CN114050887B - Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene - Google Patents

Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene Download PDF

Info

Publication number
CN114050887B
CN114050887B CN202111220618.5A CN202111220618A CN114050887B CN 114050887 B CN114050887 B CN 114050887B CN 202111220618 A CN202111220618 A CN 202111220618A CN 114050887 B CN114050887 B CN 114050887B
Authority
CN
China
Prior art keywords
channel
eavesdropping
antenna
wfrft
transmitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111220618.5A
Other languages
Chinese (zh)
Other versions
CN114050887A (en
Inventor
吴宣利
张久宁
李勇
潘天助
吴玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
CETC 54 Research Institute
Original Assignee
Harbin Institute of Technology
CETC 54 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology, CETC 54 Research Institute filed Critical Harbin Institute of Technology
Priority to CN202111220618.5A priority Critical patent/CN114050887B/en
Publication of CN114050887A publication Critical patent/CN114050887A/en
Application granted granted Critical
Publication of CN114050887B publication Critical patent/CN114050887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/003Secret communication by varying carrier frequency at or within predetermined or random intervals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a physical layer safe transmission method, a system and electronic equipment based on 4-WFRFT under a channel related scene, wherein the method is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; the method makes full use of the change of the 4-WFRFT technology to the signal characteristics of the communication signals, and reduces the signal-to-noise ratio of the eavesdrop end while not affecting the signal-to-noise ratio of the legal receiving end, thereby achieving the effect of improving the traversal secret capacity.

Description

Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene
Technical Field
The invention belongs to the technical field of secret communication, and particularly relates to a physical layer secure transmission method, a physical layer secure transmission system and electronic equipment based on 4-WFRFT under a channel related scene.
Background
In the course of social development, information security has been a hot topic. Traditional information security relies on encryption algorithms at the application layer, corresponding to computational security. But as new computing power increases, there is a risk that the encryption algorithm will be broken. Physical layer security aims to establish secure communications using the random nature of wireless channels, and is absolute security implemented on the basis of information theory.
The correlation of the primary channel and the eavesdropping channel may occur due to reflection and refraction of the signal or the eavesdropper actively approaching the legitimate receiving end. When the four-term Weighted-fraction Fourier transform (4-Weighted-type Fractional Fourier Transform, 4-WFRFT) technology is applied, the traversal secret capacity can be obviously increased under the scene of channel correlation, and the aim of secret communication is fulfilled.
The 4-WFRFT corresponds to a rotation and splitting of constellation points of the modulated signal. Only when the transmitting end and the receiving end share the modulation order, the receiving end can recover the constellation point and demodulate. If the receiving end does not know the modulation order, the received signal is divided into two parts, one part can be used for correctly demodulating information, and the other part is equivalent to 'artificial noise', so that the signal-to-noise ratio of the receiving end is greatly reduced.
Disclosure of Invention
The invention aims to solve the problem that the traversing secret capacity is limited in improving effect under the condition that the channel correlation exists between a main channel and a eavesdropping channel, and provides a physical layer secure transmission method, a physical layer secure transmission system and electronic equipment based on 4-WFRFT under the condition that the channel correlation exists.
The invention is realized according to the scheme, and the invention provides a physical layer safe transmission method based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, a legal receiving end sends a training sequence to a transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
and 5, the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
Further, the transmission signal S obtained in the step 3 k :S k =F α [x k ]And experience a rayleigh fading channel,
signal y arriving at legal receiving end k
Signal z arriving at the eavesdropping end k
Wherein F is α [·]For alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, obey complex gaussian distribution, i.e n M 、n E Additive white gaussian noise of the main channel and the eavesdropping channel, respectively, obeys gaussian distribution, i.e. n M ~N(0,N M )、n E ~N(0,N E );N M Representing the noise power of legal receiving end, N E Noise power representing eavesdropping side, +.>The path transmission loss magnitudes of the primary channel and the eavesdropping channel are represented, respectively.
Further, when there is a channel correlation, the channel fading coefficients h of the main channel and the eavesdropping channel M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
further, after the legal receiving end in the step 4 performs 4-WFRFT with the transformation order of-alpha, the signal is further processed into:
r Bk =F [y k ],r BK representing the received signal before the baseband demapping of the legal receiving end;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
further, after the eavesdropping terminal in step 5 performs 4-WFRFT with the transformed order of-beta, an estimated deviation is definedThe signal is further processed as:
r Ek =F [z k ],r EK representing the received signal before the eavesdropping end baseband demapping;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
C S =[log(1+γ M )-log(1+γ E )] +
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
the invention also provides a physical layer safety transmission system based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The invention also proposes an electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a 4-WFRFT based physical layer security transmission method in the channel dependent scenario.
The invention processes the signal by the 4-WFRFT technology, the transmitting end and the legal receiving end share the modulation order, and the eavesdropping end cannot accurately acquire the modulation order, so that the signal-to-noise ratio of the eavesdropping end can be deteriorated by the introduction of the 4-WFRFT, thereby improving the traversal secret capacity of the communication system and achieving the aim of secret communication. The larger the deviation estimated by the eavesdropping end, the larger the traversal secret capacity improvement. The invention greatly improves the secret transmission capacity of the communication system.
Drawings
Fig. 1 is a schematic diagram of an antenna selection technique of the present invention;
FIG. 2 is a schematic diagram of an eavesdropping channel model of the present invention;
FIG. 3 is a diagram of a physical layer security transmission method according to the present invention;
FIG. 4 is a schematic diagram of a 4-WFRFT module structure of the present invention;
FIG. 5 is a schematic diagram of a simulation of traversing the secure capacity as a function of estimated bias and correlation coefficient variation;
fig. 6 is a schematic diagram of a simulation of traversing the secret capacity as a function of transmit power and estimated bias.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
With reference to fig. 1-6, the present invention proposes a physical layer security transmission method based on 4-WFRFT in a channel related scenario, where the method is applied to a transmitting end having N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, assuming that there is no antenna correlation, N is generated A ×N B The legal receiving end sends training sequences to the transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
calculating fading coefficient h of each channel subset M,ij The channel matrix H of the main channel can be obtained M The following can be written:
from N A ×N B Selecting the best one of the sub-channels, i.e. selecting |h M,ij The channel with the largest I, the transmitting antenna and the receiving antenna of which are determined as the transmitting antenna and the receiving antenna for communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
and 5, the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The transmission signal S obtained in the step 3 k :S k =F α [x k ]And experience a rayleigh fading channel,
signal y arriving at legal receiving end k
Signal z arriving at the eavesdropping end k
Wherein F is α [·]For alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, obey complex gaussian distribution, i.e n M 、n E Additive white gaussian noise of the main channel and the eavesdropping channel, respectively, obeys gaussian distribution, i.e. n M ~N(0,N M )、n E ~N(0,N E );N M Representing the noise power of legal receiving end, N E Noise power representing eavesdropping side, +.>The path transmission loss magnitudes of the primary channel and the eavesdropping channel are represented, respectively.
Channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
where Cov (·) is covariance and D (·) is variance.
After the legal receiving end in the step 4 performs 4-WFRFT with the conversion order of-alpha, the signal is further processed into:
r BK representing the received signal before the baseband demapping of the legal receiving end; n is n M ' represents transform domain noise obtained after the additive Gaussian white noise of the main channel passes through 4-WFRFT;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
after the eavesdropping terminal in step 5 performs 4-WFRFT with the conversion order of-beta, an estimated deviation is definedThe signal is further processed as:
r EK representing the received signal before the eavesdropping end baseband demapping; n is n E ' transform domain noise obtained after 4-WFRFT is used for indicating additive Gaussian white noise of eavesdropping channels; omega 1 (.),ω 2 (.),ω 3 (.) are all weighting coefficients;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
the invention also provides a physical layer safety transmission system based on 4-WFRFT in a channel related scene, which is applied to a transmitting end with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B Selection from separate channelsSelecting 1 channel with the best channel state, and transmitting information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping end performs 4-WFRFT with the conversion order of-beta, and then performs demodulation.
The invention also proposes an electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a 4-WFRFT based physical layer security transmission method in the channel dependent scenario.
The security performance of the secret communication method of the present invention is verified as follows.
K is defined herein as the channel state ratio,
FIG. 5 shows the effect of variations in estimated bias and correlation coefficients on the traversal secret capacity. In the figure, the number of transmitting end antennas and the number of legal receiving end antennas N A ×N B Set to 2×2; path transmission loss of main channelPath transmission loss of eavesdropping channel>Noise power N M =N E -100dBm; the transmitting power of the transmitting end is set to be 10dBm; the correlation coefficient ρ is set to 0.1, 0.5, and 0.9.
It can be seen that the larger the estimated deviation is, the more secure capacity is traversed within the range of 0.ltoreq.Δα.ltoreq.1The larger. This is because, as Δα increases, the eavesdropping side is equivalent to a decrease in power of the received signal and an increase in power of artificial noise, so that the signal-to-noise ratio of the eavesdropping side decreases, while the signal-to-noise ratio of the legitimate receiving side is unchanged, so that the traversal security capacity +.>Gradually increasing.
Fig. 6 shows the effect of variations in transmit power and estimated bias on the secret capacity. In the figure, the number of transmitting end antennas and the number of legal receiving end antennas N A ×N B Set to 2×2; path transmission loss of main channelPath transmission loss of eavesdropping channel>Noise power N M =N E -100dBm; the correlation coefficient ρ is set to 0.3.
It can be seen that when Δα=0, that is, the eavesdropping end accurately estimates the transformation order α negotiated by the transmitting end and the legal receiving end, the 4-WFRFT technique cannot achieve the reduction of the eavesdropping end signal-to-noiseFor comparison purposes, the secret capacity is traversed as the transmit power P increasesThe lift is small. However, when Δα is not equal to 0, i.e. there is an estimated deviation, the 4-WFRFT technique can effectively reduce the signal-to-noise ratio at the eavesdropping end, thus traversing the privacy capacity ++as P increases>Has great lifting.
The physical layer secure transmission method, system and electronic equipment based on 4-WFRFT in the channel related scene provided by the invention are described in detail, and specific examples are applied to illustrate the principle and implementation of the invention, and the description of the above examples is only used for helping to understand the method and core ideas of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (5)

1. The physical layer safe transmission method based on 4-WFRFT in the channel related scene is characterized in that: the method is applied to the transmitting terminal with N A Root antenna, legal receiving end has N B The antenna is arranged in a scene that the eavesdropping end is provided with 1 antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the method specifically comprises the following steps:
step 1, a legal receiving end sends a training sequence to a transmitting end for channel estimation;
step 2, the transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, the transmitting antenna and the receiving antenna of the sub-channelThe receiving antenna is determined as a transmitting antenna and a receiving antenna for communication;
step 3, the transmitting end carries out 4-WFRFT with the conversion order alpha on the data, and then carries out digital-analog conversion to obtain a transmitting signal;
step 4, the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
step 5, the eavesdropping terminal carries out 4-WFRFT with the conversion order of-beta, and then carries out demodulation;
the transmission signal S obtained in the step 3 kA rayleigh fading channel is experienced and,
signal y arriving at legal receiving end k
Signal z arriving at the eavesdropping end k
In the method, in the process of the invention,for alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, follow a complex gaussian distribution, i.e +.> n M 、n E Additive white gaussian noise of main channel and eavesdropping channel respectively, subject to gaussian distribution, i.eN M Representing the noise power of legal receiving end, N E Representing the noise power of the eavesdropping end,the path transmission loss magnitudes of the main channel and the eavesdropping channel are respectively represented;
channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obeyIs a gaussian distribution of (c); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
2. the method according to claim 1, characterized in that: after the legal receiving end in the step 4 performs 4-WFRFT with the conversion order of-alpha, the signal is further processed into:
r BK representing the received signal before the baseband demapping of the legal receiving end;
the legal receiving end instantaneous signal-to-noise ratio is expressed as:
3. the method according to claim 2, characterized in that: after the eavesdropping terminal in step 5 performs 4-WFRFT with the conversion order of-beta, an estimated deviation is definedThe signal is further processed as:
r EK representing the received signal before the eavesdropping end baseband demapping;
the instantaneous signal-to-noise ratio at the eavesdropping end is expressed as:
wherein omega 0 (Δα) represents a weighting coefficient;
the instantaneous secret capacity is expressed as:
C S =[log(1+γ M )-log(1+γ E )] +
traversing secret capacities is the statistical average of instantaneous secret capacities, namely:
4. the physical layer safety transmission system based on 4-WFRFT in the relevant scene of the channel is characterized in that: the system is applied to the transmitting end and provided with N A Root antenna, legal receiving end has N B 1 antenna and eavesdropping terminalUnder the scene of the antenna; the main channel adopts antenna selection technology, and the secondary N A ×N B 1 channel with the best channel state is selected from the independent channels to transmit information; the eavesdropping terminal is in a passive eavesdropping state, and does not generate any form of interference on the main channel; both the primary channel and the eavesdropping channel experience slow fading; the system comprises:
and a sending module: a legal receiving end sends a training sequence to a transmitting end for channel estimation;
an optimal channel selection module: transmitting end searches N A ×N B A plurality of fading channel subsets, calculating the fading coefficient of each channel subset, selecting the optimal 1 sub-channel, and determining the transmitting antenna and the receiving antenna of the sub-channel as the transmitting antenna and the receiving antenna of the communication;
a transmitting end Fourier transform module: the transmitting end converts the data into 4-WFRFT with the order alpha, and then obtains a transmitting signal through digital-analog conversion;
legal receiving end demodulation module: the legal receiving end carries out 4-WFRFT with the conversion order of-alpha, and then carries out demodulation;
eavesdropping end demodulation module: the eavesdropping terminal performs 4-WFRFT with the conversion order of-beta, and then performs demodulation;
transmitting signal S obtained by transmitting end Fourier transform module kA rayleigh fading channel is experienced and,
signal y arriving at legal receiving end k
Signal z arriving at the eavesdropping end k
In the method, in the process of the invention,for alpha order weighted fractional Fourier transform, x k Representing symbol data after baseband mapping, P is transmitting power, h M 、h E Channel fading coefficients of the main channel and the eavesdropping channel, respectively, follow a complex gaussian distribution, i.e +.> n M 、n E Additive white gaussian noise of main channel and eavesdropping channel respectively, subject to gaussian distribution, i.eN M Representing the noise power of legal receiving end, N E Representing the noise power of the eavesdropping end,the path transmission loss magnitudes of the main channel and the eavesdropping channel are respectively represented;
channel fading coefficients h of the primary and eavesdropping channels when channel correlation exists M And h E Expressed as:
wherein X is M 、Y M 、X E 、Y E 、X 0 、Y 0 All represent random variables and are independent of each other and all obey a gaussian distribution of N (0, 1/2); η and λ are weight coefficients satisfying |η| < 1 and |λ| < 1, respectively; j represents an imaginary unit;
then the channel fading coefficient h M And h E The correlation coefficient between these is expressed as:
ρ=ηλ。
5. an electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the 4-WFRFT based physical layer secure transfer method in a channel dependent scenario of any of claims 1-3.
CN202111220618.5A 2021-10-20 2021-10-20 Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene Active CN114050887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111220618.5A CN114050887B (en) 2021-10-20 2021-10-20 Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111220618.5A CN114050887B (en) 2021-10-20 2021-10-20 Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene

Publications (2)

Publication Number Publication Date
CN114050887A CN114050887A (en) 2022-02-15
CN114050887B true CN114050887B (en) 2024-01-05

Family

ID=80205743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111220618.5A Active CN114050887B (en) 2021-10-20 2021-10-20 Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene

Country Status (1)

Country Link
CN (1) CN114050887B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112994833A (en) * 2021-02-10 2021-06-18 哈尔滨工业大学 WFRFT-based transparent transponder user cooperation physical layer secure transmission method
CN113162896A (en) * 2020-12-23 2021-07-23 哈尔滨工业大学 Physical layer safe transmission method based on three-term weighted fractional Fourier transform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113162896A (en) * 2020-12-23 2021-07-23 哈尔滨工业大学 Physical layer safe transmission method based on three-term weighted fractional Fourier transform
CN112994833A (en) * 2021-02-10 2021-06-18 哈尔滨工业大学 WFRFT-based transparent transponder user cooperation physical layer secure transmission method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
4-WFRFT for Physical Layer Security Enhancement Based on MIMO Correlated Channel;Jiuning Zhang et al.;2021 AUTEEE;全文 *
Secrecy Capacity Analysis of 4- WFRFT Based Physical Layer Security in MIMO System;Tao Xu et al.;Computer Science;全文 *
基于信道相关性的物理层安全性能分析;吴宣利等;通信学报;第42卷(第3期);全文 *

Also Published As

Publication number Publication date
CN114050887A (en) 2022-02-15

Similar Documents

Publication Publication Date Title
Zheng et al. Likelihood-based automatic modulation classification in OFDM with index modulation
CN106911374B (en) Low-complexity soft output spatial modulation detection method
CN105049398B (en) A kind of adjustable modulator approach of constellation point mapping mode based on the modulation of carrier wave label
CN111431617A (en) Asymmetric amplitude limiting light OFDM-IM modulation method for wireless optical communication
CN105577329A (en) Physical layer secure transmission method based on spatial modulation
CN107302419B (en) A kind of low complex degree detection method for MIMO-OFDM system
CN106161328A (en) The detection method of MIMO ofdm system based on carrier index modulation
CN111614590A (en) Anti-detection transmission method based on extended weighted fractional Fourier transform
CN108833341A (en) A kind of safe transmission method of physical layer based on subcarrier sequence and XOR operation in ofdm system
CN105657700A (en) Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN113852575A (en) Iterative OTFS symbol detection method based on time domain channel equalization assistance
CN110176952B (en) Antenna selection method in secure spatial modulation network
CN112702732B (en) Generalized spatial modulation secure transmission method based on low-complexity additive noise
CN114050887B (en) Physical layer secure transmission method, system and electronic equipment based on 4-WFRFT under channel related scene
CN107888251B (en) Physical layer communication method of multi-input multi-output power line communication system
CN108737301A (en) A kind of broadband connections transmitter fingerprint method of estimation based on B-spline neural network
Wu et al. Orthogonal frequency division multiplexing underwater acoustic communication system with environmental cognition ability
CN111884980A (en) Generalized index modulation optical OFDM modulation method for wireless optical communication
CN109818663B (en) Low-complexity differential orthogonal space modulation detection method
Zhao et al. Adaptive power allocation for non-coherent FSK in time-varying underwater acoustic communication channels
CN110635832A (en) Wireless network maximum safe rate power distribution method based on direction modulation
CN113612571B (en) Multi-component safe transmission method based on generalized multi-fraction Fourier transform
CN106788633B (en) Uplink incoherent space-time transmission method for large-scale antenna system
CN110381003A (en) The multiuser signal detection method inhibited for peak-to-average force ratio in SCMA-OFDM system
CN112350971B (en) Code domain index modulation method for covert communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant