CN112533197B - Artificial noise assisted physical layer security method based on interference management - Google Patents
Artificial noise assisted physical layer security method based on interference management Download PDFInfo
- Publication number
- CN112533197B CN112533197B CN202011303753.1A CN202011303753A CN112533197B CN 112533197 B CN112533197 B CN 112533197B CN 202011303753 A CN202011303753 A CN 202011303753A CN 112533197 B CN112533197 B CN 112533197B
- Authority
- CN
- China
- Prior art keywords
- user
- base station
- interference
- matrix
- artificial noise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0452—Multi-user MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03891—Spatial equalizers
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an artificial noise assisted physical layer security method based on interference management, which comprises the following steps: collecting network information in a preset number of cell broadcast communication scenes; processing the network information by using an interference alignment technology to design a beam forming matrix so as to eliminate inter-cell interference and inter-user interference of each legal user terminal; when the base station transmits the confidential data, the artificial noise is transmitted at the same time, and the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result; the base station uses the power distribution factor to serve each legal user, and simultaneously emits artificial noise to interfere the eavesdropper. The method can effectively ensure that the performance of a legal user end is not influenced by multi-user interference, and simultaneously, the eavesdropping performance of an external eavesdropper is deteriorated by utilizing artificial noise and the multi-user interference, and the safe transmission performance of a physical layer is effectively improved through a power distribution optimization scheme.
Description
Technical Field
The invention relates to the technical field of wireless communication, in particular to an artificial noise assisted physical layer security method based on interference management.
Background
The essence of physical layer security is that the random characteristics of a wireless channel and noise are utilized to generate difference between a legal channel and an eavesdropping channel in communication, and a signal processing technology is adopted to increase the difficulty of an eavesdropping party in acquiring useful information and realize the secure transmission of signals. Compared with the traditional upper-layer encryption means, the physical layer security technology mainly realizes the secure transmission of data from the perspective of information theory, does not need complex key management and distribution processes, reduces the computational complexity, and is beneficial to adapting to nodes with limited computational capability; meanwhile, the physical layer security means can effectively resist brute force cracking and perfect secrecy is realized. Therefore, as an auxiliary solution for cryptographic encryption algorithm, physical layer security technology is receiving attention from the academic community because of its perfect confidentiality from the information theory perspective.
Further, there are two branches of research in physical layer security technologies: secure transmission techniques, and key and authentication techniques. The key and authentication technology of the physical layer mainly comprises security authentication and key distribution, and the identity of the wireless terminal is identified as soon as possible in the physical layer by utilizing the random characteristic of a channel; the physical layer security transmission technology mainly adopts a signal processing technology to ensure the security transmission of data. In the physical layer security technology based on signal processing, the introduction of the multi-antenna technology can provide more spatial degrees of freedom, and make up for the defect that signals received by a legal receiving end and an illegal eavesdropping end in a single-antenna system cannot be separated in a time domain and a frequency domain, so that the system performance is further improved. With the multi-antenna technology, regardless of whether diversity or multiplexing is achieved using space-time coding, a point-to-point MIMO communication system can achieve a huge gain in channel capacity and reliability compared to a Single Input Single Output (SISO) system. For multi-User MIMO (MU-MIMO) systems, it is not just a simple extension of Single-User MIMO (SU-MIMO). This is because, in the MU-MIMO system, in order to improve spectrum efficiency, a plurality of transmitting terminals (receiving terminals) share time-frequency resources to transmit (receive) signals, and multi-user interference is unavoidable. Therefore, the multi-antenna technology needs to provide enough degrees of freedom by means of antennas to separate different signals while ensuring that diversity or multiplexing gain is achieved for each user. On the other hand, inter-user interference in a conventional multi-user network is a negative factor limiting the performance improvement of the system, but it can also serve as an additional factor in secure communication to confuse an eavesdropper.
In the current research on the safe transmission scheme aiming at the downlink multi-cell broadcast communication scene, most researches only aim at the condition that a legal receiving end is provided with a single antenna, and the safe transmission of data is realized by designing the transmitting pre-coding scheme of a base station end. However, with the increase of the requirement for the capacity of the communication system, the scene that the receiving end is provided with a plurality of antennas better meets the requirement of practical application. On the other hand, when the receiving end is provided with a plurality of antennas, the precoding matrix of the receiving end and the precoding matrix of the transmitting end are jointly designed, so that the multi-user interference is expected to be better managed, and the safety performance of the system is further enhanced.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, the invention aims to provide an artificial noise assisted physical layer security method based on interference management, which utilizes the interference management technology to improve the communication performance of legal users and transmits artificial noise to resist the eavesdropping of illegal users by reasonably distributing power, thereby realizing the communication security.
In order to achieve the above object, an embodiment of the present invention provides an artificial noise assisted physical layer security method based on interference management, including the following steps: s1, collecting network information in a preset number of cell broadcast communication scenes; step S2, processing the network information by using an interference alignment technology to design a receiving beam forming matrix at each legal user terminal and design a transmitting pre-coding matrix at a base station terminal so as to eliminate inter-cell interference ICI and inter-user interference IUI of each legal user terminal; s3, when the base station side transmits the confidential data, the artificial noise is transmitted at the same time, the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result, and the power proportion transmitted to the confidential data and the power proportion of the artificial noise are distributed according to the power distribution factor with the maximized current confidential rate; and S4, after the step S3 is completed, the base station side services each legal user by using the power proportion of the confidential data and the power proportion of the artificial noise, and simultaneously emits the artificial noise to interfere an external eavesdropper Eve.
The artificial noise assisted physical layer security method based on interference management of the embodiment of the invention improves the signal receiving intensity of a legal receiving end by utilizing the interference management technology, and realizes the interference on an unknown eavesdropper by using artificial noise; and calculating a power distribution factor between the artificial noise and confidential data by the joint design of a beam forming scheme of the transceiver and the adoption of an equal power distribution scheme, so as to realize the maximization of target confidentiality and rate and realize the maximization of the target confidentiality and rate.
In addition, the artificial noise assisted physical layer security method based on interference management according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, before step S1, it is preset that information interaction between transmitters is normal, and a sending signal is jointly processed; presetting that the legal channel state information obtained by the base station side and each legal user side is accurate and the information of the external eavesdropper Eve is unknown; the preset channel is a quasi-static Rayleigh block fading channel, each element in a channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of the legal user is n:presetting that the external eavesdropper Eve can obtain legal channel state information, wherein the noise of the external eavesdropper Eve is n e :
Further, in an embodiment of the present invention, the network information includes: the number of cells in the preset number of cell broadcast communication scenes, the number of users in each cell and the number of data streams sent to each user by the base station terminal.
Further, in an embodiment of the present invention, in the step S2, the interference is aligned to a preset subspace by designing the receive beamforming matrix using an interference alignment technique, so as to eliminate the inter-user interference IUI.
Further, in an embodiment of the present invention, in step S2, after the design of the received beamforming matrix is completed, effective channels from the base station to each legal user are aligned to the same subspace, so as to complete the design of the precoding matrix, so as to eliminate the inter-cell interference ICI.
Further, in an embodiment of the present invention, the specific process of calculating the power allocation factor with maximized current privacy rate in step S3 is as follows:
wherein t is a base station side, [ k, i]For the user, I d Representing an identity matrix with dimension d, theta is a power allocation factor for maximizing the current secret rate or a power proportion of the secret data, P is a transmission power of each base station,for base station end-to-user [ k, i ]]The effective channel matrix of (a) is,for base station end-to-user [ k, i ]]Is the conjugate transpose of the effective channel matrix of (a),the variance of the noise accepted by the user terminal;
wherein e is an external eavesdropper Eve, [ k, i ]]In order for the user to be aware of the fact,for the variance of the noise received at the Eve terminal,the representation dimension is d e The unit matrix of (1), L is the number of base stations, L is the index of each base station, K is the total number of legal users of the cell correspondingly covered by each base station, j is the index of the legal users in each cell,for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,for base station end transmitting to user [ j, l]1-theta is the power proportion of the artificial noise, d is the conjugate transpose matrix of the secret data to the effective channel matrix experienced by Eve an Is the dimension of the artificial noise matrix and,d is the number of data streams,for base station side transmission to user k, i]To the effective channel matrix experienced by Eve,is a base station endTransmitting to user [ k, i ]]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the reachable transmission rate of the base station end and the reachable transmission rate of the external eavesdropper Eve, the system confidentiality and the system confidentiality rate of the cell broadcast communication scene are obtainedThe expression of (c):
wherein, the first and the second end of the pipe are connected with each other,for the achievable transmission rate at the base station side,k is the total number of legal users of the correspondingly covered cell under each base station for the reachable transmission rate of the external eavesdropper Eve, and L is the number of the base stations;
by solving problemsAnd obtaining the optimal solution of the power distribution factor, namely the power distribution factor theta with the maximized current secret rate.
Further, in one implementation of the present invention, the method is performed by solvingAfter the first derivative, the optimal solution of the power distribution factor is solved by adopting a dichotomy.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram of an interference management based artifact assisted physical layer security method according to an embodiment of the invention;
fig. 2 is a schematic diagram of an interference channel interception model of MIMO broadcast communication according to an embodiment of the present invention;
fig. 3 is a diagram illustrating the comparison of the achievable secret rate performance of the optimal power allocation scheme of the embodiment of the present invention and the conventional average power allocation scheme (θ = 0.5).
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The proposed artificial noise aided physical layer security method based on interference management according to an embodiment of the present invention is described below with reference to the accompanying drawings.
First, to ensure that the embodiments of the present invention work properly, those skilled in the art need to make the following assumptions:
assume that 1: the information interaction among all transmitters is normal, and the transmitting signals are processed in a combined mode;
assume 2: the legal channel state information which can be obtained by the base station side and each legal user side is accurate and unknown to the information of an external eavesdropper Eve;
assume that 3: the channel is a quasi-static rayleigh block fading channel, each element in a channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of a legal user is n:
assume 4: the external eavesdropper Eve can obtain the legal channel state information, and the noise of the external eavesdropper Eve is n e :
Next, fig. 1 is a flowchart of an artificial noise assisted physical layer security method based on interference management according to an embodiment of the present invention.
As shown in fig. 1, the artificial noise aided physical layer security method based on interference management includes the following steps:
in step S1, network information in a preset number of cell broadcast communication scenarios is collected. Wherein the network information includes: the number of cells, the number of users per cell, and the number of data streams transmitted per user in a preset number of cell broadcast communication scenarios.
That is, the number of cells L and the number of users K per cell in a multi-cell broadcast communication scenario, and the number of data streams d transmitted per user. In addition, there is a need to measure channel state information of legitimate channels in a network
For example, as shown in fig. 2, consider a downlink multi-cell broadcast communication interference interception channel model, where the number of base stations is denoted as L, and the number of antennas on each base station is denoted as N t (ii) a The total number of legal users in the cell correspondingly covered by each base station is marked as K, and the number of antennas equipped for each legal user is marked as N r . Meanwhile, an external eavesdropper exists in the network, which is marked as Eve, and the number of the antennas equipped is marked as N e 。
Because the frequency reuse factor is 1, all base stations simultaneously transmit data to respective target users at the same frequency. For the kth user (denoted as user [ k, i ] of the ith cell]) In other words, it is receiving the ith base station (denoted as BS) i ) The transmitted data is simultaneously interfered by two types: one is Inter-User Interference (IUI), and since the broadcasted signal is a linear superposition of data requested by all users in the ith cell, each User is inevitably interfered by data of other users while receiving the requested data; the other is inter-cell interference(Inter-Cell Interference, ICI), which means that all users in the ith Cell receive the BS i At the same time of transmitting signals, the interference of the transmitting signals from other L-1 base stations is also avoided. For Eve, the target information is intercepted, and the interference among users and cells is also caused.
If each base station sends d data streams to corresponding legal users, BS i The transmitted signal may be represented as:
wherein s is [k,i] And V [k,i] Respectively representing the transmissions to users k, i]And corresponding precoding matrix, and satisfiesV [k,i]H V [k ,i] =I d 。
At the legitimate receiver, with user [ k, i ]]For example, the received filtered signalCan be expressed as equation (2), wherein,represents BS i With users [ k, i]The channel matrix in between is used to determine,is an additive white gaussian noise received by a legal user terminal.Represents the beamforming matrix of the receiving end and satisfies U [k,i]H U [k,i] =I d 。
Similarly, for the external eavesdropper Eve end, if the eavesdropping is transmitted to the user [ k, i]The received signal is represented by the following formula (3), wherein,is additive white gaussian noise received by a legal user terminal.
In step S2, the network information is processed by using an interference alignment technique, so as to perform a receive beamforming matrix design at each legitimate user end, and perform a transmit precoding matrix design at the base station end, so as to eliminate inter-cell interference ICI and inter-user interference IUI at each legitimate user end.
Further, in an embodiment of the present invention, in step S2, the interference is aligned to a preset subspace by designing a receive beamforming matrix using an interference alignment technique, so as to eliminate inter-user interference IUI; after the design of the received beam forming matrix is completed, effective channels between the base station end and each legal user are also aligned to the same subspace, and then the design of a precoding matrix is completed, so that inter-cell interference ICI is eliminated.
Specifically, the interference alignment technology in the embodiment of the present invention can align interference to a specific subspace by designing a beamforming matrix at a transmitting and receiving end, thereby eliminating performance degradation caused by multi-user interference to a legitimate user. To achieve interference alignment, the following three conditions need to be satisfied, where Φ L @{1,2,...,L},Φ K @{1,2,...,K}。
In the downlink multi-cell broadcast communication scenario illustrated in the above embodiment of the present invention, in order to implement formulas (4) - (6), firstly, legal users in each cell are divided into a group, and interference received by all users in the group is aligned to a specific direction. Taking the users in the ith cell as an example, the corresponding receiving beam forming matrix U is designed [k ,i] The interference of all users being aligned to a specific direction G i-1 :
Where span (-) is the subspace formed by the column vectors of a matrix, G i-1 Is a base station BS i-1 The effective interference channel to the user of the ith cell is aligned to the subspace. Thus, the slave BS i-1 The users of the ith cell are aligned to the same interference space. By equation (8), all the receive beamforming matrices satisfying the condition can be solved:
in the formula (8), F i-1 Has a dimension of KN t ×(N t +KN r ) Therefore, to ensure X i-1 Can receive d data streams at each user, with KN r -(K-1)N t D or more, i.e.
In addition, since equation (8) involves a high-dimensional matrix operation, the complex of solution is reducedThe complexity, equation (8), is reduced to K low-dimensional matrix operations, as shown in equation (10), where,represents user [ k, i]Through a receive beamforming matrixThen to the BS i-1 Effectively interfering with the channel.
To obtainFirst of all it is necessary to obtainOf (2) null spaceDue to the fact thatDimension of (A) is N t ×(N t +N r ) Thus, therefore, it isIs constantly present. In addition, due toIs N t ×N r Of dimension, thus can be obtainedThen in order to get fromTo obtain U [k,i] First, the following formula is calculated:
in equation (11), the matrix C i-1,k Andequation (12) may be iteratively calculated until all of the effective interfering channel subspaces are determined.
Thus, the receive beamforming matrix U [k,i] Can be calculated from the following formula:
then, a transmit beamforming matrix, i.e. a precoding matrix, is designed. After completing the design of the receiving beam forming matrix, the base station BS i-1 The effective channels to the legitimate users in the ith cell are already aligned to the same subspace, i.e. when designing the beamforming scheme, they can be regarded as an equivalent effective interference channel with the direction of G i-1 . Therefore, in order to satisfy the requirements in equation (5) and equation (6), the precoding matrix can be obtained from equation (14). Finally, by jointly designing a beam forming scheme of the transceiver, the ICI and IUI at each legal user end can be completely eliminated, and the performance of the legal user is effectively improved.
In addition, in order to guarantee the feasibility of the proposed interference alignment scheme, it is necessary to analyze the requirements on the relationship of the number of antennas. In the formula (14), G i Dimension of (A) is N t X d, therefore to guaranteeTo demonstrate the feasibility of the proposed interference alignment scheme and the requirements in equation (4), the following quantitative relationship must be satisfied:
N t ≥d(KL-K+1) (15)
according to the equations (9) and (15), the requirement of the designed interference alignment scheme on the number of antennas at the transceiver end is as follows:
in step S3, when the base station transmits the secret data, the artificial noise is transmitted at the same time, the power allocation factor with the maximized current secret rate is calculated according to the preset user quality of service requirement and the preset network information result, and the power proportion transmitted to the secret data and the power proportion of the artificial noise are allocated according to the power allocation factor with the maximized current secret rate. Wherein, the power allocation factor for maximizing the current secret rate is the power weight of the secret data.
That is, step S3 is an artificial noise assisted power allocation optimization process, and in order to enhance the information transmission security performance, the base station transmits artificial noise while transmitting the secret data. The base station calculates a power distribution optimization scheme aiming at the maximization of the secret rate of the current system, namely a power distribution factor theta, according to the user service quality requirement and the network information result, and redistributes the power proportion theta transmitted to secret data and the power proportion 1-theta of artificial noise.
Further, the achievable secret rate refers to the maximum value of the secret rate that the system can achieve when the proposed physical layer security scheme is adopted. In the conventional artificial noise scheme, after the interference alignment technique is adopted, the received signal of each legitimate user (taking user [ k, i ] as an example) is:
therefore, the achievable rate can be calculated by the following formula, wherein,representative base station BS i With users [ k, i]An effective channel therebetween; and is provided withFor transmission to users [ k, i ]]The covariance matrix of the signal of (a).
From equation (3), it can be seen that the signal received by Eve is interfered by ICI and IUI, and when decoding the target information, all the signals from other non-target users become interference, in which case the reachable rate can be calculated from equation (19), whereRepresentative base station BS i And Eve.
Therefore, in the conventional artificial noise scheme, the specific process of artificial noise-assisted power allocation optimization, that is, the specific process of calculating the power allocation factor θ that maximizes the current privacy rate, is as follows: the systematic secrecy and speed expression of the downlink multi-cell broadcast communication scene is as follows:
however, in the inventive noise-assisted secure transmission scheme, the base station BS i Transmitted signal x [i] The expression is as follows:
wherein s is [j,i] For sending to users [ j, i]Secret data of (the jth user in the ith cell), V [j,i] To represent delivery to users [ j, i]Precoding matrix, z and W corresponding to secret data [i] Respectively representing base stations BS i The transmitted artificial noise and the corresponding precoding matrix, and the covariance of z isW [i] The design scheme is as follows:
wherein, G i Is the direction aligned by the legal user in the i +1 th cell, U [t(t=1,...,K),s(s≠i+1)]H For a user [ t, s]The generated subspace of the receive beamforming matrix of (1) is conjugate transposed, and a value of t is t = 1.. Multidot.s, a value of K, s is s ≠ i +1, s = 1.,. Multidot.l.Is a base station BS i To the user [ t, s]The conjugate transpose of the generation subspace of the channel matrix of (1).
Thus, when the secret data transmitted by the base stations have the same power and the transmission power of each base station in the network is the same, the achievable transmission rate calculated by equation (18) can be converted into:
wherein, I d A unit matrix with dimension d is shown, P is the transmitting power of each base station end,for base station end to user [ k, i ]]The effective channel matrix of (a) is,for base station end-to-user [ k, i ]]Is the conjugate transpose of the effective channel matrix of (a),a noise variance received for the user terminal;
wherein, the first and the second end of the pipe are connected with each other,for the variance of the noise received at the Eve terminal,is dimension d e K is the total number of legal users of the cell correspondingly covered by each base station, L is the number of the base stations, L is the index of each base station, j is the index of the legal users in each cell,for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,for base station end transmitting to user [ j, l]To the effective channel matrix experienced by EveConjugate transpose matrix of d an Is the dimension of the artificial noise matrix and,a pre-coding matrix corresponding to the artificial noise,for base station side transmission to user [ k, i ]]To the effective channel matrix experienced by Eve,for base station side transmission to user k, i]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the accessible transmission rate of the base station end and the accessible transmission rate of the external eavesdropper Eve, the system secrecy and the rate of the cell broadcast communication scene are obtainedExpression (c):
wherein the content of the first and second substances,is the achievable transmission rate at the base station end,the reachable eavesdropping rate of an external eavesdropper Eve is K, the total number of legal users of a correspondingly covered cell under each base station is K, and L is the number of the base stations;
by solving problemsObtaining the optimal solution of the power distribution factor, namely the power distribution factor theta with the maximized current secret rate, wherein the optimal solution can be obtained by solvingAnd (4) after the first derivative, solving the optimal solution of the power distribution factor by adopting a dichotomy.
In step S4, after step S3 is completed, the base station uses the power specific gravity θ of the secret data and the power specific gravity 1- θ of the artificial noise to serve each legitimate user, and simultaneously, emits the artificial noise to interfere with the external eavesdropper Eve. Therefore, the maximization of target confidentiality and rate is realized, and the safe transmission performance of the physical layer is effectively improved.
In the following, different system parameters are used to compare and analyze the monte carlo simulation results of the present invention and the conventional average power allocation scheme (i.e. θ = 0.5) to verify the performance advantages of the proposed optimal power allocation scheme. The parameters in the computational simulation are shown in the following table:
the Monte Carlo simulation method comprises the steps of randomly generating small-scale fading between a legal user and an eavesdropper and between a base station, then counting the achievable secret rate obtained by respectively adopting the proposed optimal power distribution scheme and the traditional average power distribution scheme in each simulation, averaging the statistical results, and obtaining the achievable secret rate result in a simulation graph.
As shown in fig. 3, the optimal power allocation scheme is an artificial noise assisted physical layer security scheme based on interference management according to the present invention, and the average power allocation scheme is a conventional scheme with a power allocation factor θ = 0.5. As can be seen from the simulation results in fig. 3, under different parameter settings, the scheme provided by the present invention can obtain the achievable secret rate performance superior to that of the conventional power allocation scheme.
Therefore, according to the artificial noise assisted physical layer security method based on interference management provided by the embodiment of the invention, in a downlink multi-cell broadcast communication scene, the signal receiving intensity of a legal receiving end is improved by utilizing the interference management technology, the interference to an unknown eavesdropper is realized by utilizing artificial noise, the power distribution factor between the artificial noise and confidential data is calculated by adopting the joint design of a beam forming scheme of a transceiver and an equal power distribution scheme, and the maximization of target confidentiality and rate is realized.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (6)
1. An artificial noise assisted physical layer security method based on interference management is characterized by comprising the following steps:
step S1, collecting network information in a preset number of cell broadcast communication scenes;
step S2, processing the network information by using an interference alignment technology to design a receiving beam forming matrix at each legal user terminal and design a transmitting pre-coding matrix at a base station terminal so as to eliminate inter-cell interference ICI and inter-user interference IUI of each legal user terminal;
step S3, when the base station side transmits the confidential data, the artificial noise is transmitted at the same time, the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result, and the power proportion transmitted to the confidential data and the power proportion of the artificial noise are distributed according to the power distribution factor with the maximized current confidential rate, and the specific process is as follows:
wherein t is a base station terminal, [ k, i ]]For the user, I d Representing an identity matrix with dimension d, theta is a power allocation factor for maximizing the current secret rate or a power proportion of the secret data, P is a transmission power of each base station,for base station end to user [ k, i ]]The effective channel matrix of (a) is,for base station end to user [ k, i ]]By a conjugate transpose of the effective channel matrixThe matrix is a matrix of a plurality of pixels,a noise variance received for the user side;
wherein e is an external eavesdropper Eve, [ k, i ]]In order for the user to be aware of the fact,for the variance of the noise received by the Eve terminal,the representation dimension is d e The unit matrix of (1), L is the number of base stations, L is the index of each base station, K is the total number of legal users of the cell correspondingly covered by each base station, j is the index of the legal users in each cell,for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,for base station end transmitting to user [ j, l]To the conjugate transpose matrix of the effective channel matrix experienced by Eve, 1-theta is the power proportion of the artificial noise, d an Is the dimension of the artificial noise matrix,d is the number of data streams,for base station side transmission to user [ k, i ]]To the effective channel matrix experienced by Eve,for base station side transmission to user k, i]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the reachable transmission rate of the base station end and the reachable transmission rate of the external eavesdropper Eve, the system confidentiality and the system confidentiality rate of the cell broadcast communication scene are obtainedExpression (c):
wherein the content of the first and second substances,for the achievable transmission rate at the base station side,k is the total number of legal users of the correspondingly covered cell under each base station for the reachable transmission rate of the external eavesdropper Eve, and L is the number of the base stations;
by solving problemsObtaining an optimal solution of a power distribution factor, namely a power distribution factor theta with the maximized current privacy rate;
and S4, after the step S3 is completed, the base station side services each legal user by using the power proportion of the confidential data and the power proportion of the artificial noise, and simultaneously emits the artificial noise to interfere an external eavesdropper Eve.
2. The artificial noise aided physical layer security method based on interference management according to claim 1, characterized in that, before said step S1,
presetting normal information interaction among all transmitters, and carrying out combined processing on transmitted signals;
presetting that the legal channel state information obtained by the base station side and each legal user side is accurate and the information of the external eavesdropper Eve is unknown;
the preset channel is a quasi-static rayleigh block fading channel, each element in the channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of the legal user is n:
3. The artificial noise assisted physical layer security method based on interference management according to claim 1, wherein the network information comprises: the number of cells in the preset number of cell broadcast communication scenes, the number of users in each cell and the number of data streams sent to each user by the base station terminal.
4. The method of claim 1, wherein in step S2, interference is aligned to a predetermined subspace by designing the receive beamforming matrix using an interference alignment technique to eliminate the inter-user interference IUI.
5. The method as claimed in claim 1, wherein in step S2, after the design of the receive beamforming matrix is completed, the effective channels from the base station to each legitimate user are aligned to the same subspace, and then the design of the precoding matrix is completed, so as to eliminate the inter-cell interference ICI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011303753.1A CN112533197B (en) | 2020-11-19 | 2020-11-19 | Artificial noise assisted physical layer security method based on interference management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011303753.1A CN112533197B (en) | 2020-11-19 | 2020-11-19 | Artificial noise assisted physical layer security method based on interference management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112533197A CN112533197A (en) | 2021-03-19 |
CN112533197B true CN112533197B (en) | 2022-10-21 |
Family
ID=74981650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011303753.1A Active CN112533197B (en) | 2020-11-19 | 2020-11-19 | Artificial noise assisted physical layer security method based on interference management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112533197B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114337749B (en) * | 2021-11-19 | 2023-02-28 | 北京理工大学 | Cooperative MIMO (multiple input multiple output) safety precoding method for spectrum sensing network |
CN114286336B (en) * | 2021-12-30 | 2023-10-13 | 重庆邮电大学 | Multi-cell network safe transmission method based on artificial noise |
CN114786213A (en) * | 2022-04-27 | 2022-07-22 | 重庆邮电大学 | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981153A (en) * | 2019-04-11 | 2019-07-05 | 东南大学 | A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
WO2018119890A1 (en) * | 2016-12-29 | 2018-07-05 | 深圳天珑无线科技有限公司 | Cdma system physical layer security configuration method and device |
US10999000B2 (en) * | 2018-01-24 | 2021-05-04 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
CN109861783B (en) * | 2019-03-26 | 2022-04-12 | 哈尔滨工业大学 | Physical layer security method based on artificial noise power distribution |
CN110752865B (en) * | 2019-10-17 | 2023-07-25 | 江苏科技大学 | Multi-user MIMO communication confidentiality method under relay cooperative network |
-
2020
- 2020-11-19 CN CN202011303753.1A patent/CN112533197B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981153A (en) * | 2019-04-11 | 2019-07-05 | 东南大学 | A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary |
Non-Patent Citations (1)
Title |
---|
空间调制系统中的人工噪声抗窃听安全传输方案;雷维嘉等;《电子科技大学学报》;20180130(第01期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112533197A (en) | 2021-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | State of the art, taxonomy, and open issues on cognitive radio networks with NOMA | |
CN112533197B (en) | Artificial noise assisted physical layer security method based on interference management | |
Shu et al. | Artificial-noise-aided secure multicast precoding for directional modulation systems | |
Swindlehurst | Fixed SINR solutions for the MIMO wiretap channel | |
Yang et al. | Optimal transmission with artificial noise in MISOME wiretap channels | |
Xu et al. | Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding | |
Alageli et al. | SWIPT massive MIMO systems with active eavesdropping | |
Shalmashi et al. | Energy efficiency and sum rate tradeoffs for massive MIMO systems with underlaid device-to-device communications | |
Huang et al. | On the physical layer security of millimeter wave NOMA networks | |
CN111082933B (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
CN105657698B (en) | Safe transmission method based on cooperation interference in multicell network | |
Mukherjee et al. | Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels | |
Yadav et al. | A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges | |
Tang et al. | Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices | |
Choi et al. | Sum secrecy spectral efficiency maximization in downlink MU-MIMO: Colluding eavesdroppers | |
Xu et al. | Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission | |
Liu et al. | Artificial noise-assisted beamforming and power allocation for secure D2D-enabled V2V communications | |
Zeng et al. | Physical layer security for NOMA systems | |
Krunz et al. | Secure Linear Precoding in Overloaded MU-MIMO Wireless Networks | |
Zhou et al. | Securing communication via transmission of artificial noise by both sides: bipolar‐beamforming optimization | |
CN110071748B (en) | Artificial noise power distribution method of multiple-sending-single-receiving system | |
Wang et al. | Secure transmission in MISOME wiretap channels with half and full-duplex active eavesdroppers | |
Siyari et al. | Linear precoding with friendly jamming in overloaded MU-MIMO wiretap networks | |
Mabrouk et al. | Securing untrusted full-duplex relay channels in the presence of multiple external cluster-based eavesdroppers | |
Nguyen et al. | Secrecy rate maximization in a cognitive radio network with artificial noise aided for MISO multi-eves |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |