CN110225579A - A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply - Google Patents
A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply Download PDFInfo
- Publication number
- CN110225579A CN110225579A CN201910505170.8A CN201910505170A CN110225579A CN 110225579 A CN110225579 A CN 110225579A CN 201910505170 A CN201910505170 A CN 201910505170A CN 110225579 A CN110225579 A CN 110225579A
- Authority
- CN
- China
- Prior art keywords
- node
- interference
- cooperative
- channel
- csi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 90
- 238000000034 method Methods 0.000 title claims abstract description 35
- 239000013598 vector Substances 0.000 claims description 71
- 238000010187 selection method Methods 0.000 claims description 8
- 239000011159 matrix material Substances 0.000 claims description 7
- 238000000610 breath-figure templating Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 235000015429 Mirabilis expansa Nutrition 0.000 claims description 4
- 244000294411 Mirabilis expansa Species 0.000 claims description 4
- 239000000654 additive Substances 0.000 claims description 4
- 230000000996 additive effect Effects 0.000 claims description 4
- 235000013536 miso Nutrition 0.000 claims description 4
- 230000002708 enhancing effect Effects 0.000 claims description 3
- 230000014509 gene expression Effects 0.000 abstract description 12
- 230000007423 decrease Effects 0.000 description 21
- 238000013461 design Methods 0.000 description 11
- 238000004088 simulation Methods 0.000 description 11
- 238000013139 quantization Methods 0.000 description 9
- 238000013459 approach Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 5
- 230000001965 increasing effect Effects 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 238000005457 optimization Methods 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/04—Transmission power control [TPC]
- H04W52/18—TPC being performed according to specific parameters
- H04W52/24—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
- H04W52/243—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种基于无线供能的协作干扰物理层安全传输方法,协作干扰节点利用期望收集功率发送干扰信号,研究了五种情形下系统的安全传输性能;从已知的信道CSI出发,分别研究了所有信道CSI已知的理想情形、窃听者CSI未知情形、协作信道增益排序已知和有限反馈速率信道CSI情形下的不同干扰协作方案的保密性能,推导了各种情形下的连接中断概率和保密中断概率的闭式解,并给出了高SNR近似下的表达式;可以得出系统的连接中断概率和保密中断概率存在一定的折中关系,可以根据不同的系统需求选择和设计系统参数达到安全性‑保密性的折中。
The invention discloses a method for secure transmission of the physical layer of cooperative interference based on wireless power supply. The cooperative interference node uses the expected collection power to send the interference signal, and studies the safe transmission performance of the system in five situations; starting from the known channel CSI, The secrecy performance of different interference cooperation schemes under the ideal situation with known CSI of all channels, the unknown CSI situation of eavesdroppers, the known cooperative channel gain ranking and the limited feedback rate channel CSI situation are respectively studied, and the connection interruption in various situations is derived The closed-form solution of probability and confidentiality interruption probability, and the expression under high SNR approximation; it can be concluded that there is a certain compromise between the connection interruption probability and the confidentiality interruption probability of the system, which can be selected and designed according to different system requirements The system parameters achieve a security-secrecy compromise.
Description
技术领域technical field
本发明涉及网络安全传输技术领域,尤其涉及一基于无线供能的协作干扰物理层安全传输方法种。The present invention relates to the technical field of network security transmission, in particular to a wireless power supply-based cooperative interference physical layer security transmission method.
背景技术Background technique
干扰信号的发送需要消耗能量,虽然友好协作干扰节点(FriendlyThe transmission of jamming signals needs to consume energy, although friendly cooperative jamming nodes (Friendly
Jammer,FJ)可以协助合法用户信息的安全传输,但与此同时消耗了自身的能量。由于节点的自私性和独立性,干扰节点在帮助合法传输的同时,至少应该不损害自身的效益甚至可以得到额外的补偿和奖励。因此,合法用户的发射机需要提供FJ节点发送干扰所需的额外能量,通过无线供能的方式来补偿协作节点所需的能量,可以激励协作节点参与协作安全传输,这更符合实际协作节点参与协作的情况。Jammer, FJ) can assist the secure transmission of legitimate user information, but at the same time consumes its own energy. Due to the selfishness and independence of nodes, interference nodes should at least not harm their own benefits and even receive additional compensation and rewards while helping legal transmission. Therefore, the legal user’s transmitter needs to provide the extra energy required by the FJ node to transmit interference, and the energy required by the cooperative node can be compensated by wireless energy supply, which can encourage the cooperative node to participate in cooperative security transmission, which is more in line with the actual cooperative node participation Collaboration situation.
文献Jiang和Chen研究了功率站通过无线供能激活合法用户传输信息,PB(PowerBeacon)充当了发射机的功率源。Jiang还研究了存在单天线和多天线窃听者Eve时,单天线PB通过无线功能的方式供给多天线发射机能量的系统的物理层安全性能,值得注意的是该方案是通过发射机发送AN来挺高系统的安全性。Huang采用类似于文献的模型,不同之处在于考虑了多个窃听者合谋和非合谋两种不同情形,假设已知过期信道CSI(Outdated CSI,OCSI),研究了发送机采用最大比传输(MRT)和发送天线选择(TAS)两种方法的安全中断概率(SOP)和平均保密速率。Literature Jiang and Chen studied the power station to activate legitimate users to transmit information through wireless energy supply, and PB (Power Beacon) acts as the power source of the transmitter. Jiang also studied the physical layer security performance of the system in which the single-antenna PB supplies energy to the multi-antenna transmitter through the wireless function when there is a single-antenna and multi-antenna eavesdropper Eve. It is worth noting that this scheme uses the transmitter to send AN to Very high system security. Huang adopts a model similar to the literature, the difference is that two different situations of collusion and non-collusion of multiple eavesdroppers are considered, assuming that the outdated channel CSI (Outdated CSI, OCSI) is known, and the transmitter adopts the maximum ratio transmission (MRT ) and transmit antenna selection (TAS) two methods of security outage probability (SOP) and average secrecy rate.
发明内容Contents of the invention
本发明的目的是提供一种基于无线供能的协作干扰物理层安全传输方法,协作干扰节点利用期望收集功率发送干扰信号,在不耗费自身能量的前提下增强了系统的安全性。The purpose of the present invention is to provide a method for secure physical layer transmission of cooperative interference based on wireless energy supply. The cooperative interference node uses the expected collection power to send interference signals, which enhances the security of the system without consuming its own energy.
本发明采用的技术方案为:The technical scheme adopted in the present invention is:
一种基于无线供能的协作干扰物理层安全传输方法,包括以下步骤:A method for secure transmission of cooperative jamming physical layer based on wireless power supply, comprising the following steps:
A:建立考虑MISO的有限速率反馈协作干扰窃听传输模型,包括多天线信源节点S,单天线合法用户D,无线供能的协作干扰节点J和单天线窃听节点E;A: Establish a limited-rate feedback cooperative interference eavesdropping transmission model considering MISO, including multi-antenna source node S, single-antenna legal user D, wireless-powered cooperative interference node J and single-antenna eavesdropping node E;
协作节点可以是多个或者多天线,这里为了计算和分析方便,单天线的协作节点可以看作是从多个协作节点中选择一个最优的协作节点的特殊情况;Cooperating nodes can be multiple or multi-antenna. Here, for the convenience of calculation and analysis, a single-antenna cooperating node can be regarded as a special case of selecting an optimal coordinating node from multiple coordinating nodes;
假设S具有天线数NS,J配置的天线数目为NJ,其余节点都采用单天线;假设信道都是准静态的Rayleigh信道,即在每一个传输块内信道CSI不变,不同传输块间信道CSI是独立变化的;Assume that S has the number of antennas N S , the number of antennas configured by J is N J , and the rest of the nodes use a single antenna; assuming that the channel is a quasi-static Rayleigh channel, that is, the CSI of the channel in each transmission block remains unchanged, and the channel CSI between different transmission blocks Channel CSI varies independently;
B:由于协作干扰节点是自私且能量受限的节点,发送干扰信号的能量来自于对源节点发送功率的能量收集,采用收集能量的期望值代替实时值;采用时分传输协议,整个传输过程分为两阶段;B: Since the cooperative interference node is a selfish and energy-limited node, the energy for sending the interference signal comes from the energy collection of the source node’s transmission power, and the expected value of the collected energy is used instead of the real-time value; using a time-division transmission protocol, the entire transmission process is divided into two stages;
B1:第一阶段,源节点S作为能量源无线供能给协作干扰节点J;B1: In the first stage, the source node S serves as an energy source to wirelessly supply energy to the cooperative interference node J;
定义α为时间分割比,假设一个时隙的长度为T,其中刚开始的αT,0<α<1用于第一阶段的无线供能,剩余的时隙(1-α)T用于信息传输;Define α as the time division ratio, assuming that the length of a time slot is T, where the initial αT, 0<α<1 is used for the wireless energy supply in the first stage, and the remaining time slot (1-α)T is used for information transmission;
第一阶段,协作干扰节点J接收到的来自源节点S的能量信号可表示为In the first stage, the energy signal received by the cooperative interference node J from the source node S can be expressed as
其中PS是源节点的发送功率,HSJ表示无线供能信道,是一个NJ×NS的矩阵且每个元素都是服从独立同分布的零均值方差为λ1的复高斯随机变量,xS表示NS×1的能量信号向量且满足总功率限制条件nS表示NS×1的高斯加性白噪声向量且 Where PS is the transmission power of the source node, H SJ represents the wireless power supply channel, which is a matrix of N J × N S and each element is a complex Gaussian random variable with zero mean and variance λ 1 that obeys independent and identical distribution, x S represents the energy signal vector of N S ×1 and satisfies the total power limit condition nS represents a Gaussian additive white noise vector of N S ×1 and
因此,在第一阶段结束时,协作干扰节点J获得的总能量为Therefore, at the end of the first stage, the total energy obtained by the cooperative interference node J is
其中η(0<η<1)表示能量转化效率;Wherein η (0<η<1) represents energy conversion efficiency;
由于协作干扰节点J的自私性和友好性,即以收集能量的期望发送干扰信号,从而节点J的发送功率可以写为Due to the selfishness and friendliness of the cooperative interference node J, that is, to send interference signals with the expectation of collecting energy, the transmission power of node J can be written as
B2:第二阶段,源节点S传输信息给目的节点D,与此同时协作干扰节点发送干扰信号,窃听节点窃听有用信息;B2: In the second stage, the source node S transmits information to the destination node D, and at the same time, the cooperative interference node sends an interference signal, and the eavesdropping node eavesdrops on useful information;
根据协作节点所已知的信道CSI,采用以下两种协作干扰方案:线性波束赋形BF方法和天线选择AS方法;According to the channel CSI known by the cooperative nodes, the following two cooperative interference schemes are adopted: the linear beamforming BF method and the antenna selection AS method;
B2-1:线性波束赋形BF方法B2-1: Linear beamforming BF method
由于协作节点处配置多天线,可利用多天线形成波束赋形传输信号以增强目的节点接收的可靠性和安全性;Since multi-antennas are configured at the cooperative nodes, multi-antennas can be used to form beamforming transmission signals to enhance the reliability and security of destination node reception;
因此,合法用户的接收信号可表示为Therefore, the received signal of a legitimate user can be expressed as
其中hsd是NS×1的向量,表示合法信道系数;hjd是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道;hsd和hjd中的各元素分别是服从零均值方差为λ2和λ4的独立同分布复高斯随机变量;源节点的波束赋形采用最大比传输,即w1=h'sd/||hsd||是NS×1的波束赋形向量,x是单位功率的源信号,w2是干扰信号的NJ×1的波束赋形向量且||w2||2=1,z是单位功率的干扰信号,nd是合法用户接收机均值为0方差为N0的AWGN信号;Among them, h sd is a vector of N S ×1, indicating the legal channel coefficient; h jd is a vector of N J ×1, indicating the interference channel from cooperative node J to eavesdropping node E; each element in h sd and h jd is subject to Independent and identically distributed complex Gaussian random variables with zero mean and variance λ 2 and λ 4 ; the beamforming of the source node adopts the maximum ratio transmission, that is, w 1 = h' sd /||h sd || is the beam of N S ×1 Forming vector, x is the source signal of unit power, w 2 is the N J ×1 beamforming vector of the interference signal and ||w 2 || 2 =1, z is the interference signal of unit power, n d is the legal The AWGN signal with the mean value of the user receiver being 0 and the variance being N 0 ;
类似地,窃听者E处的接收信号可以表示为Similarly, the received signal at eavesdropper E can be expressed as
其中hse是NS×1的向量,表示窃听信道系数;hje是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道;hsd和hjd中的各元素分别是服从零均值方差为λ3和λ5的独立同分布复高斯随机变量,ne是窃听者接收机的均值为0方差为N0AWGN信号;Among them, h se is a vector of N S ×1, which represents the eavesdropping channel coefficient; h je is a vector of N J ×1, which represents the interference channel from coordinating node J to eavesdropping node E; each element in h sd and h jd is subject to The independent and identically distributed complex Gaussian random variables with zero mean and variance of λ 3 and λ 5 , ne is the eavesdropper receiver’s mean value of 0 and variance of N 0 AWGN signal;
因此,结合公式(3),合法用户D的端到端信干噪比SINR可以表示为Therefore, combined with formula (3), the end-to-end SINR of legal user D can be expressed as
令则上式可以简写为make Then the above formula can be abbreviated as
这里假设窃听者处的噪声可以忽略,这是因为在窃听用户处,干扰信号占主导作用,并且这也是文献中常用的假设,可以看作是一种最差的情形;It is assumed here that the noise at the eavesdropper can be ignored, because at the eavesdropping user, the interference signal dominates, and this is also a commonly used assumption in the literature, which can be regarded as a worst case;
因此,结合公式(3),窃听者E的端到端信干比SIR可表示为Therefore, combined with formula (3), the end-to-end signal-to-interference ratio SIR of the eavesdropper E can be expressed as
由式(7)和(8)可以看出波束赋形向量w2与信道hjd和hje有关,可以根据已知的信道CSI信息设计不同波束赋形向量w2,用以增强系统的传输和安全性能。From equations (7) and (8), it can be seen that the beamforming vector w 2 is related to the channels h jd and h je , and different beamforming vectors w 2 can be designed according to the known channel CSI information to enhance the transmission of the system and safety performance.
B2-2:天线选择方法;B2-2: Antenna selection method;
根据AS的原理,协作节点以设定的标准为依据,从多个天线中选择一个最优的天线来传输干扰信号,达到增强系统安全性的目的;According to the principle of AS, the cooperative node selects an optimal antenna from multiple antennas to transmit interference signals based on the set standard, so as to achieve the purpose of enhancing system security;
假定k是所选天线的索引,根据式(7)和(8),合法用户D处的SINR和窃听者E处的SIR可以分别表示为Assuming that k is the index of the selected antenna, according to equations (7) and (8), the SINR at the legitimate user D and the SIR at the eavesdropper E can be expressed as
其中表示协作节点J的第k根天线与合法用户D之间的信道系数,表示协作节点J的第k根天线与窃听者E之间的信道系数。in Indicates the channel coefficient between the kth antenna of the cooperative node J and the legitimate user D, Indicates the channel coefficient between the kth antenna of the cooperative node J and the eavesdropper E.
本发明采用协作干扰节点利用期望收集功率发送干扰信号,研究了五种情形下系统的安全传输性能。从已知的信道CSI出发,分别研究了所有信道CSI已知的理想情形、窃听者CSI未知情形、协作信道增益排序已知和有限反馈速率信道CSI情形下的不同干扰协作方案的保密性能,推导了各种情形下的连接中断概率和保密中断概率的闭式解,并给出了高SNR近似下的表达式;可以得出系统的连接中断概率和保密中断概率存在一定的折中关系,可以根据不同的系统需求选择和设计系统参数达到安全性-保密性的折中。The invention adopts cooperative interference nodes to send interference signals with expected collection power, and studies the security transmission performance of the system in five situations. Starting from the known channel CSI, the secrecy performance of different interference cooperation schemes under the ideal situation of known CSI of all channels, unknown CSI of eavesdroppers, known cooperative channel gain ranking and limited feedback rate channel CSI is studied respectively, and the derivation The closed-form solutions of connection interruption probability and confidentiality interruption probability in various situations are given, and the expressions under high SNR approximation are given; it can be concluded that there is a certain compromise relationship between the connection interruption probability and the confidentiality interruption probability of the system, which can be Select and design system parameters according to different system requirements to achieve a compromise between security and confidentiality.
进一步,对几种方案进行了仿真和比较分析,分析和研究了高SNR下相对于不反馈时所能获得的遍历可达保密速率增益;证明了系统的关键参数在安全性能上的重要作用以及有限速率反馈方法在实际尝尽中的优势。Further, several schemes are simulated and compared, and the traversal attainable secrecy rate gain obtained under high SNR compared with no feedback is analyzed and studied; it is proved that the key parameters of the system play an important role in the security performance and The advantages of the finite rate feedback method in practice.
附图说明Description of drawings
图1为本发明的有限速率反馈协作干扰窃听传输模型;Fig. 1 is the finite rate feedback cooperative interference eavesdropping transmission model of the present invention;
图2为本发明的连接中断概率随着SNR变化的曲线;Fig. 2 is the curve that connection interruption probability of the present invention changes with SNR;
图3为本发明的连接中断概率随着SNR变化的曲线;Fig. 3 is the curve that connection interruption probability of the present invention changes with SNR;
图4为本发明的保密中断概率随着SNR变化的曲线;Fig. 4 is the curve that the security interruption probability of the present invention changes along with SNR;
图5为本发明的连接中断概率随着反馈比特数B变化的曲线;Fig. 5 is the curve that the connection interruption probability of the present invention changes along with the number of feedback bits B;
图6为本发明的连接中断概率和保密中断概率随时隙分割因子α变化的曲线;Fig. 6 is the curve that connection interruption probability and confidentiality interruption probability vary with slot division factor α of the present invention;
图7为本发明的所需最小反馈比特数B随保密中断概率限制变化曲线。Fig. 7 is a curve showing the variation curve of the required minimum number of feedback bits B with the security interruption probability limit in the present invention.
具体实施方式Detailed ways
如图1所示,本发明包括以下步骤:As shown in Figure 1, the present invention comprises the following steps:
A:建立考虑MISO的有限速率反馈协作干扰窃听传输模型,包括多天线信源节点S,单天线合法用户D,无线供能的协作干扰节点J和单天线窃听节点E;A: Establish a limited-rate feedback cooperative interference eavesdropping transmission model considering MISO, including multi-antenna source node S, single-antenna legal user D, wireless-powered cooperative interference node J and single-antenna eavesdropping node E;
协作节点可以是多个或者多天线,这里为了计算和分析方便,单天线的协作节点可以看作是从多个协作节点中选择一个最优的协作节点的特殊情况;Cooperating nodes can be multiple or multi-antenna. Here, for the convenience of calculation and analysis, a single-antenna cooperating node can be regarded as a special case of selecting an optimal coordinating node from multiple coordinating nodes;
假设S具有天线数NS,J配置的天线数目为NJ,其余节点都采用单天线;假设信道都是准静态的Rayleigh信道,即在每一个传输块内信道CSI不变,不同传输块间信道CSI是独立变化的;Assume that S has the number of antennas N S , the number of antennas configured by J is N J , and the rest of the nodes use a single antenna; assuming that the channel is a quasi-static Rayleigh channel, that is, the CSI of the channel in each transmission block remains unchanged, and the channel CSI between different transmission blocks Channel CSI varies independently;
B:由于协作干扰节点是自私且能量受限的节点,发送干扰信号的能量来自于对源节点发送功率的能量收集,采用收集能量的期望值代替实时值;采用时分传输协议,整个传输过程分为两阶段;B: Since the cooperative interference node is a selfish and energy-limited node, the energy for sending the interference signal comes from the energy collection of the source node’s transmission power, and the expected value of the collected energy is used instead of the real-time value; using a time-division transmission protocol, the entire transmission process is divided into two stages;
B1:第一阶段,源节点S作为能量源无线供能给协作干扰节点J;B1: In the first stage, the source node S serves as an energy source to wirelessly supply energy to the cooperative interference node J;
定义α为时间分割比,假设一个时隙的长度为T,其中刚开始的αT,0<α<1用于第一阶段的无线供能,剩余的时隙(1-α)T用于信息传输;Define α as the time division ratio, assuming that the length of a time slot is T, where the initial αT, 0<α<1 is used for the wireless energy supply in the first stage, and the remaining time slot (1-α)T is used for information transmission;
第一阶段,协作干扰节点J接收到的来自源节点S的能量信号可表示为In the first stage, the energy signal received by the cooperative interference node J from the source node S can be expressed as
其中PS是源节点的发送功率,HSJ表示无线供能信道,是一个NJ×NS的矩阵且每个元素都是服从独立同分布的零均值方差为λ1的复高斯随机变量,xS表示NS×1的能量信号向量且满足总功率限制条件nS表示NS×1的高斯加性白噪声向量且 Where PS is the transmission power of the source node, H SJ represents the wireless power supply channel, which is a matrix of N J × N S and each element is a complex Gaussian random variable with zero mean and variance λ 1 that obeys independent and identical distribution, x S represents the energy signal vector of N S ×1 and satisfies the total power limit condition n S represents the Gaussian additive white noise vector of N S ×1 and
因此,在第一阶段结束时,协作干扰节点J获得的总能量为Therefore, at the end of the first stage, the total energy obtained by the cooperative interference node J is
其中η(0<η<1)表示能量转化效率;Wherein η (0<η<1) represents energy conversion efficiency;
由于协作干扰节点J的自私性和友好性,即以收集能量的期望发送干扰信号,从而节点J的发送功率可以写为Due to the selfishness and friendliness of the cooperative interference node J, that is, to send interference signals with the expectation of collecting energy, the transmission power of node J can be written as
B2:第二阶段,源节点S传输信息给目的节点D,与此同时协作干扰节点发送干扰信号,窃听节点窃听有用信息;B2: In the second stage, the source node S transmits information to the destination node D, and at the same time, the cooperative interference node sends an interference signal, and the eavesdropping node eavesdrops on useful information;
根据协作节点所已知的信道CSI,采用以下两种协作干扰方案:线性波束赋形BF方法和天线选择AS方法;According to the channel CSI known by the cooperative nodes, the following two cooperative interference schemes are adopted: the linear beamforming BF method and the antenna selection AS method;
B2-1:线性波束赋形BF方法B2-1: Linear beamforming BF method
由于协作节点处配置多天线,可利用多天线形成波束赋形传输信号以增强目的节点接收的可靠性和安全性;Since multi-antennas are configured at the cooperative nodes, multi-antennas can be used to form beamforming transmission signals to enhance the reliability and security of destination node reception;
因此,合法用户的接收信号可表示为Therefore, the received signal of a legitimate user can be expressed as
其中hsd是NS×1的向量,表示合法信道系数;hjd是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道;hsd和hjd中的各元素分别是服从零均值方差为λ2和λ4的独立同分布复高斯随机变量;源节点的波束赋形采用最大比传输,即w1=h'sd/||hsd||是NS×1的波束赋形向量,x是单位功率的源信号,w2是干扰信号的NJ×1的波束赋形向量且||w2||2=1,z是单位功率的干扰信号,nd是合法用户接收机均值为0方差为N0的AWGN信号;Among them, h sd is a vector of N S ×1, indicating the legal channel coefficient; h jd is a vector of N J ×1, indicating the interference channel from cooperative node J to eavesdropping node E; each element in h sd and h jd is subject to Independent and identically distributed complex Gaussian random variables with zero mean and variance λ 2 and λ 4 ; the beamforming of the source node adopts the maximum ratio transmission, that is, w 1 = h' sd /||h sd || is the beam of N S ×1 Forming vector, x is the source signal of unit power, w 2 is the N J ×1 beamforming vector of the interference signal and ||w 2 || 2 =1, z is the interference signal of unit power, n d is the legal The AWGN signal with the mean value of the user receiver being 0 and the variance being N 0 ;
类似地,窃听者E处的接收信号可以表示为Similarly, the received signal at eavesdropper E can be expressed as
其中hse是NS×1的向量,表示窃听信道系数;hje是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道;hsd和hjd中的各元素分别是服从零均值方差为λ3和λ5的独立同分布复高斯随机变量,ne是窃听者接收机的均值为0方差为N0AWGN信号;Among them, h se is a vector of N S ×1, which represents the eavesdropping channel coefficient; h je is a vector of N J ×1, which represents the interference channel from coordinating node J to eavesdropping node E; each element in h sd and h jd is subject to The independent and identically distributed complex Gaussian random variables with zero mean and variance of λ 3 and λ 5 , ne is the eavesdropper receiver’s mean value of 0 and variance of N 0 AWGN signal;
因此,结合公式(3),合法用户D的端到端信干噪比SINR可以表示为Therefore, combined with formula (3), the end-to-end SINR of legal user D can be expressed as
令则上式可以简写为make Then the above formula can be abbreviated as
这里假设窃听者处的噪声可以忽略,这是因为在窃听用户处,干扰信号占主导作用,并且这也是文献中常用的假设,可以看作是一种最差的情形;It is assumed here that the noise at the eavesdropper can be ignored, because at the eavesdropping user, the interference signal dominates, and this is also a commonly used assumption in the literature, which can be regarded as a worst case;
因此,结合公式(3),窃听者E的端到端信干比SIR可表示为Therefore, combined with formula (3), the end-to-end signal-to-interference ratio SIR of the eavesdropper E can be expressed as
由式(7)和(8)可以看出波束赋形向量w2与信道hjd和hje有关,可以根据已知的信道CSI信息设计不同波束赋形向量w2,用以增强系统的传输和安全性能。From equations (7) and (8), it can be seen that the beamforming vector w 2 is related to the channels h jd and h je , and different beamforming vectors w 2 can be designed according to the known channel CSI information to enhance the transmission of the system and safety performance.
B2-2:天线选择方法;B2-2: Antenna selection method;
根据AS的原理,协作节点以设定的标准为依据,从多个天线中选择一个最优的天线来传输干扰信号,达到增强系统安全性的目的;According to the principle of AS, the cooperative node selects an optimal antenna from multiple antennas to transmit interference signals based on the set standard, so as to achieve the purpose of enhancing system security;
假定k是所选天线的索引,根据式(7)和(8),合法用户D处的SINR和窃听者E处的SIR可以分别表示为Assuming that k is the index of the selected antenna, according to equations (7) and (8), the SINR at the legitimate user D and the SIR at the eavesdropper E can be expressed as
其中表示协作节点J的第k根天线与合法用户D之间的信道系数,表示协作节点J的第k根天线与窃听者E之间的信道系数。in Indicates the channel coefficient between the kth antenna of the cooperative node J and the legitimate user D, Indicates the channel coefficient between the kth antenna of the cooperative node J and the eavesdropper E.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
步骤A:建立系统模型,如图1所示,考虑MISO的有限速率反馈协作干扰窃听传输模型,其中包括多天线信源节点S,单天线合法用户D,无线供能的协作干扰节点J和单天线窃听节点E。这里考虑的是典型的干扰协作辅助的窃听模型,协作节点不消耗自身资源的前提下协作合法用户的信息传输,增强系统的抗窃听能力。协作节点可以是多个或者多天线,这里为了计算和分析方便,单天线的协作节点可以看作是从多个协作节点中选择一个最优的协作节点的特殊情况。由于协作节点的能量来自源节点的无线供能,所以其发送干扰的功率是随着源节点发送功率变化而变化的,这是有别于其他系统的一个典型的特征。这里假设S具有天线数NS,J配置的天线数目为NJ,其余节点都采用单天线。假设信道都是准静态的Rayleigh信道,即在每一个传输块内信道CSI不变,不同传输块间信道CSI是独立变化的。Step A: Establish the system model, as shown in Figure 1, consider the finite rate feedback cooperative interference eavesdropping transmission model of MISO, which includes multi-antenna source node S, single-antenna legal user D, wireless power supply cooperative interference node J and single The antenna eavesdrops on node E. What is considered here is a typical eavesdropping model assisted by interference and cooperation. Under the premise that the cooperative nodes do not consume their own resources, they cooperate in the information transmission of legitimate users to enhance the anti-eavesdropping ability of the system. Cooperating nodes can be multiple or multi-antenna. Here, for the convenience of calculation and analysis, a single-antenna cooperating node can be regarded as a special case of selecting an optimal coordinating node from multiple coordinating nodes. Since the energy of the coordinating node comes from the wireless power supply of the source node, the power of its transmitted interference changes with the change of the transmission power of the source node, which is a typical feature different from other systems. It is assumed here that S has the number of antennas N S , the number of antennas configured by J is N J , and the rest of the nodes use a single antenna. It is assumed that the channels are all quasi-static Rayleigh channels, that is, the channel CSI in each transmission block is constant, and the channel CSI between different transmission blocks changes independently.
由于协作干扰节点是自私且能量受限的节点,发送干扰信号的能量来自于对源节点发送功率的能量收集,这里为了简化干扰节点的复杂度,采用收集能量的期望值代替实时值。因此,这不仅简化了干扰节点的处理复杂度,同时减少了获得信道CSI的开销,且在平均意义上干扰节点并不消耗自身的能量。采用时分(Time Division,TD)传输协议,整个传输过程分为两阶段。第一阶段,源节点S作为能量源无线供能给协作干扰节点J;第二阶段,源节点S传输信息给目的节点D,与此同时协作干扰节点发送干扰信号,窃听节点窃听有用信息。定义α为时间分割比,假设一个时隙的长度为T,其中刚开始的αT,0<α<1用于第一阶段的无线供能,剩余的时隙(1-α)T用于信息传输。Since the cooperative interference node is a selfish and energy-limited node, the energy of transmitting the interference signal comes from the energy collection of the source node's transmission power. Here, in order to simplify the complexity of the interference node, the expected value of the collected energy is used instead of the real-time value. Therefore, this not only simplifies the processing complexity of the interfering node, but also reduces the overhead of obtaining channel CSI, and on average, the interfering node does not consume its own energy. Time Division (TD) transmission protocol is adopted, and the entire transmission process is divided into two stages. In the first stage, the source node S acts as an energy source to wirelessly supply energy to the cooperative interference node J; in the second stage, the source node S transmits information to the destination node D, while the cooperative interference node sends interference signals, and the eavesdropping nodes eavesdrop on useful information. Define α as the time division ratio, assuming that the length of a time slot is T, where the initial αT, 0<α<1 is used for the wireless energy supply in the first stage, and the remaining time slot (1-α)T is used for information transmission.
第一阶段,协作干扰节点J接收到的来自源节点S的能量信号可表示为In the first stage, the energy signal received by the cooperative interference node J from the source node S can be expressed as
其中PS是源节点的发送功率,HSJ表示无线供能信道,是一个NJ×NS的矩阵且每个元素都是服从独立同分布(Identically and Independently Distributed,i.i.d)的零均值方差为λ1的复高斯随机变量,xS表示NS×1的能量信号向量且满足总功率限制条件nS表示NS×1的高斯加性白噪声向量且因此,在第一阶段结束时,协作干扰节点J获得的总能量为Where PS is the transmission power of the source node, H SJ represents the wireless power supply channel, which is a matrix of N J × N S and each element is subject to the zero-mean variance of the IID (Identically and Independently Distributed, iid) is The complex Gaussian random variable of λ 1 , x S represents the energy signal vector of N S ×1 and satisfies the total power constraint condition n S represents the Gaussian additive white noise vector of N S ×1 and Therefore, at the end of the first stage, the total energy obtained by the cooperative interference node J is
其中η(0<η<1)表示能量转化效率。由于噪声能量相比于传输的信号能量较小,这里忽略了噪声的能量。由于协作干扰节点J的自私性和友好性,即以收集能量的期望发送干扰信号,从而节点J的发送功率可以写为Wherein η (0<η<1) represents the energy conversion efficiency. Since the noise energy is small compared to the transmitted signal energy, the noise energy is ignored here. Due to the selfishness and friendliness of the cooperative interference node J, that is, to send interference signals with the expectation of collecting energy, the transmission power of node J can be written as
假设源节点已知合法信道的瞬时CSI,窃听信道的瞬时CSI未知。这一假设的合理性是在于合法信道的CSI可以通过各种基于训练的信道估计方法获得,如MMSE等,同时可以通过增大导频功率等获得较为理想的信道CSI;而窃听者由于是被动无源的,不会主动上报其信道CSI或者可能上报不准确的信道CSI,因此这里假设源节点未知源节点和窃听者信道的状态信息。另一方面,由于协作节点的复杂度和系统调度的限制,协作干扰节点与其相连的信道的瞬时CSI不易获得,这里考虑了已知理想CSI、已知信道增益排序和基于有限速率反馈的部分CSI三种情形,其中重点研究了基于信道增益排序和基于有限速率反馈的CSI下的安全性能,并与理想CSI作了对比。根据协作节点所已知的信道CSI,主要可以采用以下两种协作干扰方案:线性波束赋形(BF)和天线选择(AS)。源节点S利用所有的天线自由度采用波束赋形方法以增强信息传输,协作节点利用收集的期望功率在信息传输阶段扮作人工干扰的角色。由于协作节点也配置多天线,因此可以根据系统所需性能、实现复杂度和开销采用不同的协作干扰方案。It is assumed that the source node knows the instantaneous CSI of the legitimate channel, but the instantaneous CSI of the eavesdropping channel is unknown. The rationality of this assumption is that the CSI of the legitimate channel can be obtained through various training-based channel estimation methods, such as MMSE, etc., and at the same time, an ideal channel CSI can be obtained by increasing the pilot power; Passive, will not actively report its channel CSI or may report inaccurate channel CSI, so here it is assumed that the source node does not know the status information of the source node and the eavesdropper channel. On the other hand, due to the complexity of the cooperative node and the limitation of system scheduling, the instantaneous CSI of the channel connected to the cooperative interfering node is not easy to obtain. Here, the known ideal CSI, known channel gain ordering and partial CSI based on finite rate feedback are considered Three scenarios, in which the security performance of CSI based on channel gain sorting and finite rate feedback is studied, and compared with ideal CSI. According to the channel CSI known by the cooperative nodes, the following two cooperative interference schemes can be mainly adopted: linear beamforming (BF) and antenna selection (AS). The source node S utilizes all antenna degrees of freedom to adopt the beamforming method to enhance information transmission, and the cooperative node uses the collected expected power to play the role of artificial interference in the information transmission stage. Since the cooperative nodes are also configured with multiple antennas, different cooperative interference schemes can be adopted according to the performance required by the system, implementation complexity and overhead.
协作干扰传输方案Cooperative Interference Transmission Scheme
由于协作节点处配置多天线,可利用多天线形成波束赋形传输信号以增强目的节点接收的可靠性和安全性。因此,合法用户的接收信号可表示为Since multiple antennas are configured at the coordination node, the multiple antennas can be used to form a beamforming transmission signal to enhance the reliability and security of receiving by the destination node. Therefore, the received signal of a legitimate user can be expressed as
其中hsd是NS×1的向量,表示合法信道系数;hjd是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道。hsd和hjd中的各元素分别是服从零均值方差为λ2和λ4的独立同分布复高斯随机变量。源节点的波束赋形采用最大比传输,即w1=h'sd/||hsd||是NS×1的波束赋形向量,x是单位功率的源信号,w2是干扰信号的NJ×1的波束赋形向量且||w2||2=1,z是单位功率的干扰信号,nd是合法用户接收机均值为0方差为N0的AWGN信号。类似地,窃听者E处的接收信号可以表示为Among them, h sd is a vector of N S ×1, indicating the legal channel coefficient; h jd is a vector of N J ×1, indicating the interference channel from coordinating node J to eavesdropping node E. The elements in h sd and h jd are independent and identically distributed complex Gaussian random variables with zero mean variance λ 2 and λ 4 respectively. The beamforming of the source node adopts the maximum ratio transmission, that is, w 1 =h' sd /||h sd || is the beamforming vector of N S ×1, x is the source signal of unit power, w 2 is the interference signal N J ×1 beamforming vector and ||w 2 || 2 =1, z is the interference signal with unit power, n d is the AWGN signal with zero mean value and N 0 variance of the legal user receiver. Similarly, the received signal at eavesdropper E can be expressed as
其中hse是NS×1的向量,表示窃听信道系数;hje是NJ×1的向量,表示协作节点J到窃听节点E的干扰信道。hsd和hjd中的各元素分别是服从零均值方差为λ3和λ5的独立同分布复高斯随机变量,ne是窃听者接收机的均值为0方差为N0AWGN信号。Among them, h se is a vector of N S ×1, representing the eavesdropping channel coefficient; h je is a vector of N J ×1, representing the interference channel from coordinating node J to eavesdropping node E. The elements in h sd and h jd are independent and identically distributed complex Gaussian random variables with zero mean variance λ 3 and λ 5 respectively, ne is the eavesdropper receiver’s mean value is 0 and variance is N 0 AWGN signal.
因此,结合(3),合法用户D的端到端信干噪比(SINR)可以表示为Therefore, combined with (3), the end-to-end signal-to-interference-noise ratio (SINR) of legal user D can be expressed as
令则上式可以简写为make Then the above formula can be abbreviated as
这里假设窃听者处的噪声可以忽略,这是因为在窃听用户处,干扰信号占主导作用,并且这也是文献中常用的假设,可以看作是一种最差的情形。因此,结合(3-3)窃听者E的端到端信干比(SIR)可表示为It is assumed here that the noise at the eavesdropper can be ignored, because at the eavesdropping user, the interference signal plays a dominant role, and this is also a commonly used assumption in the literature, which can be regarded as a worst case. Therefore, combined with (3-3) the end-to-end signal-to-interference ratio (SIR) of the eavesdropper E can be expressed as
由式(7)和(8)可以看出波束赋形向量w2与信道hjd和hje有关,可以根据已知的信道CSI信息设计不同波束赋形向量w2,用以增强系统的传输和安全性能。From equations (7) and (8), it can be seen that the beamforming vector w 2 is related to the channels h jd and h je , and different beamforming vectors w 2 can be designed according to the known channel CSI information to enhance the transmission of the system and safety performance.
天线选择方法Antenna selection method
天线选择是一种低复杂度且节能的增强物理层安全的一种常用方法[52],尤其适用于计算能力和能量受限的系统。这里考虑到节点的自私性以及收集到的无线供能能量的有限性,AS不失为一种有效的节能和增强安全性的方法。根据AS的原理,协作节点以一定的标准为依据,从多个天线中选择一个最好的天线来传输干扰信号,达到增强系统安全性的目的。假定k是所选天线的索引,根据式(7)和(8),合法用户D处的SINR和窃听者E处的SIR可以分别表示为Antenna selection is a low-complexity and energy-efficient approach to enhance physical layer security [52] , which is especially suitable for systems with limited computing power and energy. Considering the selfishness of nodes and the limitation of collected wireless energy, AS is an effective method to save energy and enhance security. According to the principle of AS, the cooperative node selects the best antenna from multiple antennas to transmit interference signals based on certain standards, so as to enhance the security of the system. Assuming that k is the index of the selected antenna, according to equations (7) and (8), the SINR at the legitimate user D and the SIR at the eavesdropper E can be expressed as
其中表示协作节点J的第k根天线与合法用户D之间的信道系数,表示协作节点J的第k根天线与窃听者E之间的信道系数。in Indicates the channel coefficient between the kth antenna of the cooperative node J and the legitimate user D, Indicates the channel coefficient between the kth antenna of the cooperative node J and the eavesdropper E.
基于已知信道CSI的协作干扰方法Cooperative interference method based on known channel CSI
主要给出发送波束赋形设计和AS的方法,使得在损害窃听者的信道质量的同时对合法用户的影响降低到最小。针对已知的信道的CSI情形,可设计不同的协作干扰方法和策略。The method of transmitting beamforming design and AS is mainly given, which can minimize the impact on legitimate users while damaging the channel quality of eavesdroppers. For the known CSI situation of the channel, different cooperative interference methods and strategies can be designed.
第一种情况:理想情形:协作节点-目的节点与协作节点-窃听者CSI均已知The first case: ideal situation: both the cooperative node-destination node and the cooperative node-eavesdropper CSI are known
当hjd的CSI是理想的且已知,合法用户接收机处可以采用迫零方法来完全消除来自于协作节点J的干扰。与此同时,可以利用已知hje的CSI最大化窃听者处的干扰。因此,波束赋形向量w2是下面最优化问题的解:When the CSI of h jd is ideal and known, the legal user receiver can use the zero-forcing method to completely eliminate the interference from the cooperative node J. At the same time, the interference at the eavesdropper can be maximized with known h je CSI. Therefore, the beamforming vector w2 is the solution to the following optimization problem:
根据Ding的研究成果[53],上式最优化问题的解可表示为According to Ding's research results [53] , the solution of the above optimization problem can be expressed as
其中NJ×NJ矩阵是hjd列空间的正交补,可以表示为where N J ×N J matrix is the orthogonal complement of the h jd column space, which can be expressed as
第二种情况:仅协作节点—目的节点的CSI已知Case 2: Cooperating nodes only—the CSI of the destination node is known
当hjd的CSI是理想的且已知,合法用户接收机处仍可采用迫零方法来完全消除来自于协作节点J的干扰。由于hje的CSI未知,无法像第一种情况中利用协作节点和窃听者之间的信道CSI设计波束赋形矩阵以增大窃听者处的干扰。因此,这里采用将协作干扰的零空间对准合法用户,使得对合法用户的干扰为0,而对于窃听者产生随机干扰。波束赋形向量设计方法首先需对矩阵作奇异值分解(SVD),可得When the CSI of h jd is ideal and known, the legal user receiver can still use the zero-forcing method to completely eliminate the interference from the cooperative node J. Since the CSI of h je is unknown, it is impossible to use the channel CSI between the cooperating node and the eavesdropper to design the beamforming matrix to increase the interference at the eavesdropper as in the first case. Therefore, the null space of cooperative interference is aligned with legitimate users, so that the interference to legitimate users is 0, and random interference is generated to eavesdroppers. The beamforming vector design method first requires the matrix For singular value decomposition (SVD), we can get
因此,对应NJ-1非零奇异值的NJ-1个左奇异值向量ui张成了的列空间,ui可以表示为列向量的线性组合,从而Therefore, the N J -1 left singular value vectors u i corresponding to N J -1 non-zero singular values become The column space of u i can be expressed as A linear combination of column vectors, so that
因此,波束赋形向量可以从NJ-1个左奇异值向量ui中任意选取一个,这样可以保证合法用户处的干扰为0,此时窃听者处的干扰是随机干扰,而4.3.1中是联合设计的波束赋形向量,窃听者处的干扰是所能达到的最大干扰。Therefore, the beamforming vector can be arbitrarily selected from N J -1 left singular value vector u i , which can ensure that the interference at the legal user is 0, and the interference at the eavesdropper is random interference at this time, and 4.3.1 where is the jointly designed beamforming vector, and the interference at the eavesdropper is the maximum interference that can be achieved.
第三种情况:协作节点—目的节点的信道增益排序已知The third case: the channel gain ranking of the cooperative node-destination node is known
当hjd的信道增益排序已知时,可以采用AS方法,根据式(9),选择信道增益最小对应的天线索引,这样可使得协作干扰节点对合法用户的影响降至最低。因此,AS选择的标准为When the channel gain ranking of h jd is known, the AS method can be used to select the antenna index corresponding to the minimum channel gain according to formula (9), which can minimize the influence of the cooperative interference node on legitimate users. Therefore, the criterion chosen by AS is
其中hid是hjd的第i个元素。注意到该方案选择出的天线索引对于窃听信道来说是随机天线选择。where h id is the ith element of h jd . Note that the antenna index selected by this scheme is a random antenna selection for the eavesdropping channel.
第四种情况:hjd有限速率反馈:基于合法用户干扰最小的码本选择方法The fourth case: h jd limited rate feedback: based on the codebook selection method with the least interference of legitimate users
通过有限速率反馈可以获得协作干扰节点与合法用户之间的部分信道CSI。在有限速率反馈模型中,合法用户估计并量化协作节点和目的节点之间的信道CSI,选择一个最优的码本去量化信道CSI,码本集合可以通过随机向量量化(RVQ)获得,即从大小为2B个预量化码本集合中选择一个码本作为信道CSI反馈给协作节点,这里B是反馈比特数。量化码本集合由2B个NJ维单位范数向量组成,且协作节点和合法用户均已知该码本集合。根据一定的选择准则,合法用户将选定的码本索引通过反馈信道传输。Partial channel CSI between cooperative interfering nodes and legitimate users can be obtained through rate-limited feedback. In the finite rate feedback model, the legal user estimates and quantizes the channel CSI between the cooperative node and the destination node, and selects an optimal codebook to quantize the channel CSI. The codebook set can be obtained by random vector quantization (RVQ), that is, from A codebook is selected from the prequantized codebook sets with a size of 2 as channel CSI and fed back to the coordinating node, where B is the number of feedback bits. Quantized codebook set It consists of 2 B N J -dimensional unit norm vectors, and the codebook set is known to both the cooperative node and the legal user. According to a certain selection criterion, the legitimate user transmits the selected codebook index through the feedback channel.
由于码本码书对应的信道CSI是量化后的信道CSI,与实际信道CSI有一定的偏差,因此,不可避免的对合法用户存在一定的干扰。以合法用户处的干扰最小化为优化目标,选择波束赋形向量的标准如下Since the channel CSI corresponding to the codebook codebook is the quantized channel CSI, which has a certain deviation from the actual channel CSI, therefore, there is inevitably some interference to legal users. Taking the interference minimization at the legal user as the optimization goal, the criteria for selecting the beamforming vector are as follows
其中是信道方向信息(CDI)向量。in is the Channel Direction Information (CDI) vector.
第五种情况:hjd有限速率反馈:基于信道正交的码本选择方法The fifth case: h jd finite rate feedback: channel orthogonality based codebook selection method
与第四种情况相比:类似采用有限反馈方案且所需的反馈也相同,不同之处在于构造波束赋形向量w2的方法不同。不同于第四种情况中采用与hjd最接近正交的码本向量作为波束赋形向量,从而尽量减少对合法用户的干扰。本小节首先选择与hjd最接近的码本向量作为反馈信息,然后根据反馈信息构造与合法信道正交的波束赋形向量。因此,码本的选择标准如下Compared with the fourth case: the limited feedback scheme is similarly adopted and the required feedback is the same, the difference lies in the method of constructing the beamforming vector w 2 is different. Different from the fourth case, the codebook vector closest to the orthogonality with h jd is used as the beamforming vector, so as to minimize the interference to legal users. In this subsection, the codebook vector closest to h jd is first selected as the feedback information, and then the beamforming vector orthogonal to the legal channel is constructed according to the feedback information. Therefore, the codebook selection criteria are as follows
基于反馈的索引得到与hjd最接近的码本向量协作节点在与正交的方向发送干扰信号,这样可以保证对于合法信道的干扰尽可能的小。因此,利用波束赋形向量w2可以采用类似于4.3.2的方法来构造。本小节的方法的本质在于所选择的码本越接近真实信道hjd,构造出的波束赋形向量w2越能接近真实信道的正交方向,从而可以使合法用户的干扰尽可能的小。Feedback-based indexing to get the closest codebook vector to h jd Collaborating nodes are working with The interference signal is sent in the orthogonal direction, which can ensure that the interference to the legal channel is as small as possible. Therefore, using The beamforming vector w 2 can be constructed using a method similar to 4.3.2. The essence of the method in this subsection lies in the chosen codebook The closer to the real channel h jd , the closer the constructed beamforming vector w 2 is to the orthogonal direction of the real channel, so that the interference of legal users can be kept as small as possible.
安全性能safety performance
针对所提的协作干扰系统,考虑连接中断概率和保密中断概率以及遍历可达保密速率为安全指标。为描述和计算方便,定义For the proposed cooperative jamming system, the probability of connection interruption, the probability of secrecy interruption and the traversal achievable secrecy rate are considered as safety indicators. For the convenience of description and calculation, define
gsd=||hsd||2,gJS=||HSJ||2,从而,式(7)-(9)可写为如下的形式:g sd =||h sd || 2 , g JS =||H SJ || 2 , Thus, formulas (7)-(9) can be written as follows:
根据Simon的证实,gsd分别服从参数为2Ns的Chi分布,其对应的PDF可以写为According to Simon's confirmation, g sd respectively obey the Chi distribution with parameter 2N s , and the corresponding PDF can be written as
注意到当采用AS时,gse是指数分布高斯变量与单位方向随机变量的和,根据Shah的证实,知其服从指数分布,对应的PDF为Note that when using AS, g se is the sum of an exponentially distributed Gaussian variable and a unit direction random variable. According to Shah's confirmation, it is known that it obeys an exponential distribution, and the corresponding PDF is
下面推导和研究所述的协作干扰方法下的系统安全指标,并研究和分析各参数对系统性能的影响。In the following, the system security index under the cooperative jamming method is derived and studied, and the influence of each parameter on the system performance is studied and analyzed.
连接中断概率和保密中断概率Probability of connection loss and probability of loss of confidentiality
(1)理想情形:协作节点-目的节点与协作节点-窃听者CSI均已知(1) Ideal situation: both the cooperative node-destination node and the cooperative node-eavesdropper CSI are known
由COP的定义可知,当合法用户信道的容量不足以支持传输速率时,即CD<Rt,中断事件发生。因此,针对4.3.1的理想CSI情形,将式(10)和(12)代入式(18),可得和由[55]可知gje服从Gamma(NJ-1,λ5),其PDF为It can be seen from the definition of COP that when the capacity of the legal user channel is not enough to support the transmission rate, that is, C D < R t , an interruption event occurs. Therefore, for the ideal CSI situation in 4.3.1, substituting equations (10) and (12) into equation (18), we can get and It can be seen from [55] that g je obeys Gamma(N J -1,λ 5 ), and its PDF is
将式(18)代入,可得情形1下的连接中断概率可以写为Substituting equation (18), the connection interruption probability in case 1 can be written as
其中由保密中断概率的定义,将式(20)和代入并利用计算可得系统的保密中断概率的解析式为in According to the definition of the confidentiality outage probability, the analytical formula of the confidentiality outage probability of the system can be obtained by substituting formula (20) and using the calculation:
其中 in
由式(22)以看出系统的连接中断概率和发送功率PS、时隙分割因子α、源节点天线数目和发送速率Rt有关,且随着PS的增大而减小,随着α和Rt的增大而增大。当PS→∞时,系统的连接中断概率可以写为From formula (22), it can be seen that the connection interruption probability of the system is related to the transmission power P S , the time slot division factor α, the number of source node antennas and the transmission rate R t , and it decreases with the increase of PS, and with the increase of The increase of α and R t increases. When P S →∞, the connection outage probability of the system can be written as
从而可得其分集阶数为d=NS,即发送天线数目。由式(23)可看出保密中断概率与发送功率PS无关,仅时隙分割因子α、协作天线数目和保密速率Re有关,当给定α时,保密中断概率趋近于常数,且保密速率随着协作节点天线数目的增加而减小,即抗窃听能力增强,这是因为更多的协作节点天线数目提供了更多的自由度。Therefore, it can be obtained that the diversity order is d=N S , that is, the number of transmitting antennas. It can be seen from formula (23) that the secrecy outage probability has nothing to do with the transmission power PS, only the time slot division factor α, the number of cooperative antennas and the secrecy rate R e are related. When α is given, the secrecy outage probability approaches a constant, and The secrecy rate decreases with the increase of the number of cooperative node antennas, that is, the anti-eavesdropping ability is enhanced, because more cooperative node antennas provide more degrees of freedom.
(2)协作节点—目的节点的CSI已知(2) Collaborative node - the CSI of the destination node is known
相比于干扰信道CSI均已知的情形1,这里协作节点到窃听者的干扰信道CSI未知。此时,合法用户的SNR不变,其连接中断概率的表达式如式(22)所示,这里不做进一步的表述。针对窃听者的SIR,由上述知此时协作节点的预编码向量为w2=ui,则服从指数分布,即从情形1中的Gamma分布退化为指数分布从而,采用类似的方法,可得系统的保密中断概率的解析式为Compared with the case 1 where the CSI of the interference channel is known, the CSI of the interference channel from the coordinating node to the eavesdropper is unknown here. At this time, the SNR of the legitimate user remains unchanged, and the expression of the connection interruption probability is shown in formula (22), which will not be further expressed here. For the SIR of the eavesdropper, it is known from the above that the precoding vector of the coordinating node at this time is w 2 =u i , then Obey the exponential distribution, that is, degenerate from the Gamma distribution in case 1 to the exponential distribution Therefore, using a similar method, the analytical formula of the system's confidentiality outage probability can be obtained as
与情形1相同,保密中断概率与发送功率PS无关,仅与时隙分割因子α和保密速率Re有关,当给定α时,保密中断概率趋近于常数。不同的是保密中断概率与协作节点的天线数目无关,即保密速率不会随着协作节点天线数目的增加而减小,这是因为协作节点到窃听者的信道CSI未知,波束赋形向量的设计不能利用信道信息,对于窃听者来说协作节点天线数目的增加并不能更多的自由度。因此,不能通过协作节点增加天线数目提高系统的抗窃听能力。Same as case 1, the secrecy outage probability has nothing to do with the transmission power PS , but is only related to the slot division factor α and the secrecy rate Re . When α is given, the secrecy outage probability approaches a constant. The difference is that the secrecy interruption probability has nothing to do with the number of antennas of the cooperative node, that is, the secrecy rate will not decrease with the increase of the number of antennas of the cooperative node, because the CSI of the channel from the cooperative node to the eavesdropper is unknown, and the design of the beamforming vector Unable to utilize channel information, the increase in the number of coordinating node antennas does not provide more degrees of freedom for the eavesdropper. Therefore, the anti-eavesdropping ability of the system cannot be improved by increasing the number of antennas of the cooperative nodes.
(3)协作节点—目的节点的信道增益排序已知且协作节点采用AS(3) Cooperating nodes—the channel gain ranking of the destination nodes is known and the coordinating nodes use AS
不同于情形2中协作节点到合法用户的干扰信道hjd完全已知,这里假设协作节点到合法用户的干扰信道所对应天线的信道增益的排序已知,协作节点可以采用AS方案,此时目的节点只需反馈所对应的最优天线的索引,无需信道完全的CSI,不仅可以降低系统的复杂度和开销也可节约协作节点的能量。选择的发送天线对于窃听者来说是随机选择,对于合法用户来说是最优的。因此,可以在降低合法接收节点的干扰的同时可以增加系统的安全性。此时由于所选天线对于窃听者来说是随机选择,服从指数分布Exp(λ5),而所选天线对于合法用户是信道增益最小的天线,则其CDF可计算为Different from the interference channel h jd from the cooperative node to the legal user in case 2 is completely known, here it is assumed that the order of the channel gains of the antennas corresponding to the interference channel from the cooperative node to the legal user is known, and the cooperative node can adopt the AS scheme. The node only needs to feed back the index of the corresponding optimal antenna, without the need for complete CSI of the channel, which not only reduces the complexity and overhead of the system but also saves the energy of the cooperative nodes. The selected transmit antenna is chosen randomly for eavesdroppers and optimal for legitimate users. Therefore, the security of the system can be increased while reducing the interference of legal receiving nodes. at this time Since the chosen antenna is chosen at random for the eavesdropper, obeys the exponential distribution Exp(λ 5 ), and the selected antenna is the antenna with the smallest channel gain for legal users, then its CDF can be calculated as
从而,其PDF可表示为fgjd(x)=NJ/λ4exp(-xNJ/λ4),可以看作参数为λ4/NJ的指数分布。由连接中断概率的定义,将合法用户SINR的表达式代入,第3种情形下的系统连接中断概率的表达式可写为Therefore, its PDF can be expressed as f gjd (x)=N J /λ 4 exp(-xN J /λ 4 ), which can be regarded as an exponential distribution whose parameter is λ 4 /N J. Based on the definition of the connection interruption probability, the expression of the legal user SINR is substituted, and the expression of the system connection interruption probability in the third case can be written as
其中(a)是将gsd的CDF代入整理后可得,(b)是利用二项式展开后将gjd的PDF代入整理后可得,(c)是根据[56]计算后整理后可得。Among them, (a) is obtained by substituting the CDF of g sd into sorting, (b) is obtained by substituting the PDF of g jd into sorting after using the binomial expansion, and (c) is calculated according to [56] and can be obtained after sorting have to.
采用类似情形2的方法,可得系统的保密中断概率的解析式为Using a method similar to Case 2, the analytical formula of the system’s secrecy outage probability can be obtained as
由于式(27)较复杂,为了更好地研究系统参数的影响,这里推导高发送功率下系统的中断概率解析式。当PS→∞时,系统的连接中断概率可计算为Due to the complexity of formula (27), in order to better study the influence of system parameters, the analytical formula of outage probability of the system under high transmit power is derived here. When P S →∞, the connection interruption probability of the system can be calculated as
与情形1和2不同,系统的连接中断概率与发送功率PS无关,且随着PS的增大而趋于常数,从而分集阶数为d=0。这是因为协作节点的发送功率来自源节点的无线供能,协作节点的发送功率与源节点的发送功率成正比,协作节点发送的干扰信号和有用信号功率随着源节点发送功率的增大而同尺度增大,从而使得分集阶数为0。另外,连接中断概率与协作节点天线数目有关,且随着协作节点天线数的增大而减小,这是因为协作节点天线数目越多,提供的可选天线自由度越多,对合法用户干扰小的天线出现概率越高,但天线数增多会导致反馈索引所需的比特增大。同时连接中断概率也与时隙分割因子α、源节点天线数目和发送速率Rt均有关,且连接中断概率随着α和Rt的增大而增大,随着源节点天线数的增大而减小。系统的保密中断概率表达式与情形2一样,与发送功率PS无关,仅与时隙分割因子α和保密速率Re有关。这是因为天线选择准则仅考虑了协作节点与目的节点之间的信道CSI,相当于窃听者来说是随机选择。Different from cases 1 and 2, the connection interruption probability of the system has nothing to do with the transmission power PS , and tends to a constant with the increase of PS , so the diversity order is d=0. This is because the transmission power of the cooperative node comes from the wireless energy supply of the source node, the transmission power of the cooperative node is proportional to the transmission power of the source node, and the interference signal and useful signal power transmitted by the cooperative node increase with the increase of the transmission power of the source node. The same scale increases, so that the diversity order is 0. In addition, the connection interruption probability is related to the number of cooperative node antennas, and decreases with the increase of the number of cooperative node antennas. This is because the more the number of cooperative node antennas, the more degrees of freedom the optional antennas provide, and the interference to legitimate users Smaller antennas have a higher probability of occurrence, but an increase in the number of antennas will increase the number of bits required for the feedback index. At the same time, the connection interruption probability is also related to the time slot division factor α, the number of source node antennas and the transmission rate R t , and the connection interruption probability increases with the increase of α and R t , and with the increase of the source node antenna number And reduce. The system's secrecy outage probability expression is the same as case 2, it has nothing to do with the sending power PS , but is only related to the time slot division factor α and the secrecy rate Re . This is because the antenna selection criterion only considers the channel CSI between the coordinating node and the destination node, which is equivalent to random selection for the eavesdropper.
(4)hjd有限速率反馈:基于合法用户干扰最小的码本选择方法(4)h jd limited rate feedback: codebook selection method based on legal user interference minimum
情形2是协作节点到目的节点信道hjd的CSI完全已知,情形3是hjd的信道增益排序已知,这里考虑信道hjd的部分CSI已知,即采用有限速率反馈的信道CSI模型。由于反馈量化信道CSI与理想的CSI存在一定误差,因此可以看作是部分信道CSI已知,信道的正交空间并非完全与理想情形相同,与情形1和2不同,gjd≠0,即协作干扰节点发送的干扰信号会部分泄露到合法用户端,对会对合法用户产生干扰,这里选择泄露干扰最小的码本对应的信道CSI设计波束赋形向量。根据式(16),协作节点到合法用户的信道增益为其组成的两个随机变量相互独立,是两个单位向量的内积,其CDF为x∈[0,1]。U是M=2B个独立同分布随机变量的最小值,其CDF可表示为Case 2 is that the CSI of the channel h jd from the coordinating node to the destination node is completely known. Case 3 is that the channel gain order of h jd is known. Here, part of the CSI of the channel h jd is considered to be known, that is, the channel CSI model using finite rate feedback. Since there is a certain error between the feedback quantized channel CSI and the ideal CSI, it can be regarded as part of the channel CSI is known, and the orthogonal space of the channel is not exactly the same as the ideal situation. Unlike situations 1 and 2, g jd ≠ 0, that is, cooperative The interference signal sent by the interference node will partially leak to the legitimate user end, which will cause interference to the legitimate user. Here, the channel CSI design beamforming vector corresponding to the codebook with the least leakage interference is selected. According to formula (16), the channel gain from the cooperative node to the legal user is The two random variables it consists of are independent of each other, is the inner product of two unit vectors, whose CDF is x∈[0,1]. U is the minimum value of M=2 B independent and identically distributed random variables, and its CDF can be expressed as
由COP的定义,第4种情形下的系统连接中断概率由下述定理给出。By the definition of COP, the system connection interruption probability in the fourth case is given by the following theorem.
定理1:协作节点到目的节点的信道CSI采用有限速率反馈,hje的CSI未知的情形下,协作干扰系统的连接中断概率表达式可写为Theorem 1: The channel CSI from the cooperative node to the destination node adopts finite rate feedback, and the CSI of h je is unknown, the expression of the connection interruption probability of the cooperative interference system can be written as
其中Φ1由下式给出where Φ1 is given by
证明:根据连接中断概率的定义,将合法用户SINR表达式代入,采用类似式(27)方法可得Proof: According to the definition of connection interruption probability, substituting the legal user SINR expression, using a method similar to formula (27) can be obtained
其中因此,需计算gjd的CDF如下in Therefore, the CDF of g jd needs to be calculated as follows
从而,可得gjd的PDF如下Thus, the PDF of g jd can be obtained as follows
将式(36)代入,可得Substituting equation (36), we can get
将式(37)代入式(32)可得系统的连接中断概率。Substitute Equation (37) into Equation (32) to get the connection interruption probability of the system.
下面推导保密中断概率,根据现有定理可知gje服从指数分布Exp(λ5),采用类似情形2的方法,可得SOP的解析式为In the following, the secrecy outage probability is deduced. According to the existing theorem, g je obeys the exponential distribution Exp(λ 5 ). Using a method similar to case 2, the analytical formula of SOP can be obtained as
由式(32)可知系统的连接中断概率与发送功率PS、协作节点天线数、源节点天线数、时隙分割因子α和保密速率Re有关,且随着反馈比特B的增大,信道CSI越精确,协作节点对合法用户的干扰越小,连接中断概率随着反馈比特数的增大而减小,随着协作节点天线数的增大而增大,这是因为协作节点天线数目越多,相同反馈比特下信道的量化越粗糙,协作干扰信号泄露的干扰越多。连接中断概率随着α和Rt的增大而增大,随着源节点天线数的增大而减小。系统的保密中断概率表达式与情形2一样,与发送功率PS无关,仅与时隙分割因子α和保密速率Re有关。这是因为天线选择准则仅考虑了协作节点与目的节点之间的信道CSI的反馈优化,对于窃听者来说是随机的。From formula (32), it can be known that the connection interruption probability of the system is related to the transmission power P S , the number of cooperative node antennas, the number of source node antennas, the time slot division factor α and the secrecy rate Re , and with the increase of the feedback bit B, the channel The more accurate the CSI, the less interference the cooperating node will have on legitimate users, and the probability of connection interruption decreases with the increase of the number of feedback bits, and increases with the increase of the number of cooperating node antennas, because the more the number of coordinating node antennas More, the rougher the quantization of the channel under the same feedback bit, the more interference leaked by the cooperative interference signal. The probability of connection interruption increases with the increase of α and R t , and decreases with the increase of the number of source node antennas. The system's secrecy outage probability expression is the same as case 2, it has nothing to do with the transmission power PS , only related to the time slot division factor α and the secrecy rate Re . This is because the antenna selection criterion only considers the feedback optimization of the channel CSI between the cooperative node and the destination node, which is random for eavesdroppers.
(5)hjd有限速率反馈:基于干扰信道正交的码本选择方法(5)h jd finite rate feedback: an orthogonal codebook selection method based on interference channels
与情形4种构造对合法用户干扰最小的波束赋形向量不同,这里也采用有限速率反馈,但是选取与实际信道最接近的码本索引反馈给协作节点,协作节点利用反馈的码本作为真实信道CSI设计波束向量,使得其与干扰信道正交,从而对合法用户产生的干扰最小。根据RVQ理论,实际信道方向和量化信道方向的关系可以表示为Different from the beamforming vectors constructed with the least interference to legal users in case 4, limited rate feedback is also used here, but the codebook index closest to the actual channel is selected and fed back to the coordinating node, and the coordinating node uses the feedback codebook as the real channel The CSI designs the beam vector so that it is orthogonal to the interference channel, so that the interference to legitimate users is minimal. According to the RVQ theory, the actual channel direction and quantized channel direction relationship can be expressed as
其中s是与正交且与v相互独立的的单位范数向量。w2是基于的零空间构造的波束向量以尽量避免对合法用户的干扰。因此有in s is with Unit-norm vectors that are orthogonal and independent of v. w 2 is based on The beam vector constructed by the null space of , in order to avoid interference to legitimate users as much as possible. Therefore there are
根据量化单元近似模型[46],w2是与s独立的单位范数向量,则Z=|sHw2|2~β(1,NJ-2),||hjd||2服从参数为(NJ,λ4)的Gamma分布,由[47]可知,X=||hjd||2sin2θ服从参数为(NJ-1,λ4δ)的Gamma分布,其中从而gjd的CDF可以表示为According to the quantization unit approximation model [46] , w 2 is a unit norm vector independent of s, then Z=|s H w 2 | 2 ~β(1,N J -2), and ||h jd || 2 obeys Gamma distribution with parameters (N J ,λ 4 ), it can be seen from [47] that X=||h jd || 2 sin 2 θ obeys Gamma distribution with parameters (N J -1,λ 4 δ), where Thus the CDF of g jd can be expressed as
由上式可得gjd是服从参数为λ4δ的指数分布。由于有限速率CSI反馈,这导致了协作节点对合法用户的残余干扰,并且残余干扰取决于反馈CSI的比特数目B。当反馈比特数目B→∞时,即全反馈,残余干扰趋近于0。gje服从指数分布Exp(λ5),保密中断概率的解析式与式(38)相同。根据连接中断概率的定义可得,采用类似情形3的方法,连接中断概率解析式计算如下It can be obtained from the above formula that g jd obeys the exponential distribution whose parameter is λ 4 δ. Due to finite rate CSI feedback, This results in the residual interference of the cooperating nodes to legitimate users, and the residual interference depends on the number of bits B of the feedback CSI. When the number of feedback bits B→∞, that is, full feedback, the residual interference approaches 0. g je obeys the exponential distribution Exp(λ 5 ), and the analytical formula of the confidentiality interruption probability is the same as formula (38). According to the definition of connection interruption probability, using a method similar to case 3, the analytical formula of connection interruption probability is calculated as follows
在高SNR下,接收机处的高斯白噪声可以忽略,系统的连接中断概率可计算为At high SNR, Gaussian white noise at the receiver can be ignored, and the connection outage probability of the system can be calculated as
其中给定编码速率Rt、各节点天线数目、时隙分割因子α和成功传输概率ξ时,可由式(4-43)计算所需的反馈比特数目B如下in Given the coding rate R t , the number of antennas at each node, the time slot division factor α and the probability of successful transmission ξ, the required number of feedback bits B can be calculated by formula (4-43) as follows
由式(43)可知系统的连接中断概率与发送功率PS无关,与协作节点天线数、源节点天线数、时隙分割因子α和保密速率Re有关,且随着反馈比特B的增大,δ→0信道CSI越精确,协作节点对合法用户的干扰越小,连接中断概率随着反馈比特数的增大而减小,随着协作节点天线数的增大而增大,这是因为协作节点天线数目越多,相同反馈比特下信道的量化越粗糙,协作干扰信号泄露的干扰越多,而且反馈比特数目应随着协作天线数线性增长。连接中断概率随着α和Rt的增大而增大,随着源节点天线数的增大而减小。系统的保密中断概率表达式与情形2一样,与发送功率PS无关,仅与时隙分割因子α和保密速率Re有关。From equation (43), it can be seen that the system connection interruption probability has nothing to do with the transmission power PS , but is related to the number of cooperative node antennas, the number of source node antennas, the time slot division factor α and the secrecy rate Re , and with the increase of the feedback bit B , the more accurate the δ→0 channel CSI is, the less interference the cooperating node will have on legitimate users, the probability of connection interruption decreases with the increase of the number of feedback bits, and increases with the increase of the number of coordinating node antennas, because The more the number of cooperative node antennas, the rougher the quantization of the channel under the same feedback bit, the more interference leaked by the cooperative interference signal, and the number of feedback bits should increase linearly with the number of cooperative antennas. The probability of connection interruption increases with the increase of α and R t , and decreases with the increase of the number of source node antennas. The system's secrecy outage probability expression is the same as case 2, it has nothing to do with the transmission power PS , only related to the time slot division factor α and the secrecy rate Re .
讨论:(1)由以上的分析和研究可知,相同的系统参数下,理想CSI已知下系统的保密中断概率为常值且最小。当协作干扰信道增益的排序CSI已知时,采用AS,即情形3,协作干扰节点同时对合法用户和窃听者产生干扰,但选择的天线使得对合法用户产生的干扰最小,从而使得对合法用户的影响小于窃听者的影响。有限速率反馈的协作干扰情形下,由于反馈信道与理想信道CSI存在一定的误差,因此会给合法用户造成一定的干扰,从而损害了合法用户的性能。另外,针对非理想的CSI(AS和有限速率反馈),在高SNR下,合法用户即与SNR无关,且趋于常值,从而存在误码平层效应。随着反馈比特B增多,则反馈的CSI趋近于真实的CSI,残余干扰趋近于0,系统性能趋近于理想CSI情形。因此,CSI估计和反馈的准确性对系统性能具有重要影响。另外,从系统的复杂性和开销角度考虑,为获得较理想的信道CSI需要较大的系统开销和发送功率,从而影响了系统的传输性能,而基于反馈信道排序索引的方法的只需反馈log2NJ比特,所需的反馈信息少,但与此同时获得的性能增益也有限。基于有限速率反馈的方法可以获得相对精确的信道CSI并且系统的开销可依据性能需求可控,可达到较好的性能和复杂度的折中。Discussion: (1) From the above analysis and research, it can be seen that under the same system parameters, the secrecy outage probability of the system with known ideal CSI is constant and minimum. When the ordering CSI of the cooperative interference channel gain is known, use AS, that is, case 3, the cooperative interference node generates interference to the legitimate user and the eavesdropper at the same time, but the selected antenna minimizes the interference to the legitimate user, so that the legitimate user The effect of the eavesdropper is smaller than that of the eavesdropper. In the case of cooperative interference with finite rate feedback, due to a certain error between the feedback channel and the ideal channel CSI, it will cause certain interference to legitimate users, and thus damage the performance of legitimate users. In addition, for non-ideal CSI (AS and rate-limited feedback), at high SNR, legitimate users That is, it has nothing to do with SNR and tends to a constant value, so there is a bit error flat layer effect. As the number of feedback bits B increases, the fed back CSI approaches the real CSI, the residual interference approaches 0, and the system performance approaches the ideal CSI situation. Therefore, the accuracy of CSI estimation and feedback has a significant impact on system performance. In addition, from the perspective of system complexity and overhead, in order to obtain a more ideal channel CSI requires a large system overhead and transmit power, which affects the transmission performance of the system, and the method based on feedback channel sorting index only needs to feed back log 2 N J bits, less feedback information is required, but at the same time the performance gain is also limited. The method based on finite rate feedback can obtain relatively accurate channel CSI and the overhead of the system can be controlled according to the performance requirement, which can achieve a better compromise between performance and complexity.
(2)考虑无协作节点或者协作节点不参与协作干扰的对比情形,此时γD=ρs||hsd||2,对应的连接中断概率和保密中断概率分别为(2) Considering the comparison situation where there is no cooperative node or the cooperative node does not participate in cooperative interference, at this time γ D = ρ s ||h sd || 2 , The corresponding connection interruption probability and confidentiality interruption probability are respectively
由上式可知当ρs→∞时,pso→1,pco→0,由此可知当无协作干扰节点时,窃听者可以以概率1截获合法用户的信息,因此需要设计抗窃听的干扰算法,以达到速率和安全的折中。提出的几个方案依据不同的信道CSI设计不同的干扰方案,不仅可以很好的达到可靠性-安全性的折中而且具有实际应用意义。It can be seen from the above formula that when ρ s → ∞, p so → 1, p co → 0, it can be seen that when there is no cooperative interference node, the eavesdropper can intercept the information of the legitimate user with a probability of 1, so it is necessary to design an anti-eavesdropping interference Algorithms to achieve a compromise between speed and security. The proposed schemes design different interference schemes according to different channel CSIs, which can not only achieve a good compromise between reliability and security, but also have practical application significance.
仿真与结果分析Simulation and Results Analysis
对上述中的理论结果进行Mentor Carlo仿真验证并对仿真结果进行分析。仿真参数除特殊说明外设置如下:独立仿真次数为1×106,源节点发送的编码速率Rt=2bps,所需的保密速率Re=1bps,能量收集的转换效率因子η=0.8,时隙分割因子α=0.1,信道参数为λ1=10,λ2=λ3=λ4=λ5=1,SNR定义为源节点的发送信噪比PS/N0。针对理想CSI(情形1)、协作节点-目的节点信道CSI已知(情形2)、协作节点-目的节点信道增益排序已知(情形3)、基于合法用户干扰最小的有限速率反馈(情形4)和基于信道正交的有限速率反馈(情形5)这五种情形分别做了数值仿真和分析。Carry out Mentor Carlo simulation verification on the above theoretical results and analyze the simulation results. The simulation parameters are set as follows unless otherwise specified: the number of independent simulations is 1×10 6 , the encoding rate R t sent by the source node = 2bps, the required secrecy rate R e = 1bps, the conversion efficiency factor of energy harvesting η = 0.8, when The slot division factor α=0.1, the channel parameters are λ 1 =10, λ 2 =λ 3 =λ 4 =λ 5 =1, and SNR is defined as the sending signal-to-noise ratio PS / N 0 of the source node. For ideal CSI (case 1), known cooperating node-destination node channel CSI (case 2), known coordinating node-destination node channel gain ranking (case 3), finite rate feedback based on legal user interference minimum (case 4) Numerical simulation and analysis are done for the five cases of finite rate feedback based on channel orthogonality (case 5).
图2给出了系统的连接中断概率随着SNR变化的曲线,其中实线表示NS=2,NJ=2的天线配置,虚线表示NS=4,NJ=2的天线配置,反馈比特数B=8。由图可以看出,推导的理论结果与实际仿真结果很好地吻合,同时渐进表达式在高SNR区域也与仿真结果一致,正如上述所分析的,连接中断概率随着源节点天线数的增多而降低,并且对于情形1和分集增益为源节点的天线数NS;其余情形下系统的连接中断概率随着源节点天线数的增多而降低,但都存在误码平底效应,即随着SNR的增大趋于恒值,且随着源节点天线数的增多平底降低。由图可以看出,情形3的连接中断概率最差,其次为情形4和5,情形1和2的连接中断概率性能最优,这是因为情形1和充分利用了干扰信道的CSI设计了良好的波束向量。因此,获得较好的信道CSI对系统的性能有重要作用。Fig. 2 shows the curve of the connection interruption probability of the system changing with the SNR, where the solid line represents the antenna configuration of N S =2, N J =2, the dotted line represents the antenna configuration of N S =4, N J =2, and the feedback The number of bits B=8. It can be seen from the figure that the derived theoretical results are in good agreement with the actual simulation results, and the asymptotic expression is also consistent with the simulation results in the high SNR region. As analyzed above, the connection interruption probability increases with the increase in the number of source node antennas and decrease, and for case 1 and the diversity gain is the number of antennas NS of the source node; in other cases, the connection interruption probability of the system decreases with the increase of the number of antennas of the source node, but there is a flat-bottom effect of error codes, that is, as the SNR The increase of tends to a constant value, and the flat bottom decreases with the increase of the number of source node antennas. It can be seen from the figure that the connection interruption probability of case 3 is the worst, followed by cases 4 and 5, and the performance of the connection interruption probability of cases 1 and 2 is the best. The beam vector of . Therefore, obtaining better channel CSI plays an important role in the performance of the system.
图3给出了系统的连接中断概率随着SNR变化的曲线,其中实线表示NS=2,NJ=2的天线配置,虚线表示NS=2,NJ=3的天线配置,反馈比特数B=8,由图可以看出,推导的理论结果与实际仿真结果很好地吻合。对于情形1,连接中断概率与协作节点天线数无关,而其他情形下的连接中断概率随着协作节点天线数的增多而减小,但都存在误码平底效应,即随着SNR的增大趋于恒值,随着协作节点天线数的增多平底降低。同样地,情形3的连接中断概率最差,其次为情形4和5,情形1和2的连接中断概率性能最优,这是因为情形1和充分利用了干扰信道的CSI设计了良好的波束向量。Fig. 3 shows the curve of the connection interruption probability of the system changing with SNR, where the solid line represents the antenna configuration of N S =2, N J =2, the dotted line represents the antenna configuration of N S =2, N J =3, and the feedback The number of bits B = 8, as can be seen from the figure, the derived theoretical results are in good agreement with the actual simulation results. For case 1, the connection interruption probability has nothing to do with the number of cooperative node antennas, while the connection interruption probability in other cases decreases as the number of cooperative node antennas increases, but there is a flat-bottom effect of error codes, that is, as the SNR increases, the probability of connection interruption decreases. At a constant value, the flat bottom decreases as the number of cooperative node antennas increases. Similarly, the connection interruption probability of case 3 is the worst, followed by cases 4 and 5, and the performance of connection interruption probability of cases 1 and 2 is the best, because the good beam vector is designed in case 1 and the CSI that makes full use of the interference channel .
图4给出了系统的保密中断概率随着SNR变化的曲线,其中实线表示NS=2,NJ=2的天线配置,虚线表示NS=2,NJ=4的天线配置,反馈比特数B=8。由图可以看出,推导的理论结果与实际仿真结果很好地吻合。当协作节点天线数为2时,由理想情况中的分析可知系统的保密中断概率都相同,这与仿真结果相吻合。当协作节点天线数目大于2时,由于情形1利用了已知的信道CSI联合设计波束向量,充分利用了信道的空间自由度,有效地降低了系统的保密中断概率。其他情形下的保密中断概率随着协作节点天线数的增多而降低,但都存在平底效应,即随着SNR的增大趋于恒值。Fig. 4 shows the curve of the security outage probability of the system changing with the SNR, wherein the solid line represents the antenna configuration of N S =2, N J =2, the dotted line represents the antenna configuration of N S =2, N J =4, and the feedback The number of bits B=8. It can be seen from the figure that the derived theoretical results are in good agreement with the actual simulation results. When the number of cooperative node antennas is 2, the analysis in the ideal situation shows that the security interruption probability of the system is the same, which is consistent with the simulation results. When the number of cooperative node antennas is greater than 2, since the known channel CSI is used to jointly design the beam vector in case 1, the spatial degree of freedom of the channel is fully utilized, and the system's secrecy outage probability is effectively reduced. In other cases, the confidentiality outage probability decreases with the increase of the number of cooperative node antennas, but there is a flat-bottom effect, that is, it tends to a constant value with the increase of SNR.
图5给出了系统的连接中断概率随着反馈比特数B的变化曲线,其中SNR=15dB,NS=4,NJ=4,反馈比特数B=8。情形1、2和3与反馈比特数目B无关,因此中断概率不随B的变化而变化。情形4和5的连接中断概率与反馈比特数有关,且随着比特数的增大而减小并逐渐趋近于情形1。这是因为随着比特数B的增大,信道量化精度越高,越接近真实信道,从而系统的连接中断概率迅速提高。注意到,当反馈比特数较少时,B<2,基于天线选择的方法的连接中断概率性能优于基于有限速率反馈情形,因为反馈比特太少导致信道CSI量化过于粗糙,泄露到目的节点的干扰增大导致了目的节点的SINR降低,可靠性降低。随着反馈比特B的增大,信道量化的精度提高,越来越接近真实信道CSI,干扰节点发送的干扰信号泄漏到目的节点的干扰趋于0,系统的连接中断概率趋近于理想情形。Fig. 5 shows the change curve of the connection interruption probability of the system with the number of feedback bits B, where SNR=15dB, N S =4, N J =4, and the number of feedback bits B=8. Cases 1, 2 and 3 have nothing to do with the number of feedback bits B, so the outage probability does not change with B. The connection interruption probability of cases 4 and 5 is related to the number of feedback bits, and decreases with the increase of the number of bits and gradually approaches case 1. This is because with the increase of the number of bits B, the higher the channel quantization accuracy is, the closer it is to the real channel, so the connection interruption probability of the system increases rapidly. Note that when the number of feedback bits is small, B<2, the connection interruption probability performance of the method based on antenna selection is better than that based on finite rate feedback, because the channel CSI quantization is too rough due to too few feedback bits, which leaks to the destination node. Increased interference leads to a decrease in the SINR of the destination node and a decrease in reliability. With the increase of the feedback bit B, the accuracy of channel quantization is improved, and it is getting closer to the real channel CSI, the interference of the interference signal sent by the interference node to the destination node tends to 0, and the connection interruption probability of the system tends to the ideal situation.
图6给出了系统的连接中断概率和保密中断概率随着时隙分割因子α变化的曲线,其中NS=2,NJ=2,反馈比特数B=6。作为对比项,图中还给出了无协作节点下的COP和SOP。由图可以看出,随着α的增大,五种情形下的系统的连接中断概率增大,即可靠性降低,这是因为用于传输数据的时隙越来越短,对应的传输速率越来越高;另一方面,随着α的增大,五种情形下的系统的保密中断概率减小,即安全性增强,这是因为协作节点可以收集更多的能量用于传输干扰信号,数据传输时隙变短,窃听者所需的SINR增大,更不易被窃听。因此,存在可靠性-安全系的折中关系,无协作节点系统的连接中断概率较小,但保密中断概率较大,以安全性优先的数据传输中,协作节点具有重要作用。Fig. 6 shows the curves of the system's connection interruption probability and confidentiality interruption probability changing with the time slot division factor α, where N S =2, N J =2, and the number of feedback bits B=6. As a comparison item, the figure also shows the COP and SOP without coordination nodes. It can be seen from the figure that with the increase of α, the connection interruption probability of the system in the five situations increases, that is, the reliability decreases. This is because the time slot used for transmitting data is getting shorter and shorter, and the corresponding transmission rate On the other hand, with the increase of α, the security interruption probability of the system in the five situations decreases, that is, the security is enhanced, because the cooperative nodes can collect more energy for transmitting interference signals , the data transmission time slot becomes shorter, the SINR required by the eavesdropper increases, and it is less likely to be eavesdropped. Therefore, there is a compromise relationship between reliability and security. The system without cooperative nodes has a low probability of connection interruption, but a high probability of confidentiality interruption. In data transmission with priority on security, cooperative nodes play an important role.
图7给出了保密中断概率ξ限制条件下,不同协作节点天线数目的系统所需的最小反馈比特数目B的变化曲线,其中NS=4。由图可看出为达到相同的保密中断概率,随着协作节点天线数的增大,所需最小反馈比特数B增大;为获得同精度的量化,天线数目的增多需要更多的量化比特。注意到,随着保密中断概率的增大,所需的最小反馈比特数目B减小;只需较小比特反馈即可达到所要求的保密中断概率。Fig. 7 shows the change curve of the minimum number of feedback bits B required by systems with different numbers of antennas of cooperative nodes under the constraint condition of confidentiality outage probability ξ, where N S =4. It can be seen from the figure that in order to achieve the same confidentiality outage probability, as the number of cooperative node antennas increases, the required minimum number of feedback bits B increases; in order to obtain quantization with the same precision, the increase in the number of antennas requires more quantization bits . Note that as the security breaking probability increases, the required minimum number of feedback bits B decreases; only a small bit feedback is needed to achieve the required security breaking probability.
本发明基于无线供能的协作干扰系统的安全传输系统性能,协作干扰节点利用期望收集功率发送干扰信号,研究了五种情形下系统的安全传输性能。从已知的信道CSI出发,分别研究了所有信道CSI已知的理想情形、窃听者CSI未知情形、协作信道增益排序已知和有限反馈速率信道CSI情形下的不同干扰协作方案的保密性能,推导了各种情形下的连接中断概率和保密中断概率的闭式解,并给出了高SNR近似下的表达式;可以得出系统的连接中断概率和保密中断概率存在一定的折中关系,可以根据不同的系统需求选择和设计系统参数达到安全性-保密性的折中。进一步,推导和研究了系统遍历可达保密速率,对几种方案进行了仿真和比较分析,分析和研究了高SNR下相对于不反馈时所能获得的遍历可达保密速率增益;证明了系统的关键参数在安全性能上的重要作用以及有限速率反馈方法在实际尝尽中的优势。The present invention is based on the secure transmission system performance of the cooperative jamming system with wireless energy supply, and the cooperative jamming nodes send jamming signals with expected collection power, and the secure transmission performance of the system in five situations is studied. Starting from the known channel CSI, the secrecy performance of different interference cooperation schemes under the ideal situation of known CSI of all channels, unknown CSI of eavesdroppers, known cooperative channel gain ranking and limited feedback rate channel CSI is studied respectively, and the derivation The closed-form solutions of connection interruption probability and confidentiality interruption probability in various situations are obtained, and the expressions under high SNR approximation are given; it can be concluded that there is a certain compromise relationship between the connection interruption probability and the confidentiality interruption probability of the system, which can be Select and design system parameters according to different system requirements to achieve a compromise between security and confidentiality. Further, the ergodic reachable secrecy rate of the system is deduced and studied, and several schemes are simulated and compared, and the gain of the ergodic reachable secrecy rate obtained under high SNR compared with no feedback is analyzed and studied; it is proved that the system The important role of the key parameters in the safety performance and the advantages of the finite rate feedback method in practical trials.
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明实施例技术方案的范围。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it still The technical solutions described in the foregoing embodiments can be modified, or some or all of the technical features can be equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910505170.8A CN110225579B (en) | 2019-06-12 | 2019-06-12 | A wireless energy supply-based cooperative interference physical layer security transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910505170.8A CN110225579B (en) | 2019-06-12 | 2019-06-12 | A wireless energy supply-based cooperative interference physical layer security transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110225579A true CN110225579A (en) | 2019-09-10 |
CN110225579B CN110225579B (en) | 2021-02-02 |
Family
ID=67816637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910505170.8A Active CN110225579B (en) | 2019-06-12 | 2019-06-12 | A wireless energy supply-based cooperative interference physical layer security transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225579B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110856166A (en) * | 2019-10-26 | 2020-02-28 | 中国人民解放军陆军工程大学 | Interference selection-based idle user cooperative interference strategy in cellular network |
CN111163464A (en) * | 2020-01-16 | 2020-05-15 | 电子科技大学 | A Multi-Service Transmission Power Allocation Method Against Random Eavesdropping |
CN111277311A (en) * | 2020-02-10 | 2020-06-12 | 电子科技大学 | Active and passive combined beamforming design method for millimeter wave symbiotic communication system |
CN111866861A (en) * | 2020-06-09 | 2020-10-30 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112512085A (en) * | 2020-12-21 | 2021-03-16 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN112600607A (en) * | 2020-11-25 | 2021-04-02 | 西安电子科技大学 | Double full-duplex cooperative interference anti-eavesdropping method |
CN112822662A (en) * | 2020-11-24 | 2021-05-18 | 西安交通大学 | D2D cache user safety cooperation method and system based on joint content transmission and interference blocking |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN114614963A (en) * | 2022-03-16 | 2022-06-10 | 北京航空航天大学 | Alternative optimization iterative user group selection method, electronic device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131941A (en) * | 2016-05-20 | 2016-11-16 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation |
CN109640321A (en) * | 2018-12-19 | 2019-04-16 | 西安电子科技大学 | Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection |
-
2019
- 2019-06-12 CN CN201910505170.8A patent/CN110225579B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131941A (en) * | 2016-05-20 | 2016-11-16 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation |
CN109640321A (en) * | 2018-12-19 | 2019-04-16 | 西安电子科技大学 | Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection |
Non-Patent Citations (3)
Title |
---|
ABDELHAMID SALEM等: "《Improving Physical Layer Security of AF Relay Networks via Beam-Forming and Jamming》", 《2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)》 * |
SHUANGYU LUO等: "《Uncoordinated Cooperative Jamming for Secret Communications》", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 * |
XIN JIANG等: "《Power Beacon Assisted Wiretap Channels With Jamming》", 《 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110856166A (en) * | 2019-10-26 | 2020-02-28 | 中国人民解放军陆军工程大学 | Interference selection-based idle user cooperative interference strategy in cellular network |
CN111163464A (en) * | 2020-01-16 | 2020-05-15 | 电子科技大学 | A Multi-Service Transmission Power Allocation Method Against Random Eavesdropping |
CN111163464B (en) * | 2020-01-16 | 2020-08-25 | 电子科技大学 | Random eavesdropping resistant multi-service transmission power distribution method |
CN111277311A (en) * | 2020-02-10 | 2020-06-12 | 电子科技大学 | Active and passive combined beamforming design method for millimeter wave symbiotic communication system |
CN111277311B (en) * | 2020-02-10 | 2022-03-25 | 电子科技大学 | Active and passive combined beam forming design method for millimeter wave symbiotic communication system |
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN111866861A (en) * | 2020-06-09 | 2020-10-30 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN111866861B (en) * | 2020-06-09 | 2024-01-23 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112260796B (en) * | 2020-10-21 | 2023-02-21 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112822662A (en) * | 2020-11-24 | 2021-05-18 | 西安交通大学 | D2D cache user safety cooperation method and system based on joint content transmission and interference blocking |
CN112600607B (en) * | 2020-11-25 | 2022-04-08 | 西安电子科技大学 | A dual full-duplex cooperative interference and anti-eavesdropping method |
CN112600607A (en) * | 2020-11-25 | 2021-04-02 | 西安电子科技大学 | Double full-duplex cooperative interference anti-eavesdropping method |
CN112512085B (en) * | 2020-12-21 | 2022-11-01 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN112512085A (en) * | 2020-12-21 | 2021-03-16 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN113132975B (en) * | 2021-04-22 | 2022-06-14 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN114614963A (en) * | 2022-03-16 | 2022-06-10 | 北京航空航天大学 | Alternative optimization iterative user group selection method, electronic device and storage medium |
CN114614963B (en) * | 2022-03-16 | 2023-09-26 | 北京航空航天大学 | Alternate optimization iteration user group selection method, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110225579B (en) | 2021-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110225579A (en) | A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply | |
Mukherjee et al. | Robust beamforming for security in MIMO wiretap channels with imperfect CSI | |
Huang et al. | Cooperative jamming for secure communications in MIMO relay networks | |
Perlaza et al. | From spectrum pooling to space pooling: Opportunistic interference alignment in MIMO cognitive networks | |
Shang et al. | Multiuser MISO interference channels with single-user detection: Optimality of beamforming and the achievable rate region | |
Goel et al. | Secret communication in presence of colluding eavesdroppers | |
Papailiopoulos et al. | Interference alignment as a rank constrained rank minimization | |
CN109194378B (en) | Physical layer security beamforming method based on linear neural network | |
Bashar et al. | Enhanced max-min SINR for uplink cell-free massive MIMO systems | |
CN106131941B (en) | Cooperate non-ideal collaborative network power distribution method of the estimation based on man made noise of channel | |
Zhang et al. | How much does reconfigurable intelligent surface improve cell-free massive MIMO uplink with hardware impairments? | |
CN105915472A (en) | Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition | |
Gopalakrishnan et al. | Cognitive transmit beamforming from binary CSIT | |
Fang et al. | Cell-free massive MIMO systems with oscillator phase noise: Performance analysis and power control | |
Hanif et al. | Robust power allocation in MIMO-NOMA systems | |
Sánchez et al. | Information-Theoretic Security of MIMO Networks Under $\kappa $-$\mu $ Shadowed Fading Channels | |
Masood et al. | A minorization–maximization algorithm for maximizing the secrecy rate of the MIMOME wiretap channel | |
Rezaee et al. | CSIT sharing over finite capacity backhaul for spatial interference alignment | |
CN111885546A (en) | Vehicle-mounted physical layer safe transmission method based on cooperative interference and artificial noise | |
Xiao et al. | High-performance multicast services in 5G big data network with massive MIMO | |
Yang et al. | Limited rate feedback in a MIMO wiretap channel with a cooperative jammer | |
Jiang et al. | Robust security transmission scheme for SWIPT-enable heterogeneous networks with RIS | |
CN114786213A (en) | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network | |
Tang et al. | Jammer-assisted secure precoding and feedback design for MIMO IoT networks | |
Zhang et al. | Robust design for IRS-aided C-RAN with constrained wireless fronthaul links |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |