CN114050887B - Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene - Google Patents
Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene Download PDFInfo
- Publication number
- CN114050887B CN114050887B CN202111220618.5A CN202111220618A CN114050887B CN 114050887 B CN114050887 B CN 114050887B CN 202111220618 A CN202111220618 A CN 202111220618A CN 114050887 B CN114050887 B CN 114050887B
- Authority
- CN
- China
- Prior art keywords
- channel
- eavesdropping
- antenna
- wfrft
- transmitting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000005540 biological transmission Effects 0.000 title claims abstract description 29
- 238000004891 communication Methods 0.000 claims abstract description 15
- 238000005516 engineering process Methods 0.000 claims abstract description 10
- 238000005562 fading Methods 0.000 claims description 35
- 238000006243 chemical reaction Methods 0.000 claims description 25
- 239000000654 additive Substances 0.000 claims description 6
- 230000000996 additive effect Effects 0.000 claims description 6
- 238000012549 training Methods 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 4
- 230000001419 dependent effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000007423 decrease Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/003—Secret communication by varying carrier frequency at or within predetermined or random intervals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a physical layer safe transmission method, a system and electronic equipment based on 4-WFRFT under a channel related scene, wherein the method is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; the method makes full use of the change of the 4-WFRFT technology to the signal characteristics of the communication signals, and reduces the signal-to-noise ratio of the eavesdrop end while not affecting the signal-to-noise ratio of the legal receiving end, thereby achieving the effect of improving the traversal secret capacity.
Description
Technical Field
The invention belongs to the technical field of secret communication, and particularly relates to a physical layer secure transmission method, a physical layer secure transmission system and electronic equipment based on 4-WFRFT under a channel related scene.
Background
In the course of social development, information security has been a hot topic. Traditional information security relies on encryption algorithms at the application layer, corresponding to computational security. But as new computing power increases, there is a risk that the encryption algorithm will be broken. Physical layer security aims to establish secure communications using the random nature of wireless channels, and is absolute security implemented on the basis of information theory.
The correlation of the primary channel and the eavesdropping channel may occur due to reflection and refraction of the signal or the eavesdropper actively approaching the legitimate receiving end. When the four-term Weighted-fraction Fourier transform (4-Weighted-type Fractional Fourier Transform, 4-WFRFT) technology is applied, the traversal secret capacity can be obviously increased under the scene of channel correlation, and the aim of secret communication is fulfilled.
The 4-WFRFT corresponds to a rotation and splitting of constellation points of the modulated signal. Only when the transmitting end and the receiving end share the modulation order, the receiving end can recover the constellation point and demodulate. If the receiving end does not know the modulation order, the received signal is divided into two parts, one part can be used for correctly demodulating information, and the other part is equivalent to 'artificial noise', so that the signal-to-noise ratio of the receiving end is greatly reduced.
Disclosure of Invention
The invention aims to solve the problem that the traversing secret capacity is limited in improving effect under the condition that the channel correlation exists between a main channel and a eavesdropping channel, and provides a physical layer secure transmission method, a physical layer secure transmission system and electronic equipment based on 4-WFRFT under the condition that the channel correlation exists.
The invention is realized according to the scheme, and the invention provides a physical layer safe transmission method based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, a legal receiving end sends a training sequence to a transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
and 5, the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
Further, the transmission signal S obtained in the step 3 k :S k =F α [x k ]And experience a rayleigh fading channel,
signal y arriving at legal receiving end k :
Signal z arriving at the eavesdropping end k :
Wherein F is α [·]For alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, obey complex gaussian distribution, i.e n M 、n E Additive white gaussian noise of the main channel and the eavesdropping channel, respectively, obeys gaussian distribution, i.e. n M ~N(0,N M )、n E ~N(0,N E );N M Representing the noise power of legal receiving end, N E Noise power representing eavesdropping side, +.>The path transmission loss magnitudes of the primary channel and the eavesdropping channel are represented, respectively.
Further, when there is a channel correlation, the channel fading coefficients h of the main channel and the eavesdropping channel M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
further, after the legal receiving end in the step 4 performs 4-WFRFT with the transformation order of-alpha, the signal is further processed into:
r Bk =F -α [y k ],r BK representing the received signal before the baseband demapping of the legal receiving end;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
further, after the eavesdropping terminal in step 5 performs 4-WFRFT with the transformed order of-beta, an estimated deviation is definedThe signal is further processed as:
r Ek =F -β [z k ],r EK representing the received signal before the eavesdropping end baseband demapping;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
C S =[log(1+γ M )-log(1+γ E )] +
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
the invention also provides a physical layer safety transmission system based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The invention also proposes an electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a 4-WFRFT based physical layer security transmission method in the channel dependent scenario.
The invention processes the signal by the 4-WFRFT technology, the transmitting end and the legal receiving end share the modulation order, and the eavesdropping end cannot accurately acquire the modulation order, so that the signal-to-noise ratio of the eavesdropping end can be deteriorated by the introduction of the 4-WFRFT, thereby improving the traversal secret capacity of the communication system and achieving the aim of secret communication. The larger the deviation estimated by the eavesdropping end, the larger the traversal secret capacity improvement. The invention greatly improves the secret transmission capacity of the communication system.
Drawings
Fig. 1 is a schematic diagram of an antenna selection technique of the present invention;
FIG. 2 is a schematic diagram of an eavesdropping channel model of the present invention;
FIG. 3 is a diagram of a physical layer security transmission method according to the present invention;
FIG. 4 is a schematic diagram of a 4-WFRFT module structure of the present invention;
FIG. 5 is a schematic diagram of a simulation of traversing the secure capacity as a function of estimated bias and correlation coefficient variation;
fig. 6 is a schematic diagram of a simulation of traversing the secret capacity as a function of transmit power and estimated bias.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
With reference to fig. 1-6, the present invention proposes a physical layer security transmission method based on 4-WFRFT in a channel related scenario, where the method is applied to a transmitting end having N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, assuming that there is no antenna correlation, N is generated A ×N B The legal receiving end sends training sequences to the transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
calculating fading coefficient h of each channel subset M,ij The channel matrix H of the main channel can be obtained M The following can be written:
from N A ×N B Selecting the best one of the sub-channels, i.e. selecting |h M,ij The channel with the largest I, the transmitting antenna and the receiving antenna of which are determined as the transmitting antenna and the receiving antenna for communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
and 5, the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The transmission signal S obtained in the step 3 k :S k =F α [x k ]And experience a rayleigh fading channel,
signal y arriving at legal receiving end k :
Signal z arriving at the eavesdropping end k :
Wherein F is α [·]For alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, obey complex gaussian distribution, i.e n M 、n E Additive white gaussian noise of the main channel and the eavesdropping channel, respectively, obeys gaussian distribution, i.e. n M ~N(0,N M )、n E ~N(0,N E );N M Representing the noise power of legal receiving end, N E Noise power representing eavesdropping side, +.>The path transmission loss magnitudes of the primary channel and the eavesdropping channel are represented, respectively.
Channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
where Cov (·) is covariance and D (·) is variance.
After the legal receiving end in the step 4 performs 4-WFRFT with the conversion order of-alpha, the signal is further processed into:
r BK representing the received signal before the baseband demapping of the legal receiving end; n is n M ' represents transform domain noise obtained after the additive Gaussian white noise of the main channel passes through 4-WFRFT;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
after the eavesdropping terminal in step 5 performs 4-WFRFT with the conversion order of-beta, an estimated deviation is definedThe signal is further processed as:
r EK representing the received signal before the eavesdropping end baseband demapping; n is n E ' transform domain noise obtained after 4-WFRFT is used for indicating additive Gaussian white noise of eavesdropping channels; omega 1 (.),ω 2 (.),ω 3 (.) are all weighting coefficients;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
the invention also provides a physical layer safety transmission system based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B Selection from separate channelsSelecting 1 channel with the best channel state, and transmitting information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The invention also proposes an electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a 4-WFRFT based physical layer security transmission method in the channel dependent scenario.
The security performance of the secret communication method of the present invention is verified as follows.
K is defined herein as the channel state ratio,
FIG. 5 shows the effect of variations in estimated bias and correlation coefficients on the traversal secret capacity. In the figure, the number of transmitting end antennas and the number of legal receiving end antennas N A ×N B Set to 2×2; path transmission loss of main channelPath transmission loss of eavesdropping channel>Noise power N M =N E -100dBm; the transmitting power of the transmitting end is set to be 10dBm; the correlation coefficient ρ is set to 0.1, 0.5, and 0.9.
It can be seen that the larger the estimated deviation is, the more secure capacity is traversed within the range of 0.ltoreq.Δα.ltoreq.1The larger. This is because, as Δα increases, the eavesdropping side is equivalent to a decrease in power of the received signal and an increase in power of artificial noise, so that the signal-to-noise ratio of the eavesdropping side decreases, while the signal-to-noise ratio of the legitimate receiving side is unchanged, so that the traversal security capacity +.>Gradually increasing.
Fig. 6 shows the effect of variations in transmit power and estimated bias on the secret capacity. In the figure, the number of transmitting end antennas and the number of legal receiving end antennas N A ×N B Set to 2×2; path transmission loss of main channelPath transmission loss of eavesdropping channel>Noise power N M =N E -100dBm; the correlation coefficient ρ is set to 0.3.
It can be seen that when Δα=0, that is, the eavesdropping end accurately estimates the transformation order α negotiated by the transmitting end and the legal receiving end, the 4-WFRFT technique cannot achieve the reduction of the eavesdropping end signal-to-noiseFor comparison purposes, the secret capacity is traversed as the transmit power P increasesThe lift is small. However, when Δα is not equal to 0, i.e. there is an estimated deviation, the 4-WFRFT technique can effectively reduce the signal-to-noise ratio at the eavesdropping end, thus traversing the privacy capacity ++as P increases>Has great lifting.
The physical layer secure transmission method, system and electronic equipment based on 4-WFRFT in the channel related scene provided by the invention are described in detail, and specific examples are applied to illustrate the principle and implementation of the invention, and the description of the above examples is only used for helping to understand the method and core ideas of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.
Claims (5)
1. The physical layer safe transmission method based on 4-WFRFT in the channel related scene is characterized in that: the method is applied to the transmitting terminal with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, a legal receiving end sends a training sequence to a transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, the transmitting antenna and the receiving antenna of the sub-channelThe receiving antenna is determined as a transmitting antenna and a receiving antenna for communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
step 5, the eavesdropping terminal carries out 4-WFRFT with the conversion order of-beta, and then carries out demodulation;
the transmission signal S obtained in the step 3 k :A rayleigh fading channel is experienced and,
signal y arriving at legal receiving end k :
Signal z arriving at the eavesdropping end k :
In the method, in the process of the invention,for alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, follow a complex gaussian distribution, i.e +.> n M 、n E Additive white gaussian noise of main channel and eavesdropping channel respectively, subject to gaussian distribution, i.eN M Representing the noise power of legal receiving end, N E Representing the noise power of the eavesdropping end,the path transmission loss magnitudes of the main channel and the eavesdropping channel are respectively represented;
channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obeyIs a gaussian distribution of (c); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
2. the method according to claim 1, characterized in that: after the legal receiving end in the step 4 performs 4-WFRFT with the conversion order of-alpha, the signal is further processed into:
r BK representing the received signal before the baseband demapping of the legal receiving end;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
3. the method according to claim 2, characterized in that: after the eavesdropping terminal in step 5 performs 4-WFRFT with the conversion order of-beta, an estimated deviation is definedThe signal is further processed as:
r EK representing the received signal before the eavesdropping end baseband demapping;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
C S =[log(1+γ M )-log(1+γ E )] +
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
4. the physical layer safety transmission system based on 4-WFRFT in the relevant scene of the channel is characterized in that: the system is applied to the transmitting end and provided with N A Root antenna, legal receiving end has N B 1 antenna and eavesdropping terminalUnder the scene of the antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping terminal performs 4-WFRFT with the conversion order of-beta, and then performs demodulation;
transmitting signal S obtained by transmitting end Fourier transform module k :A rayleigh fading channel is experienced and,
signal y arriving at legal receiving end k :
Signal z arriving at the eavesdropping end k :
In the method, in the process of the invention,for alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, follow a complex gaussian distribution, i.e +.> n M 、n E Additive white gaussian noise of main channel and eavesdropping channel respectively, subject to gaussian distribution, i.eN M Representing the noise power of legal receiving end, N E Representing the noise power of the eavesdropping end,the path transmission loss magnitudes of the main channel and the eavesdropping channel are respectively represented;
channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
5. an electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the 4-WFRFT based physical layer secure transfer method in a channel dependent scenario of any of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111220618.5A CN114050887B (en) | 2021-10-20 | 2021-10-20 | Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111220618.5A CN114050887B (en) | 2021-10-20 | 2021-10-20 | Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114050887A CN114050887A (en) | 2022-02-15 |
CN114050887B true CN114050887B (en) | 2024-01-05 |
Family
ID=80205743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111220618.5A Active CN114050887B (en) | 2021-10-20 | 2021-10-20 | Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114050887B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112994833A (en) * | 2021-02-10 | 2021-06-18 | 哈尔滨工业大学 | WFRFT-based transparent transponder user cooperation physical layer secure transmission method |
CN113162896A (en) * | 2020-12-23 | 2021-07-23 | 哈尔滨工业大学 | Physical layer safe transmission method based on three-term weighted fractional Fourier transform |
-
2021
- 2021-10-20 CN CN202111220618.5A patent/CN114050887B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113162896A (en) * | 2020-12-23 | 2021-07-23 | 哈尔滨工业大学 | Physical layer safe transmission method based on three-term weighted fractional Fourier transform |
CN112994833A (en) * | 2021-02-10 | 2021-06-18 | 哈尔滨工业大学 | WFRFT-based transparent transponder user cooperation physical layer secure transmission method |
Non-Patent Citations (3)
Title |
---|
4-WFRFT for Physical Layer Security Enhancement Based on MIMO Correlated Channel;Jiuning Zhang et al.;2021 AUTEEE;全文 * |
Secrecy Capacity Analysis of 4- WFRFT Based Physical Layer Security in MIMO System;Tao Xu et al.;Computer Science;全文 * |
基于信道相关性的物理层安全性能分析;吴宣利等;通信学报;第42卷(第3期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114050887A (en) | 2022-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zheng et al. | Likelihood-based automatic modulation classification in OFDM with index modulation | |
CN106911374B (en) | Low-complexity soft output spatial modulation detection method | |
CN105049398B (en) | A kind of adjustable modulator approach of constellation point mapping mode based on the modulation of carrier wave label | |
CN111431617A (en) | Asymmetric amplitude limiting light OFDM-IM modulation method for wireless optical communication | |
CN105577329A (en) | Physical layer secure transmission method based on spatial modulation | |
CN107302419B (en) | A kind of low complex degree detection method for MIMO-OFDM system | |
CN106161328A (en) | The detection method of MIMO ofdm system based on carrier index modulation | |
CN111614590A (en) | Anti-detection transmission method based on extended weighted fractional Fourier transform | |
CN108833341A (en) | A kind of safe transmission method of physical layer based on subcarrier sequence and XOR operation in ofdm system | |
CN105657700A (en) | Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes | |
CN113852575A (en) | Iterative OTFS symbol detection method based on time domain channel equalization assistance | |
CN110176952B (en) | Antenna selection method in secure spatial modulation network | |
CN112702732B (en) | Generalized spatial modulation secure transmission method based on low-complexity additive noise | |
CN114050887B (en) | Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene | |
CN107888251B (en) | Physical layer communication method of multi-input multi-output power line communication system | |
CN108737301A (en) | A kind of broadband connections transmitter fingerprint method of estimation based on B-spline neural network | |
Wu et al. | Orthogonal frequency division multiplexing underwater acoustic communication system with environmental cognition ability | |
CN111884980A (en) | Generalized index modulation optical OFDM modulation method for wireless optical communication | |
CN109818663B (en) | Low-complexity differential orthogonal space modulation detection method | |
Zhao et al. | Adaptive power allocation for non-coherent FSK in time-varying underwater acoustic communication channels | |
CN110635832A (en) | Wireless network maximum safe rate power distribution method based on direction modulation | |
CN113612571B (en) | Multi-component safe transmission method based on generalized multi-fraction Fourier transform | |
CN106788633B (en) | Uplink incoherent space-time transmission method for large-scale antenna system | |
CN110381003A (en) | The multiuser signal detection method inhibited for peak-to-average force ratio in SCMA-OFDM system | |
CN112350971B (en) | Code domain index modulation method for covert communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |