CN113595605B - Transmission method and communication system with security and interference management - Google Patents

Transmission method and communication system with security and interference management Download PDF

Info

Publication number
CN113595605B
CN113595605B CN202110645665.8A CN202110645665A CN113595605B CN 113595605 B CN113595605 B CN 113595605B CN 202110645665 A CN202110645665 A CN 202110645665A CN 113595605 B CN113595605 B CN 113595605B
Authority
CN
China
Prior art keywords
target communication
signal
stim
interference
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110645665.8A
Other languages
Chinese (zh)
Other versions
CN113595605A (en
Inventor
畅志贤
吕品田
李钊
李君�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN202110645665.8A priority Critical patent/CN113595605B/en
Publication of CN113595605A publication Critical patent/CN113595605A/en
Application granted granted Critical
Publication of CN113595605B publication Critical patent/CN113595605B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0619Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
    • H04B7/0621Feedback content
    • H04B7/0626Channel coefficients, e.g. channel state information [CSI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/86Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a transmission method and a communication system which give consideration to both safety and interference management, wherein the specific method comprises the following steps: sharing channel state and data information between transmitters; the target communication pair and the interference communication pair respectively design a precoding vector and a filtering vector; the target communication transmitter designs a precoding vector of the STIM signal and determines the transmitting power of the STIM signal; the target communication transmitter constructs an STIM signal and transmits it to the target communication receiver along with the desired signal; finally, the target communication receiver filters the received mixed signal to recover the desired data. The invention can reduce the eavesdropping signal quality to the greatest extent on the premise of meeting the minimum receiving signal-to-noise ratio (or signal-to-interference-and-noise ratio) requirement of the target communication receiver by reasonably distributing the transmitting power of the target communication transmitter, and can be used for data communication under the condition that the target communication receiver suffers interference and is threatened by eavesdropping.

Description

Transmission method and communication system with security and interference management
Technical Field
The invention belongs to the technical field of communication, and mainly designs a transmission method with both safety and interference management, in particular relates to a method for realizing wireless safety and eliminating the influence of interference on expected communication, which can be applied to various wireless communication systems.
Background
With rapid development of informatization technology and wide use of mobile terminal devices, wireless communication technology has been widely used in business, work, entertainment, etc. Due to the broadcast nature of the wireless channel, the wireless air interface is open to all users, which makes the communication content vulnerable to eavesdropping by malicious users. Physical layer security (Physical Layer Security, PLS) is proposed as a promising technical concept, which ensures that signals in a channel are not illegally eavesdropped by utilizing characteristics of noise, random fading, etc. of a wireless channel, and currently, physical layer security technology has become an important research field of wireless communication security.
PLS is an addition to the traditional key-based security mechanism, and the traditional key encryption method is based on Shannon's security model, which assumes that there is no noise or interference in the channel, and the data transmitting end and the receiving end encrypt and decrypt the information by using a common key to achieve confidentiality of the information, and when the number of keys is the same as that of the messages, complete confidentiality can be achieved theoretically. However, in a wireless network, a large number of keys are generated by a key encryption method, and how to manage the keys safely and effectively, the distribution and maintenance of the keys face a great challenge. In addition, with the development of quantum mechanics, quantum computing enables an eavesdropper to have stronger computing power in the future, which may lead to insufficient confidentiality obtained by future methods based on key encryption.
Wyner ad. The wire-tap channel J Bell system technical journal,1975,54 (8): 1355-1387 (eavesdropping channel), studied the theoretical security of information without using keys, and proposed eavesdropping channel models for point-to-point communication, proving that the conditions for achieving secure communication are that the channel conditions between the intended receiver and the source are better than those between the eavesdropper and the source. Nandan N, majoi S, wu H c.secure beamforming for MIMO-NOMA-based cognitive radio network J IEEE Communications Letters,2018,22 (8): 1708-1711 (safe beamforming in a cognitive network based on MIMO-NOMA), a downlink zero forcing beamforming technique is designed, which can make information leakage of signals sent by a base station at a neighboring cell and a non-target communication receiver in the cell zero, so as to realize safe communication in the above-mentioned area. Liu Z, liu J, kato N, et al, division-and-conquer based cooperative jamming: addressing multiple eavesdroppers in close proximity [ C ]// IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications.IEEE,2016:1-9 (split type cooperative interference: close range coping with a plurality of eavesdroppers), a physical layer security scheme for split treatment of eavesdroppers by cooperative interference is proposed for a scene where a plurality of eavesdroppers exist and The eavesdroppers are unknown, the scheme divides a message code to be transmitted into a plurality of code blocks and transmits The code blocks in sequence, and an jammer is set for transmission of each code block, so that The eavesdroppers cannot obtain all The code blocks, and safe transmission is realized. He B, she Y, lau V K N.artificial Noise Injection for Securing Single-Antenna Systems [ J ]. IEEE Transactions on Vehicular Technology,2017,66 (10): 9577-9581 (artificial noise injection for single Antenna system), an artificial noise scheme is proposed for single Antenna system, according to which a target communication receiver broadcasts a pseudo-random artificial noise before data transmission starts, the artificial noise is received by a target communication transmitter and transmitted together with a target signal, and the influence of the artificial noise on itself can be eliminated, but the artificial noise can interfere with an eavesdropper, thereby ensuring the safety of communication, because the target receiver knows the artificial noise transmitted by the transmitter. 72-75 (artificial Noise assisted optimal beamforming in hierarchical physical layer security), for communication scenarios involving messages and users with different security levels, an artificial Noise assisted beamforming scheme is proposed that utilizes an algorithm based on successive convex approximation to obtain an optimal data precoding and covariance matrix of artificial Noise, enabling maximum improvement of security performance of high security level information while enabling low security level information transmission to achieve a certain secret capacity.
Besides the security problem in the wireless network, various types of interference are also important factors affecting the performance of the wireless network. Conventional interference management methods, such as interference alignment (Interference Alignment, IA), interference neutralization (Interference Neutralization, IN), zero-Forcing (ZF) reception, etc., achieve the effect of improving the target communication quality by suppressing, eliminating, and changing the interference. As research has been advanced, attempts have been made to exploit interference in the environment, such as interference regeneration, interference energy harvesting, etc., and in some studies on physical layer security, attempts have been made to exploit environmental interference to achieve secure communications.
In summary, the wireless network faces both interference and eavesdropping threat, and the existing security management method cannot guarantee the reliability of communication because the interference is not processed.
Disclosure of Invention
The invention provides a transmission method which takes security and interference management (Secure Transmission and Interference Management, STIM) into consideration, utilizes cooperation among transmitters and interaction among signals, improves the signal quality of a target communication receiver, simultaneously generates interference to an eavesdropper in a target signal receiving range, and deteriorates the eavesdropper signal quality and improves the information transmission safety under the condition that the SNR (or the SINR) of the received signal at the target communication receiver is enough.
The invention comprises the following contents:
1. a transmission method for combining security and interference management, applied to a hybrid wireless communication network including a target communication pair, an interference communication pair and an eavesdropper, wherein the target communication pair includes a target communication transmitter and a target communication receiver, and the interference communication pair includes an interference communication transmitter and an interference communication receiver, the transmission method comprising the following steps:
(1) The target communication transmitter and the interference communication transmitter are connected with a controller, the target communication receiver and the interference communication receiver respectively estimate channel state information between the target communication transmitter and the corresponding transmitter and feed back the channel state information to the corresponding transmitter, and the target communication transmitter and the interference communication transmitter share the respective channel state information through the controller;
(2) The target communication pair and the interference communication pair respectively design a communication precoding vector and a filtering vector according to the respective channel state information;
(3) The target communication transmitter calculates a precoding vector p of the STIM signal according to the channel state information, the communication precoding vector, the filtering vector and the maximum available power of the interference management STIM signal considering safety STIM And determines the transmission power P of the STIM signal STIM So that when the maximum available power of the STIM signal is smallP when completely eliminating the power required to interfere with the projection of the communication on the target STIM Inverting the STIM signal with the projected component of the interference on the target communication signal; when the maximum available power of the STIM signal is greater than or equal to the power required for completely eliminating the projection of interference on the target communication, the target communication transmitter transmits the signal according to the self-transmission power P t Distributing the residual transmitting power after the projection of the completely interference elimination on the target communication in the direction orthogonal to the target communication signal;
(4) The target communication transmitter is based on the precoding vector p STIM And transmit power P allocated to an STIM signal STIM Construction of STIM signal s STIM The method comprises the steps of carrying out a first treatment on the surface of the The target communication transmitter transmits the STIM signal s STIM Together with the target communication signal, to the target communication receiver and using s STIM Managing interference experienced by a target communication receiver;
(5) The target communication receiver uses the filter vector f 0 Processing a mixed signal including a STIM signal, a target communication signal and interference to recover data x 0 Data x 0 For data transmitted by the target communication transmitter to the target communication receiver, the target communication receiver is configured to transmit the data to the target communication receiver based on the channel matrix H between the target communication pairs AB Designing a filter vector f for target communication 0
Further, in the step (3), the target communication transmitter calculates a precoding vector according to the channel state information, the communication precoding vector, the filtering vector and the maximum available power of the interference management STIM signal considering security, and the method comprises the following steps:
(3a) The target communication transmitter precodes the vector p according to interference communication 1 Target communication precoding vector p 0 And the filtered vector f 0 Calculating the direction d of the target communication signal w =H AB p 0 /||H AB p 0 | and interference of projected components on a target communication signalWherein->The projection matrix of the target communication signal is shown as the superscript H, the complex conjugate, the component orthogonal to the target communication signal is i Q =i-i In Interference communication precoding vector p 1 Transmitter for interference communication based on channel matrix H between interference communication pairs TB Designed precoding vector, target communication precoding vector p 0 For the target communication transmitter according to the channel matrix H between the target communication pairs AB A designed precoding vector;
(3b) The target communication transmitter based on the channel matrix H between the target communication pairs AB And a projection component, calculating the power required to completely cancel the projection component of the interference on the target communication signal
(3c) The signal-to-noise ratio of the target communication receiver needs to be satisfiedγ th Representing the minimum signal-to-noise ratio required for the target communication receiver to decode the signal normally, the target communication transmitter calculates the signal to be decoded>Minimum transmit power required for establishment +.>Target communication filter vector f 0 For the target communication receiver according to the channel matrix H between the target communication pairs AB A vector of the design;
(3d) The target communication transmitter is based on the total transmit power P STIM Minimum transmission power P of target communication signal w Calculating the available power P of an STIM signal STIM =P t -P w
(3e) The target communication transmitter determines whether the available power of the STIM signal is sufficient to completely eliminate the projected component of the interference on the target communication signal whenSatisfy P STIM <P is At the same time, the available power P of the STIM signal STIM Precoding vectors for STIM signals all for interference managementWhen meeting P STIM ≥P is When the STIM signal is written as s STIM =-i In +βi Q Where β is a real coefficient, determining the strength of the STIM signal in the direction orthogonal to the target communication signal, according to +.>Calculated->Precoding vector of STIM signal +.>
Further, the method for constructing an STIM signal by the target communication transmitter in the step (4) includes the following steps:
(4a) The target communication transmitter determining the power P allocated to the STIM signal STIM =P t -P w
(4b) The target communication transmitter is based on the precoding vector p of the STIM signal STIM Data x carried by interference 1 Construction of STIM signalsInterference data x 1 Data transmitted by the transmitter to the receiver for the interfering communication.
Further, the step (5) includes the steps of:
(5a) The mixed signal including the STIM signal, the target communication signal and the interference received by the target communication receiver isThe first term on the right of the equation is the target communication signal, the second term is the STIM signal, the third termIs interfered by, and the fourth term is n for noise at the target communication receiver B
(5b) The target communication receiver uses the filter vector f 0 Filtering the received mixed signal, when P STIM <P is The filtered estimated signal is thenWhere the superscript H denotes the complex conjugate, the second term to the right of the equation is the residual interference at the target communication receiver; when P STIM ≥P is When the interference suffered by the target communication receiver is completely eliminated, the filtered estimated signal is +.>
The embodiment of the invention also provides a communication system applying the transmission method which is used for both the safety communication and the interference management.
The design idea of the invention is to make the target communication transmitter use more power for the STIM signal on the premise of ensuring that the received signal-to-noise ratio SNR (or signal-to-interference-and-noise ratio SINR) at the target communication receiver reaches the preset threshold requirement, thereby causing as strong interference to an eavesdropper as possible. It should be noted that when the maximum achievable power of the STIM signal is sufficient to completely eliminate the interference, the precoding vector of the STIM signal needs to be redesigned, otherwise, merely increasing the power of the STIM signal will cause interference to the target signal.
Compared with the prior art, the invention has the following advantages:
1. compared with the prior art, the invention can manage interference, improve the SNR (or SINR) of the target communication receiver, simultaneously can cause interference to an eavesdropper in the environment, and deteriorate the eavesdropping signal quality, thereby improving the effectiveness and confidentiality of the target communication at one time.
2. The invention constructs and transmits the STIM signal by the target communication transmitter, and the target communication receiver only needs to estimate the channel state information between the STIM signal and the target communication transmitter and filter the received signal, so that other signal processing work is not needed, and the invention is convenient to realize.
3. The invention fully utilizes the transmitting power of the target communication transmitter, and on the premise of ensuring that the SNR (or SINR) of the target communication receiver reaches the preset threshold requirement, the residual transmitting power of the target communication transmitter is fully used for the STIM signal, and the eavesdropper is interfered as strongly as possible, thereby realizing higher safety.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention.
Fig. 2 is a diagram of a wireless local area network WLAN downlink communication system model used in the present invention.
FIG. 3 (a) is a received signal-to-noise threshold γ for the target communication receiver Bob th When=5 dB, the speed of Bob and Eve obtained by the STIM method and the safety speed change with the signal-to-noise ratio η.
FIG. 3 (b) is a received signal-to-noise threshold γ for the target communication receiver Bob th When=10db, the speed of Bob and Eve obtained by the STIM method and the safety speed change with the signal-to-noise ratio η.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The invention will be further described with reference to the accompanying drawings and specific examples.
Referring to fig. 2, the present invention employs a WLAN downstream communication scenario comprising a target communication transmitter Alice, a target communication receiver Bob, an eavesdropper Eve, and one or more interfering communication pairs as a system model. Alice and interfering transmitter Tx k (k=1, 2..k) are connected to a WLAN controller, which can perform information sharing including channel state information (Channel State Information, CSI), data to be transmitted. Assuming that the transmit power of all transmitters is P t And is provided with N T And a root transmit antenna. Bob and Eve have equal numbers of receiving antennas, which are N R Since the receiver as a mobile station is subject to stricter cost, hardware, etc. limitations than the transmitter, it can be assumed that N T ≥N R Define the communication channel from Alice to Bob as H AB The communication channel between Alice and Eve is H AE Interfering transmitter Tx k The interference channel with Bob isThe spatial uncorrelated Rayleigh flat fading channel model is adopted, and elements of the channel matrix are complex Gaussian random variables obeying zero mean and unit variance of independent same distribution. Suppose H AB 、H AE And->Independent of each other and having Block fading (Block coding) characteristics, i.e. the channel parameters remain unchanged in blocks consisting of several consecutive transmission periods, randomly varying between adjacent blocks. All transmitters in the system transmit a signal x to their receivers by means of Beamforming (BF) 0 Representing target communication data sent by Alice to Bob, x k (k=1, 2..k) represents Tx k To its corresponding receiver STA k Is a function of the data of (a), satisfy E (||x) 0 || 2 )=E(||x k || 2 ) =1, e (·) represents mathematical expectation.
Referring to fig. 1, for simplicity, assuming Bob is only interfered by one interfering transmitter (denoted Tx), the steps of the present invention are as follows:
(1) And sharing channel state information and data information between transmitters:
the target communication transmitter and the interference communication transmitter are connected with a controller, the target communication receiver and the interference communication receiver estimate channel state information between the target communication transmitter and the corresponding transmitter respectively and feed back the channel state information to the corresponding transmitter, and the target communication transmitter sends data x to the target communication receiver 0 An interfering communication transmitter transmits interfering data x to an interfering communication receiver 1 By controlling the target communication transmitter and the interfering communication transmitterThe device shares the channel state information;
(2) The target communication pair and the interference communication pair respectively design a communication precoding vector and a filtering vector according to respective channel state information:
channel matrix H between target communication transmitter pair target communication pair AB Singular value decomposition is carried out, and a first column vector of a right singular matrix is taken as a precoding vector p of target communication 0
Channel matrix H between interference communication transmitter pair and interference communication pair TB Singular value decomposition is carried out, and a first column vector of a right singular matrix is taken as a precoding vector p of interference communication 1
Channel matrix H between target communication receiver pair target communication pair AB Singular value decomposition is carried out, and a first column vector of a left singular matrix is taken as a filtering vector f of target communication 0
(3) The target communication transmitter calculates a precoding vector p based on the maximum available power of the STIM signal STIM And determines the transmission power P of the STIM signal STIM The method comprises the following steps: p when the maximum available power of the STIM signal is less than the power required to completely cancel the projection of the interference on the target communication STIM Inverting the STIM signal with the projected component of the interference on the target communication signal; when the maximum available power of the STIM signal is greater than or equal to the power required for completely eliminating the projection of interference on the target communication, the target communication transmitter transmits the signal according to the self-transmission power P t The method for distributing the transmission power remained after the projection of the completely interference elimination on the target communication in the direction orthogonal to the target communication signal comprises the following steps:
(3a) The target communication transmitter calculates the direction d of the target communication signal w =H AB p 0 /||H AB p 0 | and interference of projected components on a target communication signalWherein->The projection matrix of the target communication signal is shown as the superscript H, the complex conjugate, the component orthogonal to the target communication signal is i Q =i-i In
(3b) The target communication transmitter calculates the power required to completely cancel the projected component of the interference on the target communication signal
(3c) To ensure the quality of the target communication, the signal-to-noise ratio of the target communication receiver needs to be satisfiedγ th Representing the minimum signal-to-noise ratio required for the target communication receiver to decode the signal normally, the target communication transmitter calculates the minimum transmit power +_ required to establish the above-mentioned inequality>
(3d) The target communication transmitter based on its total transmit power P t Minimum transmission power P of target communication signal w Calculating the available power P of an STIM signal STIM =P t -P w
(3e) The target communication transmitter determines whether the available power of the STIM signal is sufficient to completely eliminate the projected component of interference on the target communication signal when full P STIM <P is At the same time, the available power P of the STIM signal STIM All for interference management, precoding of STIM signal isWhen meeting P STIM ≥P is At this time, the available power P of the STIM signal STIM Enough to completely eliminate i In Writing the STIM signal as s STIM =-i In +βi Q Where β is a real coefficient, determining the strength of the STIM signal in the direction orthogonal to the target communication signal, according to +.>Can calculate +.>The pre-coding of the STIM signal is +.>
(4) The target communication transmitter is based on the precoding vector p STIM And transmit power P allocated to an STIM signal STIM Construction of STIM signals s STIM : the target communication transmitter transmits the STIM signal s STIM Together with the target communication signal, to the target communication receiver and using s STIM The method for managing the interference suffered by the target communication receiver comprises the following steps:
(4a) The target communication transmitter determining the power P allocated to the STIM signal STIM =P t -P w
(4b) The target communication transmitter is based on the precoding vector p of the STIM signal STIM Data x carried by interference 1 Construction of STIM signals
(5) The target communication receiver uses the filter vector f 0 For data x 0 The recovery method comprises the following steps:
(5a) The mixed signal including the STIM signal, the target communication signal and the interference received by the target communication receiver isThe first term on the right of the equation is the target communication signal, the second term is the STIM signal, the third term is the interference experienced, and the fourth term is the noise n at the target communication receiver B
(5b) The target communication receiver uses the filter vector f 0 Filtering the received mixed signal, when P STIM <P is The filtered estimated signal is thenWhere the superscript H denotes the complex conjugate, the second term to the right of the equation is the residual interference at the target communication receiver; when P STIM ≥P is When the interference suffered by the target communication receiver is completely eliminated, the filtered estimated signal is +.>
The application effect of the invention is further illustrated by the following simulation experiment:
1. simulation conditions:
the transmitter Alice sends a target communication signal to the receiver Bob, which receives interference from an interfering transmitter Tx. The eavesdropper Eve can only receive the signal from Alice and will not be interfered by the environmental transmitter. Alice and Tx and Bob and Eve are equipped with N T =N R =2 antennas, and both Alice and Tx transmit power P t P t Definition of signal to noise ratioSetting eta epsilon [0,20 ]]dB。
2. The simulation content:
under the above simulation condition, the method of the invention is used to obtain the receiving signal-to-noise ratio threshold gamma of Bob th At different times, the velocity performance of Bob obtained by the STIM method changes with eta by R B And R is E Representing the received data transmission rates of Bob and Eve, respectively, defining a safe rate R S =R B -R E Beta in the figure + And beta - The case where β in step (3 e) takes a positive value and a negative value, respectively, is shown. When Alice's transmitting power is insufficient to make Bob's receiving signal-to-noise ratio gamma reach gamma th When Alice stops sending signals to Bob, R will be B And R is E And is 0. When η is low, noise is a major factor affecting Bob's reception performance, and when Alice uses all power to transmit the target communication signal to Bob with a high probability, γ cannot be reached th The situation of demand, thus causing Alice to stop data transmission to Bob, i.e. the STIM method is not feasible, thus R B And R is E 0 with high probability, resulting in R in FIG. 3 (a) B And R is E Lower. With small increases in η, the probability that Alice can send a data signal to Bob, i.e. the probability that the STIM method is viable, increases, R E The probability of not 0 increases and, furthermore, since η is still low, P needs to be set t More of which are used to send the desired signal to Bob to satisfy γ th The power of the STIM signal is smaller, eve is interfered with weaker, and R is therefore E Will increase to some extent. When eta is large enough, P as eta continues to increase t In the satisfaction of gamma th On the premise that all the remaining power is used for the STIM signal, the interference from the STIM signal to which Eve is subjected increases with an increase in η, resulting in R E And (3) lowering. For R in FIG. 3 (a) B It increases with increasing η and then stabilizes. This is because, when η is low, P t The larger part of (a) is used for transmitting the target signal to Bob, which results in smaller power allocated to the STIM signal and only eliminates part of interference to Bob, so R B Lower; as η increases, the available power of the STIM signal increases, and the STIM signal can cancel more interference until Bob is completely cancelled, thereby obtaining a high R B . In summary, at low η, bob's data rate is affected by noise and interference, and Alice has a higher probability of stopping data transmission, as η increases, the probability of STIM increases, and more power is used for the STIM signal, so that Bob's interference decreases until it disappears, and thus R B Increase, but only reach gamma due to the power that Alice allocates to the desired signal th Not increasing with increasing η, so R is higher when η is higher B Tending towards a stable value.
As shown in FIGS. 3 (a) and 3 (b), R is obtained when β takes a positive value and a negative value B 、R E And R is S The same is true because P is obtained when beta takes positive and negative values STIM The same applies. But according to p STIM Can be expressed by the expression of (2)It is known that the value of β affects the precoding design of the STIM signal, i.e. the spatial characteristics of the STIM signal, and the spatial correlation of the STIM signal with the eavesdropping channel, which may have different effects on Eve, so that when Alice can obtain eavesdropping channel information, β having stronger interference to Eve, i.e. β, can be selected by calculation + And beta - Better safety performance as beta opt Thus from beta opt The resulting data rate R Eopt ) Lower than the rate R corresponding to beta + E+ ) And beta-corresponding rate R E- )。
The main difference between fig. 3 (a) and fig. 3 (b) is that R in fig. 3 (b) when η=0 dB B 、R E And R is S All 0 because Alice's transmit power is insufficient to achieve a received signal-to-noise ratio γ of Bob to γ when η=0 dB th =10db, at which point Alice stops transmitting signals, resulting in R B 、R E And R is S All 0.
Various modifications and variations may occur to those skilled in the art in light of the foregoing teachings and all such modifications and variations are intended to be included within the scope of the following claims.

Claims (5)

1. A transmission method for both security and interference management, applied to a hybrid wireless communication network comprising a target communication pair, an interfering communication pair and an eavesdropper, the target communication pair comprising a target communication transmitter and a target communication receiver, the interfering communication pair comprising an interfering communication transmitter and an interfering communication receiver, comprising the steps of:
(1) The target communication transmitter and the interference communication transmitter are connected with a controller, the target communication receiver and the interference communication receiver respectively estimate channel state information between the target communication transmitter and the corresponding transmitter and feed back the channel state information to the corresponding transmitter, and the target communication transmitter and the interference communication transmitter share the respective channel state information through the controller;
(2) The target communication pair and the interference communication pair respectively design a communication precoding vector and a filtering vector according to the respective channel state information;
(3) The target communication transmitter calculates a precoding vector p of the STIM signal according to the channel state information, the communication precoding vector, the filtering vector and the maximum available power of the interference management STIM signal considering safety STIM And determines the transmission power P of the STIM signal STIM Such that p is when the maximum available power of the STIM signal is less than the power required to completely cancel the projection of the interference on the target communication STIM Inverting the STIM signal with the projected component of the interference on the target communication signal; when the maximum available power of the STIM signal is greater than or equal to the power required for completely eliminating the projection of interference on the target communication, the target communication transmitter transmits the signal according to the self-transmission power P t Distributing the residual transmitting power after the projection of the completely interference elimination on the target communication in the direction orthogonal to the target communication signal;
(4) The target communication transmitter is based on the precoding vector p STIM And transmit power P allocated to an STIM signal STIM Construction of STIM signal s STIM The method comprises the steps of carrying out a first treatment on the surface of the The target communication transmitter transmits the STIM signal s STIM Together with the target communication signal, to the target communication receiver and using s STIM Managing interference experienced by a target communication receiver;
(5) The target communication receiver uses the filter vector f 0 Processing a mixed signal including a STIM signal, a target communication signal and interference to recover data x 0 Data x 0 For data transmitted by the target communication transmitter to the target communication receiver, the target communication receiver is configured to transmit the data to the target communication receiver based on the channel matrix H between the target communication pairs AB Designing a filter vector f for target communication 0
2. The transmission method of claim 1, wherein the target communication transmitter in step (3) calculates a precoding vector according to channel state information, a communication precoding vector, a filtering vector, and a maximum available power of an interference management STIM signal that is compatible with safety, comprising the steps of:
(3a) The target communication transmitter precodes the vector p according to interference communication 1 Target communication precoding vector p 0 And the filtered vector f 0 Calculating the direction d of the target communication signal w =H AB p 0 /||H AB p 0 | and interference of projected components on a target communication signalWherein->The projection matrix of the target communication signal is shown as the superscript H, the complex conjugate, the component orthogonal to the target communication signal is i Q =i-i In Interference communication precoding vector p 1 Transmitter for interference communication based on channel matrix H between interference communication pairs TB Designed precoding vector, target communication precoding vector p 0 For the target communication transmitter according to the channel matrix H between the target communication pairs AB A designed precoding vector;
(3b) The target communication transmitter based on the channel matrix H between the target communication pairs AB And a projection component, calculating the power required to completely cancel the projection component of the interference on the target communication signal
(3c) The signal-to-noise ratio of the target communication receiver needs to be satisfiedγ th Representing the minimum signal-to-noise ratio required for the target communication receiver to decode the signal normally, the target communication transmitter calculates the signal to be decoded>Minimum transmit power required for establishment +.>Target communication filter vector f 0 For the target communication receiver according to the channel matrix H between the target communication pairs AB A vector of the design;
(3d) The target communication transmitter is based on the total transmit power P STIM Minimum transmission power P of target communication signal w Calculating the available power P of an STIM signal STIM =P t -P w
(3e) The target communication transmitter determines whether the available power of the STIM signal is sufficient to completely eliminate the projected component of interference on the target communication signal when P is satisfied STIM <P is At the same time, the available power P of the STIM signal STIM Precoding vectors for STIM signals all for interference managementWhen meeting P STIM ≥P is When the STIM signal is written as s STIM =-i In +βi Q Where β is a real coefficient, determining the strength of the STIM signal in the direction orthogonal to the target communication signal, according to +.>Calculated->Precoding vector of STIM signal +.>
3. The transmission method for both secure communication and interference management according to claim 1, wherein the target communication transmitter mechanism STIM signal in step (4) comprises the steps of:
(4a) The target communication transmitter determining the power P allocated to the STIM signal STIM =P t -P w
(4b) The target communication transmitter is based on the precoding vector p of the STIM signal STIM Data x carried by interference 1 Construction of STIM signalsInterference data x 1 Data transmitted by the transmitter to the receiver for the interfering communication.
4. The transmission method for both secure communication and interference management according to claim 1, wherein the step (5) comprises the steps of:
(5a) The mixed signal including the STIM signal, the target communication signal and the interference received by the target communication receiver isThe first term on the right of the equation is the target communication signal, the second term is the STIM signal, the third term is the interference experienced, and the fourth term is the noise n at the target communication receiver B
(5b) The target communication receiver uses the filter vector f 0 Filtering the received mixed signal, when P STIM <P is The filtered estimated signal is thenWhere the superscript H denotes the complex conjugate, the second term to the right of the equation is the residual interference at the target communication receiver; when P STIM ≥P is When the interference suffered by the target communication receiver is completely eliminated, the filtered estimated signal is +.>
5. A communication system applying the transmission method of any one of claims 1 to 4, wherein both secure communication and interference management are compatible.
CN202110645665.8A 2021-06-09 2021-06-09 Transmission method and communication system with security and interference management Active CN113595605B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110645665.8A CN113595605B (en) 2021-06-09 2021-06-09 Transmission method and communication system with security and interference management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110645665.8A CN113595605B (en) 2021-06-09 2021-06-09 Transmission method and communication system with security and interference management

Publications (2)

Publication Number Publication Date
CN113595605A CN113595605A (en) 2021-11-02
CN113595605B true CN113595605B (en) 2023-08-04

Family

ID=78243622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110645665.8A Active CN113595605B (en) 2021-06-09 2021-06-09 Transmission method and communication system with security and interference management

Country Status (1)

Country Link
CN (1) CN113595605B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028434A (en) * 2016-05-27 2016-10-12 西安电子科技大学 Dynamic interference guiding method
CN108173583A (en) * 2017-12-07 2018-06-15 西安电子科技大学 Based on extensive MIMO single goals interference guidance method, mobile communication system and application

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102306100B1 (en) * 2014-05-21 2021-09-30 한국전자통신연구원 Apparatus for processing transmission/reception signal for interference alignment in a mu-mimo interference broadcasting channel and method thereof
US10644732B2 (en) * 2017-09-05 2020-05-05 Qualcomm Incorporated Systems and methods for signaling incorporating interference avoidance or beam nulling constraints for millimeter wave communication systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028434A (en) * 2016-05-27 2016-10-12 西安电子科技大学 Dynamic interference guiding method
CN108173583A (en) * 2017-12-07 2018-06-15 西安电子科技大学 Based on extensive MIMO single goals interference guidance method, mobile communication system and application

Also Published As

Publication number Publication date
CN113595605A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
Yan et al. Low probability of detection communication: Opportunities and challenges
Huo et al. Jamming strategies for physical layer security
Sánchez et al. Survey on physical layer security for 5G wireless networks
Yan et al. Secret channel training to enhance physical layer security with a full-duplex receiver
Moon et al. Proactive eavesdropping with jamming and eavesdropping mode selection
Forouzesh et al. Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden
Hua Advanced properties of full-duplex radio for securing wireless network
Yadav et al. A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges
KR20130102758A (en) Method and apparatus for secrecy transmitting in wireless environment
Tran et al. Proactive attack: A strategy for legitimate eavesdropping
Sun et al. Alternate-jamming-aided wireless physical-layer surveillance: Protocol design and performance analysis
CN108768443B (en) Spectrum spreading parameter agility method based on random signal
CN114242030A (en) Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission
Pan et al. Joint relay selection and power allocation for the physical layer security of two‐way cooperative relaying networks
Liang et al. Index-modulation embedded mode hopping for antijamming
CN113595605B (en) Transmission method and communication system with security and interference management
Ji et al. Securing wireless communications from the perspective of physical layer: A survey
CN113595675B (en) Interference management method and system for maximizing safe data transmission rate
Akgun et al. Receiver-based friendly jamming with single-antenna full-duplex receivers in a multiuser broadcast channel
MirhoseiniNejad et al. Phase jamming attack: A practical attack on physical layer-based key derivation
Hong et al. Power Allocation for Reducing PAPR of Artificial‐Noise‐Aided Secure Communication System
Sohrabi et al. A new look at secrecy capacity of MIMOME using artificial noise from Alice and Bob without knowledge of Eve’s CSI
Ying et al. D2D-assisted physical-layer security in next-generation mobile network
Din et al. Artificial noise assisted in-band full-duplex secure channel estimation
Zhang et al. Covert Communications for STAR-RIS-Assisted Industrial Networks With a Full Duplex Receiver and RSMA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant