CN113395096B - Physical layer secure transmission method based on deep learning in FDD system - Google Patents
Physical layer secure transmission method based on deep learning in FDD system Download PDFInfo
- Publication number
- CN113395096B CN113395096B CN202110702059.5A CN202110702059A CN113395096B CN 113395096 B CN113395096 B CN 113395096B CN 202110702059 A CN202110702059 A CN 202110702059A CN 113395096 B CN113395096 B CN 113395096B
- Authority
- CN
- China
- Prior art keywords
- information
- channel
- signal
- matrix
- sender
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/0848—Joint weighting
- H04B7/0854—Joint weighting using error minimizing algorithms, e.g. minimum mean squared error [MMSE], "cross-correlation" or matrix inversion
Abstract
The invention discloses a physical layer safe transmission method based on deep learning in an FDD system, which comprises the following steps: designing a signal transmission model and an optimization problem; the information sender inputs the sending information into the coder and the quantizer, compresses and normalizes the estimated channel (-1,1), then carries out quantization coding, and sends out the compressed channel matrix coding after quantization; the information receiver inputs the received information into a decoder, and the decoder designs a corresponding pre-coding matrix according to the compressed channel information fed back by the information transmitter to ensure the safe transmission of the information; the information receiving side transmits a mixed signal of the target signal and the artificial noise to the information transmitting side. The invention has lower computational complexity, can effectively resist the eavesdropping of eavesdropping nodes, and the more the number of transmitting antennas is, the smaller the estimation error of the channel is, the more the number of feedback bits is, the better the performance of the system is; for SNR and estimation errorHas good robustness.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a deep learning-based physical layer secure transmission method in an FDD system.
Background
The principle of Wireless Communication technology (Wireless Communication) is to utilize Wireless transceiver to realize the interconversion between information and electromagnetic signals and to realize the transmission process within a certain distance and range. The wide application of the wireless communication technology greatly improves the communication capability of human society and meets the communication requirements of various fields.
However, as the modern technology advances and demands increase, the application scale of the wireless communication device increases day by day, and the communication process faces many potential threats. Due to the broadcast nature of wireless transmissions, wireless transmissions are at risk of being eavesdropped by unauthorized eavesdropping nodes. In order to deal with the risk, a series of security technologies mainly based on key management appear, and a mechanism for ensuring the security is established on the basis of a computational cryptography method and mainly depends on the design of upper layer protocols in a computer to ensure the security of information. However, as the computing power of computers is continuously increasing, especially quantum computers are appearing, and the information transmission scenarios are more and more diversified, the traditional key mechanism is challenged more and more severely. The proposed physical layer security technology provides a new direction for solving the security problem of wireless communication, and unlike the traditional security technology, physical layer security is a technology for realizing wireless information transmission security by using the characteristics of communication equipment and channels, and more students in recent years carry out deep research on physical layer security communication from the information theory perspective.
For the research of the physical layer security, Goel and Negi of the university of Chiilong in the card introduce the concept of Artificial Noise (AN), and the artificial noise interferes AN eavesdropper by adding AN artificially generated noise signal into the null space of the channel of a legal receiver. A number of documents have studied the design of artificial noise schemes in various scenarios, and the royal coment of the university of west ann has proposed a framework for artificial noise assisted secure transmission in the mimo eavesdropping channel (mimo me) of Frequency Division Duplex (FDD) systems. And focuses on a practical scenario where only channel profile information (CDI) of an eavesdropper is available, whereas imperfect Channel State Information (CSI) of a legitimate receiver is obtained through training and analog feedback. By explicitly considering signaling overhead and training power overhead caused by channel estimation and feedback, the achievable effective traversal security rate is defined, and a joint power allocation and training overhead optimization problem is researched to realize the maximization of the effective traversal security rate. However, deriving a closed form expression for the optimization problem is a very difficult problem and mathematically problematic. Therefore, in the conventional method, power allocation or other parameters are often optimized by adopting a fixed precoding matrix design, so that not only the optimal precoding matrix conforming to the scene cannot be obtained, but also a large computational complexity exists. Due to the above problems, a new safe precoding scheme, namely a precoding design scheme based on deep learning, is proposed by the Sangseok Yun of the university of queen and the Jae-Mo Kang of the university of qing north, a convolutional neural network architecture is adopted, and under the condition that spatial channel correlation exists, a safe precoder is designed according to estimated (imperfect) channel information, and a two-step training program is also proposed to ensure that the network is trained to converge quickly and stably.
Disclosure of Invention
The invention provides a physical layer security transmission mode based on deep learning in a frequency division duplex system, which considers a transmitting node (information transmitting party) Alice, a legal receiving node (information receiving party) Bob and an eavesdropping node (eavesdropper) Eve. Since the system operates in a frequency division duplex system, the legitimate channels from Alice to Bob do not have reciprocity, i.e., the uplink (Bob to Alice) and downlink (Alice to Bob) use two separate frequencies and therefore have different channel characteristics. Because Alice cannot directly obtain the downlink channel information, Bob feeds back the downlink channel information to Alice, and then Alice designs a precoding matrix according to the fed-back channel information to ensure that the purpose of safe transmission is achieved.
To achieve the above object, the present invention uses a neural network to implement the process of feedback and precoding matrix design. Consider that Alice hasThe root transmitting antenna, Bob and Eve are all single receiving antennas, wherein Alice goes to Bob's matrix for legal channelIs expressed with a matrix size ofAnd each element thereof is independently distributed and obeys a zero mean variance ofComplex gaussian distribution of (a); and Alice to Eve eavesdropping channel matrixIndicating that the matrix size is alsoAnd each element thereof is independently distributed and obeys a zero mean variance ofComplex gaussian distribution. At the same time, consider a more realistic situation, Bob is estimatingThere is an estimation error, and Bob actually estimates the channel asAnd satisfies the equationWhereinThe error channel matrix generated when estimating the channel for Bob,andare all big and smallAssuming the estimation error is expressed as,Can be approximately regarded as distribution-independent and obeys zero mean variance ofA complex Gaussian distribution ofCan be regarded as distribution-independent and obeys zero mean variance ofComplex gaussian distribution.
The invention discloses a physical layer secure transmission method based on deep learning in an FDD system, which comprises the following steps:
designing a signal transmission model and an optimization problem according to the worst condition in wireless communication;
the information sending party inputs the sending information into the coder and the quantizer, and estimates the channelCompression and normalizationThen carrying out quantization coding, and sending out the compressed channel matrix code after quantization;
the information receiver inputs the received information into the decoder, which designs the corresponding pre-coding matrix according to the compressed channel information fed back by the information transmitterAndto ensure the secure transmission of information, whereinIs a signal sent from an information receiver to an information senderThe precoding matrix of (a) is determined,is an artificial noise signal added to a transmission signal by a signal receiving sideThe precoding matrix of (a);
the information receiving side transmits a mixed signal of the target signal and the artificial noise to the information transmitting side.
Further, the optimization problem is modeled as follows:
assuming that the eavesdropper accurately estimates the channelAnd precoding matrix, while signal receiver and signal transmitter only know the channelThe capacity expression of signal transmission is obtained as follows:
whereinR B Is the signal transmission capacity of the sender of the information,R E in order for the signal transmission capacity of the eavesdropper,is a zero mean variance at the sender of the information,is a zero mean variance at the eavesdropper,andrespectively representing signals transmitted by information transmittersAnd artificial noise signalThe digital pre-coding matrix of (2),representing the analog precoding matrix produced by the phase shifter,a matrix for a legitimate channel from an information receiver to an information sender,for the estimated channel obtained by the sender of the information,an error channel matrix generated when estimating a channel for an information transmitting side,a matrix for an eavesdropping channel from an information receiver to an eavesdropper;
the privacy rate is calculated as follows:
the precoding matrix is expected to be designed to maximize the privacy rate, and the optimization problem can be expressed as follows:
further, the estimated channel of the information sender is usedThe real part and the imaginary part are separated and input into the encoder, the encoder is composed of three fully-connected layers, the activation function of the first two fully-connected layers is a sigmoid function, the activation function of the third fully-connected layer is a tanh function to ensure that the output is limited in the range of (-1,1), and the number of nodes of the third fully-connected layer isTo complete the estimation of the channelCompression of (2), wherein NTFor the number of elements per row of the precoding matrix,is a compression factor.
Further, the quantizer performs quantization using B-bit, and the quantization process is as follows:
where B is the number of quantization bits,the function of the rounding is represented by,representing the elements contained in the compressed and normalized channel.
Further, the information receiving side receives the quantized signal fed back, and decodes the compressed and quantized feedback information through a decoder composed of three fully connected layers, and the decoder directly outputs the precoding matrix and the power distribution coefficient.
Further, it is assumed that the transmission antenna of the information receiving side is equipped withA radio frequency chain, satisfy,Andcan be replaced by the following equation:
wherein the content of the first and second substances,andrespectively representing signals transmitted by information transmittersAnd artificial noise signalNumber ofWord precoding matrix, and the matrix size are all,Representing an analog precoding matrix produced by phase shifters, the matrix size of which is,NTThe number of elements per row of the precoding matrix.
Further, the received signals of the information sender and the eavesdropper can be expressed as:
wherein the content of the first and second substances,y B a received signal indicating a sender of the information,y E a received signal representing an eavesdropper,representing receiver noise at the sender of the information and subject to zero mean variance ofThe complex gaussian distribution of (a) is,representing receiver noise of an eavesdropper and obeying a zero mean variance ofThe complex gaussian distribution of (a) is,is an energy normalized signal and satisfies,Obeying a zero mean variance ofThe complex gaussian distribution of (a) is,a matrix for a legitimate channel from an information receiver to an information sender,for the estimated channel obtained by the sender of the information,an error channel matrix generated when estimating a channel for an information transmitting side,the matrix is used for an eavesdropping channel from an information receiver to an eavesdropper.
Further, the channel will be estimated at the time of trainingIs regarded as a true channel, and since the information sender and the information receiver only know the matrix for the eavesdropping channel from the information receiver to the eavesdropperThe statistical information of (1), a channel with the same distribution is generated during trainingAs an eavesdropping channel, the loss function is therefore expressed as follows:
and after the loss function is trained, using the secret keeping rate as a performance index of the test set.
Further, the normalization process is as follows:
output with two nodesAndand normalizing to obtain the power distribution coefficientThe power distribution coefficientThe normalization process is as follows:
to satisfyTo, forPerforming normalization process, supposingTo represent,The normalization process is as follows:
the physical layer safe transmission mode based on deep learning in the FDD system disclosed by the invention has the following advantages:
1) compared with a physical layer safety scheme under the traditional FDD system, the method has lower computational complexity by using a neural network design safety scheme.
2) Simulation proves that the invention can effectively resist eavesdropping of eavesdropping nodes, and the more the number of transmitting antennas is, the smaller the estimation error of the channel is, the more the number of feedback bits is, the better the performance of the system is.
Drawings
FIG. 1 is a diagram of a transmission process in an FDD-MISO system;
FIG. 2 is a schematic diagram of a neural network structure of a physical layer secure transmission scheme according to the present invention;
FIG. 3 shows the present invention,Andthe effect of signal-to-noise ratio (SNR) on the privacy rate;
Detailed Description
The invention is further described with reference to the accompanying drawings, but the invention is not limited in any way, and any alterations or substitutions based on the teaching of the invention are within the scope of the invention.
The invention is described in further detail below with reference to the accompanying drawings:
the transmission process of the present invention is shown in FIG. 1, considering that Alice hasThe root transmitting antenna, Bob and Eve are all single receiving antennas, wherein the matrix for the legal channels from Alice to BobIs expressed with a matrix size ofAnd each element thereof is independently distributed and obeys a zero mean variance ofComplex gaussian distribution of (a); and Alice to Eve eavesdropping channel matrixIndicating that the matrix size is alsoAnd each element thereof is independently distributed and obeys a zero mean variance ofComplex gaussian distribution. At the same time, consider a more realistic situation, Bob is estimatingThere is an estimation error, and Bob actually estimates the channel asAnd satisfies the equationWhereinThe error channel matrix generated when estimating the channel for Bob,andare all big and smallAssuming the estimation error is expressed as,Can be approximately regarded as distribution-independent and obeys zero mean variance ofA complex Gaussian distribution ofCan be regarded as distribution-independent and obeys zero mean variance ofComplex gaussian distribution. The transmission process of the signal is as follows:
1) bob will estimate the channel Compressed and normalized toThen the quantization coding is carried out on the data,Bthe expression for bit quantization is as follows:
whereinThe function of the rounding is represented by,representing the elements contained in the compressed and normalized channel. In the formula (1), firstIs extended toAnd then rounded to the nearest integer. Then, in order to guaranteeIs a quiltBQuantization of bits byInstead of being rounded toOf (2) is used. Finally by division byMake the outputHas a value range of. With this method, each element in the channel matrix can be processedB-bit quantization. The invention adopts 4-bit quantization, and Bob sends the compressed channel matrix code after 4-bit quantization to Alice.
2) Alice designs corresponding precoding matrix according to compressed channel information fed back by BobAndto ensure the secure transmission of information, whereinIs the signal sent by Alice to BobOf a size of。Is an artificial noise signal added by Alice in the transmitted signalAnd the same size of the precoding matrix of. The present invention considers a hybrid precoding scheme, assuming Alice's transmit antenna is equipped withA radio frequency chain, satisfy,Andcan be replaced by the following equation:
wherein the content of the first and second substances,andrespectively representAndand the matrix size is all。Representing an analog precoding matrix produced by phase shifters, the matrix size of which is。
3) Alice transmits a mixed signal of the target signal and the artificial noise to Bob, and Eve also receives the mixed signal transmitted by Alice due to the broadcasting characteristics of wireless communication. Thus, the received signals of Bob and Eve may be expressed as:
wherein the content of the first and second substances,represents the receiver noise at Bob and obeys a zero mean variance ofComplex gaussian distribution.Represents receiver noise at Eve and obeys a zero mean variance ofComplex gaussian distribution.Is an energy normalized signal and satisfies。Obeying a zero mean variance ofComplex gaussian distribution. Suppose that Alice transmits a signal at a transmission power ofPThe power distribution coefficient to the target signal and the artificial noise isThen there areAnd。
4) considering the worst condition in wireless communication, Eve can accurately estimate the channelAnd precoding matrices, while Alice and Bob only knowThe statistical information of (1). According to the transmission process and the expression, capacity expressions of Alice-to-Bob and Eve signal transmission can be obtained respectively as follows:
the secret rate can then be obtained by the difference between:
as an index for measuring security performance of the present invention, it is desirable that the designed precoding matrix can be maximized to achieve the purpose of transmission security, so the optimization problem can be expressed as:
the present invention will next use neural networks to accomplish the above transmission process and maximize the privacy rate.
Fig. 2 shows the structure of the neural network of the present invention. It can be seen that the neural network is made up of three parts, an encoder part and a quantizer part at Bob, and a decoder part at Alice.
1) An encoder: bob will estimateThe real part and the imaginary part are separated and input into the neural network, so that the input of the neural network is. The first layer full connection layer FC1 of the encoder is set to be weightedThe offset number is set asThe activation function is a sigmoid function, so the output size of FC1 is. FC2 has a weight ofIs offset fromThe number is set asThe activation function is also a sigmoid function, with an output magnitude of. Unlike FC1 and FC2, FC3 completes compression and normalization of channel information, and thus the number of weights is set to beThe offset number is set asSo that the output size is compressed into(ii) a In addition to this, the activation function is set to tanh function so that all outputs of FC3 are limited toWithin the range of (1).
2) A quantizer: when FC3 restricts the compressed matrix toThe output of the FC3 can be quantized to the signal x using the formula (1). It is noted that the rounding function in the quantization operationIt is not trivial and therefore not possible to compute the gradient of the quantization module when propagating backwards. To solve this problem, we set the gradient of the quantization process constant to 1, so that the entire neural network can be trained.
3) A decoder: the bit number of the feedback received by Alice isAnd as an output of the decoderAnd (6) adding. Therefore, the FC4 weight number is set toOffset number isThe activation function is a sigmoid function, and the final matrix size of the output is. FC5 has a weight ofOffset number isThe activation function is also a sigmoid function, and the output has a magnitude of. FC6 is used as an output layer without an activation function, and the weight number is equal to the output matrix size and the power distribution parameterOffset number isThe output is also of the same size。
4) Normalization: the output of the neural network needs to be normalized to meet the energy constraints in the optimization problem (8). For the outputAdding a lambda layer to satisfyAs follows:
then, since the output layer has no activation function, the output range cannot be within by one nodePower distribution coefficient ofThus consider outputting with two nodesAndand normalized to obtainAnd the normalization process comprises the following steps:
then, to satisfyNeed to be aligned withPerforming normalization process, supposingTo representThe normalization process is as follows:
in the same wayAssume use ofTo representTo satisfyThe treatment process comprises the following steps:
5) loss function: the input of the neural network isThe network is not in the training processAnd therefore cannot construct a loss function based on the true privacy rate of equation (7). Considering the actual situation, the training will be carried outIs viewed as a real channel and since Alice and Bob only knowThe statistical information of (1), a channel with the same distribution is generated during trainingAs an eavesdropping channel, the loss function can therefore be written as:
andis zero mean variance. After training using the loss function of equation (13), the true privacy rate of equation (7) is used as the performance index of the test set.
For the convenience of the simulation, assume that,,,. At the time of training, the blocksize was set to 1000, the number of iterations was set to 30000, the learning rate was set to 0.05, and the Adam optimizer was used, resulting in the following simulation graph.
Case 1: during training, SNR is set to 10dB, and error is estimatedSet to 0.01; estimate error at test timeAgain set to 0.01 and the number of feedback bits tobits, the effect of SNR on the secret rate shown in fig. 3 is obtained. As can be seen from fig. 3, the SNR increases and the secret rate of the system increases, because the transmission capacity from Alice to Bob increases significantly due to the increase of Alice transmission power, but the transmission capacity from Alice to Eve increases insignificantly due to the presence of artificial noise. In addition, comparing the three curves in fig. 3, it can be seen that the transmitting antenna also has a great influence on the security performance of the system, andthe security performance of the system is improved due to the fact that the number of the antennas is increased, the gain of a target signal part at the receiving end is increased, namely the received signal-to-interference-and-noise ratio (SINR) is increased, and therefore the transmission capacity from Alice to Bob is increased. Therefore, to improve security performance, adding transmit antennas is a viable option.
Case 2: in FIG. 4, the SNR in training is set to 10dB, and the estimation error in training is set to 10dBIs 0.01; SNR is 10dB and the number of feedback bits isbits. From the illustration in fig. 4, it can be seen that the presence of estimation errors has a significant impact on the privacy performance, and as the estimation errors increase, the privacy rate gradually decreases, due to the impact of both aspects of the estimation errors: (1) the estimation error is increased, so that the difference between the expression of the secret rate and the loss function used in training is increased, and the optimal weight and bias obtained by training and the optimal weight and bias needed for optimizing the secret rate are increased. (2) The increase in estimation error results in equation (15)Increase with transmission capacity from Alice to BobAnd thus the privacy rate is reduced. Bob channel estimation accuracy is therefore critical to system privacy performance.
Case 3: the parameters of fig. 5 are set as: SNR during training is 10dB, estimation error during training0.01, an estimation error SNR at the time of test of 10dB, an estimation error at the time of test ofIs 0.01. It can be seen that with the number of feedback bitsThe increase, the security performance is obviously improved, this is because: suppose the FC3 node number is composed ofMeaning that after 4-bit quantization, the quantizer outputs a value ofAnd (4) possibility. Therefore if the number of bits is fed backIncrease means thatThe probability of the value output by the quantizer is increased, and the larger optimizing space enables the network to find the optimal precoding matrix and the power distribution coefficient more easily, so that the confidentiality rate of the system is improved.
Therefore, in conclusion, the deep learning-based physical layer secure transmission method in the FDD-MISO system can effectively resist eavesdropping.
The physical layer safe transmission mode based on deep learning in the FDD system disclosed by the invention has the following advantages:
1) compared with a physical layer safety scheme under the traditional FDD system, the method has lower computational complexity by using a neural network design safety scheme.
2) Simulation proves that the invention can effectively resist eavesdropping of eavesdropping nodes, and the more the number of transmitting antennas is, the smaller the estimation error of the channel is, the more the number of feedback bits is, the better the performance of the system is.
3) Simulation results prove that the neural network designed by the invention has good SNR and estimation errorHas the advantages ofGood robustness.
The above embodiment is an embodiment of the present invention, but the embodiment of the present invention is not limited by the above embodiment, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be regarded as equivalent replacements within the protection scope of the present invention.
Claims (9)
1. A deep learning-based physical layer secure transmission method in an FDD system is characterized by comprising the following steps:
designing a signal transmission model and an optimization problem according to the worst condition in wireless communication;
the information sender inputs the sending information into the coder and the quantizer, wherein the estimated channel of the information senderThe real part and the imaginary part are separated and input into the coder to estimate the channelAfter compression and normalization, carrying out quantization coding, and sending out the compressed channel matrix code after quantization;
an information receiving party inputs received information into a decoder, and the decoder designs corresponding pre-coding matrixes F and W according to compressed channel information fed back by an information sending party to ensure the safe transmission of the information, wherein F is a pre-coding matrix of a signal s sent by the information sending party from an information receiving party, and W is a pre-coding matrix of an artificial noise signal v added in the sent signal by the signal receiving party;
the information receiver sends a mixed signal of the target signal and the artificial noise to the information sender;
wherein the optimization problem is modeled as follows: assuming that an eavesdropper accurately estimates and obtains a channel g and a precoding matrix, a signal receiver and a signal transmitter only know the statistical information of the channel g to obtain a capacity expression of signal transmission, and expecting to design the precoding matrix to maximize the confidentiality rate and establish an optimization problem;
wherein the channel is estimated during trainingThe channel is regarded as a real channel, and because the information sender and the information receiver only know the statistical information of the matrix g for the eavesdropping channel from the information receiver to an eavesdropper, a channel g' with the same distribution is generated as the eavesdropping channel during training, and a loss function is obtained.
2. The method for deep learning-based physical layer secure transmission in an FDD system according to claim 1, wherein the capacity expression of the signal transmission is as follows:
wherein R isBIs the signal transmission capacity, R, of the information senderEIn order for the signal transmission capacity of the eavesdropper,is a zero mean variance at the sender of the information,is the variance of zero mean at the eavesdropper, FBBAnd WBBDigital precoding matrices, F, representing respectively a signal s and an artificial noise signal v transmitted by an information senderRFRepresenting the analog precoding matrix generated by the phase shifter, h is the matrix for the legitimate channel from the information receiver to the information sender,estimated channel, h, obtained for the sender of the informationerrorG is a matrix for an eavesdropping channel from an information receiver to an eavesdropper;
the privacy rate is calculated as follows:
Rs=RB-RE
the optimization problem is represented as follows:
s.t.|FRF(i,j)|2=1,||FRFFBB||2=θP,||FRFWBB||2=(1-θ)P,
wherein, P is the transmission power of the information receiver in the process of sending the signal, and theta is the power distribution coefficient distributed to the target signal and the artificial noise.
3. The method for deep-learning-based physical layer secure transmission in an FDD system according to claim 1, wherein the encoder comprises three fully-connected layers, the activation function of the first two fully-connected layers is sigmoid function, the activation function of the third fully-connected layer is tanh function to ensure that its output is limited to the range of (-1,1), and the number of nodes of the third fully-connected layer isTo complete the estimation of the channelCompression of (2), wherein NTGamma is the compression factor, the number of elements per row of the precoding matrix.
4. The method for deep learning based secure transmission of the physical layer in the FDD system as claimed in claim 1 wherein the quantizer uses B-bit quantization, the quantization process is as follows:
y=round(2B-1×x)/2B-1
where B is the number of quantization bits, round (-) represents the rounding function, and x represents the elements contained in the compressed and normalized channel.
5. The method for deep learning-based physical layer secure transmission in an FDD system according to claim 1, characterized in that the information receiver receives the quantized signal from the feedback and decodes the compressed quantized feedback information by a decoder consisting of three fully connected layers, which directly outputs the precoding matrix and the power allocation coefficients.
6. The FDD system deep learning-based physical layer secure transmission method according to claim 2, wherein it is assumed that N is allocated to the transmitting antenna of the information receiverRFA radio frequency chain satisfying NRF<NTF and W may be replaced by the following equation:
F=FRFFBB
W=FRFWBB
wherein, FBBAnd WBBDigital pre-coding matrixes respectively representing signals s and artificial noise signals v sent by an information sender, wherein the sizes of the matrixes are NRF×1,FRFRepresenting an analog precoding matrix produced by phase shifters, the matrix size of which is NT×NRF,NTThe number of elements per row of the precoding matrix.
7. The method for deep learning-based physical layer secure transmission in FDD system according to claim 6, wherein the received signals of the information sender and the eavesdropper can be expressed as:
yE=gFRFFBBs+gFRFWBBv+nE
wherein, yBIndicating the received signal of the sender of the information, yEReceived signal representing an eavesdropper, nBRepresenting receiver noise at the sender of the information and subject to zero mean variance ofComplex gaussian distribution of (n)ERepresenting receiver noise of an eavesdropper and obeying a zero mean variance ofS is an energy normalized signal and satisfiesv obeys a complex Gaussian distribution with a zero mean variance of 1, h is a matrix for a legal channel from an information receiver to an information sender,estimated channel, h, obtained for the sender of the informationerrorG is a matrix for an eavesdropping channel from an information receiver to an eavesdropper.
9. The method for deep learning-based physical layer secure transmission in an FDD system according to claim 8, characterized in that the normalization process is as follows:
output theta with two nodes1And theta2And normalizing to obtain the power distribution coefficient theta, wherein the power distribution coefficient theta is normalized as follows:
to satisfy | | FRFFBB||2θ P, pairNormalization was performed assuming FoTo represent The normalization process is as follows:
suppose using WoTo representTo satisfy | | FRFWBB||2=(1-θ)P,WBBThe normalization process is as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110702059.5A CN113395096B (en) | 2021-06-24 | 2021-06-24 | Physical layer secure transmission method based on deep learning in FDD system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110702059.5A CN113395096B (en) | 2021-06-24 | 2021-06-24 | Physical layer secure transmission method based on deep learning in FDD system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113395096A CN113395096A (en) | 2021-09-14 |
CN113395096B true CN113395096B (en) | 2022-03-18 |
Family
ID=77623688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110702059.5A Active CN113395096B (en) | 2021-06-24 | 2021-06-24 | Physical layer secure transmission method based on deep learning in FDD system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113395096B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113765556A (en) * | 2021-09-27 | 2021-12-07 | 国家计算机网络与信息安全管理中心 | Data transmission method and related equipment |
CN113746628B (en) * | 2021-09-30 | 2022-07-12 | 西安交通大学 | Physical layer key generation method and system based on deep learning |
CN114884616B (en) * | 2022-05-06 | 2024-01-19 | 西安交通大学 | Anti-eavesdrop uplink transmission method and device for satellite communication system based on artificial noise |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194378A (en) * | 2018-08-06 | 2019-01-11 | 重庆邮电大学 | Safety of physical layer beam form-endowing method based on linear neural network |
CN109246048A (en) * | 2018-10-30 | 2019-01-18 | 广州海格通信集团股份有限公司 | A kind of safety of physical layer communication means and system based on deep learning |
CN110139272A (en) * | 2019-05-21 | 2019-08-16 | 电子科技大学 | A kind of secret signalling based on random sequence four-dimension ring array |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
EP3535625B1 (en) * | 2016-12-07 | 2021-02-24 | Arilou Information Security Technologies Ltd. | System and method for using signal waveform analysis for detecting a change in a wired network |
-
2021
- 2021-06-24 CN CN202110702059.5A patent/CN113395096B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194378A (en) * | 2018-08-06 | 2019-01-11 | 重庆邮电大学 | Safety of physical layer beam form-endowing method based on linear neural network |
CN109246048A (en) * | 2018-10-30 | 2019-01-18 | 广州海格通信集团股份有限公司 | A kind of safety of physical layer communication means and system based on deep learning |
CN110139272A (en) * | 2019-05-21 | 2019-08-16 | 电子科技大学 | A kind of secret signalling based on random sequence four-dimension ring array |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Non-Patent Citations (3)
Title |
---|
Secure Transmission in FDD MBM Systems Using Analog Feedback;Xiaomeng Zhou 等;《2020 IEEE/CIC International Conference on Communications in China (ICCC)》;20201109;全文 * |
基于设备与信道特征的物理层安全方法;李古月 等;《密码学报》;20200415;第7卷(第2期);第224-248页 * |
智能化物理层安全认证及传输技术研究;邱晓英;《中国博士学位论文全文数据库(信息科技辑)》;20190815;正文第3-4节 * |
Also Published As
Publication number | Publication date |
---|---|
CN113395096A (en) | 2021-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113395096B (en) | Physical layer secure transmission method based on deep learning in FDD system | |
Sohrabi et al. | Deep learning for distributed channel feedback and multiuser precoding in FDD massive MIMO | |
CN109194378B (en) | Physical layer safety wave beam shaping method based on linear neural network | |
CN109150855B (en) | Robust wireless communication safety transmission method for optimizing power resources | |
CN110880950A (en) | Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system | |
Sindhwani et al. | Performance analysis of particle swarm optimization and genetic algorithm in MIMO systems | |
Yu et al. | Non-orthogonal wireless backhaul design for cell-free massive MIMO: An integrated computation and communication approach | |
CN110798282B (en) | Artificial noise implementation method of software radio MISO system | |
CN112583458A (en) | MIMO end-to-end transmission system based on deep learning and wireless transformation network | |
Wang et al. | Multicast secrecy rate maximization for reconfigurable intelligent surface backscatter communication | |
Zhao et al. | MSE-based transceiver designs for RIS-aided communications with hardware impairments | |
CN109714090B (en) | Multi-antenna two-dimensional vector transmission method and system | |
CN116760439A (en) | Robust wave beam forming method based on radar communication integrated system | |
CN114286336B (en) | Multi-cell network safe transmission method based on artificial noise | |
CN113612571B (en) | Multi-component safe transmission method based on generalized multi-fraction Fourier transform | |
CN114337902B (en) | IRS-assisted millimeter wave multi-cell interference suppression method | |
CN114006639B (en) | Distributed precoding method suitable for uplink multi-user MIMO system | |
CN112636799B (en) | Optimal pseudo noise power configuration method in MIMO (multiple input multiple output) safety communication | |
Xu et al. | Performance evaluation of autoencoder for coding and modulation in wireless communications | |
CN113364502B (en) | Physical layer secure communication method between multi-antenna equipment | |
CN115208443B (en) | Combined optimization method and device for large-scale MIMO system based on intelligent reflecting surface | |
CN117528535B (en) | Bidirectional safe transmission method for resisting malicious interference by using IRS and artificial noise | |
Chen et al. | Joint design of interference alignment and power splitting in SWIPT networks | |
CN114430550B (en) | Wireless physical layer key generation method based on neural network model | |
Yang et al. | Optimal Beamforming for Secure Transmit in Practical Wireless Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A Secure Transmission Method of Physical Layer Based on Deep Learning in FDD System Effective date of registration: 20221027 Granted publication date: 20220318 Pledgee: Hunan Xiangjiang Zhongying Investment Management Co.,Ltd. Pledgor: HUNAN GUOTIAN ELECTRONIC TECHNOLOGY CO.,LTD. Registration number: Y2022980019937 |