CN114337774B - Safe transmission method for double-satellite communication system - Google Patents

Safe transmission method for double-satellite communication system Download PDF

Info

Publication number
CN114337774B
CN114337774B CN202111513780.6A CN202111513780A CN114337774B CN 114337774 B CN114337774 B CN 114337774B CN 202111513780 A CN202111513780 A CN 202111513780A CN 114337774 B CN114337774 B CN 114337774B
Authority
CN
China
Prior art keywords
satellite
weight vector
communication system
beam forming
constraint condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111513780.6A
Other languages
Chinese (zh)
Other versions
CN114337774A (en
Inventor
林敏�
肖圣杰
李艳丽
曹李莉
黄硕
阚鹏程
欧阳键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202111513780.6A priority Critical patent/CN114337774B/en
Publication of CN114337774A publication Critical patent/CN114337774A/en
Application granted granted Critical
Publication of CN114337774B publication Critical patent/CN114337774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a safe transmission method facing to a double-satellite communication system in the technical field of wireless communication, which comprises the steps of obtaining perfect channel information of legal users and imperfect channel information of eavesdroppers; establishing a safe transmission problem model taking a beam forming weight vector as a variable; taking uncertainty caused by imperfect information of an eavesdropper channel into consideration, and introducing a safety interruption probability constraint condition; solving a safe transmission problem model according to the actual conditions of all satellites in the double-satellite communication system to obtain a beam forming weight vector; the user signals are multiplied by the beam forming weight vectors obtained in the space-time coding follow-up, sent to the corresponding satellites and forwarded to the ground users through the satellites, so that the communication quality of the double-satellite communication system is ensured, and meanwhile, the safety and reliability of information transmission between legal users and the satellites are improved.

Description

Safe transmission method for double-satellite communication system
Technical Field
The application belongs to the field of satellite communication, and particularly relates to a safe transmission method for a double-satellite communication system.
Background
Satellite communication has wide coverage, is not affected by regions, has large communication capacity and the like, and has wide application prospect in the fields of remote region communication, navigation, disaster relief and the like. However, due to the inherent broadcasting characteristics and wide area coverage of satellites, security issues are of great concern.
The traditional upper encryption method has the premise that an eavesdropper has limited computing power and cannot decipher an encryption algorithm. However, with the development of quantum computing and the enhancement of the computing power of eavesdroppers, the conventional key mechanism has difficulty in ensuring the secure transmission of signals. Unlike terrestrial wireless communication systems, in many cases of malicious eavesdropping in satellite communication systems, it is often difficult to obtain perfect channel state information of an eavesdropper. Therefore, the physical layer secure transmission method under the condition of imperfect eavesdropper channel information is a technical problem to be solved in the satellite communication field.
In addition, in the satellite communication system, the signals received by the ground users are affected by shadow effect and multipath scattering, so that the communication quality is affected, and how to improve the reliability of the communication is another technical problem in the satellite communication field.
Disclosure of Invention
The application aims to provide a safe transmission method for a double-satellite communication system, which ensures the communication quality of the double-satellite communication system and improves the safety and reliability of information transmission between legal users and satellites.
In order to achieve the above purpose, the technical scheme adopted by the application is as follows:
the application provides a safe transmission method facing a double-satellite communication system, which comprises the following steps:
acquiring perfect channel information of legal users and imperfect channel information of eavesdroppers;
the method comprises the steps of taking the maximum safe rate of a double-satellite communication system as a target, adding a safe interruption probability constraint condition, a transmission rate constraint condition and a satellite maximum transmission power constraint condition of information transmission between a legal user and a satellite, and establishing a safe transmission problem model taking a beam forming weight vector as a variable;
taking uncertainty caused by imperfect information of an eavesdropper channel into consideration, and introducing a safety interruption probability constraint condition;
solving a safe transmission problem model according to the actual conditions of all satellites in the double-satellite communication system to obtain a beam forming weight vector; the user signals are multiplied by the beam forming weight vector obtained before the space-time coding is carried out, and the multiplied beam forming weight vector is sent to the corresponding satellite and is forwarded to the ground user through the satellite.
Preferably, the expression formula of the outage probability constraint condition is:
wherein h is i Represented as satellite channels, w i Expressed as a beamforming weight vector, R expressed as a system safe rate threshold, p k,sop ∈(0,1]For the system outage probability threshold value,noise power, denoted as legal user received signal, ">Noise power expressed as the signal received by an eavesdropper, (·) H Represented as a conjugate transpose operator.
Preferably, the expression of the transmission rate constraint is:
wherein R is min A transmission rate threshold value representing a legitimate user,
preferably, the expression formula of the satellite maximum transmission power constraint condition is:
||w i || 2 ≤P i,max
wherein P is i,max Representing the i-th satellite maximum transmit power threshold.
Preferably, the uncertainty caused by imperfect information of the eavesdropper channel is considered, and a safe interrupt probability constraint condition is introduced; the process comprises the following steps:
the uncertainty model of the kth eavesdropper channel is expressed as:
wherein g i,k For channel state information between the i-th satellite and the kth eavesdropper,for estimated channel state information between the ith satellite and the kth eavesdropper, Δg i,k For an estimated error between the ith satellite and the kth eavesdropper, the obedience is 0 and the variance is E i,k Complex gaussian distribution of (a);
substituting an uncertainty model of the eavesdropper channel into the outage probability constraint condition and converting by using the Bernstein inequality can obtain:
s + (A)=max{λ max (A),0}
wherein Tr (·) is the trace of the matrix; vec (·) represents matrix vectorization.
Preferably, the method for solving the safe transmission problem model to obtain the beamforming weight vector includes the following steps:
the problem of maximizing the safety rate is converted into the problem of minimizing the transmitting power, and the problem of optimizing the transmitting power is further converted into the problem of optimizing the convex through a semi-positive relaxation method; solving the convex optimization problem to obtain a beam forming weight vector w i
Preferably, the safety rate maximization problem is converted into the transmission power minimization problem, and the safety rate maximization problem is further converted into the convex optimization problem by a semi-positive relaxation method, and the process comprises the following steps:
by introducing a relaxation variable mu i,k Relaxation variable lambda i,k The semi-positive programming problem can be obtained:
μ i,k I-A i,k ≥0
rank(W i )=1,W i ≥0
wherein rank (·) represents the rank of the matrix, and I is the identity matrix.
Preferably, the convex optimization problem is solved to obtain a beam forming weight vector w i The process comprises the following steps:
solving to obtain the weight W of the beam forming matrix by a semi-definite relaxation principle and a binary search method i opt
Judgment of W i opt Whether the rank is 1; if the rank is 1, for W i opt The eigenvalue decomposition is carried out to solve the beam forming weight vector w i The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, solving the beam forming weight vector w by using Gaussian randomization technology i
Compared with the prior art, the application has the beneficial effects that:
(1) According to the actual conditions of all satellites in the double-satellite communication system, solving a safe transmission problem model to obtain a beam forming weight vector; the user signals are multiplied by the beam forming weight vectors obtained in the space-time coding follow-up, and the multiplied user signals are sent to corresponding satellites and forwarded to ground users through the satellites, so that the safety and reliability of information transmission between legal users and the satellites are improved.
(2) In the application, with the maximum safe rate of a double-satellite communication system as a target, adding a satellite maximum transmitting power constraint condition, an interruption probability constraint condition and a transmission rate constraint condition of information transmission between a legal user and a satellite, and establishing a safe transmission problem model with a beam forming weight vector as a variable; and ensuring the communication quality of the double-satellite communication system through a safe transmission problem model.
(3) The uncertainty caused by imperfect information of the eavesdropper channel is introduced into a constraint condition of outage probability of information transmission between a legal user and a satellite; taking into account probability constraints under non-conservative strategies, seeking a maximum safe reachable rate under outage probability constraints, namely seeking a maximum confidentiality rate; the burden of the system can be reduced on the premise of ensuring the safety of the double-satellite communication system.
Drawings
FIG. 1 is a schematic diagram of a satellite communication system according to an embodiment of the present application;
fig. 2 is a flowchart of a secure transmission method for a dual-satellite communication system according to the present application.
Detailed Description
The application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and are not intended to limit the scope of the present application.
As shown in fig. 1-2, a secure transmission method for a dual satellite communication system includes:
acquiring perfect channel information of known legal users and imperfect channel information of eavesdroppers;
the method comprises the steps of taking the maximum safe rate of a double-satellite communication system as a target, adding a safe interruption probability constraint condition, a transmission rate constraint condition and a satellite maximum transmission power constraint condition of information transmission between a legal user and a satellite, and establishing a safe transmission problem model taking a beam forming weight vector as a variable;
the expression formula of the interrupt probability constraint condition is as follows:
wherein h is i Represented as satellite channels, w i Expressed as a beamforming weight vector, R expressed as a system safe rate threshold, p k,sop ∈(0,1]For the system outage probability threshold value,noise power, denoted as legal user received signal, ">Noise power expressed as a legitimate user received signal, (·) H Represented as a conjugate transpose operator.
The expression formula of the transmission rate constraint condition is as follows:
wherein R is min A transmission rate threshold value representing a legitimate user,
the expression formula of the satellite maximum transmitting power constraint condition is as follows:
||w i || 2 ≤P i,max
wherein P is i,max Representing the i-th satellite maximum transmit power threshold.
Taking uncertainty caused by imperfect information of an eavesdropper channel into consideration, and introducing a safety interruption probability constraint condition; the process comprises the following steps:
the uncertainty model of the kth eavesdropper channel is expressed as:
wherein g i,k For channel state information between the i-th satellite and the kth eavesdropper,for estimated channel state information between the ith satellite and the kth eavesdropper, Δg i,k For an estimated error between the ith satellite and the kth eavesdropper, the obedience is 0 and the variance is E i,k Complex gaussian distribution of (a);
substituting an uncertainty model of the eavesdropper channel into the outage probability constraint condition and converting by using the Bernstein inequality can obtain:
s + (A)=max{λ max (A),0}
probability constraint reduction is then as follows:
wherein Tr (·) is the trace of the matrix; vec (·) represents matrix vectorization. According to the actual condition of each satellite in the double-satellite communication system, solving the safe transmission problem model to obtain a beam forming weight vector, wherein the calculation process comprises the following steps:
the problem of maximizing the safety rate is converted into the problem of minimizing the transmitting power, and the problem of optimizing the transmitting power is further converted into the problem of optimizing the convex through a semi-positive relaxation method; solving the convex optimization problem to obtain a beam forming weight vector w i
The safety rate maximization problem is converted into the transmitting power minimization problem, and the transmitting power minimization problem is further converted into the convex optimization problem through a semi-positive relaxation method, and the process comprises the following steps of:
by introducing a relaxation variable mu i,k Relaxation variable lambda i,k The semi-positive programming problem can be obtained:
μ i,k I-A i,k ≥0
rank(W i )=1,W i ≥0
wherein rank (·) represents the rank of the matrix, and I is the identity matrix.
Solving to obtain the weight W of the beam forming matrix by a semi-definite relaxation principle and a binary search method i opt The method comprises the steps of carrying out a first treatment on the surface of the Judgment of W i opt Whether the rank is 1; if the rank is 1, for W i opt The eigenvalue decomposition is carried out to solve the beam forming weight vector w i The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, solving the beam forming weight vector w by using Gaussian randomization technology i
The user signals are multiplied by the beam forming weight vectors obtained in the space-time coding follow-up, the multiplied user signals are sent to respective satellites through high-capacity feed links, and the satellites transmit the signals to the ground legal users after adopting a satellite carrier beam forming technology, so that the whole information transmission process is completed.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present application, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present application, and such modifications and variations should also be regarded as being within the scope of the application.

Claims (4)

1. A method for secure transmission for a dual satellite communication system, comprising:
acquiring perfect channel information of known legal users and imperfect channel information of eavesdroppers;
the method comprises the steps of taking the maximum safe rate of a double-satellite communication system as a target, adding a safe interruption probability constraint condition, a transmission rate constraint condition and a satellite maximum transmission power constraint condition of information transmission between a legal user and a satellite, and establishing a safe transmission problem model taking a beam forming weight vector as a variable;
the expression formula of the safe interrupt probability constraint condition is as follows:
wherein h is i Represented as satellite downlink channel vectors, w i Expressed as a beamforming weight vector, R expressed as a system safe rate threshold, p k,sop ∈(0,1]For the system outage probability threshold value,noise power, denoted as legal user received signal, ">Noise power expressed as the signal received by an eavesdropper, (·) H Represented as a conjugate transpose operator;
the expression formula of the transmission rate constraint condition is as follows:
wherein R is min A transmission rate threshold value representing a legitimate user;
the expression formula of the maximum transmitting power constraint condition is as follows:
||w i || 2 ≤P i,max
wherein P is i,max Representing an i-th satellite maximum transmit power threshold;
considering uncertainty caused by imperfect eavesdropper channel information, the process of introducing the safety interruption probability constraint condition comprises the following steps:
the uncertainty model of the kth eavesdropper channel is expressed as:
wherein g i,k Channel state information between the ith satellite and the kth eavesdropper;estimated channel state information between the ith satellite and the kth eavesdropper; Δg i,k For an estimated error between the ith satellite and the kth eavesdropper, the obedience is 0 and the variance is E i,k Is of standard deviation +.> A complex domain vector represented as dimension N x 1;
substituting the uncertain model of the eavesdropper channel into the outage probability constraint condition and then converting by using the Bernstein inequality to obtain the following steps:
s + (A)=max{λ max (A),0}
wherein Tr (·) is the trace of the matrix; vec (·) represents matrix vectorization; lambda (lambda) max (A) Expressed as the maximum eigenvalue of matrix A, which takes on value A i,k
Solving a safe transmission problem model according to the actual conditions of all satellites in the double-satellite communication system to obtain a beam forming weight vector; the user signals are multiplied by the beam forming weight vector obtained before the space-time coding is carried out, and the multiplied beam forming weight vector is sent to the corresponding satellite and is forwarded to the ground user through the satellite.
2. The method for secure transmission in a dual-satellite communication system according to claim 1, wherein the solving the secure transmission problem model to obtain the beamforming weight vector comprises the following steps:
the problem of maximizing the safety rate is converted into the problem of minimizing the transmitting power, and the problem of optimizing the transmitting power is further converted into the problem of optimizing the convex through a semi-positive relaxation method; solving the convex optimization problem to obtain a beam forming weight vector w i
3. The method for secure transmission in a dual satellite communication system according to claim 2, wherein the secure rate maximization problem is converted into a transmit power minimization problem, and further converted into a convex optimization problem by a semi-positive relaxation method, the process comprising:
by introducing a relaxation variable mu i,k Relaxation variable lambda i,k The semi-positive programming problem can be obtained:
wherein rank (·) represents the rank of the matrix, and I is the identity matrix.
4. A method for secure transmission in a dual satellite communication system according to claim 3, wherein the beamforming weight vector w is obtained by solving a convex optimization problem i The process comprises the following steps:
solving to obtain beam forming matrix by semi-definite relaxation principle and binary search method
JudgingWhether the rank is 1; if the rank is 1, pair->The eigenvalue decomposition is carried out to solve the beam forming weight vector w i The method comprises the steps of carrying out a first treatment on the surface of the Whether or notThen the beamforming weight vector w is solved using gaussian randomization technique i
CN202111513780.6A 2021-12-13 2021-12-13 Safe transmission method for double-satellite communication system Active CN114337774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111513780.6A CN114337774B (en) 2021-12-13 2021-12-13 Safe transmission method for double-satellite communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111513780.6A CN114337774B (en) 2021-12-13 2021-12-13 Safe transmission method for double-satellite communication system

Publications (2)

Publication Number Publication Date
CN114337774A CN114337774A (en) 2022-04-12
CN114337774B true CN114337774B (en) 2023-10-10

Family

ID=81049951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111513780.6A Active CN114337774B (en) 2021-12-13 2021-12-13 Safe transmission method for double-satellite communication system

Country Status (1)

Country Link
CN (1) CN114337774B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017015532A1 (en) * 2015-07-23 2017-01-26 Nxgen Partners Ip, Llc System and methods for combining mimo and mode-division multiplexing
CN107888270A (en) * 2017-12-25 2018-04-06 北京理工大学 Recognize the safe transmission method of physical layer in satellite ground UNE
CN108712199A (en) * 2018-05-03 2018-10-26 西安交通大学 Two-dimentional robust beam-forming method under MISO tapping channels based on outage probability constraint
CN109412745A (en) * 2018-12-11 2019-03-01 中国人民解放军军事科学院国防科技创新研究院 A kind of star-ground hybrid communication network downlink Cooperative Security transmission method
CN110912597A (en) * 2019-11-07 2020-03-24 南京邮电大学 Robust safety beam forming method based on multi-objective optimization
CN112202486A (en) * 2020-09-08 2021-01-08 南京邮电大学 Multi-beam satellite communication robust beam forming method, device and storage medium thereof
CN113114341A (en) * 2021-04-01 2021-07-13 南京邮电大学 Information safety transmission method and device in high-flux satellite communication system
CN113179113A (en) * 2021-04-15 2021-07-27 南京邮电大学 Beam forming method and system under satellite communication multicast signal transmission mode
CN113194484A (en) * 2021-03-31 2021-07-30 浙江大学 Large-scale access method based on inter-satellite cooperation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917558B (en) * 2015-06-19 2018-02-16 电子科技大学 Based on beam forming and the united unconditional security traffic model method for building up of safe coding
US10291347B2 (en) * 2017-01-03 2019-05-14 Intelligent Fusion Technology, Inc. Effective cross-layer satellite communications link interferences mitigation in the presence of various RFI types
US10999000B2 (en) * 2018-01-24 2021-05-04 Korea Advanced Institute Of Science And Technology Apparatus and method for secure communication using artificial noise scheme

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017015532A1 (en) * 2015-07-23 2017-01-26 Nxgen Partners Ip, Llc System and methods for combining mimo and mode-division multiplexing
CN107888270A (en) * 2017-12-25 2018-04-06 北京理工大学 Recognize the safe transmission method of physical layer in satellite ground UNE
CN108712199A (en) * 2018-05-03 2018-10-26 西安交通大学 Two-dimentional robust beam-forming method under MISO tapping channels based on outage probability constraint
CN109412745A (en) * 2018-12-11 2019-03-01 中国人民解放军军事科学院国防科技创新研究院 A kind of star-ground hybrid communication network downlink Cooperative Security transmission method
CN110912597A (en) * 2019-11-07 2020-03-24 南京邮电大学 Robust safety beam forming method based on multi-objective optimization
CN112202486A (en) * 2020-09-08 2021-01-08 南京邮电大学 Multi-beam satellite communication robust beam forming method, device and storage medium thereof
CN113194484A (en) * 2021-03-31 2021-07-30 浙江大学 Large-scale access method based on inter-satellite cooperation
CN113114341A (en) * 2021-04-01 2021-07-13 南京邮电大学 Information safety transmission method and device in high-flux satellite communication system
CN113179113A (en) * 2021-04-15 2021-07-27 南京邮电大学 Beam forming method and system under satellite communication multicast signal transmission mode

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Gaofeng Cui等.Secure Beamforming and Jamming for Multibeam Satellite Systems With Correlated Wiretap Channels.IEEE Transactions on Vehicular Technology.2020,全文. *
xiao shengjie等.robust secure beamforming for the downlink of multibeam satellite communication.2020 Cross Strait Radio Science & Wireless Technology Conference (CSRSWTC).2021,全文. *
欧阳键;许拔;袁灿;姜杨威;庄天行.面向卫星-地面协同通信系统的物理层安全传输设计.电讯技术.2017,(12),全文. *
王舒;达新宇.非理想信道状态下多波束卫星通信的鲁棒安全传输设计.电子与信息学报.2017,(02),全文. *
金鑫;任保全;李洪钧;巩向武;董飞鸿.星-地混合通信网络前向链路安全传输方案研究.宇航学报.2019,(12),全文. *

Also Published As

Publication number Publication date
CN114337774A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US10516452B1 (en) Using artificial signals to maximize capacity and secrecy of multiple-input multiple-output (MIMO) communication
Wu et al. Robust secure beamforming for wireless powered full-duplex systems with self-energy recycling
CN108880734B (en) CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization
CN105657698B (en) Safe transmission method based on cooperation interference in multicell network
CN109728865B (en) Interception coding method based on artificial noise in large-scale antenna array
EP3991370B1 (en) Method, transmitter device and receiver device for securing channel training on a power domain non- orthogonal multiple access system
Xu et al. Weighted sum secrecy rate maximization for D2D underlaid cellular networks
CN113179113B (en) Beam forming method and system under satellite communication multicast signal transmission mode
Zhao et al. Secure energy efficiency transmission for mmWave-NOMA system
CN114337774B (en) Safe transmission method for double-satellite communication system
Wang et al. Multicast secrecy rate maximization for reconfigurable intelligent surface backscatter communication
Ji et al. A robust IRS-aided wireless information surveillance design with bounded channel errors
Lee et al. Deep CSI compression and coordinated precoding for multicell downlink systems
CN107154815B (en) Multi-user system hybrid pre-coding method
CN112134603B (en) Method for synthesizing safe transmission emission signal of MU-MIMO system
Ji et al. Multi-Relay Cognitive Network With Anti-Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference
CN114501580A (en) Cooperative rate segmentation network security transmission method with untrusted relay threat
Gui et al. Robust directional modulation design for secrecy rate maximization in multiuser networks
Hu et al. Secure transmission design for virtual antenna array-aided device-to-device multicast communications
CN111934863A (en) Secret key sharing method based on artificial noise and safety coding in edge calculation
Li et al. Sum Secrecy Rate Maximization for Active RIS-Assisted Uplink SIMO-NOMA Networks
CN114339736B (en) Transmission method of enhanced security code and wireless communication system
US10644771B2 (en) Using artificial signals to maximize capacity and secrecy of multiple-input multiple-output (MIMO) communication
Zheng et al. Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks
CN113630163A (en) Artificial noise assisted beam forming method with robustness for related stealing channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant