CN114884607A - Deployment method, deployment device and storage medium of covert communication system - Google Patents
Deployment method, deployment device and storage medium of covert communication system Download PDFInfo
- Publication number
- CN114884607A CN114884607A CN202210482483.8A CN202210482483A CN114884607A CN 114884607 A CN114884607 A CN 114884607A CN 202210482483 A CN202210482483 A CN 202210482483A CN 114884607 A CN114884607 A CN 114884607A
- Authority
- CN
- China
- Prior art keywords
- optimal
- deployment
- sender
- point
- interference power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006854 communication Effects 0.000 title claims abstract description 57
- 238000004891 communication Methods 0.000 title claims abstract description 55
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000005540 biological transmission Effects 0.000 claims abstract description 39
- 230000002452 interceptive effect Effects 0.000 claims abstract description 12
- 238000001514 detection method Methods 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 description 20
- 238000005457 optimization Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000009795 derivation Methods 0.000 description 5
- 230000003247 decreasing effect Effects 0.000 description 3
- 238000005562 fading Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000003657 Likelihood-ratio test Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/43—Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/60—Jamming involving special techniques
- H04K3/62—Jamming involving special techniques by exposing communication, processing or storing systems to electromagnetic wave radiation, e.g. causing disturbance, disruption or damage of electronic circuits, or causing external injection of faults in the information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.
Description
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a deployment method, a deployment device and a storage medium of a covert communication system.
Background
Covert communication is a novel communication technology for pursuing safe and reliable transmission of information, and has wide application prospects in the fields of battlefield support, information management, big data analysis and the like.
The covert communication network involves a legal sender Alice, an illegal eavesdropper Willie and a receiver Bob, and the covert communication network needs to be analyzed to reasonably deploy a covert communication system.
Existing analysis schemes include analysis of point-to-point scenarios, analysis of channel conditions and noise interference, which are premised on: the Willie position is accurately known; however, in an actual environment, Willie often takes various countermeasures to protect its own location information from being leaked, and both parties of legal communication cannot generally know the accurate location coordinates of Willie, and can only estimate its location according to a small amount of acquired prior information, and then deploy the covert communication system according to the estimated location, which may be inaccurate. Therefore, the scheme in the prior art can lead to that the deployed covert communication system is easily detected by Willie, so that the covert communication security is reduced.
Disclosure of Invention
In order to solve the above problems in the prior art, the present invention provides a covert communication deployment method. The technical problem to be solved by the invention is realized by the following technical scheme:
in a first aspect, the present invention provides a deployment method of a covert communication system, for deploying the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and the positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment method includes:
acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
determining an overlapping area of the covert feasible area and a deployable area;
searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point;
calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission of the optimal throughput with the sender.
In a second aspect, the present invention provides a deployment apparatus for a covert communication system, configured to deploy the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment apparatus includes:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
a feasible region determining module, configured to determine a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
an overlapping area determining module, configured to determine an overlapping area between the hidden feasible area and the deployable area;
a deployment point searching module for searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission with the optimal throughput with the sender.
In a third aspect, the present invention provides a storage medium having a computer program stored therein, the computer program, when executed by a processor, implementing the steps of the first method for aspect deployment.
The invention has the beneficial effects that:
the invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in an overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Drawings
FIG. 1 is a schematic diagram of a covert communication system architecture in which the present invention is applied;
FIG. 2 is a schematic diagram of the present invention in full duplex covert mode for a legitimate receiver;
FIG. 3 is a flow chart of a deployment method of a covert communication system provided in the present invention;
FIG. 4 is a schematic illustration of the present invention providing no overlap region;
FIG. 5 is a schematic diagram of the overlapped area not covering the first target point according to the present invention;
FIG. 6 is a schematic diagram of the overlapping area covering a first target point according to the present invention;
FIG. 7 is a diagram of the relationship between the maximum AN power in different UZ zone radii and the maximum achievable throughput of the system according to the present invention;
FIG. 8 is a diagram of the relationship between the radius of different UZ regions, the deployable region and the maximum achievable throughput of the system provided by the present invention;
fig. 9 is a diagram of the relationship between the upper power bound of AN area with different UZ radii and the effective throughput of the system provided by the present invention.
Detailed Description
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
The deployment method of the covert communication system is used for deploying the covert communication system, as shown in figure 1, the covert communication system comprises a sender, a legal receiver and an illegal eavesdropping party, the legal receiver has a deployable area, the illegal eavesdropping party has an uncertain area, and the positions of the sender, the legal receiver and the illegal eavesdropping party form a triangular relation.
The covert communication system structure of the present invention is generally as shown in fig. 1, where a legitimate sender Alice wants to send covert information to a receiver Bob under the supervision of an illegitimate eavesdropper Willie, whose purpose is to detect whether Alice has sent covert information to Bob. Different from the basic model, the legal receiver Bob of the present invention may adopt a full duplex receiver equipped with two antennas, one for receiving Alice's transmitted signal and the other for transmitting interference noise (AN) with a certain power to interfere with Willie's detection process. Compared with the basic model and the model of adding the auxiliary interference node, the covert communication model based on the full-duplex receiver has the following advantages: first, the system does not need to add additional functional nodes to assist communication, thereby optimizing the system structure and reducing the overall implementation difficulty. Second, the AN power can be autonomously controlled and optimized by the full-duplex antenna Bob to facilitate reception of the transmission signal. Third, Bob can mitigate the effect of the AN signal on itself through technical means, such as self-interference cancellation techniques, thereby reducing the overall interference of the system.
In the invention, the two-dimensional Cartesian coordinates corresponding to the nodes Alice, Bob and Willie are respectively expressed asMeanwhile, the distance between Alice and Willie is defined as d aw Defining the distance between Willie and Bob as d bw Defining the distance between Willie and Bob as d bw . Assuming that the channels all follow independent quasi-stationary rayleigh fading channels, the channel coefficients remain unchanged for the length of one time slot and vary independently from time slot to time slot. To simplify the analysis, current research often considers only one of the time slots. Further, let h be the channel coefficient of the fading channel between the communication nodes aw 、h ab 、h bw . Since there is self-interference between Bob's receive and interfering antennas, h is used here bb Representing Bob's self-interference channel coefficients. The application generally sets the transmission power of Alice as P a The power level is known to Bob and Willie. Bob has AN power P b The power level of which is unknown to Willie and P b >>P a . Since the full-duplex receiver can not realize perfect self-interference elimination in practical applicationThis Bob also has some degree of AN self-interference while receiving the transmitted signal. If Alice transmits a concealment signal to Bob, the signal received at Bob is
Wherein s is a [·]Represents a standard transmission signal of Alice and satisfiess b [·]Then Bob's standard AN signal strength is indicated and satisfiedAnd alpha is a path loss index, lambda (0 ≦ lambda ≦ 1) represents self-interference cancellation coefficients of different levels, and when lambda is 0, the self-interference cancellation coefficients represent an ideal case that self-interference can be completely cancelled, and when lambda is 1, the self-interference cancellation operation is not performed at all.
The invention mainly discusses the signal detection performance of Willie in the full-duplex concealment system in FIG. 2, and the purpose of Willie is to deduce whether both communication parties are carrying out information transmission, so as to intercept signals for information extraction. Here the station considers a more pessimistic case from the perspective of the legitimate correspondent: willie has strong a priori sensing capability and can know more information of Alice and Bob, such as relative distances between Alice and Bob, channel gain and path exponential factor of each time slot, noise level, and the like. Based on the energy detection principle, Willie compares the received signal r w [n]And making a judgment decision according to the difference between the background noise signal and the self background noise signal. Based on this application, a binary hypothesis testing model is presented, in which the null hypothesis (H) is 0 ) The valid hypothesis (H) indicates that there is no information transfer behavior between Alice and Bob 1 ) Indicating that there is information transmission between Alice and Bob, in which case the received signal of Willie is shown separately
Wherein v is w [n]So as to makeIs a gaussian white noise signal of variance. Assuming that the channels are quasi-stationary rayleigh channels, the application uses the average power statistics over n available channel periodsWill characterize the power detection criteria of Willie and willAnd comparing with a preset threshold to deduce whether the two hypotheses are correct or not. According to the Neyman-Pearson criterion, the optimal decision specification under the condition of the least detection error of the likelihood ratio test can be given, and the formula is shown as follows
Where gamma denotes a predetermined power detection threshold, N s Representing the number of samples sampled, at N s In the case of → ∞, i.e. allowing Willie to observe an infinite number of samples, the application can obtain the following approximation
After the hypothesis testing model is determined, Willie has a false alarm probability and a false negative probability of being
Thus Willie's probability of false detection can be written as
Considering from the viewpoint of an illegal eavesdropper, Willie needs to select a proper power detection threshold gamma to minimize the detection error probability P DE So that the optimal detection threshold gamma is * Can be expressed as
As shown in fig. 3, the deployment method of the covert communication system provided by the present invention includes:
s1, obtaining the maximum interference power of the legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
in the invention, a relatively realistic scene is considered: alice and Bob know only Willie randomly distributed within some limited area and do not know its exact location coordinates, which area is referred to herein as Willie's location uncertainty area (UZ). In addition, the application assumes that the location of Alice is fixed in the communication network, and Bob as a mobile full-duplex receiver can autonomously adjust own AN transmission power P in a deployable area (DZ) b And deployment location to achieve better concealment. It is assumed that Alice's location is public and known to Bob and Willie, but Alice and Bob do not know the exact location of Willie. To reach a more intuitive conclusion and simplify subsequent analysis, Willie's UZ is assumed to be one or moreAs a circle center and has a radius of r w The same probability that Willie may be distributed at any position within the UZ (including the boundary region) is not difficult to see that r is w The larger the position uncertainty of Willie. Therefore, from the perspective of both legitimate communications, Willie's coordinates can be expressed as
Wherein e is w Indicating the position estimation error. Similarly, the present application assumes that the DZ region of the full-duplex receiver Bob is also one or moreAs the center of circle, with r b Is a standard circular area of radius. In a particular optimization scenario, Bob's location coordinates may be expressed as
Wherein e is b Representing Bob's actual deployment location (q) b ) And DZ center positionThe relative distance therebetween. Similarly, this application will describeAre respectively defined asAccording to the geometric relation and the triangle inequality relation in the graph, the distance constraint can be obtained by the method
It is assumed here thatAndthe included angle therebetween is theta. In addition, the application refers to the distance within the UZThe nearest position is defined as S 1 Point, distance in UZThe farthest position is defined as S 2 And (4) point. In the system model of the present invention, the mobile full-duplex receiver Bob makes a trade-off between system goodput and concealment performance by varying the deployment location and the AN transmit power. Suppose AN power P of Bob b Is randomly changed among different time slots, and Willie only knows P b Satisfies the following relationship in the Probability Density Function (PDF)
Wherein,Σ P =[P U ,P L ]Power Uncertainty Range (PUR). P U ,P L Respectively an upper bound and a lower bound of the power uncertainty range, and satisfies 0 ≦ P L ≤P b ≤P U ≤P bmax WhereinRepresenting the maximum AN power that Bob's interfering antenna can generate. In addition, the present application assumes Alice's transmitted signal power P a Are fixed and are disclosed by Bob and Willie. In view of the utility of the model in open ground or indoor environments, the present invention mainly analyzes and discusses the problem in the case where α ═ 2.
Willie should satisfy the following formula for its power detection threshold γ in order to minimize from the perspective of optimal detection
Satisfying the condition gamma in the above formula can be regarded as the optimal detection threshold gamma * Corresponding to Willie's minimum probability of false detection of
From the above equation, it can be seen that the best detection performance of Willie is related to the transmit power of both Alice and Bob when P is a Willie can detect Alice's signaling behavior completely error-free by selection of the optimal threshold → ∞ while P is U On → ∞, it is almost impossible to detect the transmission behavior of the system even under Willie's selection of the optimal threshold. The conclusion also shows that when Alice's transmit power is constant, reasonably increasing Bob's AN power upper bound will reduce Willie's probability of correct detection, thereby facilitating the information transmission behavior of the hidden system. The signal to interference plus noise ratio at Bob can be expressed as
In the invention, the connection interruption probability delta is adopted ab The reliability of a legal transmission link is measured by the derivation process of
Wherein R is ab Representing a preset transmission rate, C, between Alice and Bob ab Representing the instantaneous channel capacity from Alice to Bob. When C is present ab <R ab When the system transmission is interrupted, reliable transmission of information cannot be guaranteed. In order to simplify the analysis process in the present invention, the present application assumes that there is no channel fading, i.e., h, in the transmission channel described above aw =h ab =h bw 1. For both sides of legal transmission, when Willie uses the optimal detection threshold gamma * When detecting Alice's signal, the minimum false detection probability is
In order to give consideration to the transmission performance and reliability of the system and combine the analysis of the progressive capacity of the system, the method uses the effective throughput eta of a hidden system to measure the performance of a legal transmission link, and at a given pre-transmission rate R ab On the premise that it is given by the following formula
Based on the foregoing analysis and description, in order to achieve a reasonable covert communication objective, it is necessary to increase the covert throughput of a legitimate communication link as much as possible under the given covert constraint and under the premise of satisfying the location constraint. The optimization problem of the system can thus be described as
b∈D1,w∈D2
Wherein the optimization objective is to maximize the system goodput, and the optimization variables are the deployment location and AN power (including P) of Bob U And P L ). Constraint C1 shows the concealment requirements of the system from the worst case in terms of a legitimate transmitter, where ε reflects the stringency of the detection constraints, and smaller ε gives stronger concealment constraints; constraint C2 sets the upper and lower limits of FD receiver interference power,represents the maximum AN power that a full duplex receiver can generate; constraint C3 gives the position distribution areas of Bob and Willie, b and w are the actual position coordinates of Bob and Willie, respectively, D1 represents the deployable area DZ of Bob, and D2 represents the position uncertainty range UZ of Willie. To simplify subsequent analysis, the present application first determines η relative to P L Monotonicity of (2). The application pair eta relates to P L Performing a first-order derivation operation
Obviously, η is about P L Is a monotonically decreasing function of (a). Thus, the optimum P to maximize η L Is 0, i.e. the achievable lower PUR bound is 0, so this application applies this conclusion to subsequent analysis and the optimization problem can be re-described as
maximize PU,b {η}
Note that the PUR range at this time is only with P U Related to and following P U Is increased, so that in subsequent analysis, the AN power P is measured b Is equal to P U And (4) optimizing. The method can convert covert communication constraint into distance constraint between Bob and Willie
The above formula can be understood as follows: in order to satisfy the concealment of system communication, Bob should be deployed to a position close to Willie, otherwise the AN interference capability would be greatly reduced. By further converting the above formula, the application can obtain P satisfying the concealment constraint from another angle U Range
According to the foregoing analysis, the greater the distance between Alice and Willie, the less easily the communication process is detected, and therefore P needs to be set U The smaller the value. The larger the distance between Bob and Willie, the smaller the coverage area covered by the AN interference, and the larger the interference uncertainty existing in the communication process, so that a larger AN interference power needs to be set to realize reliable communication.
S2, determining the concealment feasible region of the legal receiver according to the maximum interference power and the uncertain region;
as an alternative embodiment of the present invention, S2 includes:
s21: taking the central point of the uncertain area as the virtual position of the illegal eavesdropper;
s22: calculating the maximum radius of a hidden feasible region according to the transmitting power of a sender, the distance between the sender and the virtual position and the maximum interference power of a legal receiver;
s23: and determining the hidden feasible region by taking the virtual position as a circle center and the maximum radius as the original radius.
wherein r is CE Maximum radius, P, representing the hidden feasible region bmax Representing the maximum interference power, P a Indicating the transmission power of the sender, d aw Indicating the distance of the sender from an illegal eavesdropper and epsilon indicating the severity of the detection constraint.
S3, determining an overlapping area of the hidden feasible area and the deployable area;
to simplify subsequent proof of analysis, the present application describes the detection problem from the perspective of Willie, first defined such thatObtaining d under equal conditions bw Is r CE And assume that Willie is the center of circle and r is the center of circle CE The standard circular area of radius is the Covert-enabler zone (CEZ). It will be appreciated that both the blind and power constraints may be satisfied when Bob's deployment location is within the CEZ. Furthermore, in view of the location constraints discussed above, the present application defines the coverage portion of both the covert feasible region and the deployable region collectively as an covert overlap region (OZ), and when Bob's deployment location is within OZ, the system can achieve forward covert throughput while satisfying the covert constraints. On this basis, if there is an overlapping zone OZ between CEZ and DZ, the application defines S N The point is the intersection of the lower half parts of the CEZ and the DZ, and S is defined M The point is the intersection of the upper halves of the CEZ and DZ. From the random geometric relationships, one can derive
Thus P can be further reduced U Is converted into
Then, the eta relative to P is determined U Monotonicity of (2). Pair formula (about P) U The first-order derivation operation is carried out by
Similar to the above demonstration process, it can be seen that η is related to P U Is a monotonically decreasing function of (a). Therefore whenWhen the data is isochronous, the effective concealment throughput η of the system can be maximized as follows
It can be seen that for a set of predetermined d aw 、R ab And P a ,η * Only by the distance d between Alice and Bob ab A function of correlation, and d ab The larger the system the less efficient concealment throughput can be achieved. Subsequently, the present application addresses the above formula for d ab Performing a first-order derivation operation to obtain
Wherein the content of the first and second substances,as the formula describes, η is a constant independent of η. The application then masks the throughput maximum η for effective concealment * With respect to d ab Performing a second-order derivation operation, and obtaining the result by the same wayEasily obtain eta * Is about d ab Is a monotonically decreasing function of (a).
S4, searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
as an optional embodiment of the present invention, before determining the overlapping area of the hidden feasible area and the deployable area, the method further includes:
step a: determining a first target position point closest to a sender on the boundary of the deployable area according to the central position point of the deployable area and the position point of the sender;
step b: and determining a second target position point closest to the sender on the boundary of the hidden feasible region according to the central position point of the hidden feasible region and the position point of the sender.
As an optional implementation manner of the present invention, finding a location point closest to a sender in an overlap area as an optimal deployment point of a legal recipient includes:
s41, judging whether the overlapping area covers the first target position point, if so, determining the first target position point as the optimal deployment point of the legal receiver;
s42, if not, determining the second target location point as the optimal deployment point for the legitimate recipient.
When the second target position point is the optimal deployment point, the optimal interference power is the maximum interference power; when the first target location point is the optimal deployment point, the optimal interference power is expressed as:
wherein, P a Which indicates the transmission power of the transmitting side,representing the mean value of the distances, r, between a legitimate receiver and an illegitimate eavesdropper w Radius representing the uncertainty area, r b A radius representing an illegal eavesdropper,representing the average of the distance of the sender from the legitimate receiver,representing the average of the distances between the sender and the illegal eavesdropper, and epsilon represents the strictness of the detection constraint.
Considering from the perspective of both legitimate communication parties, the optimal deployment position of Bob is located at the closest point to Alice within DZ, and for the convenience of later analysis and verification, the application assumes that Alice and Bob know the accurate distribution position of Willie, that is, Alice and Bob knowSince the range relationship between CEZ and OZ is not clear, the present application discusses the classification of the size of the range of its region.
Case 1: CEZ and DZ do not overlap with each other, i.e. no OZ is present.
This situation is illustrated in fig. 4. From the geometrical relationships in FIG. 4, it can be seen thatThis means that Bob cannot find a deployment point in the deployable region that satisfies the concealment constraint, i.e., forward system effective concealment throughput cannot be achieved regardless of Bob's deployment anywhere in the DZ. According to the hidden constraint condition
The present application is hereby given the following definitions
It is clear that, in one possible covert communication system,should be greater than P 1 Can ensure system dataThe validity of the transmission process.
Case 2: the overlapping region OZ exists between CEZ and DZ, but S Q The dots are not inside the OZ.
This situation is illustrated in fig. 5. Bob can be inOn the premise of finding a deployment position meeting the concealment constraint in the DZ, and meanwhile, the system can also have forward concealment throughput. On the other hand, due to S N The point is the closest position to Alice within OZ, S M The point is the farthest position from Alice within OZ, so Bob' S best deployment position is at S N And (4) point. It is clear that the coverage of CEZ follows S N Is increased, and then S is increased N The point will follow S N Along the boundary of DZ to S N The point moves until the two coincide, at which time r at the critical position CE Can be expressed as
Therefore, when S is N And S Q At the time of coincidence, ofIs also a critical value of considerable importance, for the purposes of this application P 2 To indicate this timeIt is expressed as follows
Case 3: the overlapping region OZ, S exists between CEZ and DZ Q The points are located inside the OZ.
This situation is illustrated in fig. 6. In thatPrecondition of (2)Next, Bob can find a deployment location within the DZ that satisfies the concealment constraint, while the system can also achieve forward concealment throughput. At this time, since S Q The point is the closest position to Alice within OZ and S P The point is the farthest position from Alice within OZ, so Bob' S best deployment position is at S Q And (4) point.
In combination with the above three cases, the present application can draw the following conclusions: optimal deployment of Bob depends on the maximum achievable AN power of the interfering antennasBased on the foregoing analysis, the present application willSubstituting the formula into the formula, when the inequality equal condition is satisfied, the AN power P corresponding to the optimal deployment position can be calculated U The value is obtained. However, the analysis is based on the fact that Willie is accurately known, and on the premise that Willie position uncertainty is considered, the method needs to expand the conclusion according to a single-stage classical robust optimization principle to obtain d aw And d bw Worst case conservative value
The present application can understand the above conclusions: in order to obtain the function parameters of the optimization objective when Willie position is uncertain, Alice and Bob are required to consider the worst case from the respective viewpoints. Willie is at S if analyzed from Alice' S perspective 1 The point-time is the worst case because Willie can optimally detect the transmission link at the closest location to Alice. But analysis from Bob' S perspective, Willie is at S 2 The point-time is the worst case because of S 2 The point is the farthest position from Bob within the UZ,the AN interference can be avoided to the maximum extent. Although the two position relations cannot be satisfied at the same time, the method has important guiding value in optimizing performance analysis.
S5, determining the best interference power of the legal receiver according to the distance between the sender and the best deployment point;
corresponding optimization when the system obtains maximum throughputIs given by the following formula
Wherein
The optimal interference power of the legal receiver can be calculated according to the transmitting power of the sender, the distance between the receiver and the virtual position of the illegal eavesdropper and the distance between the sender and the virtual position of the illegal eavesdropper.
S6, calculating the best throughput according to the best deployment point and the best interference power;
wherein the maximum throughput is expressed as:
wherein R is ab Representing a given pre-transmission rate, λ represents self-interference cancellation coefficients of different levels, λ being 0 represents an ideal case where self-interference can be completely cancelled, λ being 1 represents no self-interference cancellation operation at all, and σ represents no self-interference cancellation operation at all b Representing the Gaussian white noise signal of the channel at BobThe variance of the sign,. Theta denotes a vectorAndthe included angle therebetween.
By the above analysis, the throughput maximum η is effectively concealed * Formula (ii) and d aw And d bw In the worst case conservative value formula, the following conclusions can be obtained:
wherein eta is N And η N Respectively represent Bob to be deployed at S N Dot sum S Q System goodput at point. The range size of the CEZ and due to the power settingShowing a positive correlation. When in useWhen the system is in the OZ, Bob cannot find a deployment position meeting the concealment condition in the OZ, so that the effective concealment throughput of the system is 0; when in useThere is an overlapping zone OZ between CEZ and DZ, where Bob' S optimal deployment location is S within OZ, closest to Alice N Point, if P at this time U Value equal toThe system can achieve maximum effective throughput; when in useThere is an overlapping zone OZ between CEZ and DZ, where Bob' S optimal deployment location is S within OZ, closest to Alice Q Point of whenP U Size equal to P 2 The system can achieve maximum goodput.
And S7, deploying the legal receiver at the optimal deployment position, so that the legal receiver transmits an interference signal interfering the illegal eavesdropping party according to the optimal interference power, and the transmission with the optimal throughput is realized with the sender.
The effect of the invention is verified through simulation.
Referring to fig. 7, 8 and 9, fig. 7 is a graph of maximum AN power in different UZ zone radii versus maximum achievable throughput of the system; FIG. 8 is a diagram of the relationship between the radius of a different UZ region, the deployable region and the maximum achievable throughput of the system; fig. 9 is a graph of the power upper bound of AN area with different UZ areas and the effective throughput of the system.
The simulation results show that: the concealment optimization strategy provided by the invention can ensure that the system can still keep effective concealment transmission even if the eavesdropper is in the best detection condition. The reliability of the concealment system under the condition of resisting uncertain factors of extreme scenes is improved, and the analysis result has wider applicability.
The invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.
In a second aspect, the present invention provides a deployment apparatus for a covert communication system, configured to deploy the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment apparatus includes:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
the feasible region determining module is used for determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
the overlapping area determining module is used for determining the overlapping area of the hidden feasible area and the deployable area;
the deployment point searching module is used for searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and the transmission of the optimal throughput is realized with the sender.
In a third aspect, the present invention provides a storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the deployment method of the first aspect.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.
Claims (10)
1. A deployment method of a covert communication system is used for deploying the covert communication system, the covert communication system comprises a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable area, the illegal eavesdropper has an uncertain area, and the positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relation, and the deployment method comprises the following steps:
acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
determining an overlapping area of the covert feasible area and a deployable area;
searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point;
calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission of the optimal throughput with the sender.
2. The deployment method of claim 1 wherein the determining the blind feasible region for the legitimate receiver according to the maximum interference power and the uncertain region comprises:
taking the central point of the uncertain area as the virtual position of the illegal eavesdropper;
calculating the maximum radius of a hidden feasible region according to the transmitting power of a sender, the distance between the sender and the virtual position and the maximum interference power of a legal receiver;
and determining a hidden feasible region by taking the virtual position as a circle center and the maximum radius as an original radius.
3. The deployment method of claim 2 wherein the maximum radius of the covertly feasible region is expressed as:
wherein r is CE Maximum radius, P, representing the hidden feasible region bmax Representing the maximum interference power, P a Indicating the transmission power of the sender, d aw Indicating the distance of the sender from an illegal eavesdropper and epsilon indicating the severity of the detection constraint.
4. The method of deployment of claim 1, wherein prior to said determining the area of overlap of the covertly available area and the deployable area, the method further comprises:
determining a first target position point closest to a sender on the boundary of the deployable area according to the central position point of the deployable area and the position point of the sender;
and determining a second target position point closest to the sender on the boundary of the hidden feasible region according to the central position point of the hidden feasible region and the position point of the sender.
5. The deployment method of claim 4, wherein finding the location point closest to the sender in the overlap area as the best deployment point for the legitimate receiver comprises:
judging whether the overlapping area covers the first target position point, and if so, determining the first target position point as the optimal deployment point of a legal receiver;
if not, the second target location point is determined to be the best deployment point for the legitimate recipient.
6. The deployment method of claim 5, wherein the determining the optimal interference power of the legal receiver according to the distance between the sender and the optimal deployment point comprises:
and calculating the optimal interference power of the legal receiver according to the transmitting power of the sender, the distance between the receiver and the virtual position of the illegal eavesdropper and the distance between the sender and the virtual position of the illegal eavesdropper.
7. The deployment method of claim 6,
when the second target position point is the optimal deployment point, the optimal interference power is the maximum interference power;
when the first target location point is the optimal deployment point, the optimal interference power is expressed as:
wherein, P a Which indicates the transmission power of the transmitting side,representing the mean value of the distances, r, between a legitimate receiver and an illegitimate eavesdropper w Radius representing the uncertainty area, r b A radius representing an illegal eavesdropper,representing the average of the distance of the sender from the legitimate receiver,representing the average of the distances between the sender and the illegal eavesdropper, and epsilon represents the strictness of the detection constraint.
8. The deployment method of claim 7 wherein the maximum throughput is expressed as:
wherein R is ab Representing a given pre-transmission rate, λ represents self-interference cancellation coefficients of different levels, λ being 0 represents an ideal case where self-interference can be completely cancelled, λ being 1 represents no self-interference cancellation operation at all, and σ represents no self-interference cancellation operation at all b Represents the variance of the Gaussian white noise signal of the channel at Bob, and theta represents the vectorAndthe included angle therebetween.
9. A deployment device of a covert communication system, for deploying the covert communication system, the covert communication system comprising a sender, a legal receiver and an illegal eavesdropper, the legal receiver having a deployable area, the illegal eavesdropper having an uncertain area, the positions of the sender, the legal receiver and the illegal eavesdropper forming a triangular relationship, the deployment device comprising:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
a feasible region determining module, configured to determine a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
an overlapping area determining module, configured to determine an overlapping area between the hidden feasible area and the deployable area;
a deployment point searching module for searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission with the optimal throughput with the sender.
10. A storage medium, characterized in that a computer program is stored in the storage medium, which computer program, when being executed by a processor, carries out the steps of the deployment method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210482483.8A CN114884607A (en) | 2022-05-05 | 2022-05-05 | Deployment method, deployment device and storage medium of covert communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210482483.8A CN114884607A (en) | 2022-05-05 | 2022-05-05 | Deployment method, deployment device and storage medium of covert communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114884607A true CN114884607A (en) | 2022-08-09 |
Family
ID=82674560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210482483.8A Pending CN114884607A (en) | 2022-05-05 | 2022-05-05 | Deployment method, deployment device and storage medium of covert communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114884607A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9800367B1 (en) * | 2017-02-14 | 2017-10-24 | Macau University Of Science And Technology | Anti-eavesdropping shelter for protection of wireless communication |
CN111328079A (en) * | 2020-02-25 | 2020-06-23 | 大连理工大学 | Multi-antenna covert communication method for movable eavesdropper |
CN114071468A (en) * | 2021-11-16 | 2022-02-18 | 西北工业大学 | Ground mobile interference method and device for preventing aerial eavesdropping attack |
-
2022
- 2022-05-05 CN CN202210482483.8A patent/CN114884607A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9800367B1 (en) * | 2017-02-14 | 2017-10-24 | Macau University Of Science And Technology | Anti-eavesdropping shelter for protection of wireless communication |
CN111328079A (en) * | 2020-02-25 | 2020-06-23 | 大连理工大学 | Multi-antenna covert communication method for movable eavesdropper |
CN114071468A (en) * | 2021-11-16 | 2022-02-18 | 西北工业大学 | Ground mobile interference method and device for preventing aerial eavesdropping attack |
Non-Patent Citations (1)
Title |
---|
RUI XU等: "Robust Power and Position Optimization for the Full-Duplex Receiver in Covert Communication", 《2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)》, 2 February 2022 (2022-02-02), pages 2 - 5 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101469659B1 (en) | Method for controlling random access for the efficient sensing of the cooperative spectrum in a cognitive radio-based frequency resource sharing system | |
US8838162B2 (en) | Power control method in cognitive radio communication, cognitive radio communication system, and radio communication device | |
US9628996B2 (en) | Spectrum sensing apparatus and method for cooperative cognitive radio network in non-gaussian noise environment, and fusion center apparatus and cooperative cognitive radio system using the same | |
US11330434B2 (en) | Security detection for a physical layer authentication system that considers signal-discriminating capability of an active adversary | |
Zarrin et al. | Belief propagation on factor graphs for cooperative spectrum sensing in cognitive radio | |
CN109168166A (en) | The safety detecting method of physical layer Verification System | |
Viswanathan et al. | A review of sensing and distributed detection algorithms for cognitive radio systems | |
Liu et al. | Wireless jamming localization by exploiting nodes’ hearing ranges | |
Ahsant et al. | A review of cooperative spectrum sensing in cognitive radios | |
Xu et al. | Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework | |
CN113472463A (en) | Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network | |
CN109861784A (en) | Full duplex receiver covert communications implementation method based on channel distribution information | |
CN111065070B (en) | Cooperative millimeter wave frequency spectrum sensing method in cognitive Internet of vehicles | |
CN114884607A (en) | Deployment method, deployment device and storage medium of covert communication system | |
CN115442829A (en) | Selection and transmission power optimization method for hidden communication network jammer | |
Viswanathan | Cooperative spectrum sensing for primary user detection in cognitive radio | |
Xu et al. | Robust power and position optimization for the full-duplex receiver in covert communication | |
Hassan et al. | Predicted eigenvalue threshold based spectrum sensing with correlated multiple-antennas | |
Bi et al. | Deep reinforcement learning for IRS-assisted UAV covert communications | |
Wang et al. | Blind spectrum sensing by information theoretic criteria | |
Liang et al. | OAM-based hybrid-duplex cognitive frequency hopping | |
KR101380397B1 (en) | Apparatus for cognitive radio and method thereof | |
Li et al. | High-diversity cooperative spectrum sensing in cognitive radio networks | |
CN118250717A (en) | Method for maximizing energy efficiency in antenna re-radiated covert communication system | |
Ammar et al. | Detection Threats and Mitigation Techniques in Cognitive Radio based on Localization of Signal Source and Trustworthiness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |