CN109547135A - Power distribution method based on secrecy probability in millimeter-wave systems - Google Patents

Power distribution method based on secrecy probability in millimeter-wave systems Download PDF

Info

Publication number
CN109547135A
CN109547135A CN201910015021.3A CN201910015021A CN109547135A CN 109547135 A CN109547135 A CN 109547135A CN 201910015021 A CN201910015021 A CN 201910015021A CN 109547135 A CN109547135 A CN 109547135A
Authority
CN
China
Prior art keywords
power distribution
channel
secrecy
probability
millimeter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910015021.3A
Other languages
Chinese (zh)
Inventor
吴蒙
马艳
陈伯庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201910015021.3A priority Critical patent/CN109547135A/en
Publication of CN109547135A publication Critical patent/CN109547135A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/382Monitoring; Testing of propagation channels for resource allocation, admission control or handover
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

Present invention discloses the power distribution methods based on secrecy probability in a kind of millimeter-wave systems, include the following steps: S1, equivalent channel model step, establish millimeter wave channel model and thus to obtain discrete angular domain channel model;S2, power distribution strategies definition step, the minimum value of legal direction received signal to noise ratio is obligated, the allocation strategy of total transmission power is formulated in the upper bound for limiting eavesdropping direction received signal to noise ratio simultaneously, guarantees that target secrecy probability meets the constraint of QoS requirement;S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and carry out Performance Evaluation to final allocation result.The invention proposes a kind of power distribution methods with data protection function, can effectively promote the privacy and confidentiality of data in wireless communication procedure, reach set secrecy probability, are promoted and normalize safe handling capacity, reduce the complexity of system.

Description

Power distribution method based on secrecy probability in millimeter-wave systems
Technical field
The present invention relates to a kind of power distribution method, in particular to one kind for combine large-scale antenna array and Power distribution method in the millimeter-wave systems of beam forming technique between useful information and man made noise can protect target to use The privacy of user data upsets listener-in.Belong to communication system safety of physical layer field.
Background technique
As the user experience that quality data transmits constantly is promoted, rate and letter of the people to wireless data transmission The demand of number bandwidth is growing day by day, and the design of next generation mobile communication system is faced with the rare realistic problem of frequency spectrum resource.Together When, next generation mobile communication system will very pay close attention to channel capacity, system multifunctional and maintenance cost.In recent years, due to Millimeter wave frequency band is abundant to exempt to authorize frequency spectrum resource and number Gbps transmission rate, so that millimeter wave is gathered around in terms of providing bandwidth access There are many advantages, therefore, millimetre-wave attenuator technology is developed rapidly.For some technical problems in practical application, Researcher proposes various solutions.In this course, in conjunction with the millimeter wave of large-scale antenna array and beam forming Mobile communication system design framework is constantly strengthened.
In view of the broadcast characteristic of wireless network, various eavesdropping means and tool constantly upgrade, and safety is for secret communication Importance increasingly improve.Safety of physical layer in communication system is first of natural barrier of communication security, can be secrecy Communication system provides irreplaceable guarantee.
In a wireless communication system, channel is often extremely complex, is difficult to a part analyzed.Under pure view distance environment Short haul connection in, channel is Gaussian white noise channel, and this channel is the simplest, and influence factor is minimum.Just because of this, very Channel is often assumed to be Gaussian white noise channel by more experimental studies.In practical applications, communication environment is often much more complex, barrier Hinder object, the flue dust in air, weather, inter-signal interference etc. that may all impact to wireless communication.It is wireless in practical application Communication system not only has los path (LOS), and there are many more scattering and delay paths, also referred to as obstructed path (NLOS). For millimeter wave channel compared to scattering environments low-frequency range channel abundant, propagated loss is even more serious, causes scattering environments poor And effectively number of path is rare in scattering cluster and cluster, therefore the parameterized model based on cluster ray is built more suitable for millimeter wave channel Mould.
Safety of physical layer technology not only can encrypt to form layer security system in conjunction with key, can also pass through signal modulation Mode realizes information security in physical layer, to abandon complicated Encryption Algorithm and key agreement mechanisms.It is realized by physical layer Communication security can fundamentally solve information security issue, without consider listener-in computing capability and its to network The knowledge of parameter.Currently, safety of physical layer technical research mainly divides three directions: 1) the safety enhancing skill based on coded treatment Art.Mainly in conjunction with information theory, the precoding technique before signal emits, the safety transmitted with strengthening physical layer are studied.2) base Emit the safe enhancing technology with modulation in signal.People, which begin one's study, in recent years utilizes multiple antennas physical features resource abundant Binding signal modulation technology safety of physical layer.3) the safety of physical layer technology combined with conventional cryptography system.Utilize nothing Line Channel Physical feature negotiation go out key, can be not only used for traditional encrypted transmission, be equally applicable in signal modulation from And realize the safe transmission of physical layer.
Recently, some researchs highlight the advantage that beam forming and man-made noise combine for millimeter wave channel, using as Successful safety of physical layer strategy.Man made noise be one kind be intended to not influence legitimate receiver signal it is received under the premise of, interference The safe practice of listener-in's signal.This method is based on channel state information (CSI), using a part of transmission power, generates specific The man made noise of modulation.
In conclusion how a kind of power distribution method is proposed on the basis of existing research, in large-scale antenna array Using beam forming and man made noise as secure transport mechanism in millimeter-wave communication system, by legal direction received signal to noise ratio Minimum value obligated, while limit eavesdropping direction received signal to noise ratio the upper bound, thus the safety of improve data transfer Property.Also just become those skilled in that art's urgent problem to be solved.
Summary of the invention
In view of the prior art, there are drawbacks described above, and the purpose of the present invention is to propose to general based on secrecy in a kind of millimeter-wave systems The power distribution method of rate, which comprises the steps of:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, limit simultaneously The allocation strategy of total transmission power is formulated in the upper bound for eavesdropping direction received signal to noise ratio, guarantees that target secrecy probability meets Service Quality The constraint of amount demand;
S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and to final distribution knot Fruit carries out Performance Evaluation.
Preferably, the S1 equivalent channel model step, specifically includes:
S11, channel matrix H is thought of as NclThe sum of a scattering cluster, has N in each clusterrayPropagation path, using list Cluster clusters ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response arrow Amount,
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor transmitting terminal antenna number;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set ζBEAnd ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LC Attach most importance to and close number of path, definesExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, into Row is such as given a definition
Then by hBWith hEAgain it is expressed as formula
Preferably, in the S11 step, millimeter wave channel, and benefit are described using Cluster-Ray sub-clustering channel model It can decompose path model with space and simplify millimeter wave channel.
Preferably, the S12 step specifically includes:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that between the antenna of uniform linear array Away from for d, ψ is definedi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all one Array response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit The multiple Gauss factor of variance,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
Preferably, the S2 allocation strategy definition step, specifically includes:
S21, the channel state information for assuming purpose channel known to sender, while the instant channel state letter of tapping channel Ceasing is unknown for sender, considers that the AoDs of listener-in is distributed in [θ hereE,minE,max] angle domain within the scope of, it is fixed This adopted range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is defined on the basis of meeting legitimate receipt side and being constrained with eavesdropping side's QoS requirement, is led to It crosses and the minimum value of legal direction received signal to noise ratio is obligated, while limiting the upper bound of eavesdropping direction received signal to noise ratio, It obtains
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxItem It cannot get feasible solution under part, then decision-making system is interrupted, and Alice stops transmission signal.
Preferably, the S3 power distribution step specifically includes:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,Phase It should be in SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, there are public dissemination path, definition for destination and eavesdropping end
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
Compared with prior art, advantages of the present invention is mainly reflected in the following aspects:
The invention proposes a kind of power distribution methods with data protection function, can effectively promote wireless communication The privacy and confidentiality of data in the process, it is ensured that safety of physical layer.The present invention is excellent for the realization effect of set secrecy probability It is different, it can be realized safe transmission to the full extent under power limited or the several scenes such as untethered.The present invention can also It is effectively promoted and normalizes safe handling capacity, high safety handling capacity is reached while ensuring high secrecy probability.Meanwhile the present invention Power distribution method it is flexible and changeable, can be adaptively adjusted according to different usage scenarios to realize that given secrecy is general Rate, method is applied widely, excellent compatibility.
In addition, the present invention also provides reference for other relevant issues in same domain, can be opened up on this basis Extension is stretched, and is applied in same domain in other technical solutions relevant to depth learning technology, before very wide application Scape.
Just attached drawing in conjunction with the embodiments below, the embodiment of the present invention is described in further detail, so that of the invention Technical solution is more readily understood, grasps.
Detailed description of the invention
Fig. 1 is method flow schematic diagram of the invention;
Fig. 2 is tapping channel model schematic;
Fig. 3 is LCMillimeter wave discrete angular domain channel model when=0;
Fig. 4 is LCMillimeter wave discrete angular domain channel model when ≠ 0;
Fig. 5 is the relational graph of practical secrecy probability Yu target secrecy probability;
Fig. 6 is the relational graph for normalizing safe handling capacity and target secrecy probability;
Fig. 7 is the relational graph for normalizing safe handling capacity and transmitting terminal maximum available power;
Fig. 8 is the distribution diagram that the power of given secrecy probability is realized in the untethered system of power.
Specific embodiment
As shown in FIG. 1 to FIG. 8, present invention discloses the power distribution sides based on secrecy probability in a kind of millimeter-wave systems Method includes the following steps:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, limit simultaneously The allocation strategy of total transmission power is formulated in the upper bound for eavesdropping direction received signal to noise ratio, guarantees that target secrecy probability meets Service Quality The constraint of amount demand;
S3, power distribution step carry out man made noise's beam forming power distribution based on interruption, and to final distribution knot Fruit carries out Performance Evaluation.
2, the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, feature exist In the S1 equivalent channel model step specifically includes:
S11, the abundant scattering properties relative to microwave frequency band, millimeter wave channel have sparsity, most of signal energy It is confined to limited propagation path, can be described with Cluster-Ray sub-clustering channel model.Channel matrix H is thought of as NclIt is a to dissipate The sum of cluster is penetrated, has N in each clusterrayPropagation path, it is poly- using single cluster to show the sparse scattering properties of millimeter wave channel Class ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response arrow Amount,In view of cluster ray Multiple Channel Analysis gets up very difficult, path model can decompose here with space Simplify millimeter wave channel.
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor the numbers of beams for covering entire spatial dimension;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set ζBEAnd ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LC Attach most importance to and close number of path, definesExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, into Row is such as given a definition
Then by hBWith hEAgain it is expressed as formula
The S12 step specifically includes:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that between the antenna of uniform linear array Away from for d, ψ is definedi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all one Array response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit The multiple Gauss factor of variance,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
In practical application, a base station may send information simultaneously to multiple users simultaneously, and listener-in can be by powerful Reception device information is eavesdropped, the information of users multiple in this way may be all compromised.Here mainly for this list The system of multi-user is studied under base station.The S2 allocation strategy definition step, specifically includes:
S21, the channel state information (CSI) for assuming purpose channel known to sender, while the instant channel of tapping channel Status information be for sender it is unknown, here consider listener-in AoDs be distributed in [θE,minE,max] angle domain range Interior, defining this range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is determined on the basis of meeting legitimate receipt side and eavesdropping side's QoS requirement (QoS) is constrained Justice is obligated by the minimum value to legal direction received signal to noise ratio, while limiting eavesdropping direction received signal to noise ratio The upper bound achievees the purpose that safe transmission.Therefore, we want to find the optimal power allocation plan for minimizing transmission power P=a+b Slightly, with guarantee target secrecy probability β ∈ [0,1) meet QoS constraint, obtain
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxItem It cannot get feasible solution (i.e. a+b > P under partmax), then decision-making system is interrupted, and Alice stops transmission signal.
The S3 power distribution step specifically includes:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
Above formula shows that the signal-to-noise ratio of millimeter-wave systems can decompose propagation path by space deeply and be influenced, this point is different from The wireless communication system of statistical iteration channel model.
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,Phase It should be in SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, destination and eavesdropping end are there are public dissemination path, by a series of conversions, can be obtained u and v that This independent conclusion.In order to indicate convenient, definition
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
The present invention sets about from the outage probability of system, is more simple and efficient compared to conventional method, can significantly improve system Communication security index.It can be seen that from Fig. 5 to Fig. 8 in power limited and unrestricted system, method proposed by the present invention is equal Can effectively processing power assignment problem, realize safe transmission, while there is energy-saving effect.
Compared with prior art, advantages of the present invention is mainly reflected in the following aspects:
1, method of the invention can effectively achieve set secrecy probability.
Under power limited and untethered two kinds of scenes, set secrecy probability can reach, realize peace to the greatest extent Full transmission, and the secrecy probability for referring to method can only maintain a steady state value, as shown in Figure 5.The latter is interrupted due to not accounting for, Secrecy probability is caused not influenced by transmitting terminal general power.
2, method of the invention can effectively promote the safe handling capacity of normalization.
In power constrained system, only meet formula s.t.SNR at the same timeb≥γb, P [SNRe≤γe] >=β and P=a +b≤PmaxWhen, information transmission can just occur, i.e., cannot obtain high secrecy probability and high safety handling capacity simultaneously.It is emulating During realization, formula will be metRealize safe transmission total number of channels and the total number of channel it Than being denoted as v, definition normalizes the product that safe handling capacity is practical secrecy probability and v.As can be seen from Figure 6 mentioned method is in phase To under higher target secrecy probability scene, the Safety output higher than reference method can be obtained always.On the one hand, for power Untethered system, the safe handling capacity actually obtained are directly proportional to β;On the other hand, for power constrained system, when β is close to 1 When, safe throughput degradation is obvious, and only few channel can be realized safe transmission at this time.
In power constrained system, change the available power of transmitting terminal, the output of safe handling capacity will be directly influenced, schemes 7 show in the case where given β=0.8 and β=0.9, constantly increase Pmax, the safe handling capacity of the normalization actually obtained is therewith Increase, and steady state value can only be maintained with reference to method.
3, method of the invention has more flexible power distribution design.
Fig. 8 is depicted in the untethered system of power, the trend that power distribution changes with the variation of target secrecy probability. Under scene that can be more demanding to security of system, transmitting terminal needs to obtain more power to noise transmission, to realize Given secrecy probability.
In general, the present invention is a kind of useful signal with privacy protection function and artifact power distribution side Method, it is intended to solve the privacy and confidentiality of data in wireless communication procedure.Specifically it is unfolded to study from safety of physical layer angle, needle To there is passive wiretapping under MISO communication scenes, person is explored.Scheme is broadcasted using beam forming and man made noise to be made For secure transport mechanism, it can decompose path model using space and equivalent model carried out to millimeter wave channel.To meet destination It constrains, the minimum value of legal direction received signal to noise ratio is obligated, simultaneously with the QoS requirement (QoS) at eavesdropping end Limit the upper bound of eavesdropping direction received signal to noise ratio.Based on this, the allocation strategy of total transmission power P is formulated, to guarantee that target maintains secrecy Probability β ∈ [0,1) meets QoS constraint.Finally to safe probability, normalization in the unrestricted two kinds of scenes of power limited and power Safe handling capacity, the factors such as power distribution carry out Performance Evaluation.Simulation result shows that, compared to conventional method, this programme is more simple It is single efficiently to significantly improve the communication security index of system, reach set secrecy probability, is promoted and normalize safe handling capacity, The complexity of reduction system.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit and essential characteristics of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention, and any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (6)

1. the power distribution method based on secrecy probability in a kind of millimeter-wave systems, which comprises the steps of:
S1, equivalent channel model step establish millimeter wave channel model and thus to obtain discrete angular domain channel model;
S2, allocation strategy definition step obligate the minimum value of legal direction received signal to noise ratio, while limiting eavesdropping The allocation strategy of total transmission power is formulated in the upper bound of direction received signal to noise ratio, guarantees that target secrecy probability meets service quality need The constraint asked;
S3, power distribution step, carry out man made noise's beam forming power distribution based on interruption, and to final allocation result into Row Performance Evaluation.
2. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute S1 equivalent channel model step is stated, is specifically included:
S11, channel matrix H is thought of as NclThe sum of a scattering cluster, has N in each clusterrayPropagation path, it is poly- using single cluster Class ray channel model, is expressed as follows
Wherein,Indicate path loss, glIndicate the complex gain on l paths, a (θl) indicate emission array response vector,
Model in S12, foundation S11, establishes discrete angular domain channel model, is expressed as follows
Wherein, U is unitary matrice, NtFor transmitting terminal antenna number;
S13, in conjunction with S11 and S12, legitimate channel is expressed as
Tapping channel is expressed as
Wherein,WithFor path loss, gBFor the purpose of the complex gain held, gEFor the complex gain for eavesdropping end, definition set ζBEWith And ζCRespectively indicate the set for being overlapped path of legitimate receipt side, eavesdropping side and legitimate receipt side with eavesdropping side, LCAttach most importance to combining Diameter number, definitionExpression belongs to ζEAnd it is not included in ζCElement;
S14, defined functionFunction S generates a matrix, which is selected from B, carries out such as Give a definition
Then by hBWith hEAgain it is expressed as formula
3. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 2, it is characterised in that: In the S11 step, millimeter wave channel is described using Cluster-Ray sub-clustering channel model, and can decompose path using space Model simplification millimeter wave channel.
4. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 2, which is characterized in that institute S12 step is stated to specifically include:
S121, angle domain is sampled with fixed angular distance 1/M in transmitting terminal, it is assumed that the antenna spacing of uniform linear array is D defines ψi, wherein
With ψiThe comprehensive effect in all paths indicates i-th of channel gain within the scope of the angle window width of neighbouring 1/M;
S122, definition U are unitary matrice, and the column of U constitute the orthogonal basis of signal transmission space, and each column of U are all an arrays Response vector, NtThe entire spatial dimension of a wave cover, discrete angular domain channel model is expressed as
If S123, ithPath is propagation path, i.e. ψi∈[sin(θmin),sin(θmax)], define giIt is zero-mean, unit variance The multiple Gauss factor,
If ithPath is not propagation path, then gi=0,
Wherein, L is propagation path number.
5. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute S2 allocation strategy definition step is stated, is specifically included:
S21, the channel state information for assuming purpose channel known to sender, while the instant channel status information pair of tapping channel Be in sender it is unknown, here consider listener-in AoDs be distributed in [θE,minE,max] angle domain within the scope of, define this A range is suspicious propagation regions, the range of suspicious propagation regions known to transmitting terminal;
S22, secrecy is defined on the basis of meeting legitimate receipt side and being constrained with eavesdropping side's QoS requirement, by right The minimum value of legal direction received signal to noise ratio is obligated, while limiting the upper bound of eavesdropping direction received signal to noise ratio, is obtained
s.t.SNRb≥γb,
P[SNRe≤γe] >=β,
A > 0, b >=0;
S23, it is directed to power constrained system, the maximum transmission power for defining Alice is PmaxIf above formula is in given PmaxUnder the conditions of It cannot get feasible solution, then decision-making system is interrupted, and Alice stops transmission signal.
6. the power distribution method based on secrecy probability in millimeter-wave systems according to claim 1, which is characterized in that institute S3 power distribution step is stated to specifically include:
S31, signal-to-noise ratio solution, man made noise's beamforming matrix are carried out to destination and eavesdropping endColumn selection from UE, with hBIt is orthogonal, obtain hBW2=0,
The signal-to-noise ratio of destination is expressed as
The signal-to-noise ratio at eavesdropping end is expressed as
S32, work as LCWhen=0, destination and eavesdropping end do not have public dissemination path, i.e.,WithIt is orthogonal,It corresponds to SNRe=0 and CE=0, power all at this time will all be used to send useful message;
Work as LCWhen ≠ 0, there are public dissemination path, definition for destination and eavesdropping end
SNReCumulative distribution function expression formula be expressed as follows
It obtains
Min a+b,
A > 0, b >=0,
For given γE, can obtain
Then further obtain
Min a+b,
A > 0, b >=0;
S33, optimal solution a and b are found out in conjunction with above-mentioned steps, calculation formula is
CN201910015021.3A 2019-01-08 2019-01-08 Power distribution method based on secrecy probability in millimeter-wave systems Pending CN109547135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910015021.3A CN109547135A (en) 2019-01-08 2019-01-08 Power distribution method based on secrecy probability in millimeter-wave systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910015021.3A CN109547135A (en) 2019-01-08 2019-01-08 Power distribution method based on secrecy probability in millimeter-wave systems

Publications (1)

Publication Number Publication Date
CN109547135A true CN109547135A (en) 2019-03-29

Family

ID=65834484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910015021.3A Pending CN109547135A (en) 2019-01-08 2019-01-08 Power distribution method based on secrecy probability in millimeter-wave systems

Country Status (1)

Country Link
CN (1) CN109547135A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110492996A (en) * 2019-08-08 2019-11-22 东南大学 A kind of key generation method applied in the extensive mimo system of multi-user
CN110518947A (en) * 2019-09-27 2019-11-29 苏州大学 It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator
CN111556460A (en) * 2020-04-28 2020-08-18 西安交通大学 Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network
CN111970718A (en) * 2020-07-22 2020-11-20 西北工业大学 Deep learning-based power distribution method in energy collection untrusted relay network
CN112929069A (en) * 2021-02-07 2021-06-08 电子科技大学 Safe transmission method of millimeter waves
CN113411106A (en) * 2021-05-31 2021-09-17 海南大学 Power distribution method based on deep learning in safe space modulation system
CN114745031A (en) * 2022-03-10 2022-07-12 西安电子科技大学 Full-duplex MIMO physical layer secure transmission method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199753A (en) * 2017-12-07 2018-06-22 南京邮电大学 A kind of method for precoding based on iteration minimum in millimetre-wave attenuator
CN109004965A (en) * 2018-07-26 2018-12-14 大连理工大学 A kind of design method and device of the mixed-beam forming filter based on millimeter wave mimo system secure communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199753A (en) * 2017-12-07 2018-06-22 南京邮电大学 A kind of method for precoding based on iteration minimum in millimetre-wave attenuator
CN109004965A (en) * 2018-07-26 2018-12-14 大连理工大学 A kind of design method and device of the mixed-beam forming filter based on millimeter wave mimo system secure communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MA YAN等: "Research on outage probability based power allocation method in millimeter wave system", 《2017 IEEE 17TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 *
黄士亚: "基于人工噪声频谱覆盖的OFDM系统物理层加密算法", 《CNKI优秀硕士学位论文全文库 信息科技辑》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110492996B (en) * 2019-08-08 2020-08-11 东南大学 Key generation method applied to multi-user large-scale MIMO system
CN110492996A (en) * 2019-08-08 2019-11-22 东南大学 A kind of key generation method applied in the extensive mimo system of multi-user
CN110518947A (en) * 2019-09-27 2019-11-29 苏州大学 It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator
CN110518947B (en) * 2019-09-27 2021-05-28 苏州大学 Millimeter wave communication-based beam forming optimization method under active eavesdropping environment
CN111556460B (en) * 2020-04-28 2021-07-13 西安交通大学 Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network
CN111556460A (en) * 2020-04-28 2020-08-18 西安交通大学 Power distribution method for non-ideal millimeter wave wireless power supply communication unmanned aerial vehicle network
CN111970718B (en) * 2020-07-22 2022-03-11 西北工业大学 Deep learning-based power distribution method in energy collection untrusted relay network
CN111970718A (en) * 2020-07-22 2020-11-20 西北工业大学 Deep learning-based power distribution method in energy collection untrusted relay network
CN112929069A (en) * 2021-02-07 2021-06-08 电子科技大学 Safe transmission method of millimeter waves
CN112929069B (en) * 2021-02-07 2022-03-29 电子科技大学 Safe transmission method of millimeter waves
CN113411106A (en) * 2021-05-31 2021-09-17 海南大学 Power distribution method based on deep learning in safe space modulation system
CN114745031A (en) * 2022-03-10 2022-07-12 西安电子科技大学 Full-duplex MIMO physical layer secure transmission method
CN114745031B (en) * 2022-03-10 2024-03-01 西安电子科技大学 Full-duplex MIMO physical layer safe transmission method

Similar Documents

Publication Publication Date Title
CN109547135A (en) Power distribution method based on secrecy probability in millimeter-wave systems
Xiao et al. Deep reinforcement learning-enabled secure visible light communication against eavesdropping
Vaigandla et al. A survey on future generation wireless communications-5G: multiple access techniques, physical layer security, beamforming approach
Chen et al. Impact of residual hardware impairment on the IoT secrecy performance of RIS-assisted NOMA networks
Tian et al. Secrecy rate optimization in wireless multi-hop full duplex networks
Gu et al. Control channel anti-jamming in vehicular networks via cooperative relay beamforming
US11196507B2 (en) Anti-eavesdropping method for IoV based on intermittent cooperative jamming
Nguyen et al. Secure communications in cognitive underlay networks over Nakagami-m channel
Du et al. Secure transmission for downlink NOMA visible light communication networks
Tashman et al. Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels
Pham et al. Secrecy sum-rate of multi-user MISO visible light communication systems with confidential messages
CN110798282A (en) Software radio-based artificial noise assisted MISO system verification platform implementation method
Mashdour et al. Secure mm‐Wave communications with imperfect hardware and uncertain eavesdropper location
Liu et al. Exploiting STAR-RIS for physical layer security in integrated sensing and communication networks
Shakir et al. Opportunistic schedule selection for multiuser MIMO FSO communications: A security-reliability trade-off perspective
Peng et al. Security performance analysis for cooperative communication system under Nakagami-m fading channel
MirhoseiniNejad et al. Phase jamming attack: A practical attack on physical layer-based key derivation
CN111934863B (en) Key sharing method based on artificial noise and security coding in edge calculation
Sun et al. On the secrecy performance of random mobile user in visible light communication systems
CN114338331A (en) Communication method of cognitive radio environment backscattering NOMA under IQI condition
Lu et al. Physical layer security for indoor GSM VLC
He et al. QoS-based beamforming with cooperative jamming in cognitive radio networks
CN111263363A (en) High-strength safe transmission method
Tang et al. Iterative power optimization towards secure multi-channel full-duplex communication
Gu et al. Cooperative relay beamforming for control channel jamming in vehicular networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329