CN111988783B - Safe transmission method and system for uplink non-orthogonal multiple access - Google Patents
Safe transmission method and system for uplink non-orthogonal multiple access Download PDFInfo
- Publication number
- CN111988783B CN111988783B CN202010772292.6A CN202010772292A CN111988783B CN 111988783 B CN111988783 B CN 111988783B CN 202010772292 A CN202010772292 A CN 202010772292A CN 111988783 B CN111988783 B CN 111988783B
- Authority
- CN
- China
- Prior art keywords
- energy
- jammer
- friendly
- base station
- energy acquisition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention belongs to the technical field of wireless communication, and discloses a safe transmission method and system of uplink non-orthogonal multiple access. The invention considers the condition that an uplink NOMA link has an eavesdropper, and a friendly energy acquisition interference unit in the network is selected to send artificial noise to deteriorate the receiving quality of the eavesdropper, thereby ensuring the safe communication from NOMA users to a base station. According to the channel state information acquired by the network, three energy acquisition jammer selection strategies are correspondingly provided, namely a random energy acquisition jammer selection (REJS), a maximum energy acquisition jammer selection (MEJS) and an optimal energy acquisition jammer selection (OEJS). Compared with the traditional uplink NOMA transmission method without the assistance of the energy acquisition disturber, the method can obviously improve the physical layer safety performance of the NOMA system.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a safe transmission method and system of uplink non-orthogonal multiple access.
Background
In order to meet the rapidly increasing demand of mobile communication services under the condition of increasingly scarce spectrum resources, Non-Orthogonal Multiple Access (NOMA) technology is increasingly gaining attention in the industry. The NOMA technology realizes high-spectrum-efficiency transmission by bearing information of different users on the same frequency time resource, and is considered as a multiple access mode with great application prospect in the 5G and later 5G times. Among them, the power domain NOMA technology has received wide attention due to the characteristics of low implementation complexity and high compatibility. The basic idea of power domain NOMA (hereinafter referred to as NOMA) is that at a sending end, superposition coding is used for distributing power with different sizes to different user signals, and at a receiving end, a Successive Interference Cancellation (SIC) technology is used for eliminating Interference among users and detecting multi-user information.
On the other hand, the Physical Layer Security (Physical Layer Security) technology that has emerged in recent years is a supplement or replacement to the upper Layer encryption technology in order to secure information Security of wireless communication from the viewpoint of the Physical Layer. Although NOMA techniques can improve spectrum utilization, NOMA does not guarantee the security of information transmission in the presence of a malicious eavesdropper. In order to ensure the safe communications of NOMA, the documents "Enhancing the physical layer security of NOMA in large-scale networks", "Secure MISO-NOMA transmission with an specific noise", "Beamforming design and power allocation for security transmission with NOMA" utilize physical layer security techniques to improve the security performance of downstream NOMA transmissions. Specifically, the base station with multiple antennas transmits useful signals and artificial noise signals simultaneously through a beamforming technology, and the designed artificial noise signals only reduce the receiving quality of a malicious eavesdropper, so that the safety capacity of a downlink NOMA user is improved.
However, for uplink NOMA transmissions, the physical size and energy limitations of practical network nodes make it difficult to deploy multiple antennas, and therefore beamforming-based downlink NOMA transmission schemes cannot be applied to uplink NOMA transmissions of practical single-antenna nodes. Based on this, cooperative interference in physical layer security techniques can be considered as a more suitable technique to be applied in uplink NOMA transmission. Considering the energy limited characteristic of the actual cooperative node and the optimal selection problem of the external cooperative node, there is a certain difficulty in directly applying the cooperative interference technology. Therefore, the invention can be applied to the safe transmission method of the uplink NOMA physical layer of the practical system.
Disclosure of Invention
The invention aims to provide a method and a system for safe transmission of uplink non-orthogonal multiple access, which are used for solving the problems of safety and the like in uplink NOMA transmission in the prior art.
In order to realize the task, the invention adopts the following technical scheme:
a safe transmission method of uplink non-orthogonal multiple access is used for selecting a proper friendly jammer and interfering a malicious eavesdropper under the condition that the malicious eavesdropper exists, so that uplink NOMA safe transmission of a user to a base station is realized, and the steps of selecting the proper friendly jammer and interfering the malicious eavesdropper comprise:
step 1: acquiring channel state information between a base station and energy acquisition nodes and a malicious eavesdropper, and selecting one of the energy acquisition nodes as a friendly jammer according to an acquired result;
if no channel state information is acquired, randomly selecting one energy acquisition node from all energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
step 2: the friendly jammer selected in the step 1 transmits an artificial noise pseudorandom sequence to a base station and a malicious eavesdropper, wherein the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer;
and step 3: the base station detects and removes the artificial noise pseudorandom sequence, and a malicious eavesdropper receives the artificial noise pseudorandom sequence and is interfered.
Further, the randomly selected friendly jammer is represented by formula i:
wherein R isrDenotes a randomly selected friendly interferer, RjIndicating the jth energy harvestA node, rand {. denotes that each energy collection node is selected as a jammer with equal probability, Δ ═ 1, 2., N }, where N denotes the total number of energy collection nodes;
the energy collection node with the maximum transmitting power is expressed as a friendly jammer as a formula II:
wherein R isvIndicating the friendly interferer selected according to the transmit power maximum,representing energy-harvesting nodes RjTransmit power of artificial noise when acting as a jammer andEjrepresenting energy-harvesting nodes RjCollected wireless radio frequency energy andalpha represents the time distribution ratio of two stages of energy transmission and information transmission in a time frame length T, and alpha belongs to (0, 1), eta represents the energy conversion rate, and PbWhich represents the transmit power of the base station,representing base stations and RjChannel coefficients between;
the energy collection node capable of minimizing the signal-to-noise ratio of a signal received by a malicious eavesdropper is expressed as a friendly jammer in a formula III:
wherein R isoRepresenting friendly jammers, selected on the basis of a signal-to-noise ratio which minimizes the reception of a signal by a malicious eavesdropper, gammaeRepresenting the signal-to-noise ratio of the signal received by a malicious eavesdropper.
A safe transmission system of uplink non-orthogonal multiple access comprises a base station, a user, a plurality of energy acquisition nodes and a malicious eavesdropper, wherein the user executes uplink NOMA transmission information to the base station in an information transmission stage, the malicious eavesdropper attempts to intercept the information transmitted by the user in the information transmission stage, the base station comprises a main control module, and the main control module is used for acquiring channel state information between the base station and the energy acquisition nodes and between the malicious eavesdropper and selecting one of the plurality of energy acquisition nodes as a friendly jammer according to the acquired channel state information result;
the main control module selects one of the multiple energy collection nodes as the friendly jammer according to the obtained channel state information result, and the selection refers to: if no channel state information is acquired, randomly selecting one energy acquisition node from all the energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
the friendly jammer is used for transmitting an artificial noise pseudorandom sequence to the base station and a malicious eavesdropper, and the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer.
Further, the randomly selected friendly jammer is represented by formula i:
wherein R isrDenotes a randomly selected friendly interferer, RjRepresenting a jth energy collection node, rand {. denotes that each energy collection node is selected as a jammer with equal probability, wherein Δ ═ 1, 2.. multidot.n }, and N represents the total number of the energy collection nodes;
the energy collection node with the maximum transmitting power is expressed as a friendly jammer as a formula II:
wherein R isvIndicating the friendly interferer selected according to the transmit power maximum,representing energy-harvesting nodes RjTransmit power of artificial noise when acting as a jammer andEjrepresenting energy-harvesting nodes RjCollected wireless radio frequency energy andalpha represents the time distribution ratio of two stages of energy transmission and information transmission in a time frame length T, and alpha belongs to (0, 1), eta represents the energy conversion rate, and PbWhich represents the transmit power of the base station,representing base stations and RjChannel coefficients between;
the energy collection node capable of minimizing the signal-to-noise ratio of a signal received by a malicious eavesdropper is expressed as a friendly jammer in a formula III:
wherein R isoRepresenting friendly jammers, selected on the basis of a signal-to-noise ratio which minimizes the reception of a signal by a malicious eavesdropper, gammaeRepresenting the signal-to-noise ratio of the signal received by a malicious eavesdropper.
Compared with the prior art, the invention has the following technical characteristics:
(1) compared with the existing uplink non-orthogonal multiple access transmission mechanism, the invention obviously improves the physical layer safety performance of the uplink NOMA system.
(2) Due to power limitation or selfishness of nodes in the network, the interfering nodes are not willing to consume energy of the interfering nodes to transmit artificial noise to improve the safety performance of the system. The invention compensates the energy required by the interference node to transmit the artificial noise by using the energy acquisition technology, and compared with the prior art, the invention can be better applied to the actual network.
Drawings
FIG. 1 is a block diagram of a model of the proposed energy harvesting jammer selection based uplink NOMA safe transmission;
FIG. 2 is a graph comparing the probability of a safety outage for the proposed method of safe transmission of the present invention with the existing uplink NOMA transmission method without the assistance of an energy harvesting jammer under Rayleigh channel conditions;
fig. 3 is a graph comparing the safety throughput of strong users in the rayleigh channel condition by the safety transmission method proposed by the present invention and the existing uplink NOMA transmission method without the assistance of an energy collecting jammer;
fig. 4 is a graph comparing the safety throughput of the present invention with respect to weak users under rayleigh channel conditions, compared to the existing uplink NOMA transmission method without energy harvesting jammer assistance.
Detailed Description
The embodiment discloses a secure transmission method of uplink non-orthogonal multiple access, which is used for selecting a proper friendly jammer and interfering a malicious eavesdropper under the condition that the malicious eavesdropper exists, so that uplink NOMA (non-orthogonal multiple access) secure transmission of a user to a base station is realized, and for each time frame, communication is divided into an energy transmission stage and an information transmission stage. In the energy transmission stage, a base station transmits wireless radio frequency energy to a plurality of energy acquisition nodes, and the energy acquisition nodes perform energy acquisition; in the information transmission stage, a user executes uplink NOMA to transmit information to a base station, and meanwhile, one of the energy acquisition nodes transmits an artificial noise signal by using the energy acquired in the energy transmission stage to interfere a malicious eavesdropper; the method for selecting the proper friendly jammer and disturbing the malicious eavesdropper comprises the following steps:
step 1: acquiring channel state information between a base station and energy acquisition nodes and a malicious eavesdropper by utilizing a channel estimation technology, and selecting one of the energy acquisition nodes as a friendly jammer according to an acquired result;
if no channel state information is acquired, randomly selecting one energy acquisition node from all energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power (namely, the energy can be acquired from the energy transmission stage to the maximum) as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
step 2: the friendly jammer selected in the step 1 transmits an artificial noise pseudorandom sequence to a base station and a malicious eavesdropper, wherein the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer;
and step 3: a base station receives information transmitted by a user, and detects and removes an artificial noise pseudorandom sequence; the artificial noise can be matched with a channel between the base station and the energy acquisition interference device, so that the artificial noise can be detected and removed by the base station, and the receiving quality of the base station is not influenced;
a malicious eavesdropper receives interference on the artificial noise pseudorandom sequence, the signal eavesdropping quality of the eavesdropper is deteriorated, and information transmitted by a user cannot be intercepted.
Specifically, the Random Energy Harvesting Jammer Selection (REJS) strategy is to randomly select an Energy Harvesting node as a friendly Jammer, and the friendly Jammer R at this timerCan be represented by formula I:
wherein rand {. denotes that each energy collection node is selected as an interferer with equal probability, Δ ═ 1, 2., N }, where N denotes the total number of energy collection nodes;
the maximum Energy Harvesting Jammer Selection (MEJS) strategy is to select an Energy Harvesting node capable of emitting the maximum power artificial noise (i.e., capable of Harvesting the most Energy from the Energy transmission phase) as the friendly Jammer, which is the friendly Jammer R at this timevCan be represented by formula II:
whereinRepresenting energy-harvesting nodes RjTransmit power of artificial noise when acting as a jammer andEjrepresenting energy-harvesting nodes RjCollected wireless radio frequency energy andalpha represents the time distribution ratio of two stages of energy transmission and information transmission in a time frame length T and belongs to the group of (0, 1), and belongs to the group of (0, 1)]Representing the energy conversion rate, PbRepresents the transmission power of the base station and Pb>0,The representation represents a base station and RjThe value of the channel coefficient in the scheme is complex;
channel state information is required for execution of the MEJS policyWith the aid of (1), thus RvIt can also be expressed as:
the Optimal Energy Harvesting Jammer Selection (OEJS) strategy is to select an Energy Harvesting node capable of minimizing the signal-to-noise ratio of a receiving signal of a malicious eavesdropper as a friendly Jammer, namely the friendly Jammer RoCan represent formula III:
wherein, γeRepresenting the signal-to-noise ratio of a signal received by a malicious eavesdropper;
execution of the OEJS policy requires channel state informationAndwith the aid of (1), thus RoIt can also be expressed as:wherein the content of the first and second substances,representing base stations and RjThe channel coefficients of the channel between the two channels,representing the channel coefficients between the energy harvesting node and a malicious eavesdropper.
The embodiment also discloses a safe transmission system of the uplink non-orthogonal multiple access, which comprises a base station, a user, a plurality of energy acquisition nodes and a malicious eavesdropper, wherein the user executes uplink NOMA to transmit information to the base station in the information transmission stage, and the malicious eavesdropper attempts to intercept the information transmitted by the user in the information transmission stage. In the present embodiment, for each time frame, the communication is divided into an energy transmission phase and an information transmission phase; in the energy transmission stage, a base station transmits wireless radio frequency energy to a plurality of energy acquisition nodes, and the energy acquisition nodes perform energy acquisition; in the information transmission stage, a user executes uplink NOMA to transmit information to a base station, and meanwhile, one of the energy acquisition nodes transmits an artificial noise signal by using the energy acquired in the energy transmission stage to interfere a malicious eavesdropper; the method comprises the following steps that a main control module of a base station selects one of a plurality of energy collection nodes as a friendly jammer according to an energy collection jammer selection strategy and carries out interference, the energy collection nodes which are not selected as the friendly jammers are used as energy storage devices in a system and are used as alternatives of the jammers when environment changes;
the base station comprises a main control module, wherein the main control module is used for acquiring channel state information between the base station and the energy acquisition nodes and channel state information of a malicious eavesdropper, and selecting one of the energy acquisition nodes as a friendly jammer according to an acquired result;
the main control module selects one of the multiple energy collection nodes as the friendly jammer according to the obtained channel state information result, and the selection refers to: if no channel state information is acquired, randomly selecting one energy acquisition node from all the energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power (namely, the energy can be acquired from the energy transmission stage to the maximum) as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
the friendly jammer is used for transmitting an artificial noise pseudorandom sequence to the base station and a malicious eavesdropper, and the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer.
Specifically, the artificial noise pseudo-random sequence is generated according to channel information between the base station and the friendly jammer by a physical layer key generation technology.
Specifically, the malicious eavesdroppers include passive eavesdroppers and active eavesdroppers. The active eavesdropper is typically a transceiver in the network that has a lower level of trustworthiness and whose channel state information is known. The channel state information of the passive eavesdropper is unknown. There are different interferer selection strategies depending on whether the channel state information is known or not.
Specifically, the strategies of random energy collection jammer selection, maximum energy collection jammer selection, and optimal energy collection jammer selection in this embodiment are the same as those in the above embodiments.
Referring to fig. 1, a secure transmission system using uplink non-orthogonal multiple access includes a base station and M users (denoted as U ═ M ═ U {, in1,...,UM}), N energy-harvesting nodes (denoted R ═ R1,...,RN}) and a malicious eavesdropper. The communication per unit time frame is divided into two phases, respectively an energy transmission phase (occupation time α T) and an information transmission phase (occupation time (1- α) T).
In the energy transmission stage, the base station transmits wireless radio frequency energy for the energy collection nodes, namely any energy collection node RjThe upper collected energy may be expressed as:
where eta represents the energy conversion rate, PbWhich represents the transmit power of the base station,representing base stations and RjThe channel coefficients in between.
In the information transmission stage, users execute uplink NOMA transmission to a base station, in order to reduce interference between the users of NOMA and processing time delay of SIC, the users are paired randomly, each pair of users is allocated with orthogonal transmission resources, and simultaneously each pair of users executes NOMA transmission internally. Without loss of generality, assume UnAnd Um(UnChannel quality of better than Um) For a pair of NOMA users, the base station decodes U according to the uplink NOMA principlenAnd UmThe achievable signal-to-noise ratio of the signal is respectively expressed asAnd
whereinFor the transmission signal-to-noise ratio of the user, N0Power of additive white Gaussian noise, Pu(Pu>0) Which is indicative of the transmit power of the user,andrespectively representing base station and UnAnd UmThe channel coefficients in between. At the same time, due to the openness of the radio channel, an eavesdropper attempts to intercept the information transmitted by the NOMA user. In order to ensure the safe communication of the information and reduce the system overhead caused by full participation, one of the energy collection nodes is selected as a friendly jammer in the information transmission phase,
from the above analysis, it can be found that the probability P of the outage for the system user is the safe outage probability under the transmission method proposed by the present inventions,κAnd a secure throughput Ts,κRespectively as follows:
wherein, k belongs to { n, m }, EJS belongs to { REJS, MEJS, OEJS }, Rt,κRepresents UκCode rate of Rs,κRepresents UκTarget safe rate of Rt,κ-Rs,κRepresenting a redundant rate against eavesdropping,indicating base station decoding UnAnd UmThe achievable signal-to-noise ratio of the signal.
Example 1
On the basis of the above embodiment, the present embodiment discloses the following technical features:
the system parameters are set as follows: M-N-5, the average gain of the channel between nodes isRt,κ=1.5BPCU,Rs,κ=0.8BPCU,ρu10dB, α is 0.4, and η is 0.8. The simulation shows the variation curves of the user outage probability and the safety throughput with the average signal-to-noise ratio of the uplink non-orthogonal multiple access system under the rayleigh channel condition by using the existing energy-free acquisition jammer transmission method (NEJS) and by using the transmission method proposed by the present invention, as shown in fig. 2, 3 and 4, where fig. 2 is the user UκFig. 3 and 4 are strong user U, respectivelynAnd weak user UmSecure throughput simulation of (1).
As can be seen from fig. 2, the proposed method significantly reduces the probability of a safe interruption of the user transmission compared to the existing NEJS method. Meanwhile, the OEJS strategy is superior to the MEJS strategy, and the MEJS strategy is superior to the REJS strategy.
As can be seen from fig. 3 and 4, the proposed method significantly improves the secure throughput of user transmissions compared to the existing NEJS method. Meanwhile, under the condition of medium and low signal to noise ratio, the OEJS strategy is superior to the MEJS strategy, and the MEJS strategy is superior to the REJS strategy; however, at high snr, the three energy harvesting jammer selection strategies converge to the same safe throughput value. This is due to the fact that at high snr, the connection interruption of the user transmission becomes a performance bottleneck that limits the safety throughput compared to the impact caused by the safety interruption.
Claims (4)
1. A safe transmission method of uplink non-orthogonal multiple access is used for selecting a proper friendly jammer and interfering a malicious eavesdropper under the condition that the malicious eavesdropper exists, and realizing uplink NOMA safe transmission of a user to a base station, and is characterized in that the step of selecting the proper friendly jammer and interfering the malicious eavesdropper comprises the following steps:
step 1: acquiring channel state information between a base station and energy acquisition nodes and a malicious eavesdropper, and selecting one of the energy acquisition nodes as a friendly jammer according to an acquired result;
if no channel state information is acquired, randomly selecting one energy acquisition node from all energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
step 2: the friendly jammer selected in the step 1 transmits an artificial noise pseudorandom sequence to a base station and a malicious eavesdropper, wherein the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer;
and step 3: the base station detects and removes the artificial noise pseudorandom sequence, and a malicious eavesdropper receives the artificial noise pseudorandom sequence and is interfered.
2. The method of claim 1, wherein the randomly selected friendly interferer is represented by formula i:
wherein R isrDenotes a randomly selected friendly interferer, RjRepresenting a jth energy collection node, rand {. denotes that each energy collection node is selected as a jammer with equal probability, wherein Δ ═ 1, 2.. multidot.n }, and N represents the total number of the energy collection nodes;
the energy collection node with the maximum transmitting power is expressed as a friendly jammer as a formula II:
wherein R isvIndicating the friendly interferer selected according to the transmit power maximum,representing energy-harvesting nodes RjTransmit power of artificial noise when acting as a jammer andEjrepresenting energy-harvesting nodes RjCollected wireless radio frequency energy andalpha represents the time distribution ratio of two stages of energy transmission and information transmission in a time frame length T, and alpha belongs to (0, 1), eta represents the energy conversion rate, and PbWhich represents the transmit power of the base station,representing base stations and RjChannel coefficients between;
the energy collection node capable of minimizing the signal-to-noise ratio of a signal received by a malicious eavesdropper is expressed as a friendly jammer in a formula III:
wherein R isoRepresenting friendly jammers, selected on the basis of a signal-to-noise ratio which minimizes the reception of a signal by a malicious eavesdropper, gammaeRepresenting the signal-to-noise ratio of the signal received by a malicious eavesdropper.
3. A safe transmission system of uplink non-orthogonal multiple access comprises a base station, a user, a plurality of energy acquisition nodes and a malicious eavesdropper, wherein the user executes uplink NOMA transmission information to the base station in an information transmission stage, and the malicious eavesdropper attempts to intercept the information transmitted by the user in the information transmission stage;
the main control module selects one of the multiple energy collection nodes as the friendly jammer according to the obtained channel state information result, and the selection refers to: if no channel state information is acquired, randomly selecting one energy acquisition node from all the energy acquisition nodes as a friendly jammer; if the channel state information of the energy acquisition node is acquired and the channel state information of a malicious eavesdropper is not acquired, selecting the energy acquisition node with the maximum transmission power as a friendly jammer; if the channel state information of the malicious eavesdropper is obtained, selecting an energy acquisition node capable of minimizing the signal-to-noise ratio of a signal received by the malicious eavesdropper as a friendly jammer;
the friendly jammer is used for transmitting an artificial noise pseudorandom sequence to the base station and a malicious eavesdropper, and the artificial noise pseudorandom sequence is generated according to channel information between the base station and the friendly jammer.
4. The system of claim 3, wherein the randomly selected friendly interferer is represented by formula i:
wherein R isrDenotes a randomly selected friendly interferer, RjRepresents the jth energy-harvesting node, rand {. DEG } represents each energy-harvesting node to have an equal outlineThe rate is selected as the jammer, Δ ═ 1, 2.., N, where N represents the total number of energy harvesting nodes;
the energy collection node with the maximum transmitting power is expressed as a friendly jammer as a formula II:
wherein R isvIndicating the friendly interferer selected according to the transmit power maximum,representing energy-harvesting nodes RjTransmit power of artificial noise when acting as a jammer andEjrepresenting energy-harvesting nodes RjCollected wireless radio frequency energy andalpha represents the time distribution ratio of two stages of energy transmission and information transmission in a time frame length T, and alpha belongs to (0, 1), eta represents the energy conversion rate, and PbWhich represents the transmit power of the base station,representing base stations and RjChannel coefficients between;
the energy collection node capable of minimizing the signal-to-noise ratio of a signal received by a malicious eavesdropper is expressed as a friendly jammer in a formula III:
wherein R isoRepresenting friendly jammers, selected on the basis of a signal-to-noise ratio which minimizes the reception of a signal by a malicious eavesdropper, gammaeSignal-to-noise ratio representing a signal received by a malicious eavesdropperAnd (4) the ratio.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010772292.6A CN111988783B (en) | 2020-08-04 | 2020-08-04 | Safe transmission method and system for uplink non-orthogonal multiple access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010772292.6A CN111988783B (en) | 2020-08-04 | 2020-08-04 | Safe transmission method and system for uplink non-orthogonal multiple access |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111988783A CN111988783A (en) | 2020-11-24 |
CN111988783B true CN111988783B (en) | 2022-04-22 |
Family
ID=73446111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010772292.6A Active CN111988783B (en) | 2020-08-04 | 2020-08-04 | Safe transmission method and system for uplink non-orthogonal multiple access |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111988783B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112702741B (en) * | 2020-12-29 | 2023-04-18 | 中国人民解放军空军工程大学 | NOMA (non-uniform access memory) safe transmission method and system combining artificial noise and power distribution |
CN113132975B (en) * | 2021-04-22 | 2022-06-14 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
CN114024591B (en) * | 2021-10-26 | 2023-09-01 | 西安邮电大学 | Relay cooperation non-orthogonal multiple access system and information transmission method |
CN116760458B (en) * | 2023-08-21 | 2023-10-27 | 成都本原星通科技有限公司 | Satellite communication data safe transmission method based on non-orthogonal multiple access |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8886038B1 (en) * | 2011-04-29 | 2014-11-11 | Bae Systems Information And Electronic Systems Integration Inc. | Weighted waveforms for improved jam code effectiveness |
CN105873037A (en) * | 2016-06-01 | 2016-08-17 | 北京邮电大学 | Eavesdropping preventing method and device |
CN106257850A (en) * | 2015-06-17 | 2016-12-28 | 凯瑟雷恩工厂两合公司 | For producing the method and system of interference signal |
CN108631938A (en) * | 2017-03-24 | 2018-10-09 | 北京三星通信技术研究有限公司 | A kind of method, transmitter and the receiver of multiple access access |
CN108880734A (en) * | 2018-04-28 | 2018-11-23 | 哈尔滨工程大学 | The CCFD-Massive mimo system power distribution method of quantum backtracking chess game optimization |
CN110235384A (en) * | 2017-01-06 | 2019-09-13 | 天工方案公司 | The beam forming of harmonic wave |
-
2020
- 2020-08-04 CN CN202010772292.6A patent/CN111988783B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8886038B1 (en) * | 2011-04-29 | 2014-11-11 | Bae Systems Information And Electronic Systems Integration Inc. | Weighted waveforms for improved jam code effectiveness |
CN106257850A (en) * | 2015-06-17 | 2016-12-28 | 凯瑟雷恩工厂两合公司 | For producing the method and system of interference signal |
CN105873037A (en) * | 2016-06-01 | 2016-08-17 | 北京邮电大学 | Eavesdropping preventing method and device |
CN110235384A (en) * | 2017-01-06 | 2019-09-13 | 天工方案公司 | The beam forming of harmonic wave |
CN108631938A (en) * | 2017-03-24 | 2018-10-09 | 北京三星通信技术研究有限公司 | A kind of method, transmitter and the receiver of multiple access access |
CN108880734A (en) * | 2018-04-28 | 2018-11-23 | 哈尔滨工程大学 | The CCFD-Massive mimo system power distribution method of quantum backtracking chess game optimization |
Non-Patent Citations (2)
Title |
---|
Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks;Kunrui Cao;《IEEE Wireless Communications Letters》;20190430;全文 * |
基于无线能量获取的双向中继系统性能研究;曹堃锐等;《南京邮电大学学报(自然科学版)》;20161102;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111988783A (en) | 2020-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111988783B (en) | Safe transmission method and system for uplink non-orthogonal multiple access | |
CN104883741B (en) | A kind of resource allocation algorithm of cognitive radio networks | |
CN111245498A (en) | Relay-assisted non-orthogonal multiple access cooperative network secure communication method | |
Xue et al. | Multiple access and data reconstruction in wireless sensor networks based on compressed sensing | |
CN112702741B (en) | NOMA (non-uniform access memory) safe transmission method and system combining artificial noise and power distribution | |
CN113923787B (en) | User self-adaptive access method and device for realizing large-scale URLLC | |
Kaynia et al. | Performance of ALOHA and CSMA in spatially distributed wireless networks | |
CN110601789A (en) | Wireless energy-carrying secret communication method based on multi-user scheduling and interference selection | |
CN111885732A (en) | Dynamic resource allocation method for enhancing NOMA visible light communication network security | |
Cheng et al. | Joint user pairing and subchannel allocation for multisubchannel multiuser nonorthogonal multiple access systems | |
CN113644933B (en) | Adaptive direct sequence spread spectrum communication method, system and medium | |
Mahmood et al. | A new hybrid CDMA–NOMA scheme with power allocation and user clustering for capacity improvement | |
CN111786918B (en) | Energy acquisition interference unit assisted cooperative non-orthogonal multiple access secure transmission method | |
WO2009097805A1 (en) | A method, system and device for broadband radio mobile communication | |
Zhou et al. | An OFDM based MAC protocol for underwater acoustic networks | |
KR101977882B1 (en) | Apparatus and method for opportunistic random access in multi random access environments | |
CN112492678B (en) | NOMA downlink safety transmission method based on short packet communication | |
Seetharaman et al. | Analysis of power allocation for non-orthogonal multiple access | |
Alshammary et al. | A review of recent developments in NOMA & SCMA schemes for 5G technology | |
KULKARNI et al. | NOMA MULTIUSER DETECTION WITH MIMO FOR MAXIMIZING THE SYSTEM CAPACITY AND ELIMINATE INTERFERENCE | |
Evans et al. | A new architecture for application-aware cognitive multihop wireless networks | |
Agoni et al. | Capacity analysis of FBMC over OFDM in cognitive radio systems | |
CN112689290B (en) | Communication system, control device, storage medium, and resource allocation method | |
Zhong et al. | Maximizing downlink non-Orthogonal multiple access system capacity by a hybrid user pairing strategy | |
Li et al. | Distributed resource allocation for cognitive radio network with imperfect spectrum sensing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |