CN109150257A - A kind of extensive MIMO Beam Domain security multicast radio transmitting method - Google Patents
A kind of extensive MIMO Beam Domain security multicast radio transmitting method Download PDFInfo
- Publication number
- CN109150257A CN109150257A CN201810889397.2A CN201810889397A CN109150257A CN 109150257 A CN109150257 A CN 109150257A CN 201810889397 A CN201810889397 A CN 201810889397A CN 109150257 A CN109150257 A CN 109150257A
- Authority
- CN
- China
- Prior art keywords
- multicast
- beam domain
- user
- base station
- rate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
- H04B7/043—Power distribution using best eigenmode, e.g. beam forming or beam steering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0621—Feedback content
- H04B7/0626—Channel coefficients, e.g. channel state information [CSI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/0848—Joint weighting
- H04B7/0854—Joint weighting using error minimizing algorithms, e.g. minimum mean squared error [MMSE], "cross-correlation" or matrix inversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/046—Wireless resource allocation based on the type of the allocated resource the resource being in the space domain, e.g. beams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention proposes a kind of extensive MIMO Beam Domain security multicast radio transmitting method, the base station side wirelessly communicated in this method is configured with large-scale antenna array, and base station side generates the extensive beam set for covering entire cell by the method for simulation multi-beam figuration or digital multiple beam figuration or simulation and digital mixed-beam figuration.Base station carries out power distribution to the transmission signal of Beam Domain according to the Beam Domain statistical channel status information of legitimate user and eavesdropping user.Wherein, Beam Domain power distribution algorithm includes passing through the convex optimization problem acquisition Beam Domain power distribution matrix of iterative solution based on certainty is equivalent and the iterative algorithm of CCCP.In multicast process Beam Domain power distribution result with statistical channel status information variation dynamic update.Method proposed by the invention solves the complexity and safety issue of extensive mimo wireless communication system multicast transmission.
Description
Technical field
The invention belongs to the communications fields, and in particular to a kind of wave that large-scale antenna array is utilized under multi-casting communication scene
Beam domain secure wireless transmission method.
Background technique
In the limited situation of frequency spectrum resource, using extensive multiple-input and multiple-output (Multiple-Input
Multiple-Output, MIMO) technology can greatly improve the spectrum efficiency and power efficiency of wireless communication system, it adapts to not
The disconnected wireless traffic demand increased.Under multi-casting communication scene, same information is passed to targeted group by base station simultaneously.Together
When, due to the opening of wireless network, illegal user eavesdrop information the phenomenon that be on the rise.How the safety of information transmission is ensured
Property become wireless communication system urgent need to resolve the problem of one of.With the promotion of Computing ability and arithmetic speed, tradition
Network layer encryption method it is no longer reliable.As a kind of supplement or replacement of encryption method, safety of physical layer method is from information
The angle of opinion is set out, it is intended to improve the safety of wireless communication system.
In extensive MIMO secure communication process under multicast scene, for the higher security multicast rate of acquisition,
Base station side needs the transmission signal to multicast users to be designed.Conventional method utilizes transient channel information to implement multicast biography mostly
It is defeated, and the more difficult acquisition in systems in practice of transient channel information.In addition, security multicast rate is non-convex letter in security multicast transmission
Number, multicast Precoding Design are generally difficult to obtain globally optimal solution.And when base station side antenna amount is larger, using in tradition
The implementation complexity that point method solves is higher.For this purpose, the invention proposes a kind of lower utilization statistical channels of implementation complexity to believe
The extensive MIMO Beam Domain security multicast radio transmitting method of breath.
Summary of the invention
Goal of the invention: multicast is carried out to legal user group in base station side the object of the present invention is to provide one kind and there are non-
The method for carrying out security multicast wireless transmission using statistic channel information and large-scale antenna array under the scene of method eavesdropping user.
Technical solution: for achieving the above object, the technical solution adopted by the present invention are as follows:
A kind of extensive MIMO Beam Domain security multicast radio transmitting method, comprising the following steps:
(1) under the scene of base station and user group progress multi-casting communication, the base station for configuring large-scale antenna array passes through simulation
Multi-beam figuration or digital multiple beam figuration or simulation and the method generation of digital mixed-beam figuration can cover entire cell
Beam set;
(2) base station is believed using the Beam Domain statistical channel state of legitimate user and illegal wiretapping user in multicast users group
Breath constructs and solves Beam Domain Multicast power allocation optimization problems to transmission signal progress power distribution;The Beam Domain multicast
The optimization aim of power distribution optimization problem is to maximize the floor value of security multicast rate, and optimized variable is that base station sends signal
Covariance matrix;Constraint condition is that the covariance matrix of base station transmission signal meets power constraint;The security multicast rate
Floor value be minimum multicast users rate and the eavesdropping user rate upper bound difference;
(3) during each user's dynamic mobile, as Beam Domain statistics is believed between user in base station and multicast users group
Channel state information variation, base station side dynamic implementation Beam Domain power distribution, multicast process dynamic update.
Base station generates the wave that can cover the extensive beam set realization space resources of entire cell in the step (1)
Beam domain divides, and base station carries out security multicast communication, the security multicast with the user in multicast users group on same running time-frequency resource
The process of communication is implemented on Beam Domain.
Base station utilizes the Beam Domain of legitimate user and illegal wiretapping user statistics letter in multicast users group in the step (2)
Channel state information carries out power distribution to signal is sent.The legal use to be disguised oneself as in multicast users group due to illegal wiretapping user
Family, legitimate user and illegal wiretapping user send uplink detection signal, base station in the ascending channel detecting stage, multicast users group
According to the detectable signal received, the statistics letter of Beam Domain needed for implementing user wave beam domain power distribution or beam selection is estimated
Channel state information.Specific power distribution algorithm is based on the equivalent and concave-convex process (Concave-Convex of certainty
Procedure, CCCP) iterative algorithm.
The above-mentioned power distribution method based on CCCP includes:
(a) the eavesdropping user rate upper bound in security multicast rate lower bound expression is subjected to first order Taylor expansion approximation,
The convex optimization problem about Beam Domain power distribution is converted by non-convex problem.It is more to need to calculate safety during Taylor expansion
Broadcast derivative of the eavesdropping user rate upper bound about Beam Domain power distribution matrix in rate lower bound expression.
(b) solution of problem is obtained using interior point method or other optimization methods, security multicast rate is calculated according to obtained solution,
And derivative of the eavesdropping user rate upper bound about Beam Domain power distribution matrix in security multicast rate is updated according to above-mentioned solution, it produces
Raw new optimization problem and solution.It repeats the convex optimization problem solving-update derivative value-derivative value and brings optimization aim generation into newly
The convex optimization problem solving of convex optimization problem-process until security multicast rate restrain.
Above-mentioned certainty equivalent processes include:
(a) equivalent using Beam Domain statistical channel status information iterative calculation certainty according to big dimension Random Matrices Theory
Auxiliary variable is until convergence.
(b) it is equal to the multicast rate in auxiliary variable calculating security multicast rate lower bound using the certainty that iteration obtains
Certainty equivalent expressions.
(c) the certainty equivalent expressions of multicast rate are brought into the optimization problem of Beam Domain Multicast power distribution, is avoided
The expectation computing of high complexity.
Beam Domain statistical channel shape in the step 3), with the dynamic mobile of each user, between base station and each user
State information changes, and Beam Domain power distribution above-mentioned is implemented according to the statistical channel status information after variation in base station again,
It is updated to implement the dynamic of multicast process.The variation of Beam Domain statistical channel status information is related with concrete application scene,
Typical statistical time window is the several times or decades of times of transmission time window in short-term, the acquisition of relevant statistical channel status information
It is carried out on biggish time width.
The utility model has the advantages that compared with prior art, the present invention has the advantage that
1. each user multi-casting communication with high safety on Beam Domain in base station and multicast users group, can be with its wireless communication
The spatial character in road matches, to obtain mentioning using power efficiency brought by large-scale antenna array and spectrum efficiency
Height, while ensure that the safety of multicast wireless communication.
2. using the Beam Domain statistical channel status information of legitimate user in illegal wiretapping user and multicast users group to hair
The number of delivering letters is designed, and the Beam Domain statistical channel status information of required each user can be obtained by sparse detectable signal
, the multicast transmission method that is proposed while being suitable for time division duplex and frequency division duplex system.
3. significantly reducing the realization complexity of security multicast communication using based on certainty is equivalent and the iterative algorithm of CCCP
Degree, and this method can obtain the performance of near-optimization.
Detailed description of the invention
Fig. 1 is the extensive MIMO security multicast radio transmitting method process of Beam Domain using statistical channel status information
Figure.
Fig. 2 is the extensive MIMO multicast system schematic diagram there are eavesdropping user.
Fig. 3 is based on certainty is equivalent and the flow chart of the iterative algorithm of CCCP.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing.
As shown in Figure 1, a kind of extensive MIMO wave beam using statistical channel status information disclosed by the embodiments of the present invention
Domain security multicast radio transmitting method, mainly comprises the steps that
1) base station configures large-scale antenna array, can cover the extensive of entire cell by beam form-endowing method generation
Beam set.In this step, base station can be covered whole by the generation of the method for simulation multi-beam figuration or digital multiple beam figuration
The extensive beam set of a cell, to realize that the Beam Domain of space resources divides.Base station on same running time-frequency resource with conjunction
Method user carries out security multicast communication, and the process of security multicast communication is implemented on Beam Domain.
2) base station utilizes the Beam Domain statistical channel status information of legitimate user and illegal wiretapping user in multicast users group
Signal progress power distribution is sent to by constructing and solving Beam Domain Multicast power allocation optimization problems, or is legitimate user's group
User distributes wave beam or beam subset carries out security multicast communication.
3) during each user's dynamic mobile, with Beam Domain statistical channel between user in base station and multicast users group
State information change, base station side dynamic implementation Beam Domain power distribution, multicast process dynamic update.
Below by taking the extensive MIMO multicast system scene shown in Fig. 2 there are illegal wiretapping user as an example, to the present invention
The method of embodiment elaborates.Consider that single cell scenario, base station side configure M (M 102Or 103The order of magnitude) root transmitting day
Line, antenna spacing are half-wavelength.There are K multicast destination user, each user configuration N in cellrRoot receiving antenna.In addition, small
There are one in area to be configured with NeThe illegal wiretapping user of root receiving antenna.It base station can be using simulation multi-beam figuration or number
The space-domain signal of transmission is transformed to Beam Domain by multi-beam figuration or simulation and the method for digital mixed-beam figuration.Later,
Base station sends downlink Multicast signal in Beam Domain.
Consider the free subscriber that eavesdropping user disguises oneself as in cell, therefore the conjunction in the channel detection stage, multicast users group
Method user and illegal wiretapping user send uplink detection signal, base station according to the detectable signal estimation legitimate user received and
The Beam Domain statistical channel status information of eavesdropping user, i.e.,WithWherein Hk
And HeveThe Beam Domain channel matrix of respectively k-th of legitimate user and illegal wiretapping user, operator ⊙ are matrix H adamard
Product, * are the conjugation of matrix,Indicate expectation computing.
Assuming that the Beam Domain multicast signals that base station is sent are x, the covariance matrix for sending signal isIt is more
Broadcasting user rate can indicate are as follows:
Wherein min expression is minimized operation, and log indicates logarithm operation, and det expression takes determinant of a matrix, and H is matrix
Conjugate transposition.
The eavesdropping user rate upper bound can indicate are as follows:
Therefore the floor value of security multicast rate is obtained:
Rsec,lb(Λ)=[Rmc(Λ)-Reve,ub(Λ)]+ (3)
Wherein [x]+Expression takes biggish number in 0 and x, it is ensured that security multicast rate is non-negative.In view of Beam Domain channel base
It stands the low correlation of side, base station sends mutually independent data flow on each wave beam, i.e. matrix Λ is diagonal matrix.It notices
In Beam Domain secure communication, in order to obtain higher security multicast and rate, need to the covariance matrix Λ for sending signal
It optimizes, i.e., power distribution is carried out to launching beam in base station side, that is, solve following optimization problem:
This problem objective function is non-convex, hardly results in globally optimal solution, and implementation complexity is very high.For this purpose, the present invention is real
Example is applied to use based on certainty is equivalent and the above-mentioned Beam Domain Multicast power allocation optimization problems of iterative algorithm solution of CCCP.
Power distribution method based on CCCP includes:
A. the eavesdropping user rate upper bound in security multicast rate lower bound expression is carried out first order Taylor expansion approximation will
Non-convex problem is converted into the convex optimization problem about Beam Domain power distribution.The process needs to calculate security multicast rate lower bound
Derivative of the eavesdropping user rate upper bound about Beam Domain power distribution matrix in expression formula.
B. the solution of problem is obtained using interior point method or other optimization methods, safety is calculated according to the solution of obtained optimization problem
Multicast rate, and the eavesdropping user rate upper bound leading about power distribution matrix in security multicast rate is updated according to obtained solution
Derivative value substitution optimization aim is generated new optimization problem and solved again by number.Repeat above-mentioned convex optimization problem solving-more
New derivative value-derivative value brings optimization aim into and generates the process of the new convex optimization problem solving of convex optimization problem-until safety is more
Rate convergence is broadcast, i.e., the difference of the security multicast rate of adjacent iteration result twice is less than given threshold value.
Due in the reachable traversal security multicast rate lower bound of computing system, needing using Monte-Carlo emulation pair
Channel is traversed.To reduce computation complexity, the present embodiment utilizes big dimension random matrix on the basis of CCCP iterative algorithm
Theory is equivalent up to the certainty for traversing security multicast rate lower bound to calculate.The method only needs Beam Domain statistical channel state to believe
Breath can be obtained the Approaching Results of security multicast rate lower bound.
Above-mentioned certainty equivalent processes include:
A. equivalent auxiliary using Beam Domain statistical channel status information iterative calculation certainty according to big dimension Random Matrices Theory
Variable is helped until convergence.
B. it is equal to the multicast rate in auxiliary variable calculating security multicast rate lower bound using the certainty that iteration obtains
Certainty equivalent expressions.
C. the certainty equivalent expressions of multicast rate are brought into the optimization problem of Beam Domain Multicast power distribution, avoids height
The expectation computing of complexity.
Fig. 3 gives based on certainty is equivalent and the realization process of the iterative algorithm of CCCP, the detailed process of algorithm are as follows:
Step 1: initialization sends the covariance matrix Λ of signal(0), setting the number of iterations instruction i=0.It is sent out in initialization
The covariance matrix Λ for the number of delivering letters(0)When, it can be the strongest N number of wave beam of beam gain point according to Beam Domain statistic channel information
With power P/N, wherein P is total base station power constraint.The value mode of N can be such that the Beam Domain channel for calculating each user
The difference of Correlation Matrix and the Beam Domain channel Correlation Matrix of eavesdropping user,Rdiff_kIt is
The diagonal matrix of one M × M, diagonal element areIt can take for the use
Energy covering in family is up to 80% beam set, and then the beam collection conjunction union of all K multicast users obtains set Υ, and N is just
It is the number of element in set Υ.
Step 2: utilizing Λ(i)The certainty that iterative calculation i-th iteration is used is equal to auxiliary variable Γk、With
Until auxiliary variable restrains, i.e., the changing value of auxiliary variable is less than given threshold value in iterative process.Wherein, Bk(X)
And CkIt (X) is diagonal matrix, diagonal element may be calculated
[Bk(X)]i,i=tr { diag { [Ωk]:,i}X} (8)
Meanwhile it is equivalent according to obtained auxiliary variable calculating security multicast and rate lower bound certaintyFor
Step 3: using the eavesdropping user rate upper bound in CCCP linearisation multicast rate lower bound, optimization problem being converted
For following convex optimization problem:
Wherein, tr () indicates the operation of the mark of calculating matrix.
Step 4:Reve,ubThe gradient of (Λ) is a diagonal matrix, can use statistical channel status information and accurately calculates
Diagonal entry in the matrix:
By Reve,ubThe gradient calculated result of (Λ) brings optimization aim into, is solved using interior point method or other convex optimization methods
(11) the convex optimization problem in.
Step 5: new security multicast rate lower bound certainty being calculated according to formula (10) according to obtained solution and is equal
Step 6: newer security multicast rate lower bound certainty is equivalentWith being calculated for last iteration
As a resultIf difference between the two is less than or equal to preset threshold epsilon1Then iteration terminates, and Λ at this time optimizes
The solution of problem.Otherwise i=i+1 is enabled, step 2 is returned to.
In each user's moving process, with the variation of the Beam Domain statistical channel status information between base station and user,
Base station side repeats abovementioned steps according to updated statistical channel status information, carries out the distribution of Beam Domain Multicast power.To real
The dynamic of existing multicast transmission process updates.The variation of Beam Domain statistical channel status information is related with concrete application scene, allusion quotation
Type statistical time window is the several times or decades of times of transmission time window in short-term, the acquisition of relevant statistical channel status information also compared with
It is carried out on big time width.
It should be pointed out that the foregoing is merely a specific embodiment of the invention, but protection scope of the present invention is not limited to
In this, anyone skilled in the art in the technical scope disclosed by the present invention, can readily occur in variation or replace
It changes, should be covered by the protection scope of the present invention.The available prior art of each component part being not known in the present embodiment
It is realized.
Claims (8)
1. a kind of extensive MIMO Beam Domain security multicast radio transmitting method, characterized by the following steps:
(1) in the case where base station and user group carry out the scene of multi-casting communication, the base station for configuring large-scale antenna array is more by simulating
Wave beam forming or digital multiple beam figuration or simulation and the method generation of digital mixed-beam figuration can cover entire cell
Beam set;
(2) base station utilizes the Beam Domain statistical channel status information of legitimate user and illegal wiretapping user in multicast users group,
It constructs and solves Beam Domain Multicast power allocation optimization problems and carry out power distribution to signal is sent;The Beam Domain Multicast power
The optimization aim of allocation optimization problems is to maximize the floor value of security multicast rate, and optimized variable is the association that base station sends signal
Variance matrix;Constraint condition is that the covariance matrix of base station transmission signal meets power constraint;Under the security multicast rate
Dividing value is the difference of minimum multicast users rate and the eavesdropping user rate upper bound;
(3) in each user's moving process, with the variation of statistical channel status information between base station and each user, base station side is dynamic
State implements Beam Domain power distribution, and multicast process dynamic updates.
2. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 1, it is characterised in that: described
Base station generates the Beam Domain division that can cover the extensive beam set realization space resources of entire cell, base in step (1)
It stands and carries out security multicast communication with the user in multicast users group on same running time-frequency resource, the process of security multicast communication exists
Implement on Beam Domain.
3. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 1, it is characterised in that: described
The uplink detection that Beam Domain statistical channel status information is sent by base station according to the legitimate user received and illegal wiretapping user
Signal estimation obtains.
4. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 1, it is characterised in that: described
Beam Domain Multicast power allocation optimization problems indicate in step (2) are as follows:
s.t.tr{Λ}≤P
Λ≥0
Wherein,For base station multicast rate,For the eavesdropping user rate upper bound, HkAnd HeveRespectively k-th of legitimate user
With the Beam Domain channel matrix of illegal wiretapping user, Λ is the covariance matrix for sending signal, and I is unit matrix, and P is that base station is total
Power constraint,Indicate expectation computing, det expression takes determinant of a matrix, and tr () indicates the mark of calculating matrix.
5. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 4, it is characterised in that: described
Beam Domain Multicast power allocation optimization problems are equal based on certainty in step (2) and the iterative algorithm of CCCP solves.
6. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 5, it is characterised in that: described
The eavesdropping user rate upper bound based on CCCP linearisation optimization problem in step (2), specifically includes:
(a) the eavesdropping user rate upper bound in security multicast rate lower bound expression is subjected to first order Taylor series expansion approximation,
The convex optimization problem about Beam Domain power distribution is converted by non-convex problem, optimization problem is changed into and solves following ask
Topic:
s.t.tr{Λ}≤P
Λ≥0
Need to calculate derivative of the eavesdropping user rate upper bound about Beam Domain power distribution matrix during Taylor series expansionThe gradient is a diagonal matrix, diagonal elementWherein subscript i is the number of iterations, and M is Base Transmitter antenna
Radical, NeFor illegal wiretapping user's receiving antenna radical,
(b) solution of problem is obtained using convex optimization method, and eavesdropping user speed in security multicast rate is updated according to obtained solution
Derivative value substitution optimization aim is formed new convex optimization problem simultaneously by derivative of the rate upper bound about Beam Domain power distribution matrix
It solves again;The repetition convex optimization problem solving-update derivative value-derivative value is brought the new convex optimization of optimization aim generation into and is asked
Topic-convex optimization problem solving process, until security multicast rate restrains.
7. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 4, it is characterised in that: described
The multicast users rate for being simplified optimization problem based on certainty equivalent processes in step (2), is specifically included:
(a) it according to big dimension Random Matrices Theory, is equally assisted using Beam Domain statistical channel status information iterative calculation certainty
Variable Γk、WithUntil convergence;Wherein: Bk(X) and CkIt (X) is diagonal matrix, [Bk(X)]i,i=tr { diag
{[Ωk]:,iX },Subscript i indicates the number of iterations, subscript
I representing matrix element ranks number, ⊙ representing matrix Hadamard product;
(b) it is equal to the multicast users rate in auxiliary variable calculating security multicast rate lower bound using the certainty that iteration obtains
Certainty equivalent expressions;
(c) the certainty equivalent expressions of multicast users rate are brought into the optimization problem of Beam Domain Multicast power distribution, is avoided
The expectation computing of high complexity.
8. extensive MIMO Beam Domain security multicast radio transmitting method according to claim 1, it is characterised in that: each
During user's dynamic mobile, with statistical channel state information change between base station and each user, base station side dynamic implementation wave
Beam domain power distribution, multicast process dynamic update;The variation of Beam Domain statistical channel status information is related with concrete application scene,
Statistical time window is the several times or decades of times of transmission time window in short-term.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810889397.2A CN109150257B (en) | 2018-08-07 | 2018-08-07 | Large-scale MIMO beam domain secure multicast wireless transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810889397.2A CN109150257B (en) | 2018-08-07 | 2018-08-07 | Large-scale MIMO beam domain secure multicast wireless transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150257A true CN109150257A (en) | 2019-01-04 |
CN109150257B CN109150257B (en) | 2020-06-16 |
Family
ID=64792129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810889397.2A Active CN109150257B (en) | 2018-08-07 | 2018-08-07 | Large-scale MIMO beam domain secure multicast wireless transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150257B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981153A (en) * | 2019-04-11 | 2019-07-05 | 东南大学 | A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN111355520A (en) * | 2020-03-10 | 2020-06-30 | 电子科技大学 | Design method of intelligent reflection surface assisted terahertz safety communication system |
CN113364554A (en) * | 2021-05-31 | 2021-09-07 | 北京理工大学 | Perception-assisted uplink secure communication method |
CN114389667A (en) * | 2022-01-15 | 2022-04-22 | 西北工业大学 | Multicast physical layer secure communication method |
WO2022111676A1 (en) * | 2020-11-30 | 2022-06-02 | 中兴通讯股份有限公司 | Transmission channel determination method and apparatus, transmission method and apparatus, system, device, and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070218950A1 (en) * | 2006-03-17 | 2007-09-20 | Codreanu Marian I | Data transmission parameter optimization in MIMO communications system |
CN105933979A (en) * | 2016-04-12 | 2016-09-07 | 东南大学 | Multi-cell BDMA (beam division multiple access) transmission power allocation method |
CN107294575A (en) * | 2017-06-16 | 2017-10-24 | 东南大学 | Extensive MIMO Beam Domain safety communicating methods |
CN107733510A (en) * | 2017-09-26 | 2018-02-23 | 同济大学 | The beam forming design of cloud wireless transmitting system with robustness |
CN107979826A (en) * | 2017-11-28 | 2018-05-01 | 深圳大学 | Power distribution method and device in the DAS to communicate under multiplexer mode containing D2D |
-
2018
- 2018-08-07 CN CN201810889397.2A patent/CN109150257B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070218950A1 (en) * | 2006-03-17 | 2007-09-20 | Codreanu Marian I | Data transmission parameter optimization in MIMO communications system |
CN105933979A (en) * | 2016-04-12 | 2016-09-07 | 东南大学 | Multi-cell BDMA (beam division multiple access) transmission power allocation method |
CN107294575A (en) * | 2017-06-16 | 2017-10-24 | 东南大学 | Extensive MIMO Beam Domain safety communicating methods |
CN107733510A (en) * | 2017-09-26 | 2018-02-23 | 同济大学 | The beam forming design of cloud wireless transmitting system with robustness |
CN107979826A (en) * | 2017-11-28 | 2018-05-01 | 深圳大学 | Power distribution method and device in the DAS to communicate under multiplexer mode containing D2D |
Non-Patent Citations (1)
Title |
---|
彭青,李银伟,郭志军: "认知MIMO系统中波束成形和功率的联合控制博弈算法", 《电信科学》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981153A (en) * | 2019-04-11 | 2019-07-05 | 东南大学 | A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN111355520A (en) * | 2020-03-10 | 2020-06-30 | 电子科技大学 | Design method of intelligent reflection surface assisted terahertz safety communication system |
WO2022111676A1 (en) * | 2020-11-30 | 2022-06-02 | 中兴通讯股份有限公司 | Transmission channel determination method and apparatus, transmission method and apparatus, system, device, and medium |
CN114640378A (en) * | 2020-11-30 | 2022-06-17 | 中兴通讯股份有限公司 | Transmission channel determining method, transmission method, device, system, equipment and medium |
CN113364554A (en) * | 2021-05-31 | 2021-09-07 | 北京理工大学 | Perception-assisted uplink secure communication method |
CN114389667A (en) * | 2022-01-15 | 2022-04-22 | 西北工业大学 | Multicast physical layer secure communication method |
CN114389667B (en) * | 2022-01-15 | 2023-06-30 | 西北工业大学 | Secure communication method of multicast physical layer |
Also Published As
Publication number | Publication date |
---|---|
CN109150257B (en) | 2020-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150257A (en) | A kind of extensive MIMO Beam Domain security multicast radio transmitting method | |
CN109981153B (en) | Artificial noise assisted large-scale MIMO security statistics pre-coding method | |
CN109104225A (en) | A kind of optimal extensive MIMO Beam Domain multicast transmission method of efficiency | |
CN107294575A (en) | Extensive MIMO Beam Domain safety communicating methods | |
CN108964726A (en) | A kind of extensive MIMO uplink transmission channels estimation method of low complex degree | |
CN107888270A (en) | Recognize the safe transmission method of physical layer in satellite ground UNE | |
CN109194373A (en) | A kind of extensive MIMO Beam Domain joint unicast multicast transmission method | |
CN102739383B (en) | Method for allocating union resource based on limited feedback OFDM-AF (Orthogonal Frequency Division Multiplexing-Audio Frequency) system | |
CN110311715A (en) | The nonopiate unicast multicast transmission power distribution method of the optimal extensive MIMO of efficiency | |
CN104219189B (en) | The extensive MIMO communication means in angle time delay domain pilot frequency multiplexing broadband | |
CN109921837A (en) | A kind of robust ada- ptive beamformer method based on multicast frequency control battle array direction modulation | |
CN105162507A (en) | Signal to leakage noise ratio (SLNR)-based two-stage precoding method in large-sale MIMO FDD system | |
CN109347527B (en) | Large-scale MIMO (multiple input multiple output) safe transmission method for guaranteeing service quality | |
CN107896125A (en) | A kind of safe transmission method of physical layer of full dimension multiple antennas SWIPT systems | |
Feng et al. | Beam selection for wideband millimeter wave MIMO relying on lens antenna arrays | |
CN107248875A (en) | A kind of multiple antennas relay system safety of physical layer design method based on signal to noise ratio | |
CN109831233A (en) | A kind of extensive MIMO Beam Domain Multicast power distribution method of multiple cell coordination | |
CN110798282B (en) | Artificial noise implementation method of software radio MISO system | |
CN106788934B (en) | The pilot distribution method of multi-plot joint in a kind of extensive mimo system | |
Li et al. | Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels | |
CN103607260B (en) | System total interference leakage minimum pre-coding matrix group selection algorithm based on MIMO | |
CN108092928A (en) | Polymerization interference is oriented to interference management method, hybrid cellular network, WLAN | |
CN104320170A (en) | Pilot pollution abatement beam forming method for large-scale MIMO system | |
CN109361435A (en) | Extensive multiple-input and multiple-output Beam Domain multicast transmission method | |
CN114501580A (en) | Cooperative rate segmentation network security transmission method with untrusted relay threat |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |