quality. This is a comparatively strong eavesdropping capability for the eavesdropper under the scheme, and under the assumption that the eavesdropping rate C of the eavesdropper can be obtainedEThe following formula:
Figure BDA0001621645750000082
wherein gamma isE,K=γ0(max(|hE,(k)|2,|hE,(g)|2)),γE,KFor the eavesdropperNoise ratio, | hE,(k)|2,|hE,(g)|2
The squares of the two received channel coefficient moduli of the k-th symbol are respectively overheard for the eavesdropper.
A lower bound C for the privacy capacity of the system is therefore:
Figure BDA0001621645750000083
wherein C isDIndicates the receiving rate of a legitimate receiver]+Indicating the receiving rate C of the legitimate receiverDLess than the eavesdropping rate C of an eavesdropperEA lower bound C of the system privacy capacity is 0.
The advantages of the present invention can be further illustrated by the following simulation experiment results:
the performance of the proposed scheme is verified by simulation in the present invention. Our scheme considers an OFDM classical eavesdropping wireless network with N subcarriers. The system model is shown in fig. 1 and consists of a source node Alice, a receiving node Bob and a possible eavesdropping node Eve. Each node is equipped with a single antenna, in half duplex mode. The transmission process is based on OFDM modulation of N subcarriers, so that a legal channel and an eavesdropping channel are logically divided into orthogonal subcarriers h with flat fading respectivelyABAnd hAE. By utilizing the reciprocity of the channel, according to the information feedback system, we assume that Alice is perfectly known about the channel state information. The channel modeling is a complex Gaussian Rayleigh channel, and the adopted baseband modulation mode is BPSK modulation.
Fig. 2 shows that under the condition of equal power, the theoretical value of the average bit error rate of the system and the variation of the Monte Carlo simulation value along with the signal-to-noise ratio are simulated, wherein the implementation represents the theoretical value, and the curve represents the simulation value. We can see that as the number of subcarriers increases, the deviation between the theoretical value and the simulated value tends to increase, but at N of 64, the deviation is still small, and the correctness of the theoretical derivation is well verified. Meanwhile, fig. 2 also shows a graph of the average bit error rate of the eavesdropper as a function of the signal-to-noise ratio. It can be seen that no matter gamma0And how the number of subcarriers varies, the bit error rate of the eavesdropper is close to 0.5, which is equivalent to the case of a blind guess. The result effectively proves the interference effect of the scheme on the eavesdropper, and achieves good eavesdropping prevention effect.
Fig. 3 shows the variation of the secrecy rate of the system with the signal-to-noise ratio when the eavesdropper has a better eavesdropping capability, and shows the variation of the secrecy rate with different numbers of subcarriers. As the number of subcarriers increases, we can see that the safety capacity of the system does not change much at low signal-to-noise ratios. The increase in security capacity is more pronounced at higher signal-to-noise ratios.
We introduce channel reciprocity errors into our proposed solution model for modeling analysis as follows:
the errors (RFRE) due to different transmit/receive rf circuit gains all satisfy the following distribution:
E=Aeφ
wherein A and φ each satisfy a mean value of μRFVariance is
Figure BDA0001621645750000091
Lognormal distribution and normal distribution.
The errors brought by the transmitting end and the receiving end are respectively:
Figure BDA0001621645750000092
Figure BDA0001621645750000093
the asymmetric time offset will cause a certain phase rotation error (TSRE) and affect the channel reciprocity property, and is distributed as follows:
Φ(n)=exp(-j2πnΔd/N)
where Δ d can be understood as the timing deviation across the transmit ends, with the mean value μTSVariance is
Figure BDA0001621645750000094
N is the subcarrier number.
The error (FSRE) due to frequency offset due to local oscillator mismatch and the like is shown as follows:
Γ(m)=exp(-j2π(m(N+Ncp)+Ncp)Δε/N)
where m is the OFDM symbol number, NcpIs the cyclic prefix length, and Δ ε is the frequency offset. Since the FSRE mainly comes from time domain phase rotation and inter-carrier interference, and our strategy is implemented by using a modulus value, the influence caused by the phase rotation is well reduced. In addition, each independent subcarrier channel is adopted, so that the influence caused by interference between OFDM carriers is not considered, and the FSRE is not discussed more.
So the modeling of the downlink channel in our proposed solution model is as follows:
Figure BDA0001621645750000095
wherein: hULIn order to be the uplink channel, the base station,
Figure BDA0001621645750000101
to estimate the channel in the downlink with these reciprocity error factors taken into account, Λ (n) ═ EtΦ(n)。
Fig. 4 shows the variation curve of the average bit error rate of the system with the error variance under different types of reciprocity errors. Simulation results show that the TSRE has little influence on the average bit error rate of the proposed scheme no matter how large the error variance value is; meanwhile, the RFRE does not have a great influence on the system average bit error rate of the scheme. The simulation result of fig. 4 shows that the proposed scheme can tolerate a certain error under the condition of imperfect reciprocity of channels, and further proves the stability and practicability of the performance of the proposed scheme.

Claims (6)

1. An OFDM safe transmission method combining subcarrier pairing and signal inversion is characterized by comprising the following steps:
(1) the sending end rearranges the serial numbers of all sub-carriers according to the known channel state information and the sequence from small to large of the square of the channel coefficient modulus value to obtain a new channel coefficient sequence of the sub-carriers, divides the new channel coefficient sequence into two parts by taking a middle point as a boundary, sets the first half part as a poor carrier and the second half part as a good carrier;
(2) copying a useful signal containing N/2 bits to be transmitted and carrying out inversion operation, sequentially placing the useful signal to be transmitted in a carrier wave with good back half part according to a reverse order mode for transmission, sequentially placing the inverted signal in a carrier wave with poor front half part for transmission, and jointly forming an original OFDM symbol with N bits; wherein N is the number of subcarriers;
(3) according to a certain pairing mapping relation, pairing and combining a good subcarrier and a poor subcarrier in a one-to-one correspondence manner;
the defined mapping relation comprises the following specific processes:
according to the mapping relation:
g=N-k+1
pairing the kth subcarrier with the corresponding g subcarrier, wherein k is 1, 2.
(4) The receiving end carries out equalization processing on the received original OFDM symbol information, then the information in the two matched subcarriers is jointly received in sequence by adopting a maximum ratio combining mode to obtain the Kth subcarrier output signal-to-noise ratio gammasymbol_KWherein K ═ 1, 2.., N/2;
(5) in the case of power averaging, the average bit error rate p under the classical eavesdropping model and a lower bound C of the system secret capacity are obtained by using the theorem of order statistics.
2. The OFDM secure transmission method combining subcarrier pairing and signal inversion according to claim 1, wherein in step (1), the subcarrier sequence numbers (1, 2.., N) are rearranged to obtain a new set of channel sequence numbers, where N is the number of subcarriers, and the method is implemented by the following steps:
1a) obtaining the channel state information of each transmission by using a channel state information feedback system;
1b) extracting channel coefficient [ h ] of each carrier wave1,h2,...,hN]Calculating the square | h of each sub-carrier coefficient modulus valuei|2Wherein i is 1, 2.. times.n; according to | hi|2Rearranging the sequence numbers of the subcarriers according to the sequence from small to large to obtain a group of channel coefficient sequences of new subcarriers with channel states from bad to good: [ h ] of(1),h(2),...,h(N)];
1c) The channel coefficient sequence of the new subcarrier is simply divided into two parts, and the second half part is a good carrier [ h(N),h(N-1),...,h(N/2+1)]The first half being the differential carrier [ h ](1),h(2),...,h(N/2)]。
3. The OFDM secure transmission method combining subcarrier pairing and signal inversion according to claim 1, wherein in step (2), the original OFDM symbol is generated by:
2a) BPSK modulating useful signal to obtain modulated useful signal [ x1,x2,...,xN/2];
2b) The modulated useful signals are copied and rotated by 180 ℃ respectively, and the signals after rotation are defined as inversion signals [ x'1,x'2,...,x'N/2];
2c) Combining the modulated useful signal and the reversal signal to form an OFDM symbol to be transmitted;
the combination of the modulated useful signal and the inverted signal is realized by the following method:
according to the pairing method in the step (3), the signal is subjected to channel coefficient sequence [ h ] of a new subcarrier(1),h(2),...,h(N/2)]Are combined to obtain N bits [ x'1,x'2,...,x'N/2,xN/2,...,x2,x1]Wherein each bit is true according to new sub-carrier channel coefficient sequenceAnd arranging the actual carrier positions to obtain the required transmission OFDM symbols.
4. The OFDM secure transmission method combining subcarrier pairing and signal inversion as claimed in claim 1, wherein in step (4), the output SNR γ of the Kth subcarrier is obtainedsymbol_KThe specific method comprises the following steps:
4a) the equalization processing method is that the received signal y in each carrier channel is processediMultiplying the conjugate of the channel coefficient at the receiving end
Figure FDA0002305104190000021
Wherein i is 1, 2.., N;
4b) adopting a maximum ratio combination mode to carry out combined receiving to obtain the output signal-to-noise ratio gamma of each pair of subcarrierssymbol_K
Figure FDA0002305104190000022
Wherein, | h(k)|2And | h(g)|2The squares of the channel coefficient modulus values of the kth subcarrier and the g subcarrier, respectively, k being 1, 2., N/2, g being N/2+1, N/2+ 2., N; n is a radical of0For the noise power spectral density, P, of each branch0Is the average power of each subcarrier, gamma0Is the signal to noise ratio.
5. The OFDM secure transmission method combining subcarrier pairing and signal inversion according to claim 4, wherein in step (5), the specific method for obtaining the system average bit error rate p comprises:
substituting x for | h(k)|2Y instead of | h(g)|2Then a received symbol x for each pair of subcarriers can be obtainedkError rate pKComprises the following steps:
Figure FDA0002305104190000023
wherein f isXY(x, y) is | h(k)|2,|h(g)|2The joint probability density function of (1), E]Meaning that the averaging function is taken, the Q function satisfies the following definition,
Figure FDA0002305104190000031
according to the theorem of order statistics, the method comprises the following steps:
Figure FDA0002305104190000032
the average bit error rate of the system is:
Figure FDA0002305104190000033
6. the OFDM secure transmission method combining subcarrier pairing and signal inversion as claimed in claim 1, wherein in step (5), the specific method for obtaining a lower bound C of the system secret capacity is:
defining an eavesdropping rate C of an eavesdropperEThe formula:
Figure FDA0002305104190000034
wherein gamma isE,K=γ0(max(|hE,(k)|2,|hE,(g)|2)),γE,KFor the received signal-to-noise ratio, | h, of the eavesdropperE,(k)|2,|hE,(g)|2Squaring, gamma, of the modulus values of the coefficients of two reception channels, respectively of the kth and the g-th symbol, for eavesdropping by an eavesdropper0Is the signal-to-noise ratio;
a lower bound C for the system's privacy capacity is:
Figure FDA0002305104190000035
wherein C isDIndicates the receiving rate of a legitimate receiver]+Indicating the receiving rate C of the legitimate receiverDLess than the eavesdropping rate C of an eavesdropperEA lower bound C of the system privacy capacity is 0.
CN201810308296.1A 2018-04-08 2018-04-08 OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion Active CN108684037B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810308296.1A CN108684037B (en) 2018-04-08 2018-04-08 OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810308296.1A CN108684037B (en) 2018-04-08 2018-04-08 OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion

Publications (2)

Publication Number Publication Date
CN108684037A CN108684037A (en) 2018-10-19
CN108684037B true CN108684037B (en) 2020-03-17

Family

ID=63799869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810308296.1A Active CN108684037B (en) 2018-04-08 2018-04-08 OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion

Country Status (1)

Country Link
CN (1) CN108684037B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868716B (en) * 2019-11-22 2023-09-15 国网河南省电力公司电力科学研究院 Physical layer safety transmission method based on continuous subcarrier grouping
CN113645245B (en) * 2021-08-16 2022-09-20 华朴无限(成都)科技有限公司 DM-OFDM system physical layer security realization method and device for enhancing robustness

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1593014A (en) * 2001-07-30 2005-03-09 因芬尼昂技术股份公司 Device and method for offset calibration of the power control signal of radio devices

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2512394A (en) * 2013-03-28 2014-10-01 Sony Corp Transmitter and method of transmitting

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1593014A (en) * 2001-07-30 2005-03-09 因芬尼昂技术股份公司 Device and method for offset calibration of the power control signal of radio devices

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Effects of physical impairments on OFDM signals;Agilent Technologies;《GPP TSG-RAN WG5 Meeting #33 Tdoc R4-061276》;20061110;全文 *
Selective Sub-Carrier Relaying and Power Allocation for Multi-Relay-Assisted Cooperative OFDM Systems with Outdated CSI;Shashika Biyanwilage, Upul Gunawardana;《2011 18th International Conference on Telecommunications》;20111231;全文 *
一种基于子载波合并的多播资源调度算法;王凡森;《电子与信息学报》;20140531;全文 *
一种子载波配对和功率分配联合最优算法;周 岩;《小型微型计算机系统》;20120815;全文 *
基于子载波选择配对及功率优化分配的OFDM系统;蒋 勇, 赵作鹏;《通信技术》;20150814;全文 *
联合子载波抑制与配对的双向 DF - PLNC OFDM 中继;韩 序;《通信技术》;20150630;全文 *

Also Published As

Publication number Publication date
CN108684037A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
Wei et al. Transmitter and receiver window designs for orthogonal time-frequency space modulation
Medjahdi et al. On the road to 5G: Comparative study of physical layer in MTC context
Güvenkaya et al. On physical-layer concepts and metrics in secure signal transmission
Zakaria et al. A novel filter-bank multicarrier scheme to mitigate the intrinsic interference: Application to MIMO systems
US7672384B2 (en) Bandwidth and power efficient multicarrier multiple access
Furqan et al. Enhancing physical layer security of OFDM systems using channel shortening
Hamamreh et al. CP-less OFDM with alignment signals for enhancing spectral efficiency, reducing latency, and improving PHY security of 5G services
Kadir et al. Unified MIMO-multicarrier designs: A space–time shift keying approach
CN108833341B (en) Physical layer secure transmission method based on subcarrier sorting and XOR operation in OFDM system
Wang et al. BER analysis of WFRFT precoded OFDM and GFDM waveforms with an integer time offset
CN110856169A (en) Physical layer security algorithm combining sub-carrier grouping and XOR operation
Li et al. A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception
CN108684037B (en) OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion
Ahmad et al. Massive MIMO NOMA with wavelet pulse shaping to minimize undesired channel interference
Belallou et al. OFDM-subcarrier power modulation with two dimensional signal constellations
Tao et al. Affine frequency division multiplexing with index modulation
Yang et al. A low-complexity transceiver structure with multiple CFOs compensation for OFDM-based coordinated multi-point systems
Kaplan et al. OFDM-IM performance evaluation under jamming attack
Kumar et al. Performance analysis of Rayleigh fading channels in MIMO-OFDM systems using BPSK and QPSK modulation schemes
Xu et al. Blind joint estimation of carrier frequency offset and I/Q imbalance in OFDM systems
Muoghalu et al. MIMO-OFDM techniques for wireless communication system: performance evaluation review
Al-Dweik et al. Joint secured and robust technique for OFDM systems
Berceanu et al. Performance analysis of an uplink Massive MU-MIMO OFDM-based system
Ayvaz et al. A novel concatenated LWT and WHT based UFMC waveform design for the next generation wireless communication systems
Chan et al. Elimination of data identification problem for data-dependent superimposed training

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant