CN114339731A - Spatial interruption probability analysis method and device and electronic equipment - Google Patents

Spatial interruption probability analysis method and device and electronic equipment Download PDF

Info

Publication number
CN114339731A
CN114339731A CN202111371001.3A CN202111371001A CN114339731A CN 114339731 A CN114339731 A CN 114339731A CN 202111371001 A CN202111371001 A CN 202111371001A CN 114339731 A CN114339731 A CN 114339731A
Authority
CN
China
Prior art keywords
eavesdropping
expression
channel response
legal
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111371001.3A
Other languages
Chinese (zh)
Other versions
CN114339731B (en
Inventor
胡博
李斌
申扬
宁丽娜
赵成林
刘晓凯
于海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wulian Zhitong Technology Co ltd
Beijing University of Posts and Telecommunications
State Grid Liaoning Electric Power Co Ltd
Original Assignee
Beijing Wulian Zhitong Technology Co ltd
Beijing University of Posts and Telecommunications
State Grid Liaoning Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wulian Zhitong Technology Co ltd, Beijing University of Posts and Telecommunications, State Grid Liaoning Electric Power Co Ltd filed Critical Beijing Wulian Zhitong Technology Co ltd
Priority to CN202111371001.3A priority Critical patent/CN114339731B/en
Publication of CN114339731A publication Critical patent/CN114339731A/en
Application granted granted Critical
Publication of CN114339731B publication Critical patent/CN114339731B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The spatial interruption probability is used as a privacy performance measurement index of physical layer security, the spatial interruption probability is constructed by utilizing position information of legal equipment and a channel response function, and randomness of the position of the eavesdropping equipment is considered in the construction process of the spatial interruption probability by modeling the position information of the eavesdropping equipment, so that the spatial interruption probability under the condition that the eavesdropping equipment obeys uniform distribution can be defined. The influence of the antenna parameters on the spatial interruption probability can be obtained by solving a closed solution of the spatial interruption probability average value.

Description

Spatial interruption probability analysis method and device and electronic equipment
Technical Field
The present application relates to the field of network security assessment technologies, and in particular, to a method and an apparatus for spatial outage probability analysis, and an electronic device.
Background
A Physical Layer Security (PLA) technology attracts attention as a new technology for improving information Security, and PLA is a way for performing data Security transmission by using channel characteristics such as fading, randomness, space-time uniqueness, reciprocity, and the like of a wireless channel, and realizes secure transmission of information through technologies such as precoding, beamforming, and artificial noise. Compared with the traditional encryption technology, the physical layer security does not depend on the computational complexity, and can be combined with the encryption technology of the upper layer to ensure the information security of the system. Many researchers analyze, using the security performance metric, a Secure Region (SR) or an Insecure Region (ISR) of the system, where a Secure Region refers to an eavesdropping apparatus located in the Region that cannot correctly decode received Secure information, and an Insecure Region refers to an eavesdropping apparatus located in the Region that can correctly decode received Secure information.
Device location information has gained much attention in wireless networks, however, this information is less utilized in physical layer security, and at the same time, the privacy performance metric does not take into account random fading of the channel and randomness of the device location.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a method, an apparatus and an electronic device for spatial outage probability analysis, so as to solve or partially solve the above problems.
In view of the above, a first aspect of the present application provides a spatial outage probability analysis method, including:
acquiring the positions of the base station and legal equipment;
expressing the positions of the base station, the legal equipment and the eavesdropping equipment in a polar coordinate mode to obtain a position variable and a motion area;
acquiring an antenna parameter set of the base station;
modeling the position of the eavesdropping device to obtain an eavesdropping position model;
modeling legal channel response and wiretap channel response to obtain a channel response model, wherein the legal channel response and the wiretap channel response are random variables generated based on the position variables;
calculating the signal-to-noise ratio of the legal device and the eavesdropping device according to the position variable, the channel response model and the antenna parameter set, and calculating the channel capacity of the eavesdropping device according to the signal-to-noise ratio;
in response to the fact that the channel capacity is larger than a preset value, calculating according to the signal-to-noise ratio, the antenna parameter set and a motion region of the eavesdropping device to obtain an unsafe region expression, and calculating according to the unsafe region expression and the eavesdropping position model to obtain a space interruption probability expression;
and processing the spatial interruption probability expression, calculating to obtain a closed solution of the spatial interruption probability expression, and taking the closed solution as a spatial interruption probability analysis result.
A second aspect of the present application provides a spatial outage probability analysis apparatus, including:
a position obtaining module, configured to obtain positions of the base station and a legal device;
the position representation module is used for representing the positions of the base station, the legal device and the eavesdropping device in a polar coordinate mode to obtain a position variable and a motion area;
a parameter obtaining module, configured to obtain an antenna parameter set of the base station;
the position modeling module is used for modeling the position of the eavesdropping device to obtain an eavesdropping position model;
the channel response module is used for modeling legal channel response and wiretap channel response to obtain a channel response model, wherein the legal channel response and the wiretap channel response are random variables generated based on the position variables;
a capacity calculation module, configured to calculate signal-to-noise ratios of the legal device and the eavesdropping device according to the position variable, the channel response model, and the antenna parameter set, and calculate a channel capacity of the eavesdropping device according to the signal-to-noise ratios;
the probability calculation module is used for calculating to obtain an insecure area expression according to the signal-to-noise ratio, the antenna parameter set and the motion area of the eavesdropping device in response to the fact that the channel capacity is larger than a preset value, and calculating to obtain a spatial interruption probability expression according to the insecure area expression and the eavesdropping position model;
and the calculation closed-form solution module is used for processing the spatial interruption probability expression, calculating to obtain a closed-form solution of the spatial interruption probability expression, and taking the closed-form solution as a spatial interruption probability analysis result.
A third aspect of the application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of the first aspect when executing the program.
As can be seen from the above, according to the spatial interruption probability analysis method, the spatial interruption probability analysis device, and the electronic device provided by the present application, the spatial interruption probability is used as a security performance measurement index of physical layer security, the spatial interruption probability is constructed by using the position information of the legal device and a channel response function, and the randomness of the position of the eavesdropping device is considered in the construction process of the spatial interruption probability by modeling the position information of the eavesdropping device, so that the spatial interruption probability under the condition that the eavesdropping device obeys uniform distribution can be defined. The influence of the antenna parameters on the spatial interruption probability can be obtained by solving a closed solution of the spatial interruption probability average value.
Drawings
In order to more clearly illustrate the technical solutions in the present application or the related art, the drawings needed to be used in the description of the embodiments or the related art will be briefly introduced below, and it is obvious that the drawings in the following description are only embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a spatial outage probability analysis method according to an embodiment of the present application;
FIG. 2 is a flowchart of obtaining a polar position variable according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of acquiring a model of an eavesdropping location according to an embodiment of the present application;
FIG. 4 is a flowchart of obtaining a channel response model according to an embodiment of the present application;
FIG. 5 is a flow chart of calculating a signal-to-noise ratio according to an embodiment of the present application;
FIG. 6 is a flow chart of calculating an unsafe zone in an embodiment of the present application;
FIG. 7 is a flowchart of computing spatial outage probabilities according to an embodiment of the present application;
FIG. 8 is a flow chart of a closed-form solution to compute spatial outage probability according to an embodiment of the present application;
fig. 9 is a block diagram of a spatial outage probability analysis apparatus according to an embodiment of the present application;
fig. 10 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings in combination with specific embodiments.
It should be noted that technical terms or scientific terms used in the embodiments of the present application should have a general meaning as understood by those having ordinary skill in the art to which the present application belongs, unless otherwise defined. The use of "first," "second," and similar terms in the embodiments of the present application do not denote any order, quantity, or importance, but rather the terms are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
In wireless communication, due to the openness of spectrum resources, a malicious user in an effective transmission range can interfere or eavesdrop on secret information of a legitimate user, so that information security is a problem to be solved urgently in the field of wireless communication. The traditional solution is to adopt a key-based encryption technology, and a transmitting end encrypts the secret information through a key, so that even if an eavesdropping user intercepts the secret information, the intercepted information cannot be decrypted because the eavesdropping user cannot know the key. Key-based encryption techniques rely on the computational complexity of the encryption algorithm, and with the development of computer technology, especially the advent of quantum computers, keys are at risk of being deciphered.
In recent years, a Physical Layer Security (PLA) technology has attracted attention as a new technology for improving information Security, and PLA is a method for performing data Security transmission by using channel characteristics such as fading, randomness, space-time uniqueness, and reciprocity of a wireless channel, and realizes secure transmission of information by using techniques such as precoding, beamforming, and artificial noise. Compared with the traditional encryption technology, the physical layer security does not depend on the computational complexity, and can be combined with the encryption technology of the upper layer to ensure the information security of the system.
In the MISO system, the transmitting end improves the security performance of the communication system by using the beam forming technology, and the basic principle of the MISO system is to transmit the security Information to the legal user by using the multi-antenna technology under the condition that the Channel State Information (CSI) of the legal Channel is known, and simultaneously reduce the receiving signal-to-noise ratio of the eavesdropping user (the ratio of useful signal to noise is larger, and the larger the value is, the better the quality of the signal is, the smaller the noise is). The transmitting terminal (Alice) obtains the CSI or the position information of the legal user (Bob) through channel estimation, so that Alice can improve the signal-to-noise ratio of signals received by the Bob terminal by using a beam forming technology, and the probability of information leaked to the eavesdropping user (Eve) is reduced. Since Eve uses a passive eavesdropping mode in most cases, Alice cannot know the CSI or location information of Eve. Therefore, many researchers analyze, using the security performance metric, a Secure Region (SR) in which an eavesdropping user located in the Region cannot correctly decode the received Secure information, or an Insecure Region (ISR) in which an eavesdropping user located in the Region can correctly decode the received Secure information. The user position information has gained wide attention in wireless networks, but the information is less utilized in the physical layer security, the privacy performance measurement index of the patent not only considers the random fading of a channel, but also considers the randomness of the user position, and the Spatial correlation output Probability (SSOP) of the system is constructed by utilizing the position information of the user, so as to measure the privacy performance of the system.
In the physical layer security research, a transmitting end Alice generally assumes that CSI of a legal channel (a channel between Alice and Bob) and an eavesdropping channel (a channel between Alice and Eve) are known, but for a passively eavesdropping user Eve, Alice cannot acquire position information or CSI thereof, so in order to measure the security performance of the system, the patent analyzes a secure area and an insecure area of the system by using a secret performance measurement index (such as secret capacity), defines an SSOP according to the insecure area of the system, and deduces a closed solution of an upper boundary thereof.
As shown in fig. 1, the method of the present embodiment includes:
step 101, acquiring the positions of the base station and the legal device.
In this step, the base station may be a multi-antenna transmitting end, and the legitimate device may be a single-antenna user. For example, the transmitting end (Alice) is located at the origin of coordinates and is configured with ntAccording to the uniformly distributed antenna array, the antenna spacing delta d is half wavelength delta d which is lambda/2. Both the legal device (Bob) and the eavesdropping device (Eve) are equipped with a single antenna.
In the scheme, by acquiring the positions of the base station and the legal equipment, a data basis is provided for the subsequent representation of the positions of the base station and the legal equipment in a polar coordinate form.
And 102, representing the positions of the base station, the legal device and the eavesdropping device in a polar coordinate mode to obtain a position variable and a motion area.
In this step, polar coordinates refer to taking a fixed point O in the plane, called pole, and a ray Ox, called polar axis, and selecting a length unit and the positive direction of the angle (usually counterclockwise). For any point M in the plane, ρ represents the length of a line segment OM (sometimes r), θ represents the angle from Ox to OM, ρ is the polar diameter of point M, θ is the polar angle of point M, and the ordered pair of numbers (ρ, θ) is the polar coordinate of point M.
In the above scheme, the positions of the base station, the legal device and the eavesdropping device are expressed in a polar coordinate form, and the position information of the base station, the legal device and the eavesdropping device is converted into a variable that can be applied in the security performance measurement index.
In some embodiments, as shown in fig. 2, step 102 specifically includes:
step 201, obtaining angle information and amplitude information of the position.
In this step, the angle information refers to an included angle between a line segment formed by the legal device and the base station and the polar axis in the counterclockwise direction, and an included angle between a line segment formed by the eavesdropping device and the base station and the polar axis in the counterclockwise direction. The amplitude information refers to the length of a line segment formed by a legitimate device and a base station, and the length of a line segment formed by a wiretapping device and a base station.
And 202, representing the angle variable and the amplitude variable in a polar coordinate mode, and taking a representation result as the position variable.
Through the scheme, although the position of the wiretapping device adopting the passive wiretapping mode is unknown, the position information of the wiretapping device is expressed into the position variable which can be processed by constructing the position variables of the base station, the legal device and the wiretapping device, so that a variable basis is provided for the subsequent position modeling of the wiretapping device.
And 103, acquiring an antenna parameter set of the base station.
In this step, the antenna parameter set refers to transmission power, antenna array parameters, noise information, and privacy rate.
In the scheme, a data basis is provided for the subsequent calculation of the signal-to-noise ratio by acquiring the antenna parameter set of the base station.
And 104, modeling the position of the eavesdropping device to obtain an eavesdropping position model.
In this step, the wiretap location model means that the wiretap devices obey a uniform distribution in a circular area.
In the scheme, the unknown position information of the wiretapping device is added into the subsequent spatial interruption probability analysis process in the form of random variables by establishing the wiretapping position model.
In some embodiments, as shown in fig. 3, step 104 specifically includes:
step 301, obtaining a location variable of the eavesdropping device.
Step 302, processing the position variable of the eavesdropping device by using a first predetermined probability distribution function to obtain a first predetermined probability distribution model related to the second position variable.
In this step, the first predetermined probability distribution function refers to a uniform distribution function.
Step 303, using the first predetermined probability distribution model as a wiretap position model, wherein the angle of incidence θ in the wiretap position modeleCompliance thetaeU (0,2 pi) distribution, eavesdropping distance D in position modeleCompliance
Figure BDA0003362137160000061
The distribution, U (: means that uniform distribution is obeyed,
Figure BDA0003362137160000062
representing the square of the farthest transmission distance of the base station.
In this step, the bit is eavesdroppedAngle of incidence θ in the phantomeCompliance thetaeU (0,2 pi) distribution, eavesdropping distance D in position modeleCompliance
Figure BDA0003362137160000063
The distribution, U (: means that uniform distribution is obeyed,
Figure BDA0003362137160000064
representing the square of the farthest transmission distance of the base station.
By the scheme, the eavesdropping equipment is modeled in a uniformly distributed mode in the circular area, and the unknown location information of the eavesdropping equipment is added into the subsequent spatial interruption probability analysis process in a random variable mode.
And 105, modeling the legal channel response and the wiretap channel response to obtain a channel response model, wherein the legal channel response and the wiretap channel response are random variables generated based on the position variables.
In this step, the channel response model refers to a model obtained by modeling the channel responses of a legitimate device and an eavesdropping device using flat rayleigh fading.
In some embodiments, as shown in fig. 4, step 105 specifically includes:
step 401, obtaining the position variables, where the position variables include the position variables of the legal device and the position variables of the eavesdropping device.
Step 402, obtaining the legal channel response and the eavesdropping channel response.
Step 403, using the second predetermined probability distribution model as a channel response model, wherein the channel response model includes a legal channel response function and an eavesdropping channel response function, and the legal channel response function is expressed as
Figure BDA0003362137160000071
The eavesdropping channel response function is expressed as
Figure BDA0003362137160000072
Wherein
Figure BDA0003362137160000073
Figure BDA0003362137160000074
Representing the directional vector of the antenna array of a legitimate device,
Figure BDA0003362137160000075
representing the direction vector of the antenna array of a legitimate device, DeIndicating the distance of the eavesdropping device from the base station, DbIndicating the distance, theta, of legitimate devices from the base stationbIndicating angle of incidence, theta, of legitimate devicesb∈(0,2π),θeIndicating angle of incidence theta of eavesdropping apparatuseE (0,2 π). Wherein h iseAn eavesdropping channel response, h, representing an eavesdropping devicebIndicating the legitimate channel response of the legitimate device,
Figure BDA0003362137160000076
representing a complex gaussian distribution, and α is the path loss exponent of flat rayleigh fading.
In this step, the second predetermined probability distribution function refers to a flat rayleigh fading function. Both the legitimate channel and the eavesdropped channel are subject to flat Rayleigh fading with a path loss exponent of alpha, and the legitimate channel response function is expressed as
Figure BDA0003362137160000077
The eavesdropping channel response function is expressed as
Figure BDA0003362137160000078
Wherein
Figure BDA0003362137160000079
Figure BDA00033621371600000710
Representing the directional vector of the antenna array of a legitimate device,
Figure BDA00033621371600000711
representing the direction vector of the antenna array of a legitimate device, DeIndicating the distance of the eavesdropping device from the base station, DbIndicating the distance, theta, of legitimate devices from the base stationb∈(0,2π),θeE (0,2 π). Wherein h iseAn eavesdropping channel response, h, representing an eavesdropping devicebIndicating the legitimate channel response of the legitimate device,
Figure BDA00033621371600000712
representing a complex gaussian distribution.
Step 404, using the second predetermined probability distribution model as a channel response model.
By adopting the scheme, a legal channel response model and an interception channel response model are established by adopting flat Rayleigh fading, so that a data basis is provided for the calculation of the subsequent signal-to-noise ratio.
And 106, calculating the signal-to-noise ratios of the legal device and the eavesdropping device according to the position variable, the channel response model and the antenna parameter set, and calculating the channel capacity of the eavesdropping device according to the signal-to-noise ratios.
In this step, when the base station transmits signals to the legal device and the eavesdropping device by using the beam forming technology, the information y received by the legal devicebAnd information y received by the eavesdropping deviceeComprises the following steps:
Figure BDA0003362137160000081
where P represents transmit power, beamforming vector
Figure BDA0003362137160000082
s denotes a transmission signal, ntWhich indicates the number of antennas of the base station,
Figure BDA0003362137160000083
Figure BDA0003362137160000084
indicating a desire; n isbAnd neRespectively representing that the mean value and the variance received by the legal device and the eavesdropping device are respectively 0 and 0
Figure BDA0003362137160000085
And
Figure BDA0003362137160000086
complex gaussian noise. The received signal-to-noise ratios of the legitimate device and the eavesdropping device are respectively expressed as
Figure BDA0003362137160000087
Figure BDA0003362137160000088
Wherein,
Figure BDA0003362137160000089
Deindicating the distance of the eavesdropping device from the base station, DbIndicating the distance, G (theta), of a legitimate device from the base stationeb) Representing the angle function of the eavesdropping device to the legitimate device.
In some embodiments, as shown in fig. 5, step 106 specifically includes:
step 501, substituting the signal-to-noise ratio into a logarithmic function to obtain a function output quantity, wherein the expression of the logarithmic function is Ce=log2(1+γe) Wherein, CeFor eavesdropping on the channel capacity of the channel, gammaeTo eavesdrop on the signal-to-noise ratio of the device.
In this step, Ce=log2(1+γe) Wherein, CeFor eavesdropping on the channel capacity of the channel, log2Is a logarithmic function.
Step 502, taking the function output quantity as the channel capacity of the eavesdropping device.
By the scheme, the channel capacity of the wiretap equipment is obtained, and a data basis is provided for the calculation of the subsequent non-secure area expression.
And 107, in response to the fact that the channel capacity is larger than a preset value, calculating to obtain an unsafe area expression according to the signal-to-noise ratio, the antenna parameter set and the motion area of the eavesdropping device, and calculating to obtain a spatial interruption probability expression according to the unsafe area expression and the eavesdropping position model.
In this step, the predetermined value is the difference between the legitimate channel rate and the secret rate.
In some embodiments, as shown in fig. 6, step 107 specifically includes:
step 601, the antenna parameter set comprises a secret rate and a channel rate;
step 602, in response to determining that the channel capacity is greater than the difference between the channel rate and the secret rate, an insecure area exists;
in this step, the channel rate R of the eavesdropping channeleGreater than the channel capacity C of the eavesdropping channeleThe eavesdropping device may receive and decode the secret information, which is leaked to the eavesdropping device, referred to as a secret outlet.
Defining the insecure area as the area where the privacy interruption event occurs, i.e. the insecure area Θ, has the preliminary expression:
Θ={z:Ce>Rb-Rs}
wherein R isbIndicating the legal channel rate, RsIndicating the system security rate and z indicating the eavesdropping device coordinates.
Step 603, calculating to obtain the expression of the insecure area according to the signal-to-noise ratio, the channel rate, the secret rate and the motion area of the eavesdropping device, wherein the expression of the insecure area is
Figure BDA0003362137160000091
P represents the transmit power, heIndicating an eavesdropping channel response of an eavesdropping device,
Figure BDA0003362137160000092
variance, R, representing complex Gaussian noise of eavesdropping equipmentbIndicating the legal channel rate, RsWhich represents the rate at which the system is kept secret,
Figure BDA0003362137160000093
ntindicating the number of antennas of the base station.
In this step, the signal-to-noise ratio γ of the eavesdropping device is estimated according to the preliminary expression of the insecure area ΘeChannel rate R of eavesdropping deviceeSecret rate RsSubstituting the preliminary expression to obtain a further expression of the non-secure area: Θ ═ { z ═ D (D)ee):De<D(θe) And (c) the step of (c) in which,
Figure BDA0003362137160000094
calculating the area of the unsafe zone, taking the area of the unsafe zone as an expression A of the unsafe zone:
Figure BDA0003362137160000095
where P denotes a transmission power.
By the scheme, the relation between the expression of the nonsecure region and the position variable of the wiretapping equipment and the relationship between the expression of the wiretapping channels are obtained, so that the expression of the space interruption probability can be obtained in the following process.
In some embodiments, as shown in fig. 7, step 107 specifically further includes.
Step 701, obtaining the nonsecure region expression and the eavesdropping position model.
Step 702, dividing the nonsecure region expression by the circular region in the eavesdropping position model to obtain a random variable expression.
In this step, the process is carried out,
Figure BDA0003362137160000101
wherein D ismaxDenotes the radius of the circular area, pssopDependent on a random variable | he|2,pssopIs the spatial outage probability.
Step 703, using the random variable expression as the spatial interruption probability expression, wherein,
Figure BDA0003362137160000102
Dmaxdenotes the radius of the circular area, pssopDependent on a random variable | he|2,pssopIs the spatial outage probability.
By the scheme, the probability expression of the confidentiality performance measurement index is obtained by converting the nonsecure region expression into the spatial interruption probability expression, so that the confidentiality performance measurement index can be solved subsequently.
And 108, processing the spatial interruption probability expression, calculating to obtain a closed solution of the spatial interruption probability expression, and taking the closed solution as a spatial interruption probability analysis result.
In this step, closed-form solution means that a strict formula is used, and the dependent variable can be obtained by giving any independent variable, namely the solution of the problem. The independent variables include an antenna parameter set of the base station, a position variable of the wiretap device, a path loss index of flat rayleigh fading, and the like.
In some embodiments, as shown in fig. 8, step 108 specifically includes:
step 801, the spatial interruption probability expressions are organized into a functional model for eavesdropping channel response.
Step 802, calculating an average expression of the function model.
In this step, the process is carried out,
Figure BDA0003362137160000103
Figure BDA0003362137160000104
represents the average of the spatial outage probability.
Step 803, processing the average value expression by adopting a jensen inequality to obtain a relational expression of the average value and the position variable, wherein the jensen inequality is expressed as
Figure BDA0003362137160000105
X is a random variable, and alpha is more than or equal to 2.
The jensen inequality is expressed as:
Figure BDA0003362137160000106
wherein X is a random variable, and alpha is more than or equal to 2. For any random variable X, the equation holds if and only if α is 2.
Available according to the Jansen inequality
Figure BDA0003362137160000111
Wherein J0(x) Representing a first type of bessel function,
Figure BDA0003362137160000112
thus, it is possible to provide
Figure BDA0003362137160000113
The closed-form solution of (c) is:
Figure BDA0003362137160000114
when α is 2, the equation holds.
Step 804, using the relational expression as a closed-form solution of the spatial interruption probability expression, wherein the closed-form solution is
Figure BDA0003362137160000115
When α is 2, the equation holds.
In the scheme, a closed-form solution of the average value of the spatial interruption probability is obtained through calculation by adopting a Jensen inequality, so that the average value of the spatial interruption probability can be obtained by substituting an antenna parameter set of a base station, a position variable of eavesdropping equipment and a path loss index of flat Rayleigh fading into the closed-form solution, and the relation between the spatial interruption probability and the antenna parameter is obtained.
According to the scheme, the spatial interruption probability is used as a privacy performance measurement index of physical layer security, the spatial interruption probability is constructed by utilizing the position information of legal equipment and a channel response function, the randomness of the position of the eavesdropping equipment is considered in the construction process of the spatial interruption probability by modeling the position information of the eavesdropping equipment, and thus the spatial interruption probability under the condition that the eavesdropping equipment obeys uniform distribution can be defined. The influence of the antenna parameters on the spatial interruption probability can be obtained by solving a closed solution of the spatial interruption probability average value.
It should be noted that the method of the embodiment of the present application may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In such a distributed scenario, one of the multiple devices may only perform one or more steps of the method of the embodiment, and the multiple devices interact with each other to complete the method.
It should be noted that the above describes some embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Based on the same inventive concept, the application also provides a spatial interruption probability analysis device corresponding to the method of any embodiment.
Referring to fig. 9, the spatial interruption probability analysis apparatus includes:
a location obtaining module 901, configured to obtain locations of the base station and the legal device.
A position representing module 902, configured to represent the positions of the base station, the legal device, and the eavesdropping device in a polar coordinate manner, so as to obtain a position variable and a motion area.
In some embodiments, the location representation module 902 is further configured to:
acquiring an angle variable and an amplitude variable of the position;
and expressing the angle variable and the amplitude variable in a polar coordinate form, and taking the expression result as the position variable.
A parameter obtaining module 903, configured to obtain an antenna parameter set of the base station.
And the position modeling module 904 is configured to model the position of the eavesdropping device to obtain an eavesdropping position model.
In some embodiments, the location modeling module 904 is further configured to:
acquiring a position variable of the eavesdropping device;
processing the position variable of the eavesdropping device by adopting a first preset probability distribution function to obtain a first preset probability distribution model related to the second position variable;
using the first predetermined probability distribution model as a wiretap position model, wherein the incidence angle theta in the wiretap position modeleCompliance thetaeU (0,2 pi) distribution, eavesdropping distance D in position modeleCompliance
Figure BDA0003362137160000121
The distribution, U (: means that uniform distribution is obeyed,
Figure BDA0003362137160000122
representing the square of the farthest transmission distance of the base station.
The channel response module 905 is configured to model a legal channel response and an eavesdropping channel response to obtain a channel response model, where the legal channel response and the eavesdropping channel response are random variables generated based on the position variable.
In some embodiments, the channel response module 905 is further configured to:
acquiring the position variables, wherein the position variables comprise the position variables of the legal equipment and the position variables of the eavesdropping equipment;
acquiring the legal channel response and the eavesdropping channel response;
processing the position variable of the legal device, the position variable of the wiretapping device, the legal channel response and the wiretapping channel response by adopting a second predetermined probability distribution function to obtain a second predetermined probability distribution model;
using the second predetermined probability distribution model as a channel response model, wherein the channel response model comprises a legal channel response function and an eavesdropping channel response function, and the legal channel response function is expressed as
Figure BDA0003362137160000131
The eavesdropping channel response function is expressed as
Figure BDA0003362137160000132
Wherein
Figure BDA0003362137160000133
Figure BDA0003362137160000134
Representing the directional vector of the antenna array of a legitimate device,
Figure BDA0003362137160000135
representing the direction vector of the antenna array of a legitimate device, DeIndicating the distance of the eavesdropping device from the base station, DbIndicating the distance, theta, of legitimate devices from the base stationbIndicating angle of incidence, theta, of legitimate devicesb∈(0,2π),θeIndicating angle of incidence theta of eavesdropping apparatuseE (0,2 π). Wherein h iseAn eavesdropping channel response, h, representing an eavesdropping devicebIndicating the legitimate channel response of the legitimate device,
Figure BDA0003362137160000136
representing a complex gaussian distribution, and α is the path loss exponent of flat rayleigh fading.
A capacity calculating module 906, configured to calculate signal-to-noise ratios of the legal device and the eavesdropping device according to the location variable, the channel response model, and the antenna parameter set, and calculate a channel capacity of the eavesdropping device according to the signal-to-noise ratio.
A probability calculation module 907, configured to calculate, in response to determining that the channel capacity is greater than a predetermined value, an insecure area expression according to the signal-to-noise ratio, the antenna parameter set, and the motion area of the eavesdropping device, and calculate a spatial outage probability expression according to the insecure area expression and the eavesdropping position model.
In some embodiments, the probability calculation module 907 is further configured to:
the antenna parameter set comprises a secret rate and a channel rate;
in response to determining that the channel capacity is greater than the difference between the channel rate and the secret rate, an insecure area exists;
calculating to obtain the expression of the nonsecure region according to the signal-to-noise ratio, the channel rate, the privacy rate and the motion region of the eavesdropping device, wherein the expression of the nonsecure region is
Figure BDA0003362137160000137
P represents the transmit power, heIndicating an eavesdropping channel response of an eavesdropping device,
Figure BDA0003362137160000138
variance, R, representing complex Gaussian noise of eavesdropping equipmentbIndicating the legal channel rate, RsWhich represents the rate at which the system is kept secret,
Figure BDA0003362137160000139
ntindicating the number of antennas of the base station.
In some embodiments, the probability calculation module 907 is further configured to:
acquiring the nonsecure region expression and the eavesdropping position model;
dividing the nonsecure region expression by a circular region in the eavesdropping position model to obtain a random variable expression;
taking the random variable expression as the spatial interruption probability expression, wherein,
Figure BDA0003362137160000141
Dmaxdenotes the radius of the circular area, pssopDependent on a random variable | he|2,pssopIs the spatial outage probability.
And a closed-form solution calculation module 908, configured to process the spatial interruption probability expression, calculate a closed-form solution of the spatial interruption probability expression, and use the closed-form solution as a spatial interruption probability analysis result.
In some embodiments, the calculate closed form solution module 908 is further to:
arranging the spatial interruption probability expression into a function model about eavesdropping channel response;
calculating an average value expression of the function model;
processing the average value expression by adopting a Zhansen inequality to obtain a relational expression of the average value and the position variable, wherein the Zhansen inequality is expressed as
Figure BDA0003362137160000142
X is a random variable, and alpha is more than or equal to 2;
taking the relational expression as a closed-form solution of the spatial interruption probability expression, wherein the closed-form solution is
Figure BDA0003362137160000143
When α is 2, the equation holds.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations as the present application.
The apparatus of the foregoing embodiment is used to implement the corresponding spatial outage probability analysis method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to the method of any embodiment described above, the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and running on the processor, and when the processor executes the program, the spatial interrupt probability analysis method described in any embodiment above is implemented.
Fig. 10 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The electronic device of the above embodiment is used to implement the corresponding spatial outage probability analysis method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to any of the above-described embodiment methods, the present application further provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the spatial outage probability analysis method according to any of the above embodiments.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The computer instructions stored in the storage medium of the foregoing embodiment are used to enable the computer to execute the spatial interruption probability analysis method according to any one of the foregoing embodiments, and have the beneficial effects of the corresponding method embodiments, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the context of the present application, features from the above embodiments or from different embodiments may also be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present application as described above, which are not provided in detail for the sake of brevity.
In addition, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown in the provided figures for simplicity of illustration and discussion, and so as not to obscure the embodiments of the application. Furthermore, devices may be shown in block diagram form in order to avoid obscuring embodiments of the application, and this also takes into account the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the application are to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the application, it should be apparent to one skilled in the art that the embodiments of the application can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present application has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present application are intended to be included within the scope of the present application.

Claims (10)

1. A spatial interruption probability analysis method is characterized in that the method is applied to a base station; the method comprises the following steps:
acquiring the positions of the base station and legal equipment;
expressing the positions of the base station, the legal equipment and the eavesdropping equipment in a polar coordinate mode to obtain a position variable and a motion area;
acquiring an antenna parameter set of the base station;
modeling the position of the eavesdropping device to obtain an eavesdropping position model;
modeling legal channel response and wiretap channel response to obtain a channel response model, wherein the legal channel response and the wiretap channel response are random variables generated based on the position variables;
calculating the signal-to-noise ratio of the legal device and the eavesdropping device according to the position variable, the channel response model and the antenna parameter set, and calculating the channel capacity of the eavesdropping device according to the signal-to-noise ratio;
in response to the fact that the channel capacity is larger than a preset value, calculating according to the signal-to-noise ratio, the antenna parameter set and a motion region of the eavesdropping device to obtain an unsafe region expression, and calculating according to the unsafe region expression and the eavesdropping position model to obtain a space interruption probability expression;
and processing the spatial interruption probability expression, calculating to obtain a closed solution of the spatial interruption probability expression, and taking the closed solution as a spatial interruption probability analysis result.
2. The method according to claim 1, wherein said modeling the location of said eavesdropping device comprises:
acquiring a position variable of the eavesdropping device;
processing the position variable of the eavesdropping device by adopting a first preset probability distribution function to obtain a first preset probability distribution model related to the second position variable;
using the first predetermined probability distribution model as a wiretap position model, wherein the incidence angle theta in the wiretap position modeleCompliance thetaeU (0,2 pi) distribution, eavesdropping distance D in position modeleCompliance
Figure FDA0003362137150000011
The distribution, U (: means that uniform distribution is obeyed,
Figure FDA0003362137150000012
representing the square of the farthest transmission distance of the base station.
3. The method of claim 1, wherein modeling the legitimate channel response and the eavesdropping channel response comprises:
acquiring the position variables, wherein the position variables comprise the position variables of the legal equipment and the position variables of the eavesdropping equipment;
acquiring the legal channel response and the eavesdropping channel response;
processing the position variable of the legal device, the position variable of the wiretapping device, the legal channel response and the wiretapping channel response by adopting a second predetermined probability distribution function to obtain a second predetermined probability distribution model;
using the second predetermined probability distribution model as a channel response model, wherein the channel response model comprises a legal channel response function and an eavesdropping channel response function, and the legal channel response function is expressed as
Figure FDA0003362137150000021
The eavesdropping channel response function is expressed as
Figure FDA0003362137150000022
Wherein
Figure FDA0003362137150000023
Figure FDA0003362137150000024
Representing the directional vector of the antenna array of a legitimate device,
Figure FDA0003362137150000025
representing the direction vector of the antenna array of a legitimate device, DeIndicating the distance of the eavesdropping device from the base station, DbIndicating the distance, theta, of legitimate devices from the base stationbIndicating angle of incidence, theta, of legitimate devicesb∈(0,2π),θeIndicating angle of incidence theta of eavesdropping apparatuseE (0,2 π). Wherein h iseAn eavesdropping channel response, h, representing an eavesdropping devicebIndicating the legitimate channel response of the legitimate device,
Figure FDA0003362137150000026
representing a complex gaussian distribution, and α is the path loss exponent of flat rayleigh fading.
4. The method according to claim 1, wherein said calculating an insecure area representation of the system from the signal-to-noise ratio, the set of antenna parameters, and the area of motion of the eavesdropping device in response to determining that the channel capacity is greater than a predetermined value comprises:
the antenna parameter set comprises a secret rate and a channel rate;
in response to determining that the channel capacity is greater than the difference between the channel rate and the secret rate, an insecure area exists;
calculating to obtain the expression of the nonsecure region according to the signal-to-noise ratio, the channel rate, the privacy rate and the motion region of the eavesdropping device, wherein the expression of the nonsecure region is
Figure FDA0003362137150000027
P represents the transmit power, heIndicating an eavesdropping channel response of an eavesdropping device,
Figure FDA0003362137150000028
variance, R, representing complex Gaussian noise of eavesdropping equipmentbIndicating the legal channel rate, RsWhich represents the rate at which the system is kept secret,
Figure FDA0003362137150000029
ntindicating the number of antennas of the base station.
5. The method according to claim 1, wherein said calculating a spatial outage probability expression for the system based on the nonsecure region expression and the eavesdropping location model comprises:
acquiring the nonsecure region expression and the eavesdropping position model;
dividing the nonsecure region expression by a circular region in the eavesdropping position model to obtain a random variable expression;
taking the random variable expression as the spatial interruption probability expression, wherein,
Figure FDA0003362137150000031
Dmaxdenotes the radius of the circular area, pssopDependent on a random variable | he|2,pssopIs emptyInter-break probability.
6. The method of claim 1, wherein the processing the spatial outage probability expression to compute a closed-form solution to the spatial outage probability expression comprises:
arranging the spatial interruption probability expression into a function model about eavesdropping channel response;
calculating an average value expression of the function model;
processing the average value expression by adopting a Zhansen inequality to obtain a relational expression of the average value and the position variable, wherein the Zhansen inequality is expressed as
Figure FDA0003362137150000032
X is a random variable, and alpha is more than or equal to 2;
taking the relational expression as a closed-form solution of the spatial interruption probability expression, wherein the closed-form solution is
Figure FDA0003362137150000033
When α is 2, the equation holds.
7. The method according to claim 1, wherein said representing the locations of the base station, the legitimate device and the eavesdropping device in polar coordinate form comprises:
acquiring an angle variable and an amplitude variable of the position;
and expressing the angle variable and the amplitude variable in a polar coordinate form, and taking the expression result as the position variable.
8. The method according to claim 1, wherein said calculating a channel capacity of the eavesdropping device according to the signal-to-noise ratio comprises:
substituting the signal-to-noise ratio into a logarithmic function to obtain a function output quantity, wherein the expression of the logarithmic function is Ce=log2(1+γe) Wherein,CeFor eavesdropping on the channel capacity of the channel, gammaeIs the signal-to-noise ratio of the eavesdropping device;
taking the function output as the channel capacity of the eavesdropping device.
9. A spatial outage probability analysis apparatus, comprising:
a position obtaining module, configured to obtain positions of the base station and a legal device;
the position representation module is used for representing the positions of the base station, the legal device and the eavesdropping device in a polar coordinate mode to obtain a position variable and a motion area;
a parameter obtaining module, configured to obtain an antenna parameter set of the base station;
the position modeling module is used for modeling the position of the eavesdropping device to obtain an eavesdropping position model;
the channel response module is used for modeling legal channel response and wiretap channel response to obtain a channel response model, wherein the legal channel response and the wiretap channel response are random variables generated based on the position variables;
a capacity calculation module, configured to calculate signal-to-noise ratios of the legal device and the eavesdropping device according to the position variable and the antenna parameter set, and calculate a channel capacity of the eavesdropping device according to the signal-to-noise ratios;
the probability calculation module is used for calculating to obtain an insecure area expression according to the signal-to-noise ratio, the antenna parameter set and the motion area of the eavesdropping device in response to the fact that the channel capacity is larger than a preset value, and calculating to obtain a spatial interruption probability expression according to the insecure area expression and the eavesdropping position model;
and the calculation closed-form solution module is used for processing the spatial interruption probability expression, calculating to obtain a closed-form solution of the spatial interruption probability expression, and taking the closed-form solution as a spatial interruption probability analysis result.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 8 when executing the program.
CN202111371001.3A 2021-11-18 2021-11-18 Space interruption probability analysis method and device and electronic equipment Active CN114339731B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111371001.3A CN114339731B (en) 2021-11-18 2021-11-18 Space interruption probability analysis method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111371001.3A CN114339731B (en) 2021-11-18 2021-11-18 Space interruption probability analysis method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN114339731A true CN114339731A (en) 2022-04-12
CN114339731B CN114339731B (en) 2023-11-14

Family

ID=81046961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111371001.3A Active CN114339731B (en) 2021-11-18 2021-11-18 Space interruption probability analysis method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114339731B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131823A (en) * 2016-06-06 2016-11-16 西安交通大学 Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene
CN109728865A (en) * 2018-04-19 2019-05-07 南京邮电大学 Eavesdropping coding method based on man made noise in a kind of extensive antenna array
CN111132259A (en) * 2019-12-27 2020-05-08 西安理工大学 Combined power optimization and routing method for physical layer security
US20210345102A1 (en) * 2019-11-08 2021-11-04 Massachusetts Institute Of Technology Physical layer key generation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131823A (en) * 2016-06-06 2016-11-16 西安交通大学 Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene
CN109728865A (en) * 2018-04-19 2019-05-07 南京邮电大学 Eavesdropping coding method based on man made noise in a kind of extensive antenna array
US20210345102A1 (en) * 2019-11-08 2021-11-04 Massachusetts Institute Of Technology Physical layer key generation
CN111132259A (en) * 2019-12-27 2020-05-08 西安理工大学 Combined power optimization and routing method for physical layer security

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钱辉;李光球;丁一凡;: "随机位置窃听场景下SWIPT系统的物理层安全性能", 电信科学, no. 05 *

Also Published As

Publication number Publication date
CN114339731B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
JP6913897B2 (en) Efficiency of wireless power supply
CN111046433B (en) Model training method based on federal learning
JP7165934B2 (en) Receiving device for efficient wireless power reception
US9225517B2 (en) Secure device association
US10476854B2 (en) Quantum key distribution logon widget
US8639934B2 (en) Radio channel metrics for secure wireless network pairing
US10057289B2 (en) Adjusting multi-factor authentication using context and pre-registration of objects
Zhang et al. General stochastic channel model and performance evaluation for underwater wireless optical links
Gaebel et al. Looks good to me: Authentication for augmented reality
CN113517986B (en) Identity authentication method based on quantum walking and related equipment
US10133307B2 (en) Dock for extending the utility of an electronic device
CN114339764A (en) Pilot frequency deception attack detection method and device, electronic equipment and storage medium
US20160088474A1 (en) Performing Pairing And Authentication Using Motion Information
KR102688000B1 (en) Apparatus for iot device based on puf using channel status information and authenticating method for the same
KR102448625B1 (en) Method and system for detecting fraudulent transaction using homomorphic encrypted data
US11133926B2 (en) Attribute-based key management system
US9749133B2 (en) Method and apparatus for secure communication and determining secret information
CN113596826A (en) Millimeter wave physical layer key generation method and system for random beam switching
CN114339731B (en) Space interruption probability analysis method and device and electronic equipment
KR20210066713A (en) Method for Generating Encryption Key and Digital Signature Based on Lattices
WO2018119950A1 (en) Access control method and apparatus
CN114598495B (en) Physical layer authentication method and device based on multi-time slot channel characteristics
CN114448613B (en) Physical layer key generation method and device of communication system and electronic equipment
Zhu et al. Privacy‐Aware Online Task Offloading for Mobile‐Edge Computing
Qiu et al. MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant