CN113055064B - Steady beam forming design method for hidden communication of Internet of things - Google Patents

Steady beam forming design method for hidden communication of Internet of things Download PDF

Info

Publication number
CN113055064B
CN113055064B CN202110261814.0A CN202110261814A CN113055064B CN 113055064 B CN113055064 B CN 113055064B CN 202110261814 A CN202110261814 A CN 202110261814A CN 113055064 B CN113055064 B CN 113055064B
Authority
CN
China
Prior art keywords
willie
alice
bob
representing
irs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110261814.0A
Other languages
Chinese (zh)
Other versions
CN113055064A (en
Inventor
马帅
盛海鸿
张蕴琪
李世银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202110261814.0A priority Critical patent/CN113055064B/en
Publication of CN113055064A publication Critical patent/CN113055064A/en
Application granted granted Critical
Publication of CN113055064B publication Critical patent/CN113055064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • H04B7/043Power distribution using best eigenmode, e.g. beam forming or beam steering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/04013Intelligent reflective surfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
    • H04B7/0837Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
    • H04B7/0842Weighted combining
    • H04B7/086Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a robust beam forming design method for hidden communication of the Internet of things, which considers hidden beam forming design for an Intelligent Reflector (IRS) assisted Internet of things (IoT) network, researches the design of a joint beam forming device of Alice and can improve the hiding rate of Bob to the maximum extent when Alice does not completely know Willie Channel State Information (WCSI). For WCSI in a non-ideal state, an optimal decision threshold of Willie is deduced, and false alarm and missed detection probabilities in the case are analyzed. Furthermore, in this case, a robust beamformer based on relaxation, S-procedure and alternate iteration methods is built, taking advantage of the property of Kullback-Leibler dispersion.

Description

Steady beam forming design method for hidden communication of Internet of things
Technical Field
The invention relates to a robust beam forming design method for covert communication of the Internet of things.
Background
In the past few years, the internet of things (IoT) has been widely used in various fields of industry, agriculture, medicine, and the like. The number of intelligent communication devices has increased explosively, and data-hungry wireless applications have steadily increased, which requires internet-of-things networks to have higher spectrum and energy efficiency (cited documents: s.gong, x.lu, d.t.hoang, d.niyato, l.shu, d.i.kim, and y.c.liang, "heated small wireless communication vision in the illuminating surface: a coordinated overview," IEEE com.surv.turbine, vol.22, No.4, pp.2283-2314,2020.). Fortunately, Intelligent Reflective Surfaces (IRS) have recently been identified as a promising solution that can improve the spectral and energy efficiency of wireless networks by reconfiguring the wireless propagation environment.
IRS, also known as reconfigurable intelligent surface, is receiving wide attention in wireless communication applications. In particular, IRS is a planar surface consisting of a large number of low-cost passive reflective elements, each of which can independently reshape the phase, amplitude and reflection angle of an incident signal (cited in Q. Wu and R. Zhang, "transmitted small and reliable environment: Intelligent reflecting surface available wireless network," IEEE Commin. Magazine, vol.58, No.1, pp.106-112,2020 "), thereby intelligently adjusting the propagation channel to serve its own target. For example, signals reflected by IRS may be added or summed with signals reflected by non-IRS at the receiver to enhance the desired signal or suppress the undesired signal by adaptively adjusting the phase shift of the reflecting elements (cited references: X.Tan, Z.Sun, J.M.Jornet, and D.Pados, "incoming antenna reflected signal-array," in Proc. IEEE International Conference on Communications (ICC), 2016.).
The IRS auxiliary Internet of Things has the advantages of low hardware cost, low power consumption, simple structure and the like, and improves the quality of received signals by the unique electromagnetic characteristics (such as negative refraction, cited documents: G.Y u, X.Chen, C.ZHong, D.W.KWan Ng, and Z.Zhang, "Design, analysis, and optimization of a large intersecting reflecting surface-aid B5G cellular Internet of Things," IEEE Internet Things J., vol.7, No.9, pp.8902-8916,2020.).
However, due to the broadcast nature of wireless communication, IRS helps the internet of things to be easily eavesdropped, especially in some public areas such as classrooms, shopping malls and libraries. Recently, a large number of researchers have studied the safety of physical layers (cited document: M. Cui, G. Zhang, and R. Zhang, "Current Wireless communication via interacting communication interface," IEEE Wireless communication interface, "volume.8, No.5, pp.1410-1414,2019.) (cited document: L.Dong and H.Wang," Current MIMO transmission interface, "IEEE Wireless communication interface," volume.9, No.6, pp.787-790,2020.) (cited document: X.Y.u, D.xu, Y.Sun, D.W.K.Ng, and R.Scherer, "Rost and MIMO communication interface," MIMO.S.J.S.P.J.12, "Heart communication interface, C.S.J.1, C.S.12, C.S.N.N.N.N.P.N.N.P.C.S.S.J.S.C.S.C.S.C.C.C.C.S.S.C.C.C.S.C.S.S.C.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.C.S.S.S.S.S.S.C.S.S.S.S.S.S.S.S.S.S.No. Pat. No.6, C.S.S.S.S.S.S.No. Pat. No. 7.S.No. 7.S. No. 7.S.S.No. 7.S.S.S.S.S.S.S. No. 7.S. 7.S.S.S. 7.S. Pat. No. 7.S. No. 7. No. Pat. 7. No. 7. No.6, and S. 7. D.S.S.S.S. No. 7. D.S. No.7, S. K.S. K.S.S. K.S. K.S.S.S. K.S. K. 4, and R.S. K.S. 4, and R.S. S. K.S. K.S.S.S. K.S. S. K.S. S. K.S. K. K.S. S. of the cited document," S. K.S. S. K.S. S. S.S.S. S. K.S. K. K.S. S. K.S. S. S.S. S. K.S. S., "IEEE Trans. Inf. F organs Security, vol.16, pp.1655-1669,2021.) and covert communications (cited documents: lu, e.hossain, t.shafique, s.feng, h.jiang, and d.niyato, "Intelligent reflecting surface enabled coverage communications in wireless networks," IEEE net, vol.34, No.5, pp.148-155,2020 "). Physical Layer Security is primarily to prevent the transmitted wireless signal form From being decoded by an undesired user (cited documents: m.bloch and j.bars, Physical-Layer Security From Information Security to Security Engineering, u.k.: Cambridge univ, 2011), while covert communication is to hide the wireless signal From being discovered by an eavesdropper. In the literature: in m.cui, g.zhang, and r.zhang, "Secure Wireless communication view in reflecting surface," IEEE Wireless communication.lett., vol.8, No.5, pp.1410-1414,2019, the IRS may adaptively adjust the phase shift of the reflecting unit to enhance the desired signal and suppress the undesired signal, thereby maximally improving the security ratio. Researchers consider an IRS-assisted gaussian multiple-input multiple-output (MIMO) listening channel (cited document: l.dong and h.wang, "Secure MIMO transmission via adaptive redirection surface," IEEE Wireless communication.lett., vol.9, No.6, pp.787-790,2020.), whereas in documents: in x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communications via intersecting deflecting surfaces," IEEE j.sel.areas communications, vol.38, No.11, pp.2637-2652,2020 "), the joint design of a beamformer, an artificial noise covariance matrix, and a phase shifter in an infrared receiver was studied, and the influence of incomplete Channel State Information (CSI) of a intercepted channel was considered. By using IRS to improve safety performance, researchers are in the literature: one block coordinate descent optimization minimization (BCDMM) algorithm for MIMO secure communication systems is proposed in s.hong, c.pan, h.ren, k.wang, and a.nalalanathan, "architecture-noise-aided secure MIMO wireless communication view intersection deflecting surface," IEEE trans.communication ", vol.68, No.12, pp.7851-7866,2020. Furthermore, there are documents z.chu, w.hao, p.xiao, d.mi, z.liu, m.khalily, j.r.kelly, and a.p.fereidis, "correlation rate optimization for interpolating surface-applied MIMO systems," IEEE trans.inf.f. identities, vol.16, pp.1655-1669,2021 derive closed-form expressions of the Security and interference precoders by the Weighted Minimum Mean Square Error (WMMSE) algorithm and the Karush-Kuhn-tuner (kkt) condition, and derive phase shifts by the MM algorithm to obtain closed-form solutions thereof.
Furthermore, as evolving wireless systems face more and more security threats, even if the transmitted information is encrypted, the potential eavesdropping path is physically restricted, and the original data itself may expose confidential information. In the literature: lu, e.hossain, t.shafique, s.feng, h.jiang, and d.niyato, "Intelligent deflecting surface enabled covert communications in wireless networks," IEEE net, vol.34, No.5, pp.148-155,2020, the authors introduce covert communications techniques with IRS.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the technical problems in the background art, the invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
step 1, establishing a covert communication environment;
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
Has the advantages that: for the imperfect WCSI case, in the case of imperfect concealment constraints, the optimal threshold for Willie detection is derived and the corresponding detection error probability is proposed based on the robust beamforming vector. This result can be used as a theoretical basis for evaluating the concealment performance of the beamformer design. Furthermore, when Alice's WCSI is imperfect, the joint design of robust beamformer and IRS reflection beamformer targeting maximum achievable rates is studied and takes into account perfect blind transmission constraints, Alice's total transmit power constraints and IRS's QoS.
Drawings
The foregoing and/or other advantages of the invention will become further apparent from the following detailed description of the invention when taken in conjunction with the accompanying drawings.
Fig. 1 is a schematic diagram of a covert communication scenario.
FIG. 2a shows a concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 2b shows the concealment threshold 2 ε according to the present invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And the cumulative density function CDF.
FIG. 3a shows the proposed epsilon value and concealment rate RbAnd (5) a relational graph.
FIG. 3b shows the epsilon value and the probability of detection error according to the present invention
Figure GDA0003030702870000031
And (5) a relational graph.
FIG. 4a is a diagram of the proposed concealment rate R of the present inventionbAnd CSI error vwAnd (5) a relational graph.
FIG. 4b is a schematic diagram of the false alarm probability of the present invention
Figure GDA0003030702870000032
And probability of missed detection
Figure GDA0003030702870000033
And CSI error vwAnd (5) a relational graph.
FIG. 5 is a graph of the coverage rate R proposed by the present inventionbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically.
Detailed Description
In the invention, the following representation method is adopted: black bodyLower case letters and upper case letters represent vectors and matrices, respectively.
Figure GDA0003030702870000034
| | |, Tr (·), Re (·) and Im (·) represent the desired, Frobenius norm, trace, real and imaginary parts of the parameter, respectively. Operator
Figure GDA0003030702870000039
Indicating that a is semi-positive.
Figure GDA0003030702870000035
Expressed as mean μ and variance σ2A complex value circularly symmetric gaussian distribution.
The scenario considered by the present invention is shown in fig. 1, where Alice (base station) will transmit a private data stream xbSent to Bob (hidden user). The invention provides a robust beam forming design method for covert communication of the Internet of things, which comprises the following steps:
step 1, establishing a covert communication environment;
and step 2, under the condition of imperfect WCSI (Willie channel state information), carrying out concealed beam forming design.
The step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, where
Figure GDA0003030702870000036
Representing a null hypothesis, that is, Alice does not send a private data stream to Bob;
Figure GDA0003030702870000037
represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an Intelligent Reflection Surface (IRS) with an intelligent controller is adopted to assist in covert transmission.
In step 1, it is set that Alice is provided withN antennas, wherein N is a natural number; bob and Willie each have an antenna; order to
Figure GDA0003030702870000038
Representing a signal xb(xbSignal sent by Alice to Bob); make it
Figure GDA0003030702870000041
Wherein the content of the first and second substances,
Figure GDA0003030702870000042
representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by using
Figure GDA0003030702870000043
Representing the channel coefficients from Alice to IRS;
by using
Figure GDA0003030702870000044
Events representing the sending of information by Alice to Bob, using
Figure GDA0003030702870000045
An event indicating that Alice does not send information to Bob.
In step 1, from Willie's perspective, Alice's transmission signal x is as follows:
Figure GDA0003030702870000046
wherein wbIs xbSets Alice at
Figure GDA0003030702870000047
No signal is transmitted at the bottom and the beamforming vector wbIn that
Figure GDA0003030702870000048
The following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined by
Figure GDA0003030702870000049
Given that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use of
Figure GDA00030307028700000410
Modeling the reflection of IRS units, wherein
Figure GDA00030307028700000411
qmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
is provided with
Figure GDA00030307028700000412
To achieve maximum reflected power gain, q should satisfy:
|qm|=1,m=1,…M (3)
due to severe path loss, the signal reflected by IRS is ignored twice or more, the signal y received at BobbWriting into:
Figure GDA00030307028700000413
wherein z isbFor the received noise at Bob to be the received noise,
Figure GDA0003030702870000051
signal noise z representing BobbObeying a mean of 0 and a variance of
Figure GDA0003030702870000052
Complex gaussian distribution. h isIBIs the channel coefficient from IRS to Bob,
Figure GDA0003030702870000053
is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,
Figure GDA0003030702870000054
is hABThe conjugate transpose of (c).
In step 1, Willie receives signal ywWriting into:
Figure GDA0003030702870000055
wherein z iswIs the noise received at Willie and,
Figure GDA0003030702870000056
signal noise z representing WilliewObeying a mean of 0 and a variance of
Figure GDA0003030702870000057
Complex gaussian distribution. h isIWIs the channel coefficient from IRS to Willie,
Figure GDA0003030702870000058
is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,
Figure GDA0003030702870000059
is hAWThe conjugate transpose of (c).
In step 1, R is setbIs a null hypothesis
Figure GDA00030307028700000510
The instantaneous rate of the next Bob, written as:
Figure GDA00030307028700000511
willie in
Figure GDA00030307028700000512
And
Figure GDA00030307028700000513
the likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
Figure GDA00030307028700000514
Figure GDA00030307028700000515
wherein
Figure GDA00030307028700000516
Figure GDA00030307028700000517
In
Figure GDA00030307028700000518
Signal noise z representing WilliewOf the noise variance, λ0And λ1Representing the auxiliary variable.
In step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) Total change therebetween, usingThe Pinsker inequality (Flat-Stark inequality) (ref. T.M.Cover and J.A.Thomas, Elements of Information Theory, New York: Wiley,2006.) yields:
Figure GDA0003030702870000061
Figure GDA0003030702870000062
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL (Kullback-Leibler) divergence (Kullback-Leibler divergence relative entropy), D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
Figure GDA0003030702870000063
Figure GDA0003030702870000064
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b)。
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is an ordinary user (i.e., Willie is not a legitimate user), Alice does not know channel state information about Willie, and wants to acquire personal information of Bob, in which case Alice is a passive gatekeeper (references D. goeckel, b. base, s. guha, and D. towsley, "cover communications places side not to point the background noise power," IEEE communications. let, vol.20, No.2, pp.236-239, feb.2016) and channel estimation errors (references m.forouzesh, p.azmi, n.mokari, and D. goeckel, "cover ni-use node and 3D. waiting information," CSI, 8568, IEEE 8525. 858, and No. 25. 12. c.25. for perfect;
imperfect WCSI is modeled as:
Figure GDA0003030702870000065
and:
Figure GDA0003030702870000066
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;
Figure GDA0003030702870000067
and
Figure GDA0003030702870000068
respectively representing a CSI (channel state information) estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
Figure GDA0003030702870000071
and
Figure GDA0003030702870000072
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;
Figure GDA0003030702870000073
represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;
Figure GDA0003030702870000074
represents Δ hIWThe conjugate transpose of (1);
Figure GDA0003030702870000075
axis of control ellipsoid, vAW>0,υIW>0 determines the volume of an ellipsoid (ref. x.y u, d.xu, y.sun, d.w.k.ng, and r.schober, "Robust and secure wireless communication via intersecting reflecting surfaces," IEEE j.sel.areas communication, vol.38, No.11, pp.2637-2652,2020.);
willies assay performance:
for the imperfect WCSI condition, Willie's optimal decision threshold is studied, and corresponding false alarm and missed detection probabilities are given. In which the worst case of blind transmission is considered, in which case Willie knows the beamformer wb
According to the Neyman-Pearson criterion (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork,2005.), the optimal rule for Willie to minimize detection errors is the likelihood ratio test (ref. E.L.Lehmann and J.P.Romano, Testing Statistical Hypotheses, spring New Y ork, 2005.):
Figure GDA0003030702870000076
according to
Figure GDA0003030702870000077
And
Figure GDA0003030702870000078
are respectively corresponding hypothesis
Figure GDA0003030702870000079
And
Figure GDA00030307028700000710
the binary decision of equation (16) is rewritten as:
Figure GDA00030307028700000711
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
Figure GDA00030307028700000712
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
Figure GDA0003030702870000081
and
Figure GDA0003030702870000082
lower yw|2Respectively, as the cumulative density function CDFs of
Figure GDA0003030702870000083
Figure GDA0003030702870000084
Figure GDA0003030702870000085
Based on optimal detection threshold phi*GiveFalse alarm
Figure GDA0003030702870000086
And probability of missed detection
Figure GDA0003030702870000087
Comprises the following steps:
Figure GDA0003030702870000088
Figure GDA0003030702870000089
by using
Figure GDA00030307028700000810
And
Figure GDA00030307028700000811
the expression of (a) to characterize the ideal detection performance of Willie;
D(p0||p1)≤2ε2the case (2) is as follows:
in practical applications, the obtained CSI is often corrupted by certain estimation errors (references l.wang, w.wornell, and l.zheng, "Fundamental limits of communication with low mobility of detection," IEEE trans. inf.theory, vol.62, No.6, pp.3493-3503, jun.2016.). Therefore, a robust beamforming design is proposed to maximize Bob's concealment rate Rb. In this case, it is difficult to achieve perfect blind transmission, i.e., D (p)0||p1) 0. On this basis, D (p) given by (11) is employed0||p1)≤2ε2And D (p)1||p0)≤2ε2As covert constraints (references s.yan, y.cong, s.v. handle, and x.zhou, "Gaussian signalling for coverage communications," IEEE trans. wireless communications, vol.18, No.7, pp.3542-3553,2019.);
the robust hiding rate maximization problem is expressed as the following problem (21):
Figure GDA00030307028700000812
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
Figure GDA00030307028700000813
Figure GDA0003030702870000091
Figure GDA0003030702870000092
using functions
Figure GDA0003030702870000093
For x>0 to restate the hidden constraint (21b), the hidden constraint
Figure GDA0003030702870000094
Equivalent transformation into:
Figure GDA0003030702870000095
wherein
Figure GDA0003030702870000096
And
Figure GDA0003030702870000097
is the equation
Figure GDA0003030702870000098
Two roots of (c); the constraint (21b) is equivalently restated as:
Figure GDA0003030702870000099
due to delta hAW∈εAWAnd Δ hIW∈εIWIn constraints (21e) and (21f), Δ hAWOr Δ hIWThere are infinite options. This makes the problem (21) non-convex and difficult to solve. To overcome this challenge, a method of relaxing and constraining was proposed.
W in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
Figure GDA00030307028700000910
Figure GDA00030307028700000911
problem (24) was obtained:
Figure GDA00030307028700000912
Figure GDA00030307028700000913
Figure GDA00030307028700000914
Figure GDA00030307028700000915
wherein Q represents a phase shift matrix;
Figure GDA00030307028700000916
denotes gBThe conjugate transpose of (1);
Figure GDA00030307028700000917
signal noise z representing WilliewThe noise variance of (2);
Figure GDA00030307028700000918
and
Figure GDA00030307028700000919
is the equation
Figure GDA00030307028700000920
Two roots of (c); ptotalIs the maximum transmit power of Alice;
Figure GDA0003030702870000101
Figure GDA0003030702870000102
denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);
Figure GDA0003030702870000103
εWfinger gWA range expression of the CSI error vector of (a); relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variables
Figure GDA0003030702870000104
Is relaxed to
Figure GDA0003030702870000105
The constraint is equivalently re-expressed as:
Figure GDA0003030702870000106
Figure GDA0003030702870000107
wherein
Figure GDA0003030702870000108
Figure GDA0003030702870000109
Represents Δ gWConjugate transpose;
Figure GDA00030307028700001010
to represent
Figure GDA00030307028700001011
The conjugate transpose of (1);
Figure GDA00030307028700001012
representing a CSI estimate vector between IRS and Willie;
Figure GDA00030307028700001013
representing a CSI estimation vector between Alice and Willie;
application of SDR to
Figure GDA00030307028700001014
Then, the problem (24) is relaxed to obtain the following problem (26):
Figure GDA00030307028700001015
Figure GDA00030307028700001016
Figure GDA00030307028700001017
ΔgW∈εW, (26d)
(25a),(25b);
note that the objective function and constraints are
Figure GDA00030307028700001018
Is linear and thus the SDR problem (26) is quasi-convex. However, the problem (26) remains computationally difficult to solve because of Δ gW∈εWIt contains an infinite number of constraints. An infinite number of constraints are recast into a set of Linear Matrix Inequalities (LMIs) using the S-Procedure, which is an easy-to-handle approximation.
Quotation 1(S-Procedure, ref. D.W.K.Ng, E.S.Lo, and R.Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE transactions. Wireless communication, vol.13, No.8, pp.4599-4615,2014.): setting function
Figure GDA00030307028700001019
Is defined as:
Figure GDA00030307028700001020
wherein
Figure GDA0003030702870000111
Is a complex-early-late-matrix,
Figure GDA0003030702870000112
representing an N × 1-dimensional complex vector;
Figure GDA0003030702870000113
represents a one-dimensional real number;
if and only if there is a variable η ≧ 0,
Figure GDA0003030702870000114
such that:
Figure GDA0003030702870000115
constraints (25a) and (25b) are converted into a finite number of LMIs (Linear matrix inequality) respectively by S-Procedure (S-lemma):
Figure GDA0003030702870000116
Figure GDA0003030702870000117
a conservative approximation of the problem (26) is obtained, namely the following problem (30):
Figure GDA0003030702870000118
s.t(26b),(26c),(29a),(29b);
the problem (30) is a convex SDP problem and can therefore be solved optimally using the interior point method. In the same way, let
Figure GDA0003030702870000119
Represents an optimal solution to the problem (30). If it is not
Figure GDA00030307028700001110
Then
Figure GDA00030307028700001111
Is an optimal solution to the problem (30) and the optimal beamformer is derived by SVD
Figure GDA00030307028700001112
That is to say that the first and second electrodes,
Figure GDA00030307028700001113
otherwise, if
Figure GDA00030307028700001114
Then a gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30) (referenceThe documents Z.Luo, W.Ma, A.M.so, Y.Ye, and S.Zhang, "Semidefinite repetition of quadrature optimization schemes," IEEE Signal Process.Mag., vol.27, No.3, pp.20-34,2010 ].
Sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
Figure GDA00030307028700001115
Figure GDA00030307028700001116
Figure GDA00030307028700001117
applying SDR techniques to
Figure GDA00030307028700001118
And
Figure GDA00030307028700001119
to overcome non-convexity by removing
Figure GDA00030307028700001120
Re-expressing the problem (31) in relaxed form, i.e. the following problem (32):
Figure GDA0003030702870000121
Figure GDA0003030702870000122
Figure GDA0003030702870000123
Figure GDA0003030702870000124
wherein
Figure GDA0003030702870000125
Figure GDA0003030702870000126
Figure GDA0003030702870000127
EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
Figure GDA0003030702870000128
The problem (32) is a convex SDP problem that can be solved optimally using the interior point method. It should be noted that due to the relaxation of SDR, the optimal solution
Figure GDA0003030702870000129
May not be the optimal solution to the problem (32).
D(p1||p0)≤2ε2The case (2) is as follows:
considering the constraint D (p)1||p0)≤2ε2The case (1). The corresponding robust hiding rate maximization problem is expressed as the following problem (33):
Figure GDA00030307028700001210
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Figure GDA00030307028700001211
Figure GDA00030307028700001212
Figure GDA00030307028700001213
wherein
Figure GDA0003030702870000131
Note that problem (33) is similar to problem (21), except for the hidden constraints. Covert restraint
Figure GDA0003030702870000132
Equivalent transformation is as follows:
Figure GDA0003030702870000133
wherein
Figure GDA0003030702870000134
Is an equation
Figure GDA0003030702870000135
Two roots of (2).
The problem is solved (33) using an alternating iterative, relaxation and constraint approach.
In step 2, the following procedure was used to address problem (21):
step a1, initialize setting
Figure GDA0003030702870000136
1NRefers to an N × 1 vector whose elements are all 1;
Figure GDA0003030702870000137
indicating that the problem (21) has in iteration kWith variable quantity
Figure GDA0003030702870000138
And
Figure GDA0003030702870000139
a target value of (d);
step a2, when
Figure GDA00030307028700001310
Repeating steps a3 through a 6;
step a3, setting k to k + 1;
step a4, given q(k-1)Solving the problem (30);
step a5, given
Figure GDA00030307028700001311
Solving a problem (32);
step a6, providing
Figure GDA00030307028700001312
Step a7, until
Figure GDA00030307028700001313
E denotes a threshold value, typically set at 10-3The effect is the accuracy of the control parameter, E>0;
Step a8, solving
Figure GDA00030307028700001314
And q is(k)Performing Gaussian randomization to obtain an approximate solution
Figure GDA00030307028700001315
And q is(k)Then updated
Figure GDA00030307028700001316
3.1 evaluation of scene 2
First, the robust beamformer design proposed in the scenario of Alice and imperfect WCSI (Willie's channel state information) was evaluated.
FIGS. 2a and 2b show the concealment threshold 2 ε according to the invention20.02, CSI error υw=2×10-4Then, D (p)0||p1) And D (p)0||p1) And the cumulative density function CDF. FIGS. 2a and 2b show the error parameter for CSI as upsilon, respectivelyw=2×10-4D (p) of0||p1) And D (p)1||p0) The empirical Cumulative Density Function (CDF). The concealment threshold values of both robust and non-robust designs are 2 epsilon20.02, i.e. D (p)0||p1) Less than or equal to 0.02 and D (p)1||p0) Less than or equal to 0.02. As can be seen from fig. 2a and 2b, the CDF in the non-robust design KL divergence cannot satisfy the constraint. On the other hand, the robust beamforming design ensures the requirement of KL divergence, namely, the requirement of Willie on the probability of false detection is met. Non-robust design here means that under the same conditions, use is made of
Figure GDA0003030702870000141
And
Figure GDA0003030702870000142
the proposed implicit design. Overall, fig. 2a and 2b verify the necessity and effectiveness of the proposed robust design.
Fig. 3a and 3b are graphs of the value of epsilon versus the concealment rate and the detection error probability. FIG. 3a plots the covert constraint D (p)0||p1)≤2ε2And D (p)1||p0)≤2ε2At the value of epsilon ofbPlot against ε value, where CSI error υw=2×10-4P total5 dBm. Wherein
Figure GDA00030307028700001417
Represents D (p)0||p1)≤2ε2Probability of false alarm of time
Figure GDA0003030702870000143
The other notation is defined as such. Simulation results and theoryThe theoretical analysis is consistent, i.e. as ε becomes larger, the blind constraint becomes loose, resulting in RbBecomes larger. FIG. 3b plots the false alarm probability
Figure GDA0003030702870000144
And probability of missed detection
Figure GDA0003030702870000145
And CSI error vw=2×10-4The value of epsilon. It can be observed that under two different covert constraints, the false alarm probability
Figure GDA0003030702870000146
And probability of missed detection
Figure GDA0003030702870000147
Decreases with increasing epsilon, wherein
Figure GDA0003030702870000148
Is always less than
Figure GDA0003030702870000149
This indicates that the more relaxed the transformation constraints, the better Willie detection performance. In addition, fig. 3b also verifies the effectiveness of the proposed robust beamformer design in covert communications, i.e.
Figure GDA00030307028700001410
Thus, from fig. 3a and 3b, the trade-off between Willie's detection performance and Bob's coverage is revealed, and the desired trade-off can be achieved by a suitably robust beamforming design.
FIGS. 4a and 4b show the probability of detection error versus CSI error upsilon for a concealment rate and epsilon of 0.1wAnd (4) a relation graph of the ratio. FIG. 4a depicts D (p) at two KL divergence cases0||p1)≤2ε2And D (p)1||p0)≤2ε2Lower hiding ratio RbAnd CSI error vwThe relationship (2) of (c). As can be seen from FIG. 4a, the CSI error vwThe higher the implemented hiding rate RbThe lower. FIG. 4b is a graph showingHidden under-constraint false alarm probability
Figure GDA00030307028700001411
And probability of missed detection
Figure GDA00030307028700001412
And CSI error vwThe relationship (2) of (c). We have observed that in both cases of covert constraints, the false alarm probability
Figure GDA00030307028700001413
And probability of missed detection
Figure GDA00030307028700001414
Are all dependent on upsilonwIs reduced and reduced, wherein
Figure GDA00030307028700001415
Is always less than
Figure GDA00030307028700001416
Furthermore, as can be seen from fig. 4a and 4b, the larger error vwMay result in the beamformer at coverage rate RbThe design of the aspect is poor. However, such a beamformer may interfere with Willie detection, which is also advantageous for Bob. Therefore, this trade-off should also be noted in the design of the robust beamformer.
FIG. 5 is a coverage ratio RbAnd CSI error vw=2×10-4The relationship of the number of antennas N is shown schematically. Fig. 5 observes that the concealment rate R of two concealment constraints increases with the number of antennas NbThis is increased, similarly to the case of fig. 5. As can be seen from FIGS. 3a, 3b, 4a, 4b and 5, the blind constraint D (p)0||p1)≤2ε2Is higher than the two KL divergence cases D (p)1||p0)≤2ε2The rate of (c).
The invention provides a robust beamforming design method for covert communication of the internet of things, and a plurality of methods and approaches for implementing the technical scheme, where the foregoing is only a preferred embodiment of the invention, it should be noted that, for those skilled in the art, a plurality of improvements and modifications may be made without departing from the principle of the invention, and these improvements and modifications should also be considered as the protection scope of the invention. All the components not specified in the present embodiment can be realized by the prior art.

Claims (1)

1. A robust beam forming design method for hidden communication of the Internet of things is characterized by comprising the following steps:
step 1, establishing a covert communication environment;
step 2, under the condition of imperfect WCSI, carrying out hidden beam forming design;
the step 1 comprises the following steps: alice represents the base station, Willie represents the eavesdropper, Bob represents the hidden user, and Alice represents the private data stream xbIs sent to Bob, where
Figure FDA00033448876500000110
Representing a null hypothesis, that is, Alice does not send a private data stream to Bob;
Figure FDA00033448876500000111
represents another assumption that Alice sends a private data stream to Bob;
meanwhile, Willie is observing the communication environment as an eavesdropper and tries to identify whether Alice is transmitting to Bob; in order to protect the confidential signals from eavesdropping, an IRS intelligent reflecting surface with an intelligent controller is adopted to assist in hidden transmission;
in the step 1, Alice is set to be provided with N antennae, and N is a natural number; bob and Willie each have an antenna; order to
Figure FDA0003344887650000011
Representing a signal xbPower of xbA signal sent to Bob for Alice; make it
Figure FDA0003344887650000012
Wherein the content of the first and second substances,
Figure FDA0003344887650000013
representing a set of complex matrices; h isABIs an Nx 1 complex matrix, which means the channel coefficient from Alice to Bob; h isAWIs an Nx 1 complex matrix, which means the channel coefficients from Alice to Willie; h isIBIs an Mx 1 complex matrix, which means IRS to Bob channel coefficients; h isIWIs an M multiplied by 1 complex matrix, which refers to IRS to Willie channel coefficients;
by using
Figure FDA0003344887650000014
Representing the channel coefficients from Alice to IRS;
by using
Figure FDA0003344887650000015
Events representing the sending of information by Alice to Bob, using
Figure FDA0003344887650000016
An event indicating that Alice does not send information to Bob;
in step 1, from Willie's perspective, Alice's transmission signal x is as follows:
Figure FDA0003344887650000017
wherein wbIs xbSets Alice at
Figure FDA0003344887650000018
No signal is transmitted at the bottom and the beamforming vector wbIn that
Figure FDA0003344887650000019
The following constraints are satisfied:
||wb||2≤Ptotal (2)
in the formula PtotalIs the maximum transmit power of Alice;
the phase shift matrix Q is determined by
Figure FDA0003344887650000021
Given that Q represents a phase shift matrix whose diagonal elements are the corresponding elements Q of the vector; use of
Figure FDA0003344887650000022
Modeling the reflection of IRS units, wherein
Figure FDA0003344887650000023
qmReflecting model of the M-th unit, j is an imaginary number, and when M is 1, … M, thetamE [0,2 π) and βm∈[0,1]Respectively representing the controllable phase shift and the amplitude reflection coefficient introduced by the mth unit;
is provided with
Figure FDA0003344887650000024
To achieve maximum reflected power gain, q should satisfy:
|qm|=1,m=1,…M (3)
signal y received at BobbWriting into:
Figure FDA0003344887650000025
wherein z isbFor the received noise at Bob to be the received noise,
Figure FDA0003344887650000026
signal noise z representing BobbObeying a mean of 0 and a variance of
Figure FDA0003344887650000027
Complex gaussian distribution of (a); h isIBIs the channel coefficient from IRS to Bob,
Figure FDA0003344887650000028
is hIBThe conjugate transpose of (1); h isABThe channel coefficients for Alice to Bob are,
Figure FDA0003344887650000029
is hABThe conjugate transpose of (1);
in step 1, Willie receives signal ywWriting into:
Figure FDA00033448876500000210
wherein z iswIs the noise received at Willie and,
Figure FDA00033448876500000211
signal noise z representing WilliewObeying a mean of 0 and a variance of
Figure FDA00033448876500000212
Complex gaussian distribution of (a); h isIWIs the channel coefficient from IRS to Willie,
Figure FDA00033448876500000213
is hIWThe conjugate transpose of (1); h isAWFor the Alice to Willie channel coefficients,
Figure FDA00033448876500000214
is hAWThe conjugate transpose of (1);
in step 1, R is setbIs a null hypothesis
Figure FDA00033448876500000215
The instantaneous rate of the next Bob, written as:
Figure FDA00033448876500000216
willie in
Figure FDA00033448876500000217
And
Figure FDA00033448876500000218
the likelihood functions of the lower received signals are respectively expressed as p0(yw) And p1(yw);
According to formula (5), p0(yw) And p1(yw) Respectively as follows:
Figure FDA0003344887650000031
Figure FDA0003344887650000032
wherein
Figure FDA0003344887650000033
In
Figure FDA0003344887650000034
Signal noise z representing WilliewOf the noise variance, λ0And λ1Representing an auxiliary variable;
in step 1, Willie wants to minimize the detection error probability ξ by applying the optimal detector, setting:
ξ=1-VT(p0,p1), (8)
wherein VT(p0,p1) Is p0(yw) And p1(yw) The total change between them is obtained by using the Pincker inequality:
Figure FDA0003344887650000035
Figure FDA0003344887650000036
wherein D (p)0||p1) Represents from p0(yw) To p1(yw) KL of (a) D (p)1||p0) Is from p1(yw) To p0(yw) KL divergence of (1);
D(p0||p1) And D (p)1||p0) Respectively as follows:
Figure FDA0003344887650000037
Figure FDA0003344887650000038
to achieve implicit communication with a given ξ, i.e., ξ ≧ 1- ε, the KL divergence of the likelihood function satisfies one of the following constraints:
D(p0||p1)≤2ε2, (11a)
D(p1||p0)≤2ε2 (11b);
the step 2 comprises the following steps: the imperfect WCSI case refers to: willie is a common user, Alice does not know the channel state information about Willie and wants to acquire Bob's personal information, in which case Alice does not have perfect knowledge of CSI because Alice is a passive guard and channel estimation error;
imperfect WCSI is modeled as:
Figure FDA0003344887650000041
and:
Figure FDA0003344887650000042
wherein h isAWIs the channel coefficient h from Alice to WillieIWRefer to the IRS to Willie channel coefficients;
Figure FDA0003344887650000043
and
Figure FDA0003344887650000044
respectively representing a CSI channel state information estimation vector between Alice and Willie and a CSI estimation vector between Willie and IRS;
ΔhAWrepresenting the CSI error vectors of Alice to Willie;
ΔhIWa CSI error vector representing IRS to Willie;
CSI error vector Δ hAWAnd Δ hIWIs characterized by an elliptical area, namely:
Figure FDA0003344887650000045
and
Figure FDA0003344887650000046
wherein epsilonAWA range expression referring to the CSI error vector from Alice to Willie;
Figure FDA0003344887650000047
represents Δ hAWThe conjugate transpose of (1); epsilonIWRefers to the range representation of the IRS to Willie CSI error vector;
Figure FDA0003344887650000048
represents Δ hIWThe conjugate transpose of (1);
Figure FDA0003344887650000049
axis of control ellipsoid, vAW>0,υIW>0 determining ellipseA sphere volume;
the optimal rule for Willie to minimize detection error is the likelihood ratio test according to Neyman-Pearson's criterion:
Figure FDA00033448876500000410
according to
Figure FDA00033448876500000411
And
Figure FDA00033448876500000412
are respectively corresponding hypothesis
Figure FDA00033448876500000413
And
Figure FDA00033448876500000414
the binary decision of equation (16) is rewritten as:
Figure FDA0003344887650000051
wherein phi*Is yw|2The optimal detection threshold of (a) is as follows:
Figure FDA0003344887650000052
λ0and λ1Dependent on the beamforming vector wbAnd an IRS reflected beam forming vector q;
Figure FDA0003344887650000053
and
Figure FDA0003344887650000054
lower latticeyw|2Respectively, as the cumulative density function CDFs of
Figure FDA0003344887650000055
And
Figure FDA0003344887650000056
Figure FDA0003344887650000057
Figure FDA0003344887650000058
based on optimal detection threshold phi*Giving false alarm
Figure FDA0003344887650000059
And probability of missed detection
Figure FDA00033448876500000510
Comprises the following steps:
Figure FDA00033448876500000511
Figure FDA00033448876500000512
by using
Figure FDA00033448876500000513
And
Figure FDA00033448876500000514
the expression of (a) to characterize the ideal detection performance of Willie;
D(p0||p1)≤2ε2the case (2) is as follows:
using D (p) given by (11)0||p1)≤2ε2And D (p)1||p0)≤2ε2As a covert constraint;
the robust hiding rate maximization problem is expressed as the following problem (21):
Figure FDA00033448876500000515
s.t D(p0||p1)≤2ε2 (21b)
||wb||2≤Ptotal, (21c)
Figure FDA00033448876500000516
Figure FDA0003344887650000061
Figure FDA0003344887650000062
using functions
Figure FDA0003344887650000063
For x>0 to restate the hidden constraint (21b), the hidden constraint
Figure FDA0003344887650000064
Equivalent transformation into:
Figure FDA0003344887650000065
wherein
Figure FDA0003344887650000066
And
Figure FDA0003344887650000067
is the equation
Figure FDA0003344887650000068
Two roots of (c); the constraint (21b) is equivalently restated as:
Figure FDA0003344887650000069
w in the alternative optimization problem (21)bAnd q, decomposed into two subproblems 1 and 2 as follows:
sub-problem 1:
optimizing wbGiven q: to solve the problem (21), the beamformer w is optimized by fixing q under the constraints (21b), (21c), (21e) and (21f)bDefining the auxiliary variable gB、gWAnd
Figure FDA00033448876500000610
Figure FDA00033448876500000611
problem (24) was obtained:
Figure FDA00033448876500000612
Figure FDA00033448876500000613
Figure FDA00033448876500000614
Figure FDA00033448876500000615
wherein Q represents a phase shift matrix;
Figure FDA00033448876500000616
denotes gBThe conjugate transpose of (1);
Figure FDA00033448876500000617
signal noise z representing WilliewThe noise variance of (2);
Figure FDA00033448876500000618
and
Figure FDA00033448876500000619
is the equation
Figure FDA00033448876500000620
Two roots of (c); ptotalIs the maximum transmit power of Alice;
Figure FDA0003344887650000071
Figure FDA0003344887650000072
denotes gWThe CSI estimation vector of (1); Δ gWDenotes gWThe CSI vector error of (1);
Figure FDA0003344887650000073
υW=υAWIW;εWfinger gWA range expression of the CSI error vector of (a);
relaxing the constraint (24b) to a convex form by applying SDR, by applying auxiliary variables
Figure FDA0003344887650000074
Is relaxed to
Figure FDA0003344887650000075
The constraint is equivalently re-expressed as:
Figure FDA0003344887650000076
Figure FDA0003344887650000077
wherein
Figure FDA0003344887650000078
Figure FDA0003344887650000079
Represents Δ gWConjugate transpose;
Figure FDA00033448876500000710
to represent
Figure FDA00033448876500000711
The conjugate transpose of (1);
Figure FDA00033448876500000712
representing a CSI estimate vector between IRS and Willie;
Figure FDA00033448876500000713
representing a CSI estimation vector between Alice and Willie;
application of SDR to
Figure FDA00033448876500000714
Then, the problem (24) is relaxed to obtain the following problem (26):
Figure FDA00033448876500000715
Figure FDA00033448876500000716
Figure FDA00033448876500000717
ΔgW∈εW, (26d)
(25a),(25b);
let function fm(x),m∈{1,2},
Figure FDA00033448876500000718
Is defined as:
Figure FDA00033448876500000719
wherein
Figure FDA00033448876500000720
Is a complex-early-late-matrix,
Figure FDA00033448876500000721
Figure FDA00033448876500000722
representing an N × 1-dimensional complex vector;
Figure FDA00033448876500000723
represents a one-dimensional real number;
if and only if there is a variable η ≧ 0,
Figure FDA00033448876500000724
such that:
Figure FDA00033448876500000725
constraints (25a) and (25b) are respectively converted into a finite number of LMIs linear matrix inequalities by S-Procedure:
Figure FDA0003344887650000081
Figure FDA0003344887650000082
therein, a conservative approximation of the problem (26) is obtained, namely the following problem (30):
Figure FDA0003344887650000083
s.t(26b),(26c),(29a),(29b);
let
Figure FDA0003344887650000084
Represents an optimal solution to the problem (30) if
Figure FDA0003344887650000085
Then
Figure FDA0003344887650000086
Is an optimal solution to the problem (30) and the optimal beamformer is derived by SVD
Figure FDA0003344887650000087
That is to say that the first and second electrodes,
Figure FDA0003344887650000088
otherwise, if
Figure FDA0003344887650000089
A gaussian randomization process is employed to produce a high quality rank 1 solution to the problem (30);
sub-problem 2:
given wbOptimizing q: at a fixed wbConsidering the design of q on the basis of (1), in this case the problem (21) translates into a problem (31) of the form:
Figure FDA00033448876500000810
Figure FDA00033448876500000811
Figure FDA00033448876500000812
applying SDR techniques to
Figure FDA00033448876500000813
And
Figure FDA00033448876500000814
to overcome non-convexity by removing
Figure FDA00033448876500000815
Re-expressing the problem (31) in relaxed form, i.e. the following problem (32):
Figure FDA00033448876500000816
Figure FDA00033448876500000817
Figure FDA00033448876500000818
Figure FDA00033448876500000819
wherein
Figure FDA0003344887650000091
Figure FDA0003344887650000092
Figure FDA0003344887650000093
EmIs an M +1 dimensional matrix, and the (i, j) th element is marked as [ Em]i,jSatisfy the following requirements
Figure FDA0003344887650000094
D(p1||p0)≤2ε2The case (2) is as follows:
the corresponding robust hiding rate maximization problem is expressed as the following problem (33):
Figure FDA0003344887650000095
s.t D(p1||p0)≤2ε2, (33b)
||wb||2≤Ptotal, (33c)
Figure FDA0003344887650000096
Figure FDA0003344887650000097
Figure FDA0003344887650000098
wherein
Figure FDA0003344887650000099
Covert restraint
Figure FDA00033448876500000910
Equivalent transformation is as follows:
Figure FDA00033448876500000911
wherein
Figure FDA00033448876500000912
Is an equation
Figure FDA00033448876500000913
Two roots of (2).
CN202110261814.0A 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things Active CN113055064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110261814.0A CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110261814.0A CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Publications (2)

Publication Number Publication Date
CN113055064A CN113055064A (en) 2021-06-29
CN113055064B true CN113055064B (en) 2022-02-01

Family

ID=76511062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110261814.0A Active CN113055064B (en) 2021-03-10 2021-03-10 Steady beam forming design method for hidden communication of Internet of things

Country Status (1)

Country Link
CN (1) CN113055064B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613273B (en) * 2021-08-09 2023-12-26 浙江中蓝创新科技股份有限公司 Robust energy efficiency optimization method for intelligent super-surface auxiliary wireless power supply network
CN113949427B (en) * 2021-09-10 2023-10-24 中国人民解放军国防科技大学 Multi-user wireless network security energy efficiency optimization design method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102253364A (en) * 2011-04-20 2011-11-23 电子科技大学 Passive non-cooperative target positioning method based on distributed irradiation source
CN112272072A (en) * 2020-10-23 2021-01-26 中国矿业大学 Robust beam forming design method for non-ideal WCSI covert communication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019061516A1 (en) * 2017-09-30 2019-04-04 深圳大学 Concealed wireless communication physical-layer slope authentication method and apparatus
CN111542054B (en) * 2020-05-08 2023-01-06 南京大学 Secure communication method and system based on programmable super surface
CN112272073B (en) * 2020-10-23 2021-12-21 中国矿业大学 Hidden beam forming design method for ideal WCSI hidden communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102253364A (en) * 2011-04-20 2011-11-23 电子科技大学 Passive non-cooperative target positioning method based on distributed irradiation source
CN112272072A (en) * 2020-10-23 2021-01-26 中国矿业大学 Robust beam forming design method for non-ideal WCSI covert communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Intelligent Reflecting Surface-Assisted Multi-Antenna Covert Communications:Joint Active and Passive Beamforming Optimization;Chao Wang;《IEEE TRANSACTIONS ON COMMUNICATIONS》;20210226;第1-2节以及图1 *

Also Published As

Publication number Publication date
CN113055064A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN113055065B (en) Internet of things hidden beam forming design method based on intelligent reflector
Song et al. Adaptive millimeter wave beam alignment for dual-polarized MIMO systems
CN113055064B (en) Steady beam forming design method for hidden communication of Internet of things
Wen et al. Transmit waveform design for dual-function radar-communication systems via hybrid linear-nonlinear precoding
Wen et al. Efficient transceiver design for MIMO dual-function radar-communication systems
Ma et al. Covert beamforming design for intelligent-reflecting-surface-assisted IoT networks
Ma et al. Covert mmWave communications with finite blocklength against spatially random wardens
Su et al. Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security
Chu et al. Joint secure transmit beamforming designs for integrated sensing and communication systems
Shtaiwi et al. RIS-assisted mmWave channel estimation using convolutional neural networks
Nandan et al. Intelligent Reflecting Surface (IRS) assisted mmWave Wireless Communication Systems: A Survey.
Zhu et al. Index modulation for fluid antenna-assisted MIMO communications: System design and performance analysis
Shin et al. Limited channel feedback scheme for reconfigurable intelligent surface assisted MU-MIMO wireless communication systems
CN112272073B (en) Hidden beam forming design method for ideal WCSI hidden communication
Shi et al. Physical layer security techniques for data transmission for future wireless networks
Nuti et al. Spectral efficiency vs complexity in downlink algorithms for reconfigurable intelligent surfaces
CN112272072B (en) Robust beam forming design method for non-ideal WCSI covert communication
Xiao et al. Securing NextG networks with physical-layer key generation: A survey
Bromberg et al. The Use of Programmable DSPs in Antenna Array Processing
Adeogun et al. Channel prediction for millimeter wave MIMO systems in 3D propagation environments
Liu et al. RIS Empowered Near-Field Covert Communications
Chen et al. Robust adaptive beamforming based on matched spectrum processing with little prior information
de Sena et al. Massive IRS-MIMO-RSMA with Polarization Multiplexing: An Enhanced SIC-Free Approach
Ahmed et al. Linear array processing using modified singular value decomposition
Pezeshki et al. Beyond codebook-based analog beamforming at mmwave: Compressed sensing and machine learning methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant