CN114698123B - Resource allocation optimization method of wireless power supply covert communication system - Google Patents

Resource allocation optimization method of wireless power supply covert communication system Download PDF

Info

Publication number
CN114698123B
CN114698123B CN202210410331.7A CN202210410331A CN114698123B CN 114698123 B CN114698123 B CN 114698123B CN 202210410331 A CN202210410331 A CN 202210410331A CN 114698123 B CN114698123 B CN 114698123B
Authority
CN
China
Prior art keywords
unmanned aerial
aerial vehicle
legal
listener
representing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210410331.7A
Other languages
Chinese (zh)
Other versions
CN114698123A (en
Inventor
于秦
张博
胡杰
杨鲲
刘双美
麻泽龙
卢鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HYDRAULIC SCIENCE RESEARCH INSTITUTE OF SICHUAN PROVINCE
University of Electronic Science and Technology of China
Yangtze River Delta Research Institute of UESTC Huzhou
Original Assignee
HYDRAULIC SCIENCE RESEARCH INSTITUTE OF SICHUAN PROVINCE
University of Electronic Science and Technology of China
Yangtze River Delta Research Institute of UESTC Huzhou
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HYDRAULIC SCIENCE RESEARCH INSTITUTE OF SICHUAN PROVINCE, University of Electronic Science and Technology of China, Yangtze River Delta Research Institute of UESTC Huzhou filed Critical HYDRAULIC SCIENCE RESEARCH INSTITUTE OF SICHUAN PROVINCE
Priority to CN202210410331.7A priority Critical patent/CN114698123B/en
Publication of CN114698123A publication Critical patent/CN114698123A/en
Application granted granted Critical
Publication of CN114698123B publication Critical patent/CN114698123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/822Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by detecting the presence of a surveillance, interception or detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/40Engine management systems

Abstract

The invention discloses a resource allocation optimization method of a wireless power supply covert communication system supported by an unmanned aerial vehicle, which comprises four parts of system model construction, listener binary assumption, covert condition derivation and resource allocation problem proposing and solving. The invention takes the interference signal emitted by the unmanned aerial vehicle as the energy signal of the legal receiving equipment, realizes the multiplexing of the signal, greatly improves the function of the signal, simultaneously solves the safety problem under the line-of-sight transmission of the unmanned aerial vehicle, realizes the concealment of the information transmission of the legal receiving equipment and ensures that the listener is difficult to find the communication between the legal receiving equipment and the unmanned aerial vehicle.

Description

Resource allocation optimization method of wireless power supply covert communication system
Technical Field
The invention relates to a mobile communication method, in particular to a resource allocation optimization method of a wireless power supply covert communication system supported by an unmanned aerial vehicle.
Background
As communication scenes become more and more complex, conventional fixed base stations are no longer suitable for various communication systems with complex scenes, and Unmanned Aerial Vehicles (UAVs) have the advantages of small size, low consumption, convenience and strong battlefield survivability, and become a hot trend of recent research topics. The communication network system with the cooperation of the unmanned aerial vehicle also provides a good solution for communication scenes which cannot be covered by the base station. On the other hand, when the unmanned aerial vehicle is used as a mobile base station, the distance between the unmanned aerial vehicle and a legal receiving Device (LD) can be well controlled, so that a Line of Sight (LoS) transmission channel is formed, which can well transmit data, but is easily intercepted by an illegal Device, and therefore, the safety problem of unmanned aerial vehicle communication is more and more important.
In the traditional secure communication, it is usually considered that an eavesdropper cannot accurately analyze correct contents after stealing signals; such security measures are obviously not well suited in some scenarios, such as: military scenes; any leakage of information should be avoided in this scenario; therefore, the concept of Covert Communication (CC) comes along, which aims to hide all transmitted information and make an eavesdropper unable to find the transmission of the information, so that the information is naturally prevented from being stolen, and information security is realized. In recent years, much attention has been paid to research related to covert communication.
The Energy Harvesting (EH) technology has a great development prospect because it can provide stable Energy for Energy-limited networks such as wireless sensor networks and the like and prolong the life cycle of the networks. Meanwhile, the energy source of the energy collection technology not only includes most natural energy sources of the surrounding environment, such as solar energy, light energy, wind energy, heat energy, chemical energy and the like, but also can convert the received surrounding wireless signals into electric energy, such as artificially acquired Radio Frequency (RF) signals. Energy harvesting based on RF signals is a research focus because it can be protected from the weather environment and provide stable energy. With the rapid development of wireless technology and the rapid increase of the number of mobile devices, user devices such as mobile phones and wearable small devices generate huge data volume, and how to improve portability for the functions of the devices becomes a challenging problem. Wireless Power Transfer (WPT) technology can collect external RF signals and convert them into Direct Current (DC) circuits through circuit design for Wireless Information Transfer (WIT), thereby dealing with some energy bottleneck problems of energy-limited and unstable networks.
In sum, the current research of combining the UAV with WPT and WIT does not consider the communication security problem, which often causes a great security hole; the WPT network scenario is not considered in the related research on covert communication, and because the UAV transmitting power is large and covert communication is difficult to achieve, the research is extremely important and presents many challenges. On the other hand, in the WPT network, the RF signal does not always carry information, and only has interference effect on LDs, the present invention gives a new effect to the RF signal: as an interfering signal for an eavesdropper; therefore, the multiplexing of the signals is realized, and a new solution is provided for the system. Various approximation methods are also provided in the problem solving, and the problem that the non-convex problem is difficult to solve is solved.
Disclosure of Invention
The invention provides a resource allocation optimization method of a wireless power supply covert communication system, which solves the communication safety problem in the combination of the existing UAV wireless communication system and the WPT technology, and adopts the following technical scheme:
a resource allocation optimization method of a wireless power supply covert communication system comprises the following steps:
s1: establishing a system model of an unmanned aerial vehicle, legal equipment and a listener, wherein the unmanned aerial vehicle and the legal equipment have a scheduling strategy;
s2, solving signal models of legal equipment and the unmanned aerial vehicle according to the system model, and designing and determining an energy model of the legal equipment;
s3, analyzing the binary hypothesis of the listeners, and obtaining the total error interception probability of the listeners on the premise of determining the positions of the listeners;
s4, introducing the position uncertainty of the listener in the actual scene to obtain the total error interception probability combined with the position uncertainty;
s5, defining an optimization target as uplink throughput of all legal equipment within one-time unmanned aerial vehicle task time, and obtaining an optimization problem under the conditions of satisfying covert communication, unmanned aerial vehicle self-limitation, legal equipment energy limitation and scheduling;
s6, decomposing the optimization problem into a plurality of sub-problems, and converting each sub-problem into a convex sub-problem by using continuous convex approximation;
and S7, designing an algorithm to alternately optimize the plurality of sub-problems so as to obtain the optimal solution of the optimization problem.
Further, in step S1, establishing a system model includes the following steps:
s11: the set system model comprises an unmanned aerial vehicle, a plurality of legal devices and a plurality of listeners; determining the number and the positions of legal equipment and listeners;
wherein the legal device is located at
Figure GDA0004082538800000031
Where b represents a legal device, k represents the kth legal device, x b,k And y b,k Respectively representing the information of the horizontal and vertical coordinate positions of the kth legal device on the ground;
listener HWs position is indicated as
Figure GDA0004082538800000032
Where w represents a listener, m represents an mth listener, x w,m And y w,m Respectively representing the horizontal and vertical coordinate position information of the mth listener on the ground;
the flying height of the unmanned plane is H, one task time is T, and the maximum flying speed is V max Unmanned plane in a time slot delta t Has a maximum flight distance of L = V max δ t The trajectory of the drone is represented as
Figure GDA0004082538800000033
Where a denotes a drone, n denotes the nth slot, q a Representing the trajectory of an unmanned aerial vehicle UAV;
s12: in the nth time slot, using alpha for the k legal device k [n]The scheduling policy parameter is expressed, the scheduling policy is proposed for legal devices, the scheduling policy indicates that only one legal device is allowed to communicate with the unmanned aerial vehicle in one time slot, and for the kth legal device, a k [n]=1 means the device will communicate with drone in nth slot, a k [n]=0 indicates that the device will not communicate with drone and there is one slot per slot
Figure GDA0004082538800000041
S13: setting the maximum transmitting power and the average transmitting power of the unmanned aerial vehicle;
Figure GDA0004082538800000042
wherein P is a [n]Indicating unmanned aerial vehicle transmit powerP is the average transmitted power of the unmanned plane, P max The maximum transmitting power of the unmanned aerial vehicle.
Further, step S2 includes the following steps:
s21, obtaining a receiving signal r of the kth legal device in the nth time slot by the distance between the unmanned aerial vehicle autonomous control and the legal device and combining a scheduling strategy of the legal device b,k [n]Comprises the following steps:
Figure GDA0004082538800000043
wherein P is a [n]Representing the transmitted power of the drone, z b,k [n]Noise representing the kth legal device LDs; s a [n]A transmission signal representative of the drone; and omega ab,k [n]Representing the channel gain from the drone to the kth legitimate device, further expressed as:
Figure GDA0004082538800000044
in the formula, Ω 0 Representing a channel gain parameter with a reference distance of 1m, q b,k Denotes the location of the kth legal device, q a[n] The trajectory of the unmanned aerial vehicle in the nth time slot is represented, and H represents the flight height of the unmanned aerial vehicle;
s22, obtaining the receiving energy of each legal device of each time slot;
wherein, the received energy P of the kth legal device in each time slot h,k [n]Comprises the following steps:
P h,k [n]=ηP a [n]Ω ab,k [n]
wherein P is a [n]Representing the transmitting power of the unmanned aerial vehicle, eta is the energy harvesting coefficient, omega ab,k [n]Representing the channel gain of the drone to the kth legitimate device;
s23, obtaining a receiving signal of each time slot unmanned aerial vehicle;
wherein, the received signal r of the unmanned aerial vehicle is derived by a legal equipment scheduling strategy a [n]Comprises the following steps:
Figure GDA0004082538800000051
P b,k [n]representing the transmission power of the kth legal device LDs; z is a radical of a [n]Representing the received noise of the unmanned aerial vehicle UAV; s b,k [n]Representing the modulated signal, Ω, emitted by the kth legal device LDs ab,k [n]Representing the channel gain, a, of the unmanned aerial vehicle UAV to the kth legal device LDs k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure GDA0004082538800000055
S24, obtaining the total uplink throughput rate of all legal devices;
in the nth time slot, the total uplink throughput rate R received by the unmanned aerial vehicle end b,k [n]Comprises the following steps:
Figure GDA0004082538800000052
wherein
Figure GDA0004082538800000056
i denotes the temporary variable of the sum count, σ a Parametric information representing the unmanned aerial vehicle UAV received noise;
s25, designing and determining an energy model of legal equipment;
for all legitimate devices, it is necessary to follow the causality of energy, i.e. the energy consumed by this slot cannot be greater than the sum of the energy harvested by this slot and the remaining energy of the previous slot, the expression is written as:
Figure GDA0004082538800000053
wherein Q b,k [n]Denotes the kth sumTotal energy, Q, of the LD in n time slots 0 Represents the initial energy; i is a temporary variable for the sum count; eta is an energy harvesting coefficient; a is k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure GDA0004082538800000054
Further, step S3 specifically includes the following steps:
s31, obtaining a binary hypothesis model of each listener in each time slot;
setting the listeners HWs to use the joint listening strategy to obtain the binary hypothesis expression of the mth listener in the nth time slot:
Figure GDA0004082538800000061
Figure GDA0004082538800000062
wherein
Figure GDA0004082538800000063
Representing the reception noise of the mth listener; h 0,k Representing the original hypothesis: the intercepted kth legal device is considered to have no transmission information; h 1,k Represent alternative assumptions: the intercepted legitimate device is considered to have transmitted information; j represents a temporary variable of the sum count; r is w,m Representing the received signal of the mth listener; s b,j [n]N (0,1) represents the modulation signal transmitted by the jth legal device LD; a is j [n]Indicating a state in which the jth legal device LD will communicate with the unmanned aerial vehicle UAV at the nth time slot; p b,j [n]Representing the transmission power of the jth legal device; omega aw,m [n]Represents the channel gain of the unmanned aerial vehicle UAV to the mth listener HWs; omega wb,j [n]Representing the channel gain from the mth listener to the jth legitimate device;
the judgment criteria of the listeners are as follows:
Figure GDA0004082538800000064
wherein P is w,m,k [n]Representing the average value of the power of the ambient signal obtained after the listener HWs measures for l times;
Figure GDA0004082538800000068
representing the power value of the ambient signal obtained after the listener HWs measures 1 time; p is th,m,k [n]Representing a decision threshold value; d 0 And D 1 Is expressed as corresponding to H 0,k And H 1,k The decision result of (1);
s32, obtaining the missed detection probability and the false detection probability of each listener in each time slot;
wherein the probability ξ of false detection of the mth listener HWs F,m,k [n]And probability xi of missed detection M,m,k [n]Expressed as:
Figure GDA0004082538800000065
Figure GDA0004082538800000066
pr represents the mathematically solved probability;
Figure GDA0004082538800000067
parameter, P, corresponding to received noise representing m-th listener a [n]Denotes the unmanned aerial vehicle transmit power, Ω 0 Denotes a channel gain parameter with a reference distance of 1m, q b,k Indicating the location of the kth legal device, q a[n] Just indicate the trajectory of the drone at the nth time slot, H indicates the altitude of the drone, q w,m Indicating the listener position;
s33, obtaining the total error interception probability of each listener in each time slot;
at angle HWs, listeners know only the transmit power P a [n]Is from 0 to P max Set the range value of (A) to the listener P a [n]Subject to a uniform distribution, its probability density function PDF is written as:
Figure GDA0004082538800000071
the false detection probability is derived as:
Figure GDA0004082538800000072
Figure GDA0004082538800000073
similarly, the probability of missed detection is deduced as:
Figure GDA0004082538800000074
wherein
Figure GDA0004082538800000075
In conclusion, the total interception error probability xi can be further obtained m,k [n]Comprises the following steps:
Figure GDA0004082538800000076
in the scenario of the invention P 3 ≤P 2 Always true, total false intercept probability ξ m,k [n]In [ P ] 1 ,P 3 ]Interval about P th,m,k Is monotonically decreasing; in the interval [ P 2 ,P 4 ]Total false interception probability ξ m,k [n]Is related to a monotonic increase so that the minimum error probability is in the interval [ P ] 3 ,P 2 ]Obtaining; so minimum false intercept probability
Figure GDA0004082538800000077
Comprises the following steps:
Figure GDA0004082538800000081
Figure GDA0004082538800000082
is also an exact position (x) relative to listener HWs w,m ,y w,m ) A function of the correlation.
Further, in step S4,
minimum average error probability after adding listener HWs position uncertainty
Figure GDA0004082538800000083
Write as:
Figure GDA0004082538800000084
/>
x w,m and y w,m Respectively representing the horizontal and vertical coordinate position information of the mth listener on the ground, and the above formula is approximate:
Figure GDA0004082538800000085
wherein
Figure GDA0004082538800000086
Figure GDA0004082538800000087
x b,k And y b,k Respectively representing the horizontal and vertical coordinate position information of the kth legal device on the ground, wherein X and Y represent uncertain variables;
obtaining the optimal minimum average false interception probability of the added position uncertainty
Figure GDA0004082538800000088
Comprises the following steps:
Figure GDA0004082538800000089
order to
Figure GDA00040825388000000810
Then the constraint of covert communication is obtained, where p w Given covert communication restriction parameters.
Further, step S5 specifically includes the following steps:
defining an optimization target as uplink throughput of all legal equipment within the task time of the unmanned aerial vehicle, obtaining an optimization problem under the conditions of meeting communication of hidden conditions, self limitation of the unmanned aerial vehicle, energy limitation and scheduling of the legal equipment, and enabling the unmanned aerial vehicle to work
Figure GDA0004082538800000091
The optimization problem is derived as:
Figure GDA0004082538800000092
wherein the optimization problem P1 aims at maximizing the total throughput of the uplink; a is a scheduling strategy constraint, b is a covert communication constraint, c is an unmanned aerial vehicle flight speed constraint, d is an unmanned aerial vehicle maximum transmitting power constraint, e is an unmanned aerial vehicle average transmitting power constraint, and f is a legal equipment energy causality constraint.
Further, step S6 decomposes the optimization problem P1 into three sub-problems P2, P3, and P4 for alternative solution, and specifically includes the following steps:
s61, fixing the transmitting power of the unmanned aerial vehicle, the transmitting power of all legal equipment and scheduling parameters to obtain an unmanned aerial vehicle track optimization subproblem P2;
s62, converting the unmanned aerial vehicle track subproblem P2 into a convex problem P2.1 by using continuous convex approximation;
s63, fixing the track of the unmanned aerial vehicle and scheduling parameters of legal equipment to obtain a power optimization subproblem P3;
s64, fixing the track of the unmanned aerial vehicle, the transmission power of the unmanned aerial vehicle and the transmission power of legal equipment to obtain a legal equipment scheduling optimization sub-problem P4;
s65, relaxing the constraint conditions of the scheduling strategy, converting the legal device scheduling optimization sub-problem P4 into a convex problem P4.1, and obtaining the optimal solution of the sub-problem P4 through a shaping algorithm.
Further, in step S65, the shaping method includes: order to
Figure GDA0004082538800000093
In order to optimize the optimal solution of the problem, the uplink throughput of all legal devices is obtained according to the suboptimal solution>
Figure GDA0004082538800000094
Then on upstream throughput>
Figure GDA0004082538800000101
A non-zero subset K, having>
Figure GDA0004082538800000102
Will now be>
Figure GDA0004082538800000103
At the same time, when the upstream throughput is too low, the corresponding schedule should also be set to zero, since the communication is no longer meaningful at this time, i.e. </or>
Figure GDA0004082538800000104
In conclusion, an optimal solution is found for the scheduling policy sub-problem (P4)>
Figure GDA0004082538800000105
Further, in step S7, the optimal unmanned aerial vehicle is obtained after the algorithm is implementedTrack of
Figure GDA0004082538800000106
Transmitting power->
Figure GDA0004082538800000107
Legal device scheduling policy>
Figure GDA0004082538800000108
Legal device transmitting power->
Figure GDA0004082538800000109
And an optimal uplink total throughput->
Figure GDA00040825388000001010
The process of the algorithm is as follows:
s11: firstly, solving a subproblem P3 to obtain the unmanned aerial vehicle transmitting power and the legal equipment transmitting power after one algorithm iteration;
s12: then bringing the newly obtained unmanned plane transmitting power and legal equipment transmitting power into a subproblem P2.1 to update the flight trajectory of the unmanned plane;
s13: finally, solving a sub-problem P4.1 of latest unmanned aerial vehicle transmitting power, legal equipment transmitting power and unmanned aerial vehicle flight path to obtain a latest legal equipment scheduling strategy;
s14: if the solving result is not converged or the precision is not in accordance with the requirement, the step S11 is carried out; otherwise, obtaining a final result;
the optimal unmanned aerial vehicle track can be obtained after the algorithm is implemented
Figure GDA00040825388000001011
Transmitting power>
Figure GDA00040825388000001012
Legal device scheduling policy
Figure GDA00040825388000001013
Legal equipmentShoot power>
Figure GDA00040825388000001014
And an optimal uplink total throughput->
Figure GDA00040825388000001015
The resource allocation optimization method of the wireless power supply covert communication system is characterized in that a novel method is designed for the energy supply of legal equipment by introducing covert communication: the transmit signal of the UAV is multiplexed for interfering listener interception and for powering legitimate devices.
Drawings
FIG. 1 is a flow chart of a resource allocation optimization method of the wireless power supply covert communication system;
FIG. 2 is a system model diagram of a resource allocation optimization method of the wireless power supply covert communication system;
fig. 3 is an algorithm flow chart of the resource allocation optimization method of the wireless power supply covert communication system.
Detailed Description
The invention provides a resource allocation optimization method of a wireless power supply covert communication system supported by an unmanned aerial vehicle, which comprises four parts of system model construction, listener binary assumption, covert condition derivation, resource allocation problem proposition and solution, and specifically comprises the following steps:
s1, constructing a system model, and determining the number of unmanned aerial vehicles, legal equipment and listeners and the contact state among the unmanned aerial vehicles, the legal equipment and the listeners.
The method specifically comprises the following steps:
s11, the system is assumed to have an Unmanned Aerial Vehicle (UAV), K Legal Devices (LDs) and M listeners (HWs). Wherein, the unmanned aerial vehicle UAV and the legal equipment LDs are both provided with two antennas to realize full duplex work, and self-interference can be completely eliminated; the listener is equipped with only one antenna.
Unmanned aerial vehicle UAV has three functions: (1) providing downlink energy service for legal devices LDs; (2) Collecting uplink transmission information of all legal devices LDs; (3) Interference listener HW s Is detectedAnd (6) listening.
In three-dimensional coordinates, the locations of the legal devices LDs are
Figure GDA0004082538800000111
Where b represents legal devices LDs, k represents kth legal device LDs, x b,k And y b,k Respectively representing the information of the horizontal and vertical coordinate position of the kth legal device on the ground.
Similarly, listener HWs position may be represented as
Figure GDA0004082538800000112
Where w represents listener HWs and m represents mth listener HWs, x w,m And y w,m Respectively represent the horizontal and vertical coordinate position information of the mth listener on the ground. Since the location of listener HWs is often not accurately known in a practical scenario, the location of listener HWs can be further expressed as:
Figure GDA0004082538800000113
wherein
Figure GDA0004082538800000114
Representing the positional uncertainty of listener HWs, all obeys
Figure GDA0004082538800000115
And->
Figure GDA0004082538800000116
Indicating the estimated listener HWs position, ε w Representing the corresponding parameter of position uncertainty.
The flying height of the unmanned aerial vehicle UAV is H, one mission time (flight period) is T, and the maximum speed of flight is V max . Meanwhile, the flight cycle is divided into N time slots, so that the length of each time slot has
Figure GDA0004082538800000121
When delta t Is enoughIn hours, the position of the unmanned aerial vehicle UAV may be considered to be nearly constant within this time slot. Maximum flight distance of Unmanned Aerial Vehicle (UAV) in one time slot is L = V max δ t . Thus, the trajectory of the unmanned aerial vehicle UAV may be expressed as ÷>
Figure GDA0004082538800000122
Where a denotes an unmanned aerial vehicle UAV. n denotes an nth time slot, q a Representing the trajectory of the unmanned aerial vehicle UAV.
In summary, q is position information, and position information of which device is identified from the lower right corner. Thus, a denotes an unmanned aerial vehicle UAV, then q a Just show the trajectory of the unmanned aerial vehicle UAV, and q above b,k And q is w,m And the corresponding steps are carried out.
S12, in the nth time slot, using alpha for the kth legal equipment LDs k [n]Indicating a scheduling policy parameter and n indicates an nth slot of the divided slots. a denotes an unmanned aerial vehicle UAV; the scheduling strategy is proposed for legal devices LDs, and aims to avoid channel congestion, specifically, only one legal device LDs is allowed to communicate with the unmanned aerial vehicle UAV in one time slot; therefore, for the kth legal device LDs, a k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 means that the device will not communicate with the drone UAV and there is a slot per time slot
Figure GDA0004082538800000123
S13, according to the model of S11, the flight track of the unmanned aerial vehicle UAV is as follows: | q a [n]-q a [n-1]|| 2 ≤L 2 (ii) a L represents the maximum flight distance of the unmanned aerial vehicle UAV in one time slot.
The transmit power to the unmanned aerial vehicle UAV is:
Figure GDA0004082538800000124
wherein P is a [n]Representing the unmanned aerial vehicle UAV transmit power, P being the unmanned aerial vehicle UAV average transmit power, P max For unmanned aerial vehicle UAV maximumThe transmit power.
And S2, solving a signal model of legal equipment and the signal model of the unmanned aerial vehicle according to the system model, and designing and determining an energy model of the legal equipment.
The method specifically comprises the following steps:
s21, in the unmanned aerial vehicle communication system, as the unmanned aerial vehicle UAV can autonomously control the distance between the UAV and the legal device LDs, the UAV can be regarded as line-of-sight transmission, and the received signal r of the kth legal device LDs in the nth time slot can be obtained by combining the scheduling strategy of the legal device LDs b,k [n]Comprises the following steps:
Figure GDA0004082538800000131
wherein P is a [n]Representing the unmanned aerial vehicle UAV transmit power,
Figure GDA0004082538800000132
noise representing the kth legal device LDs; s a [n]A transmission signal representative of an Unmanned Aerial Vehicle (UAV); and omega ab,k [n]The channel gain representing the unmanned aerial vehicle UAV to the kth legal device LDs may be expressed as:
Figure GDA0004082538800000133
in the formula, omega 0 Denotes a channel gain parameter with a reference distance of 1m, q b,k Denotes the location of the kth legal device, q a[n] The trajectory of the unmanned aerial vehicle UAV at the nth time slot is represented, and H represents the flight altitude of the unmanned aerial vehicle UAV.
S22, further knowing the received energy P of the kth legal device LDs of each time slot h,k [n]Comprises the following steps:
P h,k [n]=ηP a [n]Ω ab,k [n]
wherein P is a [n]Representing the UAV launch power, η is the energy harvesting coefficient, Ω ab,k [n]Representing the channel gain of the unmanned aerial vehicle UAV to the kth legal device LDs.
S23, deducing a received signal r of the UAV (unmanned aerial vehicle) through a legal device LDs (laser direct structuring) scheduling strategy a [n]Comprises the following steps:
Figure GDA0004082538800000134
wherein P is b,k [n]The transmission power representing the kth legal device LDs; z is a radical of formula a [n]Representing the received noise of the unmanned aerial vehicle UAV; s b,k [n]Representing the modulated signal, Ω, emitted by the kth legal device LDs ab,k [n]Representing the channel gain, a, of the unmanned aerial vehicle UAV to the kth legal device LDs k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure GDA0004082538800000135
S24, further in the nth time slot, the total uplink throughput rate R received by the UAV end b,k [n]Comprises the following steps:
Figure GDA0004082538800000141
wherein
Figure GDA0004082538800000147
i denotes a temporary variable of the sum count. Sigma a Parametric information representing the unmanned aerial vehicle UAV received noise.
S25, for all legitimate devices LDs, it must follow the energy causality, i.e. the energy consumed by this slot cannot be larger than the sum of the energy harvested by this slot and the remaining energy of the previous slot. The expression can be written as:
Figure GDA0004082538800000142
wherein Q b,k [n]Indicating that the k-th legal device LD is in n time slotsTotal energy of time, Q 0 Representing the initial energy. i is a temporary variable of the sum count, which has no practical meaning, and the following i, j are all the roles. The flight cycle is divided into N time slots, so that each time slot has a length
Figure GDA0004082538800000143
When delta t Sufficiently small, the position of the unmanned aerial vehicle UAV may be considered to be nearly constant within this time slot. a is a k [n]=1 means the device will communicate with unmanned aerial vehicle UAV at nth slot, a k [n]= 0 Means that the device is not communicating with the unmanned aerial vehicle UAV and has ^ er at each time slot>
Figure GDA0004082538800000144
S3, analyzing the binary hypothesis of the listener HWs, and obtaining the total error listening probability of the listener HWs on the premise of determining the position of the listener HWs.
The method specifically comprises the following steps:
s31, in order to enable the listener HWs not to accurately judge whether the legal device LDs are communicating, the listener HWs needs to stand to analyze binary hypothesis, and the minimum total listening error probability is obtained. Assume that listener HWs uses a joint listening strategy. Therefore, a binary hypothetical representation of the mth listener in the nth slot can be obtained:
Figure GDA0004082538800000145
Figure GDA0004082538800000146
wherein
Figure GDA0004082538800000151
Representing the reception noise of the mth listener. H 0,k Representing the original hypothesis: it is assumed that the intercepted kth legal device does not transmit information, H 0,k It is the original assumption as explained above, howeverFollowed by a colon, indicating that the expression of the latter is H as a whole 0,k . In the same way, H 1,x Represent alternative assumptions: the intercepted legitimate device is considered to have transmitted information. j represents a temporary variable of the sum count to avoid collision with k. r is w,m Representing the received signal of the mth listener.
Hereinbefore, s b,k [n]N (0,1) represents the modulated signal emitted by the kth legal device LDs, corresponding to s b,j [n]N (0,1) represents the modulation signal emitted by the jth legal device LDs, and only the expression mode is changed, so that
Figure GDA0004082538800000152
Represents the sum of signals of all legitimate devices LDs except j ≠ k, and ≠ k>
Figure GDA0004082538800000153
Representing the sum of the signals of all legitimate devices LDs containing k.
Hereinbefore, a k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure GDA0004082538800000154
Corresponding to a j [n]It still represents the state that the jth legal device LDs will communicate with the unmanned aerial vehicle UAV at the nth time slot.
In the above, P b,k [n]Representing the transmission power of the kth legal device LDs, correspondingly, P b,j [n]Still representing the transmit power of the jth legitimate device.
Above, Ω ab,k [n]Indicating unmanned aerial vehicle UAV to kth legal device LD s Channel gain of, correspondingly, omega aw,m [n]Representing the channel gain of the unmanned aerial vehicle UAV to the mth listener HWs.
Ω wb,j [n]Representing the channel gain of the (mth) listener to the jth legitimate device.
The judgment criteria of the listeners are:
Figure GDA0004082538800000155
wherein P is w,m,k [n]Representing the average value of the power of the ambient signal obtained after the listener HWs measures for l times;
Figure GDA0004082538800000156
representing the power value of the ambient signal obtained after the listener HWs measures 1 time; p is th,m,k [n]Representing a decision threshold value; d 0 And D 1 Is expressed as corresponding to H 0,k And H 1,k The decision result of (1).
S32, further m listener HWs error detection probability xi F,m,k [n]And probability xi of missed detection M,m,k [n]Can be expressed as:
Figure GDA0004082538800000161
Figure GDA0004082538800000162
pr represents mathematically solving the probability.
Figure GDA0004082538800000163
Parameter, P, corresponding to received noise representing m-th listener a [n]Represents the unmanned aerial vehicle UAV transmitted power, omega 0 Denotes a channel gain parameter with a reference distance of 1m, q b,k Denotes the location of the kth legal device, q a[n] Just denote the trajectory of the unmanned aerial vehicle UAV at the nth time slot, H denotes the flight altitude of the unmanned aerial vehicle UAV, q w,m Indicating the location of listener HWs.
S33, in actual scene, all listeners HW s The transmitted power P of the UAV cannot be accurately known a [n]Therefore, a blind condition derivation can be made for listener HWs, and listener HWs only knows the transmit power P a [n]Is from 0 to P max (maximum transmit power) range values, so it can be reasonably assumed that the listener P is a listener a [n]Subject to a uniform distribution, its Probability Density Function (PDF) can be written as:
Figure GDA0004082538800000164
the false detection probability can be derived as:
Figure GDA0004082538800000165
wherein, the complex expression is replaced by a plurality of variables with equivalent, the expression of the variables is the expression meaning on the right side of the equation,
Figure GDA0004082538800000166
similarly, the probability of missed detection can be derived as:
Figure GDA0004082538800000167
wherein
Figure GDA0004082538800000171
In conclusion, the total interception error probability ξ can be further obtained m,k [n]Comprises the following steps:
Figure GDA0004082538800000172
in the scenario of the invention P 3 ≤P 2 This is always true. Easy to find, total false interception probability xi m,k [n]In [ P ] 1 ,P 3 ]Interval about P th,m,k Is monotonically decreasing; in the interval [ P 2 ,P 4 ]Total false interception probability ξ m,k [n]Is related to a monotonic increase, so the minimum error probability isInterval [ P ] 3 ,P 2 ]Obtaining; so minimum false interception probability
Figure GDA0004082538800000173
Comprises the following steps:
Figure GDA0004082538800000174
note that this is
Figure GDA0004082538800000175
Is also an exact position (x) relative to listener HWs w,m ,y w,m ) A function of the correlation.
And S4, introducing the position uncertainty of the listener HWs in the actual scene, and further obtaining the total error interception probability combined with the position uncertainty. Indeed, the unmanned aerial vehicle UAV cannot know the listener HW s At a precise location, therefore
Figure GDA00040825388000001711
Is also an exact position (x) relative to listener HWs w,m ,y w,m ) A function of the correlation. And is known from a preceding step->
Figure GDA0004082538800000178
So the minimum average probability of error is greater or less than the listener HWs position uncertainty added>
Figure GDA0004082538800000179
Can be written as:
Figure GDA0004082538800000176
the direct solving complexity is quite high, and the accurate minimum error interception probability cannot be obtained, so the optimal minimum average error interception probability is approximately obtained by considering
Figure GDA00040825388000001710
The above equation can be approximated as:
Figure GDA0004082538800000177
/>
wherein
Figure GDA0004082538800000181
Figure GDA0004082538800000182
X and Y represent the abscissa uncertainty variable and the ordinate uncertainty variable of the listener, respectively.
Further, the optimal minimum average error interception probability added with the position uncertainty is finally obtained
Figure GDA0004082538800000183
Comprises the following steps:
Figure GDA0004082538800000184
order to
Figure GDA0004082538800000185
The constraint of covert communication can be obtained, where p w Given covert communication restriction parameters.
S5, proposing and solving the problem of resource allocation: defining an optimization target as uplink throughput of all legal equipment within one-time unmanned aerial vehicle task time, obtaining an optimization problem under the conditions of satisfying communication under hidden conditions, unmanned aerial vehicle self-limitation, legal equipment energy limitation and scheduling, and enabling the optimization problem to be carried out
Figure GDA0004082538800000186
The optimization problem can be derived as:
Figure GDA0004082538800000187
wherein the optimization problem (P1) aims at maximizing the uplink total throughput; the method comprises the following steps of (a) restricting a scheduling strategy, (b) restricting covert communication, (c) restricting the flight speed of the unmanned aerial vehicle, (d) restricting the maximum transmitting power of the unmanned aerial vehicle, (e) restricting the average transmitting power of the unmanned aerial vehicle, and (f) restricting the causality of energy of legal equipment.
S6, the optimization problem is disassembled into three sub-problems, and each sub-problem is converted into a convex sub-problem through continuous convex approximation.
The method specifically comprises the following steps:
s61, because (P1) is not convex, the optimization tool cannot be directly used for solving, and therefore the alternative optimization mode is considered to convert (P1) into a plurality of different convex sub-problems for solving. Fix { P ] first a ,P b And a } is constant, then (P1) can be converted to:
Figure GDA0004082538800000191
however, the objective function and covert communication constraints of the subproblem (P2) remain non-convex; but is easy to know
Figure GDA0004082538800000192
Is about | q a [n]-q b,k | 2 So that it makes->
Figure GDA0004082538800000193
Representing the result of the iteration after j of the optimization subproblem (P2), the objective function can be expressed as | q a [n]-q b,k | 2 Is integrated in
Figure GDA0004082538800000194
The dots become convex with a first order taylor expansion. Then the objective function becomes:
Figure GDA0004082538800000195
to convert constraints to convex, a relaxation variable needs to be introduced
q 1,k[n] ≥|q a [n]-q b,k | 2 and q 2,m [n]≥|q a [n]-q w,m | 2
Then the optimization sub-problem (P2) may become (P2.1):
Figure GDA0004082538800000201
after the jth unmanned aerial vehicle track iteration result is obtained, the (j + 1) th result can be obtained and written as
Figure GDA0004082538800000202
In conclusion, the (P2) sub-problem transforms into the (P2.1) sub-problem that can be solved.
S62, fixing { q a And a), obtaining the power optimization subproblem (P3) of the UAV and the LDs of legal equipment, and writing as:
Figure GDA0004082538800000203
as can be seen, (P3) with respect to P b ,P a The convex problem is solved without further processing, so that the convex optimization tool can be directly used for solving.
S63, fixing { q a ,P a ,P b Get the optimized legal device scheduling subproblem (P4), written as:
Figure GDA0004082538800000204
however, the sub-problem (P4) is also a non-convex problem, considering relaxing the scheduling policy constraints, i.e. letting α be k [n]The values can be continuous, then (P4) canTo (P4.1):
Figure GDA0004082538800000211
at this time, the optimization sub-problem (P4.1) becomes convex, and the optimal solution a is solved k [n]Thereafter, the continuous values need to be reshaped into discrete values. The shaping method comprises the following steps: order to
Figure GDA0004082538800000212
For the optimal solution of the sub-problem (P4.1), the upstream throughputs ≥ of all legal apparatuses are obtained from the sub-optimal solution>
Figure GDA0004082538800000213
And then on the upstream throughput->
Figure GDA0004082538800000214
A non-zero subset k, having>
Figure GDA0004082538800000215
Can now be combined>
Figure GDA0004082538800000216
At the same time, when the upstream throughput is too low, the corresponding schedule should also be set to zero, since the communication is no longer meaningful at this time, i.e. </or>
Figure GDA0004082538800000217
In summary, an optimal solution for the scheduling policy sub-problem (P4) can be found>
Figure GDA0004082538800000218
In summary, P1 is the original optimization problem, i.e. the optimization problem to be solved initially. However, since P1 is a non-convex optimization problem and cannot be solved, P1 is decomposed into three sub-problems of P2, P3 and P4, which are solved alternately. Then the decomposed sub-problem P2 is still a non-convex optimization problem, so that the direct solution is still unavailable, and then the P2 is equivalent to P2.1 by adopting a mathematical technique; finally, P2.1 is a convex optimization problem which can be solved. The sub-problem P3 is a convex optimization problem and can therefore be solved directly. The sub-problems P4 and P2 are the same as the non-convex optimization problem, and the solving is equivalent to P4.1 by using a mathematical method.
P1: original optimization problem, non-convex optimization problem;
p2: a sub-optimization problem of P1, a non-convex optimization problem;
p2.1: the equivalence of P2, convex optimization problem;
p3: p1, sub-optimization problem, convex optimization problem;
p4: a sub-optimization problem of P1, a non-convex optimization problem;
p4.1: p4 equivalence, convex optimization problem.
And S7, designing an algorithm to alternately optimize the three sub-problems to obtain an optimal solution of the optimization problem. The detailed algorithm is shown in fig. 3. For the algorithm provided in fig. 3, the following is stated:
the method comprises the following steps: firstly, solving a subproblem P (3) to obtain the emission power of the unmanned aerial vehicle and the emission power of legal equipment after one iteration of the algorithm;
step two: then, introducing newly obtained unmanned aerial vehicle transmitting power and legal equipment transmitting power into a subproblem P (2.1) to update the flight trajectory of the unmanned aerial vehicle;
step three: finally, solving a subproblem P (4.1) of latest unmanned aerial vehicle transmitting power, legal equipment transmitting power and unmanned aerial vehicle flight trajectory to obtain a latest legal equipment scheduling strategy;
step four: if the solving result is not converged or the precision is not in accordance with the requirement, turning to the first step; otherwise, the final result is obtained.
The optimal unmanned aerial vehicle track can be obtained after the algorithm is implemented
Figure GDA0004082538800000221
Transmitting power->
Figure GDA0004082538800000222
Legal device scheduling policy
Figure GDA0004082538800000223
Legal device transmitting power->
Figure GDA0004082538800000224
And an optimal uplink total throughput->
Figure GDA0004082538800000225
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.

Claims (6)

1. A resource allocation optimization method of a wireless power supply covert communication system comprises the following steps:
s1: establishing a system model of an unmanned aerial vehicle, legal equipment and a listener, wherein the unmanned aerial vehicle and the legal equipment have a scheduling strategy;
the establishment of the system model comprises the following steps:
s11: the set system model comprises an unmanned aerial vehicle, a plurality of legal devices and a plurality of listeners; determining the number and the positions of legal equipment and listeners;
wherein the legal device is located at
Figure FDA0004082538790000011
Where b represents a legal device, k represents the kth legal device, x b,k And y b,k Respectively representing the information of the horizontal and vertical coordinate positions of the kth legal device on the ground;
listener HWs position is indicated as
Figure FDA0004082538790000012
Where w represents a listener, m represents an mth listener, x w,m And y w,m Are respectively provided withThe horizontal and vertical coordinate position information of the mth listener on the ground is represented;
the flying height of the unmanned plane is H, one task time is T, and the maximum flying speed is V max Unmanned plane in a time slot delta t Has a maximum flight distance of L = V max δ t The trajectory of the drone is represented as
Figure FDA0004082538790000013
Where a denotes the drone, n denotes the nth slot, q a Representing a trajectory of an Unmanned Aerial Vehicle (UAV);
s12: in the nth time slot, a is used for the kth legal device k [n]The scheduling policy parameter is expressed, the scheduling policy is proposed for legal devices, the scheduling policy indicates that only one legal device is allowed to communicate with the unmanned aerial vehicle in one time slot, and for the kth legal device, a k [n]=1 indicates that the device will communicate with drone in nth slot, a k [n]=0 indicates that the device will not communicate with drone and there is one slot per slot
Figure FDA0004082538790000014
S13: setting the maximum transmitting power and the average transmitting power of the unmanned aerial vehicle;
Figure FDA0004082538790000015
Figure FDA0004082538790000016
wherein P is a [n]Which represents the transmitted power of the drone,
Figure FDA0004082538790000017
for mean transmitted power of drone, P max The maximum transmitting power of the unmanned aerial vehicle;
s2, solving signal models of legal equipment and the unmanned aerial vehicle according to the system model, designing and determining an energy model of the legal equipment, and comprising the following steps:
s21, obtaining a receiving signal r of the kth legal device in the nth time slot by the distance between the unmanned aerial vehicle autonomous control and the legal device and combining a scheduling strategy of the legal device b,k [n]Comprises the following steps:
Figure FDA0004082538790000021
wherein P is a [n]Representing the transmitted power of the drone, z b,k [n]Noise representing the kth legal device LDs; s is a [n]A transmission signal representative of the drone; and omega ab,k [n]Representing the channel gain from the drone to the kth legitimate device, further expressed as:
Figure FDA0004082538790000022
in the formula, Ω 0 Denotes a channel gain parameter with a reference distance of 1m, q b,k Indicating the location of the kth legal device, q a[n] The trajectory of the unmanned aerial vehicle in the nth time slot is represented, and H represents the flight height of the unmanned aerial vehicle;
s22, obtaining the receiving energy of each legal device of each time slot;
wherein, the received energy P of the kth legal device in each time slot h,k [n]Comprises the following steps:
P h,k [n]=ηP a [n]Ω ab,k [n]
wherein P is a [n]Representing the transmitting power of the unmanned aerial vehicle, eta is the energy harvesting coefficient, omega ab,k [n]Representing the channel gain from the drone to the kth legitimate device;
s23, obtaining a receiving signal of each time slot unmanned aerial vehicle;
wherein, the received signal r of the unmanned aerial vehicle is derived by a legal equipment scheduling strategy a [n]Comprises the following steps:
Figure FDA0004082538790000023
P b,k [n]representing the transmission power of the kth legal device LDs; z is a radical of a [n]Representing the received noise of the unmanned aerial vehicle UAV; s is b,k [n]Representing the modulated signal, Ω, emitted by the kth legal device LDs ab,k [n]Representing the channel gain from the unmanned aerial vehicle UAV to the kth legal device LDs, a k [n]=1 means the device will communicate with unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure FDA0004082538790000031
S24, obtaining the total uplink throughput rate of all legal devices;
in the nth time slot, the total uplink throughput rate R received by the unmanned aerial vehicle end b,k [n]Comprises the following steps:
Figure FDA0004082538790000032
wherein
Figure FDA0004082538790000033
i denotes the temporary variable of the sum count, σ a Parametric information representing the unmanned aerial vehicle UAV received noise;
s25, designing and determining an energy model of legal equipment;
for all legal devices, it is necessary to follow the energy causality, i.e. the energy consumed by this slot cannot be larger than the sum of the energy harvested by this slot and the remaining energy of the previous slot, the expression is written as:
Figure FDA0004082538790000034
wherein Q b,k [n]Indicating the kth legal deviceTotal energy, Q, of LD in n time slots 0 Represents the initial energy; i is a temporary variable for the sum count; eta is an energy harvesting coefficient; a is a k [n]=1 denotes that the device will communicate with the unmanned aerial vehicle UAV at nth slot, a k [n]=0 indicates that the device will not communicate with the unmanned aerial vehicle UAV and there is one slot per slot
Figure FDA0004082538790000035
S3, analyzing the binary hypothesis of the listeners, and obtaining the total error interception probability of the listeners on the premise of determining the positions of the listeners;
s4, introducing position uncertainty of the listeners in the actual scene to obtain total error interception probability combined with the position uncertainty;
s5, defining an optimization target as uplink throughput of all legal equipment within one-time unmanned aerial vehicle task time, and obtaining an optimization problem under the conditions of satisfying covert communication, unmanned aerial vehicle self-limitation, legal equipment energy limitation and scheduling;
s6, decomposing the optimization problem into a plurality of sub-problems, and converting each sub-problem into a convex sub-problem by using continuous convex approximation;
s7, designing an algorithm to alternately optimize a plurality of sub-problems to obtain an optimal solution of the optimization problem, and implementing the algorithm to obtain an optimal unmanned aerial vehicle track
Figure FDA0004082538790000036
Transmitting power->
Figure FDA0004082538790000037
Legal device scheduling policy>
Figure FDA0004082538790000038
Legal device transmitting power->
Figure FDA0004082538790000041
And an optimal uplink total throughput->
Figure FDA0004082538790000042
The process of the algorithm is as follows:
s71: firstly, solving a subproblem P3 to obtain the unmanned aerial vehicle transmitting power and the legal equipment transmitting power after one algorithm iteration;
s72: then, introducing newly obtained unmanned aerial vehicle transmitting power and legal equipment transmitting power into a subproblem P2.1 to update the flight trajectory of the unmanned aerial vehicle;
s73: finally, solving a sub-problem P4.1 of latest unmanned aerial vehicle transmitting power, legal equipment transmitting power and unmanned aerial vehicle flight trajectory to obtain a latest legal equipment scheduling strategy;
s74: if the solving result is not converged or the precision is not qualified, the step S11 is carried out; otherwise, obtaining a final result;
the optimal unmanned aerial vehicle track can be obtained after the algorithm is implemented
Figure FDA0004082538790000043
Transmitting power>
Figure FDA0004082538790000044
Legal device scheduling policy
Figure FDA0004082538790000045
Legal device transmitting power->
Figure FDA0004082538790000046
And an optimal uplink total throughput->
Figure FDA0004082538790000047
2. The method of claim 1, wherein the method comprises: the step S3 specifically includes the following steps:
s31, obtaining a binary hypothesis model of each listener in each time slot;
setting the listeners HWs to use a joint listening strategy to obtain the binary hypothesis expression of the mth listener in the nth time slot:
Figure FDA0004082538790000048
Figure FDA0004082538790000049
wherein
Figure FDA00040825387900000410
Representing the reception noise of the mth listener; h 0,k Representing the original hypothesis: the intercepted kth legal device is considered not to transmit information; h 1,k Represent alternative assumptions: the intercepted legitimate device is considered to have transmitted information; j represents a temporary variable of the sum count; r is w,m Representing the received signal of the mth listener; s b,j [n]N (0,1) represents the modulation signal transmitted by the jth legal device LD; a is j [n]The j legal device LD is represented in a state that the j legal device LD can communicate with the unmanned aerial vehicle UAV in the nth time slot; p b,j [n]Representing the transmission power of the jth legal device; omega aw,m [n]Represents the channel gain of the unmanned aerial vehicle UAV to the mth listener HWs; omega wb,j [n]Representing the channel gain from the mth listener to the jth legitimate device;
the judgment criteria of the listeners are as follows:
Figure FDA0004082538790000051
wherein P is w,m,k [n]Representing the average value of the power of the ambient signal obtained after the listener HWs measures for l times;
Figure FDA0004082538790000052
represents the surroundings obtained after 1 measurement of the listener HWsA signal power value; p th,m,k [n]Representing a decision threshold value; d 0 And D 1 Is expressed as corresponding to H 0,k And H 1,k The decision result of (1);
s32, obtaining the missed detection probability and the false detection probability of each listener in each time slot;
wherein the probability ξ of false detection of the mth listener HWs F,m,k [n]Probability xi of missed detection M,m,k [n]Expressed as:
Figure FDA0004082538790000053
Figure FDA0004082538790000054
/>
pr represents the mathematically solved probability;
Figure FDA0004082538790000055
parameter, P, corresponding to received noise representing m-th listener a [n]Denotes the unmanned aerial vehicle transmit power, Ω 0 Representing a channel gain parameter with a reference distance of 1m, q b,k Indicating the location of the kth legal device, q a[n] Just indicate the trajectory of the drone at the nth slot, H indicates the altitude of the drone, q w,m Indicating the listener position;
s33, obtaining the total error interception probability of each listener in each time slot;
at angle HWs of listener, the transmitted power P a [n]Is from 0 to P max Set the range value of (A) to the listener P a [n]Subject to a uniform distribution, its probability density function PDF is written as:
Figure FDA0004082538790000056
the false detection probability is derived as:
Figure FDA0004082538790000061
Figure FDA0004082538790000062
similarly, the probability of missed detection is deduced as:
Figure FDA0004082538790000063
wherein
Figure FDA0004082538790000064
In conclusion, the total interception error probability ξ can be further obtained m,k [n]Comprises the following steps:
Figure FDA0004082538790000065
P 3 ≤P 2 always true, total false positive probability ξ m,k [n]In [ P ] 1 ,P 3 ]Interval about P th,m,k Is monotonically decreasing; in the interval [ P 2 ,P 4 ]Total false interception probability ξ m,k [n]Is about a monotonous increase, so the minimum error probability is in the interval [ P ] 3 ,P 2 ]Obtaining; so minimum false intercept probability
Figure FDA0004082538790000066
Comprises the following steps:
Figure FDA0004082538790000067
Figure FDA0004082538790000068
is also an exact position (x) relative to listener HWs w,m ,y w,m ) A function of the correlation. />
3. The method of claim 2, wherein the method comprises: in the step S4, the process is carried out,
minimum average error probability after adding listener HWs position uncertainty
Figure FDA0004082538790000069
Write as:
Figure FDA00040825387900000610
x w,m and y w,m Respectively representing the horizontal and vertical coordinate position information of the mth listener on the ground, and the above formula is approximate:
Figure FDA0004082538790000071
wherein
Figure FDA0004082538790000072
Figure FDA0004082538790000073
x b,k And y b,k Respectively representing the horizontal and vertical coordinate position information of the kth legal device on the ground, wherein X and Y represent uncertain variables;
obtaining the optimal minimum average false interception probability of the added position uncertainty
Figure FDA0004082538790000074
Comprises the following steps:
Figure FDA0004082538790000075
order to
Figure FDA0004082538790000076
Then the constraint of covert communication is obtained, where p w Given covert communication restriction parameters.
4. The method of claim 2, wherein the method comprises: the step S5 specifically includes the following steps:
defining an optimization target as uplink throughput of all legal equipment within the task time of the unmanned aerial vehicle, obtaining an optimization problem under the conditions of meeting communication of hidden conditions, self limitation of the unmanned aerial vehicle, energy limitation and scheduling of the legal equipment, and enabling the unmanned aerial vehicle to work
Figure FDA0004082538790000077
The optimization problem is derived as:
(P1):
Figure FDA0004082538790000081
s.t.:
Figure FDA0004082538790000082
Figure FDA0004082538790000083
||q a [n]-q a [n-1]|| 2 ≤L 2 ,(c)
Figure FDA0004082538790000084
Figure FDA0004082538790000085
/>
Figure FDA0004082538790000086
wherein the optimization problem P1 aims at maximizing the uplink total throughput; a is a scheduling strategy constraint, b is a covert communication constraint, c is an unmanned aerial vehicle flight speed constraint, d is an unmanned aerial vehicle maximum transmitting power constraint, e is an unmanned aerial vehicle average transmitting power constraint, and f is a legal equipment energy causality constraint.
5. The method of claim 4, wherein the method comprises: step S6, decomposing the optimization problem P1 into three subproblems of P2, P3 and P4 for alternative solution, and specifically comprising the following steps:
s61, fixing the transmitting power of the unmanned aerial vehicle, the transmitting power of all legal equipment and scheduling parameters to obtain an unmanned aerial vehicle track optimization subproblem P2;
s62, converting the unmanned aerial vehicle track subproblem P2 into a convex problem P2.1 by using continuous convex approximation;
s63, fixing the track of the unmanned aerial vehicle and the scheduling parameters of legal equipment to obtain a power optimization subproblem P3;
s64, fixing the track of the unmanned aerial vehicle, the transmission power of the unmanned aerial vehicle and the transmission power of legal equipment to obtain a legal equipment scheduling optimization sub-problem P4;
s65, relaxing the constraint conditions of the scheduling strategy, converting the legal device scheduling optimization sub-problem P4 into a convex problem P4.1, and obtaining the optimal solution of the sub-problem P4 through a shaping algorithm.
6. The resource allocation optimization method for the wireless power supply covert communication system according to claim 5, wherein: in step S65, the shaping method includes: order to
Figure FDA0004082538790000087
For the optimal solution of the optimization problem, the uplink throughput of all legal devices is obtained according to the suboptimal solution>
Figure FDA0004082538790000088
And then on the upstream throughput->
Figure FDA0004082538790000091
A non-zero subset K of
Figure FDA0004082538790000092
Will now be>
Figure FDA0004082538790000093
At the same time, when the upstream throughput is too low, the corresponding schedule should also be set to zero, since the communication is no longer meaningful at this time, i.e. </or>
Figure FDA0004082538790000094
In conclusion, an optimal solution is found for the scheduling policy sub-problem (P4)>
Figure FDA0004082538790000095
/>
CN202210410331.7A 2022-04-19 2022-04-19 Resource allocation optimization method of wireless power supply covert communication system Active CN114698123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210410331.7A CN114698123B (en) 2022-04-19 2022-04-19 Resource allocation optimization method of wireless power supply covert communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210410331.7A CN114698123B (en) 2022-04-19 2022-04-19 Resource allocation optimization method of wireless power supply covert communication system

Publications (2)

Publication Number Publication Date
CN114698123A CN114698123A (en) 2022-07-01
CN114698123B true CN114698123B (en) 2023-04-18

Family

ID=82143098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210410331.7A Active CN114698123B (en) 2022-04-19 2022-04-19 Resource allocation optimization method of wireless power supply covert communication system

Country Status (1)

Country Link
CN (1) CN114698123B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016154949A1 (en) * 2015-03-31 2016-10-06 SZ DJI Technology Co., Ltd. Authentication systems and methods for generating flight regulations
CN107887943A (en) * 2017-11-09 2018-04-06 同济大学 A kind of wireless charging system and transmission link method for building up
WO2020205665A1 (en) * 2019-03-29 2020-10-08 Apple Inc. Systems and methods for autonomous vehicle communication
CN112740060A (en) * 2020-03-17 2021-04-30 华为技术有限公司 Signal processing method, signal processing device and storage medium
CN112737842A (en) * 2020-12-29 2021-04-30 西北工业大学深圳研究院 Task safety unloading method based on minimized time delay in air-ground integrated Internet of vehicles
CN113776531A (en) * 2021-07-21 2021-12-10 电子科技大学长三角研究院(湖州) Multi-unmanned-aerial-vehicle autonomous navigation and task allocation algorithm of wireless self-powered communication network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006039B2 (en) * 2003-08-05 2006-02-28 University Of Hawaii Microwave self-phasing antenna arrays for secure data transmission & satellite network crosslinks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016154949A1 (en) * 2015-03-31 2016-10-06 SZ DJI Technology Co., Ltd. Authentication systems and methods for generating flight regulations
CN107887943A (en) * 2017-11-09 2018-04-06 同济大学 A kind of wireless charging system and transmission link method for building up
WO2020205665A1 (en) * 2019-03-29 2020-10-08 Apple Inc. Systems and methods for autonomous vehicle communication
CN112740060A (en) * 2020-03-17 2021-04-30 华为技术有限公司 Signal processing method, signal processing device and storage medium
CN112737842A (en) * 2020-12-29 2021-04-30 西北工业大学深圳研究院 Task safety unloading method based on minimized time delay in air-ground integrated Internet of vehicles
CN113776531A (en) * 2021-07-21 2021-12-10 电子科技大学长三角研究院(湖州) Multi-unmanned-aerial-vehicle autonomous navigation and task allocation algorithm of wireless self-powered communication network

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Hazim Shakhatreh等."Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges".《 IEEE Access ( Volume: 7)》.2019,全文. *
Nan Zhao等."Special Issue on Unmanned Aerial Vehicle (UAV)-Enabled Green Communications and Networking".《IEEE Transactions on Green Communications and Networking ( Volume: 5, Issue: 3, September 2021)》.2021,全文. *
郑瑛等."几种小型UAV安全漏洞攻击研究".《内蒙古大学学报(自然科学版)》.2019,全文. *
高玉威等."面向无人机空地通信的无线信道密钥生成技术研究".《密码学报》.2021,全文. *
高鹏程."不同隐蔽通信管控策略下的任务性能分析".《电子技术应用》.2021,全文. *

Also Published As

Publication number Publication date
CN114698123A (en) 2022-07-01

Similar Documents

Publication Publication Date Title
Xie et al. Throughput maximization for UAV-enabled wireless powered communication networks
Zhang et al. Securing UAV communications via trajectory optimization
Wu et al. Joint trajectory and communication design for UAV-enabled multiple access
CN112243252B (en) Safety transmission enhancement method for relay network of unmanned aerial vehicle
Huang et al. Cognitive UAV communication via joint maneuver and power control
Zhou et al. UAV-enabled covert wireless data collection
Mamaghani et al. Improving PHY-security of UAV-enabled transmission with wireless energy harvesting: Robust trajectory design and communications resource allocation
Huang et al. UAV-assisted SWIPT in Internet of Things with power splitting: Trajectory design and power allocation
Yao et al. Joint 3D maneuver and power adaptation for secure UAV communication with CoMP reception
Feng et al. UAV-enabled data collection for wireless sensor networks with distributed beamforming
Tang et al. NOMA-based UAV communications for maritime coverage enhancement
CN108092737B (en) The relaying unmanned aerial vehicle flight path planing method of criterion is maximized based on secrecy capacity
Duo et al. Joint trajectory and power optimization for securing UAV communications against active eavesdropping
Zhang et al. Power control and trajectory planning based interference management for UAV-assisted wireless sensor networks
Xue et al. Joint 3D location and power optimization for UAV-enabled relaying systems
Li et al. Positioning optimization for sum-rate maximization in UAV-enabled interference channel
Tang et al. Joint maneuver and beamwidth optimization for UAV-enabled multicasting
CN113904743B (en) Safe communication resource optimization design method for unmanned aerial vehicle relay system
CN116132944A (en) Topology and power joint control method in unmanned aerial vehicle communication network
CN112512037B (en) Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization
Wang et al. Energy-Efficient and Secure Power Allocation and Trajectory Optimization for UAV-Enabled Data Collection in Wireless Sensor Networks
Tao et al. Resource allocation and trajectories design for UAV-assisted jamming cognitive UAV networks
CN114698123B (en) Resource allocation optimization method of wireless power supply covert communication system
Liu et al. Trajectory design for uav communications with no-fly zones by deep reinforcement learning
Zhou et al. Flying IRS: QoE-driven trajectory optimization and resource allocation based on adaptive deployment for WPCNs in 6G IoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant