CN110087234A - A kind of unmanned plane formation secure communication of network method and system - Google Patents

A kind of unmanned plane formation secure communication of network method and system Download PDF

Info

Publication number
CN110087234A
CN110087234A CN201910347608.4A CN201910347608A CN110087234A CN 110087234 A CN110087234 A CN 110087234A CN 201910347608 A CN201910347608 A CN 201910347608A CN 110087234 A CN110087234 A CN 110087234A
Authority
CN
China
Prior art keywords
aerial vehicle
unmanned aerial
vehicle group
secrecy
rate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910347608.4A
Other languages
Chinese (zh)
Other versions
CN110087234B (en
Inventor
冯伟
王宣宣
葛宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201910347608.4A priority Critical patent/CN110087234B/en
Publication of CN110087234A publication Critical patent/CN110087234A/en
Application granted granted Critical
Publication of CN110087234B publication Critical patent/CN110087234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/06TPC algorithms
    • H04W52/14Separate analysis of uplink or downlink
    • H04W52/146Uplink power control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/242TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account path loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/28TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non transmission
    • H04W52/282TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non transmission taking into account the speed of the mobile

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The embodiment of the present invention provides a kind of unmanned plane formation secure communication of network method and system.Wherein, method includes: to obtain the secrecy and rate of the unmanned aerial vehicle group based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group;The transmission power collection is adjusted to maximize the secrecy and rate, and it maintains secrecy described with transmission power collection when rate maximum as the objective emission power collection of the unmanned aerial vehicle group, so that the unmanned aerial vehicle group is communicated according to the objective emission power collection with several described authorization terminals.Method and system provided in an embodiment of the present invention, by adjusting transmission power collection to maximize secrecy and rate, obtain objective emission power collection, so that unmanned aerial vehicle group is communicated according to objective emission power collection with several authorization terminals, the safety for having ensured information transmission, improves the safety of unmanned plane formation network communication.

Description

A kind of unmanned plane formation secure communication of network method and system
Technical field
The present invention relates to field of information security technology more particularly to a kind of unmanned plane formation secure communication of network method and it is System.
Background technique
In recent years, due to small in size, at low cost and easy deployment the advantages that, unmanned plane has obtained extensively in wireless communication field Using.It can apply many aspects in mobile communication, such as move the collection etc. of covering, mobile relay and mobile data. Currently, it is certain in emergency circumstances, such as public safety, logistics and forest fire monitoring etc., the collaboration communication that unmanned plane is formed into columns Mode is also increasingly taken seriously, it played an important role the performance requirement met between multiple no-manned plane and 5G communication.
As unmanned plane is public, commonly used in civil and military, the safety problem in UAV Communication is also more next More it is taken seriously.The protrusion challenge of unmanned plane in the field of wireless communication is the safe transmission problem of information, due to wireless The dynamic of the intrinsic opening of communication channel, the broadcast of radio signal and Communication Network for UAVS topology, it is easy to make At leakage and eavesdropping of the information in transmission process, so that the communication security to unmanned plane threatens.Although existing encryption Methods and techniques play safely certain effect to UAV Communication, for example, using traditional cipher mode based on key and Safety of physical layer technology etc. based on wireless channel physical features, but answering due to unmanned plane formation network dynamic topology structure The communication security of polygamy, unmanned plane formation network cannot still ensure.
Summary of the invention
In order to solve the problems in the existing technology, it is logical to provide a kind of unmanned plane formation network security for the embodiment of the present invention Believe method and system.
In a first aspect, the embodiment of the present invention provides a kind of unmanned plane formation secure communication of network method, comprising:
Based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, described in acquisition The secrecy and rate of unmanned aerial vehicle group;Wherein, the multiple terminal includes that several authorization terminals and one are moveable unauthorized Terminal, the channel information include large-scale channel information and small scale channel information, and the transmission power collection includes the nothing Transmission power when man-machine group communicates with each authorization terminal, the secrecy and rate are for characterizing the unmanned aerial vehicle group Secure communication performance;
The transmission power collection is adjusted to maximize the secrecy and rate, and maintain secrecy described and institute when rate maximum Objective emission power collection of the transmission power collection as the unmanned aerial vehicle group is stated, so that the unmanned aerial vehicle group is sent out according to the target Power collection is penetrated to be communicated with several described authorization terminals.
Second aspect, the embodiment of the present invention provide a kind of unmanned plane formation secure communication of network system, comprising:
Secrecy and rate obtain module, for channel information and the unmanned plane based on unmanned aerial vehicle group Yu multiple terminal rooms The transmission power collection of group, obtains the secrecy and rate of the unmanned aerial vehicle group;Wherein, the multiple terminal includes that several authorizations are whole End and a moveable unauthorized terminal, the channel information includes large-scale channel information and small scale channel information, institute Stating transmission power collection includes the transmission power when unmanned aerial vehicle group is communicated with each authorization terminal, the secrecy and rate For characterizing the secure communication performance of the unmanned aerial vehicle group;
Secrecy and rate maximize module, for adjusting the transmission power collection to maximize the secrecy and rate, and Using the secrecy with transmission power collection when rate maximum as the objective emission power collection of the unmanned aerial vehicle group, so that The unmanned aerial vehicle group is communicated according to the objective emission power collection with several described authorization terminals.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory Computer program that is upper and can running on a processor, is realized when the processor executes described program as first aspect provides Method the step of.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating Machine program is realized as provided by first aspect when the computer program is executed by processor the step of method.
A kind of unmanned plane formation secure communication of network method and system provided in an embodiment of the present invention, by unmanned aerial vehicle group with The channel information of multiple terminal rooms comprising large-scale channel information and small scale channel information, and combine the hair of unmanned aerial vehicle group Power collection is penetrated, obtains the secrecy and rate of the unmanned aerial vehicle group, and by adjusting transmission power collection to maximize secrecy and rate, Objective emission power collection is obtained, so that unmanned aerial vehicle group is led to according to the objective emission power collection with several authorization terminals Letter has ensured the safety of information transmission, has improved the safety of unmanned plane formation network communication.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of unmanned plane formation secure communication of network method flow diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of unmanned plane formation secure communication of network system provided in an embodiment of the present invention;
Fig. 3 is the entity structure schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment in order to better illustrate the present invention is first illustrated unmanned plane formation network: unmanned plane formation net Network is commonly referred to as the network being made of unmanned aerial vehicle group and several authorization terminals, wherein unmanned aerial vehicle group generally includes multiple nothings Man-machine, authorization terminal refers to the legal terminal that information transmission is carried out with unmanned aerial vehicle group.But in unmanned aerial vehicle group and authorization terminal During carrying out information transmission, due to the opening of communication environments, it will usually there is unauthorized terminal to carry out listening in information, In, unauthorized terminal is commonly referred to as the illegal terminal of transmitted information between eavesdropping unmanned aerial vehicle group and authorization terminal.Therefore, nobody Unauthorized terminal is also typically included in machine formation network.The eavesdropping of unauthorized terminal in order to prevent guarantees unmanned plane formation network Communications security, the embodiment of the invention provides a kind of unmanned plane formation secure communication of network methods.
Fig. 1 is a kind of unmanned plane formation secure communication of network method flow diagram provided in an embodiment of the present invention, such as Fig. 1 institute Show, this method comprises:
Step 101, based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, Obtain the secrecy and rate of the unmanned aerial vehicle group;Wherein, the multiple terminal includes that several authorization terminals and one are removable Unauthorized terminal, the channel information includes large-scale channel information and small scale channel information, the transmission power Ji Bao The transmission power when unmanned aerial vehicle group is communicated with each authorization terminal is included, the secrecy and rate are for characterizing the nothing The secure communication performance of man-machine group.
Specifically, embodiment in order to better illustrate the present invention, first has the application environment of the embodiment of the present invention Body explanation.
The unmanned aerial vehicle group in unmanned plane formation network in the embodiment of the present invention includes L unmanned plane, unmanned plane formation net Multiple terminals in network include K authorization terminal (being denoted as B) and 1 unauthorized terminal (being denoted as E).Unmanned aerial vehicle group takes multiple spot to assist The mode of work, forms virtual multi-antenna transmission end, and contained antenna number is L.Antenna number contained by each authorization terminal user For NB, antenna number contained by unauthorized terminal user is NE.The airborne period of unmanned plane is TUComprising two parts, several Flight time section and several hovering periods.Unmanned aerial vehicle group only carries out information transmission with authorization terminal within the hovering period, And within each hovering period, unmanned aerial vehicle group only carries out information transmission with a scheduled authorization terminal.In addition, each Authorization terminal is only scheduled primary in the airborne period of entire unmanned plane.Due to the presence of unauthorized terminal, unauthorized end End can eavesdrop the information transmitted between unmanned aerial vehicle group and authorization terminal within each hovering period.Assuming that being authorized to K The hovering period of terminal is respectively π1,...,πK.For convenience of calculation, it is further assumed that πk=π, k=1 ..., K.
Assuming that it is respectively A, B and C that L, which is 3,3 unmanned planes, 2,2 authorization terminals of K are respectively first and second, and 1 unauthorized Terminal is third.Also, unmanned aerial vehicle group is only communicated with first within the hovering period 1, is only carried out with second within the hovering period 2 Communication, due to third presence, within this 2 hovering periods, third will do it listening in information.At this time:
The large-scale channel information of unmanned aerial vehicle group and multiple terminal rooms, comprising:
A's and the large-scale channel information of first, the large-scale channel information of B and first, C and first within the hovering period 1 Large-scale channel information, the large-scale channel information of A and third, the large-scale channel information of B and third, C and third large scale channel Information;And A and the large-scale channel information of second, the large-scale channel information of B and second, C and second within the hovering period 2 Large-scale channel information, the large-scale channel information of A and third, the large-scale channel information of B and third, C and third large scale letter Road information.
It should be noted that the content that the small scale channel information of unmanned aerial vehicle group and multiple terminal rooms includes is as above, only need Large-scale channel information in above content is replaced with small scale channel information, details are not described herein again.
The transmission power collection of unmanned aerial vehicle group refers to transmitting function when unmanned aerial vehicle group is communicated with each authorization terminal Rate specifically includes:
Transmission power when A is communicated with first, transmission power when being communicated with second;Transmission power and second when B is communicated with first Transmission power when communication;And transmission power of C when being communicated with first, transmission power when being communicated with second.
Channel information based on unmanned aerial vehicle group Yu multiple terminal rooms comprising large-scale channel information and small scale channel letter Breath, and the transmission power collection of unmanned aerial vehicle group is combined, obtain the secrecy and rate of unmanned aerial vehicle group, wherein secrecy and rate are used for table Levy the communication security degree of unmanned aerial vehicle group.
Step 102, the transmission power collection is adjusted to maximize the secrecy and rate, and most by the secrecy and rate Objective emission power collection of the transmission power collection as unmanned aerial vehicle group when big, so that the unmanned aerial vehicle group is according to institute Objective emission power collection is stated to be communicated with several described authorization terminals.
Specifically, secrecy and rate are higher, then the communication security degree of unmanned aerial vehicle group is higher, therefore, implement in the present invention By adjusting the transmission power collection of unmanned aerial vehicle group to maximize secrecy and rate in example, and will maintain secrecy and adjustment when rate maximum Objective emission power collection of the transmission power collection afterwards as unmanned aerial vehicle group so that unmanned aerial vehicle group with several authorization terminals into Information is sent to several authorization terminals according to objective emission power collection when row communication, thus ensure the safety of information transmission, Improve the safety of unmanned plane formation network communication.
Method provided in an embodiment of the present invention passes through the channel information of unmanned aerial vehicle group and multiple terminal rooms comprising big ruler Channel information and small scale channel information are spent, and combines the transmission power collection of unmanned aerial vehicle group, obtains the secrecy and speed of unmanned aerial vehicle group Rate, and by adjusting transmission power collection to maximize secrecy and rate, objective emission power collection is obtained, so that unmanned aerial vehicle group It is communicated according to the objective emission power collection with several authorization terminals, has ensured the safety of information transmission, improved nothing The safety of man-machine formation network communication.
Based on any of the above-described embodiment, large-scale channel information of the embodiment of the present invention to unmanned aerial vehicle group and multiple terminal rooms Acquisition be illustrated.Based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, The secrecy and rate of the unmanned aerial vehicle group are obtained, before further include:
Step 001, the unmanned aerial vehicle group each hovering period in, obtain in the unmanned aerial vehicle group it is any nobody Machine between counterpart terminal at a distance from.
Specifically, the process for obtaining a unmanned plane and the large-scale channel information of a terminal room is said first It is bright:
Assuming that the coordinate that first of unmanned plane hovers in the period at k-th in unmanned aerial vehicle group is (wl,k,sl,k,hl,k), In (wl,k,sl,k) indicate first of unmanned plane horizontal coordinate, hl,kIndicate the flying height of first of unmanned plane.Assuming that authorization is eventually The space coordinate of end and unauthorized terminal is (rq,k,tq,k, 0), wherein q ∈ { B, E }.Then first of unmanned plane and terminal q are in kth Distance d in a hovering periodql,kAre as follows:
Step 002, according to the distance, the path loss between the unmanned plane and the counterpart terminal is obtained.
Specifically, the large scale path loss within k-th of hovering period, between first of unmanned plane and terminal q(as unit of dB) are as follows:
Wherein, A=ηLoSNLoS,It is the elevation angle of first of unmanned plane relative to terminal q, a、b、ηLoSAnd ηNLoSIt is constant related with gain environment, f is carrier frequency, and c indicates the light velocity.
Step 003, according to the path loss, the absolute power damage between the unmanned plane and the counterpart terminal is obtained Consumption, and the absolute power is lost as the large-scale channel information between the unmanned plane and the counterpart terminal.
Specifically, Q is lost in the absolute power of first of unmanned plane and terminal q within k-th of hovering periodql,kAre as follows:
And as the large-scale channel information of first of unmanned plane and terminal q.
Step 004, using all large-scale channel informations obtained in several periods of hovering as the unmanned aerial vehicle group With the large-scale channel information of multiple terminal rooms.
Specifically, according to the process in step 001~003, the large scale of unmanned aerial vehicle group Yu multiple terminal rooms can be got Channel information.
Based on any of the above-described embodiment, the step 101 in above-described embodiment is specifically described in the embodiment of the present invention, i.e., Based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, the unmanned aerial vehicle group is obtained Secrecy and rate, comprising:
Step 1011, it within each hovering period of the unmanned aerial vehicle group, is awarded according to the unmanned aerial vehicle group with corresponding The transmission power when channel information and the unmanned aerial vehicle group for weighing terminal room are communicated with the authorization terminal, obtains the nothing First secrecy rate of the man-machine group within the hovering period.
Specifically, for any hovering period, believed according to the large scale channel between unmanned aerial vehicle group and corresponding authorization terminal Breath and small scale channel information construct the channel matrix between unmanned aerial vehicle group and the authorization terminal, and then according to channel matrix and nothing Transmission power when man-machine group communicates with the authorization terminal obtains first secrecy of the unmanned aerial vehicle group within the hovering period Rate.
Wherein, the process for constructing channel matrix is as follows:
Unmanned aerial vehicle group and the channel information between corresponding authorization terminal are obtained, channel matrix is formed.Wherein, first of unmanned plane Channel information h between terminal qql,kAre as follows:
Wherein,It indicates small scale channel information, the channel is chosen to be Rayleigh channel herein.
Virtual N is formed between unmanned aerial vehicle group and terminalqThe MIMO link of × L, channel matrixIt can be with It is expressed as
Hq,k=Sq,kQq,k,q∈{B,E}
Wherein, Hq,k=[hq1,k,hq2,k,...,hqL,k], Sq,k=[sq1,k,sq2,k,...,sqL,k],
At this point, the first secrecy rate can be calculate by the following formula:
Wherein, RB,k(Pk) indicate the first secrecy rate hovered in the period at k-th,For based on SB,kAsk Average calculating operation symbol, det are square matrix function,For dimension NB×NBUnit matrix, HB,kFor in k-th of hovering period nobody Channel matrix between a group of planes and scheduled authorization terminal, PkIt is awarded for unmanned aerial vehicle group in k-th of period of hovering with scheduled Transmission power when power terminal is communicated, ()HFor conjugate transposition, δ2For noise variance.
Step 1012, within the hovering period, according to the channel of the unmanned aerial vehicle group and corresponding unauthorized terminal room Transmission power when information and the unmanned aerial vehicle group are communicated with the authorization terminal obtains the unmanned aerial vehicle group described outstanding Stop the second secrecy rate in the period.
Specifically, the embodiment of the present invention obtains the process of the second secrecy rate and obtains the process class of the first secrecy rate Seemingly, details are not described herein again, at this point, the second secrecy rate can be calculate by the following formula:
Wherein, RE,k(Pk) indicate the second secrecy rate hovered in the period at k-th,For based on SE,kAsk flat Equal operator, det are square matrix function,For dimension NE×NEUnit matrix, HE,kFor unmanned plane in k-th of hovering period The channel matrix of group and unauthorized terminal room, PkFor unmanned aerial vehicle group in k-th of period of hovering and scheduled authorization terminal into Transmission power when row communication, ()HFor conjugate transposition, δ2For noise variance.
Step 1013, all first secrecy rates according to the unmanned aerial vehicle group within several hovering periods and all Second secrecy rate obtains the secrecy and rate of the unmanned aerial vehicle group.
Specifically, by the mean value of the sum of several all first secrecy rates hovered in the period and all second secrecy The mean value of the sum of rate is subtracted each other, and the secrecy and rate of unmanned aerial vehicle group can be obtained.
Based on any of the above-described embodiment, the step 102 in above-described embodiment is specifically described in the embodiment of the present invention, i.e., The transmission power collection is adjusted to maximize the secrecy and rate, comprising:
Step 1021, using large-scale channel information, the secrecy and rate are converted into target secrecy and rate.
Specifically, due to, there are small scale channel information, being mathematically difficult to secrecy and speed in secrecy and rate Rate is maximized, and therefore, is rejected all small scale channel informations in secrecy and rate, is utilized unmanned aerial vehicle group and multiple terminals Between large-scale channel information, will maintain secrecy and rate be converted to target secrecy and rate.
Step 1022, it is based on block coordinate descent, target secrecy and rate are optimized, realized described in maximizing Secrecy and rate.
Specifically, block coordinate descent be a kind of non-gradient optimization algorithm.Algorithm in each iteration, at current point Linear search is carried out along a coordinate direction in the hope of the local minimum of a function.It is recycled in the whole process different Coordinate direction.For the function that can not be split, algorithm possibly can not acquire optimal solution in lesser iterative steps.For Accelerate convergence, can use a coordinate system appropriate, such as is obtained between coordinate as far as possible not by principal component analysis Be mutually related new coordinate system.
It is maintained secrecy by block coordinate descent to target and rate optimizes, can be realized the maximization of secrecy and rate.
Based on any of the above-described embodiment, the step 1011 in above-described embodiment is specifically described in the embodiment of the present invention, The formula of i.e. described secrecy and rate R (Φ) are as follows:
Wherein, RB(Φ) is the equal of the sum of all first secrecy rates of unmanned aerial vehicle group within several hovering periods Value, RE(Φ) is the mean value of the sum of all second secrecy rates of unmanned aerial vehicle group within several hovering periods,For transmission power collection, K is the number of authorization terminal,For based on SB,kAveraging operator, det is Square matrix function,For dimension NB×NBUnit matrix, HB,kIt is awarded for unmanned aerial vehicle group in k-th of period of hovering with scheduled Weigh the channel matrix of terminal room, PkWhen being communicated for unmanned aerial vehicle group in k-th of period of hovering with scheduled authorization terminal Transmission power, ()HFor conjugate transposition, δ2For noise variance,For based on SE,kAveraging operator,For dimension NE×NEUnit matrix, HE,kFor the channel matrix of unmanned aerial vehicle group and unauthorized terminal room in k-th of period of hovering;
The target secrecy and rateFormula are as follows:
Wherein,For unmanned aerial vehicle group several hovering periods in the first secrecy of all targets rate it The mean value of sum,For the sum of all targets the second secrecy rate of the unmanned aerial vehicle group within several hovering periods Mean value,For transmission power collection, For the auxiliary of introducing Variable, K are the number of authorization terminal, ILFor the unit matrix of dimension L × L, NBFor antenna number contained by authorization terminal, QB,kIt is Large-scale channel information in k hovering period between unmanned aerial vehicle group and scheduled authorization terminal, PkFor k-th of hovering time Transmission power when unmanned aerial vehicle group is communicated with scheduled authorization terminal in section, δ2For noise variance, e is natural constant, NE For antenna number contained by unauthorized terminal, QE,kFor the large scale of unmanned aerial vehicle group and unauthorized terminal room in k-th of period of hovering Channel information.
Based on any of the above-described embodiment, the step 1022 in above-described embodiment is specifically described in the embodiment of the present invention, Namely based on block coordinate descent, target secrecy and rate are optimized, comprising:
Based on block coordinate descent, to transmission power collection, auxiliary machine variable tBWith auxiliary variable tEAlternating iteration is carried out, and Optimum transmission power collection is solved using convex optimization tool and the first order Taylor method of development;
Corresponding secrecy and rate are obtained according to the optimum transmission power collection Φ, is preset if the secrecy and rate meet Condition is then completed to optimize.
Specifically, optimization process is as follows:
(1) initiation parameter
Initialize the transmission power collection of unmanned aerial vehicle groupAnd the thresholding of given algorithm iteration ends Value ε.
(2) optimization aim is to maximize secrecy and rate.In the unmanned aerial vehicle group of acquisition and the large scale channel of multiple terminals On Information base, optimization problem be can be described as:
tB≥0
tE≥0
Wherein, pl,kFor first of unmanned plane transmission power, P within k-th of hovering period in unmanned plane formationmaxIt indicates The limit value of power constraint, EmaxIndicate the limit value of energy constraint.
(3) block coordinate descent is used, to optimized variable Φ, tBAnd tEAlternating iteration is carried out, so that it is optimal to acquire problem Solution.Specific implementation step is as follows:
(3-1) gives Φ, tBIt can be solved by following optimization problem.
s.t.tB≥0
The problem is convex optimization problem, and convex optimization tool can be directly used and solved.
(3-2) gives Φ, tEIt can be solved by following optimization problem.
s.t.tE≥0
The problem is convex optimization problem, and convex optimization tool can be directly used and effectively solved.
(3-3) gives tBAnd tE, Φ can be solved by following optimization problem.
The objective function is non-convex function, therefore optimization problem is non-convex optimization problem.It, will using the first order Taylor method of developmentPointExpansion obtains:
At this point, the optimization problem is further converted to:
Optimization problem after conversion is convex optimization problem, can carry out solving to obtain optimal hair using convex optimization tool Penetrate power collection Φ.
(4) corresponding secrecy and rate are obtained according to optimum transmission power collection Φ, if secrecy and rate meet preset condition, It then completes to optimize, otherwise, the optimum transmission power collection Φ got according to this repeats step (3-1)-(3-3) mistake Journey, until secrecy and rate meet preset condition.
Based on any of the above-described embodiment, the embodiment of the present invention is illustrated the preset condition in above-described embodiment, i.e. institute State preset condition are as follows:
Wherein, R (Φ) is the secrecy and rate that current iteration obtains, R0(Φ) is the secrecy and speed that last iteration obtains Rate, ε are preset threshold.
Based on any of the above-described embodiment, Fig. 2 is a kind of unmanned plane formation secure communication of network provided in an embodiment of the present invention The structural schematic diagram of system, as shown in Fig. 2, the system includes:
Secrecy and rate obtain module 201, for based on unmanned aerial vehicle group and multiple terminal rooms channel information and the nothing The transmission power collection of man-machine group obtains the secrecy and rate of the unmanned aerial vehicle group;Wherein, the multiple terminal includes that several are awarded Terminal and a moveable unauthorized terminal are weighed, the channel information includes large-scale channel information and small scale channel letter Breath, the transmission power collection includes the transmission power when unmanned aerial vehicle group is communicated with each authorization terminal, the secrecy It is used to characterize the secure communication performance of the unmanned aerial vehicle group with rate;Secrecy and rate maximize module 202, described for adjusting Transmission power collection to maximize the secrecy and rate, and transmission power collection when using the secrecy and rate maximum as The objective emission power collection of the unmanned aerial vehicle group, if so that the unmanned aerial vehicle group is according to the objective emission power collection and described A dry authorization terminal is communicated.
System provided in an embodiment of the present invention, specifically executes above-mentioned each method embodiment process, please specifically be detailed in above-mentioned each The content of embodiment of the method, details are not described herein again.System provided in an embodiment of the present invention passes through unmanned aerial vehicle group and multiple terminal rooms Channel information comprising large-scale channel information and small scale channel information, and combine unmanned aerial vehicle group transmission power collection, obtain The secrecy and rate of the unmanned aerial vehicle group are taken, and by adjusting transmission power collection to maximize secrecy and rate, obtains target hair Power collection is penetrated, so that unmanned aerial vehicle group is communicated according to the objective emission power collection with several authorization terminals, is ensured The safety of information transmission, improves the safety of unmanned plane formation network communication.
Fig. 3 is the entity structure schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention, as shown in figure 3, the electronics Equipment may include: processor (processor) 301, communication interface (Communications Interface) 302, storage Device (memory) 303 and communication bus 304, wherein processor 301, communication interface 302, memory 303 pass through communication bus 304 complete mutual communication.Processor 301, which can call, to be stored on memory 303 and can run on processor 301 Computer program, the method to execute the various embodiments described above offer, for example, the letter based on unmanned aerial vehicle group Yu multiple terminal rooms The transmission power collection of road information and the unmanned aerial vehicle group obtains the secrecy and rate of the unmanned aerial vehicle group;Wherein, the multiple end End includes several authorization terminals and a moveable unauthorized terminal, the channel information include large-scale channel information with Small scale channel information, the transmission power collection include the transmitting function when unmanned aerial vehicle group is communicated with each authorization terminal Rate, the secrecy and rate are used to characterize the secure communication performance of the unmanned aerial vehicle group;The transmission power collection is adjusted with maximum Change the secrecy and rate, and maintains secrecy described with transmission power collection when rate maximum as the mesh of the unmanned aerial vehicle group Transmission power collection is marked, so that the unmanned aerial vehicle group is carried out according to the objective emission power collection and several described authorization terminals Communication.
In addition, the logical order in above-mentioned memory 303 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally The technical solution of the inventive embodiments substantially part of the part that contributes to existing technology or the technical solution in other words It can be embodied in the form of software products, which is stored in a storage medium, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the present invention respectively The all or part of the steps of a embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk Etc. the various media that can store program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, The computer program is implemented to carry out the transmission method of the various embodiments described above offer when being executed by processor, for example, be based on Unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, obtain the guarantor of the unmanned aerial vehicle group Close and rate;Wherein, the multiple terminal includes several authorization terminals and a moveable unauthorized terminal, the channel Information includes large-scale channel information and small scale channel information, and the transmission power collection includes that the unmanned aerial vehicle group is awarded with each Transmission power when power terminal is communicated, the secrecy and rate are used to characterize the secure communication performance of the unmanned aerial vehicle group; The transmission power collection is adjusted to maximize the secrecy and rate, and maintain secrecy described and transmitting function when rate maximum Objective emission power collection of the rate collection as the unmanned aerial vehicle group, so that the unmanned aerial vehicle group is according to the objective emission power collection It is communicated with several described authorization terminals.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of unmanned plane formation secure communication of network method characterized by comprising
Based on unmanned aerial vehicle group and the channel information of multiple terminal rooms and the transmission power collection of the unmanned aerial vehicle group, obtain it is described nobody The secrecy and rate of a group of planes;Wherein, the multiple terminal includes several authorization terminals and a moveable unauthorized terminal, The channel information includes large-scale channel information and small scale channel information, and the transmission power collection includes the unmanned aerial vehicle group The safety that transmission power when being communicated with each authorization terminal, the secrecy and rate are used to characterize the unmanned aerial vehicle group is logical Believe performance;
The transmission power collection is adjusted to maximize the secrecy and rate, and maintain secrecy described and hair when rate maximum Objective emission power collection of the power collection as the unmanned aerial vehicle group is penetrated, so that the unmanned aerial vehicle group is according to the objective emission function Rate collection is communicated with several described authorization terminals.
2. unmanned plane formation secure communication of network method according to claim 1, which is characterized in that based on unmanned aerial vehicle group with The transmission power collection of the channel information of multiple terminal rooms and the unmanned aerial vehicle group obtains the secrecy and rate of the unmanned aerial vehicle group, Before further include:
Within each hovering period of the unmanned aerial vehicle group, any unmanned plane and counterpart terminal in the unmanned aerial vehicle group are obtained Between distance;
According to the distance, the path loss between the unmanned plane and the counterpart terminal is obtained;
According to the path loss, the absolute power loss between the unmanned plane and the counterpart terminal is obtained, and will be described exhausted To power loss as the large-scale channel information between the unmanned plane and the counterpart terminal;
Using all large-scale channel informations obtained in several periods of hovering as the unmanned aerial vehicle group and the multiple end Large-scale channel information between end.
3. unmanned plane formation secure communication of network method according to claim 1, which is characterized in that based on unmanned aerial vehicle group with The transmission power collection of the channel information of multiple terminal rooms and the unmanned aerial vehicle group obtains the secrecy and rate of the unmanned aerial vehicle group, Include:
Within each hovering period of the unmanned aerial vehicle group, according to the channel between the unmanned aerial vehicle group and corresponding authorization terminal Transmission power when information and the unmanned aerial vehicle group are communicated with the authorization terminal obtains the unmanned aerial vehicle group described outstanding Stop the first secrecy rate in the period;
Within the hovering period, according to the unmanned aerial vehicle group and the channel information of corresponding unauthorized terminal room and it is described nobody A transmission power when group of planes is communicated with the authorization terminal obtains the of the unmanned aerial vehicle group within the hovering period Two secrecy rates;
According to the unmanned aerial vehicle group several hovering periods in all first secrecy rates and all second secrecy rates, Obtain the secrecy and rate of the unmanned aerial vehicle group.
4. unmanned plane formation secure communication of network method according to claim 3, which is characterized in that adjust the transmitting function Rate collection is to maximize the secrecy and rate, comprising:
Using large-scale channel information, the secrecy and rate are converted into target secrecy and rate;
Based on block coordinate descent, target secrecy and rate are optimized, realizes and maximizes the secrecy and rate.
5. unmanned plane formation secure communication of network method according to claim 4, which is characterized in that the secrecy and rate The formula of R (Φ) are as follows:
Wherein, RB(Φ) is the mean value of the sum of all first secrecy rates of unmanned aerial vehicle group within several hovering periods, RE (Φ) is the mean value of the sum of all second secrecy rates of unmanned aerial vehicle group within several hovering periods,For Transmission power collection, K are the number of authorization terminal,For based on SB,kAveraging operator, det be square matrix function,For Dimension NB×NBUnit matrix, HB,kFor the channel in k-th of period of hovering between unmanned aerial vehicle group and scheduled authorization terminal Matrix, PkTransmission power when being communicated for unmanned aerial vehicle group in k-th of period of hovering with scheduled authorization terminal, ()H For conjugate transposition, δ2For noise variance,For based on SE,kAveraging operator,For dimension NE×NEUnit square Battle array, HE,kFor the channel matrix of unmanned aerial vehicle group and unauthorized terminal room in k-th of period of hovering;
The target secrecy and rateFormula are as follows:
Wherein,For the sum of all targets the first secrecy rate of the unmanned aerial vehicle group within several hovering periods Mean value,For the equal of the sum of all targets the second secrecy rate of the unmanned aerial vehicle group within several hovering periods Value,For transmission power collection,WithBecome for the auxiliary of introducing Amount, K are the number of authorization terminal, ILFor the unit matrix of dimension L × L, NBFor antenna number contained by authorization terminal, QB,kFor kth Large-scale channel information in a hovering period between unmanned aerial vehicle group and scheduled authorization terminal, PkFor k-th of hovering time Transmission power when unmanned aerial vehicle group is communicated with scheduled authorization terminal in section, δ2For noise variance, e is natural constant, NE For antenna number contained by unauthorized terminal, QE,kFor the large scale of unmanned aerial vehicle group and unauthorized terminal room in k-th of period of hovering Channel information.
6. unmanned plane formation secure communication of network method according to claim 5, which is characterized in that declined based on block coordinate Method optimizes target secrecy and rate, comprising:
Based on block coordinate descent, to transmission power collection, auxiliary variable tBWith auxiliary variable tEAlternating iteration is carried out, and is utilized convex Optimization tool and the first order Taylor method of development solve optimum transmission power collection;
Corresponding secrecy and rate are obtained according to the optimum transmission power collection, if the secrecy and rate meet preset condition, It then completes to optimize.
7. unmanned plane formation secure communication of network method according to claim 6, which is characterized in that the preset condition Are as follows:
Wherein, R (Φ) is the secrecy and rate that current iteration obtains, R0(Φ) is the secrecy and rate that last iteration obtains, ε For preset threshold.
8. a kind of unmanned plane formation secure communication of network system characterized by comprising
Secrecy and rate obtain module, for channel information and the unmanned aerial vehicle group based on unmanned aerial vehicle group and multiple terminal rooms Transmission power collection obtains the secrecy and rate of the unmanned aerial vehicle group;Wherein, the multiple terminal include several authorization terminals and One moveable unauthorized terminal, the channel information includes large-scale channel information and small scale channel information, the hair Penetrating power collection includes the transmission power when unmanned aerial vehicle group is communicated with each authorization terminal, and the secrecy and rate are used for Characterize the secure communication performance of the unmanned aerial vehicle group;
Secrecy and rate maximize module, for adjusting the transmission power collection to maximize the secrecy and rate, and by institute Objective emission power collection of the transmission power collection as unmanned aerial vehicle group when stating secrecy and rate maximum, so that described Unmanned aerial vehicle group is communicated according to the objective emission power collection with several described authorization terminals.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realized when executing described program it is as described in any one of claim 1 to 7 nobody The step of machine formation secure communication of network method.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer Unmanned plane formation secure communication of network method as described in any one of claim 1 to 7 is realized when program is executed by processor Step.
CN201910347608.4A 2019-04-28 2019-04-28 Unmanned aerial vehicle formation network security communication method and system Active CN110087234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910347608.4A CN110087234B (en) 2019-04-28 2019-04-28 Unmanned aerial vehicle formation network security communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910347608.4A CN110087234B (en) 2019-04-28 2019-04-28 Unmanned aerial vehicle formation network security communication method and system

Publications (2)

Publication Number Publication Date
CN110087234A true CN110087234A (en) 2019-08-02
CN110087234B CN110087234B (en) 2020-07-14

Family

ID=67417182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910347608.4A Active CN110087234B (en) 2019-04-28 2019-04-28 Unmanned aerial vehicle formation network security communication method and system

Country Status (1)

Country Link
CN (1) CN110087234B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708108A (en) * 2019-08-07 2020-01-17 西北工业大学 Wave beam control optimization method of multi-unmanned-aerial-vehicle millimeter wave network
CN110855342A (en) * 2019-10-29 2020-02-28 中国科学院上海微系统与信息技术研究所 Control method and device for unmanned aerial vehicle communication safety, electronic equipment and storage medium
CN112468437A (en) * 2020-10-22 2021-03-09 北京邮电大学 Method, device, equipment and storage medium for transmitting data
CN112996117A (en) * 2021-02-02 2021-06-18 清华大学 Safe communication method and device in satellite unmanned aerial vehicle cooperative coverage network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337041A (en) * 2018-04-20 2018-07-27 宁波光舟通信技术有限公司 A kind of vehicular communication system
CN108540209A (en) * 2018-04-20 2018-09-14 宁波光舟通信技术有限公司 A kind of onboard system of laser beam communications satellite
US20180307867A1 (en) * 2017-04-21 2018-10-25 Lance W. Dover Secure memory device with unique identifier for authentication
CN109640257A (en) * 2019-01-23 2019-04-16 中国人民解放军陆军工程大学 A kind of IOT network security transmission method based on unmanned plane

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180307867A1 (en) * 2017-04-21 2018-10-25 Lance W. Dover Secure memory device with unique identifier for authentication
CN108337041A (en) * 2018-04-20 2018-07-27 宁波光舟通信技术有限公司 A kind of vehicular communication system
CN108540209A (en) * 2018-04-20 2018-09-14 宁波光舟通信技术有限公司 A kind of onboard system of laser beam communications satellite
CN109640257A (en) * 2019-01-23 2019-04-16 中国人民解放军陆军工程大学 A kind of IOT network security transmission method based on unmanned plane

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
潘馨: "基于大规模MIMO的双向AF中继技术研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *
贺子健: "5G移动通信系统增强移动宽带和空地通信性能仿真研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708108A (en) * 2019-08-07 2020-01-17 西北工业大学 Wave beam control optimization method of multi-unmanned-aerial-vehicle millimeter wave network
CN110855342A (en) * 2019-10-29 2020-02-28 中国科学院上海微系统与信息技术研究所 Control method and device for unmanned aerial vehicle communication safety, electronic equipment and storage medium
CN110855342B (en) * 2019-10-29 2021-12-28 中国科学院上海微系统与信息技术研究所 Control method and device for unmanned aerial vehicle communication safety, electronic equipment and storage medium
CN112468437A (en) * 2020-10-22 2021-03-09 北京邮电大学 Method, device, equipment and storage medium for transmitting data
CN112996117A (en) * 2021-02-02 2021-06-18 清华大学 Safe communication method and device in satellite unmanned aerial vehicle cooperative coverage network
CN112996117B (en) * 2021-02-02 2023-02-07 清华大学 Safe communication method and device in satellite unmanned aerial vehicle cooperative coverage network

Also Published As

Publication number Publication date
CN110087234B (en) 2020-07-14

Similar Documents

Publication Publication Date Title
CN110087234A (en) A kind of unmanned plane formation secure communication of network method and system
Xi et al. Joint user association and UAV location optimization for UAV-aided communications
CN105005316B (en) Unmanned plane management-control method and unmanned plane manage platform
Cai et al. Resource allocation and 3D trajectory design for power-efficient IRS-assisted UAV-NOMA communications
CN108092737B (en) The relaying unmanned aerial vehicle flight path planing method of criterion is maximized based on secrecy capacity
CN109511134A (en) Based on the unmanned plane auxiliary radio communication system load shunt method that efficiency is optimal
Tian et al. Stochastic analysis of cooperative satellite-UAV communications
CN110312265B (en) Power distribution method and system for unmanned aerial vehicle formation communication coverage
Zhao et al. Energy-efficient trajectory design for secure SWIPT systems assisted by UAV-IRS
CN112996117A (en) Safe communication method and device in satellite unmanned aerial vehicle cooperative coverage network
CN110855342B (en) Control method and device for unmanned aerial vehicle communication safety, electronic equipment and storage medium
Bhuyan et al. Secure 5G network for a nationwide drone corridor
CN110224782A (en) A kind of unmanned plane formation secure communication of network method and system based on active interference
Zhao et al. Energy efficiency optimization of IRS-assisted UAV networks based on statistical channels
Sun et al. UAV-enabled secure communications via collaborative beamforming with imperfect eavesdropper information
CN114879195A (en) Unmanned aerial vehicle cluster radar communication integration method based on resource scheduling
Park et al. Joint trajectory and resource optimization of MEC-assisted UAVs in sub-THz networks: A resources-based multi-agent proximal policy optimization DRL with attention mechanism
Liang et al. Joint trajectory optimization and spectrum access for cognitive UAV networks
Li et al. Rate splitting multiple access for joint communication and sensing systems with unmanned aerial vehicles
Zeng et al. Three-Dimensional UAV-to-UAV Channels: Modeling, Simulation, and Capacity Analysis
Maeng et al. Interference analysis and mitigation for aerial IoT considering 3D antenna patterns
Li et al. Resource allocation in satellite-based Internet of Things using pattern search method
Wang et al. Location-assisted precoding for three-dimension massive MIMO in air-to-ground transmission
Shabanighazikelayeh et al. Optimal UAV deployment for rate maximization in IoT networks
Ren et al. Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant