CN114697103B - Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation - Google Patents
Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation Download PDFInfo
- Publication number
- CN114697103B CN114697103B CN202210305016.8A CN202210305016A CN114697103B CN 114697103 B CN114697103 B CN 114697103B CN 202210305016 A CN202210305016 A CN 202210305016A CN 114697103 B CN114697103 B CN 114697103B
- Authority
- CN
- China
- Prior art keywords
- vector
- matrix
- weight vector
- transmission
- complex
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Radio Transmission System (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
The invention discloses a physical layer safe transmission transmitting weight vector calculating method based on mirror image operation, and belongs to the field of signal safe transmission. The invention can generate an infinite set of new transmission weight vectors through iteration by only needing an initial set of transmission weight vectors. The calculation amount is less, and a new transmitting weight vector can be obtained through simple matrix operation. Compared with polygonal construction methods and other methods, the operation time of the method is greatly reduced. With a larger number N of transmit antennas, a shorter run time can still be maintained. Under the condition of single path, the invention has the security similar to ASM and multipath simulation effect, can accurately receive receipts in the azimuth of the receiver, and can maintain the error rate at a very high value in other azimuth, and an eavesdropper can not accurately receive and decode information.
Description
Technical Field
The invention belongs to the field of signal safety transmission, in particular to a method based on polygon mirror image operation, which can quickly generate a weight vector design for signal safety transmission.
Background
With further development of the information age, wireless communication technology has been widely used in the fields of education, medical treatment, military, and the like. However, as the application level field is continuously expanded, potential safety hazards of information in the transmission process are gradually exposed. Both eavesdropping and attacks occur during the information transfer process. In order to realize safe transmission of signals and ensure the safety and confidentiality of information in the transmission process, a digital encryption technology or a communication confidentiality protocol is generally adopted. Currently, researchers are going into intensive research from the physical layer aspect, which is divided into two aspects of adjusting channel capacity and designing an actual communication system. In a phased array based secure communication system, the information needs to be weighted by weight vectors after being processed. Designing time-varying weight vectors becomes an important ring in encrypted communications. The design method based on the polygonal structure is a simple and rapid method for constructing the transmitting weight vector. The invention changes the phase angle of the vector by mirroring the vector polygon on the basis of the polygon structure, and finally rapidly obtains the time-varying transmitting weight vector.
Disclosure of Invention
The invention provides a new method for transmitting weight design, firstly, a group of known phase solutions are designed through a polygon structure, and on the basis, the vector sum is not changed due to mirror image operation, and under the condition of ensuring the solutions, a group of new transmitting weight vectors can be obtained through one or more groups of edges of the mirror image vector polygons.
In order to concretely realize the scheme is as follows: a physical layer security transmission transmitting weight vector calculating method based on mirror image operation comprises the following steps:
step 1: for MISO downlink systems, where N transmit antennas, 1 receiver and Q eavesdroppers are equipped; data y transmitted by QPSK modulation model k (k) The method comprises the following steps: y is k (k)=h H w (k) x (k) +eta (k), wherein w (k) is a transmission weight vector, x (k) is a transmission symbol, h is a channel vector, and eta (k) is Gaussian random noise; specifically, the weight vector w (k) is expressed asWherein-> φ n For vector equation->In which, to simplify the expression, |h 0 I is the beam gain of the receiver, N is the number of antennas, h n N-th element representing channel vector h, n=1, …, N;
step 2: obtaining a group of initial transmitting weight vectors by polygon construction methodAfter the initial transmit weight vector is obtained, the complex vector set is constructed in reverse>Wherein (1)> Representing the operation of taking the real part,/->Representing an imaginary part taking operation;
step 3: combining complex vector sets v pre Randomly dividing the data into different subgroups, each subgroup taking the vector sum as a mirror image axis, carrying out mirror image operation, and changing the phase of the vector to obtain a new transmitting weight vector of each subgroup;
step 4: obtaining all transmitting full vectors of all subgroups, sequentially combining, and extracting phi in the combined transmitting full vectors n By means ofCalculating new transmission weights, namely: />/>
Step 5: and repeating the flow by taking the transmitting weight of the previous time as an initial weight vector at each time, and iterating to obtain a new transmitting weight vector.
Compared with the prior art, the technology of the invention has the following advantages:
only an initial set of transmit weight vectors is needed to iteratively generate an infinite set of new transmit weight vectors. The calculation amount is less, and a new transmitting weight vector can be obtained through simple matrix operation. Compared with polygonal construction methods and other methods, the operation time of the method is greatly reduced. With a larger number N of transmit antennas, a shorter run time can still be maintained.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a diagram of the present invention in a mirror operation;
fig. 3 is a constellation diagram of the data received by the receiver (Bob) and eavesdropper (Eve) on the basis of the invention using QPSK modulation;
fig. 4 is a constellation diagram of the data received by the receiver (Bob) and eavesdropper (Eve) on the basis of the present invention using 16QAM modulation;
fig. 5 shows the bit error rate at the receiver (Bob) end of the present invention compared to the polygonal construction method under different signal-to-noise ratios.
Fig. 6 shows the bit error rate at the eavesdropper (Eve) end of the present invention compared to the polygonal construction method under different signal-to-noise ratios.
FIG. 7 is a graph showing the comparison of the calculation time of the present invention with the polygon construction method at different N values.
Fig. 8 shows the bit error rate at the receiver (Bob) end of the present invention at different azimuth angles from the polygonal construction method and ASM in the single path case.
Detailed Description
Referring to fig. 1, the specific implementation steps of the present invention are as follows:
Considering a MIS0 downlink system equipped with N transmit antennas, the transmitted data can be expressed as:
y d (k)=h H w(k)x(k)+η(k)
wherein w (k) is a transmission weight vector, x (k) is a transmission symbol, eta (k) is Gaussian random noise, h is a channel vector, and the expression is as follows:
L d is the number of paths, alpha l For the gain of the first path, ψ l The departure angle (AoD) of the first path, a (ψ), is the array guide vector, expressed as follows:
lambda is the wavelength and d represents the distance between adjacent sensors.
Thus, solving the transmit weight problem may be translated into solving an equation:
wherein, the liquid crystal display device comprises a liquid crystal display device,the initial transmit weight vector is obtained as: />
wherein P is an N×N permutation matrix.
And 3, finding a holder matrix of each complex vector group.
for each complex vector set there is mathematically a householder matrix:
since the mirror axis is the sum of the vector sets, the vector sum after mirror remains unchanged, as will be explained in more detail in fig. 2.
And 4, constructing an integral mirror image matrix Y. Integrating the householder matrix of each complex vector group to obtain an overall mirror matrix as follows:
and 5, restoring the mirrored complex vector group according to the original sequence, and calculating to obtain a new transmitting weight vector.
Right multiplying the mirrored matrix by the permutation matrix to obtain a new complex vector group:
and 6, repeating the operation at each time, and iterating to obtain a new transmission weight vector by taking the transmission weight at the previous time as an initial weight vector.
Simulation conditions and simulation data processing
1. Simulation conditions
The simulation parameters are shown in table 1:
table 1 simulation parameter table
2. Simulation data processing
Setting 1 receiver (Bob) and 2 eavesdroppers (Eve), transmitting data by different transmission weight vectors constructed at different times, receiving information being shown by using constellation diagrams, simulation results being shown in fig. 3 and 4, table 2 being the first four time pointsWhere k=0 is the initial transmit weight based on the polygon construction method and k=1, 2,3 is the new transmit weight constructed using the present invention. Fig. 3 is a constellation diagram using QPSK modulation, and fig. 4 is a constellation diagram using 16QAM modulation.
TABLE 2 initial transmit weights and transmit weights for the first 3 moments
From the simulation result, the generated transmitting weights at different time points are completely random, so that the safety of data transmission is ensured. This is also shown in fig. 3 and 4, where red is the data received by the receiver (Bob) and green and blue is the data received by the eavesdropper (Eve), whose constellation is completely distorted and cannot decode the correct data.
The SNR is set from-5 dB to 20dB, probability statistics is applied to calculate and calculate the error rate of the receiver and the eavesdropper under different SNRs, and simulation results are shown in figures 5 and 6. Fig. 5 bit error rate at receiver (Bob) and fig. 6 bit error rate at eavesdropper (Eve).
From simulation results, the error rate of the receiver is higher under the condition of low signal-to-noise ratio, and the error rate is gradually reduced and maintained at a lower level along with the increase of the signal-to-noise ratio. This is theoretically normal. The eavesdropper maintains a very high error rate at both low and high signal-to-noise ratios, indicating that the eavesdropper cannot decode the data correctly at any signal-to-noise ratio.
And 3, simulating timeliness. The present invention and the polygon construction method are compared in calculation time.
The time point is set to 200, the number of transmitting antennas N is set to 100 to 2000, the step length is 50, and the running time of the two methods is calculated, as shown in fig. 7.
Compared with a polygonal construction method, the simulation result shows that the method has the advantages that the running time is greatly reduced, even when the N value is higher, the running time can still be kept lower, and the method is rapid and efficient.
And 4, simulation of single-path safety. The invention is compared with the polygonal construction method and ASM in a single path.
The invention is not only suitable for information security transmission under multipath, but also has good security and high efficiency under single path.
The Antenna Subset Modulation (ASM) technology adjusts the activation of the antennas during the transmission process to achieve the purpose of safe transmission. Setting a channel vector:
h=a(θ T )
θ is the off angle (AoD), a (θ) is the array steering vector, expressed as follows:
where λ is the wavelength and d represents the distance between adjacent sensors.
The signal-to-noise ratio (SNR) is set to 10dB, the receiver is fixed at 60 °, and an eavesdropper breaks the parsed data from other angles. Setting the azimuth angle as [0 degrees, 180 degrees ], calculating the error rate under different angles, and the simulation result is shown in figure 8.
As can be seen from simulation results, the invention has the security similar to ASM and multipath simulation effects under the single-path condition, can accurately receive receipts in the azimuth of the receiver, and can not accurately receive and decode information by an eavesdropper under the other azimuth with the error rate maintained at a high value.
In summary, under the condition that a set of initial transmission weights are known, the invention can quickly construct a new transmission weight vector, and can safely transmit information under the conditions of single path and multiple paths.
Claims (1)
1. A physical layer security transmission transmitting weight vector calculating method based on mirror image operation comprises the following steps:
step 1, providing a group of initial transmitting weight vectors through a polygon construction method;
in a MISO downlink system equipped with N transmit antennas, considering a typical phased array structure, the transmitted data is expressed as:
y d (k)=h H w(k)x(k)+η(k)
wherein w (k) is a transmission weight vector, x (k) is a transmission symbol, eta (k) is Gaussian random noise, h is a channel vector, and the expression is as follows:
L d is the number of paths, alpha l For the gain of the first path, ψ l The departure angle (AoD) of the first path, a (ψ), is the array guide vector, expressed as follows:
a(ψ)=[1,e j2πdsin(ψ)/λ ,…,e j2π(N-1)dsin(ψ)/λ ] T
λ is the wavelength, d represents the distance between adjacent sensors;
solving the transmit weight problem translates into solving the equation:
wherein θ n =∠h n ,The initial transmit weight vector is obtained as: />φ n For vector equation->Solution of (h) 0 I is the beam gain of the receiver, N is the number of antennas, h n Representing a channel vector hN-th element, n=1, …, N;
step 2, constructing complex vectorsWherein v is n Is->Two-dimensional coordinate representation of (i.e.) Representing the operation of taking the real part,/->Representing an imaginary part taking operation; setting a permutation matrix P, and randomly dividing complex vector groups into K groups, namely:
wherein P is an N×N permutation matrix;
step 3, finding a holder matrix of each complex vector group;
for each complex vector set there is mathematically a householder matrix:
Since the mirror axis is the sum of the vector sets, the vector sum after mirror image remains unchanged;
step 4, constructing an integral mirror matrix Y, integrating the householder matrix of each complex vector group, and obtaining the integral mirror matrix as follows:
step 5, restoring the mirrored complex vector group according to the original sequence, and calculating to obtain a new transmitting weight vector;
right multiplying the mirrored matrix by the permutation matrix to obtain a new complex vector group:
and 6, repeating the operation at each time, and iterating to obtain a new transmission weight vector by taking the transmission weight at the previous time as an initial weight vector.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210305016.8A CN114697103B (en) | 2022-03-25 | 2022-03-25 | Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210305016.8A CN114697103B (en) | 2022-03-25 | 2022-03-25 | Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114697103A CN114697103A (en) | 2022-07-01 |
CN114697103B true CN114697103B (en) | 2023-04-21 |
Family
ID=82139088
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210305016.8A Active CN114697103B (en) | 2022-03-25 | 2022-03-25 | Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114697103B (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103354463B (en) * | 2013-06-20 | 2016-03-02 | 西安电子科技大学 | The cooperative beam formation method of safety of physical layer is strengthened based on kernel |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN109379154A (en) * | 2018-10-11 | 2019-02-22 | 重庆邮电大学 | A kind of safe transmission scheme based on time reversal technology |
CN109714090B (en) * | 2019-01-25 | 2021-06-25 | 伍仁勇 | Multi-antenna two-dimensional vector transmission method and system |
CN111082933B (en) * | 2019-12-27 | 2021-06-11 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
CN111901794B (en) * | 2020-06-16 | 2021-11-19 | 西安交通大学 | Physical layer secure transmission method based on noise distribution |
-
2022
- 2022-03-25 CN CN202210305016.8A patent/CN114697103B/en active Active
Non-Patent Citations (2)
Title |
---|
穆鹏程 ; 殷勤业 ; 王文杰 ; .无线通信中使用随机天线阵列的物理层安全传输方法.西安交通大学学报.2010,(06),全文. * |
赵刘可 ; 王雪明 ; 罗文宇 ; 金梁 ; .一种基于天线阵列冗余的跳空物理层安全方法.信息工程大学学报.2013,(04),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN114697103A (en) | 2022-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Differential modulation based on quasi-orthogonal codes | |
US7430244B2 (en) | Constellation-rotating orthogonal space-time block coding technique | |
CN109714087B (en) | Artificial noise generation method based on maximized eavesdropper bit error rate | |
CN104486287B (en) | A kind of digital modulation constellation production method suitable for spatial modulation Transmission system | |
CN105846880B (en) | Transmission method based on constellation segmentation with the spatial modulation Transmission system of double antenna activation | |
CN106850021A (en) | Radio communication safety of physical layer implementation method and device based on polarization precoding | |
CN111065096B (en) | Physical layer encryption transmission system and method for wireless communication | |
CN108366026B (en) | Physical layer safety transmission method of artificial noise based on constellation rotation | |
CN113472411B (en) | Random frequency array auxiliary direction modulation transmission method based on deep learning | |
CN112688725B (en) | MIMO physical layer safe transmission method based on constellation diagram | |
US20230171023A1 (en) | Estimation method of discrete digital signals in noisy overloaded wireless communication systems with csi errors | |
Xiao et al. | Graph theory assisted bit-to-index-combination gray coding for generalized index modulation | |
CN110365414B (en) | Enhanced optical space modulation method suitable for lognormal turbulence channel | |
CN110798282B (en) | Artificial noise implementation method of software radio MISO system | |
CN113972937A (en) | Modulation method of differential space-time medium modulation system | |
US20020163892A1 (en) | Cayley-encodation of unitary matrices for differential communication | |
CN114697103B (en) | Physical layer secure transmission transmitting weight vector calculating method based on mirror image operation | |
Luo et al. | Enhancing signal space diversity for SCMA over Rayleigh fading channels | |
Zhu et al. | Deep learning-based precoder design in MIMO systems with finite-alphabet inputs | |
CN109714090B (en) | Multi-antenna two-dimensional vector transmission method and system | |
CN109462429B (en) | Beam domain modulation device and method of large-scale multiple-input multiple-output millimeter wave system | |
Tato et al. | Neural network aided computation of generalized spatial modulation capacity | |
Onal et al. | Reconfigurable intelligent surface empowered differential chaos shift keying assisted media-based modulation over Nakagami-m fading channels | |
Zheng et al. | Multi-Dimensional Space–Time Shift Keying for Wireless Communications | |
Zhu et al. | Joint transceiver optimization for wireless communication PHY with convolutional neural network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |