CN109547135A - Power distribution method based on secrecy probability in millimeter-wave systems - Google Patents
Power distribution method based on secrecy probability in millimeter-wave systems Download PDFInfo
- Publication number
- CN109547135A CN109547135A CN201910015021.3A CN201910015021A CN109547135A CN 109547135 A CN109547135 A CN 109547135A CN 201910015021 A CN201910015021 A CN 201910015021A CN 109547135 A CN109547135 A CN 109547135A
- Authority
- CN
- China
- Prior art keywords
- power distribution
- channel
- secrecy
- probability
- millimeter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/382—Monitoring; Testing of propagation channels for resource allocation, admission control or handover
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
Present invention discloses the power distribution methods based on secrecy probability in a kind of millimeter-wave systems, include the following steps: S1, equivalent channel model step, establish millimeter wave channel model and thus to obtain discrete angular domain channel model;S2, power distribution strategies definition step, the minimum value of legal direction received signal to noise ratio is obligated, the allocation strategy of total transmission power is formulated in the upper bound for limiting eavesdropping direction received signal to noise ratio simultaneously, guarantees that target secrecy probability meets the constraint of QoS requirement;S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and carry out Performance Evaluation to final allocation result.The invention proposes a kind of power distribution methods with data protection function, can effectively promote the privacy and confidentiality of data in wireless communication procedure, reach set secrecy probability, are promoted and normalize safe handling capacity, reduce the complexity of system.
Description
Technical field
The present invention relates to a kind of power distribution method, in particular to one kind for combine large-scale antenna array and
Power distribution method in the millimeter-wave systems of beam forming technique between useful information and man made noise can protect target to use
The privacy of user data upsets listener-in.Belong to communication system safety of physical layer field.
Background technique
As the user experience that quality data transmits constantly is promoted, rate and letter of the people to wireless data transmission
The demand of number bandwidth is growing day by day, and the design of next generation mobile communication system is faced with the rare realistic problem of frequency spectrum resource.Together
When, next generation mobile communication system will very pay close attention to channel capacity, system multifunctional and maintenance cost.In recent years, due to
Millimeter wave frequency band is abundant to exempt to authorize frequency spectrum resource and number Gbps transmission rate, so that millimeter wave is gathered around in terms of providing bandwidth access
There are many advantages, therefore, millimetre-wave attenuator technology is developed rapidly.For some technical problems in practical application,
Researcher proposes various solutions.In this course, in conjunction with the millimeter wave of large-scale antenna array and beam forming
Mobile communication system design framework is constantly strengthened.
In view of the broadcast characteristic of wireless network, various eavesdropping means and tool constantly upgrade, and safety is for secret communication
Importance increasingly improve.Safety of physical layer in communication system is first of natural barrier of communication security, can be secrecy
Communication system provides irreplaceable guarantee.
In a wireless communication system, channel is often extremely complex, is difficult to a part analyzed.Under pure view distance environment
Short haul connection in, channel is Gaussian white noise channel, and this channel is the simplest, and influence factor is minimum.Just because of this, very
Channel is often assumed to be Gaussian white noise channel by more experimental studies.In practical applications, communication environment is often much more complex, barrier
Hinder object, the flue dust in air, weather, inter-signal interference etc. that may all impact to wireless communication.It is wireless in practical application
Communication system not only has los path (LOS), and there are many more scattering and delay paths, also referred to as obstructed path (NLOS).
For millimeter wave channel compared to scattering environments low-frequency range channel abundant, propagated loss is even more serious, causes scattering environments poor
And effectively number of path is rare in scattering cluster and cluster, therefore the parameterized model based on cluster ray is built more suitable for millimeter wave channel
Mould.
Safety of physical layer technology not only can encrypt to form layer security system in conjunction with key, can also pass through signal modulation
Mode realizes information security in physical layer, to abandon complicated Encryption Algorithm and key agreement mechanisms.It is realized by physical layer
Communication security can fundamentally solve information security issue, without consider listener-in computing capability and its to network
The knowledge of parameter.Currently, safety of physical layer technical research mainly divides three directions: 1) the safety enhancing skill based on coded treatment
Art.Mainly in conjunction with information theory, the precoding technique before signal emits, the safety transmitted with strengthening physical layer are studied.2) base
Emit the safe enhancing technology with modulation in signal.People, which begin one's study, in recent years utilizes multiple antennas physical features resource abundant
Binding signal modulation technology safety of physical layer.3) the safety of physical layer technology combined with conventional cryptography system.Utilize nothing
Line Channel Physical feature negotiation go out key, can be not only used for traditional encrypted transmission, be equally applicable in signal modulation from
And realize the safe transmission of physical layer.
Recently, some researchs highlight the advantage that beam forming and man-made noise combine for millimeter wave channel, using as
Successful safety of physical layer strategy.Man made noise be one kind be intended to not influence legitimate receiver signal it is received under the premise of, interference
The safe practice of listener-in's signal.This method is based on channel state information (CSI), using a part of transmission power, generates specific
The man made noise of modulation.
In conclusion how a kind of power distribution method is proposed on the basis of existing research, in large-scale antenna array
Using beam forming and man made noise as secure transport mechanism in millimeter-wave communication system, by legal direction received signal to noise ratio
Minimum value obligated, while limit eavesdropping direction received signal to noise ratio the upper bound, thus the safety of improve data transfer
Property.Also just become those skilled in that art's urgent problem to be solved.
Summary of the invention
In view of the prior art, there are drawbacks described above, and the purpose of the present invention is to propose to general based on secrecy in a kind of millimeter-wave systems
The power distribution method of rate, which comprises the steps of:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, limit simultaneously
The allocation strategy of total transmission power is formulated in the upper bound for eavesdropping direction received signal to noise ratio, guarantees that target secrecy probability meets Service Quality
The constraint of amount demand;
S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and to final distribution knot
Fruit carries out Performance Evaluation.
Preferably, the S1 equivalent channel model step, specifically includes:
S11, channel matrix H is thought of as NclThe sum of a scattering cluster, has N in each clusterrayPropagation path, using list
Cluster clusters ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response arrow
Amount,
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor transmitting terminal antenna number;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set
ζB,ζEAnd ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LC
Attach most importance to and close number of path, definesExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, into
Row is such as given a definition
Then by hBWith hEAgain it is expressed as formula
Preferably, in the S11 step, millimeter wave channel, and benefit are described using Cluster-Ray sub-clustering channel model
It can decompose path model with space and simplify millimeter wave channel.
Preferably, the S12 step specifically includes:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that between the antenna of uniform linear array
Away from for d, ψ is definedi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all one
Array response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit
The multiple Gauss factor of variance,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
Preferably, the S2 allocation strategy definition step, specifically includes:
S21, the channel state information for assuming purpose channel known to sender, while the instant channel state letter of tapping channel
Ceasing is unknown for sender, considers that the AoDs of listener-in is distributed in [θ hereE,min,θE,max] angle domain within the scope of, it is fixed
This adopted range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is defined on the basis of meeting legitimate receipt side and being constrained with eavesdropping side's QoS requirement, is led to
It crosses and the minimum value of legal direction received signal to noise ratio is obligated, while limiting the upper bound of eavesdropping direction received signal to noise ratio,
It obtains
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxItem
It cannot get feasible solution under part, then decision-making system is interrupted, and Alice stops transmission signal.
Preferably, the S3 power distribution step specifically includes:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,Phase
It should be in SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, there are public dissemination path, definition for destination and eavesdropping end
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
Compared with prior art, advantages of the present invention is mainly reflected in the following aspects:
The invention proposes a kind of power distribution methods with data protection function, can effectively promote wireless communication
The privacy and confidentiality of data in the process, it is ensured that safety of physical layer.The present invention is excellent for the realization effect of set secrecy probability
It is different, it can be realized safe transmission to the full extent under power limited or the several scenes such as untethered.The present invention can also
It is effectively promoted and normalizes safe handling capacity, high safety handling capacity is reached while ensuring high secrecy probability.Meanwhile the present invention
Power distribution method it is flexible and changeable, can be adaptively adjusted according to different usage scenarios to realize that given secrecy is general
Rate, method is applied widely, excellent compatibility.
In addition, the present invention also provides reference for other relevant issues in same domain, can be opened up on this basis
Extension is stretched, and is applied in same domain in other technical solutions relevant to depth learning technology, before very wide application
Scape.
Just attached drawing in conjunction with the embodiments below, the embodiment of the present invention is described in further detail, so that of the invention
Technical solution is more readily understood, grasps.
Detailed description of the invention
Fig. 1 is method flow schematic diagram of the invention;
Fig. 2 is tapping channel model schematic;
Fig. 3 is LCMillimeter wave discrete angular domain channel model when=0;
Fig. 4 is LCMillimeter wave discrete angular domain channel model when ≠ 0;
Fig. 5 is the relational graph of practical secrecy probability Yu target secrecy probability;
Fig. 6 is the relational graph for normalizing safe handling capacity and target secrecy probability;
Fig. 7 is the relational graph for normalizing safe handling capacity and transmitting terminal maximum available power;
Fig. 8 is the distribution diagram that the power of given secrecy probability is realized in the untethered system of power.
Specific embodiment
As shown in FIG. 1 to FIG. 8, present invention discloses the power distribution sides based on secrecy probability in a kind of millimeter-wave systems
Method includes the following steps:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, limit simultaneously
The allocation strategy of total transmission power is formulated in the upper bound for eavesdropping direction received signal to noise ratio, guarantees that target secrecy probability meets Service Quality
The constraint of amount demand;
S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and to final distribution knot
Fruit carries out Performance Evaluation.
2, the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, feature exist
In the S1 equivalent channel model step specifically includes:
S11, the abundant scattering properties relative to microwave frequency band, millimeter wave channel have sparsity, most of signal energy
It is confined to limited propagation path, can be described with Cluster-Ray sub-clustering channel model.Channel matrix H is thought of as NclIt is a to dissipate
The sum of cluster is penetrated, has N in each clusterrayPropagation path, it is poly- using single cluster to show the sparse scattering properties of millimeter wave channel
Class ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response arrow
Amount,In view of cluster ray Multiple Channel Analysis gets up very difficult, path model can decompose here with space
Simplify millimeter wave channel.
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor the numbers of beams for covering entire spatial dimension;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set
ζB,ζEAnd ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LC
Attach most importance to and close number of path, definesExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, into
Row is such as given a definition
Then by hBWith hEAgain it is expressed as formula
The S12 step specifically includes:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that between the antenna of uniform linear array
Away from for d, ψ is definedi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all one
Array response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit
The multiple Gauss factor of variance,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
In practical application, a base station may send information simultaneously to multiple users simultaneously, and listener-in can be by powerful
Reception device information is eavesdropped, the information of users multiple in this way may be all compromised.Here mainly for this list
The system of multi-user is studied under base station.The S2 allocation strategy definition step, specifically includes:
S21, the channel state information (CSI) for assuming purpose channel known to sender, while the instant channel of tapping channel
Status information be for sender it is unknown, here consider listener-in AoDs be distributed in [θE,min,θE,max] angle domain range
Interior, defining this range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is determined on the basis of meeting legitimate receipt side and eavesdropping side's QoS requirement (QoS) is constrained
Justice is obligated by the minimum value to legal direction received signal to noise ratio, while limiting eavesdropping direction received signal to noise ratio
The upper bound achievees the purpose that safe transmission.Therefore, we want to find the optimal power allocation plan for minimizing transmission power P=a+b
Slightly, with guarantee target secrecy probability β ∈ [0,1) meet QoS constraint, obtain
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxItem
It cannot get feasible solution (i.e. a+b > P under partmax), then decision-making system is interrupted, and Alice stops transmission signal.
The S3 power distribution step specifically includes:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
Above formula shows that the signal-to-noise ratio of millimeter-wave systems can decompose propagation path by space deeply and be influenced, this point is different from
The wireless communication system of statistical iteration channel model.
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,Phase
It should be in SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, destination and eavesdropping end are there are public dissemination path, by a series of conversions, can be obtained u and v that
This independent conclusion.In order to indicate convenient, definition
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
The present invention sets about from the outage probability of system, is more simple and efficient compared to conventional method, can significantly improve system
Communication security index.It can be seen that from Fig. 5 to Fig. 8 in power limited and unrestricted system, method proposed by the present invention is equal
Can effectively processing power assignment problem, realize safe transmission, while there is energy-saving effect.
Compared with prior art, advantages of the present invention is mainly reflected in the following aspects:
1, method of the invention can effectively achieve set secrecy probability.
Under power limited and untethered two kinds of scenes, set secrecy probability can reach, realize peace to the greatest extent
Full transmission, and the secrecy probability for referring to method can only maintain a steady state value, as shown in Figure 5.The latter is interrupted due to not accounting for,
Secrecy probability is caused not influenced by transmitting terminal general power.
2, method of the invention can effectively promote the safe handling capacity of normalization.
In power constrained system, only meet formula s.t.SNR at the same timeb≥γb, P [SNRe≤γe] >=β and P=a
+b≤PmaxWhen, information transmission can just occur, i.e., cannot obtain high secrecy probability and high safety handling capacity simultaneously.It is emulating
During realization, formula will be metRealize safe transmission total number of channels and the total number of channel it
Than being denoted as v, definition normalizes the product that safe handling capacity is practical secrecy probability and v.As can be seen from Figure 6 mentioned method is in phase
To under higher target secrecy probability scene, the Safety output higher than reference method can be obtained always.On the one hand, for power
Untethered system, the safe handling capacity actually obtained are directly proportional to β;On the other hand, for power constrained system, when β is close to 1
When, safe throughput degradation is obvious, and only few channel can be realized safe transmission at this time.
In power constrained system, change the available power of transmitting terminal, the output of safe handling capacity will be directly influenced, schemes
7 show in the case where given β=0.8 and β=0.9, constantly increase Pmax, the safe handling capacity of the normalization actually obtained is therewith
Increase, and steady state value can only be maintained with reference to method.
3, method of the invention has more flexible power distribution design.
Fig. 8 is depicted in the untethered system of power, the trend that power distribution changes with the variation of target secrecy probability.
Under scene that can be more demanding to security of system, transmitting terminal needs to obtain more power to noise transmission, to realize
Given secrecy probability.
In general, the present invention is a kind of useful signal with privacy protection function and artifact power distribution side
Method, it is intended to solve the privacy and confidentiality of data in wireless communication procedure.Specifically it is unfolded to study from safety of physical layer angle, needle
To there is passive wiretapping under MISO communication scenes, person is explored.Scheme is broadcasted using beam forming and man made noise to be made
For secure transport mechanism, it can decompose path model using space and equivalent model carried out to millimeter wave channel.To meet destination
It constrains, the minimum value of legal direction received signal to noise ratio is obligated, simultaneously with the QoS requirement (QoS) at eavesdropping end
Limit the upper bound of eavesdropping direction received signal to noise ratio.Based on this, the allocation strategy of total transmission power P is formulated, to guarantee that target maintains secrecy
Probability β ∈ [0,1) meets QoS constraint.Finally to safe probability, normalization in the unrestricted two kinds of scenes of power limited and power
Safe handling capacity, the factors such as power distribution carry out Performance Evaluation.Simulation result shows that, compared to conventional method, this programme is more simple
It is single efficiently to significantly improve the communication security index of system, reach set secrecy probability, is promoted and normalize safe handling capacity,
The complexity of reduction system.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit and essential characteristics of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included within the present invention, and any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (6)
1. the power distribution method based on secrecy probability in a kind of millimeter-wave systems, which comprises the steps of:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, while limiting eavesdropping
The allocation strategy of total transmission power is formulated in the upper bound of direction received signal to noise ratio, guarantees that target secrecy probability meets service quality need
The constraint asked;
S3, power distribution step, carry out man made noise's beam forming power distribution based on interruption, and to final allocation result into
Row Performance Evaluation.
2. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute
S1 equivalent channel model step is stated, is specifically included:
S11, channel matrix H is thought of as NclThe sum of a scattering cluster, has N in each clusterrayPropagation path, it is poly- using single cluster
Class ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response vector,
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor transmitting terminal antenna number;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set ζB,ζEWith
And ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LCAttach most importance to combining
Diameter number, definitionExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, carries out such as
Give a definition
Then by hBWith hEAgain it is expressed as formula
3. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 2, it is characterised in that:
In the S11 step, millimeter wave channel is described using Cluster-Ray sub-clustering channel model, and can decompose path using space
Model simplification millimeter wave channel.
4. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 2, which is characterized in that institute
S12 step is stated to specifically include:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that the antenna spacing of uniform linear array is
D defines ψi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all an arrays
Response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit variance
The multiple Gauss factor,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
5. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute
S2 allocation strategy definition step is stated, is specifically included:
S21, the channel state information for assuming purpose channel known to sender, while the instant channel status information pair of tapping channel
Be in sender it is unknown, here consider listener-in AoDs be distributed in [θE,min,θE,max] angle domain within the scope of, define this
A range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is defined on the basis of meeting legitimate receipt side and being constrained with eavesdropping side's QoS requirement, by right
The minimum value of legal direction received signal to noise ratio is obligated, while limiting the upper bound of eavesdropping direction received signal to noise ratio, is obtained
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxUnder the conditions of
It cannot get feasible solution, then decision-making system is interrupted, and Alice stops transmission signal.
6. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute
S3 power distribution step is stated to specifically include:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,It corresponds to
SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, there are public dissemination path, definition for destination and eavesdropping end
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910015021.3A CN109547135A (en) | 2019-01-08 | 2019-01-08 | Power distribution method based on secrecy probability in millimeter-wave systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910015021.3A CN109547135A (en) | 2019-01-08 | 2019-01-08 | Power distribution method based on secrecy probability in millimeter-wave systems |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547135A true CN109547135A (en) | 2019-03-29 |
Family
ID=65834484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910015021.3A Pending CN109547135A (en) | 2019-01-08 | 2019-01-08 | Power distribution method based on secrecy probability in millimeter-wave systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547135A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110492996A (en) * | 2019-08-08 | 2019-11-22 | 东南大学 | A kind of key generation method applied in the extensive mimo system of multi-user |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN111556460A (en) * | 2020-04-28 | 2020-08-18 | 西安交通大学 | Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network |
CN111970718A (en) * | 2020-07-22 | 2020-11-20 | 西北工业大学 | Deep learning-based power distribution method in energy collection untrusted relay network |
CN112929069A (en) * | 2021-02-07 | 2021-06-08 | 电子科技大学 | Safe transmission method of millimeter waves |
CN113411106A (en) * | 2021-05-31 | 2021-09-17 | 海南大学 | Power distribution method based on deep learning in safe space modulation system |
CN114745031A (en) * | 2022-03-10 | 2022-07-12 | 西安电子科技大学 | Full-duplex MIMO physical layer secure transmission method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108199753A (en) * | 2017-12-07 | 2018-06-22 | 南京邮电大学 | A kind of method for precoding based on iteration minimum in millimetre-wave attenuator |
CN109004965A (en) * | 2018-07-26 | 2018-12-14 | 大连理工大学 | A kind of design method and device of the mixed-beam forming filter based on millimeter wave mimo system secure communication |
-
2019
- 2019-01-08 CN CN201910015021.3A patent/CN109547135A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108199753A (en) * | 2017-12-07 | 2018-06-22 | 南京邮电大学 | A kind of method for precoding based on iteration minimum in millimetre-wave attenuator |
CN109004965A (en) * | 2018-07-26 | 2018-12-14 | 大连理工大学 | A kind of design method and device of the mixed-beam forming filter based on millimeter wave mimo system secure communication |
Non-Patent Citations (2)
Title |
---|
MA YAN等: "Research on outage probability based power allocation method in millimeter wave system", 《2017 IEEE 17TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 * |
黄士亚: "基于人工噪声频谱覆盖的OFDM系统物理层加密算法", 《CNKI优秀硕士学位论文全文库 信息科技辑》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110492996B (en) * | 2019-08-08 | 2020-08-11 | 东南大学 | Key generation method applied to multi-user large-scale MIMO system |
CN110492996A (en) * | 2019-08-08 | 2019-11-22 | 东南大学 | A kind of key generation method applied in the extensive mimo system of multi-user |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN110518947B (en) * | 2019-09-27 | 2021-05-28 | 苏州大学 | Millimeter wave communication-based beam forming optimization method under active eavesdropping environment |
CN111556460B (en) * | 2020-04-28 | 2021-07-13 | 西安交通大学 | Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network |
CN111556460A (en) * | 2020-04-28 | 2020-08-18 | 西安交通大学 | Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network |
CN111970718B (en) * | 2020-07-22 | 2022-03-11 | 西北工业大学 | Deep learning-based power distribution method in energy collection untrusted relay network |
CN111970718A (en) * | 2020-07-22 | 2020-11-20 | 西北工业大学 | Deep learning-based power distribution method in energy collection untrusted relay network |
CN112929069A (en) * | 2021-02-07 | 2021-06-08 | 电子科技大学 | Safe transmission method of millimeter waves |
CN112929069B (en) * | 2021-02-07 | 2022-03-29 | 电子科技大学 | Safe transmission method of millimeter waves |
CN113411106A (en) * | 2021-05-31 | 2021-09-17 | 海南大学 | Power distribution method based on deep learning in safe space modulation system |
CN114745031A (en) * | 2022-03-10 | 2022-07-12 | 西安电子科技大学 | Full-duplex MIMO physical layer secure transmission method |
CN114745031B (en) * | 2022-03-10 | 2024-03-01 | 西安电子科技大学 | Full-duplex MIMO physical layer safe transmission method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109547135A (en) | Power distribution method based on secrecy probability in millimeter-wave systems | |
Xiao et al. | Deep reinforcement learning-enabled secure visible light communication against eavesdropping | |
Vaigandla et al. | A survey on future generation wireless communications-5G: multiple access techniques, physical layer security, beamforming approach | |
Chen et al. | Impact of residual hardware impairment on the IoT secrecy performance of RIS-assisted NOMA networks | |
Tian et al. | Secrecy rate optimization in wireless multi-hop full duplex networks | |
Gu et al. | Control channel anti-jamming in vehicular networks via cooperative relay beamforming | |
US11196507B2 (en) | Anti-eavesdropping method for IoV based on intermittent cooperative jamming | |
Nguyen et al. | Secure communications in cognitive underlay networks over Nakagami-m channel | |
Du et al. | Secure transmission for downlink NOMA visible light communication networks | |
Tashman et al. | Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels | |
Pham et al. | Secrecy sum-rate of multi-user MISO visible light communication systems with confidential messages | |
CN110798282A (en) | Software radio-based artificial noise assisted MISO system verification platform implementation method | |
Mashdour et al. | Secure mm‐Wave communications with imperfect hardware and uncertain eavesdropper location | |
Liu et al. | Exploiting STAR-RIS for physical layer security in integrated sensing and communication networks | |
Shakir et al. | Opportunistic schedule selection for multiuser MIMO FSO communications: A security-reliability trade-off perspective | |
Peng et al. | Security performance analysis for cooperative communication system under Nakagami-m fading channel | |
MirhoseiniNejad et al. | Phase jamming attack: A practical attack on physical layer-based key derivation | |
CN111934863B (en) | Key sharing method based on artificial noise and security coding in edge calculation | |
Sun et al. | On the secrecy performance of random mobile user in visible light communication systems | |
CN114338331A (en) | Communication method of cognitive radio environment backscattering NOMA under IQI condition | |
Lu et al. | Physical layer security for indoor GSM VLC | |
He et al. | QoS-based beamforming with cooperative jamming in cognitive radio networks | |
CN111263363A (en) | High-strength safe transmission method | |
Tang et al. | Iterative power optimization towards secure multi-channel full-duplex communication | |
Gu et al. | Cooperative relay beamforming for control channel jamming in vehicular networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |