CN114242030A - Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission - Google Patents

Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission Download PDF

Info

Publication number
CN114242030A
CN114242030A CN202210100662.0A CN202210100662A CN114242030A CN 114242030 A CN114242030 A CN 114242030A CN 202210100662 A CN202210100662 A CN 202210100662A CN 114242030 A CN114242030 A CN 114242030A
Authority
CN
China
Prior art keywords
eavesdropper
rate
optimization
energy transmission
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210100662.0A
Other languages
Chinese (zh)
Inventor
李阳
张迪
张祖凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202210100662.0A priority Critical patent/CN114242030A/en
Publication of CN114242030A publication Critical patent/CN114242030A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/822Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by detecting the presence of a surveillance, interception or detection
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10KSOUND-PRODUCING DEVICES; METHODS OR DEVICES FOR PROTECTING AGAINST, OR FOR DAMPING, NOISE OR OTHER ACOUSTIC WAVES IN GENERAL; ACOUSTICS NOT OTHERWISE PROVIDED FOR
    • G10K11/00Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
    • G10K11/16Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
    • G10K11/175Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound
    • G10K11/178Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
    • G10K11/1781Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase characterised by the analysis of input or output signals, e.g. frequency range, modes, transfer functions
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10KSOUND-PRODUCING DEVICES; METHODS OR DEVICES FOR PROTECTING AGAINST, OR FOR DAMPING, NOISE OR OTHER ACOUSTIC WAVES IN GENERAL; ACOUSTICS NOT OTHERWISE PROVIDED FOR
    • G10K11/00Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
    • G10K11/16Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
    • G10K11/175Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound
    • G10K11/178Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/827Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection using characteristics of target signal or of transmission, e.g. using direct sequence spread spectrum or fast frequency hopping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/19Arrangements of transmitters, receivers, or complete sets to prevent eavesdropping, to attenuate local noise or to prevent undesired transmission; Mouthpieces or receivers specially adapted therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/006Secret communication by varying or inverting the phase, at periodic or random intervals

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a secret keeping rate maximization method based on auxiliary wireless energy transmission of an intelligent reflection surface, and belongs to the technical field of communication. The method comprises the following steps: an intelligent reflection surface IRS assists a WPCN safety transmission model to be provided, and transmission is divided into two stages of energy transmission and information transmission; judging whether an eavesdropper exists according to the receiving power range of the user in the energy transmission stage; establishing a system secrecy rate optimization problem according to constraint conditions in an information transmission stage, and optimizing a user and an eavesdropper step by step in a step-by-step optimization mode; maximizing the user reachable rate; and designing a corresponding optimization algorithm according to the channel state information of the eavesdropper, so as to minimize the reachable rate of the eavesdropper. The invention can realize the beam offset at the eavesdropping end by utilizing the intelligent reflection surface in the wireless power supply communication network, and can effectively improve the secrecy rate of the wireless energy transmission system by jointly optimizing time distribution, power distribution and passive reflection phase of the reflection surface.

Description

Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission
Technical Field
The invention belongs to the technical field of communication, and relates to a secret keeping rate maximization method based on auxiliary wireless energy transmission of an intelligent reflection surface.
Background
The sixth Generation (6G) wireless communication networks are receiving increasing attention from both academic and industrial communities, which desire ultra-high spectrum/energy efficiency and high density of subscriber connections. Because of these demands, wireless devices are increasingly consuming energy, and energy-constrained devices in wireless communication networks become bottlenecks that limit network quality of service. The Wireless Power Transfer (WPT) technology for charging the equipment by utilizing radio frequency energy can effectively solve the problem of insufficient energy supply of the equipment. WPCN is a new framework for WPT network design, with hybrid access points transmitting energy to energy-constrained devices via the downlink, while wireless devices transmit information in the uplink using the collected energy. The advent of WPCN provides a new approach to energy efficient, persistent communications.
As communication environments become increasingly complex, security and privacy of user information need to be protected. The adoption of the traditional encryption technology can cause huge key management burden for the network and consume a large amount of network resources. The physical layer security mainly utilizes the difference between a legal user channel and an eavesdropper channel to realize communication security from the physical characteristics. The method has the advantages of lower algorithm complexity, higher confidentiality, no threat caused by the improvement of the calculation capability of an eavesdropper, and no extra overhead caused by the protection of a security key. Considering the importance of energy in the WPCN, applying physical layer security to the WPCN can effectively solve the problem of secure communication in the network.
Recently, the potential of IRS in implementing secure communications has attracted considerable attention, and as a key enabler for intelligent reconfigurable radio environments, it has been proven to effectively improve the spectral and energy efficiency of wireless systems. The system consists of a large number of reconfigurable reflective elements, managed by an intelligent controller. The elements have the characteristics of small volume, low cost and low energy consumption, can enhance signal reception by intelligently adjusting the required signal phase, does not need special radio frequency processing, and can reduce the reachable rate of a wiretap link by uniformly combining reflected signals with signals of other paths by properly adjusting the phase shift of the reflection unit of the intelligent reflection surface. In order to further improve security, some methods add Artificial Noise (AN) to deteriorate AN eavesdropper channel, and some methods research a cooperative interference (CJ) technique to interfere with AN eavesdropper. Although the secret keeping rate can be further improved by using the supplementary method of AN and CJ, it consumes transmission power for outside of legal use. In situations where transmission power is limited, there is always a bottleneck to the performance of secure communications. In addition, the existing methods assume that an eavesdropper exists, do not consider whether the eavesdropper exists really or not, and consume more resources.
In order to improve the security of the WPCN, the invention realizes dynamic beam offset by utilizing the IRS, detects whether eavesdropping exists or not while energy transmission is carried out in the first stage, and utilizes the IRS to shield signals at the eavesdropper in the second stage if the eavesdropping exists. In the invention, the intelligent reflecting surface can not only achieve the effect of enhancing the information transmission rate and the energy transmission efficiency, but also shield the signal of an eavesdropper and enhance the safety.
Disclosure of Invention
In view of the above, the present invention provides a secret keeping rate maximization method based on an intelligent reflective surface to assist wireless energy transmission.
In order to achieve the purpose, the invention provides the following technical scheme:
a privacy rate maximization method based on auxiliary wireless energy transmission of an intelligent reflection surface comprises the following steps:
the method comprises the following steps: the method comprises the steps that an IRS auxiliary WPCN safety transmission model is provided, and transmission is divided into two stages of energy transmission and information transmission;
step two: judging whether an eavesdropper exists according to the receiving power range of the user in the energy transmission stage;
step three: establishing a system secrecy rate optimization problem according to constraint conditions in an information transmission stage, and optimizing a user and an eavesdropper step by step in a step-by-step optimization mode;
step four: by the design of an optimization algorithm, the user reachable rate is maximized;
step five: and designing a corresponding optimization algorithm according to the channel state information of the eavesdropper, so as to minimize the reachable rate of the eavesdropper.
Optionally, in the step one, the IRS assists the WPCN secure transmission modelIn the middle, the two stages of energy transmission and information transmission are respectively: in the first stage, i.e. time period T1Energy transmission is carried out, transmitting energy signal with constant power P, in the second phase, time T2And transmitting the secret information, wherein the user transmits the information by utilizing the energy collected by the downlink at the stage.
Optionally, in the second step, the process of determining whether there is an eavesdropper according to the received power range of the user in the energy transmission stage is as follows: time period T1Energy transmission is carried out, and the signal power transmitted to a legal user and an eavesdropper is assumed to be P1And P2,P1+P2P; the reachable rates of the legitimate user and the eavesdropper are respectively:
Figure BDA0003492288310000021
Figure BDA0003492288310000022
if there is eavesdropping, RUE-REveLess than or equal to 0, the power range received by the legal receiver is P1≤σ。
Optionally, in the third step, the process of establishing the system privacy ratio optimization problem according to the constraint condition of the information transmission stage is as follows: the secrecy rate of the system is maximized by optimizing the reflection phase shift, power distribution and time distribution of the intelligent reflection surface; the system achieves the following security rates:
Rs=R'UE-R'Eve
finally establishing an optimization problem according to the deduced objective function and the constraint; to maximize the privacy rate, it is obviously desirable to maximize the achievable rate for legitimate users; the constraint conditions comprise user energy collection constraint, total transmission time constraint and intelligent reflecting surface passive reflection phase shift constraint.
Optionally, in the fourth step, it is obviously necessary to order the achievable rate optimization problemThe legal user rate of the target function is as large as possible, so that the wiretap user rate is as small as possible; adopts a step-by-step optimization mode, firstly optimizes the reachable rate of a legal user, and optimizes the reflection phase shift phi through combination1And phi2Power distribution P ═ P3,P4]And time allocation T ═ T1,T2]The optimization problem is represented as:
Figure BDA0003492288310000031
s.t.C1:E1≥(P3+P4)T2
C2:T1+T2≤T,T1>0,T2>0
C3:|φ1,n|=1,n=1,...,N
C4:|φ2,n|=1,n=1,...,N
and (3) converting the non-convex problem into a semi-definite programming problem through the design of an optimization algorithm, and performing optimization solution by using CVX.
Optionally, in the fifth step, according to the channel state information of the eavesdropper, a corresponding optimization algorithm is designed, so as to minimize the reachable rate of the eavesdropper; because an eavesdropper usually tries to hide the existence of the eavesdropper from a base station and hardly obtains the perfect channel state information of Eve, corresponding optimization algorithms are respectively designed according to the perfect and imperfect channel state information of the channel state information CSI of the eavesdropper, the reachable rate of the eavesdropper is minimized, namely, the second step of stepwise optimization for maximizing the confidentiality rate is achieved, and the information rate of the eavesdropper is minimized as much as possible;
the beam cancellation optimization of the eavesdropper under the perfect CSI condition is established as follows:
Figure BDA0003492288310000032
s.t.C5:|φ3,n|=1,n=1,...,N
solving the problem by using CVX to obtain an optimal solution, so that the information accessibility of the eavesdropper is easy to obtain;
wherein, the beam offset optimization of the eavesdropper under the condition of imperfect CSI is established as follows:
Figure BDA0003492288310000033
s.t.C5:|φ3,n|=1,n=1,...,N
C13:Δh2∈KB,E
wherein Δ h2Expressing estimation errors, firstly simplifying and converting the problems, converting the problems into standard semi-definite programming by utilizing an S-Lemma Lemma principle, and carrying out optimization solution by using CVX; the signal-to-noise ratio of the eavesdropper is obtained by optimization, and therefore the reachable rate of the eavesdropper is easy to obtain.
The invention has the beneficial effects that:
1) the hybrid access point can transmit energy to the energy-limited device through a downlink, the wireless device transmits information in the uplink by using the collected energy, and a new way is provided for realizing high energy efficiency and persistent communication in a considered WPCN scene;
2) the intelligent reflection surface is used as a key pushing hand for an intelligent reconfigurable radio environment, the reflection element has the characteristics of small volume, low cost and low energy consumption, special radio frequency processing is not needed, the phase shift of the reflection unit of the intelligent reflection surface is properly adjusted, the reflection signal can be consistently combined with the signals of other paths, and the information transmission rate and the energy transmission efficiency are favorably enhanced.
3) The IRS is considered to realize dynamic beam offset, whether interception exists is detected while energy transmission is carried out in the first stage, and when signals at an eavesdropper are shielded by the IRS in the second stage, the problem that interception of user CSI is difficult to obtain in an actual scene is considered, and the established problem is subjected to combined optimization. In the invention, the intelligent reflecting surface can not only achieve the effect of enhancing the information transmission rate and the energy transmission efficiency, but also shield the signal of an eavesdropper and enhance the safety.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
For the purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a process of a secret keeping ratio maximization method based on an intelligent reflection surface auxiliary wireless energy transmission;
FIG. 2 is a system model diagram of a privacy ratio maximization method based on the auxiliary wireless energy transmission of the intelligent reflection surface;
fig. 3 is a two-stage transmission diagram of the system.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention in a schematic way, and the features in the following embodiments and examples may be combined with each other without conflict.
Wherein the showings are for the purpose of illustrating the invention only and not for the purpose of limiting the same, and in which there is shown by way of illustration only and not in the drawings in which there is no intention to limit the invention thereto; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by terms such as "upper", "lower", "left", "right", "front", "rear", etc., based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not an indication or suggestion that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes, and are not to be construed as limiting the present invention, and the specific meaning of the terms may be understood by those skilled in the art according to specific situations.
As shown in fig. 1, the present invention provides a secret keeping rate maximization method based on the auxiliary wireless energy transmission of the intelligent reflective surface.
Fig. 2 is a system model diagram of the present invention, which is described below with reference to the accompanying drawings:
the safe transmission model of the intelligent reflection surface auxiliary wireless power supply communication network considered by the invention is shown in fig. 1 and comprises a Base Station (BS), a legal User (UE), and an Eavesdropper (event), wherein the UE is provided with an energy collecting receiver, the BS is provided with M antennas, the UE is set as a single antenna, and if the event is also a single antenna. The communication is performed through an intelligent reflecting surface with N reflecting units.
The base-band equivalent channels from base station to IRS, base station to user, base station to Eve are noted as:
Figure BDA0003492288310000051
Figure BDA0003492288310000052
i is 1,2, and the terms inside all channel vectors are modeled as zero-mean independent identically distributed complex gaussian random variables whose variance depends on the path loss of the respective radio link. The phase shift matrix for IRS is represented as: phii=diag(φi,1,...,φi,n,...,φi,N),
Figure BDA0003492288310000053
θn∈[0,2π]. Eve canCan be legitimate users in the past, but cannot access confidential information during current communications, or the base station does not want to send confidential information to these users. To ensure the security of the communication, the system must treat these recipients as potential eavesdroppers. Therefore, the perfect CSI of Eve can be obtained. It is difficult to obtain the perfect CSI of Eve, since an eavesdropper usually tries to hide its presence from the base station. In practice, knowledge of CSI between IRS and Eve is not accurate, which may also be caused by channel estimation and quantization errors. This document considers a worst-case channel uncertainty model, channel vector h2The bounded CSI error model of (1) is:
Figure BDA0003492288310000054
wherein
Figure BDA0003492288310000055
Is a channel vector h2Estimated value of, KB,ERepresents h2Area of uncertainty, Δ h2Which is indicative of an estimation error that is,
Figure BDA0003492288310000056
representing the uncertainty region KB,EOf (c) is used.
Referring to fig. 3, a diagram of two-stage transmission (energy transmission and information transmission) of the system of the present invention is shown, and the following description is made with reference to the accompanying drawings:
in the first stage (time period T)1) Performing energy transmission, performing eavesdropping detection while transmitting energy for UE, and judging whether the UE is in the second stage (time period T) by IRS according to the energy collection state of the UE2) An anti-eavesdropping mode is adopted. Assuming that there is eavesdropping, the UE shields the signal at the eavesdropper with an intelligent reflective surface while performing the transmission of the secret information in the second phase.
In the first stage, downlink transmission is carried out, an energy signal is transmitted at a fixed power P, and the energy signal is represented as x0(t) wherein E | | x0(t)|2]1, it is assumed that the transmission is to legitimate users and eavesdroppersThe signal power is: p1And P2(P1+P2P). The received signals are:
Figure BDA0003492288310000061
Figure BDA0003492288310000062
wherein phi1=diag(φ1,1,...,φ1,n,...,φ1,N),|φ1,N|=1,n=1,...,N,n1(t) and n2(t) each represents a power of
Figure BDA0003492288310000063
And
Figure BDA0003492288310000064
gaussian noise.
The reachable rates of the legitimate user and the eavesdropper are respectively:
Figure BDA0003492288310000065
Figure BDA0003492288310000066
if there is eavesdropping, RBob-REveLess than or equal to 0, the power range received by the legal receiver is P1Sigma is less than or equal to. It is assumed that the reception power range is found to be in the presence of eavesdropping during the downlink transmission phase, and a response is made during the uplink information transmission phase. A signal shielding area is formed at an eavesdropper by using the intelligent reflection surface while transmitting the secret information.
In the second stage (time T)2) Carrying out transmission of secret information, x1(t) is expressed as a transmission signal from the BS, where E [ | x1(t)|2]1. At this stage, the energy collected by the downstream is used for transmission, and the energy collected by the legal user is:
Figure BDA0003492288310000067
where ξ (0 < ξ < 1) represents the energy collection efficiency. The received signals of the legal user and the eavesdropper are respectively:
Figure BDA0003492288310000068
Figure BDA0003492288310000069
wherein phi2=diag(φ2,1,...,φ2,n,...,φ2,N),|φ2,N|=1,n=1,...,N;Φ3=diag(φ3,1,...,φ3,n,...,φ3,N),|φ3,N|=1,n=1,...,N。
The user uses the energy collected by the down link to transmit the secret information, and can obtain:
E1≥(P3+P4)T2
the reachable rates of the legitimate user and the eavesdropper are respectively:
Figure BDA00034922883100000610
Figure BDA00034922883100000611
can be theoretically provided with
Figure BDA00034922883100000612
That is, the information received by the eavesdropper is offset by the intelligent reflecting surface in the second stageAnd (4) eliminating.
By optimizing the reflection phase shift phi of the smart reflective surface12And phi3Power distribution P ═ P3,P4]And time allocation T ═ T1,T2]To maximize the privacy rate of the system.
The achievable privacy rates of the system are:
Rs=R'UE-R'Eve
according to the objective function and the constraint derived from the above, the following optimization problem is finally established:
Figure BDA0003492288310000071
s.t.C1:E1≥(P3+P4)T2
C2:T1+T2≤T,T1>0,T2>0
C3:|φ1,n|=1,n=1,...,N
C4:|φ2,n|=1,n=1,...,N
C5:|φ3,n|=1,n=1,...,N
wherein, C1 is the user energy collection constraint, C2 is the total transit time constraint, and C3, C4 and C5 are the reflection phase shift constraints.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (6)

1. Secret keeping rate maximization method based on intelligent reflection surface auxiliary wireless energy transmission is characterized in that: the method comprises the following steps:
the method comprises the following steps: the method comprises the steps that an IRS auxiliary WPCN safety transmission model is provided, and transmission is divided into two stages of energy transmission and information transmission;
step two: judging whether an eavesdropper exists according to the receiving power range of the user in the energy transmission stage;
step three: establishing a system secrecy rate optimization problem according to constraint conditions in an information transmission stage, and optimizing a user and an eavesdropper step by step in a step-by-step optimization mode;
step four: by the design of an optimization algorithm, the user reachable rate is maximized;
step five: and designing a corresponding optimization algorithm according to the channel state information of the eavesdropper, so as to minimize the reachable rate of the eavesdropper.
2. The secret keeping ratio maximization method based on intelligent reflective surface assisted wireless energy transmission according to claim 1, characterized in that: in the first step, in the IRS-assisted WPCN secure transmission model, the two stages of energy transmission and information transmission are: in the first stage, i.e. time period T1Energy transmission is carried out, transmitting energy signal with constant power P, in the second phase, time T2And transmitting the secret information, wherein the user transmits the information by utilizing the energy collected by the downlink at the stage.
3. The secret keeping ratio maximization method based on intelligent reflective surface assisted wireless energy transmission according to claim 1, characterized in that: in the second step, the process of judging whether an eavesdropper exists according to the receiving power range of the user in the energy transmission stage is as follows: time period T1Energy transmission is carried out, and the signal power transmitted to a legal user and an eavesdropper is assumed to be P1And P2,P1+P2P; the reachable rates of the legitimate user and the eavesdropper are respectively:
Figure FDA0003492288300000011
Figure FDA0003492288300000012
if there is eavesdropping, RUE-REveLess than or equal to 0, the power range received by the legal receiver is P1≤σ。
4. The secret keeping ratio maximization method based on intelligent reflective surface assisted wireless energy transmission according to claim 1, characterized in that: in the third step, the process of establishing the optimization problem of the system secret rate according to the constraint conditions of the information transmission stage comprises the following steps: the secrecy rate of the system is maximized by optimizing the reflection phase shift, power distribution and time distribution of the intelligent reflection surface; the system achieves the following security rates:
Rs=R'UE-R'Eve
finally establishing an optimization problem according to the deduced objective function and the constraint; to maximize the privacy rate, it is obviously desirable to maximize the achievable rate for legitimate users; the constraint conditions comprise user energy collection constraint, total transmission time constraint and intelligent reflecting surface passive reflection phase shift constraint.
5. The secret keeping ratio maximization method based on intelligent reflective surface assisted wireless energy transmission according to claim 1, characterized in that: in the fourth step, obviously, for the problem of optimizing the reachable rate, the rate of the legal user of the objective function needs to be made as large as possible, so that the rate of the eavesdropping user is made as small as possible; adopts a step-by-step optimization mode, firstly optimizes the reachable rate of a legal user, and optimizes the reflection phase shift phi through combination1And phi2Power distribution P ═ P3,P4]And time allocation T ═ T1,T2]The optimization problem is represented as:
Figure FDA0003492288300000021
s.t.C1:E1≥(P3+P4)T2
C2:T1+T2≤T,T1>0,T2>0
C3:|φ1,n|=1,n=1,...,N
C4:|φ2,n|=1,n=1,...,N
and (3) converting the non-convex problem into a semi-definite programming problem through the design of an optimization algorithm, and performing optimization solution by using CVX.
6. The secret keeping ratio maximization method based on intelligent reflective surface assisted wireless energy transmission according to claim 1, characterized in that: in the fifth step, according to the information of the channel state of the eavesdropper, a corresponding optimization algorithm is designed, and the reachable rate of the eavesdropper is minimized; because an eavesdropper usually tries to hide the existence of the eavesdropper from a base station and hardly obtains the perfect channel state information of Eve, corresponding optimization algorithms are respectively designed according to the perfect and imperfect channel state information of the channel state information CSI of the eavesdropper, the reachable rate of the eavesdropper is minimized, namely, the second step of stepwise optimization for maximizing the confidentiality rate is achieved, and the information rate of the eavesdropper is minimized as much as possible;
the beam cancellation optimization of the eavesdropper under the perfect CSI condition is established as follows:
Figure FDA0003492288300000022
s.t.C5:|φ3,n|=1,n=1,...,N
solving the problem by using CVX to obtain an optimal solution, so that the information accessibility of the eavesdropper is easy to obtain;
wherein, the beam offset optimization of the eavesdropper under the condition of imperfect CSI is established as follows:
Figure FDA0003492288300000023
s.t.C5:|φ3,n|=1,n=1,...,N
C13:Δh2∈KB,E
wherein Δ h2Expressing estimation errors, firstly simplifying and converting the problems, converting the problems into standard semi-definite programming by utilizing an S-Lemma Lemma principle, and carrying out optimization solution by using CVX; the signal-to-noise ratio of the eavesdropper is obtained by optimization, and therefore the reachable rate of the eavesdropper is easy to obtain.
CN202210100662.0A 2022-01-27 2022-01-27 Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission Pending CN114242030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210100662.0A CN114242030A (en) 2022-01-27 2022-01-27 Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210100662.0A CN114242030A (en) 2022-01-27 2022-01-27 Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission

Publications (1)

Publication Number Publication Date
CN114242030A true CN114242030A (en) 2022-03-25

Family

ID=80747384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210100662.0A Pending CN114242030A (en) 2022-01-27 2022-01-27 Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission

Country Status (1)

Country Link
CN (1) CN114242030A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278678A (en) * 2022-07-21 2022-11-01 国家工业信息安全发展研究中心 Secure transmission communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278678A (en) * 2022-07-21 2022-11-01 国家工业信息安全发展研究中心 Secure transmission communication system

Similar Documents

Publication Publication Date Title
Khan et al. Opportunities for physical layer security in UAV communication enhanced with intelligent reflective surfaces
CN108880734B (en) CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization
Gao et al. Joint antenna selection and power allocation for secure co-time co-frequency full-duplex massive MIMO systems
CN111988783B (en) Safe transmission method and system for uplink non-orthogonal multiple access
Hu et al. Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT
CN111885732A (en) Dynamic resource allocation method for enhancing NOMA visible light communication network security
Sun et al. Covertness and secrecy study in untrusted relay-assisted D2D networks
Chen Modified backscatter communication model for wireless communication network applications
CN112512085B (en) Robust opportunity constraint optimization method based on WPBC system security
CN114242030A (en) Secret keeping rate maximization method based on intelligent reflection surface assisted wireless energy transmission
CN113193891B (en) Physical layer security authentication method for downlink non-orthogonal multiple access unmanned aerial vehicle system
KR101439756B1 (en) Secure transmission METHOD AND SYSTEM in downlink cellular network with a cooperative jammer
Xu et al. Energy efficiency optimization of NOMA IoT communication for 5G
Ji et al. Securing wireless communications from the perspective of physical layer: A survey
Priya et al. Spectral and energy efficient user pairing for RIS-assisted uplink NOMA systems with imperfect phase compensation
CN114142909B (en) Passive radar assisted physical layer safety satellite communication method
Fang et al. Security analysis for interference management in heterogeneous networks
Zhang et al. Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities
Ji et al. Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference
Wang et al. Secure transmission for UAV-aided NOMA networks with SWIPT via precoding optimization
CN111163464A (en) Random eavesdropping resistant multi-service transmission power distribution method
CN111901093B (en) OFDM system node mode selection and wireless resource allocation method oriented to physical layer security
CN113595675B (en) Interference management method and system for maximizing safe data transmission rate
CN113595605B (en) Transmission method and communication system with security and interference management
Tong et al. Secrecy rate optimization for dual‐functional radar‐communication system with energy receiver

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination