CN110225579A - A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply - Google Patents

A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply Download PDF

Info

Publication number
CN110225579A
CN110225579A CN201910505170.8A CN201910505170A CN110225579A CN 110225579 A CN110225579 A CN 110225579A CN 201910505170 A CN201910505170 A CN 201910505170A CN 110225579 A CN110225579 A CN 110225579A
Authority
CN
China
Prior art keywords
node
channel
interference
cooperation
csi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910505170.8A
Other languages
Chinese (zh)
Other versions
CN110225579B (en
Inventor
高明
丁威
刘宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201910505170.8A priority Critical patent/CN110225579B/en
Publication of CN110225579A publication Critical patent/CN110225579A/en
Application granted granted Critical
Publication of CN110225579B publication Critical patent/CN110225579B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/022Site diversity; Macro-diversity
    • H04B7/024Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/243TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Safe transmission method of physical layer is interfered in the cooperation based on wireless energy supply that the invention discloses a kind of, and cooperation interfering nodes collect power using expectation and send interference signal, has studied the safe transmission performance of system under five kinds of situations;From known channel CSI, the security performance of ideal case known to all channel CSI, the unknown situation of listener-in CSI, known and under Limited Feedback rate channel CSI situation the disturbance cooperation scheme of cooperation channel gain sequence is had studied respectively, the closed solutions of the disconnecting probability and secrecy outage probability under various situations have been derived, and have given the expression formula under high SNR approximation;It can be concluded that there are certain tradeoffs for the disconnecting probability and secrecy outage probability of system, it can be selected according to different system requirements and designing system parameter reaches the compromise of safety-confidentiality.

Description

A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply
Technical field
Physical layer is interfered in cooperation the present invention relates to network security transmission technical field more particularly to one based on wireless energy supply Safe transmission method kind.
Background technique
The transmission of interference signal requires the expenditure of energy, although friendly cooperation interfering nodes (Friendly
Jammer, FJ) safe transmission of legitimate user's information can be assisted, but the energy of itself is consumed at the same time. Due to the selfishness and independence of node, interfering nodes should not at least damage the effect of itself while helping legal transmission Beneficial or even available additional compensation and reward.Therefore, the transmitter of legitimate user needs to provide FJ node transmission interference institute The additional energy needed, energy needed for cooperative node is compensated by way of wireless energy supply can motivate cooperative node to participate in Cooperate safe transmission, this more meets the case where practical cooperative node participates in cooperation.
Document Jiang and Chen have studied power station and activate legitimate user to transmit information, PB (Power by wireless energy supply Beacon the power source of transmitter) is acted as.Jiang is investigated there are when single antenna and multiple antennas listener-in Eve, single antenna PB supplies the safety of physical layer performance of the system of multiple antenna transmitter energy by way of radio function, it should be noted that should Scheme is to send AN by transmitter come the safety of very high system.Huang uses the model similar to document, and difference exists Conspire and two kinds of different situations of non-conspiracy in considering multiple listener-ins, it is assumed that known outdated channel CSI (Outdated CSI, OCSI), the security interrupt for having studied transmitter using high specific transmission (MRT) and transmission antenna selection (TAS) two methods is general Rate (SOP) and average secrecy rate.
Summary of the invention
Safe transmission method of physical layer is interfered in the cooperation based on wireless energy supply that the object of the present invention is to provide a kind of, and cooperation is dry It disturbs node and collects power transmission interference signal using expectation, the safety of system is enhanced under the premise of not expending self-energy Property.
The technical solution adopted by the present invention are as follows:
A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply, comprising the following steps:
A: establishing the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S, Single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, here in order to calculate and easy analysis, the cooperative node of single antenna It can be regarded as the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all It is quasi-static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is only between different transmission blocks Vertical variation;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source Node sends the collection of energy of power, replaces real value using the desired value for collecting energy;It is entire to pass using time division transmission agreement Defeated process is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are for the The wireless energy supply in one stage, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member Element is all to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector And meet general power restrictive conditionNS indicates NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus The transmission power of node J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference letter Number, eavesdropping node eavesdrops useful information;
The channel CSI according to known to cooperative node, using following two cooperation jamming program: the linear wave beam forming side BF Method and day line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas The received reliability of point and safety;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution Multiple Gauss stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user With, and this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal day using the standard set as foundation from mutiple antennas Line carrys out transmission interference signal, achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), at the SINR and listener-in E at legitimate user D SIR can be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section Channel coefficients between the kth root antenna and listener-in E of point J.
The present invention collects power using expectation using cooperation interfering nodes and sends interference signal, has studied under five kinds of situations and is The safe transmission performance of system.From known channel CSI, ideal case known to all channel CSI, eavesdropping are had studied respectively Disturbance cooperation part known to the unknown situation of person CSI, cooperation channel gain sequence and under Limited Feedback rate channel CSI situation The security performance of case, has derived the closed solutions of the disconnecting probability and secrecy outage probability under various situations, and gives height Expression formula under SNR approximation;It can be concluded that the disconnecting probability and secrecy outage probability of system be there are certain tradeoff, It can be selected according to different system requirements and designing system parameter reaches the compromise of safety-confidentiality.
Further, emulation and comparative analysis have been carried out to several schemes, analyzed and had studied under high SNR relative to not feeding back When can be obtained traversing up to secrecy rate gain;Demonstrate important function of the key parameter of system in security performance with And finite rate feedback method is actually tasting the advantage in the greatest extent.
Detailed description of the invention
Fig. 1 is finite rate feedback cooperation interference eavesdropping mode of the invention;
Fig. 2 is the curve that disconnecting probability of the invention changes with SNR;
Fig. 3 is the curve that disconnecting probability of the invention changes with SNR;
Fig. 4 is the curve that secrecy outage probability of the invention changes with SNR;
Fig. 5 is the curve that disconnecting probability of the invention changes with number of bits of feedback B;
Fig. 6 is the curve that disconnecting probability and secrecy outage probability of the invention change with time slot splitting factor α;
Fig. 7 is required minimum feedback bit number B of the invention with secrecy outage probability limitation change curve.
Specific embodiment
As shown in Figure 1, the present invention the following steps are included:
A: establishing the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S, Single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, here in order to calculate and easy analysis, the cooperative node of single antenna It can be regarded as the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all It is quasi-static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is only between different transmission blocks Vertical variation;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source Node sends the collection of energy of power, replaces real value using the desired value for collecting energy;It is entire to pass using time division transmission agreement Defeated process is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are for the The wireless energy supply in one stage, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member Element is all to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector And meet general power restrictive conditionnSIndicate NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus The transmission power of node J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference letter Number, eavesdropping node eavesdrops useful information;
The channel CSI according to known to cooperative node, using following two cooperation jamming program: the linear wave beam forming side BF Method and day line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas The received reliability of point and safety;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution Multiple Gauss stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user With, and this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal day using the standard set as foundation from mutiple antennas Line carrys out transmission interference signal, achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), at the SINR and listener-in E at legitimate user D SIR can be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section Channel coefficients between the kth root antenna and listener-in E of point J.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Step A: establishing system model, as shown in Figure 1, considering the finite rate feedback cooperation interference eavesdropping transmission mould of MISO Type, including multiple antennas information source node S, single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply are stolen Listen node E.There it is contemplated that the eavesdropping model of typical interference cooperation auxiliary, cooperative node do not consume the premise of own resource The information transmission of lower cooperation legitimate user, enhances the anti-eavesdropping capability of system.Cooperative node can be multiple or multiple antennas, this In in order to calculate and easy analysis, the cooperative node of single antenna can be regarded as selecting from multiple cooperative nodes one it is optimal The special circumstances of cooperative node.Since the energy of cooperative node is from the wireless energy supply of source node, so its function for sending interference Rate is changed as source node sends changed power, this is a typical feature for being different from other systems.Here false If S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna.Assuming that channel is all quasi-static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI independently changes between different transmission blocks.
Since cooperation interfering nodes are selfish and energy constraint nodes, the energy for sending interference signal is saved to source Point sends the collection of energy of power, here in order to simplify the complexities of interfering nodes, is replaced using the desired value for collecting energy real Duration.Therefore, this not only simplifies the processing complexities of interfering nodes, while reducing the expense for obtaining channel CSI, and flat Interfering nodes do not consume the energy of itself in equal meaning.It is entire to pass using time-division (Time Division, TD) transport protocol Defeated process is divided into two stages.First stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;Second stage, Source node S conveys information to destination node D, and the interfering nodes that cooperate at the same time send interference signal, and eavesdropping node eavesdropping is useful Information.Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are used for the first rank The wireless energy supply of section, remaining time slot (1- α) T are transmitted for information.
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member Element is all the zero-mean for obeying independent same distribution (Identically and Independently Distributed, i.i.d) Variance is λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector and meet general power restrictive conditionnSIndicate NS× 1 Gauss additive white noise vector andTherefore, in the first stage At the end of, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency.Since noise energy is smaller compared to the signal energy of transmission, Here the energy of noise is had ignored.Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., sent with the expectation for collecting energy Interference signal, so that the transmission power of node J can be written as
Assuming that the instantaneous CSI of source node known legitimate channel, the instantaneous CSI of tapping channel is unknown.This hypothesis it is reasonable Property be to be that the CSI of legitimate channel can be obtained by various based on trained channel estimation methods, such as MMSE, while can be with Ideal channel CSI is obtained by increasing pilot power etc.;And listener-in due to be it is passive passive, will not active reporting Its channel CSI or channel CSI that inaccuracy may be reported, therefore it is assumed that the unknown source node of source node and listener-in's channel Status information.On the other hand, due to the limitation of the complexity of cooperative node and system call, the interfering nodes that cooperate are coupled The instantaneous CSI of channel be not easy to obtain, consider known ideal CSI, known channel gain sequence here and be based on finite rate Tri- kinds of situations of part CSI of feedback, wherein primary study sorted based on channel gain and the CSI based on finite rate feedback under Security performance, and compared with ideal CSI.The channel CSI according to known to cooperative node can mainly use following two Kind cooperation jamming program: linear wave beam forming (BF) and day line options (AS).Source node S is used using all antenna freedom degrees Beam form-endowing method is transmitted with enhancement information, and cooperative node is disguised as using the expectation power of collection in the information transmission stage artificial dry The role disturbed.Since cooperative node also configures multiple antennas, the performance according to needed for system, implementation complexity and expense are adopted With different cooperation jamming programs.
Cooperation interference transmission plan
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas The received reliability of point and safety.Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E.hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution Multiple Gauss stochastic variable.The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal.Similarly, at listener-in E Reception signal can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived Eavesdrop the interference channel of node E.hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal.
Therefore, in conjunction with (3), the end-to-end Signal to Interference plus Noise Ratio (SINR) of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user With, and this is also common in document it is assumed that can be regarded as a kind of worst situation.Therefore, in conjunction with (3-3) listener-in E End-to-end signal interference ratio (SIR) be represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
Antenna selecting method
Its line options is a kind of common method of a kind of low complex degree and energy-efficient enhancing safety of physical layer[52], especially suitable System for computing capability and energy constraint.Here it is considered that the selfishness of node and the wireless energy supply energy being collected into Finiteness, AS can yet be regarded as it is a kind of it is effective energy conservation and enhancing safety method.According to the principle of AS, cooperative node is with certain Standard is foundation, selects best antenna to carry out transmission interference signal from mutiple antennas, reaches and enhances system security Purpose.It is assumed that k is the index of selected antenna, according to formula (7) and (8), the SIR at SINR and listener-in E at legitimate user D can To be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section Channel coefficients between the kth root antenna and listener-in E of point J.
Cooperation interference method based on known channel CSI
Mainly provide send wave beam Shape design and AS method so that damage listener-in channel quality while pair The influence of legitimate user is reduced to minimum.For the CSI situation of known channel, different cooperation interference method and plan can be designed Slightly.
The first situation: ideal case: cooperative node-destination node and cooperative node-listener-in CSI are known
Work as hjdCSI be it is ideal and it is known that can be completely eliminated using Zero-forcing method at legitimate user receiver come From in the interference of cooperative node J.At the same time, it can use known hjeCSI maximize listener-in at interference.Therefore, wave Beam figuration vector w2It is the solution of following optimization problem:
According to the research achievement of Ding[53], the solution of above formula optimization problem is represented by
Wherein NJ×NJMatrixIt is hjdThe orthocomplement, orthogonal complement of column space can be expressed as
Second situation: only known to cooperative node-destination node CSI
Work as hjdCSI be it is ideal and it is known that Zero-forcing method still can be used at legitimate user receiver come completely eliminate come From in the interference of cooperative node J.Due to hjeCSI it is unknown, in the first situation of the no image of Buddha using cooperative node and listener-in it Between channel CSI design wave beam formed matrix to increase the interference at listener-in.Therefore, empty using the zero of the interference that will cooperate here Between be directed at legitimate user so that being 0 to the interference of legitimate user, and random disturbances are generated for listener-in.Wave beam forming vector Design method is needed first to matrixMake singular value decomposition (SVD), can obtain
Therefore, corresponding NJThe N of -1 non-zero singular valueJ- 1 left singular value vector uiAtColumn space, uiIt can be with It is expressed asThe linear combination of column vector, thus
Therefore, wave beam forming vector can be from NJ- 1 left singular value vector uiIn arbitrarily choose one, can guarantee in this way Interference at legitimate user is 0, and the interference at listener-in is random disturbances at this time, and in 4.3.1 is the wave beam tax of co-design Shape vector, the interference at listener-in are the attainable maximum interferences of institute.
The third situation: known to the sequence of cooperative node-destination node channel gain
Work as hjdChannel gain sequence it is known when, AS method can be used, according to formula (9), select channel gain minimum right The antenna index answered may make influence of the cooperation interfering nodes to legitimate user to minimize in this way.Therefore, the standard of AS selection For
Wherein hidIt is hjdI-th of element.The antenna index for noticing that the program is selected is for tapping channel Random antenna selection.
4th kind of situation: hjdFinite rate feedback: the smallest code book selection method is interfered based on legitimate user
The local channel CSI between cooperation interfering nodes and legitimate user can be obtained by finite rate feedback.Having In rate feedback model, legitimate user estimates and quantifies the channel CSI between cooperative node and destination node, and selection one is most Excellent code book removes quantized channel CSI, and codebook set can quantify (RVQ) acquisition by random vector, i.e., is 2 from sizeBIt is a pre- Select a code book as channel CSI feedback to cooperative node in quantization codebook set, B is number of bits of feedback here.Quantization code This setBy 2BA NJTie up unit norm vector composition, and cooperative node and legitimate user are known should Codebook set.According to certain selection criterion, legitimate user transmits selected code book index by feedback channel.
Since the corresponding channel CSI of code book code book is the channel CSI after quantization, and actual channel CSI has certain deviation, Therefore, inevitably to legitimate user, there are certain interference.Using the minimum interference at legitimate user as optimization aim, choosing The standard for selecting wave beam forming vector is as follows
WhereinIt is channel direction information (CDI) vector.
5th kind of situation: hjdFinite rate feedback: the code book selection method based on channel quadrature
Compared with the 4th kind of situation: similar to use Limited Feedback scheme and required feedback is also identical, the difference is that Construct wave beam forming vector w2Method it is different.Different from being used in the 4th kind of situation and hjdMake closest to orthogonal codebook vectors For wave beam forming vector, to reduce the interference to legitimate user to the greatest extent.This trifle selects first and hjdImmediate code book to Amount is used as feedback information, and the wave beam forming vector orthogonal with legitimate channel is then constructed according to feedback information.Therefore, the choosing of code book It is as follows to select standard
Index based on feedback obtains and hjdImmediate codebook vectorsCooperative node withOrthogonal direction Interference signal is sent, can guarantee that the interference for legitimate channel is small as far as possible in this way.Therefore, it utilizesWave beam forming Vector w2It can be constructed using the method similar to 4.3.2.The essence of the method for this trifle is selected code bookMore Close to real channel hjd, the wave beam forming vector w that constructs2It more can be close to the orthogonal direction of real channel, so as to so as to close The interference of method user is small as far as possible.
Security performance
For the cooperation interference system mentioned, consider disconnecting probability and secrecy outage probability and traversal up to secrecy Rate is safety index.For description and convenience of calculation, definition
gsd=| | hsd||2,gJS=| | HSJ||2, To which formula (7)-(9) can be written as following form:
According to the confirmation of Simon, gsdObeying parameter respectively is 2NsChi distribution, corresponding PDF can be written as
It notices when using AS,gseIt is exponential distribution gaussian variable and unit direction The sum of stochastic variable knows that it obeys exponential distribution, corresponding PDF is according to the confirmation of Shah
Derive and study below the system safety index under the cooperation interference method, and each parameter pair of research and analysis The influence of system performance.
Disconnecting probability and secrecy outage probability
(1) ideal case: cooperative node-destination node and cooperative node-listener-in CSI are known
By the definition of COP it is found that when the off-capacity of legitimate user's channel is to support transmission rate, i.e. CD< Rt, interrupt Event occurs.Therefore, for the ideal CSI situation of 4.3.1, formula (10) and (12) is substituted into formula (18), can be obtainedWithThe g known to [55]jeObey Gamma (NJ-1,λ5), PDF is
Formula (18) are substituted into, the disconnecting probability that can be obtained under situation 1 can be written as
WhereinBy the definition of secrecy outage probability, by formula (20) and substitutes into and utilize the system of can be calculated The analytic expression of secrecy outage probability is
Wherein
By formula (22) to find out the disconnecting probability of system and send power PS, time slot dividing factor-alpha, source node antenna Number and transmission rate RtIt is related, and with PSIncrease and reduce, with α and RtIncrease and increase.Work as PSWhen → ∞, it is The disconnecting probability of system can be written as
It is d=N so as to obtain its diversity orderS, i.e. transmission antenna number.By formula (23) can be seen that secrecy outage probability with Send power PSIt is unrelated, only time slot dividing factor-alpha, cooperation number of antennas and secrecy rate ReRelated, as given α, secrecy is interrupted Probability levels off to constant, and secrecy rate reduces with the increase of cooperative node number of antennas, i.e., anti-eavesdropping capability enhancing, this It is because more cooperative node number of antennas provide more freedom degrees.
(2) known to cooperative node-destination node CSI
Compared to the known situation 1 of interference channel CSI, the interference channel CSI of cooperative node to listener-in is unknown here. At this point, the SNR of legitimate user is constant, shown in the expression formula of disconnecting probability such as formula (22), further table is not made here It states.It is w by the above-mentioned precoding vector for knowing cooperative node at this time for the SIR of listener-in2=ui, thenObedience refers to Number distribution, i.e., degenerating from the Gamma distribution in situation 1 is exponential distributionTo use Similar method, the analytic expression that can obtain the secrecy outage probability of system are
It is identical as situation 1, secrecy outage probability and transmission power PSIt is unrelated, only with time slot dividing factor-alpha and secrecy rate Re Related, as given α, secrecy outage probability levels off to constant.The difference is that the antenna number of secrecy outage probability and cooperative node Mesh is unrelated, i.e., secrecy rate will not reduce with the increase of cooperative node number of antennas, this is because cooperative node to eavesdropping The channel CSI of person is unknown, and the design of wave beam forming vector cannot utilize channel information, the cooperative node antenna for listener-in The increase of number can not more freedom degrees.It is stolen it is thus impossible to increase number of antennas by cooperative node and improve the anti-of system Listen ability.
(3) sequence of cooperative node-destination node channel gain is known and cooperative node uses AS
Different from the interference channel h of cooperative node in situation 2 to legitimate userjdIt is completely known, it is assumed here that cooperative node The sequence of the channel gain of antenna corresponding to interference channel to legitimate user it is known that cooperative node can use AS scheme, this When destination node need to only feed back the index of corresponding optimal antenna, be not necessarily to the complete CSI of channel, can not only reduce system Complexity and expense can also save the energy of cooperative node.The transmission antenna of selection is random selection for listener-in, right It is optimal for legitimate user.Therefore, it can increase system while reducing the interference of legitimate receipt node Safety.At this timeSince selected antenna is random selection for listener-in, Obey exponential distribution Exp (λ5), and selected antenna is the smallest antenna of channel gain for legitimate user, then its CDF can be calculated For
To which PDF is represented by fgjd(x)=NJ4exp(-xNJ4), being considered as parameter is λ4/NJIndex point Cloth.By the definition of disconnecting probability, the expression formula of legitimate user SINR is substituted into, the system disconnecting under the 3rd kind of situation The expression formula of probability can be written as
Wherein (a) is by gsdCDF substitute into arrange after can obtain, be (b) using after binomial expansion by gjdPDF substitute into It can be obtained after arrangement, can be obtained after calculating final finishing according to [56].
Using the method for similar situation 2, the analytic expression that can obtain the secrecy outage probability of system is
Since formula (27) is more complex, in order to preferably study the influence of system parameter, deriving high send under power here is The outage probability analytic expression of system.Work as PSWhen → ∞, the disconnecting probability of system can be calculated as
It is different from situation 1 and 2, the disconnecting probability and transmission power P of systemSIt is unrelated, and with PSIncrease and tend to Constant, so that diversity order is d=0.This is because transmission wireless energy supply of the power from source node of cooperative node, cooperation section Point transmissions power it is directly proportional to the transmission power of source node, cooperative node transmission interference signal and available signal power with Source node sends the increase of power and increases with scale, so that diversity order is 0.In addition, disconnecting probability with cooperate Node antennas number is related, and reduces with the increase of cooperative node antenna number, this is because cooperative node number of antennas is got over More, the optional antenna freedom degree provided is more, interferes small antenna probability of occurrence higher legitimate user, but antenna number increases meeting Bit needed for leading to feedback index increases.Simultaneously disconnecting probability also with time slot dividing factor-alpha, source node number of antennas and Transmission rate RtIt is related, and disconnecting probability is with α and RtIncrease and increase, with the increase of source node antenna number Reduce.The secrecy outage probability expression formula of system is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing factor-alpha and Secrecy rate ReIt is related.This is because antenna selection criterion only accounts for the channel CSI between cooperative node and destination node, phase When be for listener-in random selection.
(4)hjdFinite rate feedback: the smallest code book selection method is interfered based on legitimate user
Situation 2 is cooperative node to destination node channel hjdCSI it is completely known, situation 3 is hjdChannel gain sequence It is known that considering channel h herejdPart CSI it is known that i.e. using finite rate feedback channel CSI model.Due to feedback quantization There are certain errors with ideal CSI by channel CSI, thus can be regarded as local channel CSI it is known that the orthogonal intersection space of channel simultaneously It is non-fully identical as ideal case, g different from situation 1 and 2jd≠ 0, i.e., the interference signal that cooperation interfering nodes are sent can part It is leaked to legitimate user end, to that can generate interference to legitimate user, the corresponding channel of the smallest code book is interfered in selection leakage here CSI designs wave beam forming vector.According to formula (16), the channel gain of cooperative node to legitimate user isTwo stochastic variables that it is formed are mutually indepedent,It is the inner product of two unit vectors, CDF isx∈[0,1].U is M=2BIt is a only The vertical minimum value with distribution variables, CDF are represented by
By the definition of COP, the system disconnecting probability under the 4th kind of situation is provided by following theorems.
Theorem 1: the channel CSI of cooperative node to destination node uses finite rate feedback, hjeThe unknown situation of CSI Under, the disconnecting probability expression for the interference system that cooperates can be written as
Wherein Φ1It is given by
It proves: according to the definition of disconnecting probability, legitimate user's SINR expression formula being substituted into, using similar formula (27) side Fa Ke get
WhereinTherefore, g need to be calculatedjdCDF it is as follows
To which g can be obtainedjdPDF it is as follows
Formula (36) are substituted into, can be obtained
Formula (37) substitution formula (32) can be obtained to the disconnecting probability of system.
Secrecy outage probability is derived below, according to existing theorem gjeObey exponential distribution Exp (λ5), using similar feelings The method of shape 2, the analytic expression that can obtain SOP are
The disconnecting probability of system and transmission power P known to formula (32)S, cooperative node antenna number, source node antenna Number, time slot dividing factor-alpha and secrecy rate ReIt is related, and with the increase of feedback bits B, channel CSI is more accurate, cooperative node Smaller to the interference of legitimate user, disconnecting probability reduces with the increase of number of bits of feedback, with cooperative node antenna Several increases and increase, this is because cooperative node number of antennas is more, the quantization of identical feedback bits lower channel is more coarse, association The interference for making interference signal leakage is more.Disconnecting probability is with α and RtIncrease and increase, with source node antenna number Increase and reduces.The secrecy outage probability expression formula of system is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing Factor-alpha and secrecy rate ReIt is related.This is because antenna selection criterion only accounts for the letter between cooperative node and destination node Road CSI's is feedback optimized, is random for listener-in.
(5)hjdFinite rate feedback: based on the orthogonal code book selection method of interference channel
It interferes the smallest wave beam forming vector different legitimate user from 4 kinds of situation constructions, also uses finite rate here Feedback, but choose and feed back to cooperative node with the immediate code book index of actual channel, cooperative node utilizes the code book fed back Beam vectors are designed as real channel CSI, so that it is orthogonal with interference channel, so that the interference generated to legitimate user is most It is small.According to RVQ theory, actual channel directionWith quantized channel directionRelationship can be expressed as
WhereinS be withOrthogonal and mutually independent with v unit norm vector.w2 It is to be based onKernel construction beam vectors to avoid the interference to legitimate user as far as possible.Therefore have
According to quantifying unit approximate model[46], w2Be with the independent unit norm vector of s, then Z=| sHw2|2~β (1, NJ- 2), | | hjd||2Obedience parameter is (NJ4) Gamma distribution, by [47] it is found that X=| | hjd||2sin2θ obeys parameter (NJ-1,λ4Gamma distribution δ), whereinTo gjdCDF can be expressed as
G as available from the above equationjdIt is to obey parameter as λ4The exponential distribution of δ.Due to finite rate CSI feedback, Which results in cooperative nodes to the residual interference of legitimate user, and residual interference depends on the bit number B of feedback CSI.When When number of feedback bits B → ∞, i.e. unity feedback, residual interference levels off to 0.gjeObey exponential distribution Exp (λ5), secrecy is interrupted general The analytic expression of rate is identical as formula (38).It can be obtained according to the definition of disconnecting probability, using the method for similar situation 3, in connection Disconnected probability resolution formula calculates as follows
At high SNR, the white Gaussian noise at receiver can be ignored, and the disconnecting probability of system can be calculated as
WhereinGiven code rate Rt, each node antennas number, time slot dividing factor-alpha and Successful transmissions it is general When rate ξ, the number of feedback bits B needed for being calculated by formula (4-43) is as follows
The disconnecting probability of system and transmission power P known to formula (43)SIt is unrelated, it is saved with cooperative node antenna number, source Point antenna number, time slot dividing factor-alpha and secrecy rate ReIt is related, and with the increase of feedback bits B, the channel of δ → 0 CSI is more smart Really, cooperative node is smaller to the interference of legitimate user, and disconnecting probability reduces with the increase of number of bits of feedback, with association Make the increase of node antennas number and increases, this is because cooperative node number of antennas is more, the amount of identical feedback bits lower channel Change is more coarse, and the interference of cooperation interference signal leakage is more, and number of feedback bits should be with cooperation antenna number linear increase. Disconnecting probability is with α and RtIncrease and increase, reduce with the increase of source node antenna number.The secrecy of system is interrupted Probability expression is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing factor-alpha and secrecy rate ReIt is related.
It discusses: (1) by above analysis and research it is found that descending the guarantor of system known to ideal CSI under identical system parameter Close outage probability is constant value and minimum.When cooperating known to the sequence CSI of interference channel gain, using AS, i.e. situation 3, cooperation Interfering nodes generate interference to legitimate user and listener-in simultaneously, but the antenna selected makes the interference generated to legitimate user most It is small, so that being less than the influence of listener-in to the influence of legitimate user.Under the cooperation interference cases of finite rate feedback, due to There is a certain error with ideal communication channel CSI for feedback channel, therefore certain interference can be caused to legitimate user, to compromise The performance of legitimate user.In addition, it is directed to nonideal CSI (AS and finite rate feedback), and at high SNR, legitimate userIt is i.e. unrelated with SNR, and tend to constant value, so that there are error floor effects.As feedback bits B increases, The CSI then fed back levels off to true CSI, and residual interference levels off to 0, and system performance levels off to ideal CSI situation.Therefore, CSI The accuracy of estimation and feedback has great influence to system performance.In addition, considering from the complexity and expense angle of system, it is Comparatively ideal channel CSI is obtained to need biggish overhead and send power, so that the transmission performance of system is affected, and base Only log need to be fed back in the method for feedback channel ranking index2NJBit, required feedback information is few, but obtain at the same time Performance gain is also limited.Method based on finite rate feedback can obtain the expense of relatively accurate channel CSI and system Can be controllable according to performance requirement, it can reach the compromise of preferable performance and complexity.
(2) consider the comparison situation that cooperation interference is not involved in without cooperative node or cooperative node, at this time γDs||hsd ||2,Corresponding disconnecting probability and secrecy outage probability are respectively
From the above equation, we can see that working as ρsWhen → ∞, pso→ 1, pco→ 0, it can thus be appreciated that listener-in can when without cooperation interfering nodes With the information of 1 hijack legitimate user of probability, it is therefore desirable to the algorithm of interference of anti-eavesdropping is designed, to reach the folding of rate and safety In.The several schemes proposed design different jamming programs according to different channel CSI, not only can be very good to reach reliable Property-safety compromise and tool has significant practical applications.
Emulation and interpretation of result
Mentor Carlo simulating, verifying is carried out to notional result among the above and simulation result is analyzed.Emulation ginseng Number is provided that independent simulation times are 1 × 10 unless otherwise specified6, the code rate R of source node transmissiont=2bps, it is required Secrecy rate Re=1bps, transfer efficiency factor η=0.8 of collection of energy, time slot dividing factor-alpha=0.1, channel parameter are λ1=10, λ2345=1, SNR are defined as the transmission signal-to-noise ratio P of source nodeS/N0.For ideal CSI (situation 1), association Make node-(situation 2), cooperative node-(situation 3), base known to the sequence of destination node channel gain known to destination node channel CSI In legitimate user interfere the smallest finite rate feedback (situation 4) and finite rate feedback (situation 5) based on channel quadrature this Five kinds of situations have done numerical simulation and analysis respectively.
Fig. 2 gives the curve that the disconnecting probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2 Antenna configuration, dotted line indicate NS=4, NJ=2 antenna configuration, number of bits of feedback B=8.As seen from the figure, the theory of derivation As a result it coincide well with actual emulation result, while progressive expression formula is also consistent with simulation result in the high region SNR, as upper It states and is analyzed, disconnecting probability increases and reduces with source node antenna number, and for situation 1 and diversity gain is The antenna number N of source nodeS;The disconnecting probability of system increasing and reduce with source node antenna number under remaining situation, but All there is the flat effect of error code, i.e., as the increase of SNR tends to constant, and increases flat reduction with source node antenna number. As seen from the figure, the disconnecting probability of situation 3 is worst, is secondly situation 4 and 5, and the disconnecting of situation 1 and 2 is probability Can be optimal, this is because situation 1 devises good beam vectors with the CSI for taking full advantage of interference channel.Therefore, obtain compared with Good channel CSI plays an important role to the performance of system.
Fig. 3 gives the curve that the disconnecting probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2 Antenna configuration, dotted line indicate NS=2, NJ=3 antenna configuration, number of bits of feedback B=8, as seen from the figure, the theory of derivation As a result it coincide well with actual emulation result.For situation 1, disconnecting probability is unrelated with cooperative node antenna number, and its Disconnecting probability under his situation increases and reduces with cooperative node antenna number, but all there is the flat effect of error code, i.e., As the increase of SNR tends to constant, increase flat reduction with cooperative node antenna number.Similarly, the disconnecting of situation 3 Probability is worst, is secondly situation 4 and 5, the disconnecting probability best performance of situation 1 and 2, this is because situation 1 and sufficiently benefit Good beam vectors are devised with the CSI of interference channel.
Fig. 4 gives the curve that the secrecy outage probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2 Antenna configuration, dotted line indicate NS=2, NJ=4 antenna configuration, number of bits of feedback B=8.As seen from the figure, the theory of derivation As a result it coincide well with actual emulation result.When cooperative node antenna number is 2, the system known to the analysis in ideal situation Secrecy outage probability it is all identical, this matches with simulation result.When cooperative node number of antennas is greater than 2, due to 1 benefit of situation With known channel CSI co-design beam vectors, the spatial degrees of freedom of channel is taken full advantage of, system is significantly reduced Secrecy outage probability.Secrecy outage probability under other situations increases and reduces with cooperative node antenna number, but all deposits In flat effect, i.e., as the increase of SNR tends to constant.
Fig. 5 gives the disconnecting probability of system with the change curve of number of bits of feedback B, wherein SNR=15dB, NS =4, NJ=4, number of bits of feedback B=8.Situation 1,2 and 3 is unrelated with number of feedback bits B, therefore outage probability is not with the change of B Change and changes.The disconnecting probability of situation 4 and 5 is related with number of bits of feedback, and reduce with the increase of bit number and by Gradually it is bordering on situation 1.This is because channel quantitative precision is higher with the increase of bit number B, closer to real channel, thus The disconnecting probability of system improves rapidly.It is noted that when number of bits of feedback is less, B < 2, the method based on day line options Disconnecting probability performance is better than being based on finite rate feedback situation, because feedback bits lead to channel CSI quantization excessively very little Coarse, the interference for being leaked to destination node increases the SINR reduction for resulting in destination node, and reliability reduces.With feedback bits The precision of the increase of B, channel quantitative improves, and becomes closer to real channel CSI, and the interference signal that interfering nodes are sent leaks into The interference of destination node tends to 0, and the disconnecting probability of system levels off to ideal case.
The curve that Fig. 6 gives the disconnecting probability of system and secrecy outage probability changes with time slot dividing factor-alpha, Wherein NS=2, NJ=2, number of bits of feedback B=6.Item as a comparison gives COP and SOP under no cooperative node in figure. As seen from the figure, with the increase of α, the disconnecting probability of the system under five kinds of situations increases, i.e., reliability reduces, this is Because the time slot for being used for transmission data is shorter and shorter, corresponding transmission rate is higher and higher;On the other hand, with the increase of α, five The secrecy outage probability of system under kind situation reduces, i.e. safety enhances, this is because cooperative node can be collected more Energy is used for transmission interference signal, and data transmission slots shorten, and SINR needed for listener-in increases, and is less susceptible to be ravesdropping.Therefore, There are the tradeoff that reliability-is safely, the disconnecting probability of no cooperative node system is smaller, but secrecy outage probability compared with Greatly, in the preferential data transmission of safety, cooperative node plays a significant role.
Fig. 7 gives under secrecy outage probability ξ restrictive condition, minimum needed for the system of different cooperative node number of antennas The change curve of number of feedback bits B, wherein NS=4.As can be seen from Figure to reach identical secrecy outage probability, with cooperation The increase of node antennas number, required minimum feedback bit number B increase;To obtain the quantization with precision, increasing for number of antennas is needed Want more quantization bits.It is noted that required minimum feedback bit number B reduces with the increase of secrecy outage probability;Only Smaller bit feedback is needed to can reach required secrecy outage probability.
The present invention is based on the secure transmission system performances of the cooperation interference system of wireless energy supply, cooperate interfering nodes period of use Hope that collecting power sends interference signal, has studied the safe transmission performance of system under five kinds of situations.Go out from known channel CSI Hair has studied ideal case known to all channel CSI, the unknown situation of listener-in CSI respectively, cooperates known to channel gain sequence With the security performance of the disturbance cooperation scheme under Limited Feedback rate channel CSI situation, the company under various situations has been derived The closed solutions of outage probability and secrecy outage probability are connect, and give the expression formula under high SNR approximation;It can be concluded that the company of system Connecing outage probability and secrecy outage probability, there are certain tradeoffs, can be according to the selection of different system requirements and design department System parameter reaches the compromise of safety-confidentiality.Further, system is derived and has studied to traverse up to secrecy rate, to several Scheme has carried out emulation and comparative analysis, analyzes and has studied and is reachable relative to can be obtained traversing when not feeding back under high SNR Secrecy rate gain;Important function and finite rate feedback method of the key parameter of system in security performance is demonstrated to exist Actually taste the advantage in the greatest extent.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it is still Can modify to technical solution documented by previous embodiment, or some or all of the technical features are carried out etc. With replacement;And these are modified or replaceed, technical solution of the embodiment of the present invention that it does not separate the essence of the corresponding technical solution Range.

Claims (1)

1. safe transmission method of physical layer is interfered in a kind of cooperation based on wireless energy supply, it is characterised in that: the following steps are included:
A: the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S, Dan Tian are established Line legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, and here in order to calculate and easy analysis, the cooperative node of single antenna can be with Regard the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes as;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all quasi- Static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is independent change between different transmission blocks Change;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source node The collection of energy for sending power replaces real value using the desired value for collecting energy;Using time division transmission agreement, entirely it is transmitted across Journey is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are used for the first rank The wireless energy supply of section, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each element It is to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector and full Football Association's power limitation conditionnSIndicate NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus node The transmission power of J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference signal, It eavesdrops node and eavesdrops useful information;
The channel CSI according to known to cooperative node is cooperated jamming program using following two: linear wave beam forming BF method and Its line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed using multiple antennas and is connect with enhancing destination node The reliability and safety of receipts;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates cooperative node J to eavesdropping The interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4The multiple height of independent same distribution This stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam forming to Amount, x is the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are specific works The interference signal of rate, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates cooperative node J to eavesdropping The interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5The multiple height of independent same distribution This stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading role at eavesdropping user, and And this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel CSI Information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal antenna using the standard set as foundation from mutiple antennas Transmission interference signal achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), the SIR at SINR and listener-in E at legitimate user D can To be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperative node J Kth root antenna and listener-in E between channel coefficients.
CN201910505170.8A 2019-06-12 2019-06-12 Cooperative interference physical layer secure transmission method based on wireless energy supply Active CN110225579B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910505170.8A CN110225579B (en) 2019-06-12 2019-06-12 Cooperative interference physical layer secure transmission method based on wireless energy supply

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910505170.8A CN110225579B (en) 2019-06-12 2019-06-12 Cooperative interference physical layer secure transmission method based on wireless energy supply

Publications (2)

Publication Number Publication Date
CN110225579A true CN110225579A (en) 2019-09-10
CN110225579B CN110225579B (en) 2021-02-02

Family

ID=67816637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910505170.8A Active CN110225579B (en) 2019-06-12 2019-06-12 Cooperative interference physical layer secure transmission method based on wireless energy supply

Country Status (1)

Country Link
CN (1) CN110225579B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110856166A (en) * 2019-10-26 2020-02-28 中国人民解放军陆军工程大学 Interference selection-based idle user cooperative interference strategy in cellular network
CN111163464A (en) * 2020-01-16 2020-05-15 电子科技大学 Random eavesdropping resistant multi-service transmission power distribution method
CN111277311A (en) * 2020-02-10 2020-06-12 电子科技大学 Active and passive combined beam forming design method for millimeter wave symbiotic communication system
CN111866861A (en) * 2020-06-09 2020-10-30 珠海高凌信息科技股份有限公司 Wireless sensor network secure transmission method and device based on cooperation
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN112512085A (en) * 2020-12-21 2021-03-16 郑州大学产业技术研究院有限公司 Robust opportunity constraint optimization method based on WPBC system security
CN112600607A (en) * 2020-11-25 2021-04-02 西安电子科技大学 Double full-duplex cooperative interference anti-eavesdropping method
CN112822662A (en) * 2020-11-24 2021-05-18 西安交通大学 D2D cache user safety cooperation method and system based on joint content transmission and interference blocking
CN113132975A (en) * 2021-04-22 2021-07-16 大连理工大学 Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system
CN113193952A (en) * 2020-04-15 2021-07-30 电子科技大学 High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping
CN114614963A (en) * 2022-03-16 2022-06-10 北京航空航天大学 Alternative optimization iterative user group selection method, electronic device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131941A (en) * 2016-05-20 2016-11-16 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation
CN109640321A (en) * 2018-12-19 2019-04-16 西安电子科技大学 Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131941A (en) * 2016-05-20 2016-11-16 电子科技大学 Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation
CN109640321A (en) * 2018-12-19 2019-04-16 西安电子科技大学 Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ABDELHAMID SALEM等: "《Improving Physical Layer Security of AF Relay Networks via Beam-Forming and Jamming》", 《2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)》 *
SHUANGYU LUO等: "《Uncoordinated Cooperative Jamming for Secret Communications》", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 *
XIN JIANG等: "《Power Beacon Assisted Wiretap Channels With Jamming》", 《 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110856166A (en) * 2019-10-26 2020-02-28 中国人民解放军陆军工程大学 Interference selection-based idle user cooperative interference strategy in cellular network
CN111163464A (en) * 2020-01-16 2020-05-15 电子科技大学 Random eavesdropping resistant multi-service transmission power distribution method
CN111163464B (en) * 2020-01-16 2020-08-25 电子科技大学 Random eavesdropping resistant multi-service transmission power distribution method
CN111277311A (en) * 2020-02-10 2020-06-12 电子科技大学 Active and passive combined beam forming design method for millimeter wave symbiotic communication system
CN111277311B (en) * 2020-02-10 2022-03-25 电子科技大学 Active and passive combined beam forming design method for millimeter wave symbiotic communication system
CN113193952A (en) * 2020-04-15 2021-07-30 电子科技大学 High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping
CN111866861A (en) * 2020-06-09 2020-10-30 珠海高凌信息科技股份有限公司 Wireless sensor network secure transmission method and device based on cooperation
CN111866861B (en) * 2020-06-09 2024-01-23 珠海高凌信息科技股份有限公司 Wireless sensor network secure transmission method and device based on cooperation
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN112260796B (en) * 2020-10-21 2023-02-21 三维通信股份有限公司 Method and device for controlling interference signal emission
CN112822662A (en) * 2020-11-24 2021-05-18 西安交通大学 D2D cache user safety cooperation method and system based on joint content transmission and interference blocking
CN112600607B (en) * 2020-11-25 2022-04-08 西安电子科技大学 Double full-duplex cooperative interference anti-eavesdropping method
CN112600607A (en) * 2020-11-25 2021-04-02 西安电子科技大学 Double full-duplex cooperative interference anti-eavesdropping method
CN112512085B (en) * 2020-12-21 2022-11-01 郑州大学产业技术研究院有限公司 Robust opportunity constraint optimization method based on WPBC system security
CN112512085A (en) * 2020-12-21 2021-03-16 郑州大学产业技术研究院有限公司 Robust opportunity constraint optimization method based on WPBC system security
CN113132975A (en) * 2021-04-22 2021-07-16 大连理工大学 Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system
CN113132975B (en) * 2021-04-22 2022-06-14 大连理工大学 Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system
CN114614963A (en) * 2022-03-16 2022-06-10 北京航空航天大学 Alternative optimization iterative user group selection method, electronic device and storage medium
CN114614963B (en) * 2022-03-16 2023-09-26 北京航空航天大学 Alternate optimization iteration user group selection method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110225579B (en) 2021-02-02

Similar Documents

Publication Publication Date Title
CN110225579A (en) A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply
Ding et al. Joint MIMO precoding and computation resource allocation for dual-function radar and communication systems with mobile edge computing
Fernandes et al. Inter-cell interference in noncooperative TDD large scale antenna systems
Papailiopoulos et al. Interference alignment as a rank constrained rank minimization
Palhares et al. Robust MMSE precoding and power allocation for cell-free massive MIMO systems
Jiang et al. Impact of channel aging on zero-forcing precoding in cell-free massive MIMO systems
Kim et al. A new channel quantization strategy for MIMO interference alignment with limited feedback
WO2011096749A2 (en) A method for interference alignment in wireless network
Shi et al. Zero-forcing-based downlink virtual MIMO–NOMA communications in IoT networks
Fang et al. Cell-free massive MIMO systems with oscillator phase noise: Performance analysis and power control
Bogale et al. Robust transceiver optimization for downlink coordinated base station systems: distributed algorithm
Nosrat-Makouei et al. A simple SINR characterization for linear interference alignment over uncertain MIMO channels
Zhang et al. Per-stream MSE based linear transceiver design for MIMO interference channels with CSI error
CN103117787A (en) Self-adaptive bit distributing method and self-adaptive bit distributing device in cooperative multi-aerial system
CN101877607B (en) Method and device for configuring pre-coding weights in cells
Sun et al. A machine learning approach for beamforming in ultra dense network considering selfish and altruistic strategy
CN107078772A (en) The network processes that the CSI degrees of accuracy are perceived
Dharmawansa et al. Performance analysis of a two–tile reconfigurable intelligent surface assisted 2× 2 MIMO system
Zhang et al. Robust design of linear MIMO transceivers under channel uncertainty
Kountouris et al. Transmission capacity scaling of SDMA in wireless ad hoc networks
Song et al. Flexible coordinated beamforming (FlexCoBF) for the downlink of multi-user MIMO systems in single and clustered multiple cells
CN109905155A (en) A kind of interference management method, wireless communication system based on inside and outside cascade precoding
Hu et al. Combined transceiver optimization for uplink multiuser MIMO with limited CSI
Zhang et al. Analysis of SER of MIMO‐MRC systems with imperfect channel estimation in the presence of non‐Rayleigh CCIs
Tabikh et al. Beamforming design with combined channel estimate and covariance CSIT via random matrix theory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant