CN111555836B - Wireless covert communication model and method based on multi-node cooperative interference blocking - Google Patents

Wireless covert communication model and method based on multi-node cooperative interference blocking Download PDF

Info

Publication number
CN111555836B
CN111555836B CN202010346242.1A CN202010346242A CN111555836B CN 111555836 B CN111555836 B CN 111555836B CN 202010346242 A CN202010346242 A CN 202010346242A CN 111555836 B CN111555836 B CN 111555836B
Authority
CN
China
Prior art keywords
transmitter
node
cooperative
target receiver
probability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010346242.1A
Other languages
Chinese (zh)
Other versions
CN111555836A (en
Inventor
郑通兴
杨子腾
李啸
郭建雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN202010346242.1A priority Critical patent/CN111555836B/en
Publication of CN111555836A publication Critical patent/CN111555836A/en
Application granted granted Critical
Publication of CN111555836B publication Critical patent/CN111555836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/345Interference values
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • H04B17/3912Simulation models, e.g. distribution of spectral power density or received signal strength indicator [RSSI] for a given geographic region
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Quality & Reliability (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a wireless covert communication model and a method based on multi-node cooperative interference blocking, which comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein both a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are sent to the target receiver; the monitoring party is used for receiving a hidden signal sent by a transmitter and a blocking signal sent by a cooperative node in real time; the method takes the hidden throughput as an evaluation index, and ensures that a system always works in an environment with the optimal hidden throughput under the condition of ensuring that the detection error rate of a monitoring party is higher than a certain threshold value by designing a blocking node selection criterion and optimizing related transmission parameters; the invention further increases the difficulty of detecting the hidden information by the monitoring party, so that the hidden communication in the wireless network is easier to realize, the hidden throughput is higher, and the transmission performance of the hidden information is improved.

Description

Wireless covert communication model and method based on multi-node cooperative interference blocking
Technical Field
The invention relates to wireless covert communication method research in a wireless network, in particular to a wireless covert communication model and method based on multi-node cooperative interference blocking.
Background
In recent years, the dependence on wireless devices has increased rapidly, but due to the broadcast nature of wireless communication, security and privacy of wireless communication are receiving increasing attention, and wireless communication security is a core issue that any communication system needs to face. Security and privacy are critical in existing and future wireless networks because large amounts of confidential information (e.g., credit card information, military information, etc.) are transmitted over open wireless media. Although conventional information security techniques may provide protection against eavesdropping by encryption, recent studies have shown that even the most powerful encryption techniques can be defeated by a strong adversary. On the other hand, the physical layer security measures utilize the dynamic characteristics of the wireless medium to minimize the information acquired by an eavesdropper. However, it does not provide protection against detection of the transmission itself, since the encrypted transmission first causes doubt and further detection by the eavesdropper.
Thus, the need for covert communications, the purpose of which is to enable wireless transmission between two users while ensuring that the probability of detection of the user is negligible, is becoming increasingly widespread. This strong security (i.e., wireless covert communication) is desirable in many application scenarios for wireless communication, such as stealth military operations, location tracking in vehicle ad hoc networks, and interworking of sensor networks or the internet of things.
Recently, many scholars have studied on wireless covert communication, and many classical communication scene models are proposed, such as a covert communication model based on a full-duplex receiver and a covert communication model based on greedy relay, but these models all have only one interference source, and the interference suffered in real wireless communication is not single, and even the purpose of transmitting covert information may be achieved by cooperative interference among many users. Therefore, research on more realistic scenes is necessary.
Disclosure of Invention
The invention aims to provide a wireless covert communication model and a method based on multi-node cooperative interference blocking, which solve the defect that the wireless communication concealment still has certain risks due to single scene of the existing established wireless covert communication model.
In order to achieve the purpose, the invention adopts the technical scheme that:
the invention provides a wireless covert communication model based on multi-node cooperative interference blocking, which comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein both a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are sent to the target receiver; the monitoring party is used for receiving the hidden signal sent by the transmitter and the blocking signal sent by the cooperative node in real time.
Preferably, the transmitter, the target receiver, the listener and the cooperative node are all configured with a single antenna.
A wireless covert communication method based on multi-node cooperative interference blocking comprises the following steps based on the wireless covert communication model based on multi-node cooperative interference blocking:
step 1, a communication link is established between a current time slot transmitter and a target receiver; the target receiver acquires channel state information of a communication link through channel training, reciprocity of an uplink channel and a downlink channel is set, and the transmitter knows position information of the target receiver and the cooperative node;
step 2, setting a screening threshold, and selecting a blocking node from the N cooperative nodes according to the screening threshold;
step 3, calculating the detection error probability of the monitoring party and the communication interruption probability between the transmitter and the target receiver according to the blocking node selected in the step 2;
step 4, calculating the concealed throughput between the transmitter and the target receiver according to the detection error probability of the monitoring party obtained in the step 3 and the communication interruption probability between the transmitter and the target receiver;
and step 5, determining the number of the blocking nodes according to the screening threshold value corresponding to the maximum concealment throughput in the plurality of concealment throughputs obtained in the step 4.
Preferably, in step 2, a screening threshold is set, and a blocking node is selected from the N cooperative nodes according to the screening threshold:
if among the N cooperative nodesOf a cooperating node
Figure GDA0003150325000000021
And if the value is less than the preset screening threshold value, taking the cooperative node as a blocking node, and representing the screening method by using an indicative function, wherein,
Figure GDA0003150325000000031
the channel gain between the kth cooperative node to the target receiver.
Preferably, in step 3, the detection error probability of the listener is calculated, and the specific method is as follows:
s1, setting the concealed signal transmitted by the transmitter in the current time slot as xt[i](ii) a And always at power PtGenerating a concealment signal;
the blocking node can send a blocking signal in the current time slot as
Figure GDA0003150325000000032
And always at power PjTransmitting a noise signal;
s2, the monitor carries out binary hypothesis test on the signal received by the current time slot;
and S3, calculating the detection error probability of the monitoring party according to the detection result obtained in the S2.
Preferably, in S2, the signal received by the listener is represented by the following formula:
Figure GDA0003150325000000033
wherein, yw[i]A signal received for a listener; n isw[i]Is a white noise signal received by a monitor;
Figure GDA0003150325000000034
the method is an original hypothesis and indicates that the transmitter does not send the hidden information;
Figure GDA0003150325000000035
to make an alternative assumption, that the transmitter sendsConcealing the information;
the monitoring party performs binary hypothesis test on the signal received by the current time slot, and the specific method is as follows:
if the average power T of the signal received by the monitoring party in the current time slotwWhen the value is smaller than the monitoring threshold value mu, the judgment result of the monitoring party is that the original hypothesis is correct;
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is greater than the monitoring threshold value mu, the judgment result of the monitoring party is that the alternative hypothesis is correct;
in S3, the detection error probability of the listener is calculated according to the test result obtained in S2, specifically by the following formula:
ξ=α+β
wherein, α is false alarm probability, which indicates that the transmitter does not transmit the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter transmits the hidden information; beta is the probability of missing report, which indicates that the transmitter sends the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter does not send the hidden information.
Preferably, in step 3, the communication interruption probability between the transmitter and the target receiver is calculated by the following specific method:
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcIn time, the communication disruption is concealed, from which the expression for the probability of communication disruption can be derived as:
Figure GDA0003150325000000041
wherein δ is a communication interruption probability; gamma rayrIs the signal to interference plus noise ratio of the signal received by the receiver;
Figure GDA0003150325000000042
indicating the probability.
Preferably, in step 4, the maximum concealment throughput is obtained under the condition that the detection error probability of the listener satisfies the given concealment constraint, and is represented by the following formula:
Figure GDA0003150325000000043
wherein,
Figure GDA0003150325000000044
is the blind throughput;
Figure GDA0003150325000000045
a desired lowest detection error probability; ε is a given hidden constraint.
Preferably, in step 5, the specific method for determining the number of blocking nodes is:
according to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]The rate of covert communication between the upper pair transmitter and the target receiver is RcAnd carrying out two-dimensional value search on the screening threshold tau to obtain the maximum concealment throughput meeting the given concealment constraint condition, and further obtain the optimal concealment communication rate between the transmitter and the target receiver corresponding to the maximum concealment throughput and the optimal screening threshold; and selecting a blocking node from the N cooperative nodes according to the optimal screening threshold.
Compared with the prior art, the invention adopts the technical scheme that:
according to the wireless covert communication model and method based on multi-node cooperative interference blocking, a certain number of cooperative nodes are selected intelligently to transmit blocking signals, detection of a monitoring party is interfered to the maximum extent on the premise that target communication is not damaged, and a reliable and covert communication target is achieved; the method takes the hidden throughput as an evaluation index, and ensures that a system always works in an environment with the optimal hidden throughput under the condition of ensuring that the detection error rate of a monitoring party is higher than a certain threshold value by designing a blocking node selection criterion and optimizing related transmission parameters; simulation experiments prove that the maximum hidden throughput of the system is remarkably increased along with the increase of the total number of the cooperative user nodes, so that the feasibility and the superiority of the wireless hidden communication method based on multi-node cooperative interference blocking are proved.
Drawings
FIG. 1 is a schematic diagram of a wireless covert communication model to which the present invention relates;
FIG. 2 is a schematic diagram of a system in a different aspect
Figure GDA0003150325000000051
Lower maximum blind throughput
Figure GDA0003150325000000052
A variation graph along with the total number N of the cooperative nodes available for screening;
FIG. 3 is a schematic diagram of a system according to the present invention
Figure GDA0003150325000000053
Lower optimal screening threshold τ*A variation graph along with the total number N of the cooperative nodes available for screening;
FIG. 4 is a schematic diagram of a process in a different embodiment
Figure GDA0003150325000000054
Lower optimal covert communication rate Rc *And (4) a graph of the variation of the total number N of the cooperative nodes available for screening.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in FIG. 1, the wireless covert communication model based on multi-node cooperative interference blocking provided by the invention comprises a transmitter T, a target receiver R, a listener W and N cooperative nodes J for assisting the transmitter T in covert communicationkWherein k is 1,2, …, N.
The hidden signal sent by the transmitter and the interference signal sent by the cooperative node are both sent to a target receiver; the monitoring party is used for receiving the hidden signal sent by the transmitter and the blocking signal sent by the cooperative node in real time.
The transmitter, the target receiver, the monitor and the cooperative node JkA single antenna is configured.
Based on the wireless covert communication model, the invention provides a wireless covert communication method based on multi-node cooperative interference blocking, which comprises the following steps:
firstly, a communication link is established between a current time slot transmitter T and a target receiver R, and the target receiver R acquires channel state information of the communication link through channel training; considering a time division duplex system and slowly changing channels, namely setting reciprocity of uplink and downlink channels; assume that the transmitter T knows the target receiver R and the cooperative node JkThe location information of (a); let the channel from the transmitter to the target receiver be ht,r(ii) a The channel from the transmitter to the listener is ht,w(ii) a The channel from the kth cooperative node to the target receiver is
Figure GDA0003150325000000055
The channel from the kth cooperative node to the listener is
Figure GDA0003150325000000056
Designing a multi-node cooperation interference blocking scheme, intelligently selecting a certain number of cooperation nodes to transmit blocking signals to interfere the detection of a monitor through the design selection scheme, and calculating the detection error probability of the monitor; the method comprises the following specific steps:
s1, the scheme screens the blocking nodes based on the threshold value tau, namely, the method meets the requirement
Figure GDA0003150325000000061
Is selected as a blocking node by an indicative function
Figure GDA0003150325000000062
Selection criteria representing blocking nodes:
Figure GDA0003150325000000063
Figure GDA0003150325000000064
channel gain between the kth cooperative node and the target receiver;
note that the concealed signal transmitted by the transmitter T in the current time slot is xt[i]Satisfy the following requirements
Figure GDA0003150325000000065
An index of a currently used channel;
Figure GDA0003150325000000066
is xt[i]And always with power PtCarrying out transmission;
note cooperation node JkThe artificial noise signal which can be transmitted in the current time slot is
Figure GDA00031503250000000618
Satisfy the requirement of
Figure GDA0003150325000000067
Is that
Figure GDA0003150325000000068
Conjugation of (1).
All the selected blocking nodes are powered by power PjTransmitting a noise signal, and a power PjIn the interval
Figure GDA0003150325000000069
Subject to uniform distribution, i.e. power PjThe probability density function of (a) is:
Figure GDA00031503250000000610
wherein,
Figure GDA00031503250000000611
is the maximum noise transmit power that the cooperating node can achieve.
The monitoring side faces the problem of binary hypothesis test, and the binary hypotheses are the original hypotheses respectively
Figure GDA00031503250000000612
And alternative assumptions
Figure GDA00031503250000000613
Wherein the original hypothesis
Figure GDA00031503250000000614
No hidden information is sent for the transmitter; alternative assumptions
Figure GDA00031503250000000615
Sending the hidden information for the transmitter; so the signal y received by the listenerw[i]Can be expressed as:
Figure GDA00031503250000000616
wherein n isw[i]Is a white noise signal received by a listener with a variance of
Figure GDA00031503250000000617
Average power T of signal received by monitoring party in current time slotwComprises the following steps:
Figure GDA0003150325000000071
the monitoring party uses a judgment criterion based on the monitoring threshold mu to judge whether the transmitter sends the hidden information, namely when Tw<Mu hours, the listener tends to
Figure GDA0003150325000000072
And recording the event as
Figure GDA0003150325000000073
When T isw>Mu hours, the listener tends to
Figure GDA0003150325000000074
And recording the event as
Figure GDA0003150325000000075
Wherein mu is more than 0; in this method, it is assumed that the number of channels used is infinite, i.e., n → ∞
Figure GDA0003150325000000076
Defining the false alarm probability as
Figure GDA0003150325000000077
In the case of occurrence, the judgment result of the monitor tends to be
Figure GDA0003150325000000078
Probability of (2), is recorded as
Figure GDA0003150325000000079
Figure GDA00031503250000000710
Defining a false negative probability as
Figure GDA00031503250000000711
In the case of occurrence, the judgment result of the monitor tends to be
Figure GDA00031503250000000712
Probability of (2), is recorded as
Figure GDA00031503250000000713
Figure GDA00031503250000000714
Then is at
Figure GDA00031503250000000715
Under the condition that the occurrence probability is the same, the detection error probability of the monitoring party is ξ ═ α + β, and the specific expressions of the false alarm probability and the false alarm probability are as follows:
Figure GDA00031503250000000716
Figure GDA00031503250000000717
wherein,
Figure GDA0003150325000000081
the expression is to calculate the probability,
Figure GDA00031503250000000815
Figure GDA0003150325000000084
the optimal monitoring threshold value mu can be obtained according to the monotonicity of the function*Comprises the following steps:
Figure GDA0003150325000000085
corresponding lowest detection error probability ξ*Is composed of
Figure GDA0003150325000000086
Then the lowest detection error probability is desired
Figure GDA0003150325000000087
Is composed of
Figure GDA0003150325000000088
Wherein,
Figure GDA0003150325000000089
representing a mathematical expectation. And is
Figure GDA00031503250000000810
And
Figure GDA00031503250000000811
are respectively as
Figure GDA00031503250000000812
Figure GDA00031503250000000813
Wherein,
Figure GDA00031503250000000814
p=1-e
thirdly, calculating the communication interruption probability between the transmitter and the target receiver, and obtaining the maximum concealment throughput under the condition of ensuring that the detection error probability of the monitoring party is higher than the given concealment constraint; the method comprises the following specific steps:
firstly, firstly
Figure GDA00031503250000000816
The signal received by the lower target receiver may be represented as:
Figure GDA0003150325000000091
wherein n isr[i]Is a white noise signal received by a listener with a variance of
Figure GDA0003150325000000092
Then the signal-to-interference-and-noise ratio of the received signal of the target receiver is:
Figure GDA0003150325000000093
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcWhen, the communication interruption is concealed, thereby obtaining communicationThe expression for the outage probability is:
Figure GDA0003150325000000094
wherein kappa is (1-p)N(1-λ),
Figure GDA0003150325000000095
Then the blind throughput may be expressed as
Figure GDA0003150325000000096
The maximum concealment throughput is
Figure GDA0003150325000000097
Wherein epsilon is given hidden constraint and takes the value of [0,1 ].
According to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]Upper pair of RcTau is searched in two dimensions to obtain the maximum concealment throughput satisfying the above conditions
Figure GDA0003150325000000098
While
Figure GDA0003150325000000099
Corresponding Rc **Respectively the optimal covert communication rate and the optimal screening threshold value, and then according to the optimal screening threshold value tau*And screening out the blocking nodes from the N cooperative nodes so as to realize the covert communication between the transmitter and the target receiver.
Simulation experiments verify the effectiveness and the realizability of the wireless covert communication method based on multi-node cooperative interference blocking. In this experiment, the transmitting power of the transmitter is P t10W, noise power
Figure GDA0003150325000000101
Under the condition that the hidden constraint epsilon is 0.9, the maximum noise transmission power of the blocking node is changed
Figure GDA0003150325000000102
And the total number N of the collaborative nodes available for screening are simulated. Are respectively at
Figure GDA0003150325000000103
In three cases, the total number of the collaborative user nodes available for screening is changed from 10 to 100 by taking 10 as a step length, and each group of data is implemented 5000 times.
FIG. 2 is a schematic diagram of a process in a different embodiment
Figure GDA0003150325000000104
Lower maximum blind throughput
Figure GDA0003150325000000105
And (4) a graph of the variation of the total number N of the cooperative nodes available for screening. Contrast the difference
Figure GDA0003150325000000106
It can be found that,
Figure GDA0003150325000000107
the number of the cooperative nodes is obviously increased along with the increase of the total number N of the cooperative nodes, thereby proving the feasibility and the superiority of the method. In addition, it can be noted that
Figure GDA0003150325000000108
Is not
Figure GDA0003150325000000109
Because of the larger monotonic function of
Figure GDA00031503250000001010
Resulting in a greater probability of detection error and a greater probability of communication disruption, with an increase in the probability of detection error resulting in an increase in covert throughput and an increase in the probability of communication disruption resulting in a decrease in covert throughputSmall, therefore
Figure GDA00031503250000001011
Is not
Figure GDA00031503250000001012
Is a monotonic function of (a).
FIG. 3 is a schematic diagram of a process in a different embodiment
Figure GDA00031503250000001013
Lower optimal screening threshold τ*And (4) a graph of the variation of the total number N of the cooperative nodes available for screening. As can be seen from FIG. 3, τ*Not only decreases with increasing N, but also with increasing N
Figure GDA00031503250000001014
Is increased and decreased. This is because of the increase in N and
Figure GDA00031503250000001015
an increase in interference noise means an increase in interference noise resulting in a smaller screening threshold to meet a given concealment constraint. When the number N is 10, the number N,
Figure GDA00031503250000001016
Figure GDA00031503250000001017
in the meantime, the screening threshold value can meet the concealment constraint only when the screening threshold value tends to infinity, that is, the probability that the concealment constraint is met under the condition is almost zero, so that the data of the point is not displayed in the graph, and meanwhile, the point corresponds to
Figure GDA00031503250000001018
And Rc *Both are also noted as 0.
FIG. 4 is a schematic diagram of a process in a different embodiment
Figure GDA00031503250000001019
Lower optimal covert communication rate Rc *And (4) a graph of the variation of the total number N of the cooperative nodes available for screening. As can be seen from the view in figure 4,Rc *all increase with the increase of the total number of cooperative nodes N, and R is the samec *Is not
Figure GDA00031503250000001020
The reason for the monotonic function of
Figure GDA00031503250000001021
Is not
Figure GDA00031503250000001022
The reason for the monotonic function of (2) is similar.
The invention compares with others:
(1) the invention adopts the idea of wireless covert communication by multi-node cooperative interference blocking, and resists the monitoring party by selecting a plurality of blocking users to transmit artificial noise without generating great influence on the covert communication process.
(2) The wireless covert communication method of multi-node cooperative interference blocking fully plays the role of idle users in the current time slot in covert communication. The number of idle users is large, the distribution range is wide, and the idle users which can help the covert communication can be always obtained through the screening scheme in the text, so that the resources of the idle users are more efficiently utilized.
(3) The wireless covert communication method of multi-node cooperative interference blocking further increases the difficulty of detecting covert information by a monitoring party, so that the covert communication in a wireless network is easier to realize, the covert throughput is higher, and the performance of covert information transmission is improved.

Claims (6)

1. A wireless covert communication method based on multi-node cooperative interference blocking is characterized by relating to a wireless covert communication model based on multi-node cooperative interference blocking, wherein the model comprises a transmitter, a target receiver, a monitoring party and N cooperative nodes, wherein a covert signal sent by the transmitter and an artificial noise signal sent by the cooperative nodes are both sent to the target receiver; the monitoring party is used for receiving a hidden signal sent by a transmitter and an artificial noise signal sent by a cooperative node in real time, and specifically comprises the following steps:
step 1, a communication link is established between a current time slot transmitter and a target receiver; the target receiver acquires channel state information of a communication link through channel training, reciprocity of an uplink channel and a downlink channel is set, and the transmitter knows position information of the target receiver and the cooperative node;
step 2, setting a selection reference for selecting a blocking node from the N cooperative nodes;
step 3, respectively acquiring an expression of the detection error probability of the monitoring party and an expression of the communication interruption probability between the transmitter and the target receiver according to the selection reference set in the step 2;
step 4, acquiring the concealed throughput between the transmitter and the target receiver according to the expression of the communication interruption probability between the transmitter and the target receiver obtained in the step 3;
step 5, according to the expression of the detection error probability of the monitoring party obtained in the step 3, combining the concealment throughput between the transmitter and the target receiver obtained in the step 4 to obtain a screening threshold corresponding to the maximum concealment throughput, and determining the number of the blocking nodes according to the screening threshold;
in step 5, according to the expression of the detection error probability of the monitoring party obtained in step 3, combining the concealment throughput between the transmitter and the target receiver obtained in step 4 to obtain a screening threshold corresponding to the maximum concealment throughput, and determining the number of blocking nodes according to the screening threshold, the specific method is as follows:
under the condition of ensuring that the detection error probability of the monitoring party meets the given concealment constraint, the maximum concealment throughput is obtained and is expressed by the following formula:
Figure FDA0003198247180000011
wherein,
Figure FDA0003198247180000021
is the blind throughput;
Figure FDA0003198247180000022
a desired lowest detection error probability; epsilon is a given hidden constraint, which takes the value of [0, 1%];
According to the function value distribution characteristic of standard normal distribution, in the interval [0, 10%]Covert communication rate R between an upper pair transmitter and a target receivercAnd carrying out two-dimensional value search on the screening threshold tau to obtain the maximum concealment throughput meeting the given concealment constraint condition, and further obtain the optimal concealment communication rate between the transmitter and the target receiver corresponding to the maximum concealment throughput and the optimal screening threshold; and selecting a blocking node from the N cooperative nodes according to the optimal screening threshold.
2. The method according to claim 1, wherein in step 2, a selection criterion for selecting the blocking node from the N cooperative nodes is set, specifically:
if a cooperative node of the N cooperative nodes
Figure FDA0003198247180000025
And if the value is less than the preset screening threshold value, taking the cooperative node as a blocking node, and representing the screening method by using an indicative function, wherein,
Figure FDA0003198247180000026
the channel gain between the kth cooperative node to the target receiver.
3. The wireless covert communication method based on multi-node cooperative interference blocking according to claim 1, wherein in step 3, the detection error probability of the listener is calculated by:
s1, setting the concealed signal transmitted by the transmitter in the current time slot as xt[i](ii) a And always at power PtGenerating a concealment signal;
the blocking node is at the current timeThe artificial noise signal which can be transmitted in a slot is vjk[i]And always at power PjTransmitting a noise signal;
s2, the monitor carries out binary hypothesis test on the signal received by the current time slot;
and S3, calculating the detection error probability of the monitoring party according to the detection result obtained in the S2.
4. The method according to claim 3, wherein in step S2, the signal received by the listener is represented by the following formula:
Figure FDA0003198247180000023
wherein, yw[i]A signal received for a listener; n isw[i]Is a white noise signal received by a monitor;
Figure FDA0003198247180000024
the method is an original hypothesis and indicates that the transmitter does not send the hidden information;
Figure FDA0003198247180000031
to make an alternative hypothesis, it indicates that the transmitter sent the concealment information;
Figure FDA0003198247180000035
the channel coefficient from the kth cooperative node to the monitoring party is obtained; h ist,wIs the channel coefficient from the transmitter to the listener, N is the total number of cooperative nodes, and is an indicative function
Figure FDA0003198247180000032
The monitoring party performs binary hypothesis test on the signal received by the current time slot, and the specific method is as follows:
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is less than the monitoring threshold value mu, the judgment of the monitoring party is carried outThe result of the interruption is that the original hypothesis is correct;
if the average power T of the signal received by the monitoring party in the current time slotwIf the value is greater than the monitoring threshold value mu, the judgment result of the monitoring party is that the alternative hypothesis is correct;
in S3, the detection error probability of the listener is calculated according to the test result obtained in S2, specifically by the following formula:
ξ=α+β
wherein, α is false alarm probability, which indicates that the transmitter does not transmit the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter transmits the hidden information; beta is the probability of missing report, which indicates that the transmitter sends the hidden information, and the monitoring party judges that the signal received by the current time slot is the probability that the transmitter does not send the hidden information.
5. The method of claim 1, wherein in step 3, the probability of communication interruption between the transmitter and the target receiver is calculated by:
noting the covert communication rate between a transmitter and a target receiver as RcThe channel capacity between the transmitter and the target receiver is C, when C<RcIn time, the communication disruption is concealed, from which the expression for the probability of communication disruption can be derived as:
Figure FDA0003198247180000033
wherein δ is a communication interruption probability; gamma rayrIs the signal to interference plus noise ratio of the signal received by the receiver;
Figure FDA0003198247180000034
indicating the probability.
6. The method of claim 1, wherein the transmitter, the target receiver, the listener and the cooperative node are configured with a single antenna.
CN202010346242.1A 2020-04-27 2020-04-27 Wireless covert communication model and method based on multi-node cooperative interference blocking Active CN111555836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010346242.1A CN111555836B (en) 2020-04-27 2020-04-27 Wireless covert communication model and method based on multi-node cooperative interference blocking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010346242.1A CN111555836B (en) 2020-04-27 2020-04-27 Wireless covert communication model and method based on multi-node cooperative interference blocking

Publications (2)

Publication Number Publication Date
CN111555836A CN111555836A (en) 2020-08-18
CN111555836B true CN111555836B (en) 2021-12-28

Family

ID=72007838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010346242.1A Active CN111555836B (en) 2020-04-27 2020-04-27 Wireless covert communication model and method based on multi-node cooperative interference blocking

Country Status (1)

Country Link
CN (1) CN111555836B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383380B (en) * 2020-10-21 2022-06-07 西安交通大学 Covert vehicle communication method based on non-orthogonal multiple access technology
CN112822662B (en) * 2020-11-24 2022-05-20 西安交通大学 D2D cache user safety cooperation method and system based on joint content transmission and interference blocking
CN112911616B (en) * 2021-01-19 2022-10-18 西安理工大学 Covert transmission method based on cooperative interference countermeasure joint detection
CN112954672B (en) * 2021-02-09 2022-09-23 大连理工大学 Unmanned aerial vehicle relay covert communication method for flight monitoring person
CN114884608A (en) * 2022-05-11 2022-08-09 电子科技大学 Unmanned aerial vehicle cooperative covert communication method and system
CN115529103A (en) * 2022-06-27 2022-12-27 南京理工大学 Covert communication system with cooperation of double unmanned aerial vehicles and method for maximizing average covert rate
CN115276883A (en) * 2022-07-19 2022-11-01 西安电子科技大学 Cooperative cognitive covert communication method based on maximum rate mechanism

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581960A (en) * 2015-01-26 2015-04-29 西安交通大学 Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety
CN108834113A (en) * 2018-06-20 2018-11-16 江苏大学 A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer
CN109788479A (en) * 2019-02-27 2019-05-21 西安交通大学 A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8744336B2 (en) * 2008-08-27 2014-06-03 Qualcomm Incorporated Interference detection apparatus and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety
CN104581960A (en) * 2015-01-26 2015-04-29 西安交通大学 Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN108834113A (en) * 2018-06-20 2018-11-16 江苏大学 A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer
CN109788479A (en) * 2019-02-27 2019-05-21 西安交通大学 A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Covert Communications in D2D Underlaying Cellular Networks With Antenna Array Assisted Artificial Noise Transmission;Yu’e Jiang;《IEEE Transactions on Vehicular Technology》;20200114;全文 *
Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA;Yu’e Jiang;《IEEE Systems Journal》;20200203;全文 *
隐蔽无线通信技术研究—节点协助下的隐蔽通信性能分析;朱强强;《中国优秀硕士学位论文全文数据库 信息科技辑》;20200131;全文 *

Also Published As

Publication number Publication date
CN111555836A (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN111555836B (en) Wireless covert communication model and method based on multi-node cooperative interference blocking
Kim et al. Channel-aware adversarial attacks against deep learning-based wireless signal classifiers
Hu et al. Covert communications without channel state information at receiver in IoT systems
Xiao et al. IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning
US20200169883A1 (en) Security Detection Method for Physical Layer Authentication System
CN111510987B (en) Relay selection method based on safety cooperation NOMA network
CN109088891B (en) Legal monitoring method based on physical layer security under multi-relay system
CN110730452A (en) Performance analysis method of combined relay and interference selection scheme in wireless communication system
CN109525985B (en) Full-duplex active eavesdropping method for wireless energy acquisition
CN110557768A (en) Safe transmission method based on cooperative non-orthogonal multiple access network
CN115665729A (en) Hidden transmission method under multi-eavesdropper joint detection environment
CN106953819B (en) Physical layer secret communication method based on multi-radio cooperation precoding
CN110312255B (en) Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags
CN110213793B (en) Relay system safety throughput optimization method based on rate control
Yu et al. Theoretical analysis of secrecy transmission capacity in wireless ad hoc networks
CN102711120B (en) Cooperative frequency spectrum sensing method based on DS (Dempter-Shafer) evidence theory
KR102282744B1 (en) Opportunistic scheduling method to improve the Physical-Layer Security in MU-MISO NOMA systems
Mousavifar et al. Trust-based energy efficient spectrum sensing in cognitive radio networks
Cai et al. Reliable High Throughput Aerial Acoustic Communication for Mobile Network
CN106604274A (en) Safety communication method based on information theory and cryptography in wireless sensor network
CN111106888B (en) Multi-mode correlation based step-by-step spectrum sensing method and storage medium
He et al. Channel-Aware Jammer Selection and Power Control in Covert Communication
CN117835230B (en) Probability hidden transmission method based on link information
Shi et al. User scheduling design for covert communication in cooperative cognitive radio system
Chaudhari et al. Effects of quantization on bepwalls for soft decision based cooperative sensing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant