CN112533197B - Artificial noise assisted physical layer security method based on interference management - Google Patents

Artificial noise assisted physical layer security method based on interference management Download PDF

Info

Publication number
CN112533197B
CN112533197B CN202011303753.1A CN202011303753A CN112533197B CN 112533197 B CN112533197 B CN 112533197B CN 202011303753 A CN202011303753 A CN 202011303753A CN 112533197 B CN112533197 B CN 112533197B
Authority
CN
China
Prior art keywords
user
base station
interference
matrix
artificial noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011303753.1A
Other languages
Chinese (zh)
Other versions
CN112533197A (en
Inventor
韩帅
夏慧云
焦利彬
索宏泽
周晓康
孟维晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN202011303753.1A priority Critical patent/CN112533197B/en
Publication of CN112533197A publication Critical patent/CN112533197A/en
Application granted granted Critical
Publication of CN112533197B publication Critical patent/CN112533197B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0452Multi-user MIMO systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03891Spatial equalizers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an artificial noise assisted physical layer security method based on interference management, which comprises the following steps: collecting network information in a preset number of cell broadcast communication scenes; processing the network information by using an interference alignment technology to design a beam forming matrix so as to eliminate inter-cell interference and inter-user interference of each legal user terminal; when the base station transmits the confidential data, the artificial noise is transmitted at the same time, and the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result; the base station uses the power distribution factor to serve each legal user, and simultaneously emits artificial noise to interfere the eavesdropper. The method can effectively ensure that the performance of a legal user end is not influenced by multi-user interference, and simultaneously, the eavesdropping performance of an external eavesdropper is deteriorated by utilizing artificial noise and the multi-user interference, and the safe transmission performance of a physical layer is effectively improved through a power distribution optimization scheme.

Description

Artificial noise assisted physical layer security method based on interference management
Technical Field
The invention relates to the technical field of wireless communication, in particular to an artificial noise assisted physical layer security method based on interference management.
Background
The essence of physical layer security is that the random characteristics of a wireless channel and noise are utilized to generate difference between a legal channel and an eavesdropping channel in communication, and a signal processing technology is adopted to increase the difficulty of an eavesdropping party in acquiring useful information and realize the secure transmission of signals. Compared with the traditional upper-layer encryption means, the physical layer security technology mainly realizes the secure transmission of data from the perspective of information theory, does not need complex key management and distribution processes, reduces the computational complexity, and is beneficial to adapting to nodes with limited computational capability; meanwhile, the physical layer security means can effectively resist brute force cracking and perfect secrecy is realized. Therefore, as an auxiliary solution for cryptographic encryption algorithm, physical layer security technology is receiving attention from the academic community because of its perfect confidentiality from the information theory perspective.
Further, there are two branches of research in physical layer security technologies: secure transmission techniques, and key and authentication techniques. The key and authentication technology of the physical layer mainly comprises security authentication and key distribution, and the identity of the wireless terminal is identified as soon as possible in the physical layer by utilizing the random characteristic of a channel; the physical layer security transmission technology mainly adopts a signal processing technology to ensure the security transmission of data. In the physical layer security technology based on signal processing, the introduction of the multi-antenna technology can provide more spatial degrees of freedom, and make up for the defect that signals received by a legal receiving end and an illegal eavesdropping end in a single-antenna system cannot be separated in a time domain and a frequency domain, so that the system performance is further improved. With the multi-antenna technology, regardless of whether diversity or multiplexing is achieved using space-time coding, a point-to-point MIMO communication system can achieve a huge gain in channel capacity and reliability compared to a Single Input Single Output (SISO) system. For multi-User MIMO (MU-MIMO) systems, it is not just a simple extension of Single-User MIMO (SU-MIMO). This is because, in the MU-MIMO system, in order to improve spectrum efficiency, a plurality of transmitting terminals (receiving terminals) share time-frequency resources to transmit (receive) signals, and multi-user interference is unavoidable. Therefore, the multi-antenna technology needs to provide enough degrees of freedom by means of antennas to separate different signals while ensuring that diversity or multiplexing gain is achieved for each user. On the other hand, inter-user interference in a conventional multi-user network is a negative factor limiting the performance improvement of the system, but it can also serve as an additional factor in secure communication to confuse an eavesdropper.
In the current research on the safe transmission scheme aiming at the downlink multi-cell broadcast communication scene, most researches only aim at the condition that a legal receiving end is provided with a single antenna, and the safe transmission of data is realized by designing the transmitting pre-coding scheme of a base station end. However, with the increase of the requirement for the capacity of the communication system, the scene that the receiving end is provided with a plurality of antennas better meets the requirement of practical application. On the other hand, when the receiving end is provided with a plurality of antennas, the precoding matrix of the receiving end and the precoding matrix of the transmitting end are jointly designed, so that the multi-user interference is expected to be better managed, and the safety performance of the system is further enhanced.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, the invention aims to provide an artificial noise assisted physical layer security method based on interference management, which utilizes the interference management technology to improve the communication performance of legal users and transmits artificial noise to resist the eavesdropping of illegal users by reasonably distributing power, thereby realizing the communication security.
In order to achieve the above object, an embodiment of the present invention provides an artificial noise assisted physical layer security method based on interference management, including the following steps: s1, collecting network information in a preset number of cell broadcast communication scenes; step S2, processing the network information by using an interference alignment technology to design a receiving beam forming matrix at each legal user terminal and design a transmitting pre-coding matrix at a base station terminal so as to eliminate inter-cell interference ICI and inter-user interference IUI of each legal user terminal; s3, when the base station side transmits the confidential data, the artificial noise is transmitted at the same time, the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result, and the power proportion transmitted to the confidential data and the power proportion of the artificial noise are distributed according to the power distribution factor with the maximized current confidential rate; and S4, after the step S3 is completed, the base station side services each legal user by using the power proportion of the confidential data and the power proportion of the artificial noise, and simultaneously emits the artificial noise to interfere an external eavesdropper Eve.
The artificial noise assisted physical layer security method based on interference management of the embodiment of the invention improves the signal receiving intensity of a legal receiving end by utilizing the interference management technology, and realizes the interference on an unknown eavesdropper by using artificial noise; and calculating a power distribution factor between the artificial noise and confidential data by the joint design of a beam forming scheme of the transceiver and the adoption of an equal power distribution scheme, so as to realize the maximization of target confidentiality and rate and realize the maximization of the target confidentiality and rate.
In addition, the artificial noise assisted physical layer security method based on interference management according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, before step S1, it is preset that information interaction between transmitters is normal, and a sending signal is jointly processed; presetting that the legal channel state information obtained by the base station side and each legal user side is accurate and the information of the external eavesdropper Eve is unknown; the preset channel is a quasi-static Rayleigh block fading channel, each element in a channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of the legal user is n:
Figure GDA0002850366300000021
presetting that the external eavesdropper Eve can obtain legal channel state information, wherein the noise of the external eavesdropper Eve is n e :
Figure GDA0002850366300000022
Further, in an embodiment of the present invention, the network information includes: the number of cells in the preset number of cell broadcast communication scenes, the number of users in each cell and the number of data streams sent to each user by the base station terminal.
Further, in an embodiment of the present invention, in the step S2, the interference is aligned to a preset subspace by designing the receive beamforming matrix using an interference alignment technique, so as to eliminate the inter-user interference IUI.
Further, in an embodiment of the present invention, in step S2, after the design of the received beamforming matrix is completed, effective channels from the base station to each legal user are aligned to the same subspace, so as to complete the design of the precoding matrix, so as to eliminate the inter-cell interference ICI.
Further, in an embodiment of the present invention, the specific process of calculating the power allocation factor with maximized current privacy rate in step S3 is as follows:
setting up the achievable transmission rate of the base station end
Figure GDA0002850366300000023
Comprises the following steps:
Figure GDA0002850366300000031
wherein t is a base station side, [ k, i]For the user, I d Representing an identity matrix with dimension d, theta is a power allocation factor for maximizing the current secret rate or a power proportion of the secret data, P is a transmission power of each base station,
Figure GDA0002850366300000032
for base station end-to-user [ k, i ]]The effective channel matrix of (a) is,
Figure GDA0002850366300000033
for base station end-to-user [ k, i ]]Is the conjugate transpose of the effective channel matrix of (a),
Figure GDA0002850366300000034
the variance of the noise accepted by the user terminal;
setting the external eavesdropperAchievable Transmission Rate for Eve
Figure GDA0002850366300000035
Comprises the following steps:
Figure GDA0002850366300000036
wherein e is an external eavesdropper Eve, [ k, i ]]In order for the user to be aware of the fact,
Figure GDA0002850366300000037
for the variance of the noise received at the Eve terminal,
Figure GDA0002850366300000038
the representation dimension is d e The unit matrix of (1), L is the number of base stations, L is the index of each base station, K is the total number of legal users of the cell correspondingly covered by each base station, j is the index of the legal users in each cell,
Figure GDA0002850366300000039
for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,
Figure GDA00028503663000000310
for base station end transmitting to user [ j, l]1-theta is the power proportion of the artificial noise, d is the conjugate transpose matrix of the secret data to the effective channel matrix experienced by Eve an Is the dimension of the artificial noise matrix and,
Figure GDA00028503663000000311
d is the number of data streams,
Figure GDA00028503663000000312
for base station side transmission to user k, i]To the effective channel matrix experienced by Eve,
Figure GDA00028503663000000313
is a base station endTransmitting to user [ k, i ]]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the reachable transmission rate of the base station end and the reachable transmission rate of the external eavesdropper Eve, the system confidentiality and the system confidentiality rate of the cell broadcast communication scene are obtained
Figure GDA00028503663000000314
The expression of (c):
Figure GDA00028503663000000315
wherein, the first and the second end of the pipe are connected with each other,
Figure GDA00028503663000000316
for the achievable transmission rate at the base station side,
Figure GDA00028503663000000317
k is the total number of legal users of the correspondingly covered cell under each base station for the reachable transmission rate of the external eavesdropper Eve, and L is the number of the base stations;
by solving problems
Figure GDA00028503663000000318
And obtaining the optimal solution of the power distribution factor, namely the power distribution factor theta with the maximized current secret rate.
Further, in one implementation of the present invention, the method is performed by solving
Figure GDA00028503663000000319
After the first derivative, the optimal solution of the power distribution factor is solved by adopting a dichotomy.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram of an interference management based artifact assisted physical layer security method according to an embodiment of the invention;
fig. 2 is a schematic diagram of an interference channel interception model of MIMO broadcast communication according to an embodiment of the present invention;
fig. 3 is a diagram illustrating the comparison of the achievable secret rate performance of the optimal power allocation scheme of the embodiment of the present invention and the conventional average power allocation scheme (θ = 0.5).
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The proposed artificial noise aided physical layer security method based on interference management according to an embodiment of the present invention is described below with reference to the accompanying drawings.
First, to ensure that the embodiments of the present invention work properly, those skilled in the art need to make the following assumptions:
assume that 1: the information interaction among all transmitters is normal, and the transmitting signals are processed in a combined mode;
assume 2: the legal channel state information which can be obtained by the base station side and each legal user side is accurate and unknown to the information of an external eavesdropper Eve;
assume that 3: the channel is a quasi-static rayleigh block fading channel, each element in a channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of a legal user is n:
Figure GDA0002850366300000041
assume 4: the external eavesdropper Eve can obtain the legal channel state information, and the noise of the external eavesdropper Eve is n e :
Figure GDA0002850366300000042
Next, fig. 1 is a flowchart of an artificial noise assisted physical layer security method based on interference management according to an embodiment of the present invention.
As shown in fig. 1, the artificial noise aided physical layer security method based on interference management includes the following steps:
in step S1, network information in a preset number of cell broadcast communication scenarios is collected. Wherein the network information includes: the number of cells, the number of users per cell, and the number of data streams transmitted per user in a preset number of cell broadcast communication scenarios.
That is, the number of cells L and the number of users K per cell in a multi-cell broadcast communication scenario, and the number of data streams d transmitted per user. In addition, there is a need to measure channel state information of legitimate channels in a network
Figure GDA0002850366300000043
For example, as shown in fig. 2, consider a downlink multi-cell broadcast communication interference interception channel model, where the number of base stations is denoted as L, and the number of antennas on each base station is denoted as N t (ii) a The total number of legal users in the cell correspondingly covered by each base station is marked as K, and the number of antennas equipped for each legal user is marked as N r . Meanwhile, an external eavesdropper exists in the network, which is marked as Eve, and the number of the antennas equipped is marked as N e
Because the frequency reuse factor is 1, all base stations simultaneously transmit data to respective target users at the same frequency. For the kth user (denoted as user [ k, i ] of the ith cell]) In other words, it is receiving the ith base station (denoted as BS) i ) The transmitted data is simultaneously interfered by two types: one is Inter-User Interference (IUI), and since the broadcasted signal is a linear superposition of data requested by all users in the ith cell, each User is inevitably interfered by data of other users while receiving the requested data; the other is inter-cell interference(Inter-Cell Interference, ICI), which means that all users in the ith Cell receive the BS i At the same time of transmitting signals, the interference of the transmitting signals from other L-1 base stations is also avoided. For Eve, the target information is intercepted, and the interference among users and cells is also caused.
If each base station sends d data streams to corresponding legal users, BS i The transmitted signal may be represented as:
Figure GDA0002850366300000051
wherein s is [k,i] And V [k,i] Respectively representing the transmissions to users k, i]And corresponding precoding matrix, and satisfies
Figure GDA0002850366300000052
V [k,i]H V [k ,i] =I d
At the legitimate receiver, with user [ k, i ]]For example, the received filtered signal
Figure GDA0002850366300000053
Can be expressed as equation (2), wherein,
Figure GDA0002850366300000054
represents BS i With users [ k, i]The channel matrix in between is used to determine,
Figure GDA0002850366300000055
is an additive white gaussian noise received by a legal user terminal.
Figure GDA0002850366300000056
Represents the beamforming matrix of the receiving end and satisfies U [k,i]H U [k,i] =I d
Figure GDA0002850366300000057
Similarly, for the external eavesdropper Eve end, if the eavesdropping is transmitted to the user [ k, i]The received signal is represented by the following formula (3), wherein,
Figure GDA0002850366300000058
is additive white gaussian noise received by a legal user terminal.
Figure GDA0002850366300000059
In step S2, the network information is processed by using an interference alignment technique, so as to perform a receive beamforming matrix design at each legitimate user end, and perform a transmit precoding matrix design at the base station end, so as to eliminate inter-cell interference ICI and inter-user interference IUI at each legitimate user end.
Further, in an embodiment of the present invention, in step S2, the interference is aligned to a preset subspace by designing a receive beamforming matrix using an interference alignment technique, so as to eliminate inter-user interference IUI; after the design of the received beam forming matrix is completed, effective channels between the base station end and each legal user are also aligned to the same subspace, and then the design of a precoding matrix is completed, so that inter-cell interference ICI is eliminated.
Specifically, the interference alignment technology in the embodiment of the present invention can align interference to a specific subspace by designing a beamforming matrix at a transmitting and receiving end, thereby eliminating performance degradation caused by multi-user interference to a legitimate user. To achieve interference alignment, the following three conditions need to be satisfied, where Φ L @{1,2,...,L},Φ K @{1,2,...,K}。
Figure GDA0002850366300000061
Figure GDA0002850366300000062
Figure GDA0002850366300000063
In the downlink multi-cell broadcast communication scenario illustrated in the above embodiment of the present invention, in order to implement formulas (4) - (6), firstly, legal users in each cell are divided into a group, and interference received by all users in the group is aligned to a specific direction. Taking the users in the ith cell as an example, the corresponding receiving beam forming matrix U is designed [k ,i] The interference of all users being aligned to a specific direction G i-1
Figure GDA0002850366300000064
Where span (-) is the subspace formed by the column vectors of a matrix, G i-1 Is a base station BS i-1 The effective interference channel to the user of the ith cell is aligned to the subspace. Thus, the slave BS i-1 The users of the ith cell are aligned to the same interference space. By equation (8), all the receive beamforming matrices satisfying the condition can be solved:
Figure GDA0002850366300000065
in the formula (8), F i-1 Has a dimension of KN t ×(N t +KN r ) Therefore, to ensure X i-1 Can receive d data streams at each user, with KN r -(K-1)N t D or more, i.e.
Figure GDA0002850366300000066
In addition, since equation (8) involves a high-dimensional matrix operation, the complex of solution is reducedThe complexity, equation (8), is reduced to K low-dimensional matrix operations, as shown in equation (10), where,
Figure GDA0002850366300000067
represents user [ k, i]Through a receive beamforming matrix
Figure GDA0002850366300000068
Then to the BS i-1 Effectively interfering with the channel.
Figure GDA0002850366300000071
To obtain
Figure GDA0002850366300000072
First of all it is necessary to obtain
Figure GDA0002850366300000073
Of (2) null space
Figure GDA0002850366300000074
Due to the fact that
Figure GDA0002850366300000075
Dimension of (A) is N t ×(N t +N r ) Thus, therefore, it is
Figure GDA0002850366300000076
Is constantly present. In addition, due to
Figure GDA0002850366300000077
Is N t ×N r Of dimension, thus can be obtained
Figure GDA0002850366300000078
Then in order to get from
Figure GDA0002850366300000079
To obtain U [k,i] First, the following formula is calculated:
Figure GDA00028503663000000710
in equation (11), the matrix C i-1,k And
Figure GDA00028503663000000711
equation (12) may be iteratively calculated until all of the effective interfering channel subspaces are determined.
Figure GDA00028503663000000712
Thus, the receive beamforming matrix U [k,i] Can be calculated from the following formula:
Figure GDA00028503663000000713
then, a transmit beamforming matrix, i.e. a precoding matrix, is designed. After completing the design of the receiving beam forming matrix, the base station BS i-1 The effective channels to the legitimate users in the ith cell are already aligned to the same subspace, i.e. when designing the beamforming scheme, they can be regarded as an equivalent effective interference channel with the direction of G i-1 . Therefore, in order to satisfy the requirements in equation (5) and equation (6), the precoding matrix can be obtained from equation (14). Finally, by jointly designing a beam forming scheme of the transceiver, the ICI and IUI at each legal user end can be completely eliminated, and the performance of the legal user is effectively improved.
Figure GDA00028503663000000714
In addition, in order to guarantee the feasibility of the proposed interference alignment scheme, it is necessary to analyze the requirements on the relationship of the number of antennas. In the formula (14), G i Dimension of (A) is N t X d, therefore to guaranteeTo demonstrate the feasibility of the proposed interference alignment scheme and the requirements in equation (4), the following quantitative relationship must be satisfied:
N t ≥d(KL-K+1) (15)
according to the equations (9) and (15), the requirement of the designed interference alignment scheme on the number of antennas at the transceiver end is as follows:
Figure GDA00028503663000000715
in step S3, when the base station transmits the secret data, the artificial noise is transmitted at the same time, the power allocation factor with the maximized current secret rate is calculated according to the preset user quality of service requirement and the preset network information result, and the power proportion transmitted to the secret data and the power proportion of the artificial noise are allocated according to the power allocation factor with the maximized current secret rate. Wherein, the power allocation factor for maximizing the current secret rate is the power weight of the secret data.
That is, step S3 is an artificial noise assisted power allocation optimization process, and in order to enhance the information transmission security performance, the base station transmits artificial noise while transmitting the secret data. The base station calculates a power distribution optimization scheme aiming at the maximization of the secret rate of the current system, namely a power distribution factor theta, according to the user service quality requirement and the network information result, and redistributes the power proportion theta transmitted to secret data and the power proportion 1-theta of artificial noise.
Further, the achievable secret rate refers to the maximum value of the secret rate that the system can achieve when the proposed physical layer security scheme is adopted. In the conventional artificial noise scheme, after the interference alignment technique is adopted, the received signal of each legitimate user (taking user [ k, i ] as an example) is:
Figure GDA0002850366300000081
therefore, the achievable rate can be calculated by the following formula, wherein,
Figure GDA0002850366300000082
representative base station BS i With users [ k, i]An effective channel therebetween; and is provided with
Figure GDA0002850366300000083
For transmission to users [ k, i ]]The covariance matrix of the signal of (a).
Figure GDA0002850366300000084
From equation (3), it can be seen that the signal received by Eve is interfered by ICI and IUI, and when decoding the target information, all the signals from other non-target users become interference, in which case the reachable rate can be calculated from equation (19), where
Figure GDA0002850366300000085
Representative base station BS i And Eve.
Figure GDA0002850366300000086
Figure GDA0002850366300000087
Therefore, in the conventional artificial noise scheme, the specific process of artificial noise-assisted power allocation optimization, that is, the specific process of calculating the power allocation factor θ that maximizes the current privacy rate, is as follows: the systematic secrecy and speed expression of the downlink multi-cell broadcast communication scene is as follows:
Figure GDA0002850366300000088
however, in the inventive noise-assisted secure transmission scheme, the base station BS i Transmitted signal x [i] The expression is as follows:
Figure GDA0002850366300000089
wherein s is [j,i] For sending to users [ j, i]Secret data of (the jth user in the ith cell), V [j,i] To represent delivery to users [ j, i]Precoding matrix, z and W corresponding to secret data [i] Respectively representing base stations BS i The transmitted artificial noise and the corresponding precoding matrix, and the covariance of z is
Figure GDA00028503663000000810
W [i] The design scheme is as follows:
Figure GDA0002850366300000091
wherein, G i Is the direction aligned by the legal user in the i +1 th cell, U [t(t=1,...,K),s(s≠i+1)]H For a user [ t, s]The generated subspace of the receive beamforming matrix of (1) is conjugate transposed, and a value of t is t = 1.. Multidot.s, a value of K, s is s ≠ i +1, s = 1.,. Multidot.l.
Figure GDA0002850366300000092
Is a base station BS i To the user [ t, s]The conjugate transpose of the generation subspace of the channel matrix of (1).
Thus, when the secret data transmitted by the base stations have the same power and the transmission power of each base station in the network is the same, the achievable transmission rate calculated by equation (18) can be converted into:
reachable transmission rate of base station end
Figure GDA0002850366300000093
Comprises the following steps:
Figure GDA0002850366300000094
wherein, I d A unit matrix with dimension d is shown, P is the transmitting power of each base station end,
Figure GDA0002850366300000095
for base station end to user [ k, i ]]The effective channel matrix of (a) is,
Figure GDA0002850366300000096
for base station end-to-user [ k, i ]]Is the conjugate transpose of the effective channel matrix of (a),
Figure GDA0002850366300000097
a noise variance received for the user terminal;
similarly, the reachable rate of Eve end obtained by the formula (19)
Figure GDA0002850366300000098
Can be converted into:
Figure GDA0002850366300000099
wherein, the first and the second end of the pipe are connected with each other,
Figure GDA00028503663000000910
for the variance of the noise received at the Eve terminal,
Figure GDA00028503663000000911
is dimension d e K is the total number of legal users of the cell correspondingly covered by each base station, L is the number of the base stations, L is the index of each base station, j is the index of the legal users in each cell,
Figure GDA00028503663000000912
for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,
Figure GDA00028503663000000913
for base station end transmitting to user [ j, l]To the effective channel matrix experienced by EveConjugate transpose matrix of d an Is the dimension of the artificial noise matrix and,
Figure GDA00028503663000000914
a pre-coding matrix corresponding to the artificial noise,
Figure GDA00028503663000000915
for base station side transmission to user [ k, i ]]To the effective channel matrix experienced by Eve,
Figure GDA00028503663000000916
for base station side transmission to user k, i]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the accessible transmission rate of the base station end and the accessible transmission rate of the external eavesdropper Eve, the system secrecy and the rate of the cell broadcast communication scene are obtained
Figure GDA00028503663000000917
Expression (c):
Figure GDA0002850366300000101
wherein the content of the first and second substances,
Figure GDA0002850366300000102
is the achievable transmission rate at the base station end,
Figure GDA0002850366300000103
the reachable eavesdropping rate of an external eavesdropper Eve is K, the total number of legal users of a correspondingly covered cell under each base station is K, and L is the number of the base stations;
by solving problems
Figure GDA0002850366300000104
Obtaining the optimal solution of the power distribution factor, namely the power distribution factor theta with the maximized current secret rate, wherein the optimal solution can be obtained by solving
Figure GDA0002850366300000105
And (4) after the first derivative, solving the optimal solution of the power distribution factor by adopting a dichotomy.
In step S4, after step S3 is completed, the base station uses the power specific gravity θ of the secret data and the power specific gravity 1- θ of the artificial noise to serve each legitimate user, and simultaneously, emits the artificial noise to interfere with the external eavesdropper Eve. Therefore, the maximization of target confidentiality and rate is realized, and the safe transmission performance of the physical layer is effectively improved.
In the following, different system parameters are used to compare and analyze the monte carlo simulation results of the present invention and the conventional average power allocation scheme (i.e. θ = 0.5) to verify the performance advantages of the proposed optimal power allocation scheme. The parameters in the computational simulation are shown in the following table:
Figure GDA0002850366300000106
the Monte Carlo simulation method comprises the steps of randomly generating small-scale fading between a legal user and an eavesdropper and between a base station, then counting the achievable secret rate obtained by respectively adopting the proposed optimal power distribution scheme and the traditional average power distribution scheme in each simulation, averaging the statistical results, and obtaining the achievable secret rate result in a simulation graph.
As shown in fig. 3, the optimal power allocation scheme is an artificial noise assisted physical layer security scheme based on interference management according to the present invention, and the average power allocation scheme is a conventional scheme with a power allocation factor θ = 0.5. As can be seen from the simulation results in fig. 3, under different parameter settings, the scheme provided by the present invention can obtain the achievable secret rate performance superior to that of the conventional power allocation scheme.
Therefore, according to the artificial noise assisted physical layer security method based on interference management provided by the embodiment of the invention, in a downlink multi-cell broadcast communication scene, the signal receiving intensity of a legal receiving end is improved by utilizing the interference management technology, the interference to an unknown eavesdropper is realized by utilizing artificial noise, the power distribution factor between the artificial noise and confidential data is calculated by adopting the joint design of a beam forming scheme of a transceiver and an equal power distribution scheme, and the maximization of target confidentiality and rate is realized.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (6)

1. An artificial noise assisted physical layer security method based on interference management is characterized by comprising the following steps:
step S1, collecting network information in a preset number of cell broadcast communication scenes;
step S2, processing the network information by using an interference alignment technology to design a receiving beam forming matrix at each legal user terminal and design a transmitting pre-coding matrix at a base station terminal so as to eliminate inter-cell interference ICI and inter-user interference IUI of each legal user terminal;
step S3, when the base station side transmits the confidential data, the artificial noise is transmitted at the same time, the power distribution factor with the maximized current confidential rate is calculated according to the preset user service quality requirement and the preset network information result, and the power proportion transmitted to the confidential data and the power proportion of the artificial noise are distributed according to the power distribution factor with the maximized current confidential rate, and the specific process is as follows:
setting the achievable transmission rate of the base station end
Figure FDA0003655984890000011
Comprises the following steps:
Figure FDA0003655984890000012
wherein t is a base station terminal, [ k, i ]]For the user, I d Representing an identity matrix with dimension d, theta is a power allocation factor for maximizing the current secret rate or a power proportion of the secret data, P is a transmission power of each base station,
Figure FDA0003655984890000013
for base station end to user [ k, i ]]The effective channel matrix of (a) is,
Figure FDA0003655984890000014
for base station end to user [ k, i ]]By a conjugate transpose of the effective channel matrixThe matrix is a matrix of a plurality of pixels,
Figure FDA0003655984890000015
a noise variance received for the user side;
setting up reachable transmission rate of external eavesdropper Eve
Figure FDA0003655984890000016
Comprises the following steps:
Figure FDA0003655984890000017
wherein e is an external eavesdropper Eve, [ k, i ]]In order for the user to be aware of the fact,
Figure FDA0003655984890000018
for the variance of the noise received by the Eve terminal,
Figure FDA0003655984890000019
the representation dimension is d e The unit matrix of (1), L is the number of base stations, L is the index of each base station, K is the total number of legal users of the cell correspondingly covered by each base station, j is the index of the legal users in each cell,
Figure FDA00036559848900000110
for base station end transmitting to user [ j, l]To the effective channel matrix experienced by Eve,
Figure FDA00036559848900000111
for base station end transmitting to user [ j, l]To the conjugate transpose matrix of the effective channel matrix experienced by Eve, 1-theta is the power proportion of the artificial noise, d an Is the dimension of the artificial noise matrix,
Figure FDA00036559848900000112
d is the number of data streams,
Figure FDA00036559848900000113
for base station side transmission to user [ k, i ]]To the effective channel matrix experienced by Eve,
Figure FDA00036559848900000114
for base station side transmission to user k, i]To the conjugate transpose of the effective channel matrix experienced by Eve;
according to the reachable transmission rate of the base station end and the reachable transmission rate of the external eavesdropper Eve, the system confidentiality and the system confidentiality rate of the cell broadcast communication scene are obtained
Figure FDA00036559848900000115
Expression (c):
Figure FDA0003655984890000021
wherein the content of the first and second substances,
Figure FDA0003655984890000022
for the achievable transmission rate at the base station side,
Figure FDA0003655984890000023
k is the total number of legal users of the correspondingly covered cell under each base station for the reachable transmission rate of the external eavesdropper Eve, and L is the number of the base stations;
by solving problems
Figure FDA0003655984890000024
Obtaining an optimal solution of a power distribution factor, namely a power distribution factor theta with the maximized current privacy rate;
and S4, after the step S3 is completed, the base station side services each legal user by using the power proportion of the confidential data and the power proportion of the artificial noise, and simultaneously emits the artificial noise to interfere an external eavesdropper Eve.
2. The artificial noise aided physical layer security method based on interference management according to claim 1, characterized in that, before said step S1,
presetting normal information interaction among all transmitters, and carrying out combined processing on transmitted signals;
presetting that the legal channel state information obtained by the base station side and each legal user side is accurate and the information of the external eavesdropper Eve is unknown;
the preset channel is a quasi-static rayleigh block fading channel, each element in the channel matrix is independently and identically distributed, the mean value is 0, the variance is 1, and the noise of the legal user is n:
Figure FDA0003655984890000025
presetting that the external eavesdropper Eve can obtain legal channel state information, wherein the noise of the external eavesdropper Eve is n e :
Figure FDA0003655984890000026
3. The artificial noise assisted physical layer security method based on interference management according to claim 1, wherein the network information comprises: the number of cells in the preset number of cell broadcast communication scenes, the number of users in each cell and the number of data streams sent to each user by the base station terminal.
4. The method of claim 1, wherein in step S2, interference is aligned to a predetermined subspace by designing the receive beamforming matrix using an interference alignment technique to eliminate the inter-user interference IUI.
5. The method as claimed in claim 1, wherein in step S2, after the design of the receive beamforming matrix is completed, the effective channels from the base station to each legitimate user are aligned to the same subspace, and then the design of the precoding matrix is completed, so as to eliminate the inter-cell interference ICI.
6. The artificial noise assisted physical layer security method based on interference management according to claim 1, wherein the solution is performed
Figure FDA0003655984890000027
After the first derivative, the optimal solution of the power distribution factor is solved by adopting a dichotomy.
CN202011303753.1A 2020-11-19 2020-11-19 Artificial noise assisted physical layer security method based on interference management Active CN112533197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011303753.1A CN112533197B (en) 2020-11-19 2020-11-19 Artificial noise assisted physical layer security method based on interference management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011303753.1A CN112533197B (en) 2020-11-19 2020-11-19 Artificial noise assisted physical layer security method based on interference management

Publications (2)

Publication Number Publication Date
CN112533197A CN112533197A (en) 2021-03-19
CN112533197B true CN112533197B (en) 2022-10-21

Family

ID=74981650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011303753.1A Active CN112533197B (en) 2020-11-19 2020-11-19 Artificial noise assisted physical layer security method based on interference management

Country Status (1)

Country Link
CN (1) CN112533197B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114337749B (en) * 2021-11-19 2023-02-28 北京理工大学 Cooperative MIMO (multiple input multiple output) safety precoding method for spectrum sensing network
CN114286336B (en) * 2021-12-30 2023-10-13 重庆邮电大学 Multi-cell network safe transmission method based on artificial noise
CN114786213A (en) * 2022-04-27 2022-07-22 重庆邮电大学 Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981153A (en) * 2019-04-11 2019-07-05 东南大学 A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
WO2018119890A1 (en) * 2016-12-29 2018-07-05 深圳天珑无线科技有限公司 Cdma system physical layer security configuration method and device
US10999000B2 (en) * 2018-01-24 2021-05-04 Korea Advanced Institute Of Science And Technology Apparatus and method for secure communication using artificial noise scheme
CN109861783B (en) * 2019-03-26 2022-04-12 哈尔滨工业大学 Physical layer security method based on artificial noise power distribution
CN110752865B (en) * 2019-10-17 2023-07-25 江苏科技大学 Multi-user MIMO communication confidentiality method under relay cooperative network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981153A (en) * 2019-04-11 2019-07-05 东南大学 A kind of extensive MIMO safety statistics method for precoding of man made noise's auxiliary

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
空间调制系统中的人工噪声抗窃听安全传输方案;雷维嘉等;《电子科技大学学报》;20180130(第01期);全文 *

Also Published As

Publication number Publication date
CN112533197A (en) 2021-03-19

Similar Documents

Publication Publication Date Title
Zhou et al. State of the art, taxonomy, and open issues on cognitive radio networks with NOMA
CN112533197B (en) Artificial noise assisted physical layer security method based on interference management
Shu et al. Artificial-noise-aided secure multicast precoding for directional modulation systems
Swindlehurst Fixed SINR solutions for the MIMO wiretap channel
Yang et al. Optimal transmission with artificial noise in MISOME wiretap channels
Xu et al. Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding
Alageli et al. SWIPT massive MIMO systems with active eavesdropping
Shalmashi et al. Energy efficiency and sum rate tradeoffs for massive MIMO systems with underlaid device-to-device communications
Huang et al. On the physical layer security of millimeter wave NOMA networks
CN111082933B (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
CN105657698B (en) Safe transmission method based on cooperation interference in multicell network
Mukherjee et al. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
Yadav et al. A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges
Tang et al. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices
Choi et al. Sum secrecy spectral efficiency maximization in downlink MU-MIMO: Colluding eavesdroppers
Xu et al. Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission
Liu et al. Artificial noise-assisted beamforming and power allocation for secure D2D-enabled V2V communications
Zeng et al. Physical layer security for NOMA systems
Krunz et al. Secure Linear Precoding in Overloaded MU-MIMO Wireless Networks
Zhou et al. Securing communication via transmission of artificial noise by both sides: bipolar‐beamforming optimization
CN110071748B (en) Artificial noise power distribution method of multiple-sending-single-receiving system
Wang et al. Secure transmission in MISOME wiretap channels with half and full-duplex active eavesdroppers
Siyari et al. Linear precoding with friendly jamming in overloaded MU-MIMO wiretap networks
Mabrouk et al. Securing untrusted full-duplex relay channels in the presence of multiple external cluster-based eavesdroppers
Nguyen et al. Secrecy rate maximization in a cognitive radio network with artificial noise aided for MISO multi-eves

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant