CN113055064A - Steady beam forming design method for hidden communication of Internet of things - Google Patents

Steady beam forming design method for hidden communication of Internet of things Download PDF

Info

Publication number
CN113055064A
CN113055064A CN202110261814.0A CN202110261814A CN113055064A CN 113055064 A CN113055064 A CN 113055064A CN 202110261814 A CN202110261814 A CN 202110261814A CN 113055064 A CN113055064 A CN 113055064A
Authority
CN
China
Prior art keywords
willie
alice
bob
representing
irs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110261814.0A
Other languages
Chinese (zh)
Other versions
CN113055064B (en
Inventor
马帅
盛海鸿
张蕴琪
李世银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202110261814.0A priority Critical patent/CN113055064B/en
Publication of CN113055064A publication Critical patent/CN113055064A/en
Application granted granted Critical
Publication of CN113055064B publication Critical patent/CN113055064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • H04B7/043Power distribution using best eigenmode, e.g. beam forming or beam steering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/04013Intelligent reflective surfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
    • H04B7/0837Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
    • H04B7/0842Weighted combining
    • H04B7/086Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a robust beam forming design method for hidden communication of the Internet of things, which considers hidden beam forming design for an Intelligent Reflector (IRS) assisted Internet of things (IoT) network, researches the design of a joint beam forming device of Alice and can improve the hiding rate of Bob to the maximum extent when Alice does not completely know Willie Channel State Information (WCSI). For WCSI in a non-ideal state, an optimal decision threshold of Willie is deduced, and false alarm and missed detection probabilities in the case are analyzed. Furthermore, in this case, a robust beamformer based on relaxation, S-procedure and alternate iteration methods is built, taking advantage of the property of Kullback-Leibler dispersion.

Description

Steady beam forming design method for hidden communication of Internet of things
Technical Field
The invention relates to a robust beam forming design method for covert communication of the Internet of things.
Background
In the past few years, the internet of things (IoT) has been widely used in various fields of industry, agriculture, medicine, and the like. The number of intelligent communication devices has increased explosively, and data-hungry wireless applications have steadily increased, which requires internet-of-things networks to have higher spectrum and energy efficiency (cited documents: s.gong, x.lu, d.t.hoang, d.niyato, l.shu, d.i. Kim, and y.c. liang, "heated small wireless communications vision in the engineering recovery surfaces: a coordinated overview," IEEE com.surv.tutor, vol.22, No.4, pp. 2283-. Fortunately, Intelligent Reflective Surfaces (IRS) have recently been identified as a promising solution that can improve the spectral and energy efficiency of wireless networks by reconfiguring the wireless propagation environment.
IRS, also known as reconfigurable intelligent surface, is receiving wide attention in wireless communication applications. In particular, IRS is a planar surface consisting of a large number of low-cost passive reflective elements, each of which can independently reshape the phase, amplitude and reflection angle of an incident signal (cited in Q.Wu and R.Zhang, "transmitted small and reliable environment: Integrated reflective surface available wireless network," IEEE Commin. Magazine, vol.58, No.1, pp. 106-. For example, signals reflected by IRS may be added or summed with signals reflected by non-IRS at the receiver to enhance the desired signal or suppress the undesired signal by adaptively adjusting the phase shift of the reflecting elements (cited references: X.Tan, Z.Sun, J.M.Jornet, and D.Pados, "incoming antenna reflected signal-array," in Proc. IEEE International Conference on Communications (ICC), 2016.).
The IRS auxiliary Internet of Things has the advantages of low hardware cost, low power consumption, simple structure and the like, and improves the quality of received signals by the unique electromagnetic characteristics (such as negative refraction, cited documents: G.Y u, X.Chen, C.ZHong, D.W.KWan Ng, and Z.Zhang, "Design, analysis, and optimization of a large intersecting deflecting surface-aid B5G cellular Internet of Things," IEEE ings vol J., vol.7, No.9, pp.8902-8916,2020.).
However, due to the broadcast nature of wireless communication, IRS helps the internet of things to be easily eavesdropped, especially in some public areas such as classrooms, shopping malls and libraries. Recently, a large number of researchers have studied the safety of physical layers (cited document: M.Cui, G.Zhang, and R.Zhang, "Secure Wireless communication device," IEEE Wireless communication device, vol.8, No.5, pp.1410-1414,2019.) (cited document: L.Dong and H.Wang, "Secure MIMO transmission device in communication device, IEEE Wireless communication device, L.9, No.6, pp.787-790,2020.) (cited document: X.Y.u, D.Xu, Y.Sun, D.W.K.Ng, and R.Scher," Robus Wireless communication device and D.Xu, Y.Sun, D.W.K.Ng, and R.Scher, "transmit Wireless communication device and D.J.12, C.communication device, C.12, C.communication device, C.S.12, C.communication device, C.7, C.communication device, C.3. communication device, K.N.12, C.S.S.3. communication device, C.S.12, C.S.3. communication device, C.3. communication device, C.S.12, C.7. communication device, C.S.S.7. communication device, C.1, C.3. communication device, c.3. 3. c.1, c.3. communication device, c.1, c.3, c. communication device, c.3. communication device, c.3, communication device, c.3, c.c.3, communication device, c.3, communication device, c.3, c.c.c. for communication device, c.3, communication device, c.3, c., "IEEE Trans. Inf. F organs Security, vol.16, pp.1655-1669,2021.) and covert communications (cited documents: the IRS auxiliary internet of things information security optimization algorithm of X, Lu, E.Hossain, T.Shafit, S.Feng, H.Jiang, and D.Niyato, "Intelligent reflecting surface enabled conversion communications in wireless networks," IEEE Net ", vol.34, No.5, pp. 148, 155, 2020.). Physical Layer Security is primarily to prevent the transmitted wireless signal form From being decoded by an undesired user (cited documents: m.bloch and j.bars, Physical-Layer Security From Information Security to Security Engineering, u.k.: Cambridge univ, 2011), while covert communication is to hide the wireless signal From being discovered by an eavesdropper. In the literature: in m.cui, g.zhang, and r.zhang, "Secure Wireless communication view in reflecting surface," IEEE Wireless communication.let., vol.8, No.5, pp.1410-1414,2019, the IRS may adaptively adjust the phase shift of the reflection unit to enhance the desired signal and suppress the undesired signal, thereby maximizing the security ratio. Researchers consider an IRS-assisted gaussian multiple-input multiple-output (MIMO) listening channel (cited document: l. Dong and h.wang, "Secure MIMO transmission via adaptive redirection surface," IEEE Wireless communication. let, vol.9, No.6, pp.787-790,2020.), whereas in documents: in x.yu, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communications via intersecting deflecting surfaces," IEEE j.sel.areas communications, vol.38, No.11, pp.2637-2652, 2020.), the joint design of a beamformer, an artificial noise covariance matrix and a phase shifter in an infrared receiver is studied, and the influence of incomplete Channel State Information (CSI) of a intercepted channel is considered. By using IRS to improve safety performance, researchers are in the literature: one block coordinate descent optimization minimization (BCDMM) algorithm for MIMO secure communication systems is proposed in s.hong, c.pan, h.ren, k.wang, and a.nalalanathan, "architecture-noise-aided secure MIMO wireless communication view intersection deflecting surface," IEEE trans.communication ", vol.68, No.12, pp.7851-7866,2020. Furthermore, there are documents z.chu, w.hao, p.xiao, d.mi, z.liu, m.khalily, j.r.kelly, and a.p.fereidis, "correlation rate optimization for interleaved reflecting surface-applied MIMO system," IEEE trans.inf.f. interference Security, vol.16, pp.1655-1669,2021 derive closed-form expressions of the Security precoder and the interference precoder by a Weighted Minimum Mean Square Error (WMMSE) algorithm and a Karush-Kuhn-tuner (kkt) condition, and derive phase shifts by an MM algorithm to obtain closed-form solutions thereof.
Furthermore, as evolving wireless systems face more and more security threats, even if the transmitted information is encrypted and the potential eavesdropping path is physically restricted, the original data itself may expose confidential information. In the literature: lu, E.Hossain, T.Shafit, S.Feng, H.Jiang, and D.Niyato, "Intelligent reflecting surface enabled covers communications in wireless networks," IEEE Net ", vol.34, No.5, pp. 148, 155,2020, authors describe covert communications technologies with IRS.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the technical problems in the background art, the invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
step 1, establishing a covert communication environment;
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
Has the advantages that: for the imperfect WCSI case, in the case of imperfect concealment constraints, the optimal threshold for Willie detection is derived and the corresponding detection error probability is proposed based on the robust beamforming vector. This result can be used as a theoretical basis for evaluating the concealment performance of the beamformer design. Furthermore, when Alice's WCSI is imperfect, the joint design of the robust beamformer and IRS reflection beamformer targeting the maximum achievable rate is investigated, taking into account the perfect blind transmission constraints, Alice's total transmit power constraints and IRS's QoS.
Drawings
The foregoing and/or other advantages of the invention will become further apparent from the following detailed description of the invention when taken in conjunction with the accompanying drawings.
Fig. 1 is a schematic diagram of a covert communication scenario.
FIG. 2a shows a concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 2b shows the concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF change curve chart.
FIG. 3a shows the proposed epsilon value and concealment rate RbAnd (5) a relational graph.
FIG. 3b shows the epsilon value and the probability of detection error according to the present invention
Figure BDA0002970345270000031
And (5) a relational graph.
FIG. 4a is a diagram of the proposed concealment rate R of the present inventionbAnd CSI error vwAnd (5) a relational graph.
FIG. 4b is a schematic diagram of the false alarm probability of the present invention
Figure BDA0002970345270000032
And probability of missed detection
Figure BDA0002970345270000033
And CSI error vwAnd (5) a relational graph.
FIG. 5 is a graph of the coverage rate R proposed by the present inventionbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically.
Detailed Description
In the invention, the following representation method is adopted: lower case and upper case letters in bold represent vectors and matrices, respectively.
Figure BDA0002970345270000034
| | |, Tr (·), Re (·) and Im (·) represent the desired, Frobenius norm, trace, real and imaginary parts of the parameter, respectively. Operator symbol
Figure BDA0002970345270000035
Indicating that a is semi-positive.
Figure BDA0002970345270000036
Expressed as mean μ and variance σ2The complex value of (a) is circularly symmetric gaussian distributed.
The scenario considered by the present invention is shown in fig. 1, where Alice (base station) will transmit a private data stream xbAnd sending to Bob (hidden user). The invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
step 1, establishing a covert communication environment;
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
The step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, where
Figure BDA0002970345270000037
Representing a null hypothesis, that is, Alice does not send a private data stream to Bob;
Figure BDA0002970345270000038
represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an Intelligent Reflection Surface (IRS) with an intelligent controller is adopted to assist in covert transmission.
In the step 1, Alice is set to be provided with N antennae, and N is a natural number; bob and Willie each have an antenna; order to
Figure BDA0002970345270000039
Representing a signal xb(xbSignal sent by Alice to Bob); make it
Figure BDA0002970345270000041
Wherein,
Figure BDA0002970345270000042
representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by using
Figure BDA0002970345270000043
Representing the channel coefficients from Alice to IRS;
by using
Figure BDA0002970345270000044
Events representing the sending of information by Alice to Bob, using
Figure BDA0002970345270000045
An event that represents Alice not sending information to Bob.
In step 1, from Willie's perspective, Alice's transmission signal x is as follows:
Figure BDA0002970345270000046
wherein wbIs xbSets Alice at
Figure BDA0002970345270000047
No signal is transmitted at the lower part, and the beam forming vector wbIn that
Figure BDA0002970345270000048
The following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined by
Figure BDA0002970345270000049
Given that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use of
Figure BDA00029703452700000410
Modeling the reflection of IRS units, wherein
Figure BDA00029703452700000411
qmRepresents the reflection modeling of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively represent the m-th unit introductionControllable phase shift and amplitude reflection coefficient of (a);
is provided with
Figure BDA00029703452700000413
To achieve maximum reflected power gain, q should satisfy:
|qm|=1,m=1,…M (3)
due to severe path loss, the signal reflected by IRS is ignored twice or more, the signal y received at BobbWriting into:
Figure BDA00029703452700000412
wherein z isbFor the received noise at Bob to be the received noise,
Figure BDA0002970345270000051
signal noise z representing BobbObeying a mean of 0 and a variance of
Figure BDA0002970345270000052
Complex gaussian distribution. h isIBIs the channel coefficient from IRS to Bob,
Figure BDA0002970345270000053
is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,
Figure BDA0002970345270000054
is hABThe conjugate transpose of (c).
In step 1, Willie receives signal ywWriting into:
Figure BDA0002970345270000055
wherein z iswIs the noise received at Willie and,
Figure BDA0002970345270000056
signal noise z representing WilliewObeying a mean of 0 and a variance of
Figure BDA0002970345270000057
Complex gaussian distribution. h isIWIs the channel coefficient from IRS to Willie,
Figure BDA0002970345270000058
is hIWThe conjugate transpose of (2); h isAWFor the Alice to Willie channel coefficients,
Figure BDA0002970345270000059
is hAWThe conjugate transpose of (c).
In step 1, R is setbIs a null hypothesis
Figure BDA00029703452700000510
The instantaneous rate of the next Bob, written as:
Figure BDA00029703452700000511
willie in
Figure BDA00029703452700000512
And
Figure BDA00029703452700000513
the likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
Figure BDA00029703452700000514
Figure BDA00029703452700000515
wherein
Figure BDA00029703452700000516
Figure BDA00029703452700000517
In
Figure BDA00029703452700000518
Signal noise z representing WilliewOf the noise variance, λ0And λ1Representing the auxiliary variable.
In step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The overall change between, using the Pinsker inequality (Hensker inequality) (ref T.M. cover and J.A.Thomas, Elements of Information Theory, New York: Wiley,2006.), gives:
Figure BDA0002970345270000061
Figure BDA0002970345270000062
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL (Kullback-Leibler) divergence (Kullback-Leibler divergence relative entropy), D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
Figure BDA0002970345270000063
Figure BDA0002970345270000064
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is an ordinary user (i.e., Willie is not a legitimate user), Alice does not know channel state information about Willie, and wants to acquire personal information of Bob, in which case Alice is a passive gatekeeper (references D. goeckel, b. base, s. guha, and D. towsley, "cover communications places side not to point the background noise power," IEEE communications. let, vol.20, No.2, pp.236-239, feb.2016) and channel estimation error (references m. output format, p. azmi, n. mokari, and D. goeckel, "cover ni-using location and 3D coordinates" 3568, CSI, IEEE 8525. 12, CSI, 8568, and IEEE communications No. 25. 858, c. 12, c. b. 855, c. 3D coordinates;
imperfect WCSI is modeled as:
Figure BDA0002970345270000065
and:
Figure BDA0002970345270000066
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;
Figure BDA0002970345270000067
and
Figure BDA0002970345270000068
respectively representing a CSI (channel state information) estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
Figure BDA0002970345270000071
and
Figure BDA0002970345270000072
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;
Figure BDA0002970345270000073
represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;
Figure BDA0002970345270000074
represents Δ hIWThe conjugate transpose of (1);
Figure BDA0002970345270000075
axis of control ellipsoid, vAW>0,υIWDetermining the volume of an ellipsoid > 0 (references x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communication via in-cell reflecting surfaces," IEEE j.sel.areas communication, vol.38, No.11, pp.2637-2652,2020.);
willies assay performance:
for imperfectUnder the condition of WCSI, Willie's optimal decision threshold is researched, and corresponding false alarm and missed detection probabilities are given. In which the worst case of blind transmission is considered, in which case Willie knows the beamformer wb
According to the Neyman-Pearson criterion (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork,2005.), the optimal rule for Willie to minimize detection errors is the likelihood ratio test (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork, 2005.):
Figure BDA0002970345270000076
according to
Figure BDA0002970345270000077
And
Figure BDA0002970345270000078
are respectively corresponding hypothesis
Figure BDA00029703452700000711
And
Figure BDA00029703452700000712
the binary decision of equation (16) is rewritten as:
Figure BDA0002970345270000079
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
Figure BDA00029703452700000710
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
Figure BDA0002970345270000081
and
Figure BDA0002970345270000082
lower yw|2Respectively, as the cumulative density function CDFs of
Figure BDA0002970345270000083
And
Figure BDA0002970345270000084
Figure BDA0002970345270000085
Figure BDA0002970345270000086
based on optimal detection threshold phi*Giving false alarm
Figure BDA0002970345270000087
And probability of missed detection
Figure BDA0002970345270000088
Comprises the following steps:
Figure BDA0002970345270000089
Figure BDA00029703452700000810
by using
Figure BDA00029703452700000811
And
Figure BDA00029703452700000812
expression ofThe formula is used for representing the ideal detection performance of Willie;
D(p0||p1)≤2ε2the case (2) is as follows:
in practical applications, the obtained CSI is often corrupted by certain estimation errors (ref l.wang, w. Wornell, and l.zheng, "Fundamental limits of communication with low reliability of detection," IEEE trans. inf.theory, vol.62, No.6, pp.3493-3503, jun.2016.). Therefore, a robust beamforming design is proposed to maximize the improvement of Bob's concealment rate Rb. In this case, it is difficult to achieve perfect blind transmission, i.e., D (p)0||p1) 0. On this basis, D (p) given by (11) is employed0||p1)≤2ε2And D (p)1||p0)≤2ε2As covert constraints (references s.yan, y.conn, s.v. hanly, and x.zhou, "Gaussian signalling for coverage communications," IEEE trans. Wireless communications, vol.18, No.7, pp.3542-3553,2019.);
the robust hiding rate maximization problem is expressed as the following problem (21):
Figure BDA00029703452700000813
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
Figure BDA00029703452700000814
Figure BDA0002970345270000091
Figure BDA0002970345270000092
using functions
Figure BDA0002970345270000093
Restating the concealment constraint (21b) for the property x > 0
Figure BDA0002970345270000094
Equivalent transformation into:
Figure BDA0002970345270000095
wherein
Figure BDA0002970345270000096
And
Figure BDA0002970345270000097
is the equation
Figure BDA0002970345270000098
Two roots of (c); the constraint (21b) is equivalently restated as:
Figure BDA0002970345270000099
due to delta hAW∈εAWAnd Δ hIW∈εIWIn constraints (21e) and (21f), Δ hAWOr Δ hIWThere are infinite options. This makes the problem (21) non-convex and difficult to solve. To overcome this challenge, a method of relaxing and constraining is proposed.
W in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
Figure BDA00029703452700000910
Figure BDA00029703452700000911
problem (24) was obtained:
Figure BDA00029703452700000912
Figure BDA00029703452700000913
Figure BDA00029703452700000914
Figure BDA00029703452700000915
wherein Q represents a phase shift matrix;
Figure BDA00029703452700000916
denotes gBThe conjugate transpose of (1);
Figure BDA00029703452700000917
signal noise z representing WilliewThe noise variance of (2);
Figure BDA00029703452700000918
and
Figure BDA00029703452700000919
is the equation
Figure BDA00029703452700000920
Two roots of (c); ptotalIs the maximum transmit power of Alice;
Figure BDA0002970345270000101
Figure BDA0002970345270000102
denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);
Figure BDA0002970345270000103
εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variables
Figure BDA0002970345270000104
Is relaxed to
Figure BDA0002970345270000105
The constraint is equivalently re-expressed as:
Figure BDA0002970345270000106
Figure BDA0002970345270000107
wherein
Figure BDA0002970345270000108
Figure BDA0002970345270000109
Represents Δ gWConjugation and transposition are carried out;
Figure BDA00029703452700001010
to represent
Figure BDA00029703452700001011
The conjugate transpose of (1);
Figure BDA00029703452700001012
represents IRS anda CSI estimate vector between Willie;
Figure BDA00029703452700001013
representing a CSI estimation vector between Alice and Willie;
application of SDR to
Figure BDA00029703452700001014
Then, the problem (24) is relaxed to obtain the following problem (26):
Figure BDA00029703452700001015
Figure BDA00029703452700001016
Figure BDA00029703452700001017
ΔgW∈εW, (26d)
(25a),(25b);
note that the objective function and constraints are
Figure BDA00029703452700001018
Is linear and thus the SDR problem (26) is quasi-convex. However, the problem (26) remains computationally difficult to solve because of Δ gW∈εWIt contains an infinite number of constraints. An infinite number of constraints are recast into a set of Linear Matrix Inequalities (LMIs) using S-Procedure, which is an easy to handle approximation.
Quotation 1(S-Procedure, ref. D.W.K.Ng, E.S.Lo, and R.Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE transactions. Wireless communication, vol.13, No.8, pp.4599-4615,2014.): setting function
Figure BDA00029703452700001019
Is defined as:
Figure BDA00029703452700001020
wherein
Figure BDA0002970345270000111
Is a complex-early-late-matrix,
Figure BDA0002970345270000112
representing an N × 1 dimensional complex vector;
Figure BDA0002970345270000113
represents a one-dimensional real number;
if and only if there is a variable η ≧ 0,
Figure BDA0002970345270000114
such that:
Figure BDA0002970345270000115
constraints (25a) and (25b) are converted into a finite number of LMIs (Linear matrix inequality) respectively by S-Procedure (S-lemma):
Figure BDA0002970345270000116
Figure BDA0002970345270000117
a conservative approximation of the problem (26) is obtained, namely the following problem (30):
Figure BDA0002970345270000118
s.t(26b),(26c),(29a),(29b);
the problem (30) is a convex SDP problem and can therefore be solved optimally using the interior point method. In the same way, let
Figure BDA0002970345270000119
Represents an optimal solution to the problem (30). If it is not
Figure BDA00029703452700001110
Then
Figure BDA00029703452700001111
Is an optimal solution to the problem (30) and the optimal beamformer is derived by SVD
Figure BDA00029703452700001112
That is to say that the first and second electrodes,
Figure BDA00029703452700001113
otherwise, if
Figure BDA00029703452700001114
A gaussian randomization process is used to generate a high quality rank 1 solution to the problem (30) (references z.luo, w.ma, a.m.so, y.ye, and s.zhang, "semimidefinite repetition of quadratic optimization schemes," IEEE Signal process.mag., vol.27, No.3, pp.20-34,2010.).
Sub-problem 2:
given wbOptimizing q: at a fixed wbIn this case, the problem (21) is converted to a problem (31) of the form:
Figure BDA00029703452700001115
Figure BDA00029703452700001116
Figure BDA00029703452700001117
applying SDR techniques to
Figure BDA00029703452700001118
And
Figure BDA00029703452700001119
to overcome non-convexity by removing
Figure BDA00029703452700001120
Re-expressing the problem (31) in a relaxed form, namely the following problem (32):
Figure BDA0002970345270000121
Figure BDA0002970345270000122
Figure BDA0002970345270000123
Figure BDA0002970345270000124
wherein
Figure BDA0002970345270000125
Figure BDA00029703452700001214
Figure BDA0002970345270000127
EmIs an M +1 dimensional matrix, the (i, j) th element is denoted as [ Em]i,jSatisfy the following requirements
Figure BDA0002970345270000128
The problem (32) is a convex SDP problem that can be solved optimally using the interior point method. It should be noted that due to the relaxation of SDR, the optimal solution
Figure BDA0002970345270000129
May not be the optimal solution to the problem (32).
D(p1||p0)≤2ε2The case (2) is as follows:
considering the constraint D (p)1||p0)≤2ε2The case (1). The corresponding robust hiding rate maximization problem is expressed as the following problem (33):
Figure BDA00029703452700001210
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Figure BDA00029703452700001211
Figure BDA00029703452700001212
Figure BDA00029703452700001213
wherein
Figure BDA0002970345270000131
Note that problem (33) is similar to problem (21), except for the hidden constraints. Covert restraint
Figure BDA0002970345270000132
Equivalent transformation is as follows:
Figure BDA0002970345270000133
wherein
Figure BDA0002970345270000134
Is an equation
Figure BDA0002970345270000135
Two roots of (2).
The problem is solved (33) using an alternating iterative, relaxation and constraint approach.
In step 2, the following procedure was used to address problem (21):
step a1, initialize setting k equal to 0,
Figure BDA0002970345270000136
q(0)=1N,
Figure BDA0002970345270000137
1Nrefers to an N × 1 vector whose elements are all 1;
Figure BDA0002970345270000138
representing the problem (21) with variables in iteration k
Figure BDA0002970345270000139
And q is(k)A target value of (d);
step a2, when
Figure BDA00029703452700001310
Repeating steps a3 through a 6;
step a3, setting k to k + 1;
step a4, given q(k-1)Solving the problem (30);
step a5, given
Figure BDA00029703452700001311
Solving a problem (32);
step a6, providing
Figure BDA00029703452700001312
Step a7, until
Figure BDA00029703452700001313
E denotes a threshold value, typically set at 10-3The function is to control the precision of the parameter, and the epsilon is more than 0;
step a8, solving
Figure RE-GDA00030307028700001314
And q is(k)Performing Gaussian randomization to obtain an approximate solution
Figure RE-GDA00030307028700001315
And q is(k)Then updated
Figure RE-GDA00030307028700001316
3.1 evaluation of scene 2
First, the robust beamformer design proposed in the scenario of Alice and imperfect WCSI (Willie's channel state information) was evaluated.
FIGS. 2a and 2b show the concealment threshold 2 ε according to the invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And D (p)0||p1) And the cumulative density function CDF. FIGS. 2a and 2b show the parameter for CSI error as upsilon, respectivelyw=2×10-4D (p) of0||p1) And D (p)1||p0) The empirical Cumulative Density Function (CDF). The concealment threshold values of both robust and non-robust designs are 2 epsilon20.02, i.e. D (p)0||p1) Less than or equal to 0.02 and D (p)1||p0) Less than or equal to 0.02. As can be seen from fig. 2a and 2b, the CDF in the non-robust design KL divergence cannot satisfy the constraint. On the other hand, the robust beamforming design ensures the requirement of KL divergence, namely, the requirement of Willie on the probability of false detection is met. Non-robust hereDesigned by adopting under the same conditions
Figure BDA0002970345270000141
And
Figure BDA0002970345270000142
the proposed implicit design. Overall, fig. 2a and 2b verify the necessity and effectiveness of the proposed robust design.
Fig. 3a and 3b are graphs of the value of epsilon versus the concealment rate and the detection error probability. FIG. 3a plots the covert constraint D (p)0||p1)≤2ε2And D (p)1||p0)≤2ε2At the value of epsilon ofbPlot against ε value, where CSI error υw=2×10-4P total5 dBm. Wherein
Figure BDA0002970345270000143
Represents D (p)0||p1)≤2ε2Probability of false alarm of time
Figure BDA0002970345270000144
The other notation is defined as such. The simulation results are consistent with theoretical analysis, i.e. when epsilon becomes larger, the hidden-shielding constraint becomes loose, resulting in RbBecomes larger. FIG. 3b plots the false alarm probability
Figure BDA0002970345270000145
And probability of missed detection
Figure BDA0002970345270000146
And CSI error vw=2×10-4The value of epsilon. It can be observed that the false alarm probability is under two different covert constraints
Figure BDA0002970345270000147
And probability of missed detection
Figure BDA0002970345270000148
Decreases with increasing epsilon, wherein
Figure BDA0002970345270000149
Is always less than
Figure BDA00029703452700001410
This indicates that the more relaxed the transformation constraints, the better Willie detection performance. In addition, fig. 3b also verifies the effectiveness of the proposed robust beamformer design in covert communications, i.e.
Figure BDA00029703452700001411
Thus, from fig. 3a and 3b, the trade-off between Willie's detection performance and Bob's coverage is revealed, and the desired trade-off can be achieved by a suitably robust beamforming design.
FIGS. 4a and 4b show the probability of detection error versus CSI error upsilon for a concealment rate and epsilon of 0.1wAnd (4) a relation graph of the ratio. FIG. 4a depicts D (p) at two KL divergence cases0||p1)≤2ε2And D (p)1||p0)≤2ε2Lower hiding ratio RbAnd CSI error vwThe relationship (2) of (c). As can be seen from FIG. 4a, the CSI error vwThe higher the implemented hiding rate RbThe lower. FIG. 4b plots false alarm probability under two blind constraints
Figure BDA00029703452700001412
And probability of missed detection
Figure BDA00029703452700001413
And CSI error vwThe relationship (2) of (c). We have observed that in both cases of covert constraints, the false alarm probability
Figure BDA00029703452700001414
And probability of missed detection
Figure BDA00029703452700001415
Are all dependent on upsilonwIs reduced and reduced, wherein
Figure BDA00029703452700001416
Is always less than
Figure BDA00029703452700001417
Furthermore, as can be seen from fig. 4a and 4b, the larger error vwMay result in the beamformer at coverage rate RbThe design of the aspect is poor. However, such a beamformer may interfere with Willie detection, which is also advantageous for Bob. Therefore, this trade-off should also be noted in the design of the robust beamformer.
FIG. 5 is a coverage ratio RbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically. Fig. 5 observes that the concealment rate R of two concealment constraints increases with the number of antennas NbThis is increased, similarly to the case of fig. 5. As can be seen from FIGS. 3a, 3b, 4a, 4b and 5, the blind constraint D (p)0||p1)≤2ε2Is higher than the two KL divergence cases D (p)1||p0)≤2ε2The rate of (c).
The invention provides a robust beamforming design method for covert communication of the internet of things, and a plurality of methods and approaches for implementing the technical scheme, where the foregoing is only a preferred embodiment of the invention, and it should be noted that, for those skilled in the art, a plurality of improvements and modifications may be made without departing from the principle of the invention, and these improvements and modifications should also be regarded as the protection scope of the invention. The components not specified in this embodiment can be realized by the prior art.

Claims (8)

1. A robust beam forming design method for hidden communication of the Internet of things is characterized by comprising the following steps:
step 1, establishing a covert communication environment;
and 2, under the condition of imperfect WCSI, carrying out hidden beam forming design.
2. The method of claim 1, wherein step 1 comprises: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, where
Figure FDA0002970345260000019
Representing a null hypothesis, that is, Alice does not send a private data stream to Bob;
Figure FDA00029703452600000110
represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an IRS intelligent reflecting surface with an intelligent controller is adopted to assist in hidden transmission.
3. The method according to claim 2, wherein in step 1, Alice is configured with N antennas, and N is a natural number; bob and Willie each have an antenna; order to
Figure FDA0002970345260000011
Figure FDA00029703452600000111
Representing a signal xbPower of xbA signal sent to Bob for Alice; make it
Figure FDA0002970345260000012
Wherein,
Figure FDA0002970345260000013
representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by using
Figure FDA0002970345260000014
Representing the channel coefficients from Alice to IRS;
by using
Figure FDA0002970345260000015
Events representing the sending of information by Alice to Bob, using
Figure FDA0002970345260000016
An event indicating that Alice does not send information to Bob.
4. The method of claim 3, wherein in step 1, from Willie's perspective, Alice's transmission signal x is as follows:
Figure FDA0002970345260000017
wherein wbIs xbSets Alice at
Figure FDA0002970345260000018
No signal is transmitted at the bottom and the beamforming vector wbIn that
Figure FDA0002970345260000021
The following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined by
Figure FDA0002970345260000022
Given that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use of
Figure FDA0002970345260000023
Modeling the reflection of IRS units, wherein
Figure FDA0002970345260000024
qmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
is provided with
Figure FDA0002970345260000025
To achieve maximum reflected power gain, q should satisfy:
|qm|=1,m=1,…M (3)
signal y received at BobbWriting into:
Figure FDA0002970345260000026
wherein z isbFor the received noise at Bob to be the received noise,
Figure FDA0002970345260000027
signal noise z representing BobbObeying a mean of 0 and a variance of
Figure FDA0002970345260000028
Complex gaussian distribution of (a); h isIBIs the channel coefficient from IRS to Bob,
Figure FDA0002970345260000029
is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,
Figure FDA00029703452600000210
is hABThe conjugate transpose of (c).
5. According toThe method of claim 4, wherein in step 1, Willie receives signal ywWriting into:
Figure FDA00029703452600000211
wherein z iswIs the noise received at Willie and,
Figure FDA00029703452600000212
signal noise z representing WilliewObeying a mean of 0 and a variance of
Figure FDA00029703452600000213
Complex gaussian distribution of (a); h isIWIs the channel coefficient from IRS to Willie,
Figure FDA00029703452600000214
is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,
Figure FDA00029703452600000215
is hAWThe conjugate transpose of (c).
6. The method of claim 5, wherein in step 1, R is setbIs a null hypothesis
Figure FDA00029703452600000216
The instantaneous rate of the next Bob, written as:
Figure FDA0002970345260000031
willie in
Figure FDA0002970345260000032
And
Figure FDA0002970345260000033
the likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
Figure FDA0002970345260000034
Figure FDA0002970345260000035
wherein
Figure FDA0002970345260000036
In
Figure FDA0002970345260000037
Signal noise z representing WilliewOf the noise variance, λ0And λ1Representing the auxiliary variable.
7. The method of claim 6, wherein in step 1, Willie wishes to minimize the probability of detection error ξ by applying an optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The total change between them is obtained by using the Pincker inequality:
Figure FDA0002970345260000038
Figure FDA0002970345260000039
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL of (a) D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
Figure FDA00029703452600000310
Figure FDA0002970345260000041
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
8. the method of claim 7, wherein step 2 comprises: the imperfect WCSI case refers to: willie is a common user, Alice does not know the channel state information about Willie and wants to acquire Bob's personal information, in which case Alice does not have perfect knowledge of CSI because Alice is a passive guard and channel estimation error;
imperfect WCSI is modeled as:
Figure FDA0002970345260000042
and:
Figure FDA0002970345260000043
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;
Figure FDA0002970345260000044
and
Figure FDA0002970345260000045
respectively representing a CSI channel state information estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
Figure FDA0002970345260000046
and
Figure FDA0002970345260000047
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;
Figure FDA0002970345260000048
represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;
Figure FDA0002970345260000049
represents Δ hIWThe conjugate transpose of (1);
Figure FDA0002970345260000051
axis of control ellipsoid, vAW>0,υIWDetermining the volume of the ellipsoid if more than 0 is needed;
the optimal rule for Willie to minimize detection error is the likelihood ratio test according to Neyman-Pearson's criterion:
Figure FDA0002970345260000052
according to
Figure FDA0002970345260000053
And
Figure FDA0002970345260000054
are respectively corresponding hypothesis
Figure FDA0002970345260000055
And
Figure FDA0002970345260000056
the binary decision of equation (16) is rewritten as:
Figure FDA0002970345260000057
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
Figure FDA0002970345260000058
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
Figure FDA0002970345260000059
and
Figure FDA00029703452600000510
lower yw|2Respectively, as the cumulative density function CDFs of
Figure FDA00029703452600000511
And
Figure FDA00029703452600000512
Figure FDA00029703452600000513
Figure FDA00029703452600000514
based on optimal detection threshold phi*Giving false alarm
Figure FDA00029703452600000515
And probability of missed detection
Figure FDA00029703452600000516
Comprises the following steps:
Figure FDA00029703452600000517
Figure FDA00029703452600000518
by using
Figure FDA00029703452600000519
And
Figure FDA00029703452600000520
to characterize the theory of WillieWant to detect the performance;
D(p0||p1)≤2ε2the case (2) is as follows:
using D (p) given by (11)0||p1)≤2ε2And D (p)1||p0)≤2ε2As a covert constraint;
the robust hiding rate maximization problem is expressed as the following problem (21):
Figure FDA0002970345260000061
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
Figure FDA0002970345260000062
Figure FDA0002970345260000063
Figure FDA0002970345260000064
using functions
Figure FDA0002970345260000065
Restating the hidden constraint (21b) for the property of x > 0
Figure FDA0002970345260000066
Equivalent transformation into:
Figure FDA0002970345260000067
wherein
Figure FDA0002970345260000068
And
Figure FDA0002970345260000069
is the equation
Figure FDA00029703452600000610
Two roots of (c); the constraint (21b) is equivalently restated as:
Figure FDA00029703452600000611
w in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
Figure FDA00029703452600000612
Figure FDA00029703452600000613
problem (24) was obtained:
Figure FDA00029703452600000614
Figure FDA00029703452600000615
Figure FDA0002970345260000071
Figure FDA0002970345260000072
wherein Q represents a phase shift matrix;
Figure FDA0002970345260000073
denotes gBThe conjugate transpose of (1);
Figure FDA0002970345260000074
signal noise z representing WilliewThe noise variance of (2);
Figure FDA0002970345260000075
and
Figure FDA0002970345260000076
is the equation
Figure FDA0002970345260000077
Two roots of (c); ptotalIs the maximum transmit power of Alice;
Figure FDA0002970345260000078
Figure FDA0002970345260000079
denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);
Figure FDA00029703452600000710
υW=υAWIW;εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variables
Figure FDA00029703452600000711
Is relaxed to
Figure FDA00029703452600000712
The constraint is equivalently re-expressed as:
Figure FDA00029703452600000713
Figure FDA00029703452600000714
wherein
Figure FDA00029703452600000715
Figure FDA00029703452600000716
Represents Δ gWConjugate transpose;
Figure FDA00029703452600000717
to represent
Figure FDA00029703452600000718
The conjugate transpose of (1);
Figure FDA00029703452600000719
representing a CSI estimate vector between IRS and Willie;
Figure FDA00029703452600000720
representing a CSI estimation vector between Alice and Willie;
application of SDR to
Figure FDA00029703452600000721
Then, the problem (24) is relaxed to obtain the following problem (26):
Figure FDA00029703452600000722
Figure FDA00029703452600000723
Figure FDA00029703452600000724
ΔgW∈εW, (26d)
(25a),(25b);
let function fm(x),m∈{1,2},
Figure FDA00029703452600000725
Is defined as:
Figure FDA00029703452600000726
wherein
Figure FDA0002970345260000081
Is a complex-early-late-matrix,
Figure FDA0002970345260000082
Figure FDA0002970345260000083
representing an N × 1-dimensional complex vector;
Figure FDA0002970345260000084
represents a one-dimensional real number;
if and only if there is a variable η ≧ 0,
Figure FDA0002970345260000085
such that:
Figure FDA0002970345260000086
constraints (25a) and (25b) are respectively converted into a finite number of LMIs linear matrix inequalities by S-Procedure:
Figure FDA0002970345260000087
Figure FDA0002970345260000088
therein, a conservative approximation of the problem (26) is obtained, namely the following problem (30):
Figure FDA0002970345260000089
s.t(26b),(26c),(29a),(29b);
let
Figure FDA00029703452600000810
Represents an optimal solution to the problem (30) if
Figure FDA00029703452600000811
Then
Figure FDA00029703452600000812
Is an optimal solution to the problem (30) and the optimal beamformer is derived by SVD
Figure FDA00029703452600000813
That is to say that the first and second electrodes,
Figure FDA00029703452600000814
otherwise, if
Figure FDA00029703452600000815
A gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30);
sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
Figure FDA00029703452600000816
Figure FDA00029703452600000817
Figure FDA00029703452600000818
applying SDR techniques to
Figure FDA00029703452600000819
And
Figure FDA00029703452600000820
to overcome non-convexity by removing
Figure FDA00029703452600000821
Re-expressing the problem (31) in relaxed form, i.e. the following problem (32):
Figure FDA0002970345260000091
Figure FDA0002970345260000092
Figure FDA0002970345260000093
Figure FDA0002970345260000094
wherein
Figure FDA0002970345260000095
Figure FDA0002970345260000096
Figure FDA0002970345260000097
EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
Figure FDA0002970345260000098
D(p1||p0)≤2ε2The case (2) is as follows:
the corresponding robust hiding rate maximization problem is expressed as the following problem (33):
Figure FDA0002970345260000099
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Figure FDA00029703452600000910
Figure FDA00029703452600000911
Figure FDA00029703452600000912
wherein
Figure FDA00029703452600000913
Covert restraint
Figure FDA00029703452600000914
Equivalent transformation is as follows:
Figure FDA0002970345260000101
wherein
Figure FDA0002970345260000102
Is an equation
Figure FDA0002970345260000103
Two roots of (2).
CN202110261814.0A 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things Active CN113055064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110261814.0A CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110261814.0A CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Publications (2)

Publication Number Publication Date
CN113055064A true CN113055064A (en) 2021-06-29
CN113055064B CN113055064B (en) 2022-02-01

Family

ID=76511062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110261814.0A Active CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Country Status (1)

Country Link
CN (1) CN113055064B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613273A (en) * 2021-08-09 2021-11-05 重庆邮电大学 Steady energy efficiency optimization method of intelligent super-surface auxiliary wireless power supply network
CN113949427A (en) * 2021-09-10 2022-01-18 中国人民解放军国防科技大学 Multi-user wireless network safety energy efficiency optimization design method and system
CN116015801A (en) * 2022-12-15 2023-04-25 西北大学 Construction method of practical hidden system based on combination of two-dimensional symbol spread spectrum and MIMO-NOMA
CN118054826A (en) * 2024-03-11 2024-05-17 兰州交通大学 Beam forming design method and system for high-speed rail short packet covert communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102253364A (en) * 2011-04-20 2011-11-23 电子科技大学 Passive non-cooperative target positioning method based on distributed irradiation source
US20200015085A1 (en) * 2017-09-30 2020-01-09 Shenzhen University Covert Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
CN111542054A (en) * 2020-05-08 2020-08-14 南京大学 Secure communication method and system based on programmable super surface
CN112272072A (en) * 2020-10-23 2021-01-26 中国矿业大学 Robust beam forming design method for non-ideal WCSI covert communication
CN112272073A (en) * 2020-10-23 2021-01-26 中国矿业大学 Hidden beam forming design method for ideal WCSI hidden communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102253364A (en) * 2011-04-20 2011-11-23 电子科技大学 Passive non-cooperative target positioning method based on distributed irradiation source
US20200015085A1 (en) * 2017-09-30 2020-01-09 Shenzhen University Covert Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
CN111542054A (en) * 2020-05-08 2020-08-14 南京大学 Secure communication method and system based on programmable super surface
CN112272072A (en) * 2020-10-23 2021-01-26 中国矿业大学 Robust beam forming design method for non-ideal WCSI covert communication
CN112272073A (en) * 2020-10-23 2021-01-26 中国矿业大学 Hidden beam forming design method for ideal WCSI hidden communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHAO WANG: "Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications:Joint Active and Passive Beamforming Optimization", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613273A (en) * 2021-08-09 2021-11-05 重庆邮电大学 Steady energy efficiency optimization method of intelligent super-surface auxiliary wireless power supply network
CN113613273B (en) * 2021-08-09 2023-12-26 浙江中蓝创新科技股份有限公司 Robust energy efficiency optimization method for intelligent super-surface auxiliary wireless power supply network
CN113949427A (en) * 2021-09-10 2022-01-18 中国人民解放军国防科技大学 Multi-user wireless network safety energy efficiency optimization design method and system
CN113949427B (en) * 2021-09-10 2023-10-24 中国人民解放军国防科技大学 Multi-user wireless network security energy efficiency optimization design method and system
CN116015801A (en) * 2022-12-15 2023-04-25 西北大学 Construction method of practical hidden system based on combination of two-dimensional symbol spread spectrum and MIMO-NOMA
CN118054826A (en) * 2024-03-11 2024-05-17 兰州交通大学 Beam forming design method and system for high-speed rail short packet covert communication

Also Published As

Publication number Publication date
CN113055064B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
CN113055064B (en) Steady beam forming design method for hidden communication of Internet of things
He et al. Full-duplex communication for ISAC: Joint beamforming and power optimization
Ling et al. Covert underwater acoustic communications
Huang et al. Randomized algorithms for optimal solutions of double-sided QCQP with applications in signal processing
CN113055065B (en) Internet of things hidden beam forming design method based on intelligent reflector
Ma et al. Covert mmWave communications with finite blocklength against spatially random wardens
Ma et al. Covert beamforming design for intelligent-reflecting-surface-assisted IoT networks
Su et al. Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security
Varade et al. Robust algorithms for DOA estimation and adaptive beamforming for smart antenna application
Shtaiwi et al. RIS-assisted mmWave channel estimation using convolutional neural networks
Zhu et al. Index modulation for fluid antenna-assisted MIMO communications: System design and performance analysis
Shi et al. Physical layer security techniques for data transmission for future wireless networks
de Sena et al. Dual-polarized massive MIMO-RSMA networks: Tackling imperfect SIC
Noh et al. Joint direct and indirect channel estimation for RIS-assisted millimeter-wave systems based on array signal processing
Ferreira et al. Physical Layer Security with Near-field Beamforming
Yang et al. Secure hybrid beamforming for IRS-assisted millimeter wave systems
Li et al. Robust secure beamforming design for cooperative cognitive radio nonorthogonal multiple access networks
CN112272073B (en) Hidden beam forming design method for ideal WCSI hidden communication
Liu et al. Integrated transmit waveform and ris phase shift design for lpi detection and communication
Xiao et al. Securing NextG networks with physical-layer key generation: A survey
Payami Hybrid beamforming for massive MIMO systems
Liu et al. RIS empowered near-field covert communications
CN112272072B (en) Robust beam forming design method for non-ideal WCSI covert communication
Kim Performance of decremental antenna selection algorithms for spatial multiplexing MIMO systems with linear receiver over correlated fading channels
Su et al. Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cram\'er-Rao Bound Optimization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant