CN114337977B - Anti-eavesdropping scheme based on half-duplex cooperative NOMA system - Google Patents
Anti-eavesdropping scheme based on half-duplex cooperative NOMA system Download PDFInfo
- Publication number
- CN114337977B CN114337977B CN202210024359.7A CN202210024359A CN114337977B CN 114337977 B CN114337977 B CN 114337977B CN 202210024359 A CN202210024359 A CN 202210024359A CN 114337977 B CN114337977 B CN 114337977B
- Authority
- CN
- China
- Prior art keywords
- user
- remote user
- relay
- signals
- remote
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 206010042135 Stomatitis necrotising Diseases 0.000 title claims abstract 4
- 201000008585 noma Diseases 0.000 title claims abstract 4
- 238000004364 calculation method Methods 0.000 claims abstract description 6
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000000295 complement effect Effects 0.000 claims description 3
- 238000010295 mobile communication Methods 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 15
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 3
- 230000008030 elimination Effects 0.000 description 3
- 238000003379 elimination reaction Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The application is directed to an anti-eavesdropping scheme based on a half-duplex cooperation NOMA system, which belongs to the field of wireless mobile communication, and comprises the following steps: the base station sends the superposition signal of the relay user and the remote user to the relay user; the relay user receives the signal from the base station and decodes the signal by adopting SIC; the relay user sends a new remote user superposition coded signal, the remote user and an eavesdropper receive the signal from the relay user, the remote user decodes the signal by using SIC, and the eavesdropper decodes the received signal by using PLC; obtaining the achievable rates of legal users and eavesdroppers to obtain the confidentiality rate of the remote users according to a shannon formula, and then obtaining a closed expression of the safe interruption probability of the remote users through numerical calculation; and deducing the minimum anti-eavesdrop service quality requirement of the remote user according to the service quality requirement when the remote user is just free from interruption. The scheme can effectively prevent the remote user from being eavesdropped.
Description
Technical Field
The application belongs to the field of wireless mobile communication, and mainly aims at a half-duplex cooperative NOMA system, which is mainly applied to prevent signals of remote users from being intercepted, in particular to a method for analyzing the safe interrupt probability of a single eavesdropper half-duplex cooperative NOMA system to obtain the minimum service quality requirement for preventing the users from being intercepted.
Background
In view of the rapid development of internet and internet of things services, the service demand of wireless communication is increasing. Non-orthogonal multiple access (NOMA) technology has been widely used in various fields as one of the promising key technologies in the fifth generation wireless network. Unlike the conventional orthogonal multiple access (Orthogonal multiple access, OMA) technique, only a single radio resource can be allocated to one user, for example, divided by frequency or time. NOMA technology allows multiple users to be served simultaneously with different powers in the same resource block (time/frequency/code). The receiving end decodes according to the power difference by eliminating interference from other users through serial interference elimination (Successive interference cancel, SIC).
The cooperative transmission technology is an effective technology against path loss, channel fading and shadowing effects, and can form a virtual multiple input multiple output scheme to cooperatively process data and improve the communication reliability of users with poor channel conditions. In a cooperative communication system, a signal of a source node is forwarded by a relay node, which is called cooperative diversity. The operation modes of the relay node can be classified into a full duplex mode and a half duplex mode. Physical layer security has attracted considerable attention in recent years as an attractive method of achieving secure communications due to the broadcast nature of wireless communications. It is therefore a major direction of current research how to prevent user signals from being eavesdropped.
In summary, the problems of the prior art are: although security analysis is now a major research hotspot for collaborative NOMA systems, current anti-eavesdropping schemes based on users in half-duplex collaborative NOMA systems are less studied.
Difficulty in solving the above problems: a closed expression based on the safe interruption probability in the single eavesdropper half-duplex cooperation NOMA system is obtained so as to deduce the service quality requirement when the remote user does not interrupt, and further prevent the signal of the remote user from being eavesdropped.
Meaning of solving the above problems: the closed expression based on the interruption probability of the relay user and the safe interruption probability of the remote user in the half-duplex cooperation NOMA system is obtained, the safety performance of the half-duplex cooperation NOMA system based on a single eavesdropper is quantitatively known, the situation that the user is not interrupted is deduced, and further the signal of the remote user is effectively prevented from being eavesdropped.
Disclosure of Invention
Aiming at the problems existing in the prior art, the application provides an anti-eavesdropping scheme based on a half-duplex cooperative NOMA system, which is used for preventing signal leakage of a remote user and guaranteeing information security of the remote user.
In a first aspect, the present application provides an anti-eavesdropping scheme based on a half-duplex co-operative NOMA system, the method comprising:
s1, a base station sends superposition coded signals about a relay user and a remote user to the relay user;
s2, the relay user receives signals from the base station and decodes the signals by adopting serial interference cancellation SIC;
s3, the relay user sends a new remote user superposition coded signal;
s4, the remote user and an eavesdropper receive signals from the relay user, the remote user decodes the signals by adopting SIC, and the eavesdropper decodes the received signals by adopting parallel interference elimination PLC;
s5, obtaining the achievable rates of legal users and eavesdroppers according to a shannon formula;
s6, obtaining the confidentiality rate of the remote user, and then obtaining a closed expression of the security interruption probability of the remote user through numerical calculation;
s7, deducing the minimum anti-eavesdrop service quality requirement of the remote user according to the service quality requirement when the remote user is just free from interruption.
Further, the method further comprises:
when the near-end user acts as a relay, it is assumed that the transmission power of the relay user coincides with the transmission power of the base station.
Further, the method comprises:
there is no direct link between the remote user and the eavesdropper and the base station due to distance, obstructions, or other practical reasons.
Further, the method comprises:
the step S2 comprises the following steps:
and S21, after receiving the signals from the base station, the relay user needs to decode the signals of the most remote user firstly, then decode the signals of the secondary remote user and finally decode the signals of the relay user according to different power distribution sizes.
S22, according to the decoding sequence, obtaining the signal-to-interference-plus-noise ratio (Signal to Interference plus Noise Ratio, SINR) when the signals of the relay user and the remote user are respectively decoded at the relay user.
Further, the method comprises:
the relay user operates in half duplex mode to decode and forward the superposition coded signal of the new remote user.
Further, the method comprises:
and when the achievable rate of the user is calculated, the channel bandwidth considered in the step S5 is a unit bandwidth.
Further, the method comprises:
for the relay user, only the relay user can successfully decode the signals of the remote user and the relay user at the same time, and the safe interruption probability of the remote user is the complement that the speed of the remote user is smaller than the service quality requirement of the user.
Drawings
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in the following preferred detail with reference to the accompanying drawings, in which:
fig. 1 is a schematic diagram of a half-duplex collaborative NOMA system based on a single eavesdropper according to an embodiment of the present application.
Fig. 2 is a flowchart of a safe interrupt probability analysis provided by the implementation of the present application.
Detailed Description
Other advantages and effects of the present application will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present application with reference to specific examples. The application may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present application. It should be noted that the illustrations provided in the following embodiments merely illustrate the basic idea of the present application by way of illustration, and the following embodiments and features in the embodiments may be combined with each other without conflict.
Wherein the drawings are for illustrative purposes only and are shown in schematic, non-physical, and not intended to limit the application; it will be appreciated by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The principle of application of the application is described in detail below with reference to the accompanying drawings.
The application provides a safe interruption probability analysis based on a single eavesdropper half-duplex cooperative NOMA system, which is realized in the scene of figure 1. Wherein BS represents relay, UE 1 Representing a central user, also a relay user, UE 2 Representing a secondary remote user, UE 3 Representing the most remote user, E represents an eavesdropper. h is a r Indicating channel parameters between base station and relay user, h 1,i ,Respectively represent the central user and the UE 2 ,UE 3 And the channel parameters between the eavesdroppers, and assuming that their channel gains all obey an exponential distribution.
The method for analyzing the probability of safety interruption in the half-duplex cooperation NOMA system based on the single eavesdropper provided by the embodiment of the application specifically comprises the following steps:
s1, a base station sends superposition coded signals about a relay user and a remote user to the relay user, wherein the superposition signals sent by the base station can be expressed as:
wherein x is 1 ,x 2 ,x 3 Signals respectively representing the relay user, the next-to-far end user and the most-far end user, P s Is the transmit power of the base station.
S2, the relay user receives signals from the base station and decodes the signals by adopting serial interference cancellation SIC, wherein the signals received by the relay user can be expressed as:
y r =h r x+n 1 (2)
then, the relay user decodes the received signal by using SIC, and for half duplex working mode, the relay user decodes the most remote user signal, the secondary remote user signal and the relay user in turn, and SINR when decoding the signal is:
γ 1 =a 1 |h r | 2 ρ (5)
wherein the method comprises the steps ofRepresenting the signal-to-noise ratio (Signal to Interference Ratio, SNR) of the base station.
S3, the relay user sends a new remote user superposition coded signal, and the superposition signal forwarded by the relay user is:
wherein P is r Is the transmission power of the relay user and has P r =P s ,Representing the SNR at the relay user.
S4, the remote user and an eavesdropper receive signals from the relay user, the remote user decodes the signals by adopting SIC, and the eavesdropper decodes the received signals by adopting parallel interference elimination PLC. Specifically, because of the broadcasting nature of wireless transmissions, users in the cell will all receive signals forwarded from the central user, and both natural remote users and eavesdropping will also receive signals from the remote users. The signal received by the most remote user from the relay user is:
y 3 =h 1,3 y+n 3 (7)
the SINR of the far-end user decoded far-end user signal is:
the signal received by the secondary remote user from the relay user is:
y 2 =h 1,2 y+n 2 (9)
SIC decoding signals are adopted by the secondary far-end users, and SINR of the secondary far-end user signals decoded by the secondary far-end users and the secondary far-end user signals are respectively
γ 2 =b 1 |h 1,2 | 2 ρ (11)
The eavesdropper receives the signal from the relay user as:
y e =h 1,e y+n e (12)
the eavesdropper then decodes the received signal by parallel interference cancellation (Parallel interference cancellation, PLC), then the SINR of the decoded far-end user signal at the eavesdropper is:
s5, obtaining the achievable rates of legal users and eavesdroppers according to the shannon formula, wherein the rates can be expressed as
For legal users, when the relay user works in half duplex mode, the achievable rates of the secondary far-end user and the far-end user are respectively:
s6, obtaining the confidentiality rate of the remote user, and then obtaining a closed expression of the security interruption probability of the remote user through numerical calculation, wherein the confidentiality rate of the remote user is as follows:
wherein [ x ]] + =max { x,0}. And then obtaining the closed expression of the interruption probability of the system through numerical calculation. Specifically, the outage probability of the relay user and the safe outage probability of the remote user.
The first step, calculating the interrupt probability of the relay user, wherein the relay user cannot interrupt only when the signal of the far-end user and the signal of the relay user are successfully decoded at the same time, and when the relay user works in the half duplex mode, the interrupt probability of the relay user can be expressed as:
wherein the method comprises the steps of Representing the quality of service requirements of the user lambda r Indicating that the channel gain obeying parameter between the base station and the relay user is lambda r Is an exponential distribution of (c).
Secondly, calculating the security interruption probability of the remote user, wherein the security interruption probability of the remote user is the complement that the rate of the remote user is smaller than the service quality requirement of the user, and when the relay user works in the half duplex mode, the security interruption probability of the remote user can be specifically expressed as:
it is currently difficult to solve for the closed-form solution of equation (1), so considering the case of high signal-to-noise ratio, when the SNR tends to infinity, this can be achieved by:
wherein the method comprises the steps of Then security based on single eavesdropper half-duplex collaborative NOMA systemThe total interrupt probability is:
s7, deducing the minimum anti-eavesdrop service quality requirement of the remote user according to the service quality requirement when the remote user is just free from interruption. Through research on the data transmission process, it is found that, because of the safe interruption probability calculated, when no interruption occurs at the remote user, the eavesdropper must not steal the signal of the remote user, and it is obtained through calculation, when the quality of service requirement of the remote user satisfies the following conditions,
the leakage of the far-end user signal can be effectively prevented.
Finally, it is noted that the above embodiments are only for illustrating the technical solution of the present application and not for limiting the same, and although the present application has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made thereto without departing from the spirit and scope of the present application, which is intended to be covered by the claims of the present application.
Claims (7)
1. An anti-eavesdropping scheme based on a half-duplex cooperative NOMA system, characterized in that the anti-eavesdropping scheme based on a single eavesdropper half-duplex cooperative NOMA system comprises:
s1, a base station sends superposition coded signals about a relay user and a remote user to the relay user;
s2, the relay user receives signals from the base station and decodes the signals by adopting SIC;
s3, the relay user sends a new remote user superposition coded signal;
s4, the remote user and an eavesdropper receive signals from the relay user, the remote user decodes the signals by using SIC, and the eavesdropper decodes the received signals by using PLC;
s5, obtaining the achievable rates of legal users and eavesdroppers according to a shannon formula;
s6, obtaining the confidentiality rate of the remote user, and then obtaining a closed expression of the security interruption probability of the remote user through numerical calculation;
s7, deducing the minimum anti-eavesdrop service quality requirement of the remote user according to the service quality requirement when the remote user is just free from interruption.
2. An anti-eavesdropping scheme according to claim 1, wherein when the near-end user acts as a relay, it is assumed that the transmission power of the relay user coincides with the transmission power of the base station.
3. An anti-eavesdropping scheme according to claim 1, characterized in that there is no direct link between the remote user and the eavesdropper and the base station due to distance, obstructions or other real reasons.
4. An anti-eavesdropping scheme according to claim 1, wherein S2 comprises:
s21, after receiving signals from a base station, a relay user needs to decode signals of the most remote user firstly, then decodes signals of the secondary remote user and finally decodes signals of the relay user according to different power distribution sizes;
s22, according to the decoding sequence, SINR when the signals of the relay user and the remote user are respectively decoded at the relay user is obtained.
5. An anti-eavesdropping scheme according to claim 1 wherein the relay user operates in half duplex mode to decode and forward the superimposed coded signal of the new remote user.
6. An anti-eavesdropping scheme according to claim 1, wherein the channel bandwidth considered in S5 is a unit bandwidth when calculating the achievable rate of the user.
7. An anti-eavesdropping scheme according to claim 1, wherein for the relay user, only the relay user will successfully decode the signals of the remote user and the relay user at the same time without interruption, and the S6 probability of interruption of the security of the remote user is that the rate of the remote user is less than the complement of the user' S service quality requirement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024359.7A CN114337977B (en) | 2022-01-07 | 2022-01-07 | Anti-eavesdropping scheme based on half-duplex cooperative NOMA system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024359.7A CN114337977B (en) | 2022-01-07 | 2022-01-07 | Anti-eavesdropping scheme based on half-duplex cooperative NOMA system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114337977A CN114337977A (en) | 2022-04-12 |
CN114337977B true CN114337977B (en) | 2023-10-27 |
Family
ID=81026175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210024359.7A Active CN114337977B (en) | 2022-01-07 | 2022-01-07 | Anti-eavesdropping scheme based on half-duplex cooperative NOMA system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114337977B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144080A (en) * | 2014-07-24 | 2014-11-12 | 上海斐讯数据通信技术有限公司 | System and method for managing terminal equipment through far-end equipment |
CN109548013A (en) * | 2018-12-07 | 2019-03-29 | 南京邮电大学 | A kind of mobile edge calculations system constituting method of the NOMA with anti-eavesdropping ability |
CN110113082A (en) * | 2019-03-20 | 2019-08-09 | 中山大学 | The method of the Robust Secure and rate optimized problem of multiple antennas non-orthogonal multiple access system based on the transmission of orthogonal space-time block coding |
AU2020100505A4 (en) * | 2020-04-02 | 2020-05-14 | Zhejiang Sci-Tech University | Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System |
CN111510987A (en) * | 2020-03-13 | 2020-08-07 | 西安电子科技大学 | Relay selection method based on safety cooperation NOMA network |
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10608777B2 (en) * | 2017-12-11 | 2020-03-31 | Electronics And Telecommunications Research Institute | Apparatus and method for physical layer security commuication in wireless communication system |
US11431434B2 (en) * | 2019-12-10 | 2022-08-30 | Electronics And Telecommunications Research Institute | Method and apparatus for secure communication in wireless communication system |
-
2022
- 2022-01-07 CN CN202210024359.7A patent/CN114337977B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144080A (en) * | 2014-07-24 | 2014-11-12 | 上海斐讯数据通信技术有限公司 | System and method for managing terminal equipment through far-end equipment |
CN109548013A (en) * | 2018-12-07 | 2019-03-29 | 南京邮电大学 | A kind of mobile edge calculations system constituting method of the NOMA with anti-eavesdropping ability |
CN110113082A (en) * | 2019-03-20 | 2019-08-09 | 中山大学 | The method of the Robust Secure and rate optimized problem of multiple antennas non-orthogonal multiple access system based on the transmission of orthogonal space-time block coding |
CN111510987A (en) * | 2020-03-13 | 2020-08-07 | 西安电子科技大学 | Relay selection method based on safety cooperation NOMA network |
AU2020100505A4 (en) * | 2020-04-02 | 2020-05-14 | Zhejiang Sci-Tech University | Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System |
CN112272183A (en) * | 2020-10-29 | 2021-01-26 | 桂林电子科技大学 | RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113132975A (en) * | 2021-04-22 | 2021-07-16 | 大连理工大学 | Safe transmission method of multi-antenna cooperative non-orthogonal multiple access system |
Non-Patent Citations (6)
Title |
---|
NOMA系统中基于协作干扰的物理层安全方案;徐鑫;金梁;;信号处理(06);全文 * |
Performance Analysis of Full Duplex Cooperative NOMA System with Imperfect SIC;Huilin Jiang等;2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall);全文 * |
Secrecy Performance of Uplink-Downlink NOMA Network at Physical Layer;Shashibhushan Sharma;2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET);全文 * |
基于STBC的无线认知NOMA系统物理层安全性能研究;李美玲;田莉莉;杨晓霞;李莹;王安红;董增寿;Sami Muhaidat;Mehrdad Dianati;;电子学报(03);全文 * |
基于非完美信道信息的协作NOMA系统中保密通信技术研究;陈杨;张忠培;李彬睿;;电子科技大学学报(05);全文 * |
认知无线电非正交多址接入随机网络物理层安全性能分析;于宝泉;蔡跃明;胡健伟;;电子与信息学报(04);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114337977A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111245498B (en) | Relay-assisted non-orthogonal multiple access cooperative network secure communication method | |
Yuan et al. | Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming | |
CN104837110B (en) | Transmission strategy implementation method based on interruption performance lifting in honeycomb D2D communication systems | |
Liu et al. | Performance analysis and optimization of cooperative full-duplex D2D communication underlaying cellular networks | |
Abbasi et al. | Transmission scheme, detection and power allocation for uplink user cooperation with NOMA and RSMA | |
Bordon et al. | Energy efficient power allocation schemes for a two-user network-coded cooperative cognitive radio network | |
CN106900030A (en) | Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks | |
Fang et al. | New NOMA-based two-way relay networks | |
CN112134656A (en) | D2D-NOMA cooperative communication system based on partial decoding and forwarding | |
CN111601375B (en) | NOMA transmission method based on 5G system | |
Umakoglu et al. | BER performance comparison of AF and DF assisted relay selection schemes in cooperative NOMA systems | |
Jamal et al. | A new approach to cooperative NOMA using distributed space time block coding | |
Babu et al. | Performance analysis of cooperative full duplex NOMA system in cognitive radio networks | |
Wang et al. | Covert wireless communication with spectrum mask in Internet of Things networks | |
Khuntia et al. | A bidirectional relay-assisted underlay device-to-device communication in cellular networks: An IoT application for FinTech | |
Zhang et al. | Covert Communications for STAR-RIS-Assisted Industrial Networks With a Full Duplex Receiver and RSMA | |
CN105813081A (en) | Method for selecting relay nodes capable of enhancing security performance of cognitive relay network | |
Liu et al. | Regenerative cooperative diversity with path selection and equal power consumption in wireless networks | |
Shen et al. | Power allocation for NOMA with cache-aided D2D communication | |
Wang et al. | Hybrid one-way full-duplex/two-way half-duplex relaying scheme | |
CN107171775B (en) | Hybrid duplex transmission method for improving physical layer security in cognitive relay network | |
Sun et al. | Optimal real-time spectrum sharing between cooperative relay and ad hoc networks | |
CN114337977B (en) | Anti-eavesdropping scheme based on half-duplex cooperative NOMA system | |
Khennoufa et al. | Exact bit error rate of cooperative NOMA without diversity combining | |
Anh et al. | Secrecy performance of an uplink-downlink cooperative PD-NOMA DF network in PLS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |