CN112153674B - Communication system power distribution method, device, terminal and readable storage medium - Google Patents

Communication system power distribution method, device, terminal and readable storage medium Download PDF

Info

Publication number
CN112153674B
CN112153674B CN202010827759.2A CN202010827759A CN112153674B CN 112153674 B CN112153674 B CN 112153674B CN 202010827759 A CN202010827759 A CN 202010827759A CN 112153674 B CN112153674 B CN 112153674B
Authority
CN
China
Prior art keywords
channel
alice
alpha
parameter
antenna
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010827759.2A
Other languages
Chinese (zh)
Other versions
CN112153674A (en
Inventor
穆鹏程
胡达瑞
王文杰
张渭乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN202010827759.2A priority Critical patent/CN112153674B/en
Publication of CN112153674A publication Critical patent/CN112153674A/en
Application granted granted Critical
Publication of CN112153674B publication Critical patent/CN112153674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • H04W28/0221Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices power availability or consumption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

A power distribution method, device, terminal and readable storage medium of communication system, the power distribution method includes obtaining channel state information, using dichotomy to divide the interval
Figure DDA0002636845760000011
In finding top(ii) a Parameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability; and then calculating the transmission power of the S parallel sub-channels according to the determined parameters, and finishing the power distribution. The invention also provides a device, a terminal and a readable storage medium for realizing the method. The invention converts the S-dimension optimization problem about parallel sub-channel power distribution into t pairsopThe one-dimensional search problem simplifies the solving process. At the solution of topThe binary method is adopted to carry out one-dimensional search, so that the formed two-layer one-dimensional search algorithm has low complexity, and the privacy interruption probability can be reduced under the condition of a given privacy rate by using the method.

Description

Communication system power distribution method, device, terminal and readable storage medium
Technical Field
The invention belongs to the field of communication, and relates to a communication system power distribution method, a communication system power distribution device, a communication system power distribution terminal and a readable storage medium.
Background
The development of wireless communication technology further enhances the effectiveness and reliability of communication, and people have paid more and more attention to the information security problem in wireless communication. Since the broadcasting characteristic of electromagnetic waves is the root of the problem of information leakage in wireless communication, one key point for enhancing the security of wireless communication is to ensure the secure transmission of information in the physical layer. In view of this, physical layer secure transmission technology, which is a powerful complement to the conventional encryption technology, has attracted extensive attention of researchers.
Most of the existing researches on the physical layer secure transmission technology are carried out based on narrowband wireless communication, and with the continuous increase of communication bandwidth, many actual wireless channels have frequency selective fading characteristics, so that it is very necessary to explore a physical layer secure transmission scheme in broadband wireless communication. Specifically, the problem of resource allocation of each parallel sub-channel in the wireless OFDM system needs to be studied, and a reasonable transmission power allocation scheme is formulated to improve the physical layer security performance of the system.
For the single antenna transceiving scenario, an article entitled "Resource Allocation for Secret Transmissions on Parallel Channels" published in IEEE International Conference on Communications "in 6 months 2014 proposed two Parallel subchannel models named CAS (uniform coding of subchannels) and CPS (independent coding of subchannels), and discussed the Resource Allocation problem of the two Parallel subchannels separately. Subsequently, "secret Transmission on Parallel Channels," Theoretical Limits and Performance of Practical Codes ", published 11 months 2014 on IEEE Transactions on Information principles and Security, VOL.9, NO.11, further investigated the resource allocation problem of two Parallel sub-channel models, CAS and CPS, by studying the problem of secret rate maximization under the constraint of secret outage probability. Considering that the definition of the above research work on the privacy interruption under the CPS Parallel sub-channel is too severe, an article published in IEEE International Conference on Communications works in 2018 and entitled "secret CPS Transmission Scheme for Slow pending individual wireless Channels with New SOP Constraint" reconsiders the privacy interruption problem under the CPS model, proposes a reasonable and practical privacy interruption probability Constraint, and further studies the privacy rate maximization problem under the privacy interruption probability Constraint on the basis, and presents a series of suboptimal solutions.
The above article focuses on the problem of maximizing the privacy rate under the privacy interruption probability constraint, and the given schemes are also complicated and cannot be effectively applied to actual communication. In fact, in the actual communication process, the secret rate is generally preset, and it is more practical to determine the power allocation scheme with the aim of minimizing the secret interruption probability.
Disclosure of Invention
The invention aims to solve the problems that the physical layer safe transmission method of the broadband wireless OFDM communication system in the prior art is complicated and is difficult to be practically applied, and provides a power distribution method, a device, a terminal and a readable storage medium of the communication system, so that the secrecy interruption probability is reduced under the condition of a given secrecy rate, the implementation is simple and efficient, and the real-time requirement of communication can be met.
In order to achieve the purpose, the invention has the following technical scheme:
a method of power allocation in a communication system, comprising the steps of:
step 1, acquiring channel state information, and utilizing dichotomy to divide intervals
Figure BDA0002636845740000021
In finding top(ii) a The channel state information comprises channel coefficients h of S parallel sub-channels between the single-antenna sender Alice and the single-antenna expected receiver Bob1,h2,…,hSAverage channel gain gamma of S parallel sub-channels between Eve and single antenna eavesdropping partyE,1E,2,…,ΓE,S
Figure BDA0002636845740000022
Wherein i is 1,2, …, S,
Figure BDA0002636845740000023
additive white gaussian noise power for the receiver Bob receiver intended for a single antenna; parameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability;
and 2, calculating the transmission power of the S parallel sub-channels according to the parameters determined in the step 1, and finishing power distribution.
Preferably, the step 1 specifically comprises the following steps:
step 1.1, presetting search precision epsilon1> 0, let tl=0,
Figure BDA0002636845740000024
Step 1.2, order
Figure BDA0002636845740000025
From tmAnd (3) calculating:
Figure BDA0002636845740000031
for solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure BDA0002636845740000032
Step 1.3, if f is more than or equal to 0, let tl=tm(ii) a Otherwise let tr=tm
Step 1.4, if | tl-tr|≤ε1End the search and order
Figure BDA0002636845740000033
Otherwise, returning to the step 1.2;
wherein epsilon1The preset search precision for t is set according to the precision requirement; t is tlAnd trRespectively representing the left end point and the right end point of the interval where t is located in the searching process; piRepresents the transmission power of the ith subchannel; rSIs a preset privacy rate.
Preferably, in step 1.2, the parameter α is in the interval by the dichotomy
Figure BDA0002636845740000034
Zhongzi (Chinese character of' ZhongziSpecifically, the calculation steps are as follows:
step 1.2.1, Preset search precision ε2Greater than 0, let alphal=0,
Figure BDA0002636845740000035
Step 1.2.2, order
Figure BDA0002636845740000036
From alphamComputing
Figure BDA0002636845740000037
For solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure BDA0002636845740000038
Step 1.2.3, if h is more than or equal to 0, making alphal=αm(ii) a Otherwise let alphar=αm
Step 1.2.4, if αlr≤ε2End the search and order
Figure BDA0002636845740000039
Otherwise, returning to the step 1.2.2;
wherein epsilon2The preset search precision is alpha, and is set according to the precision requirement;
αland alpharRespectively representing the left end point and the right end point of the interval where alpha is located in the searching process; ptRepresenting the total transmit power of Alice.
Preferably, step 2 is based on the parameter t determined in step 1opAnd calculating the parameter alpha determined in the searching process:
Figure BDA0002636845740000041
for solution without real numbers or PiIn the case of < 0, let Pi=0。
The present invention also provides a power distribution apparatus for a communication system, comprising:
the communication system comprises a single-antenna sender Alice, a single-antenna expected receiver Bob and a single-antenna eavesdropper Eve; the single-antenna sender Alice and the single-antenna expected receiver Bob form a communication pair through S parallel sub-channels;
an optimal parameter determining module of the objective function, which obtains the channel state information and uses the dichotomy to divide the interval
Figure BDA0002636845740000042
In finding topParameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability;
and the power distribution module calculates the sending power of the S parallel sub-channels according to the determined parameters.
Remember h ═ h1,h2,…,hS]And g ═ g1,g2,…,gS]Channel coefficients of Alice to Bob and Eve, respectively, where hiAnd giChannel coefficients respectively representing Alice to Bob and Eve in the ith sub-channel, i being 1,2, …, S; assuming slow fading of the wireless channel and being able to be modeled as a quasi-static rayleigh channel, hiAnd giIndependent of each other and all obey a complex Gaussian distribution with a mean value of zero, having hi~CN(0,ΓB,i),gi~CN(0,ΓE,i),i=1,2,…,S,ΓB,iAnd ΓE,iThe variance of complex Gaussian distribution, the average gain of channel, is defined
Figure BDA0002636845740000043
The additive white gaussian noise power of the receiver Bob receiver is expected for a single antenna.
The invention also provides a terminal comprising a memory, a processor and a computer program stored in said memory and executable on said processor, the processor implementing the steps of the communication system power allocation method when executing the computer program.
The invention also provides a computer readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the communication system power allocation method.
Compared with the prior art, the invention has the following beneficial effects: since the problem of minimizing the probability of privacy interruption given a privacy rate is essentially a multidimensional optimization problem, directly solving the optimization problem is time-consuming and difficult to meet the real-time requirement of communication, and the optimization problem can be quickly solved through the method and the system. The invention firstly converts the S-dimensional optimization problem related to the power distribution of the parallel sub-channels into t pairs by introducing a parameter topThe one-dimensional search problem simplifies the solving process. Secondly, at the solution topThe two-layer one-dimensional search algorithm has low complexity, and can meet the real-time requirement of communication in practical use. The power distribution scheme of the invention can reduce the probability of secret interruption under the condition of a given secret rate, thereby improving the physical layer safe transmission performance of the wireless broadband communication system.
Drawings
FIG. 1 illustrates a parallel eavesdropping channel model;
fig. 2 is a graph comparing the probability of a privacy disruption with the change of the signal-to-noise ratio using the power allocation method of the present invention and the power allocation method of the conventional wireless OFDM system (i.e., water flooding).
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Referring to fig. 1, the communication system employed in the present invention includes a single-antenna sender Alice, a single-antenna intended receiver Bob, and a single-antenna eavesdropper Eve. The single-antenna sender Alice forms a communication pair with the single-antenna intended receiver Bob through S parallel sub-channels. Remember h ═ h1,h2,…,hS]And g ═ g1,g2,…,gS]Channel coefficients of Alice to Bob and Eve, respectively, where hiAnd giThe channel coefficients of Alice to Bob and Eve in the ith sub-channel are respectively represented, where i is 1,2, …, S.
Assuming slow fading of the wireless channel and can be modeled as a quasi-static Rayleigh channel, hiAnd giIndependent of each other and all obey a complex Gaussian distribution with mean value zero, i.e. hi~CN(0,ΓB,i),gi~CN(0,ΓE,i),i=1,2,…,S。
Here r isB,iAnd ΓE,iThe variance of the complex gaussian distribution is represented, representing the average gain of the channel. Definition of
Figure BDA0002636845740000051
Figure BDA0002636845740000052
The additive white gaussian noise power of the receiver Bob receiver is expected for a single antenna.
In the communication process, Alice and Bob can acquire hiAnd gammaE,i(ii) a Total transmission power of Alice is Pt,PiIs the transmission power of the adjustable ith subchannel. If using CBAnd CERepresenting the channel capacities of the main channel (Alice to Bob) and the eavesdropping channel (Alice to Eve), respectively, the secret capacity CS=max(0,CB-CE). Since accurate state information of the eavesdropping channel cannot be obtained in practice, it needs to be taken as a random variable, at which time CSAlso becoming a random variable. When the security capacity is smaller than the preset security rate (denoted as R)S,RS≧ 0) a privacy interruption event will occur, and it is desirable in communications that the probability of privacy interruption be as small as possible.
Since the problem of minimizing the probability of privacy interruption given a privacy rate is essentially a multidimensional optimization problem, directly solving the optimization problem is time consuming and difficult to meet the real-time requirements of communication. The optimization problem can be quickly solved by utilizing the power distribution method, and the power distribution method specifically comprises the following steps:
step 1, after acquiring channel state information, utilizing dichotomy to divide into intervals
Figure BDA0002636845740000061
In finding top
The channel state information includes h and ΓE,iI ═ 1,2, …, S; said parameter topThe method comprises the following steps of taking an optimal value of a parameter t, wherein the parameter t is an objective function which is constructed by people and related to the privacy interruption probability;
and 2, calculating the sending power of the S parallel sub-channels according to the parameters determined in the step 1, and finishing the power distribution.
The specific operation steps of the step 1 are as follows:
step 1.1, presetting search precision epsilon1> 0, let tl=0,
Figure BDA0002636845740000062
Step 1.2, order
Figure BDA0002636845740000063
From tmAnd (3) calculating:
Figure BDA0002636845740000064
for solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure BDA0002636845740000065
Step 1.3, if f is more than or equal to 0, let tl=tm(ii) a Otherwise let tr=tm
Step 1.4, if tl-tr≤ε1End the search and order
Figure BDA0002636845740000066
Otherwise, returning to the step 1.2;
wherein epsilon1The preset search precision for t can be set according to the precision requirement;
tland trRespectively representing the left end point and the right end point of the interval where t is located in the searching process.
In the step 1.2, the parameter alpha can be divided into intervals by a dichotomy
Figure BDA0002636845740000067
The specific calculation steps are as follows:
step 1.2.1, Preset search precision ε2Greater than 0, let alphal=0,αr=max(γB,i-tmΓE,i);
Step 1.2.2, order
Figure BDA0002636845740000068
From alphamComputing
Figure BDA0002636845740000071
For solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure BDA0002636845740000072
1.2,3, if h is more than or equal to 0, making alphal=αm(ii) a Otherwise let alphar=αm
Step 1.2.4, if αlr≤ε2End the search and order
Figure BDA0002636845740000073
Otherwise, returning to the step 1.2.2;
wherein epsilon2The preset search precision of alpha can be set according to the precision requirement; alpha is alphalAnd alpharRespectively representing the left and right end points of the interval where alpha is located in the searching process.
The specific operation of the step 2 is as follows:
parameter t determined according to step 1opAnd calculating the parameter alpha determined in the searching process
Figure BDA0002636845740000074
For solution without real numbers or PiIn the case of < 0, let Pi=0。
Comparing the power distribution method of the invention with the power distribution method of the traditional wireless OFDM system (namely, the water injection method) through simulation, the probability of the privacy interruption (SOP) is related to the total transmission power (P) of the sendert) The situation of the change. FIG. 2 shows SOP with P under the same security rate conditiontA varying curve in which R is co-simulatedSTwo cases, 6 and 12 (unit: bit/time). In the simulation process, limiting the number S of the parallel sub-channels to 64; noise power
Figure BDA0002636845740000075
Defining a signal-to-noise ratio
Figure BDA0002636845740000076
Is additionally provided with a GammaB,i=ΓE,i1 (i-1, 2, …, S). 20000 independent channels are randomly generated for Monte Carlo simulation.
As can be seen from fig. 2, the probability of privacy interruption achieved using the power allocation method of the present invention is less than that achieved by the conventional method, regardless of whether the privacy rate is 6 or 12. Meanwhile, compared with the traditional method, the increase of the signal-to-noise ratio of the sender can obviously improve the confidentiality of the wireless OFDM communication system based on the invention. In summary, the effective role of the present invention in guaranteeing the secure transmission of the wireless communication physical layer can be verified from the theoretical analysis and simulation results of the technical solution.
The present invention also provides a power distribution apparatus for a communication system, comprising:
the communication system comprises a single-antenna sender Alice, a single-antenna expected receiver Bob and a single-antenna eavesdropper Eve; the single-antenna sender Alice and the single-antenna expected receiver Bob form a communication pair through S parallel sub-channels;
an optimal parameter determining module of the objective function, which obtains the channel state information and uses the dichotomy to divide the interval
Figure BDA0002636845740000081
In finding topParameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability;
and the power distribution module calculates the sending power of the S parallel sub-channels according to the determined parameters.
The invention also provides a terminal comprising a memory, a processor and a computer program stored in said memory and executable on said processor, the processor implementing the steps of the communication system power allocation method when executing the computer program.
The invention also provides a computer readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the communication system power allocation method.
The computer program may be divided into one or more modules/units, which are stored in the memory and executed by the processor to perform the method of the invention. The terminal can be a desktop computer, a notebook, a palm computer, a cloud server and other computing equipment, and can also be a processor and a memory.
The processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, etc. The memory can be used for storing the computer program and/or the module, and the processor can realize various functions of the device for screening the wiring relation of the characteristic values of the backplane signals by running or executing the computer program and/or the module stored in the memory and calling the data stored in the memory.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the technical solution of the present invention, and it should be understood by those skilled in the art that the technical solution can be modified and replaced by a plurality of simple modifications and replacements without departing from the spirit and principle of the present invention, and the modifications and replacements also fall within the protection scope covered by the claims.

Claims (4)

1. A method for allocating power in a communication system, comprising the steps of:
step 1, acquiring channel state information, and utilizing dichotomy to divide intervals
Figure FDA0003415854790000011
In finding top(ii) a The channel state information comprises channel coefficients h of S parallel sub-channels between the single-antenna sender Alice and the single-antenna expected receiver Bob1,h2,…,hSAverage channel gain gamma of S parallel sub-channels between Eve and single antenna eavesdropping partyE,1E,2,…,ΓE,S
Figure FDA0003415854790000012
Wherein i is 1,2, …, S,
Figure FDA0003415854790000013
additive white gaussian noise power for the receiver Bob receiver intended for a single antenna; parameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability;
the communication system comprises a single-antenna sender Alice, a single-antenna expected receiver Bob and a single-antenna eavesdropper Eve; single antennaThe sender Alice and the single-antenna expected receiver Bob form a communication pair through S parallel sub-channels; remember h ═ h1,h2,…,hS]And g ═ g1,g2,…,gS]Channel coefficients of Alice to Bob and Eve, respectively, where hiAnd giChannel coefficients of Alice to Bob and Eve in the ith sub-channel are respectively represented, where i is 1,2, …, S;
assuming slow fading of the wireless channel and can be modeled as a quasi-static Rayleigh channel, hiAnd giIndependent of each other and all obey a complex Gaussian distribution with mean value zero, i.e. hi~CN(0,ΓB,i),gi~CN(0,ΓE,i),i=1,2,…,S;
Here r isB,iAnd ΓE,iThe variance of the complex gaussian distribution, representing the average gain of the channel; definition of
Figure FDA0003415854790000014
Figure FDA0003415854790000015
Additive white gaussian noise power for the receiver Bob receiver intended for a single antenna;
in the communication process, Alice and Bob can acquire hiAnd gammaE,i(ii) a Total transmission power of Alice is Pt,PiIs the transmission power of the adjustable ith sub-channel; if using CBAnd CERepresenting the channel capacities of the main channel (Alice to Bob) and the eavesdropping channel (Alice to Eve), respectively, the secret capacity CS=max(0,CB-CE) (ii) a Since accurate state information of the eavesdropping channel cannot be obtained in practice, it needs to be taken as a random variable, at which time CSAlso becomes a random variable; when the security capacity is smaller than the preset security rate (denoted as R)S,RSMore than or equal to 0), the privacy interruption event will occur, and the smaller the privacy interruption probability is expected to be, the better the communication is;
the step 1 specifically comprises the following steps:
step 1.1, presetting search precision epsilon1> 0, let tl=0,
Figure FDA0003415854790000016
Step 1.2, order
Figure FDA0003415854790000017
From tmAnd (3) calculating:
Figure FDA0003415854790000021
for solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure FDA0003415854790000022
Step 1.3, if f is more than or equal to 0, let tl=tm(ii) a Otherwise let tr=tm
Step 1.4, if | tl-tr|≤ε1End the search and order
Figure FDA0003415854790000023
Otherwise, returning to the step 1.2;
wherein epsilon1The preset search precision for t is set according to the precision requirement; t is tlAnd trRespectively representing the left end point and the right end point of the interval where t is located in the searching process; piRepresents the transmission power of the ith subchannel; rSIs a preset secret rate;
step 1.2 parameter alpha is divided into two sections by dichotomy
Figure FDA0003415854790000024
The specific calculation steps are as follows:
step 1.2.1, Preset search precision ε2Greater than 0, let alphal=0,
Figure FDA0003415854790000025
Step 1.2.2, order
Figure FDA0003415854790000026
From alphamComputing
Figure FDA0003415854790000027
For solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure FDA0003415854790000028
Step 1.2.3, if h is more than or equal to 0, making alphal=αm(ii) a Otherwise let alphar=αm
Step 1.2.4, if | αlr|≤ε2End the search and order
Figure FDA0003415854790000029
Otherwise, returning to the step 1.2.2;
wherein epsilon2The preset search precision is alpha, and is set according to the precision requirement;
αland alpharRespectively representing the left end point and the right end point of the interval where alpha is located in the searching process; ptRepresents the total transmit power of Alice;
step 2, calculating the sending power of the S parallel sub-channels according to the parameters determined in the step 1, and finishing the power distribution;
the step 2 is based on the parameter t determined in the step 1opAnd calculating the parameter alpha determined in the searching process:
Figure FDA0003415854790000031
for solution without real numbers or PiIn the case of < 0, let Pi=0。
2. A communication system power allocation apparatus, comprising:
the communication system comprises a single-antenna sender Alice, a single-antenna expected receiver Bob and a single-antenna eavesdropper Eve; the single-antenna sender Alice and the single-antenna expected receiver Bob form a communication pair through S parallel sub-channels; in communication system, let h be [ h ]1,h2,…,hS]And g ═ g1,g2,…,gS]Channel coefficients of Alice to Bob and Eve, respectively, where hiAnd giChannel coefficients respectively representing Alice to Bob and Eve in the ith sub-channel, i being 1,2, …, S; assuming slow fading of the wireless channel and being able to be modeled as a quasi-static rayleigh channel, hiAnd giIndependent of each other and all obey a complex Gaussian distribution with a mean value of zero, having hi~CN(0,ΓB,i),gi~CN(0,ΓE,i),i=1,2,…,S,ΓB,iAnd ΓE,iThe variance of complex Gaussian distribution, the average gain of channel, is defined
Figure FDA0003415854790000032
Figure FDA0003415854790000033
Additive white gaussian noise power for the receiver Bob receiver intended for a single antenna;
in the communication process, Alice and Bob can acquire hiAnd gammaE,i(ii) a Total transmission power of Alice is Pt,PiIs the transmission power of the adjustable ith sub-channel; if using CBAnd CERepresenting the channel capacities of the main channel (Alice to Bob) and the eavesdropping channel (Alice to Eve), respectively, the secret capacity CS=max(0,CB-CE) (ii) a Since accurate state information of the eavesdropping channel cannot be obtained in practice, it needs to be regarded as followsMachine variable, at this time CSAlso becomes a random variable; when the security capacity is smaller than the preset security rate (denoted as R)S,RSMore than or equal to 0), the privacy interruption event will occur, and the smaller the privacy interruption probability is expected to be, the better the communication is;
an optimal parameter determining module of the objective function, which obtains the channel state information and uses the dichotomy to divide the interval
Figure FDA0003415854790000034
In finding topParameter topThe optimal value of the parameter t is obtained, and the parameter t is a constructed objective function related to the privacy interruption probability;
the optimal parameter determining module of the objective function specifically executes the following steps:
step 1.1, presetting search precision epsilon1> 0, let tl=0,
Figure FDA0003415854790000035
Step 1.2, order
Figure FDA0003415854790000036
From tmAnd (3) calculating:
Figure FDA0003415854790000041
for solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure FDA0003415854790000042
Step 1.3, if f is more than or equal to 0, let tl=tm(ii) a Otherwise let tr=tm
Step 1.4, if | tl-tr|≤ε1End the search and order
Figure FDA0003415854790000043
Otherwise, returning to the step 1.2;
wherein epsilon1The preset search precision for t is set according to the precision requirement; t is tlAnd trRespectively representing the left end point and the right end point of the interval where t is located in the searching process; piRepresents the transmission power of the ith subchannel; rSIs a preset secret rate;
step 1.2 parameter alpha is divided into two sections by dichotomy
Figure FDA0003415854790000044
The specific calculation steps are as follows:
step 1.2.1, Preset search precision ε2Greater than 0, let alphal=0,
Figure FDA0003415854790000045
Step 1.2.2, order
Figure FDA0003415854790000046
From alphamComputing
Figure FDA0003415854790000047
For solution without real numbers or PiIn the case of < 0, let Pi=0;
Then using the obtained Pi(i-1, 2, …, S) calculating an objective function
Figure FDA0003415854790000048
Step 1.2.3, if h is more than or equal to 0, making alphal=αm(ii) a Otherwise let alphar=αm
Step 1.2.4, if | αlr|≤ε2End the search and order
Figure FDA0003415854790000049
Otherwise, returning to the step 1.2.2;
wherein epsilon2The preset search precision is alpha, and is set according to the precision requirement;
αland alpharRespectively representing the left end point and the right end point of the interval where alpha is located in the searching process; ptRepresents the total transmit power of Alice;
the power distribution module is used for calculating the sending power of the S parallel sub-channels according to the determined parameters;
the power distribution module determines the parameter t according to the optimal parameter of the objective functionopAnd calculating the parameter alpha determined in the searching process:
Figure FDA0003415854790000051
for solution without real numbers or PiIn the case of < 0, let Pi=0。
3. A terminal comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, characterized in that: the processor, when executing the computer program, performs the steps of the communication system power allocation method of claim 1.
4. A computer-readable storage medium storing a computer program, characterized in that: the computer program when executed by a processor performs the steps of the communication system power allocation method as claimed in claim 1.
CN202010827759.2A 2020-08-17 2020-08-17 Communication system power distribution method, device, terminal and readable storage medium Active CN112153674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010827759.2A CN112153674B (en) 2020-08-17 2020-08-17 Communication system power distribution method, device, terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010827759.2A CN112153674B (en) 2020-08-17 2020-08-17 Communication system power distribution method, device, terminal and readable storage medium

Publications (2)

Publication Number Publication Date
CN112153674A CN112153674A (en) 2020-12-29
CN112153674B true CN112153674B (en) 2022-02-11

Family

ID=73888071

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010827759.2A Active CN112153674B (en) 2020-08-17 2020-08-17 Communication system power distribution method, device, terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN112153674B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130102758A (en) * 2012-03-08 2013-09-23 경희대학교 산학협력단 Method and apparatus for secrecy transmitting in wireless environment
KR101629108B1 (en) * 2014-12-29 2016-06-21 한국과학기술원 Cooperative Jammer Apparatus and Method for joint transceiver
CN106656405A (en) * 2016-10-19 2017-05-10 浙江大学 Method for minimizing system confidentiality interruption probability using energy station
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN109788479A (en) * 2019-02-27 2019-05-21 西安交通大学 A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130102758A (en) * 2012-03-08 2013-09-23 경희대학교 산학협력단 Method and apparatus for secrecy transmitting in wireless environment
KR101629108B1 (en) * 2014-12-29 2016-06-21 한국과학기술원 Cooperative Jammer Apparatus and Method for joint transceiver
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN106656405A (en) * 2016-10-19 2017-05-10 浙江大学 Method for minimizing system confidentiality interruption probability using energy station
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN109788479A (en) * 2019-02-27 2019-05-21 西安交通大学 A kind of distributed collaborative jamming power distribution method minimizing secrecy outage probability
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Minimization of Secrecy Outage Probability with Single-Antenna Uncoordinated Cooperative Jamming;Darui Hu;《IEEE》;20191231;全文 *
利用离去角度的无线传感器网络分布式节点定位方法;王文杰;《西安交通大学学报》;20101231;全文 *

Also Published As

Publication number Publication date
CN112153674A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN110492996B (en) Key generation method applied to multi-user large-scale MIMO system
CN112052086A (en) Multi-user safe energy-saving resource allocation method in mobile edge computing network
Zhang et al. Physically securing energy-based massive MIMO MAC via joint alignment of multi-user constellations and artificial noise
Zhang et al. Secure key generation from OFDM subcarriers' channel responses
CN111614419A (en) NOMA-based high-safety unloading resource allocation method for mobile edge computing network task
CN109788479B (en) Distributed cooperative interference power distribution method for minimizing privacy interruption probability
Ara et al. A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer
CN112202511A (en) Physical layer key generation method and system based on channel characteristics
CN109660553A (en) Downlink safe transmission strategy based on time reversal technology
CN106027242A (en) Wireless channel characteristic stepwise quantification method based on unitary transformation preprocessing
CN112153674B (en) Communication system power distribution method, device, terminal and readable storage medium
Wei et al. On the fundamental limits of MIMO massive multiple access channels
Ara et al. Power allocation strategies for OFDM Gaussian wiretap channels with a friendly jammer
CN112953700A (en) Method, system and storage medium for improving safe multiparty computing efficiency
CN111970696A (en) Multi-user efficient key generation method based on power distribution and beam scheduling
CN113784340B (en) Secret unloading rate optimization method and system
CN108494447B (en) Resource allocation method in physical layer security communication
Han et al. A novel physical layer key generation method based on wgan-gp adversarial autoencoder
Hu et al. A key generation scheme for wireless physical layer based on frequency hopping
CN113596826B (en) Millimeter wave physical layer key generation method and system for random beam switching
CN114584292A (en) Physical layer key generation preprocessing method based on symplectic transformation
Gao et al. A lightweight and efficient physical layer key generation mechanism for manets
CN110071748B (en) Artificial noise power distribution method of multiple-sending-single-receiving system
Chen et al. Improved channel quantization for secret key establishment in wireless systems
Zhou et al. Blockchain-Based Encryption Method for Internal and External Health Privacy Data of University Physical Education Class

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant