CN113055064A - Steady beam forming design method for hidden communication of Internet of things - Google Patents
Steady beam forming design method for hidden communication of Internet of things Download PDFInfo
- Publication number
- CN113055064A CN113055064A CN202110261814.0A CN202110261814A CN113055064A CN 113055064 A CN113055064 A CN 113055064A CN 202110261814 A CN202110261814 A CN 202110261814A CN 113055064 A CN113055064 A CN 113055064A
- Authority
- CN
- China
- Prior art keywords
- willie
- alice
- bob
- representing
- irs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 70
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000013461 design Methods 0.000 title claims abstract description 29
- 238000001514 detection method Methods 0.000 claims abstract description 28
- 239000013598 vector Substances 0.000 claims description 37
- 239000011159 matrix material Substances 0.000 claims description 22
- 230000010363 phase shift Effects 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000005457 optimization Methods 0.000 claims description 7
- 230000001186 cumulative effect Effects 0.000 claims description 6
- 230000014509 gene expression Effects 0.000 claims description 5
- 230000009466 transformation Effects 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000002040 relaxant effect Effects 0.000 claims description 3
- 238000003657 Likelihood-ratio test Methods 0.000 claims description 2
- 239000006185 dispersion Substances 0.000 abstract 1
- 238000011160 research Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 3
- CMDLYHXLYMIGIH-UHFFFAOYSA-N C.S.S Chemical compound C.S.S CMDLYHXLYMIGIH-UHFFFAOYSA-N 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 241000194370 Cyclocephala pan Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000003556 assay Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
- H04B7/043—Power distribution using best eigenmode, e.g. beam forming or beam steering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/04013—Intelligent reflective surfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/086—Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a robust beam forming design method for hidden communication of the Internet of things, which considers hidden beam forming design for an Intelligent Reflector (IRS) assisted Internet of things (IoT) network, researches the design of a joint beam forming device of Alice and can improve the hiding rate of Bob to the maximum extent when Alice does not completely know Willie Channel State Information (WCSI). For WCSI in a non-ideal state, an optimal decision threshold of Willie is deduced, and false alarm and missed detection probabilities in the case are analyzed. Furthermore, in this case, a robust beamformer based on relaxation, S-procedure and alternate iteration methods is built, taking advantage of the property of Kullback-Leibler dispersion.
Description
Technical Field
The invention relates to a robust beam forming design method for covert communication of the Internet of things.
Background
In the past few years, the internet of things (IoT) has been widely used in various fields of industry, agriculture, medicine, and the like. The number of intelligent communication devices has increased explosively, and data-hungry wireless applications have steadily increased, which requires internet-of-things networks to have higher spectrum and energy efficiency (cited documents: s.gong, x.lu, d.t.hoang, d.niyato, l.shu, d.i. Kim, and y.c. liang, "heated small wireless communications vision in the engineering recovery surfaces: a coordinated overview," IEEE com.surv.tutor, vol.22, No.4, pp. 2283-. Fortunately, Intelligent Reflective Surfaces (IRS) have recently been identified as a promising solution that can improve the spectral and energy efficiency of wireless networks by reconfiguring the wireless propagation environment.
IRS, also known as reconfigurable intelligent surface, is receiving wide attention in wireless communication applications. In particular, IRS is a planar surface consisting of a large number of low-cost passive reflective elements, each of which can independently reshape the phase, amplitude and reflection angle of an incident signal (cited in Q.Wu and R.Zhang, "transmitted small and reliable environment: Integrated reflective surface available wireless network," IEEE Commin. Magazine, vol.58, No.1, pp. 106-. For example, signals reflected by IRS may be added or summed with signals reflected by non-IRS at the receiver to enhance the desired signal or suppress the undesired signal by adaptively adjusting the phase shift of the reflecting elements (cited references: X.Tan, Z.Sun, J.M.Jornet, and D.Pados, "incoming antenna reflected signal-array," in Proc. IEEE International Conference on Communications (ICC), 2016.).
The IRS auxiliary Internet of Things has the advantages of low hardware cost, low power consumption, simple structure and the like, and improves the quality of received signals by the unique electromagnetic characteristics (such as negative refraction, cited documents: G.Y u, X.Chen, C.ZHong, D.W.KWan Ng, and Z.Zhang, "Design, analysis, and optimization of a large intersecting deflecting surface-aid B5G cellular Internet of Things," IEEE ings vol J., vol.7, No.9, pp.8902-8916,2020.).
However, due to the broadcast nature of wireless communication, IRS helps the internet of things to be easily eavesdropped, especially in some public areas such as classrooms, shopping malls and libraries. Recently, a large number of researchers have studied the safety of physical layers (cited document: M.Cui, G.Zhang, and R.Zhang, "Secure Wireless communication device," IEEE Wireless communication device, vol.8, No.5, pp.1410-1414,2019.) (cited document: L.Dong and H.Wang, "Secure MIMO transmission device in communication device, IEEE Wireless communication device, L.9, No.6, pp.787-790,2020.) (cited document: X.Y.u, D.Xu, Y.Sun, D.W.K.Ng, and R.Scher," Robus Wireless communication device and D.Xu, Y.Sun, D.W.K.Ng, and R.Scher, "transmit Wireless communication device and D.J.12, C.communication device, C.12, C.communication device, C.S.12, C.communication device, C.7, C.communication device, C.3. communication device, K.N.12, C.S.S.3. communication device, C.S.12, C.S.3. communication device, C.3. communication device, C.S.12, C.7. communication device, C.S.S.7. communication device, C.1, C.3. communication device, c.3. 3. c.1, c.3. communication device, c.1, c.3, c. communication device, c.3. communication device, c.3, communication device, c.3, c.c.3, communication device, c.3, communication device, c.3, c.c.c. for communication device, c.3, communication device, c.3, c., "IEEE Trans. Inf. F organs Security, vol.16, pp.1655-1669,2021.) and covert communications (cited documents: the IRS auxiliary internet of things information security optimization algorithm of X, Lu, E.Hossain, T.Shafit, S.Feng, H.Jiang, and D.Niyato, "Intelligent reflecting surface enabled conversion communications in wireless networks," IEEE Net ", vol.34, No.5, pp. 148, 155, 2020.). Physical Layer Security is primarily to prevent the transmitted wireless signal form From being decoded by an undesired user (cited documents: m.bloch and j.bars, Physical-Layer Security From Information Security to Security Engineering, u.k.: Cambridge univ, 2011), while covert communication is to hide the wireless signal From being discovered by an eavesdropper. In the literature: in m.cui, g.zhang, and r.zhang, "Secure Wireless communication view in reflecting surface," IEEE Wireless communication.let., vol.8, No.5, pp.1410-1414,2019, the IRS may adaptively adjust the phase shift of the reflection unit to enhance the desired signal and suppress the undesired signal, thereby maximizing the security ratio. Researchers consider an IRS-assisted gaussian multiple-input multiple-output (MIMO) listening channel (cited document: l. Dong and h.wang, "Secure MIMO transmission via adaptive redirection surface," IEEE Wireless communication. let, vol.9, No.6, pp.787-790,2020.), whereas in documents: in x.yu, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communications via intersecting deflecting surfaces," IEEE j.sel.areas communications, vol.38, No.11, pp.2637-2652, 2020.), the joint design of a beamformer, an artificial noise covariance matrix and a phase shifter in an infrared receiver is studied, and the influence of incomplete Channel State Information (CSI) of a intercepted channel is considered. By using IRS to improve safety performance, researchers are in the literature: one block coordinate descent optimization minimization (BCDMM) algorithm for MIMO secure communication systems is proposed in s.hong, c.pan, h.ren, k.wang, and a.nalalanathan, "architecture-noise-aided secure MIMO wireless communication view intersection deflecting surface," IEEE trans.communication ", vol.68, No.12, pp.7851-7866,2020. Furthermore, there are documents z.chu, w.hao, p.xiao, d.mi, z.liu, m.khalily, j.r.kelly, and a.p.fereidis, "correlation rate optimization for interleaved reflecting surface-applied MIMO system," IEEE trans.inf.f. interference Security, vol.16, pp.1655-1669,2021 derive closed-form expressions of the Security precoder and the interference precoder by a Weighted Minimum Mean Square Error (WMMSE) algorithm and a Karush-Kuhn-tuner (kkt) condition, and derive phase shifts by an MM algorithm to obtain closed-form solutions thereof.
Furthermore, as evolving wireless systems face more and more security threats, even if the transmitted information is encrypted and the potential eavesdropping path is physically restricted, the original data itself may expose confidential information. In the literature: lu, E.Hossain, T.Shafit, S.Feng, H.Jiang, and D.Niyato, "Intelligent reflecting surface enabled covers communications in wireless networks," IEEE Net ", vol.34, No.5, pp. 148, 155,2020, authors describe covert communications technologies with IRS.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the technical problems in the background art, the invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
Has the advantages that: for the imperfect WCSI case, in the case of imperfect concealment constraints, the optimal threshold for Willie detection is derived and the corresponding detection error probability is proposed based on the robust beamforming vector. This result can be used as a theoretical basis for evaluating the concealment performance of the beamformer design. Furthermore, when Alice's WCSI is imperfect, the joint design of the robust beamformer and IRS reflection beamformer targeting the maximum achievable rate is investigated, taking into account the perfect blind transmission constraints, Alice's total transmit power constraints and IRS's QoS.
Drawings
The foregoing and/or other advantages of the invention will become further apparent from the following detailed description of the invention when taken in conjunction with the accompanying drawings.
Fig. 1 is a schematic diagram of a covert communication scenario.
FIG. 2a shows a concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 2b shows the concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF change curve chart.
FIG. 3a shows the proposed epsilon value and concealment rate RbAnd (5) a relational graph.
FIG. 3b shows the epsilon value and the probability of detection error according to the present inventionAnd (5) a relational graph.
FIG. 4a is a diagram of the proposed concealment rate R of the present inventionbAnd CSI error vwAnd (5) a relational graph.
FIG. 4b is a schematic diagram of the false alarm probability of the present inventionAnd probability of missed detectionAnd CSI error vwAnd (5) a relational graph.
FIG. 5 is a graph of the coverage rate R proposed by the present inventionbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically.
Detailed Description
In the invention, the following representation method is adopted: lower case and upper case letters in bold represent vectors and matrices, respectively.| | |, Tr (·), Re (·) and Im (·) represent the desired, Frobenius norm, trace, real and imaginary parts of the parameter, respectively. Operator symbolIndicating that a is semi-positive.Expressed as mean μ and variance σ2The complex value of (a) is circularly symmetric gaussian distributed.
The scenario considered by the present invention is shown in fig. 1, where Alice (base station) will transmit a private data stream xbAnd sending to Bob (hidden user). The invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
The step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, whereRepresenting a null hypothesis, that is, Alice does not send a private data stream to Bob;represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an Intelligent Reflection Surface (IRS) with an intelligent controller is adopted to assist in covert transmission.
In the step 1, Alice is set to be provided with N antennae, and N is a natural number; bob and Willie each have an antenna; order toRepresenting a signal xb(xbSignal sent by Alice to Bob); make it
Wherein,representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by usingEvents representing the sending of information by Alice to Bob, usingAn event that represents Alice not sending information to Bob.
In step 1, from Willie's perspective, Alice's transmission signal x is as follows:
wherein wbIs xbSets Alice atNo signal is transmitted at the lower part, and the beam forming vector wbIn thatThe following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined byGiven that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use ofModeling the reflection of IRS units, whereinqmRepresents the reflection modeling of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively represent the m-th unit introductionControllable phase shift and amplitude reflection coefficient of (a);
|qm|=1,m=1,…M (3)
due to severe path loss, the signal reflected by IRS is ignored twice or more, the signal y received at BobbWriting into:
wherein z isbFor the received noise at Bob to be the received noise,signal noise z representing BobbObeying a mean of 0 and a variance ofComplex gaussian distribution. h isIBIs the channel coefficient from IRS to Bob,is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,is hABThe conjugate transpose of (c).
In step 1, Willie receives signal ywWriting into:
wherein z iswIs the noise received at Willie and,signal noise z representing WilliewObeying a mean of 0 and a variance ofComplex gaussian distribution. h isIWIs the channel coefficient from IRS to Willie,is hIWThe conjugate transpose of (2); h isAWFor the Alice to Willie channel coefficients,is hAWThe conjugate transpose of (c).
willie inAndthe likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
wherein InSignal noise z representing WilliewOf the noise variance, λ0And λ1Representing the auxiliary variable.
In step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The overall change between, using the Pinsker inequality (Hensker inequality) (ref T.M. cover and J.A.Thomas, Elements of Information Theory, New York: Wiley,2006.), gives:
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL (Kullback-Leibler) divergence (Kullback-Leibler divergence relative entropy), D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is an ordinary user (i.e., Willie is not a legitimate user), Alice does not know channel state information about Willie, and wants to acquire personal information of Bob, in which case Alice is a passive gatekeeper (references D. goeckel, b. base, s. guha, and D. towsley, "cover communications places side not to point the background noise power," IEEE communications. let, vol.20, No.2, pp.236-239, feb.2016) and channel estimation error (references m. output format, p. azmi, n. mokari, and D. goeckel, "cover ni-using location and 3D coordinates" 3568, CSI, IEEE 8525. 12, CSI, 8568, and IEEE communications No. 25. 858, c. 12, c. b. 855, c. 3D coordinates;
imperfect WCSI is modeled as:
and:
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;andrespectively representing a CSI (channel state information) estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
and
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;represents Δ hIWThe conjugate transpose of (1);axis of control ellipsoid, vAW>0,υIWDetermining the volume of an ellipsoid > 0 (references x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communication via in-cell reflecting surfaces," IEEE j.sel.areas communication, vol.38, No.11, pp.2637-2652,2020.);
willies assay performance:
for imperfectUnder the condition of WCSI, Willie's optimal decision threshold is researched, and corresponding false alarm and missed detection probabilities are given. In which the worst case of blind transmission is considered, in which case Willie knows the beamformer wb。
According to the Neyman-Pearson criterion (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork,2005.), the optimal rule for Willie to minimize detection errors is the likelihood ratio test (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork, 2005.):
according toAndare respectively corresponding hypothesisAndthe binary decision of equation (16) is rewritten as:
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
based on optimal detection threshold phi*Giving false alarmAnd probability of missed detectionComprises the following steps:
by usingAndexpression ofThe formula is used for representing the ideal detection performance of Willie;
D(p0||p1)≤2ε2the case (2) is as follows:
in practical applications, the obtained CSI is often corrupted by certain estimation errors (ref l.wang, w. Wornell, and l.zheng, "Fundamental limits of communication with low reliability of detection," IEEE trans. inf.theory, vol.62, No.6, pp.3493-3503, jun.2016.). Therefore, a robust beamforming design is proposed to maximize the improvement of Bob's concealment rate Rb. In this case, it is difficult to achieve perfect blind transmission, i.e., D (p)0||p1) 0. On this basis, D (p) given by (11) is employed0||p1)≤2ε2And D (p)1||p0)≤2ε2As covert constraints (references s.yan, y.conn, s.v. hanly, and x.zhou, "Gaussian signalling for coverage communications," IEEE trans. Wireless communications, vol.18, No.7, pp.3542-3553,2019.);
the robust hiding rate maximization problem is expressed as the following problem (21):
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
using functionsRestating the concealment constraint (21b) for the property x > 0Equivalent transformation into:
due to delta hAW∈εAWAnd Δ hIW∈εIWIn constraints (21e) and (21f), Δ hAWOr Δ hIWThere are infinite options. This makes the problem (21) non-convex and difficult to solve. To overcome this challenge, a method of relaxing and constraining is proposed.
W in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
problem (24) was obtained:
wherein Q represents a phase shift matrix;denotes gBThe conjugate transpose of (1);signal noise z representing WilliewThe noise variance of (2);andis the equationTwo roots of (c); ptotalIs the maximum transmit power of Alice; denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variablesIs relaxed toThe constraint is equivalently re-expressed as:
wherein Represents Δ gWConjugation and transposition are carried out;to representThe conjugate transpose of (1);represents IRS anda CSI estimate vector between Willie;representing a CSI estimation vector between Alice and Willie;
ΔgW∈εW, (26d)
(25a),(25b);
note that the objective function and constraints areIs linear and thus the SDR problem (26) is quasi-convex. However, the problem (26) remains computationally difficult to solve because of Δ gW∈εWIt contains an infinite number of constraints. An infinite number of constraints are recast into a set of Linear Matrix Inequalities (LMIs) using S-Procedure, which is an easy to handle approximation.
Quotation 1(S-Procedure, ref. D.W.K.Ng, E.S.Lo, and R.Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE transactions. Wireless communication, vol.13, No.8, pp.4599-4615,2014.): setting functionIs defined as:
whereinIs a complex-early-late-matrix,representing an N × 1 dimensional complex vector;represents a one-dimensional real number;
constraints (25a) and (25b) are converted into a finite number of LMIs (Linear matrix inequality) respectively by S-Procedure (S-lemma):
a conservative approximation of the problem (26) is obtained, namely the following problem (30):
s.t(26b),(26c),(29a),(29b);
the problem (30) is a convex SDP problem and can therefore be solved optimally using the interior point method. In the same way, letRepresents an optimal solution to the problem (30). If it is notThenIs an optimal solution to the problem (30) and the optimal beamformer is derived by SVDThat is to say that the first and second electrodes,otherwise, ifA gaussian randomization process is used to generate a high quality rank 1 solution to the problem (30) (references z.luo, w.ma, a.m.so, y.ye, and s.zhang, "semimidefinite repetition of quadratic optimization schemes," IEEE Signal process.mag., vol.27, No.3, pp.20-34,2010.).
Sub-problem 2:
given wbOptimizing q: at a fixed wbIn this case, the problem (21) is converted to a problem (31) of the form:
applying SDR techniques toAndto overcome non-convexity by removingRe-expressing the problem (31) in a relaxed form, namely the following problem (32):
wherein EmIs an M +1 dimensional matrix, the (i, j) th element is denoted as [ Em]i,jSatisfy the following requirements
The problem (32) is a convex SDP problem that can be solved optimally using the interior point method. It should be noted that due to the relaxation of SDR, the optimal solutionMay not be the optimal solution to the problem (32).
D(p1||p0)≤2ε2The case (2) is as follows:
considering the constraint D (p)1||p0)≤2ε2The case (1). The corresponding robust hiding rate maximization problem is expressed as the following problem (33):
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Note that problem (33) is similar to problem (21), except for the hidden constraints. Covert restraintEquivalent transformation is as follows:
The problem is solved (33) using an alternating iterative, relaxation and constraint approach.
In step 2, the following procedure was used to address problem (21):
step a1, initialize setting k equal to 0,q(0)=1N,1Nrefers to an N × 1 vector whose elements are all 1;representing the problem (21) with variables in iteration kAnd q is(k)A target value of (d);
step a3, setting k to k + 1;
step a4, given q(k-1)Solving the problem (30);
Step a7, untilE denotes a threshold value, typically set at 10-3The function is to control the precision of the parameter, and the epsilon is more than 0;
step a8, solvingAnd q is(k)Performing Gaussian randomization to obtain an approximate solutionAnd q is(k)Then updated
3.1 evaluation of scene 2
First, the robust beamformer design proposed in the scenario of Alice and imperfect WCSI (Willie's channel state information) was evaluated.
FIGS. 2a and 2b show the concealment threshold 2 ε according to the invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And D (p)0||p1) And the cumulative density function CDF. FIGS. 2a and 2b show the parameter for CSI error as upsilon, respectivelyw=2×10-4D (p) of0||p1) And D (p)1||p0) The empirical Cumulative Density Function (CDF). The concealment threshold values of both robust and non-robust designs are 2 epsilon20.02, i.e. D (p)0||p1) Less than or equal to 0.02 and D (p)1||p0) Less than or equal to 0.02. As can be seen from fig. 2a and 2b, the CDF in the non-robust design KL divergence cannot satisfy the constraint. On the other hand, the robust beamforming design ensures the requirement of KL divergence, namely, the requirement of Willie on the probability of false detection is met. Non-robust hereDesigned by adopting under the same conditionsAndthe proposed implicit design. Overall, fig. 2a and 2b verify the necessity and effectiveness of the proposed robust design.
Fig. 3a and 3b are graphs of the value of epsilon versus the concealment rate and the detection error probability. FIG. 3a plots the covert constraint D (p)0||p1)≤2ε2And D (p)1||p0)≤2ε2At the value of epsilon ofbPlot against ε value, where CSI error υw=2×10-4,P total5 dBm. WhereinRepresents D (p)0||p1)≤2ε2Probability of false alarm of timeThe other notation is defined as such. The simulation results are consistent with theoretical analysis, i.e. when epsilon becomes larger, the hidden-shielding constraint becomes loose, resulting in RbBecomes larger. FIG. 3b plots the false alarm probabilityAnd probability of missed detectionAnd CSI error vw=2×10-4The value of epsilon. It can be observed that the false alarm probability is under two different covert constraintsAnd probability of missed detectionDecreases with increasing epsilon, whereinIs always less thanThis indicates that the more relaxed the transformation constraints, the better Willie detection performance. In addition, fig. 3b also verifies the effectiveness of the proposed robust beamformer design in covert communications, i.e.Thus, from fig. 3a and 3b, the trade-off between Willie's detection performance and Bob's coverage is revealed, and the desired trade-off can be achieved by a suitably robust beamforming design.
FIGS. 4a and 4b show the probability of detection error versus CSI error upsilon for a concealment rate and epsilon of 0.1wAnd (4) a relation graph of the ratio. FIG. 4a depicts D (p) at two KL divergence cases0||p1)≤2ε2And D (p)1||p0)≤2ε2Lower hiding ratio RbAnd CSI error vwThe relationship (2) of (c). As can be seen from FIG. 4a, the CSI error vwThe higher the implemented hiding rate RbThe lower. FIG. 4b plots false alarm probability under two blind constraintsAnd probability of missed detectionAnd CSI error vwThe relationship (2) of (c). We have observed that in both cases of covert constraints, the false alarm probabilityAnd probability of missed detectionAre all dependent on upsilonwIs reduced and reduced, whereinIs always less thanFurthermore, as can be seen from fig. 4a and 4b, the larger error vwMay result in the beamformer at coverage rate RbThe design of the aspect is poor. However, such a beamformer may interfere with Willie detection, which is also advantageous for Bob. Therefore, this trade-off should also be noted in the design of the robust beamformer.
FIG. 5 is a coverage ratio RbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically. Fig. 5 observes that the concealment rate R of two concealment constraints increases with the number of antennas NbThis is increased, similarly to the case of fig. 5. As can be seen from FIGS. 3a, 3b, 4a, 4b and 5, the blind constraint D (p)0||p1)≤2ε2Is higher than the two KL divergence cases D (p)1||p0)≤2ε2The rate of (c).
The invention provides a robust beamforming design method for covert communication of the internet of things, and a plurality of methods and approaches for implementing the technical scheme, where the foregoing is only a preferred embodiment of the invention, and it should be noted that, for those skilled in the art, a plurality of improvements and modifications may be made without departing from the principle of the invention, and these improvements and modifications should also be regarded as the protection scope of the invention. The components not specified in this embodiment can be realized by the prior art.
Claims (8)
1. A robust beam forming design method for hidden communication of the Internet of things is characterized by comprising the following steps:
step 1, establishing a covert communication environment;
and 2, under the condition of imperfect WCSI, carrying out hidden beam forming design.
2. The method of claim 1, wherein step 1 comprises: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, whereRepresenting a null hypothesis, that is, Alice does not send a private data stream to Bob;represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an IRS intelligent reflecting surface with an intelligent controller is adopted to assist in hidden transmission.
3. The method according to claim 2, wherein in step 1, Alice is configured with N antennas, and N is a natural number; bob and Willie each have an antenna; order to Representing a signal xbPower of xbA signal sent to Bob for Alice; make itWherein,representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
4. The method of claim 3, wherein in step 1, from Willie's perspective, Alice's transmission signal x is as follows:
wherein wbIs xbSets Alice atNo signal is transmitted at the bottom and the beamforming vector wbIn thatThe following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined byGiven that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use ofModeling the reflection of IRS units, whereinqmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
|qm|=1,m=1,…M (3)
signal y received at BobbWriting into:
wherein z isbFor the received noise at Bob to be the received noise,signal noise z representing BobbObeying a mean of 0 and a variance ofComplex gaussian distribution of (a); h isIBIs the channel coefficient from IRS to Bob,is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,is hABThe conjugate transpose of (c).
5. According toThe method of claim 4, wherein in step 1, Willie receives signal ywWriting into:
wherein z iswIs the noise received at Willie and,signal noise z representing WilliewObeying a mean of 0 and a variance ofComplex gaussian distribution of (a); h isIWIs the channel coefficient from IRS to Willie,is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,is hAWThe conjugate transpose of (c).
6. The method of claim 5, wherein in step 1, R is setbIs a null hypothesisThe instantaneous rate of the next Bob, written as:
willie inAndthe likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
7. The method of claim 6, wherein in step 1, Willie wishes to minimize the probability of detection error ξ by applying an optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The total change between them is obtained by using the Pincker inequality:
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL of (a) D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
8. the method of claim 7, wherein step 2 comprises: the imperfect WCSI case refers to: willie is a common user, Alice does not know the channel state information about Willie and wants to acquire Bob's personal information, in which case Alice does not have perfect knowledge of CSI because Alice is a passive guard and channel estimation error;
imperfect WCSI is modeled as:
and:
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;andrespectively representing a CSI channel state information estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
and
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;represents Δ hIWThe conjugate transpose of (1);axis of control ellipsoid, vAW>0,υIWDetermining the volume of the ellipsoid if more than 0 is needed;
the optimal rule for Willie to minimize detection error is the likelihood ratio test according to Neyman-Pearson's criterion:
according toAndare respectively corresponding hypothesisAndthe binary decision of equation (16) is rewritten as:
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
based on optimal detection threshold phi*Giving false alarmAnd probability of missed detectionComprises the following steps:
D(p0||p1)≤2ε2the case (2) is as follows:
using D (p) given by (11)0||p1)≤2ε2And D (p)1||p0)≤2ε2As a covert constraint;
the robust hiding rate maximization problem is expressed as the following problem (21):
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
using functionsRestating the hidden constraint (21b) for the property of x > 0Equivalent transformation into:
w in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
problem (24) was obtained:
wherein Q represents a phase shift matrix;denotes gBThe conjugate transpose of (1);signal noise z representing WilliewThe noise variance of (2);andis the equationTwo roots of (c); ptotalIs the maximum transmit power of Alice; denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);υW=υAW+υIW;εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variablesIs relaxed toThe constraint is equivalently re-expressed as:
wherein Represents Δ gWConjugate transpose;to representThe conjugate transpose of (1);representing a CSI estimate vector between IRS and Willie;representing a CSI estimation vector between Alice and Willie;
ΔgW∈εW, (26d)
(25a),(25b);
whereinIs a complex-early-late-matrix, representing an N × 1-dimensional complex vector;represents a one-dimensional real number;
constraints (25a) and (25b) are respectively converted into a finite number of LMIs linear matrix inequalities by S-Procedure:
therein, a conservative approximation of the problem (26) is obtained, namely the following problem (30):
s.t(26b),(26c),(29a),(29b);
letRepresents an optimal solution to the problem (30) ifThenIs an optimal solution to the problem (30) and the optimal beamformer is derived by SVDThat is to say that the first and second electrodes,otherwise, ifA gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30);
sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
applying SDR techniques toAndto overcome non-convexity by removingRe-expressing the problem (31) in relaxed form, i.e. the following problem (32):
wherein EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
D(p1||p0)≤2ε2The case (2) is as follows:
the corresponding robust hiding rate maximization problem is expressed as the following problem (33):
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110261814.0A CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110261814.0A CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113055064A true CN113055064A (en) | 2021-06-29 |
CN113055064B CN113055064B (en) | 2022-02-01 |
Family
ID=76511062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110261814.0A Active CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113055064B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613273A (en) * | 2021-08-09 | 2021-11-05 | 重庆邮电大学 | Steady energy efficiency optimization method of intelligent super-surface auxiliary wireless power supply network |
CN113949427A (en) * | 2021-09-10 | 2022-01-18 | 中国人民解放军国防科技大学 | Multi-user wireless network safety energy efficiency optimization design method and system |
CN116015801A (en) * | 2022-12-15 | 2023-04-25 | 西北大学 | Construction method of practical hidden system based on combination of two-dimensional symbol spread spectrum and MIMO-NOMA |
CN118054826A (en) * | 2024-03-11 | 2024-05-17 | 兰州交通大学 | Beam forming design method and system for high-speed rail short packet covert communication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253364A (en) * | 2011-04-20 | 2011-11-23 | 电子科技大学 | Passive non-cooperative target positioning method based on distributed irradiation source |
US20200015085A1 (en) * | 2017-09-30 | 2020-01-09 | Shenzhen University | Covert Physical Layer Slope Authentication Method in Wireless Communications and Apparatus |
CN111542054A (en) * | 2020-05-08 | 2020-08-14 | 南京大学 | Secure communication method and system based on programmable super surface |
CN112272072A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Robust beam forming design method for non-ideal WCSI covert communication |
CN112272073A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Hidden beam forming design method for ideal WCSI hidden communication |
-
2021
- 2021-03-10 CN CN202110261814.0A patent/CN113055064B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253364A (en) * | 2011-04-20 | 2011-11-23 | 电子科技大学 | Passive non-cooperative target positioning method based on distributed irradiation source |
US20200015085A1 (en) * | 2017-09-30 | 2020-01-09 | Shenzhen University | Covert Physical Layer Slope Authentication Method in Wireless Communications and Apparatus |
CN111542054A (en) * | 2020-05-08 | 2020-08-14 | 南京大学 | Secure communication method and system based on programmable super surface |
CN112272072A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Robust beam forming design method for non-ideal WCSI covert communication |
CN112272073A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Hidden beam forming design method for ideal WCSI hidden communication |
Non-Patent Citations (1)
Title |
---|
CHAO WANG: "Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications:Joint Active and Passive Beamforming Optimization", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613273A (en) * | 2021-08-09 | 2021-11-05 | 重庆邮电大学 | Steady energy efficiency optimization method of intelligent super-surface auxiliary wireless power supply network |
CN113613273B (en) * | 2021-08-09 | 2023-12-26 | 浙江中蓝创新科技股份有限公司 | Robust energy efficiency optimization method for intelligent super-surface auxiliary wireless power supply network |
CN113949427A (en) * | 2021-09-10 | 2022-01-18 | 中国人民解放军国防科技大学 | Multi-user wireless network safety energy efficiency optimization design method and system |
CN113949427B (en) * | 2021-09-10 | 2023-10-24 | 中国人民解放军国防科技大学 | Multi-user wireless network security energy efficiency optimization design method and system |
CN116015801A (en) * | 2022-12-15 | 2023-04-25 | 西北大学 | Construction method of practical hidden system based on combination of two-dimensional symbol spread spectrum and MIMO-NOMA |
CN118054826A (en) * | 2024-03-11 | 2024-05-17 | 兰州交通大学 | Beam forming design method and system for high-speed rail short packet covert communication |
Also Published As
Publication number | Publication date |
---|---|
CN113055064B (en) | 2022-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113055064B (en) | Steady beam forming design method for hidden communication of Internet of things | |
He et al. | Full-duplex communication for ISAC: Joint beamforming and power optimization | |
Ling et al. | Covert underwater acoustic communications | |
Huang et al. | Randomized algorithms for optimal solutions of double-sided QCQP with applications in signal processing | |
CN113055065B (en) | Internet of things hidden beam forming design method based on intelligent reflector | |
Ma et al. | Covert mmWave communications with finite blocklength against spatially random wardens | |
Ma et al. | Covert beamforming design for intelligent-reflecting-surface-assisted IoT networks | |
Su et al. | Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security | |
Varade et al. | Robust algorithms for DOA estimation and adaptive beamforming for smart antenna application | |
Shtaiwi et al. | RIS-assisted mmWave channel estimation using convolutional neural networks | |
Zhu et al. | Index modulation for fluid antenna-assisted MIMO communications: System design and performance analysis | |
Shi et al. | Physical layer security techniques for data transmission for future wireless networks | |
de Sena et al. | Dual-polarized massive MIMO-RSMA networks: Tackling imperfect SIC | |
Noh et al. | Joint direct and indirect channel estimation for RIS-assisted millimeter-wave systems based on array signal processing | |
Ferreira et al. | Physical Layer Security with Near-field Beamforming | |
Yang et al. | Secure hybrid beamforming for IRS-assisted millimeter wave systems | |
Li et al. | Robust secure beamforming design for cooperative cognitive radio nonorthogonal multiple access networks | |
CN112272073B (en) | Hidden beam forming design method for ideal WCSI hidden communication | |
Liu et al. | Integrated transmit waveform and ris phase shift design for lpi detection and communication | |
Xiao et al. | Securing NextG networks with physical-layer key generation: A survey | |
Payami | Hybrid beamforming for massive MIMO systems | |
Liu et al. | RIS empowered near-field covert communications | |
CN112272072B (en) | Robust beam forming design method for non-ideal WCSI covert communication | |
Kim | Performance of decremental antenna selection algorithms for spatial multiplexing MIMO systems with linear receiver over correlated fading channels | |
Su et al. | Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cram\'er-Rao Bound Optimization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |