CN114286336A - Multi-cell network secure transmission method based on artificial noise - Google Patents
Multi-cell network secure transmission method based on artificial noise Download PDFInfo
- Publication number
- CN114286336A CN114286336A CN202111656503.0A CN202111656503A CN114286336A CN 114286336 A CN114286336 A CN 114286336A CN 202111656503 A CN202111656503 A CN 202111656503A CN 114286336 A CN114286336 A CN 114286336A
- Authority
- CN
- China
- Prior art keywords
- representing
- signal
- matrix
- interference
- vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000011159 matrix material Substances 0.000 claims abstract description 107
- 239000013598 vector Substances 0.000 claims abstract description 87
- 238000011084 recovery Methods 0.000 claims abstract description 13
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000012545 processing Methods 0.000 claims description 4
- 230000008054 signal transmission Effects 0.000 claims description 4
- 239000000654 additive Substances 0.000 claims description 3
- 230000000996 additive effect Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 4
- 230000002452 interceptive effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 4
- 230000003247 decreasing effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the technical field of wireless communication, and particularly relates to a multi-cell network safe transmission method based on artificial noise; the method comprises the following steps: the base station sends information to the user side, wherein the information comprises AN information and safety information; the user side processes the received information by adopting AN AN alternative minimized interference alignment algorithm to obtain a beam forming vector and a receiving vector of the signal; obtaining a recovery signal according to the output receiving vector and the beamforming vector; the interference alignment algorithm of the invention reduces the channel quality of the eavesdropping node by using artificial noise, and does not introduce additional interference to the legal transmission of the multi-cell wireless network; by alternately iterating and interfering the matrix and the subspace at the receiving end, the interference is projected into a lower-dimensionality signal space, and the remaining interference-free signal space is used for transmitting useful signals, so that interference alignment is realized, the safety performance of the system is further enhanced, the safety performance of the system is improved, and the method has wider application scenes.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a multi-cell network secure transmission method based on artificial noise.
Background
Due to the broadcast nature and the open nature of wireless communications, security of information transmission is a challenging issue in wireless networks, and physical layer security is becoming increasingly important. The generation of the interception model and the definition of the security capacity lay a foundation for the research work of the later physical layer security. If the reliability of the main channel is higher than that of the eavesdropping channel, the legitimate user can achieve correct decoding, and the eavesdropping node cannot perform correct decoding.
In a multi-cell wireless network, interference can seriously affect the transmission rate of users, and the safety performance of the system is reduced. In contrast to this conventional view, in an Interference network, Interference Alignment (IA) is a very effective Interference management method, in which precoding matrices of all users are cooperatively designed to limit Interference in the same subspace, and useful information is transmitted using the remaining Interference-free space. To realize the secure transmission of the secret information, the information flow can be cached in the noise of the interception channel by using the thought of random coding and the characteristic of the wireless channel, so that the interception node can not obtain the information of the main channel, and the security of the system can be improved to a certain extent.
Physical layer security techniques mainly used to realize secure transmission of information include Artificial Noise (AN), beamforming, and phase rotation. Among the various methods, AN is AN intuitive and effective way to implement secure communications. For example, a multi-user interference alignment network ensures the safety of transmission by introducing artificial noise, and the scheme utilizes a distributed interference alignment iterative algorithm to design a precoding matrix and an interference suppression matrix at a transceiving end. However, the solution needs to assume the reciprocity of the wireless network, which limits the application of the algorithm in practice. There is a scheme for securing transmission using artificial noise in AN interference alignment-based wireless network, but the scheme fixes power allocation between a security signal and AN signal, and cannot adapt to dynamic changes of the wireless network.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a multi-cell network safe transmission method based on artificial noise, which comprises the following steps: the base station sends information to the user side, wherein the information comprises AN information and safety information; the user side processes the received information by adopting AN AN alternative minimized interference alignment algorithm to obtain a beam forming vector and a receiving vector of the signal; obtaining a recovery signal according to the output receiving vector and the beamforming vector;
the process of processing the received information by adopting the AN alternation minimized interference alignment algorithm comprises the following steps:
s1: initializing a wave beam forming vector and an artificial noise pre-coding matrix of a transmitting end; setting iteration times;
s2: calculating a set of standard orthogonal bases of a receiving interference matrix and a receiving interference subspace according to the wave beam forming vector of the transmitting end and the artificial noise pre-coding matrix;
s3: calculating a signal space projection matrix and a receiving vector of a receiving end according to the standard orthogonal basis;
s4: calculating a system interference leakage value according to the wave beam forming vector of the transmitting end, the artificial noise pre-coding matrix and the standard orthogonal base;
s5: judging whether the iteration times meet or whether the system interference leakage value is converged, and if the iteration times meet or the system interference leakage value is converged, outputting a receiving vector and a beam forming vector; if the iteration times are not met or the system interference leakage value is not converged, executing step S6;
s6: calculating an emission interference matrix according to the projection matrix;
s7: and updating the beamforming vector and the artificial noise precoding matrix at the transmitting end according to the transmitting interference matrix and returning to the step S2.
Preferably, the formulas for calculating the received interference matrix and the orthonormal basis are respectively as follows:
Ck=xl[Qk],l=1,...,Nk-1 and k ═ 1,2,3
wherein ,QkRepresenting the received interference matrix, HkjRepresenting the channel matrix from base station j to user k, j representing the base station transmitting the useful signal, p representing the base station transmitting the safety signal, HkpRepresenting the channel matrix, v, from base station p to user kjRepresenting the transmit beamforming vector, w, of base station jpRepresenting an artificial noise precoding matrix, CkDenotes the orthonormal base, xl[Qk]Representation matrix QkEigenvector corresponding to the ith largest eigenvalue, NkRepresenting the number of receive antennas for user k.
Preferably, the formulas for calculating the signal space projection matrix and the receiving vector of the receiving end are respectively as follows:
wherein ,FkA signal space projection matrix, C, representing the user kkDenotes the orthonormal base, ukA reception vector at the receiving end is represented,representation matrixThe null space of (a).
Preferably, the formula for calculating the system interference leakage value is as follows:
wherein ,IkRepresenting the interference leakage value, v, of user kjRepresents the transmit beamforming vector, H, of base station jkjRepresenting the channel matrix from base station j to user k, CkRepresenting an orthonormal basis.
Preferably, the formula for calculating the transmission interference matrix is as follows:
wherein ,a first transmit interference matrix is represented,representing a second transmitted interference matrix, k representing the kth user, q representing a user eavesdropped by an eavesdropper, HkjRepresenting the channel matrix, H, from base station j to user kqjRepresenting the channel matrix, F, from base station j to user qkA signal space projection matrix, F, representing a user kqA signal space projection matrix representing user q.
Preferably, the formula for updating the beamforming vector and the artificial noise precoding matrix at the transmitting end is as follows:
wherein ,vjRepresents the transmit beamforming vector for base station j,representation matrixEigenvectors, w, corresponding to the smallest eigenvaluesqRepresenting an artificial noise pre-coding matrix and,representation matrixD is the eigenvector corresponding to the d-th minimum eigenvalue, d represents the number of independent data streams to be transmitted, danIndicating the number of transmitting ANs.
Preferably, obtaining the recovered signal according to the output reception vector and beamforming vector includes: initializing a power distribution ratio, and calculating a signal-to-noise ratio of a recovery signal according to the receiving vector, the beam forming vector and the power distribution ratio; calculating the signal-to-interference-and-noise ratio of the signal received by the eavesdropper according to the power distribution ratio and the signal-to-noise ratio of the recovered signal; constructing a safe speed target function according to the signal-to-interference-and-noise ratio of a signal received by an eavesdropper; solving the maximum value of the safe rate objective function to obtain the optimal power distribution ratio; and calculating a recovery signal according to the optimal power distribution ratio.
Further, the formula for calculating the signal-to-noise ratio of the recovered signal is:
wherein ,representing the signal-to-interference-and-noise ratio, P, of the recovered signalpTo representSignal transmission power at the transmitting end, phi denotes the power distribution ratio, HpqRepresenting the channel matrix, v, from base station p to user qpRepresenting the transmit beamforming vector for base station p,representing the transpose of the received vector.
Further, the safe rate objective function is:
wherein ,RSDenotes the base station safe transmission rate, phi denotes the power allocation ratio, gamma denotes the effective snr of the received signal of user q, mu denotes the threshold,representing the signal to interference plus noise ratio of the signal received by the eavesdropper and epsilon representing the maximum allowed probability of security disruption.
Further, the formula for calculating the recovery signal is:
wherein ,represents a recovered signal, PpDenotes a signal transmission power of a transmitting end, phi denotes a power distribution ratio,a transposed matrix representing the received vector, HpqRepresenting the channel matrix, v, from base station p to user qpRepresenting the transmit beamforming vector, x, of base station ppRepresenting data symbols transmitted by base station p, nqRepresenting an additive white gaussian noise vector received by user q.
The invention has the beneficial effects that: the interference alignment algorithm of the invention reduces the channel quality of the eavesdropping node by using artificial noise, and does not introduce additional interference to the legal transmission of the multi-cell wireless network; by alternately iterating and interfering the matrix and the subspace at the receiving end, the interference is projected into a signal space with lower dimensionality, and the remaining non-interference signal space is used for transmitting useful signals, so that interference alignment is realized; the algorithm designs AN alternative minimized interference alignment algorithm with AN to update the interference subspace of each transceiving end, can work in a time division duplex system and a frequency division duplex system, and does not need to assume the reciprocity of channels, the distribution of antennas or AN information transmission mode between two iteration steps, so the algorithm is more suitable for researching the solution of interference alignment; the channel quality of the eavesdropping node is reduced by utilizing artificial noise, and meanwhile, no extra interference is introduced to the legal transmission of the multi-cell network, so that the reliability of secret message transmission is improved; in addition, only if the statistical CSI of the eavesdropping node is known, the dynamic power distribution between the confidential signal and the AN signal is considered on the basis of interference alignment, the power distribution between the confidential signal and the AN signal can be dynamically adjusted, the safety performance of the system is further enhanced, the safety performance of the system is improved, and the application scene is wider.
Drawings
Fig. 1 is a system model diagram of a three-cell interference alignment network according to the present invention;
FIG. 2 is a flowchart of AN alternative AN minimization interference alignment algorithm according to the present invention;
FIG. 3 is a flow chart of the numerical analysis power allocation ratio of the present invention;
FIG. 4 is a diagram illustrating the relationship between the interference leakage value of a user and the number of iterations;
FIG. 5 is a schematic diagram illustrating the variation of the allocation ratio of different transmission powers and the optimal power of the base station when the interference is aligned according to the present invention;
fig. 6 is a diagram illustrating the result of the safety rate when the interference is aligned according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a multi-cell network secure transmission method based on artificial noise, as shown in fig. 2, the method comprises the following steps: the base station sends information to the user side, wherein the information comprises AN information and safety information; the user side processes the received information by adopting AN AN alternative minimized interference alignment algorithm to obtain a beam forming vector and a receiving vector of the signal; obtaining a recovery signal according to the output receiving vector and the beamforming vector;
the process of processing the received information by adopting the AN alternation minimized interference alignment algorithm comprises the following steps:
s1: initializing a wave beam forming vector and an artificial noise pre-coding matrix of a transmitting end; setting iteration times;
s2: calculating a set of standard orthogonal bases of a receiving interference matrix and a receiving interference subspace according to the wave beam forming vector of the transmitting end and the artificial noise pre-coding matrix;
s3: calculating a signal space projection matrix and a receiving vector of a receiving end according to the standard orthogonal basis;
s4: calculating a system interference leakage value according to the wave beam forming vector of the transmitting end, the artificial noise pre-coding matrix and the standard orthogonal base;
s5: judging whether the iteration times meet or whether the system interference leakage value is converged, and if the iteration times meet or the system interference leakage value is converged, outputting a receiving vector and a beam forming vector; if the iteration times are not met or the system interference leakage value is not converged, executing step S6;
s6: calculating an emission interference matrix according to the projection matrix;
s7: and updating the beamforming vector and the artificial noise precoding matrix at the transmitting end according to the transmitting interference matrix and returning to the step S2.
One preferred embodiment of the present invention is as follows:
as shown in FIG. 1, assume that there is a base station BS in a cell1、BS2 and BS3To 3 legal users R in the cell1、R2 and R3Sending information, user k, k e {1,2,3} respectively representing user R1、R2 and R3(ii) a Wherein, the base station BS3To the user R3Transmitting a secure message, a passive eavesdropping node eavesdropping the message, a BS3To R3The artificial noise AN is also transmitted to interfere the eavesdropping node while the safety message is transmitted; base stations BS of two other cells1And BS2Only the useful signal is transmitted and no additional interference is introduced to the legitimate transmissions in the network. Suppose that three base stations are equipped with M number of transmitting antennas1,M2,M3The number of receiving antennas equipped by three legal users is N1,N2,N3And the eavesdropping node only has a single receiving antenna. Each base station transmits an independent data stream, and the BS simultaneously3Also send the number of ANs as dan。
BS3To the user R3Transmitting a security signal and AN AN signal, and a BS1And BS2Only useful signals are transmitted, and the signals recovered by the legal user and the eavesdropping node are as follows:
wherein ,representing a channel matrix from a base station j to a user k, wherein k, j belongs to {1,2,3}, and the requirement that quasi-static flat attenuation and drop are independent is met, and the channel state information can be obtained by assuming cooperation between the base stations;andrespectively represent a beam forming vector, a receiving vector and an artificial noise precoding matrix which respectively satisfyAndbase station BS1、BS2And BS3Respectively, is P1、P2And P3;xjJ is 1,2,3 represents data symbol transmitted by jth base station;represents BS3The AN vector sent;representing an additive white gaussian noise vector received by the kth legal user; phi is more than or equal to 0 and less than or equal to 1 represents BS3The proportion of power allocated to the security signal; the channel from the base station to the eavesdropping node is represented asAssuming that only the statistical CSI of the eavesdropping node is known, in particular, channel he1,he2,he3Independent of each other, all obey the cyclic symmetrical complex Gaussian distribution of the unit variance of zero mean.
One specific implementation of processing the received information by using AN alternative minimized interference alignment algorithm is as follows:
initializing transmit beamforming vectors vjAnd artificial noise precoding matrix w3J is 1,2,3, and the iteration number is set;
calculating a receiving interference matrix Q according to a wave beam forming vector and an artificial noise precoding matrix of a transmitting endkAnd receiving a set of orthonormal bases C of the interference subspacekSatisfy the following requirements
Ck=xl[Qk],l=1,...,Nk-1 and k ═ 1,2,3
wherein ,QkRepresenting the received interference matrix, HkjRepresenting the channel matrix, H, from base station j to user kk3Representing the base station BS3Channel matrix to user k, vjRepresenting the transmit beamforming vector, w, of base station j3Representing an artificial noise precoding matrix, CkDenotes the orthonormal base, xl[Qk]Representation matrix QkEigenvector corresponding to the ith largest eigenvalue, NkRepresenting the number of receive antennas for user k.
Computing a signal space projection matrix F from orthonormal basiskWith the receiving vector u of the receiving endkAnd k is 1,2, and 3, and the formulas of the spatial projection matrix and the receiving vector of the receiving end are respectively as follows:
wherein ,FkA signal space projection matrix, C, representing the user kkDenotes the orthonormal base, ukA reception vector at the receiving end is represented,representation matrixThe null space of (a).
Calculating the system interference leakage value according to the wave beam forming vector of the transmitting end, the artificial noise pre-coding matrix and the standard orthogonal base, wherein the interference leakage value of the user k is as follows:
the system interference leakage value is:
wherein ,IkRepresenting the interference leakage value, H, of user kkjRepresenting the channel matrix for base station j to user k.
Judging whether the iteration times meet or whether the system interference leakage value converges, if not, calculating an emission interference matrix according to the projection matrix, wherein the formula is as follows:
wherein ,a first transmit interference matrix is represented,representing a second transmit interference matrix, H3jRepresenting base station j to user R3Of the channel matrix, F3Represents a user R3The signal space projection matrix of (a).
Updating transmit side beamforming vector vjAnd artificial noise precoding matrix w3The formula of (1) is:
wherein ,representation matrixEigenvectors, w, corresponding to the smallest eigenvalues3Representing an artificial noise pre-coding matrix and,representation matrixD is the eigenvector corresponding to the d-th minimum eigenvalue, d represents the number of independent data streams to be transmitted, danIndicating the number of transmitting ANs.
If the iteration times or the system interference leakage value is converged, outputting a receiving vector and a beam forming vector; according to the receiving vector and the beam forming vector, a recovery signal after the interference of other users is eliminated can be obtained; the convergence of the interference alignment algorithm is shown in FIG. 4, with 3 iterations increasingThe interference leakage values of the users are all reduced and finally converge to 10-15Left and right, indicating that the last disturbs have been aligned.
Since only the statistical CSI of the eavesdropping node is known, a security interruption cannot be avoided; the invention considers maximizing the safe rate under the constraint of the interruption probability. Reconfiguring a user R3The recovered signal of (a) is:
wherein ,representing the signal-to-interference-and-noise ratio, P, of the recovered signal3Denotes the signal transmission power of the transmitting end, [ phi ] denotes the power distribution ratio, H33Representing the base station BS3To the user R3V of the channel matrix3Representing the base station BS3The transmit beamforming vector of (a) is,representing the transpose of the received vector.
For an eavesdropping node, the received signal is as follows:
calculating the signal-to-noise ratio of the recovered signal according to the output receiving vector, the beamforming vector and the power distribution ratio, wherein the formula is as follows:
calculating the signal-to-interference-and-noise ratio of the signal received by the eavesdropper according to the power distribution ratio and the signal-to-noise ratio of the recovered signal, wherein the formula is as follows:
wherein M represents a base station BS3The number of equipped transmit antennas.
In order to realize the maximization of the safety rate under the constraint of the safety interruption probability, a safety rate objective function is constructed according to the signal-to-interference-and-noise ratio of a signal received by an eavesdropper, wherein the safety rate objective function is as follows:
wherein ,RSIndicating the safe transmission rate of the base station,represents R3The effective signal-to-noise ratio of the received signal,a threshold value is indicated that is related to the probability of interruption,representing the signal to interference plus noise ratio of the signal received by the eavesdropper and epsilon representing the maximum allowed probability of security disruption.
solving the above objective function, as shown in fig. 3, the solving process is as follows:
to RS(phi) derivation
Due to R'S(φ) is a monotonically decreasing function of φ, and thus R ″, can be derivedS(phi) < 0. According to a second order condition in convex optimization, RSAnd (phi) is a strict concave-up function. If R'S(1) When R is not less than 0S(phi) is a strictly increasing function when R'S(0) When the ratio is less than or equal to 0, RS(φ) is a strict decreasing function; the original optimization problem is solved by adopting a numerical method, and the specific steps are as follows:
1) by bringing phi-1 into R'S(phi) function, calculate R'S(1);
2) R 'is'S(1)≥0,RS(phi) is a strict increasing function on (0,1), so that the optimal power distribution ratio phi can be obtained*1 and maximum safe rateOtherwise, carrying out the next step;
3) bringing phi-0 into R'S(phi) function, calculate R'S(0);
4) R 'is'S(0)≤0,RS(phi) is a strict decreasing function on (0,1), so that the optimal power distribution ratio phi can be obtained*0 and maximum safe rateOtherwise, carrying out the next step;
5) r's'SThe function (phi) is equal to 0, i.e. R'SWhen (phi) is 0, the equation is solved to obtain the optimal power distribution proportion phi*And a safe speedRate of change
The variation of the allocation ratio of different transmission powers of the base station to the optimal power when the interference is aligned is shown in fig. 5; when the base station BS1And base station BS2Is 20dB, all power is allocated to the useful signal, but with the base station BS3The probability of information leakage is increased due to the increase of the transmitting power; for example, when P3Greater than 15dB, the generation of AN reduces the eavesdropper's reception quality, with P3The optimal power allocation ratios for all schemes converge to the same value.
The result of the safety rate values in interference alignment is shown in FIG. 6, when the transmission power of the third base station is low, the base station BS1And base station BS2The greater the transmit power of, the higher the safe rate. But as the transmit power of the third base station increases, the optimal power allocation ratios all converge to the same value, so the final safe rates are the same.
Substituting the optimal power distribution proportion obtained by solving into the user R3To obtain the user R3A received recovery signal.
The interference alignment algorithm of the invention reduces the channel quality of the eavesdropping node by using artificial noise, and does not introduce additional interference to the legal transmission of the multi-cell wireless network; by alternately iterating and interfering the matrix and the subspace at the receiving end, the interference is projected into a signal space with lower dimensionality, and the remaining non-interference signal space is used for transmitting useful signals, so that interference alignment is realized; the algorithm designs AN alternative minimized interference alignment algorithm with AN to update the interference subspace of each transceiving end, can work in a time division duplex system and a frequency division duplex system, and does not need to assume the reciprocity of channels, the distribution of antennas or AN information transmission mode between two iteration steps, so the algorithm is more suitable for researching the solution of interference alignment; the channel quality of the eavesdropping node is reduced by utilizing artificial noise, and meanwhile, no extra interference is introduced to the legal transmission of the multi-cell network, so that the reliability of secret message transmission is improved; in addition, only if the statistical CSI of the eavesdropping node is known, the dynamic power distribution between the confidential signal and the AN signal is considered on the basis of interference alignment, the power distribution between the confidential signal and the AN signal can be dynamically adjusted, the safety performance of the system is further enhanced, the safety performance of the system is improved, and the application scene is wider.
The above-mentioned embodiments, which further illustrate the objects, technical solutions and advantages of the present invention, should be understood that the above-mentioned embodiments are only preferred embodiments of the present invention, and should not be construed as limiting the present invention, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A multi-cell network safety transmission method based on artificial noise is characterized by comprising the following steps: the base station sends information to the user side, wherein the information comprises AN information and safety information; the user side processes the received information by adopting AN AN alternative minimized interference alignment algorithm to obtain a beam forming vector and a receiving vector of the signal; obtaining a recovery signal according to the output receiving vector and the beamforming vector;
the process of processing the received information by adopting the AN alternation minimized interference alignment algorithm comprises the following steps:
s1: initializing a wave beam forming vector and an artificial noise pre-coding matrix of a transmitting end; setting iteration times;
s2: calculating a set of standard orthogonal bases of a receiving interference matrix and a receiving interference subspace according to the wave beam forming vector of the transmitting end and the artificial noise pre-coding matrix;
s3: calculating a signal space projection matrix and a receiving vector of a receiving end according to the standard orthogonal basis;
s4: calculating a system interference leakage value according to the wave beam forming vector of the transmitting end, the artificial noise pre-coding matrix and the standard orthogonal base;
s5: judging whether the iteration times meet or whether the system interference leakage value is converged, and if the iteration times meet or the system interference leakage value is converged, outputting a receiving vector and a beam forming vector; if the iteration times are not met or the system interference leakage value is not converged, executing step S6;
s6: calculating an emission interference matrix according to the projection matrix;
s7: and updating the beamforming vector and the artificial noise precoding matrix at the transmitting end according to the transmitting interference matrix and returning to the step S2.
2. The method as claimed in claim 1, wherein the formulas for calculating the received interference matrix and the orthonormal basis are respectively:
Ck=xl[Qk],l=1,...,Nk-1 and k ═ 1,2,3
wherein ,QkRepresenting the received interference matrix, HkjRepresenting the channel matrix from base station j to user k, j representing the base station transmitting the useful signal, p representing the base station transmitting the safety signal, HkpRepresenting the channel matrix, v, from base station p to user kjRepresenting the transmit beamforming vector, w, of base station jpRepresenting an artificial noise precoding matrix, CkDenotes the orthonormal base, xl[Qk]Representation matrix QkEigenvector corresponding to the ith largest eigenvalue, NkRepresenting the number of receive antennas for user k.
3. The method as claimed in claim 1, wherein the formulas for calculating the signal space projection matrix and the receiving vector at the receiving end are respectively:
4. The method of claim 1, wherein the formula for calculating the system interference leakage value is as follows:
wherein ,IkRepresenting the interference leakage value, v, of user kjRepresents the transmit beamforming vector, H, of base station jkjRepresenting the channel matrix from base station j to user k, CkRepresenting an orthonormal basis.
5. The method of claim 1, wherein the formula for calculating the transmit interference matrix is as follows:
wherein ,a first transmit interference matrix is represented,representing a second transmitted interference matrix, k representing the kth user, q representing a user eavesdropped by an eavesdropper, HkjRepresenting the channel matrix, H, from base station j to user kqjRepresenting the channel matrix, F, from base station j to user qkA signal space projection matrix, F, representing a user kqA signal space projection matrix representing user q.
6. The method according to claim 1, wherein the formula for updating the beamforming vector and the artificial noise precoding matrix at the transmitting end is as follows:
wherein ,vjRepresents the transmit beamforming vector for base station j,representation matrixEigenvectors, w, corresponding to the smallest eigenvaluesqRepresenting an artificial noise pre-coding matrix and,representation matrixD is the eigenvector corresponding to the d-th minimum eigenvalue, d represents the number of independent data streams to be transmitted, danIndicating the number of transmitting ANs.
7. The method of claim 1, wherein obtaining the recovery signal according to the output received vector and beamforming vector comprises: initializing a power distribution ratio, and calculating a signal-to-noise ratio of a recovery signal according to the receiving vector, the beam forming vector and the power distribution ratio; calculating the signal-to-interference-and-noise ratio of the signal received by the eavesdropper according to the power distribution ratio and the signal-to-noise ratio of the recovered signal; constructing a safe speed target function according to the signal-to-interference-and-noise ratio of a signal received by an eavesdropper; solving the maximum value of the safe rate objective function to obtain the optimal power distribution ratio; and calculating a recovery signal according to the optimal power distribution ratio.
8. The method as claimed in claim 7, wherein the formula for calculating the snr of the recovered signal is:
wherein ,representing the signal-to-interference-and-noise ratio, P, of the recovered signalpDenotes the signal transmission power of the transmitting end, [ phi ] denotes the power distribution ratio, HpqRepresenting the channel matrix, v, from base station p to user qpRepresenting the transmit beamforming vector for base station p,representing the transpose of the received vector.
9. The method of claim 7, wherein the safety rate objective function is:
wherein ,RSDenotes the base station safe transmission rate, phi denotes the power allocation ratio, gamma denotes the effective snr of the received signal of user q, mu denotes the threshold,representing the signal to interference plus noise ratio of the signal received by the eavesdropper and epsilon representing the maximum allowed probability of security disruption.
10. The method of claim 7, wherein the formula for calculating the recovery signal is:
wherein ,represents a recovered signal, PpDenotes a signal transmission power of a transmitting end, phi denotes a power distribution ratio,a transposed matrix representing the received vector, HpqRepresenting the channel matrix, v, from base station p to user qpRepresenting the transmit beamforming vector, x, of base station ppRepresenting the number of transmissions of the base station pAccording to the symbol, nqRepresenting an additive white gaussian noise vector received by user q.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111656503.0A CN114286336B (en) | 2021-12-30 | 2021-12-30 | Multi-cell network safe transmission method based on artificial noise |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111656503.0A CN114286336B (en) | 2021-12-30 | 2021-12-30 | Multi-cell network safe transmission method based on artificial noise |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114286336A true CN114286336A (en) | 2022-04-05 |
CN114286336B CN114286336B (en) | 2023-10-13 |
Family
ID=80878752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111656503.0A Active CN114286336B (en) | 2021-12-30 | 2021-12-30 | Multi-cell network safe transmission method based on artificial noise |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114286336B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114786213A (en) * | 2022-04-27 | 2022-07-22 | 重庆邮电大学 | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network |
CN115695114A (en) * | 2022-11-02 | 2023-02-03 | 电子科技大学 | Artificial noise elimination method based on k nearest neighbor algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
-
2021
- 2021-12-30 CN CN202111656503.0A patent/CN114286336B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
Non-Patent Citations (2)
Title |
---|
ANANTACHAI PADCHAROEN: "Alternating Minimization Algorithms for Convex Minimization Problem with Application to Image Deblurring and Denoising", 《2018 INTERNATIONAL CONFERENCE ON CONTROL, ARTIFICIAL INTELLIGENCE, ROBOTICS & OPTIMIZATION (ICCAIRO)》 * |
任远: "多天线系统中的干扰管理与安全无线携能通信技术研究", 《博士电子期刊出版》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114786213A (en) * | 2022-04-27 | 2022-07-22 | 重庆邮电大学 | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network |
CN115695114A (en) * | 2022-11-02 | 2023-02-03 | 电子科技大学 | Artificial noise elimination method based on k nearest neighbor algorithm |
CN115695114B (en) * | 2022-11-02 | 2024-03-29 | 电子科技大学 | Artificial noise elimination method based on k nearest neighbor algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN114286336B (en) | 2023-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fang et al. | Joint source and relay optimization for a non-regenerative MIMO relay | |
CN106656287B (en) | Two MISO interception channel robust beam forming methods based on interruption probability constraint | |
CN109194378B (en) | Physical layer safety wave beam shaping method based on linear neural network | |
CN114286336A (en) | Multi-cell network secure transmission method based on artificial noise | |
Wang et al. | Performance of cell-free massive MIMO with joint user clustering and access point selection | |
CN110086515B (en) | Uplink precoding design method of MIMO-NOMA system | |
CN107070520B (en) | D2D communication interference alignment method based on cascade precoding and ESINR (orthogonal inverse Fourier transform) criterion | |
CN108712199A (en) | Two-dimentional robust beam-forming method under MISO tapping channels based on outage probability constraint | |
CN110881010A (en) | Statistical CSI-assisted multi-user NOMA downlink transmission method | |
CN112994762B (en) | MIMO-NOMA downlink self-adaptive wireless transmission method based on statistical CSI | |
Gharagezlou et al. | Secrecy sum rate analysis and power allocation with OSTBC and artificial noise for MIMO systems | |
CN114501580A (en) | Cooperative rate segmentation network security transmission method with untrusted relay threat | |
CN110071748B (en) | Artificial noise power distribution method of multiple-sending-single-receiving system | |
CN114448479B (en) | Massive MIMO (multiple input multiple output) safe transmission optimization method based on antenna selection | |
Zhu et al. | Low-complexity Pareto-optimal 3D beamforming for the full-dimensional multi-user massive MIMO downlink | |
CN112134603B (en) | Method for synthesizing safe transmission emission signal of MU-MIMO system | |
CN112601286B (en) | User scheduling method based on channel estimation error | |
CN111404588B (en) | Physical layer secure transmission method of full-duplex cognitive eavesdropping network | |
Wu et al. | IRS-Assisted Covert Communication with Equal and Unequal Transmit Prior Probabilities | |
CN111835393A (en) | Beamforming method for maximizing received power based on whitening filtering | |
Gui et al. | Robust directional modulation design for secrecy rate maximization in multiuser networks | |
Wu et al. | Hybrid processing for multi-user millimeter-wave massive MIMO systems via matrix decomposition | |
CN113364502B (en) | Physical layer secure communication method between multi-antenna equipment | |
Hu et al. | Group-based successive interference cancellation for multi-antenna NOMA system with error propagation | |
Jafar | Fundamental capacity limits of multiple antenna wireless systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |