CN111615111A - Distributed robust security resource allocation method for small cell network - Google Patents
Distributed robust security resource allocation method for small cell network Download PDFInfo
- Publication number
- CN111615111A CN111615111A CN202010362941.5A CN202010362941A CN111615111A CN 111615111 A CN111615111 A CN 111615111A CN 202010362941 A CN202010362941 A CN 202010362941A CN 111615111 A CN111615111 A CN 111615111A
- Authority
- CN
- China
- Prior art keywords
- small cell
- users
- network
- interference
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/02—Resource partitioning among network components, e.g. reuse partitioning
- H04W16/10—Dynamic resource partitioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/22—Traffic simulation tools or models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the technical field of wireless communication, and discloses a distributed steady safe resource allocation method facing a small cell network, which analyzes and obtains the steady private rate of small cell users; analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user; a pricing mechanism is introduced, and an optimization model of a small cell user side is designed; solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users; the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells; updating the price factor based on the obtained network balance state, and broadcasting in the whole network; and repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged, and finally, balancing the network in the state, namely, the safe transmission scheme of all the small cell users. The invention realizes the reliable protection of macro users and the steady safety of small cell users under the condition of uncertain information.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a distributed robust security resource allocation method for a small cell network.
Background
At present, small-cell networks (small-cell networks) deploy microcells, picocells and femtocells on the basis of traditional macrocells to form a multi-layer heterogeneous network structure, and are basic components of 5G and later 5G era infrastructures. The small cell base station has the characteristics of low cost, low power consumption and deployment on demand, and realizes a flexible network architecture. Meanwhile, the small cell network can realize seamless coverage service and high-efficiency spectrum efficiency, and further enhance user experience. In the existing wireless network system, security defense measures mainly depend on encryption technology, but with the rapid increase of the number of wireless devices and the continuous improvement of wireless network heterogeneity, an encryption method faces great challenges in terms of key management and distribution problems. The small cell base stations, however, have limited computational power and resources and may not be able to efficiently support the computational complexity required by the encryption techniques. In this respect, the physical layer security technology has a great potential, and it utilizes the inherent characteristics of the wireless medium, such as fading, interference and noise, to realize keyless secure transmission, which is convenient for implementation in a hierarchical heterogeneous small cell network.
For small cell networks, in addition to designing a link-level security transmission strategy, the interaction between different users and their impact on the overall security performance of the network need to be considered. Especially for small cells, which typically operate in an autonomous manner, users need to adjust their security transmission strategies taking into account their wireless environment and the behavior of other users. Moreover, the complex interference caused by simultaneous transmission between heterogeneous user layers can be fully utilized to reduce the eavesdropping performance and further improve the security. Furthermore, due to limited resources and lightweight signaling interactions in small cells, users need to independently determine their security policies in a distributed manner. However, in a small cell network with a hierarchical structure, macro cell users generally have higher priority, and thus reliable transmission performance guarantees are required. For this reason, the security problem of the small cell needs to be considered under the condition of the quality of service constraint of the macro cell user. Meanwhile, because the small cell base station has limited capability, all ideal channel state information may not be obtained, and accordingly, the design of the safe transmission scheme needs to take information uncertainty into consideration to realize robust safety guarantee. Therefore, physical layer security schemes for small cell networks need to jointly consider global interference constraints and uncertainty of channel information in distributed security policy design in order to provide a robust and reliable solution for practical systems.
Through the above analysis, the problems and disadvantages of the prior art include:
(1) the existing security mechanism relies on key distribution at the upper layer of a protocol, and as the number of users increases, key distribution and management become more difficult and complex; moreover, as the computing power of the device increases, the risk of the encryption being cracked increases.
(2) The existing physical layer security solution focuses on the security guarantee of a single link, but neglects the security of multi-user transmission under the network condition.
(3) Existing security schemes lack the consideration of potentially multiple uncertainties for the actual network.
The difficulty in solving the above problems and defects is: the existing security mechanism is based on a key system, and the physical layer security is a brand new solution. In the scenario considered by the present invention, the small cell network employs a distributed physical layer security mechanism, which requires small cell users to independently determine their own transmission strategies, but needs to satisfy common interference constraints, and therefore requires a distributed coordination mechanism. Furthermore, due to limited user capabilities of small cells, they cannot obtain global information of the whole network, and therefore need to make decisions with uncertainty involved.
The significance of solving the problems and the defects is as follows: therefore, the invention adopts a physical layer security scheme, does not need a secret key and has lower complexity; the invention considers the safe transmission of a plurality of coexisting small cell users in a double-layer network, and simultaneously guarantees the service quality of macro cell users through the interference condition constraint; meanwhile, double uncertainty factors in the network are considered, including uncertainty of a small cell user eavesdropping link and uncertainty of a macro cell interference link, and the scheme realizes robust safety of the small cell user and robust interference protection of the macro user.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a distributed robust security resource allocation method facing a small cell network.
The invention is realized in such a way that a distributed robust security resource allocation method facing a small cell network comprises the following steps:
the method comprises the steps that firstly, the robust privacy rate of small cell users is obtained based on uncertainty analysis of channel information of eavesdroppers in each small cell;
secondly, analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
thirdly, introducing a pricing mechanism and designing an optimization model of a small cell user side;
fourthly, solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users;
fifthly, the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
sixthly, updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
and seventhly, repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged, and finally, balancing the network in a final state, namely, the safe transmission scheme of all small cell users.
Further, the signal to interference plus noise ratio SINR of the small cell user SUE-j legally transmitted on the channel k in the distributed robust security resource allocation method for the small cell network is as follows:
wherein the interference includes interference and noise in both macro cell and small cell,representing background noise, the signal-to-interference-and-noise ratio SINR of the eavesdropper on the channel k of the small cell user SUE-j is as follows:
summing all channels to obtain the privacy rate of the small cell user SUE-j:
and protecting the reception of the macro cell users by interference constraint, wherein the interference of all the small base stations to the macro cell users is lower than a threshold value:
Further, the first step is based on uncertainty analysis of channel information of each small cell internal eavesdropper, and channel state information g of small cell users SUE-j on channel kj(k)=[gij(k)]i∈J∪{0}The method comprises the following steps:
is an estimate based on prior information that,the uncertain part of the information about the eavesdropper channel state in the small base station is defined as:
∈ thereinj(k) Andj(k) a constant specifying an uncertainty region;
the robust privacy rate for small cell users is expressed as:
the solution to the optimization problem is expressed as:
wherein:
further, the second step is for an interfering channel associated with a macrocell user MUE-nThe model is represented as:
is a known estimate of the value of the signal,is the uncertain part of the channel state information, expressed as:
wherein e isnIt is a constant that determines the size of the defined area, introducing the worst case interference, i.e. robust protection for the macro cell users:
the solution to this problem is obtained as:
further, the third step is based on a price factor k ═ kn]n∈NDefining:
a robust privacy rate based on interference cost, wherein a price factor satisfies a condition:
0≤κ⊥ζ≤0。
further, the optimization problem of the fourth step small cell user is as follows:
solving is carried out to obtain a resource allocation scheme of a single small cell user, and a Lagrangian dual method is utilized to obtain a Lagrangian function of the problem as follows:
wherein xjIs a lagrange multiplier;
let its first derivative be zero, we can obtain:
solving the optimal power distribution scheme of the single small cell user is carried out as follows, and the maximum value and the minimum value of the Lagrange multiplier are respectivelyAndin additionSubstituting into an equation, and obtaining the power p of the small cell user on each channel by using a dichotomyj(k),If it isThenOtherwiseRepeating the above steps using the updated upper and lower bounds of the Lagrangian multiplier untilWherein iota is a predefined threshold, and the power on each channel obtained by utilizing the dichotomy is the power distribution scheme of the current small cell user;
the fifth step obtains network balance through the optimal response iteration among small cell users, and the network balance is initialized to be assigned with a given price factor kappa and meets the power distributionUnder the condition of (1), randomly assigning the power of all small cell users to p (t), wherein t is the iteration frequency, and sigma is the threshold value of a predefined termination algorithm;
the cyclic content is to solve the fourth step for each small cell user and update the self powerWhereinFor the power obtained in the fourth step, all users repeat the step until the convergence condition | | | p (t) -p (t-1) | |/| | p (t-1) | < σ is met, and each user obtains the optimal transmitting power in the current state to achieve balance;
said sixth step determining an optimal price factor, τ representing the number of iterations,initializing a step length rho for a predefined threshold value of a termination algorithm, randomly assigning a price factor, and obtaining balance by utilizing an iterative process in a fifth step based on a current price factor kappa (tau)On the basis, updating iteration time to be τ ← τ +1, and updating corresponding price factor to be τ ← τ +1And broadcasting in the whole network;
the seventh step, based on the updated price factor, repeating the price factor updating and the corresponding network balance updating process of the fourth, fifth and sixth steps until the convergence condition is satisfied
It is another object of the present invention to provide a program storage medium for receiving user input, the stored computer program causing an electronic device to perform the steps comprising:
the method comprises the steps that firstly, the robust privacy rate of small cell users is obtained based on uncertainty analysis of channel information of eavesdroppers in each small cell;
secondly, analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
thirdly, introducing a pricing mechanism and designing an optimization model of a small cell user side;
fourthly, solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users;
fifthly, the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
sixthly, updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
and seventhly, repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged, and finally, balancing the network in a final state, namely, the safe transmission scheme of all small cell users.
It is another object of the present invention to provide a computer program product stored on a computer readable medium, comprising a computer readable program for providing a user input interface to implement the method for distributed robust security resource allocation for small cell networks when executed on an electronic device.
Another object of the present invention is to provide a resource allocation system for implementing the distributed robust security resource allocation method for small cell networks, the resource allocation system comprising:
the robust privacy rate acquisition module is used for obtaining the robust privacy rate of the small cell users based on the uncertainty analysis of the information of the eavesdropper channel inside each small cell;
the interference analysis module is used for analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
the optimization model design module is used for introducing a pricing mechanism and designing an optimization model of a small cell user side;
the safe transmission strategy module is used for solving the optimization model of the small cell users to obtain the safe transmission strategy of the small cell users;
the security strategy iterative updating module is used for achieving the equilibrium state of the whole network through the security strategy iterative updating among the small cell users;
the price factor updating module is used for updating the price factor based on the obtained network balance state and broadcasting the price factor in the whole network;
and the network balancing module is used for balancing the network in the final state based on the updated price factor until the price factor is converged, namely the safe transmission scheme of all small cell users.
Another object of the present invention is to provide a radio terminal equipped with the above resource allocation system.
By combining all the technical schemes, the invention has the advantages and positive effects that: the invention can provide reliable safety guarantee for the users in the small cell under the condition of strictly meeting the interference of the users in the macro cell under the condition of uncertain multiple information; first, the small cell user obtains its own robust privacy rate considering its uncertainty about the eavesdropper channel state information, while obtaining worst-case interference considering the uncertainty of the small cell user to the macro user channel. Secondly, on the basis of introducing the price factor, the small cell user maximizes the robust privacy rate of the small cell user at the cost of the worst interference. And thirdly, the balance among the users is realized by iteration of an optimal power strategy among the users in the small cell in the network, and the price factor is updated based on a projection method on the basis of the balance. Repeating the steps until convergence. By the scheme of the invention, the reliable protection of macro users and the steady safety of small cell users under the condition of uncertain information are realized. Meanwhile, the scheme of the invention is based on distributed iteration among users, and can be conveniently realized in a network.
In a dual-layer small cell network, it is considered that the transmission of small-cell users (SUEs) is threatened by an eavesdropper, and therefore, the private rate of the small-cell users is maximized. However, the transmission of small cell users is limited by the interference constraints of macro cell users (MUEs). Meanwhile, considering the implementation in a practical system, the transmission decision of the small cell user faces uncertainty of information. The uncertainty includes two aspects, on one hand, the channel state information of the eavesdropper cannot be confirmed; on the other hand, it cannot ascertain its interfering channel state information with the user. Therefore, the invention provides a distributed safety transmission scheme aiming at the problem, realizes the maximization of the steady safety rate of small cell users, and simultaneously provides the steady interference protection for macro cell users. The game model is utilized to model resource competition among users in the small cells, a pricing mechanism is introduced to solve the problem, and a safe transmission scheme is designed on the basis.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a distributed robust security resource allocation method for a small cell network according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a resource allocation system according to an embodiment of the present invention;
in the figure: 1. a robust privacy rate acquisition module; 2. an interference analysis module; 3. an optimization model design module; 4. a secure transmission policy module; 5. a security policy iteration update module; 6. a price factor updating module; 7. And a network balancing module.
FIG. 3 is a diagram illustrating comparison of performance of different transmitters at a distance from an eavesdropper, according to an embodiment of the present invention;
in the figure: (a) interference power suffered by macro cell users; (b) small cell users and privacy rates.
Figure 4 is a comparison diagram of performance under different small cell user number conditions provided by the embodiment of the present invention;
in the figure: (a) interference power suffered by macro cell users; (b) small cell users and privacy rates.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a distributed robust security resource allocation method for a small cell network, and the present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the distributed robust security resource allocation method for small cell networks provided by the present invention includes the following steps:
s101: obtaining a steady privacy rate of small cell users based on uncertainty analysis of channel information of eavesdroppers in each small cell;
s102: analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
s103: a pricing mechanism is introduced, and an optimization model of a small cell user side is designed;
s104: solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users;
s105: the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
s106: updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
s107: based on the updated price factor, repeating S104-S106 until the price factor converges, and finally, balancing the network in a final state, namely, the safe transmission scheme of all small cell users.
The distributed robust safety resource allocation method for the small cell network, provided by the invention, has the specific implementation steps as follows: consider a small cell network comprisingThe macro cell base station provides wireless service for N macro users; meanwhile, there are J small cell base stations, there is one small cell user in each small cell, and the small cell user set can be represented asThere is also an eavesdropper in the small cell. There are K orthogonal channels in the network, denoted asBoth macro cell users and small cell users may share usage. The transmission power of SUE-j on channel k is p for small cell usersj(k) P under a limited power budgetj=[pj(k)]k∈KThe method comprises the following steps:
whereinIs the power limit for each of the channels,is the maximum allowed transmit power. Similarly, with p0=[p0(k)]k∈KRepresenting the transmit power of the macrocell base station. For transmission on channel k from cell user SUE-j to small cell user SUE-i, the link gain is denoted as hij(k) The link gain from the macrocell base station to the small cell users SUE-j is denoted by h0j(k) In that respect For eavesdropping on the channel, gij(k) Representing the gain of the eavesdropper link on channel k from the small cell user SUE-i to eavesdropping on the small cell user SUE-j, g0j(k) Representing the link gain of an eavesdropper on channel k from the macrocell base station to the small cell user SUE-j. On the other hand, the transmission between the users in the small cell also affects the reception of the users in the macro cell, and the user uses hjn(k) Representing the link gain on channel k from the cell user SUE-j to the macrocell user MUE-n.
Based on the above definitions, the present invention can obtain the SINR of the signal to interference plus noise ratio (SINR) of the small cell user SUE-j legally transmitted on the channel k as follows:
wherein the interference includes interference and noise in both macro cell and small cell,representing background noise. Since the present invention focuses on interference limited communications, the present invention assumes that the noise power on all channels is the same for all small cell users. Similarly, the signal-to-interference-and-noise ratio SINR of the eavesdropper on the channel k of the small cell user SUE-j can also be obtained as follows:
it can be seen from the present invention that eavesdropping in a small cell system is not only interfered by other small cell users, but also by macro cell users. According to the above two formulas, the privacy rate of small cell user SUE-j can be obtained by summing all channels:
in consideration of the interference exerted by the small cell users to the macro cell users, the present invention proposes an interference constraint to protect the reception of the macro cell users, i.e. the interference of all the small base stations to the macro cell users is lower than a threshold,
In the first step, considering the implicit assumption that perfect channel state information is adopted, perfect channel state is not easily obtained due to limited capability and resources of small cell users. From a practical implementation point of view, small cell users do not interact directly with eavesdroppers and macro cell users, and it may be difficult to obtain relevant information. Therefore, an uncertainty analysis based on channel information for each small cell internal eavesdropper is considered first.
In particular, the channel state information g for small cell user SUE-j on channel kj(k)=[gij(k)]i∈J∪{0}The method comprises the following steps:
is an estimate based on prior information that,the uncertain part of the small base station internal information about the eavesdropper channel state is defined as:
∈ thereinj(k) Andj(k) a constant specifying the uncertainty region.
Further, the robust privacy rate of small cell users may be expressed as:
the solution to the optimization problem can be expressed as:
wherein:
and secondly, analyzing the worst interference based on the uncertainty of the interference channel between the small cell user and the macro cell user. In particular, for the interference channel associated with the macrocell user MUE-nThe model can be represented as:
is a known estimate of the value of the signal,is the uncertain part of the channel state information, expressed as:
wherein e isnIs a constant that determines the size of the defined area. This may introduce worst-case interference, i.e. robust protection for macro cell users:
a solution to this problem can be found as:
and thirdly, after the uncertainty of the two aspects is analyzed, an optimization model of the user side of the small cell can be designed. Since the competition privacy rate between small cell users is maximized and simultaneously influenced by the interference constraint of macro cell users, the invention introduces a pricing mechanism to solve the problem based on the price factor k ═ kn]n∈NThe following definitions are made:
i.e. a robust privacy rate based on interference cost, where the price factor satisfies the condition:
0≤κ⊥ζ≤0。
and fourthly, combining the steps, the optimization problem of the small cell users is as follows:
the above problem is solved to obtain a resource allocation scheme for a single small cell user. Here, with the lagrange dual method, the lagrange function that can be used to obtain the above problem is:
wherein xjIs a lagrange multiplier.
Let its first derivative be zero, we can obtain:
on the basis, solving the optimal power allocation scheme of the single small cell user is carried out as follows. Setting the maximum value and the minimum value of the Lagrange multiplier to be respectivelyAndin additionOn the basis, the equation is substituted, and the power p of the small cell user on each channel is obtained by utilizing the dichotomyj(k),On the basis of this, if the judgment is madeThenOtherwiseRepeating the above steps using the updated upper and lower bounds of the Lagrangian multiplier untilWhere iota is a predefined threshold. The power on each channel obtained by the dichotomy under the condition is the power distribution scheme of the current small cell users.
Fifthly, after the individual optimal problem of each small cell user is obtained, network balance can be obtained through the optimal response iteration among the small cell users under the inspiration of the balanced fixed-point property. Initialising to a given price factor k, at the point of satisfying the power allocationIn the case of (2), the power of all small cell users is randomly assigned to p (t), t is the number of iterations, and σ is the threshold value of the predefined termination algorithm.
The cyclic content is to solve the fourth step for each small cell user and update the self powerWhereinAll users repeat the step for the power obtained in the fourth step until the convergence condition p (t) -p (t-1)/p (t-1) < sigma is satisfied, and each user obtains the optimal transmitting power in the current state to achieve balance.
Sixthly, determining an optimal price factor, wherein tau represents the iteration number,is a threshold value of a predefined termination algorithm. Initializing step length rho, and randomly assigning price factors. On the basis, firstly, based on the current price factor k (tau), the equilibrium is obtained by using the iteration process in the fifth stepOn the basis, updating iteration time to be τ ← τ +1, and updating corresponding price factor to be τ ← τ +1And broadcast over the entire network.
Seventhly, based on the updated price factors, repeating the price factor updating of the fourth, fifth and sixth steps and the corresponding network balance updating process until the convergence condition is metWhen the loop is terminated, the obtained price factor can ensure that the value of the interference function is small enough to satisfy the interference constraint and provide robust protection for the MUE. Meanwhile, price balance is realized, and the maximization of the steady privacy rate of each SUE is ensured.
As shown in fig. 2, the resource allocation system provided by the present invention includes:
the robust privacy rate acquisition module 1 is configured to obtain the robust privacy rate of the small cell user based on an uncertainty analysis of channel information of an eavesdropper inside each small cell.
And the interference analysis module 2 is configured to analyze the worst interference based on uncertainty of an interference channel between a small cell user and a macro user.
And the optimization model design module 3 is used for introducing a pricing mechanism and designing an optimization model of the small cell user side.
And the safe transmission strategy module 4 is used for solving the optimization model of the small cell users to obtain the safe transmission strategy of the small cell users.
And the security strategy iterative updating module 5 is used for achieving the equilibrium state of the whole network through the security strategy iterative updating among the small cell users.
And the price factor updating module 6 is used for updating the price factor based on the obtained network balance state and broadcasting the price factor in the whole network.
And the network balancing module 7 is configured to balance the network in the final state, that is, the safe transmission scheme of all small cell users, based on the updated price factor until the price factor converges.
The technical solution of the present invention is further described with reference to the following specific examples.
The distributed robust safe resource allocation method facing the small cell network provided by the embodiment of the invention specifically comprises the following steps:
the first step is as follows: and obtaining the robust privacy rate of the small cell users based on the uncertainty analysis of the channel information of each eavesdropper inside the small cell.
(1) The method comprises the steps that a macro cell base station is contained in a small cell network and provides wireless service for N macro users; meanwhile, there are J small cell base stations, there is one small cell user in each small cell, and the small cell user set can be represented asThere is also an eavesdropper in the small cell. There are K orthogonal channels in the network, denoted asBoth macro cell users and small cell users may share usage. For small cell usersSUE-j has a transmit power p on channel kj(k) The transmission power of the macrocell base station is p0=[p0(k)]k∈K。
For transmission on channel k from cell user SUE-j to small cell user SUE-i, the link gain is denoted as hij(k) The link gain from the macrocell base station to the small cell users SUE-j is denoted by h0j(k) In that respect For eavesdropping on the channel, gij(k) Representing the eavesdropper link gain in channel k from the small cell user SUE-i to eavesdropping on the small cell user SUE-j, g0j(k) Representing the link gain of an eavesdropper on channel k from the macrocell base station to the small cell user SUE-j. On the other hand, the transmission between small cell SUEs also affects the reception of MUEs in macro cell, and uses hjn(k) Representing the link gain on channel k from the cell user SUE-j to the macrocell user MUE-n.
Based on the above definition, the signal to interference plus noise ratio SINR for legal transmission of small cell user SUE-j on channel k can be obtained as follows:
wherein the interference includes interference and noise in both macro cell and small cell,representing background noise. Similarly, the signal-to-interference-and-noise ratio SINR of the eavesdropper on channel k for small cell user SUE-j is:
according to the above two formulas, the privacy rate of small cell user SUE-j can be obtained by summing all channels:
meanwhile, namely, the interference of all the small base stations to the macro cell users is lower than a threshold:
(2) Channel state information g for small cell user SUE-j on channel kj(k)=[gij(k)]i∈J∪{0}Is provided withWhereinIs an estimate based on prior information that,is the uncertain part of the small base station internal information about the eavesdropper channel state:
∈ thereinj(k) Andj(k) a constant specifying the uncertainty region.
(3) The robust privacy rate of small cell users may represent:
the solution to the optimization problem can be expressed as:
wherein:
the second step is that: the worst-case interference is analyzed based on the uncertainty of the interference channel between small cell users and macro cell users.
is a known estimate of the value of the signal,is the uncertain part of the channel state information, expressed as:
wherein e isnIs a constant that determines the size of the defined area.
(2) This introduces worst-case interference, i.e. robust protection for macro cell users:
a solution to this problem can be found as:
the third step: and (4) introducing a pricing mechanism and designing an optimization model of the small cell user side.
Based on the price factor k ═ k [ k ]n]n∈NDefining:
i.e. a robust privacy rate based on interference cost, where the price factor satisfies the condition:
0≤κ⊥ζ≤0,
the fourth step: and solving the optimization model of the small cell users to obtain the safe transmission strategy of the small cell users.
The optimization problem for small cell users is as follows,
(1) using the lagrange dual method, the lagrange function that can be used to obtain the above problem is:
wherein xjIs a lagrange multiplier. Let its first derivative be zero, we can obtain:
(2) setting the maximum value and the minimum value of the Lagrange multiplier to be respectivelyAndin additionBinary method for obtaining power p of small cell user on each channel by taking into the above formulaj(k),
(3) On the basis of this, if the judgment is madeThenOtherwiseRepeating the above steps using the updated upper and lower bounds of the Lagrangian multiplier untilWhere iota is a predefined threshold. The power on each channel obtained by the dichotomy under the condition is the power distribution scheme of the current small cell users.
The fifth step: the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
(1) for a given price factor k, the power distribution is satisfiedIn the case of (2), the power of all small cell users is randomly assigned to p (t), where t is the number of iterations. The predefined sigma is a threshold value for the termination algorithm.
(2) Solving the fourth step for each small cell user and updating the self powerWhereinThe power determined in the fourth step. All users repeat the steps until the convergence condition | | p (t) -p (t-1) |/| p (t-1) | | < sigma is met, and each user obtains the optimal transmitting power in the current state to achieve balance.
And a sixth step: updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
(1) tau represents the number of iterations and,is a threshold value of a predefined termination algorithm. Initializing a step length rho, and randomly assigning a price factor;
(2) based on the current price factor k (tau), a balance is obtained using the iterative procedure in the fifth step
(3) Updating iteration time to be tau ← tau + 1, and the corresponding price factor is updated to beAnd broadcast over the entire network.
The seventh step: repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged and the convergence condition is metNetwork equalization in the final state is the safe transmission scheme of all small cell users.
The technical solution of the present invention is further described below with reference to experiments.
Fig. 3 shows the performance of the whole network as a function of the distance between the transmitter and the eavesdropper, and it can be seen from fig. 3(a) that the scheme of the present invention faces multiple information uncertainties as soon as possible under different network configuration conditions, and still strictly meets the interference condition of the macro user. In contrast, under the conventional scheme, the macro user faces back to severe interference. As can be seen from fig. 3(b), the network and privacy rates under the scheme of the present invention are reduced compared to the conventional method due to the strict satisfaction of the interference condition. Numerically, the interference caused by the conventional method is approximately 20dB higher than the result of the scheme of the present invention. The result is combined to see that the scheme of the invention strictly protects the transmission performance of the macro user at the cost of partially sacrificing the network security performance.
Figure 4 gives the variation of the performance of the whole network with the number of small cell users. The scheme can strictly ensure the interference condition of macro users when facing multiple uncertainties under different user numbers. The interference generated under the traditional method is about 20dB higher than that of the scheme of the invention, and in an actual network, the overall performance of macro users can be seriously influenced. Meanwhile, due to the strict interference protection of the scheme of the invention for the macro user, the private rate of the small cell is partially reduced.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A distributed robust security resource allocation method facing a small cell network is characterized in that the distributed robust security resource allocation method facing the small cell network comprises the following steps:
the method comprises the steps that firstly, the robust privacy rate of small cell users is obtained based on uncertainty analysis of channel information of eavesdroppers in each small cell;
secondly, analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
thirdly, introducing a pricing mechanism and designing an optimization model of a small cell user side;
fourthly, solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users;
fifthly, the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
sixthly, updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
and seventhly, repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged, and finally, balancing the network in a final state, namely, the safe transmission scheme of all small cell users.
2. The small cell network-oriented distributed robust safety resource allocation method according to claim 1, wherein the signal to interference and noise ratio SINR of legitimate transmissions of small cell users SUE-j on channel k is:
wherein the interference includes interference and noise in both macro cell and small cell,representing background noise, the signal-to-interference-and-noise ratio SINR of the eavesdropper on the channel k of the small cell user SUE-j is as follows:
summing all channels to obtain the privacy rate of the small cell user SUE-j:
and protecting the reception of the macro cell users by interference constraint, wherein the interference of all the small base stations to the macro cell users is lower than a threshold value:
3. The small cell network-oriented distributed robust security resource allocation method according to claim 1, wherein the first step is based on uncertainty analysis of each small cell internal eavesdropper channel information, for channel state information g of small cell user SUE-j on channel kj(k)=[gij(k)]i∈J∪{0}The method comprises the following steps:
is an estimate based on prior information that,the uncertain part of the information about the eavesdropper channel state in the small base station is defined as:
∈ thereinj(k) Andj(k) a constant specifying an uncertainty region;
the robust privacy rate for small cell users is expressed as:
the solution to the optimization problem is expressed as:
wherein:
4. the small cell network-oriented distributed robust security resource allocation method of claim 1, wherein the second step is for an interference channel related to macro cell users MUE-nThe model is represented as:
is a known estimate of the value of the signal,is the uncertain part of the channel state information, expressed as:
wherein e isnIt is a constant that determines the size of the defined area, introducing the worst case interference, i.e. robust protection for the macro cell users:
the solution to this problem is obtained as:
6. the small cell network-oriented distributed robust security resource allocation method according to claim 1, wherein the fourth step optimization problem for small cell users is as follows:
solving is carried out to obtain a resource allocation scheme of a single small cell user, and a Lagrangian dual method is utilized to obtain a Lagrangian function of the problem as follows:
wherein xjIs a lagrange multiplier;
let its first derivative be zero, we can obtain:
solving the optimal power distribution scheme of the single small cell user is carried out as follows, and the maximum value and the minimum value of the Lagrange multiplier are respectivelyAndin additionSubstituting into an equation, and obtaining the power p of the small cell user on each channel by using a dichotomyj(k),If it isThenOtherwiseRepeating the above steps using the updated upper and lower bounds of the Lagrangian multiplier untilWherein iotaThe power on each channel obtained by utilizing a dichotomy is a predefined threshold value, namely the power distribution scheme of the current small cell user;
the fifth step obtains network balance through the optimal response iteration among small cell users, and the network balance is initialized to be assigned with a given price factor kappa and meets the power distributionUnder the condition of (1), randomly assigning the power of all small cell users to p (t), wherein t is the iteration frequency, and sigma is the threshold value of a predefined termination algorithm;
the cyclic content is to solve the fourth step for each small cell user and update the self powerWhereinFor the power obtained in the fourth step, all users repeat the step until the convergence condition | | | p (t) -p (t-1) | |/| | p (t-1) | < σ is met, and each user obtains the optimal transmitting power in the current state to achieve balance;
said sixth step determining an optimal price factor, τ representing the number of iterations,initializing a step length rho for a predefined threshold value of a termination algorithm, randomly assigning a price factor, and obtaining balance by utilizing an iterative process in a fifth step based on a current price factor kappa (tau)On the basis, updating iteration time to be τ ← τ +1, and updating corresponding price factor to be τ ← τ +1And broadcasting in the whole network;
7. A program storage medium for receiving user input, the stored computer program causing an electronic device to perform the steps comprising:
the method comprises the steps that firstly, the robust privacy rate of small cell users is obtained based on uncertainty analysis of channel information of eavesdroppers in each small cell;
secondly, analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
thirdly, introducing a pricing mechanism and designing an optimization model of a small cell user side;
fourthly, solving an optimization model of the small cell users to obtain a safe transmission strategy of the small cell users;
fifthly, the equilibrium state of the whole network is achieved through the iterative updating of the security strategy among the users of the small cells;
sixthly, updating the price factor based on the obtained network balance state, and broadcasting in the whole network;
and seventhly, repeating the fourth step and the sixth step based on the updated price factor until the price factor is converged, and finally, balancing the network in a final state, namely, the safe transmission scheme of all small cell users.
8. A computer program product stored on a computer readable medium, comprising a computer readable program for providing a user input interface for implementing the small cell network oriented distributed robust security resource allocation method of any one of claims 1 to 6 when executed on an electronic device.
9. A resource allocation system for implementing the distributed robust security resource allocation method for small cell networks according to any one of claims 1 to 6, wherein the resource allocation system comprises:
the robust privacy rate acquisition module is used for obtaining the robust privacy rate of the small cell users based on the uncertainty analysis of the information of the eavesdropper channel inside each small cell;
the interference analysis module is used for analyzing the interference under the worst condition based on the uncertainty of an interference channel between a small cell user and a macro user;
the optimization model design module is used for introducing a pricing mechanism and designing an optimization model of a small cell user side;
the safe transmission strategy module is used for solving the optimization model of the small cell users to obtain the safe transmission strategy of the small cell users;
the security strategy iterative updating module is used for achieving the equilibrium state of the whole network through the security strategy iterative updating among the small cell users;
the price factor updating module is used for updating the price factor based on the obtained network balance state and broadcasting the price factor in the whole network;
and the network balancing module is used for balancing the network in the final state based on the updated price factor until the price factor is converged, namely the safe transmission scheme of all small cell users.
10. A wireless terminal equipped with the resource allocation system according to claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010362941.5A CN111615111B (en) | 2020-04-30 | 2020-04-30 | Small cell network-oriented distributed robust security resource allocation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010362941.5A CN111615111B (en) | 2020-04-30 | 2020-04-30 | Small cell network-oriented distributed robust security resource allocation method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111615111A true CN111615111A (en) | 2020-09-01 |
CN111615111B CN111615111B (en) | 2023-07-25 |
Family
ID=72201185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010362941.5A Active CN111615111B (en) | 2020-04-30 | 2020-04-30 | Small cell network-oriented distributed robust security resource allocation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111615111B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113422628A (en) * | 2020-12-24 | 2021-09-21 | 西北工业大学 | Safe transmission method and terminal system based on reconfigurable intelligent surface and active interference |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106954227A (en) * | 2017-02-24 | 2017-07-14 | 南京邮电大学 | Efficiency resource allocation methods of the ultra dense set network based on interference coordination |
US20180054806A1 (en) * | 2016-08-22 | 2018-02-22 | Alcatel-Lucent Usa, Inc. | Systems and methods for decoupling control and data channels in wireless networks |
US20180124713A1 (en) * | 2016-10-27 | 2018-05-03 | Yuan Ze University | Intelligent deployment cascade control device based on an fdd-ofdma indoor small cell in multi-user and interference environments |
CN108430109A (en) * | 2018-03-02 | 2018-08-21 | 北京科技大学 | A kind of the cooperative game resource allocation method and its system of the small subzone network of cognition |
-
2020
- 2020-04-30 CN CN202010362941.5A patent/CN111615111B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180054806A1 (en) * | 2016-08-22 | 2018-02-22 | Alcatel-Lucent Usa, Inc. | Systems and methods for decoupling control and data channels in wireless networks |
US20180124713A1 (en) * | 2016-10-27 | 2018-05-03 | Yuan Ze University | Intelligent deployment cascade control device based on an fdd-ofdma indoor small cell in multi-user and interference environments |
CN106954227A (en) * | 2017-02-24 | 2017-07-14 | 南京邮电大学 | Efficiency resource allocation methods of the ultra dense set network based on interference coordination |
CN108430109A (en) * | 2018-03-02 | 2018-08-21 | 北京科技大学 | A kind of the cooperative game resource allocation method and its system of the small subzone network of cognition |
Non-Patent Citations (4)
Title |
---|
HAINING WANG: "Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm" * |
张海波;彭星萤;陈善学;: "宏-飞蜂窝双层网络中基于毫微微基站分组的资源分配" * |
徐勇军;李国权;陈前斌;林金朝;: "异构无线网络干扰效率最大顽健资源分配算法" * |
李文超: "超密集网络中基于分簇的无线网络资源分配技术研究" * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113422628A (en) * | 2020-12-24 | 2021-09-21 | 西北工业大学 | Safe transmission method and terminal system based on reconfigurable intelligent surface and active interference |
Also Published As
Publication number | Publication date |
---|---|
CN111615111B (en) | 2023-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Achievable rate maximization for cognitive hybrid satellite-terrestrial networks with AF-relays | |
Guo et al. | Robust resource allocation with imperfect channel estimation in NOMA-based heterogeneous vehicular networks | |
Sun et al. | D2D enhanced heterogeneous cellular networks with dynamic TDD | |
Kalamkar et al. | Resource allocation and fairness in wireless powered cooperative cognitive radio networks | |
Psomas et al. | Impact of directionality on interference mitigation in full-duplex cellular networks | |
Torregoza et al. | Joint power control, base station assignment, and channel assignment in cognitive femtocell networks | |
Zhang et al. | Spectrum allocation and power control in full-duplex ultra-dense heterogeneous networks | |
Pesavento et al. | Iterative dual downlink beamforming for cognitive radio networks | |
Yan et al. | Interference management in 6G space and terrestrial integrated networks: Challenges and approaches | |
Lu et al. | A cross-layer resource allocation scheme for ICIC in LTE-Advanced | |
Tayel et al. | Throughput maximization of hybrid access in multi-class cognitive radio networks with energy harvesting | |
Monemi et al. | Performance of UAV-assisted D2D networks in the finite block-length regime | |
CN114006645B (en) | Relay-assisted safe transmission method and system for cognitive unmanned aerial vehicle | |
CN114665937B (en) | Design method and device of multi-input multi-output transceiver | |
Xiao et al. | Reinforcement learning based network coding for drone-aided secure wireless communications | |
Baidas et al. | Resource allocation for SWIPT-enabled energy-harvesting downlink/uplink clustered NOMA networks | |
Bennis et al. | Inter-operator spectrum sharing from a game theoretical perspective | |
Bastami et al. | Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier UAV networks | |
Guo et al. | Outage performance of ris-assisted cognitive non-terrestrial network with noma | |
Derakhshani et al. | Learning-based opportunistic spectrum access with adaptive hopping transmission strategy | |
CN111615111B (en) | Small cell network-oriented distributed robust security resource allocation method | |
Li et al. | Sum-rate maximization for cognitive relay NOMA Systems with channel uncertainty | |
Guo et al. | Multicast communications in cognitive radio networks using directional antennas | |
Zheng et al. | Multi-antenna transmission in downlink heterogeneous cellular networks under a threshold-based mobile association policy | |
Jin et al. | Joint slot scheduling and power allocation for throughput maximization of clustered UASNs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |