CN109890031B - Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise - Google Patents

Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise Download PDF

Info

Publication number
CN109890031B
CN109890031B CN201910181591.XA CN201910181591A CN109890031B CN 109890031 B CN109890031 B CN 109890031B CN 201910181591 A CN201910181591 A CN 201910181591A CN 109890031 B CN109890031 B CN 109890031B
Authority
CN
China
Prior art keywords
relay
signal
user
information
noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910181591.XA
Other languages
Chinese (zh)
Other versions
CN109890031A (en
Inventor
雷宏江
杨子轩
任智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910181591.XA priority Critical patent/CN109890031B/en
Publication of CN109890031A publication Critical patent/CN109890031A/en
Application granted granted Critical
Publication of CN109890031B publication Critical patent/CN109890031B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Radio Relay Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a multi-relay non-orthogonal multiple access system safe transmission scheme based on artificial noise; the transmission system comprises a source node, two users, a tapping node and a plurality of relay nodes; in the invention, the whole communication process is divided into four stages: a preparation phase, a multi-relay decoding phase, a relay selection phase and a user decoding phase; the system communication is completed in two time slots: in the first time slot, the information source S broadcasts the information to all relay nodes, and the information is relayed to receive and decode the signal by adopting an information mapping strategy during broadcasting; in the second time slot, the system performs double-relay selection, selects the optimal relay from the decodable relay set to forward the user signal, and selects the optimal relay from the decodable relay set to send artificial noise; the relay selection strategy can effectively reduce the complexity and the safety interruption probability of the system while keeping the diversity gain of the multi-relay system; the artificial noise scrambling can further reduce the signal-to-noise ratio of the eavesdropping end and improve the safety performance of the system.

Description

Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
Technical Field
The invention belongs to the technical field of wireless communication networks, particularly relates to a wireless communication network adopting a cooperative non-orthogonal multiple access technology, and belongs to the field of physical layer security.
Background
In the last two decades, mobile communication technology has experienced a dramatic development. Meanwhile, the explosive increase of mobile data volume brought by the popularization of the intelligent terminal puts higher requirements on the speed, the time delay, the signal coverage rate and the like of a wireless communication network. Compared with the conventional orthogonal multiple access technology, the non-orthogonal multiple access technology has been receiving wide attention from the industry and academia due to its high bandwidth efficiency, high user fairness, ultra-high connectivity and compatibility. The cooperative communication technology can improve the coverage rate of the network, and meanwhile, the system performance can be obviously improved due to the fact that the receiving end adopts the diversity technology. The physical layer security does not need a secret key, and the absolute security of information transmission can be realized theoretically by using a time-varying encryption communication system of a wireless channel. Since the computing power of the terminal is gradually enhanced, the information breaking capability of the eavesdropper is gradually improved. Traditional cryptography is under increasing pressure in the field of information encryption. The physical layer security is based on the information theory, realizes information security in the physical layer, and is a very promising encryption mode in the communication field.
A general downlink non-orthogonal multiple access communication network model is shown in fig. 1. The main techniques for non-orthogonal multiple access are two: superposition coding is adopted at a transmitting end to simultaneously transmit information of a plurality of users at the same frequency, and a serial interference elimination technology is adopted at a receiving end to ensure that the plurality of users can be served in given resources (such as time/frequency). The basic steps of successive interference cancellation are: 1. firstly, the signal of the user with the worst channel condition is solved in the superposed signal (in a non-orthogonal multiple access system, the power of the signal sent to the user is strongest); 2. deleting the signal from the superimposed signal; 3, executing the same steps for the users with poor channel condition, and solving the signals of all users one by one in the method.
The cooperative communication technology can improve the coverage rate of the network, and meanwhile, the system performance can be obviously improved due to the fact that the receiving end adopts the diversity technology. The combination of cooperative communication with non-orthogonal multiple access techniques may further improve the performance of non-orthogonal multiple access communication systems. As shown in fig. 2: the common non-orthogonal multiple access cooperative communication system mainly has two architectures: 1. in the special relay system, the source node and the destination node cannot directly communicate due to the existence of deep fading, so a special relay is established to forward the information of the base station for two users; 2. in the user cooperation, since the strong user needs to decode the weak user signal first, the strong user can forward the information to the weak user through short-distance communication (such as bluetooth, WiFi, etc.). The cooperation mode can reduce the redundancy of the system and improve the diversity gain. There are two common relay protocols: amplify-and-forward protocol and decode-and-forward protocol. The present invention is primarily directed to decode-and-forward relay systems.
Physical layer security is a security theory based on information theory. The method utilizes the time-varying property of a wireless channel and combines a channel coding and encryption technology to ensure that information is not decoded by an eavesdropper. Shannon, 1945, demonstrated in The classical literature (see literature [1 ]: Shannon C E. Communication The theory of Communication systems [ J ]. The Bell System Technical Journal,1949,28(4): 656-715.) from an information theory perspective: to achieve absolute security of the message, the communication process must use a "one-time-pad" encryption method, i.e., one bit of data should have a one-bit key. The conditions are too severe to be applied in the engineering field. Wyner first modeled a noisy eavesdropping channel in 1975 on The basis of The Shannon study (see document [2 ]: Wyner A D. The wire-tap channel [ J ]. The Bell System Technical Journal,1975,54(8):1355 and 1387.), as shown in FIG. 3. Wyner demonstrates that: when the channel condition of the main channel is superior to that of the wiretapping channel and the information transmission is carried out between the information source and the legal receiving end, a coding mode is provided, the probability of information transmission error is arbitrarily small, at the moment, the wiretapping end cannot acquire any useful information, and the system is absolutely safe. Through decades of development, the safety theory of the physical layer is gradually mature. The adoption of physical layer security to realize secure transmission of wireless communication systems is becoming a hot spot of research in academic and industrial fields. The measurement indexes of the system physical layer safety mainly comprise traversal secret capacity, safety interruption probability and the like, wherein the safety interruption probability refers to the probability that the instantaneous safety capacity of the system is smaller than a given threshold value, and a mathematical expression is as follows:
Figure GDA0003474699820000021
in the formula, gammaDAnd gammaEIndicating the signal-to-noise ratio of the destination and eavesdropping,
Figure GDA0003474699820000022
Rsrepresenting a safe rate threshold, FD(x) A cumulative distribution function representing the signal-to-noise ratio of the primary channel. f (gamma)E) Represents gammaEIs determined.
A downlink cooperative communication system constructed based on the combination of non-orthogonal multiple access, cooperative communication and physical layer security theory has a great application prospect in the 5G era of pursuing high speed, large integration and large connection.
Disclosure of Invention
Problems to be solved by the invention
Aiming at the problem of system security of an eavesdropper possibly existing in two-hop transmission of a downlink cooperative multi-relay non-orthogonal multiple access system, the invention provides a manually scrambled multi-relay cooperative non-orthogonal multiple access system security transmission scheme. By adopting a double-relay selection strategy, the complexity of the system is effectively reduced while the diversity gain of the multi-relay communication network is kept; meanwhile, the eavesdropping end is effectively interfered, and the safe transmission of the non-orthogonal multiple access system is ensured.
(II) technical scheme of the invention
As shown in fig. 4, the communication system according to the embodiment of the present invention includes K +3 nodes, where K is the number of half-duplex relay nodes R and satisfies K ≧ 1. The system also comprises a source node S and two user nodes U1And U2(wherein, U1And U2Representing strong and weak users, respectively), eavesdropping node E. Source node S and two users U1And U2Due to deep fading, no direct transmission link exists, the communication needs multi-relay assistance,all nodes are equipped with a single antenna. Channel power gain of
Figure GDA0003474699820000031
Is shown in which
Figure GDA0003474699820000032
It indicates the sending end and the receiving end,
Figure GDA0003474699820000033
indicating the receiving end. All channels are assumed to be subject to independent identically distributed Nakagami-m fading. The probability density function and the cumulative distribution function of the channel gain of the link between the source node v and the destination node l can thus be expressed as:
Figure GDA0003474699820000034
Figure GDA0003474699820000035
wherein the content of the first and second substances,
Figure GDA0003474699820000036
Γ (·) is a gamma function.
Figure GDA0003474699820000037
Representing a fading coefficient whose value is a positive integer,
Figure GDA0003474699820000038
representing the average channel power gain. To simplify the analysis, it is assumed that both hop links are independently identically distributed. That is, it is
Figure GDA0003474699820000039
Figure GDA00034746998200000310
And is
Figure GDA00034746998200000311
The embodiment of the invention is based on the physical layer security technology, and considers the correlation of the security capacities of two users in a multi-relay downlink non-orthogonal multiple access system. The utility model discloses a manual scrambling security transmission strategy of a multi-relay cooperation non-orthogonal multiple access system, the core of the strategy is the optimal security relay selection based on the physical layer security technology, the specific implementation steps of the strategy are as follows:
step S1: and (5) initializing the system. The source node firstly broadcasts a training sequence to a downlink multi-relay non-orthogonal multiple access system. This step has two purposes: (1) estimating channel state information of a primary channel, including S-Rk,k∈[1:K],Rk-UiI belongs to each channel of channel state information of {1,2 }; (2) channel state information of the eavesdropping channel is estimated. Namely Rk-channel state information of the E-channel. The acquisition of the channel state information of each link can be realized by monitoring the transmission of each port or adopting some complex channel estimation algorithms (see related document [3 ])]Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J]IEEE Network,2015,29(1):42-48.) is not described in detail herein.
Step S2: first time slot, source S, via a message mapping strategy (see document [4 ]]: xu P, Yang Z, Ding Z, et al, Optimal relay selection schemes for cooperative non-orthogonal multiple access [ J]IEEE Transactions on Vehicular Technology,2018,67(8): 7851-:
Figure GDA0003474699820000041
wherein "x" represents a cartesian product,
Figure GDA0003474699820000042
is WjAnd j is 0,1, 2. Through the training sequence, all nodes can decode the information sent by adopting the message mapping strategy. The first time slot thus has R0=R1+R2Is always true, wherein RiIs a message WiData rate of 0,1, 2;
step S3: in the second time slot, the relay receives the broadcast information of the information source S, and the signal received by the kth relay is:
Figure GDA0003474699820000043
wherein, PSIs the base station power, s0A code word representing the superimposed signal,
Figure GDA0003474699820000044
representing variance as δ2White additive gaussian noise. Then, the relay decodes and forwards the broadcast information of the information source by adopting a decoding and forwarding protocol;
step S4: a forward decodable trunk combination Φ is established. Apparently, the experience of S-RkAfter the channel fading, some relays may not be able to decode information normally, this step selects a relay set Φ that can be decoded normally from all K relays, and the mathematical expression is:
Figure GDA0003474699820000045
in the formula
Figure GDA0003474699820000046
Because the system needs two time slots, pSWhich represents the transmitted signal-to-noise ratio of S,
Figure GDA0003474699820000047
is UiThe data rate threshold of (c).
Step S5: the optimal relay of the retransmission signal is selected from Φ. The optimal relay selection principle will now be explained in detail. According to the basic principle of successive interference cancellation, U1Weak signal is taken as interference to solve U by serial interference elimination2And subtracting U from the mixed signal2Finally solve U1Of the signal of (1). U shape2Then directly connect U1The signal is used as interference, and the signal is solved. The SINRs for two users may be expressed as:
Figure GDA0003474699820000051
in the formula (I), the compound is shown in the specification,
Figure GDA0003474699820000052
αi(i ═ 1,2) denotes the power division factor, α, of the kth relay12=1,α1>α2,PRRepresents the transmission power of the kth relay, σ2Representing the noise power, αJRepresenting the power allocation factor of the artificial noise. For the mth relay, define:
Figure GDA0003474699820000053
in the formula of3(x)=l+θ1x,
Figure GDA0003474699820000054
Figure GDA0003474699820000055
To maximize the security performance of the system, the criteria for selecting relays is
Figure GDA0003474699820000056
I.e. selecting X in phimThe relay with the largest value. Based on the above analysis, it can be known that the relay selection strategy can minimize the outage probability of the multi-relay cooperative non-orthogonal multiple access system.
Step S6: from
Figure GDA0003474699820000057
To select the optimal relay to transmit the artificial noise. To further enhance the security performance of a multi-relay cooperative non-orthogonal multiple access system, a relay set that cannot be decoded correctly is set
Figure GDA0003474699820000058
In the method, a relay k with the maximum channel gain to the eavesdropping node E is selected*An artificial noise is transmitted. The selection criteria are expressed as
Figure GDA0003474699820000059
Wherein
Figure GDA00034746998200000510
Representing the complement of phi. To make a fair comparison of the inventive strategy and the conventional multi-relay forwarding strategy, the total power of all relays is limited to PR
Step S7: user U1And U2Receiving relay m*The forwarded message is decoded, the eavesdropping end E eavesdrops the relayed signal at the same time, the relay k*And sending artificial noise to interfere the eavesdropping terminal E. Assume aJ(0≤αJ< 1) power allocation factor for transmission artifacts. From the above analysis, the user U1、U2And the signal-to-noise ratio of the eavesdropping end E can be expressed as:
Figure GDA00034746998200000511
wherein the content of the first and second substances,
Figure GDA00034746998200000512
representing the transmitted signal-to-noise ratio of the artificially scrambled relay,
Figure GDA00034746998200000513
the security performance of the system of the embodiment of the present invention is analyzed below. According to the expression of the safe interruption probability and some simple algebraic operations, the U when the mth relay sends the signal can be obtained1The safe outage probability of (1) is:
Figure GDA00034746998200000514
similarly, when the mth relay transmits a signal, U2The outage probability of (c) may be expressed as:
Figure GDA0003474699820000061
it is obvious that
Figure GDA0003474699820000062
While, U2It will be safely interrupted. According to the definition and a series of mathematical deductions of the safe interruption probability, the safe interruption probability expression of the system under the strategy is as follows:
Figure GDA0003474699820000063
in the formula (I), the compound is shown in the specification,
Figure GDA0003474699820000064
Figure GDA0003474699820000065
Figure GDA0003474699820000066
Figure GDA0003474699820000067
in the formula, the g and h functions are complex integrals which cannot solve a closed-form solution, and can be approximated as follows by using a Gauss Chebyshev expansion equation:
Figure GDA0003474699820000068
Figure GDA0003474699820000069
in the formula, N is the number of expansion terms, Si=ti+1,tiIs the ith zero, w, of a Lagrangian polynomialiIs the weight of the gaussian is the weight of,
Figure GDA00034746998200000610
(III) advantageous effects of the invention
The beneficial effects of the invention are mainly as follows: the method has the advantages that the correlation of the safety capacities of the two users is considered, under the condition that the safety rate thresholds of the two users are different, the diversity gain of the multi-relay system is kept, meanwhile, the complexity and the safety interruption probability of the multi-relay cooperative non-orthogonal multiple access system are effectively reduced, and the safety performance of the system is improved.
The beneficial effects of the invention come from the following three aspects:
(1) and adopting multi-relay cooperative communication. Due to the time-varying nature of the wireless channel, the attenuation of the signal as it is transmitted can vary dramatically. The cooperative techniques provide additional diversity gain to the communication system, and thus may improve the coverage of the network. Meanwhile, the receiving end adopts the diversity technology, so that the system performance can be obviously improved.
(2) A relay selection strategy is employed. The relay selection strategy can effectively reduce the complexity of the system while maintaining the diversity gain of the multi-relay communication network. In addition, different from a common relay selection scheme, the method considers the correlation of the safety capacities of two users, and is completely suitable for the situation that the safety rate thresholds of the two users are different. The effect of different safety rate thresholds on the probability of a system safety outage is shown in figure 5. The monte carlo simulation results in fig. 5 show that: compared with other forwarding strategies, the method can obviously enhance the system security.
(3) And adopting a manual noise adding strategy. Different from the traditional single relay selection strategy, the invention provides a double relay selection strategy. And selecting one relay from the relays which cannot normally decode to transmit artificial noise to interfere the eavesdropping end. Fig. 6 demonstrates that the manual noise-adding strategy proposed by the present invention enhances the security performance of the system compared to the single-relay selection strategy and the conventional multi-relay forwarding strategy.
Drawings
FIG. 1: model of a general non-orthogonal multiple access system. In the figure, S is a source node, D1And D2Respectively strong and weak users. The source node adopts superposition coding, and the principle is as follows: the signals of two users are simultaneously transmitted in a same frequency and superposed mode according to different powers. Due to D1For strong users, the system distributes less power to the users, and serial interference elimination is executed during decoding, and D is firstly carried out1Signal vision ofFor interference, decoding D2Of the superimposed signal, removing D from the superimposed signal2Then, the signal itself is solved. D2For weak users in non-orthogonal multiple access systems, D is used for decoding1Is regarded as interference, and D is decoded2Of the signal of (1).
FIG. 2 is a drawing: two types of cooperative non-orthogonal multiple access systems. Graph (a) is a dedicated relay scenario, where the source node and two users are in deep fade due to blockage by a mountain or dense building. At this time, a special relay is set up, and after receiving the signal of the source node, the superposition message is forwarded to the two users. The diagram (b) shows user cooperation, since strong users perform successive interference cancellation, it is first necessary to solve the signals of weak users. At this time, the strong user can forward information to the weak user through short-distance communication (such as Bluetooth, WiFi and the like). The redundancy is reduced through the cooperation of users, and the diversity gain of the system is improved.
FIG. 3: wyner eavesdrops on the channel model. The eavesdropping model is an improvement of a Shannon model, Wyner in the model indicates that when the channel condition of a main channel is superior to that of the eavesdropping channel, an encoding mode must exist when an information source and a legal receiving end transmit information, the probability of transmitting information errors can be reduced arbitrarily, at the moment, the eavesdropping end cannot acquire any useful information, and the system is absolutely safe. And from the perspective of information theory, the physical layer security is defined by using the source entropy.
FIG. 4 is a drawing: a multi-relay cooperative non-orthogonal multiple access system model. The invention considers a multi-relay downlink cooperation non-orthogonal multiple access system. Wherein S represents a base station, R1...RKFor decode-and-forward, half-duplex relaying, U, of total number K1And U2Respectively representing a strong user and a weak user, and E is an eavesdropping terminal. Suppose a base station and two user us1And U2Due to deep fading, direct transmission links do not exist, communication needs multi-relay assistance, and all nodes are provided with single antennas.
FIG. 5: different safe rate thresholds
Figure GDA0003474699820000081
Coordination protocolThe influence of the safety interruption probability of the non-orthogonal multiple access system is made. The parameters are set as follows:
Figure GDA0003474699820000082
,K=2,mU=mE=mR=2,α1=0.2,αJ=0.5,Ω1=12dB,ΩR=Ω2=10dB,ΩE-5 dB. Wherein "ODRS" represents a dual-relay selection strategy proposed in the present invention, "OSRS" represents a single-relay selection strategy (only forwarding without adding noise), "TMRF" represents a conventional multi-relay forwarding strategy (all relays forward signals, and a user and an eavesdropping terminal employ a maximum ratio combining strategy to combine signals), "Sim" represents a monte carlo simulation result, and "Analysis" represents a theoretical Analysis result. The figure demonstrates the correctness of the theoretical analysis with Monte Carlo simulation. Obviously, increasing the security rate threshold may degrade the security performance of the wireless communication system. When the signal to noise ratio of the transmission is large, the security performance of the double-relay selection strategy provided by the invention is obviously superior to that of the other two strategies.
FIG. 6: artificial noise allocation parameter alphaJAnd the influence of the relay number K on the safety interruption probability of the system. The parameters are set as follows: r1=0.1nat,R2=0.2nat,ρS=ρR=10dB,mU=mE=mR=m,α1=0.2,Ω1=12dB,ΩR=Ω2=10dB,ΩE-5 dB. Wherein "ODRS" represents a dual relay selection strategy proposed in the present invention, "OSRS" represents a single relay selection strategy (only forwarding without adding noise), "Sim" represents a monte carlo simulation result, and "Analysis" represents a theoretical Analysis result. The figure demonstrates the correctness of the theoretical analysis with Monte Carlo simulation. Obviously, the diversity gain of the system can be improved by increasing the number of relays, and the safety performance of the system is further enhanced. In addition, simulation results show that the system security can be further improved by the double-relay selection strategy compared with the single-relay selection strategy. This performance improvement is more pronounced as the number of relays increases.
FIG. 7: the implementation process of the multi-relay cooperative non-orthogonal multiple access system safe transmission scheme. The method is mainly divided into two time slots, and the first time slot mainly comprises the following steps: the base station sends the superposed signal and relays to receive and decode the signal; and performing relay decision and user decoding in a second time slot, selecting an optimal relay to forward two user signals, selecting the relay with the strongest channel gain at the eavesdropping end to send artificial noise, using the signal of the strong user as interference decoding by the weak user, and eliminating and decoding the strong user based on serial interference.
FIG. 8: the whole communication process in the invention is divided into four stages: a preparation phase, a multi-relay decoding phase, a relay selection phase and a user decoding phase.
Detailed Description
System presetting
The non-orthogonal multiple access communication system comprises K +3 nodes, wherein K is the number of the half-duplex relay nodes R and satisfies that K is more than or equal to 1. The system also comprises a source node S and two user nodes U1And U2(wherein, U1And U2Representing strong and weak users, respectively), eavesdropping node E. Source node S and two users U1And U2Due to deep fading, direct transmission links do not exist, communication needs multi-relay assistance, and all nodes are provided with single antennas. All channels are assumed to be subject to independent identically distributed Nakagami-m fading.
(II) Process for carrying out
The specific implementation flow of the invention is shown in figure 7. The implementation process of the invention is totally divided into seven steps:
step S1: initializing a system; transmitting training series in a multi-relay downlink cooperative non-orthogonal multiple access system, estimating channel state information of each channel through a channel estimation algorithm, and obtaining the mth relay to U1、U2The channel gains for E are:
Figure GDA0003474699820000091
meanwhile, the relay and the destination node acquire message mapping strategy information through the training sequence;
step S2: in the first time slot, the base station sends superposed signals to all K relays based on superposition coding and by adopting a message mapping strategy according to a basic principle of non-orthogonal multiple access;
step S3: in the second time slot, the receiving signal of the decoding forwarding relay is decoded, and then the message is forwarded to the user terminal by adopting double-relay selection and noise is added;
step S4: the system establishes two sets according to the relay decoding condition: decodable relay set Φ and undecodable relay set
Figure GDA0003474699820000092
Where Φ is defined as:
Figure GDA0003474699820000093
ρSrepresenting the transmit signal-to-noise ratio of the source node S,
Figure GDA0003474699820000094
is UiThe safe rate threshold of (2);
Figure GDA0003474699820000095
the complement of Φ, and the relay set that cannot decode normally. The relay that can decode correctly goes to step S5: the relay which cannot decode correctly goes to step S6;
step S5: in Φ, for the mth relay, define
Figure GDA0003474699820000101
Selecting X in phimThe relay with the largest value, i.e. the selection
Figure GDA0003474699820000102
Wherein
Figure GDA0003474699820000103
For the mth relay to U1And U2Channel gain of δ3(x)=l+θ1x,
Figure GDA0003474699820000104
Figure GDA0003474699820000105
Step S6: in that
Figure GDA0003474699820000106
And (4) selecting the relay transmission artificial noise with the maximum eavesdropping end channel gain. Namely, selection
Figure GDA0003474699820000107
Step S7: user decoding, where strong user U1Performing successive interference cancellation, preferentially decoding the weak user's signal and deleting it from the superimposed signal, and then decoding its own signal, the weak user U2Directly handle U1The signal of (2) is regarded as noise and the own signal is decoded.

Claims (1)

1. A multi-relay non-orthogonal multiple access system secure transmission method based on artificial noise is characterized by comprising a double-relay selection and artificial scrambling strategy: namely, the optimal relay forwarding signal is selected from the decodable relay, the optimal relay is selected from the undecodable relay to send artificial noise, and the specific implementation flow is as follows:
step S1: initializing a system; transmitting training series in a multi-relay downlink non-orthogonal multiple access system, estimating channel state information of each channel through a channel estimation algorithm, and obtaining the mth relay to U1、U2The channel gains for E are:
Figure FDA0003332010820000011
Figure FDA0003332010820000012
meanwhile, the relay and the destination node acquire message mapping strategy information through the training sequence; u shape1And U2Representing two user nodes, and E represents an eavesdropping node;
step S2: in the first time slot, the base station sends superposed signals to all K relays based on superposition coding and by adopting a message mapping strategy according to a basic principle of non-orthogonal multiple access;
step S3: in the second time slot, the receiving signal of the decoding forwarding relay is decoded, and then the message is forwarded to the user terminal by adopting double-relay selection and noise is added; the method specifically comprises the following steps: the relay receives the broadcast information of the information source S, and the signal received by the kth relay is as follows:
Figure FDA0003332010820000013
wherein, PSIs the power of the base station and,
Figure FDA0003332010820000014
representing the channel gain, S, from the source node S to the kth relay0A code word representing the superimposed signal,
Figure FDA0003332010820000015
representing variance as δ2Additive white gaussian noise of (1); then, the relay decodes and forwards the broadcast information of the information source by adopting a decoding and forwarding protocol;
step S4: the system establishes two sets according to the relay decoding condition: decodable relay set Φ and undecodable relay set
Figure FDA0003332010820000016
Where Φ is defined as:
Figure FDA0003332010820000017
ρSrepresenting the transmit signal-to-noise ratio of the source node S,
Figure FDA0003332010820000018
is UiThe decoding rate threshold of (1);
Figure FDA0003332010820000019
if the set is a complement of Φ and the set is a relay set that cannot be decoded normally, the relay that can be decoded correctly goes to step S5, and the relay that cannot be decoded correctly goes to step S6;
step S5: in Φ, for the mth relay, define
Figure FDA00033320108200000110
Selecting X in phimThe relay with the largest value, i.e. the selection
Figure FDA00033320108200000111
Wherein
Figure FDA00033320108200000112
For the mth relay to U1And U2Channel gain of δ3(x)=l+θ1x,
Figure FDA00033320108200000113
Figure FDA00033320108200000114
ρRWhich represents the transmit signal-to-noise ratio of R,
Figure FDA00033320108200000115
Figure FDA0003332010820000021
representing the safe rate threshold, alpha, for the ith useriI is 1,2 denotes a power allocation factor of the ith user;
step S6: in that
Figure FDA0003332010820000022
In (1), the relay transmission artificial noise with the maximum channel gain at the eavesdropping end is selected, namely
Figure FDA0003332010820000023
Step S7: user decoding, where strong user U1The serial interference cancellation is performed such that,decoding the weak user's signal preferentially and deleting it from the superimposed signal, and then decoding its own signal, the weak user U2Directly handle U1The signal of (2) is regarded as noise and the own signal is decoded.
CN201910181591.XA 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise Active CN109890031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Publications (2)

Publication Number Publication Date
CN109890031A CN109890031A (en) 2019-06-14
CN109890031B true CN109890031B (en) 2022-03-01

Family

ID=66931718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910181591.XA Active CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Country Status (1)

Country Link
CN (1) CN109890031B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446169A (en) * 2019-08-28 2019-11-12 惠州学院 The cooperation broadcast system and broadcasting method continuously relayed based on quantization mapping forwarding
CN110784866A (en) * 2019-09-23 2020-02-11 天津大学 Untrusted relay network safety transmission method based on blocking type fault-tolerant decoding and forwarding
CN110730452B (en) * 2019-10-25 2023-05-02 中国人民解放军陆军工程大学 Performance analysis method for joint relay and interference selection scheme in wireless communication system
CN111245498B (en) * 2020-01-13 2021-07-16 大连理工大学 Relay-assisted non-orthogonal multiple access cooperative network secure communication method
CN111510869B (en) * 2020-03-13 2021-04-13 西安电子科技大学 Cooperative non-orthogonal layered multicast multiple access transmission method
CN111510987B (en) * 2020-03-13 2022-09-02 西安电子科技大学 Relay selection method based on safety cooperation NOMA network
CN111464214A (en) * 2020-04-02 2020-07-28 山东交通学院 Increment selectable decoding forwarding relay method suitable for non-orthogonal multiple access
CN112737656A (en) * 2020-12-16 2021-04-30 中国人民解放军战略支援部队信息工程大学 Relay network green safety transmission method and system based on non-orthogonal multiple access technology
CN112702741B (en) * 2020-12-29 2023-04-18 中国人民解放军空军工程大学 NOMA (non-uniform access memory) safe transmission method and system combining artificial noise and power distribution
CN113115233B (en) * 2021-03-30 2022-07-01 南京邮电大学 Opportunistic NOMA (non-access-point) cooperative multicast relay selection method
CN114024591B (en) * 2021-10-26 2023-09-01 西安邮电大学 Relay cooperation non-orthogonal multiple access system and information transmission method
CN114640388B (en) * 2022-03-24 2023-07-25 重庆邮电大学 Track design method for fair scheduling of multiple users by double unmanned aerial vehicles based on cognitive network
CN115134932A (en) * 2022-07-29 2022-09-30 重庆邮电大学 Enhanced non-orthogonal multiple access assisted semi-unlicensed system secure transmission method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 Non-orthogonal multiple accesses the user throughput justice link selecting method of collaborative network
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10420126B2 (en) * 2015-04-05 2019-09-17 Lg Electronics Inc. Method and device for transmitting/receiving data in wireless communication system that supports device-to-device communication
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
US10492184B2 (en) * 2016-12-09 2019-11-26 Samsung Electronics Co., Ltd. Multiplexing control information in a physical uplink data channel
CN107995615B (en) * 2017-11-15 2020-08-18 中国人民解放军信息工程大学 Heterogeneous network NOMA physical layer safety transmission method
CN108512585B (en) * 2018-04-04 2020-07-24 哈尔滨工业大学 Dynamic cooperative relay transmission method based on power domain non-orthogonal multiple access technology
CN108900263B (en) * 2018-05-25 2021-04-06 宁波大学 Method for obtaining safe unicast rate model for downlink NOMA communication system design

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 Non-orthogonal multiple accesses the user throughput justice link selecting method of collaborative network
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks;Yuanwei Liu ect.;《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》;20170110;全文 *
Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques;Yulong Zou ect.;《IEEE Network》;20150126;全文 *
Non-orthogonal Multiple Access and Artificial-Noise Aided Secure Transmission in FD Relay Networks;Youhong Feng ect.;《IEEE》;20180125;全文 *
Optimal Relay Selection Schemes for Cooperative NOMA;Peng Xu ect.;《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》;20180402;全文 *
Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer;Tiep M. Hoang ect.;《IEEE WIRELESS COMMUNICATIONS LETTERS》;20170109;全文 *
空天地通信网络的物理层安全系统模型与关键技术;韩帅,台祥雪,孟维晓;《电信科学》;20180320;全文 *
解码转发中继选择系统的安全性能分析;雷宏江等;《中国科学:信息科学》;20170920;全文 *

Also Published As

Publication number Publication date
CN109890031A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
CN109890031B (en) Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
Li et al. Relay selection with network coding in two-way relay channels
CN109743729B (en) Secret transmission method of wireless energy-carrying cooperative system
Chen et al. Multiuser two-way relaying: detection and interference management strategies
CN108667584B (en) User throughput fair link selection method for non-orthogonal multiple access cooperative network
CN111245498B (en) Relay-assisted non-orthogonal multiple access cooperative network secure communication method
CN109451492B (en) Safety transmission method based on artificial noise and beam forming in downlink full-duplex relay network
CN107248908B (en) Hybrid duplex transmission method in cognitive relay network based on relay selection
CN110290558B (en) Safe transmission method based on time delay in cache-assisted multi-relay transmission system
CN110519756A (en) Physical layer safety transmission method of full duplex relay network
Ding et al. Joint scheduling and relay selection in one-and two-way relay networks with buffering
CN102769486B (en) Method for processing relay end signals in bidirectional multi-hop relay system
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
Alabed et al. A simple distributed differential transmit beamforming technique for two-way wireless relay networks
Wang et al. Distributed cooperation and diversity for hybrid wireless networks
CN103236909B (en) Multi-system soft information retransmission method in Rayleigh channel
CN102684771B (en) Combined signal processing method for source port and relay port in multi-user bidirectional multi-relay system
Nguyen et al. Energy harvesting based two-way full-duplex relaying network over a Rician fading environment: performance analysis
CN115278662A (en) Safe transmission method of non-orthogonal multiple access communication system based on cooperative interference strategy
CN105704079B (en) Joint subcarrier in the more relay systems of two-way OFDM based on PLNC inhibits and relay selection method
CN110381561B (en) Safe transmission method based on energy efficiency in cache-assisted multi-relay transmission system
CN111314920B (en) Untrusted relay network system and safe transmission method thereof
Pan et al. Single-relay selections with amplify forwarding and network coding in two-way relay channels
Thakur et al. Secrecy performance of an improved interference-aided RF energy harvesting scheme in two-way multi-antenna relay network
CN108777610B (en) Secure virtual full-duplex relay method for carrying out transmission encryption based on channel state information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant