CN110225579A - A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply - Google Patents
A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply Download PDFInfo
- Publication number
- CN110225579A CN110225579A CN201910505170.8A CN201910505170A CN110225579A CN 110225579 A CN110225579 A CN 110225579A CN 201910505170 A CN201910505170 A CN 201910505170A CN 110225579 A CN110225579 A CN 110225579A
- Authority
- CN
- China
- Prior art keywords
- node
- channel
- interference
- cooperation
- csi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/18—TPC being performed according to specific parameters
- H04W52/24—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
- H04W52/243—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Safe transmission method of physical layer is interfered in the cooperation based on wireless energy supply that the invention discloses a kind of, and cooperation interfering nodes collect power using expectation and send interference signal, has studied the safe transmission performance of system under five kinds of situations;From known channel CSI, the security performance of ideal case known to all channel CSI, the unknown situation of listener-in CSI, known and under Limited Feedback rate channel CSI situation the disturbance cooperation scheme of cooperation channel gain sequence is had studied respectively, the closed solutions of the disconnecting probability and secrecy outage probability under various situations have been derived, and have given the expression formula under high SNR approximation;It can be concluded that there are certain tradeoffs for the disconnecting probability and secrecy outage probability of system, it can be selected according to different system requirements and designing system parameter reaches the compromise of safety-confidentiality.
Description
Technical field
Physical layer is interfered in cooperation the present invention relates to network security transmission technical field more particularly to one based on wireless energy supply
Safe transmission method kind.
Background technique
The transmission of interference signal requires the expenditure of energy, although friendly cooperation interfering nodes (Friendly
Jammer, FJ) safe transmission of legitimate user's information can be assisted, but the energy of itself is consumed at the same time.
Due to the selfishness and independence of node, interfering nodes should not at least damage the effect of itself while helping legal transmission
Beneficial or even available additional compensation and reward.Therefore, the transmitter of legitimate user needs to provide FJ node transmission interference institute
The additional energy needed, energy needed for cooperative node is compensated by way of wireless energy supply can motivate cooperative node to participate in
Cooperate safe transmission, this more meets the case where practical cooperative node participates in cooperation.
Document Jiang and Chen have studied power station and activate legitimate user to transmit information, PB (Power by wireless energy supply
Beacon the power source of transmitter) is acted as.Jiang is investigated there are when single antenna and multiple antennas listener-in Eve, single antenna
PB supplies the safety of physical layer performance of the system of multiple antenna transmitter energy by way of radio function, it should be noted that should
Scheme is to send AN by transmitter come the safety of very high system.Huang uses the model similar to document, and difference exists
Conspire and two kinds of different situations of non-conspiracy in considering multiple listener-ins, it is assumed that known outdated channel CSI (Outdated CSI,
OCSI), the security interrupt for having studied transmitter using high specific transmission (MRT) and transmission antenna selection (TAS) two methods is general
Rate (SOP) and average secrecy rate.
Summary of the invention
Safe transmission method of physical layer is interfered in the cooperation based on wireless energy supply that the object of the present invention is to provide a kind of, and cooperation is dry
It disturbs node and collects power transmission interference signal using expectation, the safety of system is enhanced under the premise of not expending self-energy
Property.
The technical solution adopted by the present invention are as follows:
A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply, comprising the following steps:
A: establishing the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S,
Single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, here in order to calculate and easy analysis, the cooperative node of single antenna
It can be regarded as the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all
It is quasi-static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is only between different transmission blocks
Vertical variation;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source
Node sends the collection of energy of power, replaces real value using the desired value for collecting energy;It is entire to pass using time division transmission agreement
Defeated process is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are for the
The wireless energy supply in one stage, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member
Element is all to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector
And meet general power restrictive conditionNS indicates NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus
The transmission power of node J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference letter
Number, eavesdropping node eavesdrops useful information;
The channel CSI according to known to cooperative node, using following two cooperation jamming program: the linear wave beam forming side BF
Method and day line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas
The received reliability of point and safety;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution
Multiple Gauss stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned
Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single
The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution
Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user
With, and this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel
CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal day using the standard set as foundation from mutiple antennas
Line carrys out transmission interference signal, achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), at the SINR and listener-in E at legitimate user D
SIR can be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section
Channel coefficients between the kth root antenna and listener-in E of point J.
The present invention collects power using expectation using cooperation interfering nodes and sends interference signal, has studied under five kinds of situations and is
The safe transmission performance of system.From known channel CSI, ideal case known to all channel CSI, eavesdropping are had studied respectively
Disturbance cooperation part known to the unknown situation of person CSI, cooperation channel gain sequence and under Limited Feedback rate channel CSI situation
The security performance of case, has derived the closed solutions of the disconnecting probability and secrecy outage probability under various situations, and gives height
Expression formula under SNR approximation;It can be concluded that the disconnecting probability and secrecy outage probability of system be there are certain tradeoff,
It can be selected according to different system requirements and designing system parameter reaches the compromise of safety-confidentiality.
Further, emulation and comparative analysis have been carried out to several schemes, analyzed and had studied under high SNR relative to not feeding back
When can be obtained traversing up to secrecy rate gain;Demonstrate important function of the key parameter of system in security performance with
And finite rate feedback method is actually tasting the advantage in the greatest extent.
Detailed description of the invention
Fig. 1 is finite rate feedback cooperation interference eavesdropping mode of the invention;
Fig. 2 is the curve that disconnecting probability of the invention changes with SNR;
Fig. 3 is the curve that disconnecting probability of the invention changes with SNR;
Fig. 4 is the curve that secrecy outage probability of the invention changes with SNR;
Fig. 5 is the curve that disconnecting probability of the invention changes with number of bits of feedback B;
Fig. 6 is the curve that disconnecting probability and secrecy outage probability of the invention change with time slot splitting factor α;
Fig. 7 is required minimum feedback bit number B of the invention with secrecy outage probability limitation change curve.
Specific embodiment
As shown in Figure 1, the present invention the following steps are included:
A: establishing the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S,
Single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, here in order to calculate and easy analysis, the cooperative node of single antenna
It can be regarded as the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all
It is quasi-static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is only between different transmission blocks
Vertical variation;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source
Node sends the collection of energy of power, replaces real value using the desired value for collecting energy;It is entire to pass using time division transmission agreement
Defeated process is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are for the
The wireless energy supply in one stage, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member
Element is all to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector
And meet general power restrictive conditionnSIndicate NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus
The transmission power of node J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference letter
Number, eavesdropping node eavesdrops useful information;
The channel CSI according to known to cooperative node, using following two cooperation jamming program: the linear wave beam forming side BF
Method and day line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas
The received reliability of point and safety;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution
Multiple Gauss stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned
Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single
The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution
Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user
With, and this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel
CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal day using the standard set as foundation from mutiple antennas
Line carrys out transmission interference signal, achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), at the SINR and listener-in E at legitimate user D
SIR can be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section
Channel coefficients between the kth root antenna and listener-in E of point J.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Step A: establishing system model, as shown in Figure 1, considering the finite rate feedback cooperation interference eavesdropping transmission mould of MISO
Type, including multiple antennas information source node S, single antenna legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply are stolen
Listen node E.There it is contemplated that the eavesdropping model of typical interference cooperation auxiliary, cooperative node do not consume the premise of own resource
The information transmission of lower cooperation legitimate user, enhances the anti-eavesdropping capability of system.Cooperative node can be multiple or multiple antennas, this
In in order to calculate and easy analysis, the cooperative node of single antenna can be regarded as selecting from multiple cooperative nodes one it is optimal
The special circumstances of cooperative node.Since the energy of cooperative node is from the wireless energy supply of source node, so its function for sending interference
Rate is changed as source node sends changed power, this is a typical feature for being different from other systems.Here false
If S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna.Assuming that channel is all quasi-static
Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI independently changes between different transmission blocks.
Since cooperation interfering nodes are selfish and energy constraint nodes, the energy for sending interference signal is saved to source
Point sends the collection of energy of power, here in order to simplify the complexities of interfering nodes, is replaced using the desired value for collecting energy real
Duration.Therefore, this not only simplifies the processing complexities of interfering nodes, while reducing the expense for obtaining channel CSI, and flat
Interfering nodes do not consume the energy of itself in equal meaning.It is entire to pass using time-division (Time Division, TD) transport protocol
Defeated process is divided into two stages.First stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;Second stage,
Source node S conveys information to destination node D, and the interfering nodes that cooperate at the same time send interference signal, and eavesdropping node eavesdropping is useful
Information.Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are used for the first rank
The wireless energy supply of section, remaining time slot (1- α) T are transmitted for information.
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each member
Element is all the zero-mean for obeying independent same distribution (Identically and Independently Distributed, i.i.d)
Variance is λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector and meet general power restrictive conditionnSIndicate NS× 1 Gauss additive white noise vector andTherefore, in the first stage
At the end of, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency.Since noise energy is smaller compared to the signal energy of transmission,
Here the energy of noise is had ignored.Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., sent with the expectation for collecting energy
Interference signal, so that the transmission power of node J can be written as
Assuming that the instantaneous CSI of source node known legitimate channel, the instantaneous CSI of tapping channel is unknown.This hypothesis it is reasonable
Property be to be that the CSI of legitimate channel can be obtained by various based on trained channel estimation methods, such as MMSE, while can be with
Ideal channel CSI is obtained by increasing pilot power etc.;And listener-in due to be it is passive passive, will not active reporting
Its channel CSI or channel CSI that inaccuracy may be reported, therefore it is assumed that the unknown source node of source node and listener-in's channel
Status information.On the other hand, due to the limitation of the complexity of cooperative node and system call, the interfering nodes that cooperate are coupled
The instantaneous CSI of channel be not easy to obtain, consider known ideal CSI, known channel gain sequence here and be based on finite rate
Tri- kinds of situations of part CSI of feedback, wherein primary study sorted based on channel gain and the CSI based on finite rate feedback under
Security performance, and compared with ideal CSI.The channel CSI according to known to cooperative node can mainly use following two
Kind cooperation jamming program: linear wave beam forming (BF) and day line options (AS).Source node S is used using all antenna freedom degrees
Beam form-endowing method is transmitted with enhancement information, and cooperative node is disguised as using the expectation power of collection in the information transmission stage artificial dry
The role disturbed.Since cooperative node also configures multiple antennas, the performance according to needed for system, implementation complexity and expense are adopted
With different cooperation jamming programs.
Cooperation interference transmission plan
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed to enhance purpose section using multiple antennas
The received reliability of point and safety.Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E.hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4Independent same distribution
Multiple Gauss stochastic variable.The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam is assigned
Shape vector, x are the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are single
The interference signal of position power, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal.Similarly, at listener-in E
Reception signal can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates that cooperative node J is arrived
Eavesdrop the interference channel of node E.hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5Independent same distribution
Multiple Gauss stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal.
Therefore, in conjunction with (3), the end-to-end Signal to Interference plus Noise Ratio (SINR) of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading work at eavesdropping user
With, and this is also common in document it is assumed that can be regarded as a kind of worst situation.Therefore, in conjunction with (3-3) listener-in E
End-to-end signal interference ratio (SIR) be represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel
CSI information design different beams figuration vector w2, to enhance the transmission and security performance of system.
Antenna selecting method
Its line options is a kind of common method of a kind of low complex degree and energy-efficient enhancing safety of physical layer[52], especially suitable
System for computing capability and energy constraint.Here it is considered that the selfishness of node and the wireless energy supply energy being collected into
Finiteness, AS can yet be regarded as it is a kind of it is effective energy conservation and enhancing safety method.According to the principle of AS, cooperative node is with certain
Standard is foundation, selects best antenna to carry out transmission interference signal from mutiple antennas, reaches and enhances system security
Purpose.It is assumed that k is the index of selected antenna, according to formula (7) and (8), the SIR at SINR and listener-in E at legitimate user D can
To be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperation section
Channel coefficients between the kth root antenna and listener-in E of point J.
Cooperation interference method based on known channel CSI
Mainly provide send wave beam Shape design and AS method so that damage listener-in channel quality while pair
The influence of legitimate user is reduced to minimum.For the CSI situation of known channel, different cooperation interference method and plan can be designed
Slightly.
The first situation: ideal case: cooperative node-destination node and cooperative node-listener-in CSI are known
Work as hjdCSI be it is ideal and it is known that can be completely eliminated using Zero-forcing method at legitimate user receiver come
From in the interference of cooperative node J.At the same time, it can use known hjeCSI maximize listener-in at interference.Therefore, wave
Beam figuration vector w2It is the solution of following optimization problem:
According to the research achievement of Ding[53], the solution of above formula optimization problem is represented by
Wherein NJ×NJMatrixIt is hjdThe orthocomplement, orthogonal complement of column space can be expressed as
Second situation: only known to cooperative node-destination node CSI
Work as hjdCSI be it is ideal and it is known that Zero-forcing method still can be used at legitimate user receiver come completely eliminate come
From in the interference of cooperative node J.Due to hjeCSI it is unknown, in the first situation of the no image of Buddha using cooperative node and listener-in it
Between channel CSI design wave beam formed matrix to increase the interference at listener-in.Therefore, empty using the zero of the interference that will cooperate here
Between be directed at legitimate user so that being 0 to the interference of legitimate user, and random disturbances are generated for listener-in.Wave beam forming vector
Design method is needed first to matrixMake singular value decomposition (SVD), can obtain
Therefore, corresponding NJThe N of -1 non-zero singular valueJ- 1 left singular value vector uiAtColumn space, uiIt can be with
It is expressed asThe linear combination of column vector, thus
Therefore, wave beam forming vector can be from NJ- 1 left singular value vector uiIn arbitrarily choose one, can guarantee in this way
Interference at legitimate user is 0, and the interference at listener-in is random disturbances at this time, and in 4.3.1 is the wave beam tax of co-design
Shape vector, the interference at listener-in are the attainable maximum interferences of institute.
The third situation: known to the sequence of cooperative node-destination node channel gain
Work as hjdChannel gain sequence it is known when, AS method can be used, according to formula (9), select channel gain minimum right
The antenna index answered may make influence of the cooperation interfering nodes to legitimate user to minimize in this way.Therefore, the standard of AS selection
For
Wherein hidIt is hjdI-th of element.The antenna index for noticing that the program is selected is for tapping channel
Random antenna selection.
4th kind of situation: hjdFinite rate feedback: the smallest code book selection method is interfered based on legitimate user
The local channel CSI between cooperation interfering nodes and legitimate user can be obtained by finite rate feedback.Having
In rate feedback model, legitimate user estimates and quantifies the channel CSI between cooperative node and destination node, and selection one is most
Excellent code book removes quantized channel CSI, and codebook set can quantify (RVQ) acquisition by random vector, i.e., is 2 from sizeBIt is a pre-
Select a code book as channel CSI feedback to cooperative node in quantization codebook set, B is number of bits of feedback here.Quantization code
This setBy 2BA NJTie up unit norm vector composition, and cooperative node and legitimate user are known should
Codebook set.According to certain selection criterion, legitimate user transmits selected code book index by feedback channel.
Since the corresponding channel CSI of code book code book is the channel CSI after quantization, and actual channel CSI has certain deviation,
Therefore, inevitably to legitimate user, there are certain interference.Using the minimum interference at legitimate user as optimization aim, choosing
The standard for selecting wave beam forming vector is as follows
WhereinIt is channel direction information (CDI) vector.
5th kind of situation: hjdFinite rate feedback: the code book selection method based on channel quadrature
Compared with the 4th kind of situation: similar to use Limited Feedback scheme and required feedback is also identical, the difference is that
Construct wave beam forming vector w2Method it is different.Different from being used in the 4th kind of situation and hjdMake closest to orthogonal codebook vectors
For wave beam forming vector, to reduce the interference to legitimate user to the greatest extent.This trifle selects first and hjdImmediate code book to
Amount is used as feedback information, and the wave beam forming vector orthogonal with legitimate channel is then constructed according to feedback information.Therefore, the choosing of code book
It is as follows to select standard
Index based on feedback obtains and hjdImmediate codebook vectorsCooperative node withOrthogonal direction
Interference signal is sent, can guarantee that the interference for legitimate channel is small as far as possible in this way.Therefore, it utilizesWave beam forming
Vector w2It can be constructed using the method similar to 4.3.2.The essence of the method for this trifle is selected code bookMore
Close to real channel hjd, the wave beam forming vector w that constructs2It more can be close to the orthogonal direction of real channel, so as to so as to close
The interference of method user is small as far as possible.
Security performance
For the cooperation interference system mentioned, consider disconnecting probability and secrecy outage probability and traversal up to secrecy
Rate is safety index.For description and convenience of calculation, definition
gsd=| | hsd||2,gJS=| | HSJ||2,
To which formula (7)-(9) can be written as following form:
According to the confirmation of Simon, gsdObeying parameter respectively is 2NsChi distribution, corresponding PDF can be written as
It notices when using AS,gseIt is exponential distribution gaussian variable and unit direction
The sum of stochastic variable knows that it obeys exponential distribution, corresponding PDF is according to the confirmation of Shah
Derive and study below the system safety index under the cooperation interference method, and each parameter pair of research and analysis
The influence of system performance.
Disconnecting probability and secrecy outage probability
(1) ideal case: cooperative node-destination node and cooperative node-listener-in CSI are known
By the definition of COP it is found that when the off-capacity of legitimate user's channel is to support transmission rate, i.e. CD< Rt, interrupt
Event occurs.Therefore, for the ideal CSI situation of 4.3.1, formula (10) and (12) is substituted into formula (18), can be obtainedWithThe g known to [55]jeObey Gamma (NJ-1,λ5), PDF is
Formula (18) are substituted into, the disconnecting probability that can be obtained under situation 1 can be written as
WhereinBy the definition of secrecy outage probability, by formula (20) and substitutes into and utilize the system of can be calculated
The analytic expression of secrecy outage probability is
Wherein
By formula (22) to find out the disconnecting probability of system and send power PS, time slot dividing factor-alpha, source node antenna
Number and transmission rate RtIt is related, and with PSIncrease and reduce, with α and RtIncrease and increase.Work as PSWhen → ∞, it is
The disconnecting probability of system can be written as
It is d=N so as to obtain its diversity orderS, i.e. transmission antenna number.By formula (23) can be seen that secrecy outage probability with
Send power PSIt is unrelated, only time slot dividing factor-alpha, cooperation number of antennas and secrecy rate ReRelated, as given α, secrecy is interrupted
Probability levels off to constant, and secrecy rate reduces with the increase of cooperative node number of antennas, i.e., anti-eavesdropping capability enhancing, this
It is because more cooperative node number of antennas provide more freedom degrees.
(2) known to cooperative node-destination node CSI
Compared to the known situation 1 of interference channel CSI, the interference channel CSI of cooperative node to listener-in is unknown here.
At this point, the SNR of legitimate user is constant, shown in the expression formula of disconnecting probability such as formula (22), further table is not made here
It states.It is w by the above-mentioned precoding vector for knowing cooperative node at this time for the SIR of listener-in2=ui, thenObedience refers to
Number distribution, i.e., degenerating from the Gamma distribution in situation 1 is exponential distributionTo use
Similar method, the analytic expression that can obtain the secrecy outage probability of system are
It is identical as situation 1, secrecy outage probability and transmission power PSIt is unrelated, only with time slot dividing factor-alpha and secrecy rate Re
Related, as given α, secrecy outage probability levels off to constant.The difference is that the antenna number of secrecy outage probability and cooperative node
Mesh is unrelated, i.e., secrecy rate will not reduce with the increase of cooperative node number of antennas, this is because cooperative node to eavesdropping
The channel CSI of person is unknown, and the design of wave beam forming vector cannot utilize channel information, the cooperative node antenna for listener-in
The increase of number can not more freedom degrees.It is stolen it is thus impossible to increase number of antennas by cooperative node and improve the anti-of system
Listen ability.
(3) sequence of cooperative node-destination node channel gain is known and cooperative node uses AS
Different from the interference channel h of cooperative node in situation 2 to legitimate userjdIt is completely known, it is assumed here that cooperative node
The sequence of the channel gain of antenna corresponding to interference channel to legitimate user it is known that cooperative node can use AS scheme, this
When destination node need to only feed back the index of corresponding optimal antenna, be not necessarily to the complete CSI of channel, can not only reduce system
Complexity and expense can also save the energy of cooperative node.The transmission antenna of selection is random selection for listener-in, right
It is optimal for legitimate user.Therefore, it can increase system while reducing the interference of legitimate receipt node
Safety.At this timeSince selected antenna is random selection for listener-in,
Obey exponential distribution Exp (λ5), and selected antenna is the smallest antenna of channel gain for legitimate user, then its CDF can be calculated
For
To which PDF is represented by fgjd(x)=NJ/λ4exp(-xNJ/λ4), being considered as parameter is λ4/NJIndex point
Cloth.By the definition of disconnecting probability, the expression formula of legitimate user SINR is substituted into, the system disconnecting under the 3rd kind of situation
The expression formula of probability can be written as
Wherein (a) is by gsdCDF substitute into arrange after can obtain, be (b) using after binomial expansion by gjdPDF substitute into
It can be obtained after arrangement, can be obtained after calculating final finishing according to [56].
Using the method for similar situation 2, the analytic expression that can obtain the secrecy outage probability of system is
Since formula (27) is more complex, in order to preferably study the influence of system parameter, deriving high send under power here is
The outage probability analytic expression of system.Work as PSWhen → ∞, the disconnecting probability of system can be calculated as
It is different from situation 1 and 2, the disconnecting probability and transmission power P of systemSIt is unrelated, and with PSIncrease and tend to
Constant, so that diversity order is d=0.This is because transmission wireless energy supply of the power from source node of cooperative node, cooperation section
Point transmissions power it is directly proportional to the transmission power of source node, cooperative node transmission interference signal and available signal power with
Source node sends the increase of power and increases with scale, so that diversity order is 0.In addition, disconnecting probability with cooperate
Node antennas number is related, and reduces with the increase of cooperative node antenna number, this is because cooperative node number of antennas is got over
More, the optional antenna freedom degree provided is more, interferes small antenna probability of occurrence higher legitimate user, but antenna number increases meeting
Bit needed for leading to feedback index increases.Simultaneously disconnecting probability also with time slot dividing factor-alpha, source node number of antennas and
Transmission rate RtIt is related, and disconnecting probability is with α and RtIncrease and increase, with the increase of source node antenna number
Reduce.The secrecy outage probability expression formula of system is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing factor-alpha and
Secrecy rate ReIt is related.This is because antenna selection criterion only accounts for the channel CSI between cooperative node and destination node, phase
When be for listener-in random selection.
(4)hjdFinite rate feedback: the smallest code book selection method is interfered based on legitimate user
Situation 2 is cooperative node to destination node channel hjdCSI it is completely known, situation 3 is hjdChannel gain sequence
It is known that considering channel h herejdPart CSI it is known that i.e. using finite rate feedback channel CSI model.Due to feedback quantization
There are certain errors with ideal CSI by channel CSI, thus can be regarded as local channel CSI it is known that the orthogonal intersection space of channel simultaneously
It is non-fully identical as ideal case, g different from situation 1 and 2jd≠ 0, i.e., the interference signal that cooperation interfering nodes are sent can part
It is leaked to legitimate user end, to that can generate interference to legitimate user, the corresponding channel of the smallest code book is interfered in selection leakage here
CSI designs wave beam forming vector.According to formula (16), the channel gain of cooperative node to legitimate user isTwo stochastic variables that it is formed are mutually indepedent,It is the inner product of two unit vectors, CDF isx∈[0,1].U is M=2BIt is a only
The vertical minimum value with distribution variables, CDF are represented by
By the definition of COP, the system disconnecting probability under the 4th kind of situation is provided by following theorems.
Theorem 1: the channel CSI of cooperative node to destination node uses finite rate feedback, hjeThe unknown situation of CSI
Under, the disconnecting probability expression for the interference system that cooperates can be written as
Wherein Φ1It is given by
It proves: according to the definition of disconnecting probability, legitimate user's SINR expression formula being substituted into, using similar formula (27) side
Fa Ke get
WhereinTherefore, g need to be calculatedjdCDF it is as follows
To which g can be obtainedjdPDF it is as follows
Formula (36) are substituted into, can be obtained
Formula (37) substitution formula (32) can be obtained to the disconnecting probability of system.
Secrecy outage probability is derived below, according to existing theorem gjeObey exponential distribution Exp (λ5), using similar feelings
The method of shape 2, the analytic expression that can obtain SOP are
The disconnecting probability of system and transmission power P known to formula (32)S, cooperative node antenna number, source node antenna
Number, time slot dividing factor-alpha and secrecy rate ReIt is related, and with the increase of feedback bits B, channel CSI is more accurate, cooperative node
Smaller to the interference of legitimate user, disconnecting probability reduces with the increase of number of bits of feedback, with cooperative node antenna
Several increases and increase, this is because cooperative node number of antennas is more, the quantization of identical feedback bits lower channel is more coarse, association
The interference for making interference signal leakage is more.Disconnecting probability is with α and RtIncrease and increase, with source node antenna number
Increase and reduces.The secrecy outage probability expression formula of system is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing
Factor-alpha and secrecy rate ReIt is related.This is because antenna selection criterion only accounts for the letter between cooperative node and destination node
Road CSI's is feedback optimized, is random for listener-in.
(5)hjdFinite rate feedback: based on the orthogonal code book selection method of interference channel
It interferes the smallest wave beam forming vector different legitimate user from 4 kinds of situation constructions, also uses finite rate here
Feedback, but choose and feed back to cooperative node with the immediate code book index of actual channel, cooperative node utilizes the code book fed back
Beam vectors are designed as real channel CSI, so that it is orthogonal with interference channel, so that the interference generated to legitimate user is most
It is small.According to RVQ theory, actual channel directionWith quantized channel directionRelationship can be expressed as
WhereinS be withOrthogonal and mutually independent with v unit norm vector.w2
It is to be based onKernel construction beam vectors to avoid the interference to legitimate user as far as possible.Therefore have
According to quantifying unit approximate model[46], w2Be with the independent unit norm vector of s, then Z=| sHw2|2~β (1, NJ-
2), | | hjd||2Obedience parameter is (NJ,λ4) Gamma distribution, by [47] it is found that X=| | hjd||2sin2θ obeys parameter
(NJ-1,λ4Gamma distribution δ), whereinTo gjdCDF can be expressed as
G as available from the above equationjdIt is to obey parameter as λ4The exponential distribution of δ.Due to finite rate CSI feedback,
Which results in cooperative nodes to the residual interference of legitimate user, and residual interference depends on the bit number B of feedback CSI.When
When number of feedback bits B → ∞, i.e. unity feedback, residual interference levels off to 0.gjeObey exponential distribution Exp (λ5), secrecy is interrupted general
The analytic expression of rate is identical as formula (38).It can be obtained according to the definition of disconnecting probability, using the method for similar situation 3, in connection
Disconnected probability resolution formula calculates as follows
At high SNR, the white Gaussian noise at receiver can be ignored, and the disconnecting probability of system can be calculated as
WhereinGiven code rate Rt, each node antennas number, time slot dividing factor-alpha and Successful transmissions it is general
When rate ξ, the number of feedback bits B needed for being calculated by formula (4-43) is as follows
The disconnecting probability of system and transmission power P known to formula (43)SIt is unrelated, it is saved with cooperative node antenna number, source
Point antenna number, time slot dividing factor-alpha and secrecy rate ReIt is related, and with the increase of feedback bits B, the channel of δ → 0 CSI is more smart
Really, cooperative node is smaller to the interference of legitimate user, and disconnecting probability reduces with the increase of number of bits of feedback, with association
Make the increase of node antennas number and increases, this is because cooperative node number of antennas is more, the amount of identical feedback bits lower channel
Change is more coarse, and the interference of cooperation interference signal leakage is more, and number of feedback bits should be with cooperation antenna number linear increase.
Disconnecting probability is with α and RtIncrease and increase, reduce with the increase of source node antenna number.The secrecy of system is interrupted
Probability expression is as situation 2, with transmission power PSIt is unrelated, only with time slot dividing factor-alpha and secrecy rate ReIt is related.
It discusses: (1) by above analysis and research it is found that descending the guarantor of system known to ideal CSI under identical system parameter
Close outage probability is constant value and minimum.When cooperating known to the sequence CSI of interference channel gain, using AS, i.e. situation 3, cooperation
Interfering nodes generate interference to legitimate user and listener-in simultaneously, but the antenna selected makes the interference generated to legitimate user most
It is small, so that being less than the influence of listener-in to the influence of legitimate user.Under the cooperation interference cases of finite rate feedback, due to
There is a certain error with ideal communication channel CSI for feedback channel, therefore certain interference can be caused to legitimate user, to compromise
The performance of legitimate user.In addition, it is directed to nonideal CSI (AS and finite rate feedback), and at high SNR, legitimate userIt is i.e. unrelated with SNR, and tend to constant value, so that there are error floor effects.As feedback bits B increases,
The CSI then fed back levels off to true CSI, and residual interference levels off to 0, and system performance levels off to ideal CSI situation.Therefore, CSI
The accuracy of estimation and feedback has great influence to system performance.In addition, considering from the complexity and expense angle of system, it is
Comparatively ideal channel CSI is obtained to need biggish overhead and send power, so that the transmission performance of system is affected, and base
Only log need to be fed back in the method for feedback channel ranking index2NJBit, required feedback information is few, but obtain at the same time
Performance gain is also limited.Method based on finite rate feedback can obtain the expense of relatively accurate channel CSI and system
Can be controllable according to performance requirement, it can reach the compromise of preferable performance and complexity.
(2) consider the comparison situation that cooperation interference is not involved in without cooperative node or cooperative node, at this time γD=ρs||hsd
||2,Corresponding disconnecting probability and secrecy outage probability are respectively
From the above equation, we can see that working as ρsWhen → ∞, pso→ 1, pco→ 0, it can thus be appreciated that listener-in can when without cooperation interfering nodes
With the information of 1 hijack legitimate user of probability, it is therefore desirable to the algorithm of interference of anti-eavesdropping is designed, to reach the folding of rate and safety
In.The several schemes proposed design different jamming programs according to different channel CSI, not only can be very good to reach reliable
Property-safety compromise and tool has significant practical applications.
Emulation and interpretation of result
Mentor Carlo simulating, verifying is carried out to notional result among the above and simulation result is analyzed.Emulation ginseng
Number is provided that independent simulation times are 1 × 10 unless otherwise specified6, the code rate R of source node transmissiont=2bps, it is required
Secrecy rate Re=1bps, transfer efficiency factor η=0.8 of collection of energy, time slot dividing factor-alpha=0.1, channel parameter are
λ1=10, λ2=λ3=λ4=λ5=1, SNR are defined as the transmission signal-to-noise ratio P of source nodeS/N0.For ideal CSI (situation 1), association
Make node-(situation 2), cooperative node-(situation 3), base known to the sequence of destination node channel gain known to destination node channel CSI
In legitimate user interfere the smallest finite rate feedback (situation 4) and finite rate feedback (situation 5) based on channel quadrature this
Five kinds of situations have done numerical simulation and analysis respectively.
Fig. 2 gives the curve that the disconnecting probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2
Antenna configuration, dotted line indicate NS=4, NJ=2 antenna configuration, number of bits of feedback B=8.As seen from the figure, the theory of derivation
As a result it coincide well with actual emulation result, while progressive expression formula is also consistent with simulation result in the high region SNR, as upper
It states and is analyzed, disconnecting probability increases and reduces with source node antenna number, and for situation 1 and diversity gain is
The antenna number N of source nodeS;The disconnecting probability of system increasing and reduce with source node antenna number under remaining situation, but
All there is the flat effect of error code, i.e., as the increase of SNR tends to constant, and increases flat reduction with source node antenna number.
As seen from the figure, the disconnecting probability of situation 3 is worst, is secondly situation 4 and 5, and the disconnecting of situation 1 and 2 is probability
Can be optimal, this is because situation 1 devises good beam vectors with the CSI for taking full advantage of interference channel.Therefore, obtain compared with
Good channel CSI plays an important role to the performance of system.
Fig. 3 gives the curve that the disconnecting probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2
Antenna configuration, dotted line indicate NS=2, NJ=3 antenna configuration, number of bits of feedback B=8, as seen from the figure, the theory of derivation
As a result it coincide well with actual emulation result.For situation 1, disconnecting probability is unrelated with cooperative node antenna number, and its
Disconnecting probability under his situation increases and reduces with cooperative node antenna number, but all there is the flat effect of error code, i.e.,
As the increase of SNR tends to constant, increase flat reduction with cooperative node antenna number.Similarly, the disconnecting of situation 3
Probability is worst, is secondly situation 4 and 5, the disconnecting probability best performance of situation 1 and 2, this is because situation 1 and sufficiently benefit
Good beam vectors are devised with the CSI of interference channel.
Fig. 4 gives the curve that the secrecy outage probability of system changes with SNR, and wherein solid line indicates NS=2, NJ=2
Antenna configuration, dotted line indicate NS=2, NJ=4 antenna configuration, number of bits of feedback B=8.As seen from the figure, the theory of derivation
As a result it coincide well with actual emulation result.When cooperative node antenna number is 2, the system known to the analysis in ideal situation
Secrecy outage probability it is all identical, this matches with simulation result.When cooperative node number of antennas is greater than 2, due to 1 benefit of situation
With known channel CSI co-design beam vectors, the spatial degrees of freedom of channel is taken full advantage of, system is significantly reduced
Secrecy outage probability.Secrecy outage probability under other situations increases and reduces with cooperative node antenna number, but all deposits
In flat effect, i.e., as the increase of SNR tends to constant.
Fig. 5 gives the disconnecting probability of system with the change curve of number of bits of feedback B, wherein SNR=15dB, NS
=4, NJ=4, number of bits of feedback B=8.Situation 1,2 and 3 is unrelated with number of feedback bits B, therefore outage probability is not with the change of B
Change and changes.The disconnecting probability of situation 4 and 5 is related with number of bits of feedback, and reduce with the increase of bit number and by
Gradually it is bordering on situation 1.This is because channel quantitative precision is higher with the increase of bit number B, closer to real channel, thus
The disconnecting probability of system improves rapidly.It is noted that when number of bits of feedback is less, B < 2, the method based on day line options
Disconnecting probability performance is better than being based on finite rate feedback situation, because feedback bits lead to channel CSI quantization excessively very little
Coarse, the interference for being leaked to destination node increases the SINR reduction for resulting in destination node, and reliability reduces.With feedback bits
The precision of the increase of B, channel quantitative improves, and becomes closer to real channel CSI, and the interference signal that interfering nodes are sent leaks into
The interference of destination node tends to 0, and the disconnecting probability of system levels off to ideal case.
The curve that Fig. 6 gives the disconnecting probability of system and secrecy outage probability changes with time slot dividing factor-alpha,
Wherein NS=2, NJ=2, number of bits of feedback B=6.Item as a comparison gives COP and SOP under no cooperative node in figure.
As seen from the figure, with the increase of α, the disconnecting probability of the system under five kinds of situations increases, i.e., reliability reduces, this is
Because the time slot for being used for transmission data is shorter and shorter, corresponding transmission rate is higher and higher;On the other hand, with the increase of α, five
The secrecy outage probability of system under kind situation reduces, i.e. safety enhances, this is because cooperative node can be collected more
Energy is used for transmission interference signal, and data transmission slots shorten, and SINR needed for listener-in increases, and is less susceptible to be ravesdropping.Therefore,
There are the tradeoff that reliability-is safely, the disconnecting probability of no cooperative node system is smaller, but secrecy outage probability compared with
Greatly, in the preferential data transmission of safety, cooperative node plays a significant role.
Fig. 7 gives under secrecy outage probability ξ restrictive condition, minimum needed for the system of different cooperative node number of antennas
The change curve of number of feedback bits B, wherein NS=4.As can be seen from Figure to reach identical secrecy outage probability, with cooperation
The increase of node antennas number, required minimum feedback bit number B increase;To obtain the quantization with precision, increasing for number of antennas is needed
Want more quantization bits.It is noted that required minimum feedback bit number B reduces with the increase of secrecy outage probability;Only
Smaller bit feedback is needed to can reach required secrecy outage probability.
The present invention is based on the secure transmission system performances of the cooperation interference system of wireless energy supply, cooperate interfering nodes period of use
Hope that collecting power sends interference signal, has studied the safe transmission performance of system under five kinds of situations.Go out from known channel CSI
Hair has studied ideal case known to all channel CSI, the unknown situation of listener-in CSI respectively, cooperates known to channel gain sequence
With the security performance of the disturbance cooperation scheme under Limited Feedback rate channel CSI situation, the company under various situations has been derived
The closed solutions of outage probability and secrecy outage probability are connect, and give the expression formula under high SNR approximation;It can be concluded that the company of system
Connecing outage probability and secrecy outage probability, there are certain tradeoffs, can be according to the selection of different system requirements and design department
System parameter reaches the compromise of safety-confidentiality.Further, system is derived and has studied to traverse up to secrecy rate, to several
Scheme has carried out emulation and comparative analysis, analyzes and has studied and is reachable relative to can be obtained traversing when not feeding back under high SNR
Secrecy rate gain;Important function and finite rate feedback method of the key parameter of system in security performance is demonstrated to exist
Actually taste the advantage in the greatest extent.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it is still
Can modify to technical solution documented by previous embodiment, or some or all of the technical features are carried out etc.
With replacement;And these are modified or replaceed, technical solution of the embodiment of the present invention that it does not separate the essence of the corresponding technical solution
Range.
Claims (1)
1. safe transmission method of physical layer is interfered in a kind of cooperation based on wireless energy supply, it is characterised in that: the following steps are included:
A: the finite rate feedback cooperation interference eavesdropping mode for considering MISO, including multiple antennas information source node S, Dan Tian are established
Line legitimate user D, the cooperation interfering nodes J and single antenna of wireless energy supply eavesdrop node E;
Cooperative node can be multiple or multiple antennas, and here in order to calculate and easy analysis, the cooperative node of single antenna can be with
Regard the special circumstances that an optimal cooperative node is selected from multiple cooperative nodes as;
Assuming that S has antenna number NS, the number of antennas of J configuration is NJ, remaining node all uses single antenna;Assuming that channel is all quasi-
Static Rayleigh channel, i.e., channel CSI is constant in each transmission block, and channel CSI is independent change between different transmission blocks
Change;
B: since cooperation interfering nodes are selfish and energy constraint nodes, the energy of interference signal is sent to source node
The collection of energy for sending power replaces real value using the desired value for collecting energy;Using time division transmission agreement, entirely it is transmitted across
Journey is divided into two stages;
B1: first stage, source node S give cooperation interfering nodes J as energy source wireless energy supply;
Definition α is the time ration of division, it is assumed that the length of a time slot is T, wherein incipient α T, 0 < α < 1 are used for the first rank
The wireless energy supply of section, remaining time slot (1- α) T are transmitted for information;
First stage, the energy signal from source node S that cooperation interfering nodes J is received are represented by
Wherein PSIt is the transmission power of source node, HSJIt indicates wireless energy supply channel, is a NJ×NSMatrix and each element
It is to obey independent identically distributed zero-mean variance as λ1Multiple Gauss stochastic variable, xSIndicate NS× 1 energy signal vector and full
Football Association's power limitation conditionnSIndicate NS× 1 Gauss additive white noise vector and
Therefore, at the end of in the first stage, the gross energy that cooperation interfering nodes J is obtained is
Wherein η (0 < η < 1) indicates energy conversion efficiency;
Due to the selfishness and friendly of the interfering nodes J that cooperates, i.e., interference signal is sent with the expectation for collecting energy, thus node
The transmission power of J can be written as
B2: second stage, source node S convey information to destination node D, and the interfering nodes that cooperate at the same time send interference signal,
It eavesdrops node and eavesdrops useful information;
The channel CSI according to known to cooperative node is cooperated jamming program using following two: linear wave beam forming BF method and
Its line options AS method;
B2-1: linear wave beam forming BF method
Due to configuring multiple antennas at cooperative node, beamforming transmission signal is formed using multiple antennas and is connect with enhancing destination node
The reliability and safety of receipts;
Therefore, the reception signal of legitimate user is represented by
Wherein hsdIt is NS× 1 vector indicates legitimate channel coefficient;hjdIt is NJ× 1 vector indicates cooperative node J to eavesdropping
The interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ2And λ4The multiple height of independent same distribution
This stochastic variable;The wave beam forming of source node is transmitted using high specific, i.e. w1=h'sd/||hsd| | it is NS× 1 wave beam forming to
Amount, x is the source signal of unit power, w2It is the N of interference signalJ× 1 wave beam forming vector and | | w2||2=1, z are specific works
The interference signal of rate, ndIt is legitimate user receiver mean value be 0 variance is N0AWGN signal;
Similarly, the reception signal at listener-in E can be expressed as
Wherein hseIt is NS× 1 vector indicates tapping channel coefficient;hjeIt is NJ× 1 vector indicates cooperative node J to eavesdropping
The interference channel of node E;hsdAnd hjdIn each element respectively be obey zero-mean variance be λ3And λ5The multiple height of independent same distribution
This stochastic variable, neIt is N that the mean value for being listener-in's receiver, which is 0 variance,0AWGN signal;
Therefore, in conjunction with formula (3), the end-to-end Signal to Interference plus Noise Ratio SINR of legitimate user D can be expressed as
It enablesThen above formula can be abbreviated as
It is assumed that the noise at listener-in can be ignored, this is because interference signal accounts for leading role at eavesdropping user, and
And this is also common in document it is assumed that can be regarded as a kind of worst situation;
Therefore, in conjunction with formula (3), the end-to-end signal interference ratio SIR of listener-in E is represented by
By formula (7) and (8) it can be seen that wave beam forming vector w2With channel hjdAnd hjeIt is related, it can be according to known channel CSI
Information design different beams figuration vector w2, to enhance the transmission and security performance of system.
B2-2: antenna selecting method;
According to the principle of AS, cooperative node selects an optimal antenna using the standard set as foundation from mutiple antennas
Transmission interference signal achievees the purpose that enhance system security;
It is assumed that k is the index of selected antenna, according to formula (7) and (8), the SIR at SINR and listener-in E at legitimate user D can
To be expressed as
WhereinIndicate the channel coefficients between the kth root antenna and legitimate user D of cooperative node J,Indicate cooperative node J
Kth root antenna and listener-in E between channel coefficients.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910505170.8A CN110225579B (en) | 2019-06-12 | 2019-06-12 | Cooperative interference physical layer secure transmission method based on wireless energy supply |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910505170.8A CN110225579B (en) | 2019-06-12 | 2019-06-12 | Cooperative interference physical layer secure transmission method based on wireless energy supply |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110225579A true CN110225579A (en) | 2019-09-10 |
CN110225579B CN110225579B (en) | 2021-02-02 |
Family
ID=67816637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910505170.8A Active CN110225579B (en) | 2019-06-12 | 2019-06-12 | Cooperative interference physical layer secure transmission method based on wireless energy supply |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225579B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110856166A (en) * | 2019-10-26 | 2020-02-28 | 中国人民解放军陆军工程大学 | Interference selection-based idle user cooperative interference strategy in cellular network |
CN111163464A (en) * | 2020-01-16 | 2020-05-15 | 电子科技大学 | Random eavesdropping resistant multi-service transmission power distribution method |
CN111277311A (en) * | 2020-02-10 | 2020-06-12 | 电子科技大学 | Active and passive combined beam forming design method for millimeter wave symbiotic communication system |
CN111866861A (en) * | 2020-06-09 | 2020-10-30 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112512085A (en) * | 2020-12-21 | 2021-03-16 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN112600607A (en) * | 2020-11-25 | 2021-04-02 | 西安电子科技大学 | Double full-duplex cooperative interference anti-eavesdropping method |
CN112822662A (en) * | 2020-11-24 | 2021-05-18 | 西安交通大学 | D2D cache user safety cooperation method and system based on joint content transmission and interference blocking |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN114614963A (en) * | 2022-03-16 | 2022-06-10 | 北京航空航天大学 | Alternative optimization iterative user group selection method, electronic device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131941A (en) * | 2016-05-20 | 2016-11-16 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation |
CN109640321A (en) * | 2018-12-19 | 2019-04-16 | 西安电子科技大学 | Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection |
-
2019
- 2019-06-12 CN CN201910505170.8A patent/CN110225579B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131941A (en) * | 2016-05-20 | 2016-11-16 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation |
CN109640321A (en) * | 2018-12-19 | 2019-04-16 | 西安电子科技大学 | Safe transmission method of physical layer is interfered in cooperation based on optimal relay selection |
Non-Patent Citations (3)
Title |
---|
ABDELHAMID SALEM等: "《Improving Physical Layer Security of AF Relay Networks via Beam-Forming and Jamming》", 《2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)》 * |
SHUANGYU LUO等: "《Uncoordinated Cooperative Jamming for Secret Communications》", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 * |
XIN JIANG等: "《Power Beacon Assisted Wiretap Channels With Jamming》", 《 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110856166A (en) * | 2019-10-26 | 2020-02-28 | 中国人民解放军陆军工程大学 | Interference selection-based idle user cooperative interference strategy in cellular network |
CN111163464A (en) * | 2020-01-16 | 2020-05-15 | 电子科技大学 | Random eavesdropping resistant multi-service transmission power distribution method |
CN111163464B (en) * | 2020-01-16 | 2020-08-25 | 电子科技大学 | Random eavesdropping resistant multi-service transmission power distribution method |
CN111277311A (en) * | 2020-02-10 | 2020-06-12 | 电子科技大学 | Active and passive combined beam forming design method for millimeter wave symbiotic communication system |
CN111277311B (en) * | 2020-02-10 | 2022-03-25 | 电子科技大学 | Active and passive combined beam forming design method for millimeter wave symbiotic communication system |
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN111866861A (en) * | 2020-06-09 | 2020-10-30 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN111866861B (en) * | 2020-06-09 | 2024-01-23 | 珠海高凌信息科技股份有限公司 | Wireless sensor network secure transmission method and device based on cooperation |
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112260796B (en) * | 2020-10-21 | 2023-02-21 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112822662A (en) * | 2020-11-24 | 2021-05-18 | 西安交通大学 | D2D cache user safety cooperation method and system based on joint content transmission and interference blocking |
CN112600607B (en) * | 2020-11-25 | 2022-04-08 | 西安电子科技大学 | Double full-duplex cooperative interference anti-eavesdropping method |
CN112600607A (en) * | 2020-11-25 | 2021-04-02 | 西安电子科技大学 | Double full-duplex cooperative interference anti-eavesdropping method |
CN112512085B (en) * | 2020-12-21 | 2022-11-01 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN112512085A (en) * | 2020-12-21 | 2021-03-16 | 郑州大学产业技术研究院有限公司 | Robust opportunity constraint optimization method based on WPBC system security |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN113132975B (en) * | 2021-04-22 | 2022-06-14 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN114614963A (en) * | 2022-03-16 | 2022-06-10 | 北京航空航天大学 | Alternative optimization iterative user group selection method, electronic device and storage medium |
CN114614963B (en) * | 2022-03-16 | 2023-09-26 | 北京航空航天大学 | Alternate optimization iteration user group selection method, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110225579B (en) | 2021-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110225579A (en) | A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply | |
Ding et al. | Joint MIMO precoding and computation resource allocation for dual-function radar and communication systems with mobile edge computing | |
Fernandes et al. | Inter-cell interference in noncooperative TDD large scale antenna systems | |
Papailiopoulos et al. | Interference alignment as a rank constrained rank minimization | |
Palhares et al. | Robust MMSE precoding and power allocation for cell-free massive MIMO systems | |
Jiang et al. | Impact of channel aging on zero-forcing precoding in cell-free massive MIMO systems | |
Kim et al. | A new channel quantization strategy for MIMO interference alignment with limited feedback | |
WO2011096749A2 (en) | A method for interference alignment in wireless network | |
Shi et al. | Zero-forcing-based downlink virtual MIMO–NOMA communications in IoT networks | |
Fang et al. | Cell-free massive MIMO systems with oscillator phase noise: Performance analysis and power control | |
Bogale et al. | Robust transceiver optimization for downlink coordinated base station systems: distributed algorithm | |
Nosrat-Makouei et al. | A simple SINR characterization for linear interference alignment over uncertain MIMO channels | |
Zhang et al. | Per-stream MSE based linear transceiver design for MIMO interference channels with CSI error | |
CN103117787A (en) | Self-adaptive bit distributing method and self-adaptive bit distributing device in cooperative multi-aerial system | |
CN101877607B (en) | Method and device for configuring pre-coding weights in cells | |
Sun et al. | A machine learning approach for beamforming in ultra dense network considering selfish and altruistic strategy | |
CN107078772A (en) | The network processes that the CSI degrees of accuracy are perceived | |
Dharmawansa et al. | Performance analysis of a two–tile reconfigurable intelligent surface assisted 2× 2 MIMO system | |
Zhang et al. | Robust design of linear MIMO transceivers under channel uncertainty | |
Kountouris et al. | Transmission capacity scaling of SDMA in wireless ad hoc networks | |
Song et al. | Flexible coordinated beamforming (FlexCoBF) for the downlink of multi-user MIMO systems in single and clustered multiple cells | |
CN109905155A (en) | A kind of interference management method, wireless communication system based on inside and outside cascade precoding | |
Hu et al. | Combined transceiver optimization for uplink multiuser MIMO with limited CSI | |
Zhang et al. | Analysis of SER of MIMO‐MRC systems with imperfect channel estimation in the presence of non‐Rayleigh CCIs | |
Tabikh et al. | Beamforming design with combined channel estimate and covariance CSIT via random matrix theory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |