CN113055064B - Steady beam forming design method for hidden communication of Internet of things - Google Patents
Steady beam forming design method for hidden communication of Internet of things Download PDFInfo
- Publication number
- CN113055064B CN113055064B CN202110261814.0A CN202110261814A CN113055064B CN 113055064 B CN113055064 B CN 113055064B CN 202110261814 A CN202110261814 A CN 202110261814A CN 113055064 B CN113055064 B CN 113055064B
- Authority
- CN
- China
- Prior art keywords
- willie
- alice
- bob
- representing
- irs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
- H04B7/043—Power distribution using best eigenmode, e.g. beam forming or beam steering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/04013—Intelligent reflective surfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/086—Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a robust beam forming design method for hidden communication of the Internet of things, which considers hidden beam forming design for an Intelligent Reflector (IRS) assisted Internet of things (IoT) network, researches the design of a joint beam forming device of Alice and can improve the hiding rate of Bob to the maximum extent when Alice does not completely know Willie Channel State Information (WCSI). For WCSI in a non-ideal state, an optimal decision threshold of Willie is deduced, and false alarm and missed detection probabilities in the case are analyzed. Furthermore, in this case, a robust beamformer based on relaxation, S-procedure and alternate iteration methods is built, taking advantage of the property of Kullback-Leibler dispersion.
Description
Technical Field
The invention relates to a robust beam forming design method for covert communication of the Internet of things.
Background
In the past few years, the internet of things (IoT) has been widely used in various fields of industry, agriculture, medicine, and the like. The number of intelligent communication devices has increased explosively, and data-hungry wireless applications have steadily increased, which requires internet-of-things networks to have higher spectrum and energy efficiency (cited documents: s.gong, x.lu, d.t.hoang, d.niyato, l.shu, d.i.kim, and y.c.liang, "heated small wireless communication vision in the illuminating surface: a coordinated overview," IEEE com.surv.turbine, vol.22, No.4, pp.2283-2314,2020.). Fortunately, Intelligent Reflective Surfaces (IRS) have recently been identified as a promising solution that can improve the spectral and energy efficiency of wireless networks by reconfiguring the wireless propagation environment.
IRS, also known as reconfigurable intelligent surface, is receiving wide attention in wireless communication applications. In particular, IRS is a planar surface consisting of a large number of low-cost passive reflective elements, each of which can independently reshape the phase, amplitude and reflection angle of an incident signal (cited in Q. Wu and R. Zhang, "transmitted small and reliable environment: Intelligent reflecting surface available wireless network," IEEE Commin. Magazine, vol.58, No.1, pp.106-112,2020 "), thereby intelligently adjusting the propagation channel to serve its own target. For example, signals reflected by IRS may be added or summed with signals reflected by non-IRS at the receiver to enhance the desired signal or suppress the undesired signal by adaptively adjusting the phase shift of the reflecting elements (cited references: X.Tan, Z.Sun, J.M.Jornet, and D.Pados, "incoming antenna reflected signal-array," in Proc. IEEE International Conference on Communications (ICC), 2016.).
The IRS auxiliary Internet of Things has the advantages of low hardware cost, low power consumption, simple structure and the like, and improves the quality of received signals by the unique electromagnetic characteristics (such as negative refraction, cited documents: G.Y u, X.Chen, C.ZHong, D.W.KWan Ng, and Z.Zhang, "Design, analysis, and optimization of a large intersecting reflecting surface-aid B5G cellular Internet of Things," IEEE Internet Things J., vol.7, No.9, pp.8902-8916,2020.).
However, due to the broadcast nature of wireless communication, IRS helps the internet of things to be easily eavesdropped, especially in some public areas such as classrooms, shopping malls and libraries. Recently, a large number of researchers have studied the safety of physical layers (cited document: M. Cui, G. Zhang, and R. Zhang, "Current Wireless communication via interacting communication interface," IEEE Wireless communication interface, "volume.8, No.5, pp.1410-1414,2019.) (cited document: L.Dong and H.Wang," Current MIMO transmission interface, "IEEE Wireless communication interface," volume.9, No.6, pp.787-790,2020.) (cited document: X.Y.u, D.xu, Y.Sun, D.W.K.Ng, and R.Scherer, "Rost and MIMO communication interface," MIMO.S.J.S.P.J.12, "Heart communication interface, C.S.J.1, C.S.12, C.S.N.N.N.N.P.N.N.P.C.S.S.J.S.C.S.C.S.C.C.C.C.S.S.C.C.C.S.C.S.S.C.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.C.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.S.S.No. Pat. No.6, C.S.S.S.S.S.S.No. Pat. No. 7.S.No. 7.S. No. 7.S.S.No. 7.S.S.S.S.S.S.S. No. 7.S. 7.S.S.S. 7.S. Pat. No. 7.S. No. 7. No. Pat. 7. No. 7. No.6, and S. 7. D.S.S.S.S. No. 7. D.S. No.7, S. K.S. K.S.S. K.S. K.S.S.S. K.S. K. 4, and R.S. K.S. 4, and R.S. S. K.S. K.S.S.S. K.S. S. K.S. S. K.S. K. K.S. S. of the cited document," S. K.S. S. K.S. S. S.S.S. S. K.S. K. K.S. S. K.S. S. S.S. S. K.S. S., "IEEE Trans. Inf. F organs Security, vol.16, pp.1655-1669,2021.) and covert communications (cited documents: lu, e.hossain, t.shafique, s.feng, h.jiang, and d.niyato, "Intelligent reflecting surface enabled coverage communications in wireless networks," IEEE net, vol.34, No.5, pp.148-155,2020 "). Physical Layer Security is primarily to prevent the transmitted wireless signal form From being decoded by an undesired user (cited documents: m.bloch and j.bars, Physical-Layer Security From Information Security to Security Engineering, u.k.: Cambridge univ, 2011), while covert communication is to hide the wireless signal From being discovered by an eavesdropper. In the literature: in m.cui, g.zhang, and r.zhang, "Secure Wireless communication view in reflecting surface," IEEE Wireless communication.lett., vol.8, No.5, pp.1410-1414,2019, the IRS may adaptively adjust the phase shift of the reflecting unit to enhance the desired signal and suppress the undesired signal, thereby maximally improving the security ratio. Researchers consider an IRS-assisted gaussian multiple-input multiple-output (MIMO) listening channel (cited document: l.dong and h.wang, "Secure MIMO transmission via adaptive redirection surface," IEEE Wireless communication.lett., vol.9, No.6, pp.787-790,2020.), whereas in documents: in x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communications via intersecting deflecting surfaces," IEEE j.sel.areas communications, vol.38, No.11, pp.2637-2652,2020 "), the joint design of a beamformer, an artificial noise covariance matrix, and a phase shifter in an infrared receiver was studied, and the influence of incomplete Channel State Information (CSI) of a intercepted channel was considered. By using IRS to improve safety performance, researchers are in the literature: one block coordinate descent optimization minimization (BCDMM) algorithm for MIMO secure communication systems is proposed in s.hong, c.pan, h.ren, k.wang, and a.nalalanathan, "architecture-noise-aided secure MIMO wireless communication view intersection deflecting surface," IEEE trans.communication ", vol.68, No.12, pp.7851-7866,2020. Furthermore, there are documents z.chu, w.hao, p.xiao, d.mi, z.liu, m.khalily, j.r.kelly, and a.p.fereidis, "correlation rate optimization for interpolating surface-applied MIMO systems," IEEE trans.inf.f. identities, vol.16, pp.1655-1669,2021 derive closed-form expressions of the Security and interference precoders by the Weighted Minimum Mean Square Error (WMMSE) algorithm and the Karush-Kuhn-tuner (kkt) condition, and derive phase shifts by the MM algorithm to obtain closed-form solutions thereof.
Furthermore, as evolving wireless systems face more and more security threats, even if the transmitted information is encrypted, the potential eavesdropping path is physically restricted, and the original data itself may expose confidential information. In the literature: lu, e.hossain, t.shafique, s.feng, h.jiang, and d.niyato, "Intelligent deflecting surface enabled covert communications in wireless networks," IEEE net, vol.34, No.5, pp.148-155,2020, the authors introduce covert communications techniques with IRS.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the technical problems in the background art, the invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
Has the advantages that: for the imperfect WCSI case, in the case of imperfect concealment constraints, the optimal threshold for Willie detection is derived and the corresponding detection error probability is proposed based on the robust beamforming vector. This result can be used as a theoretical basis for evaluating the concealment performance of the beamformer design. Furthermore, when Alice's WCSI is imperfect, the joint design of robust beamformer and IRS reflection beamformer targeting maximum achievable rates is studied and takes into account perfect blind transmission constraints, Alice's total transmit power constraints and IRS's QoS.
Drawings
The foregoing and/or other advantages of the invention will become further apparent from the following detailed description of the invention when taken in conjunction with the accompanying drawings.
Fig. 1 is a schematic diagram of a covert communication scenario.
FIG. 2a shows a concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 2b shows the concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 3a shows the proposed epsilon value and concealment rate RbAnd (5) a relational graph.
FIG. 3b shows the epsilon value and the probability of detection error according to the present inventionAnd (5) a relational graph.
FIG. 4a is a diagram of the proposed concealment rate R of the present inventionbAnd CSI error vwAnd (5) a relational graph.
FIG. 4b is a schematic diagram of the false alarm probability of the present inventionAnd probability of missed detectionAnd CSI error vwAnd (5) a relational graph.
FIG. 5 is a graph of the coverage rate R proposed by the present inventionbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically.
Detailed Description
In the invention, the following representation method is adopted: black bodyLower case letters and upper case letters represent vectors and matrices, respectively.| | |, Tr (·), Re (·) and Im (·) represent the desired, Frobenius norm, trace, real and imaginary parts of the parameter, respectively. OperatorIndicating that a is semi-positive.Expressed as mean μ and variance σ2A complex value circularly symmetric gaussian distribution.
The scenario considered by the present invention is shown in fig. 1, where Alice (base station) will transmit a private data stream xbSent to Bob (hidden user). The invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
The step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, whereRepresenting a null hypothesis, that is, Alice does not send a private data stream to Bob;represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an Intelligent Reflection Surface (IRS) with an intelligent controller is adopted to assist in covert transmission.
In step 1, it is set that Alice is provided withN antennas, wherein N is a natural number; bob and Willie each have an antenna; order toRepresenting a signal xb(xbSignal sent by Alice to Bob); make it
Wherein the content of the first and second substances,representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by usingEvents representing the sending of information by Alice to Bob, usingAn event indicating that Alice does not send information to Bob.
In step 1, from Willie's perspective, Alice's transmission signal x is as follows:
wherein wbIs xbSets Alice atNo signal is transmitted at the bottom and the beamforming vector wbIn thatThe following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined byGiven that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use ofModeling the reflection of IRS units, whereinqmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
|qm|=1,m=1,…M (3)
due to severe path loss, the signal reflected by IRS is ignored twice or more, the signal y received at BobbWriting into:
wherein z isbFor the received noise at Bob to be the received noise,signal noise z representing BobbObeying a mean of 0 and a variance ofComplex gaussian distribution. h isIBIs the channel coefficient from IRS to Bob,is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,is hABThe conjugate transpose of (c).
In step 1, Willie receives signal ywWriting into:
wherein z iswIs the noise received at Willie and,signal noise z representing WilliewObeying a mean of 0 and a variance ofComplex gaussian distribution. h isIWIs the channel coefficient from IRS to Willie,is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,is hAWThe conjugate transpose of (c).
willie inAndthe likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
wherein InSignal noise z representing WilliewOf the noise variance, λ0And λ1Representing the auxiliary variable.
In step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) Total change therebetween, usingThe Pinsker inequality (Flat-Stark inequality) (ref. T.M.Cover and J.A.Thomas, Elements of Information Theory, New York: Wiley,2006.) yields:
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL (Kullback-Leibler) divergence (Kullback-Leibler divergence relative entropy), D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is an ordinary user (i.e., Willie is not a legitimate user), Alice does not know channel state information about Willie, and wants to acquire personal information of Bob, in which case Alice is a passive gatekeeper (references D. goeckel, b. base, s. guha, and D. towsley, "cover communications places side not to point the background noise power," IEEE communications. let, vol.20, No.2, pp.236-239, feb.2016) and channel estimation errors (references m.forouzesh, p.azmi, n.mokari, and D. goeckel, "cover ni-use node and 3D. waiting information," CSI, 8568, IEEE 8525. 858, and No. 25. 12. c.25. for perfect;
imperfect WCSI is modeled as:
and:
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;andrespectively representing a CSI (channel state information) estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
and
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;represents Δ hIWThe conjugate transpose of (1);axis of control ellipsoid, vAW>0,υIW>0 determines the volume of an ellipsoid (ref. x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communication via intersecting reflecting surfaces," IEEE j.sel.areas communication, vol.38, No.11, pp.2637-2652,2020.);
willies assay performance:
for the imperfect WCSI condition, Willie's optimal decision threshold is studied, and corresponding false alarm and missed detection probabilities are given. In which the worst case of blind transmission is considered, in which case Willie knows the beamformer wb。
According to the Neyman-Pearson criterion (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork,2005.), the optimal rule for Willie to minimize detection errors is the likelihood ratio test (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork, 2005.):
according toAndare respectively corresponding hypothesisAndthe binary decision of equation (16) is rewritten as:
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
Based on optimal detection threshold phi*GiveFalse alarmAnd probability of missed detectionComprises the following steps:
D(p0||p1)≤2ε2the case (2) is as follows:
in practical applications, the obtained CSI is often corrupted by certain estimation errors (references l.wang, w.wornell, and l.zheng, "Fundamental limits of communication with low mobility of detection," IEEE trans. inf.theory, vol.62, No.6, pp.3493-3503, jun.2016.). Therefore, a robust beamforming design is proposed to maximize Bob's concealment rate Rb. In this case, it is difficult to achieve perfect blind transmission, i.e., D (p)0||p1) 0. On this basis, D (p) given by (11) is employed0||p1)≤2ε2And D (p)1||p0)≤2ε2As covert constraints (references s.yan, y.cong, s.v. handle, and x.zhou, "Gaussian signalling for coverage communications," IEEE trans. wireless communications, vol.18, No.7, pp.3542-3553,2019.);
the robust hiding rate maximization problem is expressed as the following problem (21):
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
using functionsFor x>0 to restate the hidden constraint (21b), the hidden constraintEquivalent transformation into:
due to delta hAW∈εAWAnd Δ hIW∈εIWIn constraints (21e) and (21f), Δ hAWOr Δ hIWThere are infinite options. This makes the problem (21) non-convex and difficult to solve. To overcome this challenge, a method of relaxing and constraining was proposed.
W in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
problem (24) was obtained:
wherein Q represents a phase shift matrix;denotes gBThe conjugate transpose of (1);signal noise z representing WilliewThe noise variance of (2);andis the equationTwo roots of (c); ptotalIs the maximum transmit power of Alice; denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);εWfinger gWA range expression of the CSI error vector of (a); relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variablesIs relaxed toThe constraint is equivalently re-expressed as:
wherein Represents Δ gWConjugate transpose;to representThe conjugate transpose of (1);representing a CSI estimate vector between IRS and Willie;representing a CSI estimation vector between Alice and Willie;
ΔgW∈εW, (26d)
(25a),(25b);
note that the objective function and constraints areIs linear and thus the SDR problem (26) is quasi-convex. However, the problem (26) remains computationally difficult to solve because of Δ gW∈εWIt contains an infinite number of constraints. An infinite number of constraints are recast into a set of Linear Matrix Inequalities (LMIs) using the S-Procedure, which is an easy-to-handle approximation.
Quotation 1(S-Procedure, ref. D.W.K.Ng, E.S.Lo, and R.Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE transactions. Wireless communication, vol.13, No.8, pp.4599-4615,2014.): setting functionIs defined as:
whereinIs a complex-early-late-matrix,representing an N × 1-dimensional complex vector;represents a one-dimensional real number;
constraints (25a) and (25b) are converted into a finite number of LMIs (Linear matrix inequality) respectively by S-Procedure (S-lemma):
a conservative approximation of the problem (26) is obtained, namely the following problem (30):
s.t(26b),(26c),(29a),(29b);
the problem (30) is a convex SDP problem and can therefore be solved optimally using the interior point method. In the same way, letRepresents an optimal solution to the problem (30). If it is notThenIs an optimal solution to the problem (30) and the optimal beamformer is derived by SVDThat is to say that the first and second electrodes,otherwise, ifThen a gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30) (referenceThe documents Z.Luo, W.Ma, A.M.so, Y.Ye, and S.Zhang, "Semidefinite repetition of quadrature optimization schemes," IEEE Signal Process.Mag., vol.27, No.3, pp.20-34,2010 ].
Sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
applying SDR techniques toAndto overcome non-convexity by removingRe-expressing the problem (31) in relaxed form, i.e. the following problem (32):
EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
The problem (32) is a convex SDP problem that can be solved optimally using the interior point method. It should be noted that due to the relaxation of SDR, the optimal solutionMay not be the optimal solution to the problem (32).
D(p1||p0)≤2ε2The case (2) is as follows:
considering the constraint D (p)1||p0)≤2ε2The case (1). The corresponding robust hiding rate maximization problem is expressed as the following problem (33):
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Note that problem (33) is similar to problem (21), except for the hidden constraints. Covert restraintEquivalent transformation is as follows:
The problem is solved (33) using an alternating iterative, relaxation and constraint approach.
In step 2, the following procedure was used to address problem (21):
step a1, initialize setting1NRefers to an N × 1 vector whose elements are all 1;indicating that the problem (21) has in iteration kWith variable quantityAnda target value of (d);
step a3, setting k to k + 1;
step a4, given q(k-1)Solving the problem (30);
Step a7, untilE denotes a threshold value, typically set at 10-3The effect is the accuracy of the control parameter, E>0;
Step a8, solvingAnd q is(k)Performing Gaussian randomization to obtain an approximate solutionAnd q is(k)Then updated
3.1 evaluation of scene 2
First, the robust beamformer design proposed in the scenario of Alice and imperfect WCSI (Willie's channel state information) was evaluated.
FIGS. 2a and 2b show the concealment threshold 2 ε according to the invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And D (p)0||p1) And the cumulative density function CDF. FIGS. 2a and 2b show the error parameter for CSI as upsilon, respectivelyw=2×10-4D (p) of0||p1) And D (p)1||p0) The empirical Cumulative Density Function (CDF). The concealment threshold values of both robust and non-robust designs are 2 epsilon20.02, i.e. D (p)0||p1) Less than or equal to 0.02 and D (p)1||p0) Less than or equal to 0.02. As can be seen from fig. 2a and 2b, the CDF in the non-robust design KL divergence cannot satisfy the constraint. On the other hand, the robust beamforming design ensures the requirement of KL divergence, namely, the requirement of Willie on the probability of false detection is met. Non-robust design here means that under the same conditions, use is made ofAndthe proposed implicit design. Overall, fig. 2a and 2b verify the necessity and effectiveness of the proposed robust design.
Fig. 3a and 3b are graphs of the value of epsilon versus the concealment rate and the detection error probability. FIG. 3a plots the covert constraint D (p)0||p1)≤2ε2And D (p)1||p0)≤2ε2At the value of epsilon ofbPlot against ε value, where CSI error υw=2×10-4,P total5 dBm. WhereinRepresents D (p)0||p1)≤2ε2Probability of false alarm of timeThe other notation is defined as such. Simulation results and theoryThe theoretical analysis is consistent, i.e. as ε becomes larger, the blind constraint becomes loose, resulting in RbBecomes larger. FIG. 3b plots the false alarm probabilityAnd probability of missed detectionAnd CSI error vw=2×10-4The value of epsilon. It can be observed that under two different covert constraints, the false alarm probabilityAnd probability of missed detectionDecreases with increasing epsilon, whereinIs always less thanThis indicates that the more relaxed the transformation constraints, the better Willie detection performance. In addition, fig. 3b also verifies the effectiveness of the proposed robust beamformer design in covert communications, i.e.Thus, from fig. 3a and 3b, the trade-off between Willie's detection performance and Bob's coverage is revealed, and the desired trade-off can be achieved by a suitably robust beamforming design.
FIGS. 4a and 4b show the probability of detection error versus CSI error upsilon for a concealment rate and epsilon of 0.1wAnd (4) a relation graph of the ratio. FIG. 4a depicts D (p) at two KL divergence cases0||p1)≤2ε2And D (p)1||p0)≤2ε2Lower hiding ratio RbAnd CSI error vwThe relationship (2) of (c). As can be seen from FIG. 4a, the CSI error vwThe higher the implemented hiding rate RbThe lower. FIG. 4b is a graph showingHidden under-constraint false alarm probabilityAnd probability of missed detectionAnd CSI error vwThe relationship (2) of (c). We have observed that in both cases of covert constraints, the false alarm probabilityAnd probability of missed detectionAre all dependent on upsilonwIs reduced and reduced, whereinIs always less thanFurthermore, as can be seen from fig. 4a and 4b, the larger error vwMay result in the beamformer at coverage rate RbThe design of the aspect is poor. However, such a beamformer may interfere with Willie detection, which is also advantageous for Bob. Therefore, this trade-off should also be noted in the design of the robust beamformer.
FIG. 5 is a coverage ratio RbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically. Fig. 5 observes that the concealment rate R of two concealment constraints increases with the number of antennas NbThis is increased, similarly to the case of fig. 5. As can be seen from FIGS. 3a, 3b, 4a, 4b and 5, the blind constraint D (p)0||p1)≤2ε2Is higher than the two KL divergence cases D (p)1||p0)≤2ε2The rate of (c).
The invention provides a robust beamforming design method for covert communication of the internet of things, and a plurality of methods and approaches for implementing the technical scheme, where the foregoing is only a preferred embodiment of the invention, it should be noted that, for those skilled in the art, a plurality of improvements and modifications may be made without departing from the principle of the invention, and these improvements and modifications should also be considered as the protection scope of the invention. All the components not specified in the present embodiment can be realized by the prior art.
Claims (1)
1. A robust beam forming design method for hidden communication of the Internet of things is characterized by comprising the following steps:
step 1, establishing a covert communication environment;
step 2, under the condition of imperfect WCSI, carrying out hidden beam forming design;
the step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, whereRepresenting a null hypothesis, that is, Alice does not send a private data stream to Bob;represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an IRS intelligent reflecting surface with an intelligent controller is adopted to assist in hidden transmission;
in the step 1, Alice is set to be provided with N antennae, and N is a natural number; bob and Willie each have an antenna; order toRepresenting a signal xbPower of xbA signal sent to Bob for Alice; make itWherein the content of the first and second substances,representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by usingEvents representing the sending of information by Alice to Bob, usingAn event indicating that Alice does not send information to Bob;
in step 1, from Willie's perspective, Alice's transmission signal x is as follows:
wherein wbIs xbSets Alice atNo signal is transmitted at the bottom and the beamforming vector wbIn thatThe following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined byGiven that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use ofModeling the reflection of IRS units, whereinqmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
|qm|=1,m=1,…M (3)
signal y received at BobbWriting into:
wherein z isbFor the received noise at Bob to be the received noise,signal noise z representing BobbObeying a mean of 0 and a variance ofComplex gaussian distribution of (a); h isIBIs the channel coefficient from IRS to Bob,is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,is hABThe conjugate transpose of (1);
in step 1, Willie receives signal ywWriting into:
wherein z iswIs the noise received at Willie and,signal noise z representing WilliewObeying a mean of 0 and a variance ofComplex gaussian distribution of (a); h isIWIs the channel coefficient from IRS to Willie,is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,is hAWThe conjugate transpose of (1);
willie inAndthe likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
whereinInSignal noise z representing WilliewOf the noise variance, λ0And λ1Representing an auxiliary variable;
in step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The total change between them is obtained by using the Pincker inequality:
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL of (a) D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b);
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is a common user, Alice does not know the channel state information about Willie and wants to acquire Bob's personal information, in which case Alice does not have perfect knowledge of CSI because Alice is a passive guard and channel estimation error;
imperfect WCSI is modeled as:
and:
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;andrespectively representing a CSI channel state information estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
and
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;represents Δ hIWThe conjugate transpose of (1);axis of control ellipsoid, vAW>0,υIW>0 determining ellipseA sphere volume;
the optimal rule for Willie to minimize detection error is the likelihood ratio test according to Neyman-Pearson's criterion:
according toAndare respectively corresponding hypothesisAndthe binary decision of equation (16) is rewritten as:
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
based on optimal detection threshold phi*Giving false alarmAnd probability of missed detectionComprises the following steps:
D(p0||p1)≤2ε2the case (2) is as follows:
using D (p) given by (11)0||p1)≤2ε2And D (p)1||p0)≤2ε2As a covert constraint;
the robust hiding rate maximization problem is expressed as the following problem (21):
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
using functionsFor x>0 to restate the hidden constraint (21b), the hidden constraintEquivalent transformation into:
w in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
problem (24) was obtained:
wherein Q represents a phase shift matrix;denotes gBThe conjugate transpose of (1);signal noise z representing WilliewThe noise variance of (2);andis the equationTwo roots of (c); ptotalIs the maximum transmit power of Alice; denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);υW=υAW+υIW;εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variablesIs relaxed toThe constraint is equivalently re-expressed as:
wherein Represents Δ gWConjugate transpose;to representThe conjugate transpose of (1);representing a CSI estimate vector between IRS and Willie;representing a CSI estimation vector between Alice and Willie;
ΔgW∈εW, (26d)
(25a),(25b);
whereinIs a complex-early-late-matrix, representing an N × 1-dimensional complex vector;represents a one-dimensional real number;
constraints (25a) and (25b) are respectively converted into a finite number of LMIs linear matrix inequalities by S-Procedure:
therein, a conservative approximation of the problem (26) is obtained, namely the following problem (30):
s.t(26b),(26c),(29a),(29b);
letRepresents an optimal solution to the problem (30) ifThenIs an optimal solution to the problem (30) and the optimal beamformer is derived by SVDThat is to say that the first and second electrodes,otherwise, ifA gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30);
sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
applying SDR techniques toAndto overcome non-convexity by removingRe-expressing the problem (31) in relaxed form, i.e. the following problem (32):
wherein EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
D(p1||p0)≤2ε2The case (2) is as follows:
the corresponding robust hiding rate maximization problem is expressed as the following problem (33):
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110261814.0A CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110261814.0A CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113055064A CN113055064A (en) | 2021-06-29 |
CN113055064B true CN113055064B (en) | 2022-02-01 |
Family
ID=76511062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110261814.0A Active CN113055064B (en) | 2021-03-10 | 2021-03-10 | Steady beam forming design method for hidden communication of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113055064B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613273B (en) * | 2021-08-09 | 2023-12-26 | 浙江中蓝创新科技股份有限公司 | Robust energy efficiency optimization method for intelligent super-surface auxiliary wireless power supply network |
CN113949427B (en) * | 2021-09-10 | 2023-10-24 | 中国人民解放军国防科技大学 | Multi-user wireless network security energy efficiency optimization design method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253364A (en) * | 2011-04-20 | 2011-11-23 | 电子科技大学 | Passive non-cooperative target positioning method based on distributed irradiation source |
CN112272072A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Robust beam forming design method for non-ideal WCSI covert communication |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019061516A1 (en) * | 2017-09-30 | 2019-04-04 | 深圳大学 | Concealed wireless communication physical-layer slope authentication method and apparatus |
CN111542054B (en) * | 2020-05-08 | 2023-01-06 | 南京大学 | Secure communication method and system based on programmable super surface |
CN112272073B (en) * | 2020-10-23 | 2021-12-21 | 中国矿业大学 | Hidden beam forming design method for ideal WCSI hidden communication |
-
2021
- 2021-03-10 CN CN202110261814.0A patent/CN113055064B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253364A (en) * | 2011-04-20 | 2011-11-23 | 电子科技大学 | Passive non-cooperative target positioning method based on distributed irradiation source |
CN112272072A (en) * | 2020-10-23 | 2021-01-26 | 中国矿业大学 | Robust beam forming design method for non-ideal WCSI covert communication |
Non-Patent Citations (1)
Title |
---|
Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications:Joint Active and Passive Beamforming Optimization;Chao Wang;《IEEE TRANSACTIONS ON COMMUNICATIONS》;20210226;第1-2节以及图1 * |
Also Published As
Publication number | Publication date |
---|---|
CN113055064A (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113055065B (en) | Internet of things hidden beam forming design method based on intelligent reflector | |
Song et al. | Adaptive millimeter wave beam alignment for dual-polarized MIMO systems | |
CN113055064B (en) | Steady beam forming design method for hidden communication of Internet of things | |
Wen et al. | Transmit waveform design for dual-function radar-communication systems via hybrid linear-nonlinear precoding | |
Wen et al. | Efficient transceiver design for MIMO dual-function radar-communication systems | |
Ma et al. | Covert beamforming design for intelligent-reflecting-surface-assisted IoT networks | |
Ma et al. | Covert mmWave communications with finite blocklength against spatially random wardens | |
Su et al. | Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security | |
Chu et al. | Joint secure transmit beamforming designs for integrated sensing and communication systems | |
Shtaiwi et al. | RIS-assisted mmWave channel estimation using convolutional neural networks | |
Nandan et al. | Intelligent Reflecting Surface (IRS) assisted mmWave Wireless Communication Systems: A Survey. | |
Zhu et al. | Index modulation for fluid antenna-assisted MIMO communications: System design and performance analysis | |
Shin et al. | Limited channel feedback scheme for reconfigurable intelligent surface assisted MU-MIMO wireless communication systems | |
CN112272073B (en) | Hidden beam forming design method for ideal WCSI hidden communication | |
Shi et al. | Physical layer security techniques for data transmission for future wireless networks | |
Nuti et al. | Spectral efficiency vs complexity in downlink algorithms for reconfigurable intelligent surfaces | |
CN112272072B (en) | Robust beam forming design method for non-ideal WCSI covert communication | |
Xiao et al. | Securing NextG networks with physical-layer key generation: A survey | |
Bromberg et al. | The Use of Programmable DSPs in Antenna Array Processing | |
Adeogun et al. | Channel prediction for millimeter wave MIMO systems in 3D propagation environments | |
Liu et al. | RIS Empowered Near-Field Covert Communications | |
Chen et al. | Robust adaptive beamforming based on matched spectrum processing with little prior information | |
de Sena et al. | Massive IRS-MIMO-RSMA with Polarization Multiplexing: An Enhanced SIC-Free Approach | |
Ahmed et al. | Linear array processing using modified singular value decomposition | |
Pezeshki et al. | Beyond codebook-based analog beamforming at mmwave: Compressed sensing and machine learning methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |