CN114884607A - Deployment method, deployment device and storage medium of covert communication system - Google Patents

Deployment method, deployment device and storage medium of covert communication system Download PDF

Info

Publication number
CN114884607A
CN114884607A CN202210482483.8A CN202210482483A CN114884607A CN 114884607 A CN114884607 A CN 114884607A CN 202210482483 A CN202210482483 A CN 202210482483A CN 114884607 A CN114884607 A CN 114884607A
Authority
CN
China
Prior art keywords
optimal
deployment
sender
point
interference power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210482483.8A
Other languages
Chinese (zh)
Inventor
赵越
许睿
关磊
李赞
王丹洋
司江勃
惠佩
金云涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202210482483.8A priority Critical patent/CN114884607A/en
Publication of CN114884607A publication Critical patent/CN114884607A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/43Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/62Jamming involving special techniques by exposing communication, processing or storing systems to electromagnetic wave radiation, e.g. causing disturbance, disruption or damage of electronic circuits, or causing external injection of faults in the information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.

Description

Deployment method, deployment device and storage medium of covert communication system
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a deployment method, a deployment device and a storage medium of a covert communication system.
Background
Covert communication is a novel communication technology for pursuing safe and reliable transmission of information, and has wide application prospects in the fields of battlefield support, information management, big data analysis and the like.
The covert communication network involves a legal sender Alice, an illegal eavesdropper Willie and a receiver Bob, and the covert communication network needs to be analyzed to reasonably deploy a covert communication system.
Existing analysis schemes include analysis of point-to-point scenarios, analysis of channel conditions and noise interference, which are premised on: the Willie position is accurately known; however, in an actual environment, Willie often takes various countermeasures to protect its own location information from being leaked, and both parties of legal communication cannot generally know the accurate location coordinates of Willie, and can only estimate its location according to a small amount of acquired prior information, and then deploy the covert communication system according to the estimated location, which may be inaccurate. Therefore, the scheme in the prior art can lead to that the deployed covert communication system is easily detected by Willie, so that the covert communication security is reduced.
Disclosure of Invention
In order to solve the above problems in the prior art, the present invention provides a covert communication deployment method. The technical problem to be solved by the invention is realized by the following technical scheme:
in a first aspect, the present invention provides a deployment method of a covert communication system, for deploying the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and the positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment method includes:
acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
determining an overlapping area of the covert feasible area and a deployable area;
searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point;
calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission of the optimal throughput with the sender.
In a second aspect, the present invention provides a deployment apparatus for a covert communication system, configured to deploy the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment apparatus includes:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
a feasible region determining module, configured to determine a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
an overlapping area determining module, configured to determine an overlapping area between the hidden feasible area and the deployable area;
a deployment point searching module for searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission with the optimal throughput with the sender.
In a third aspect, the present invention provides a storage medium having a computer program stored therein, the computer program, when executed by a processor, implementing the steps of the first method for aspect deployment.
The invention has the beneficial effects that:
the invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in an overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.
The present invention will be described in further detail with reference to the accompanying drawings and examples.
Drawings
FIG. 1 is a schematic diagram of a covert communication system architecture in which the present invention is applied;
FIG. 2 is a schematic diagram of the present invention in full duplex covert mode for a legitimate receiver;
FIG. 3 is a flow chart of a deployment method of a covert communication system provided in the present invention;
FIG. 4 is a schematic illustration of the present invention providing no overlap region;
FIG. 5 is a schematic diagram of the overlapped area not covering the first target point according to the present invention;
FIG. 6 is a schematic diagram of the overlapping area covering a first target point according to the present invention;
FIG. 7 is a diagram of the relationship between the maximum AN power in different UZ zone radii and the maximum achievable throughput of the system according to the present invention;
FIG. 8 is a diagram of the relationship between the radius of different UZ regions, the deployable region and the maximum achievable throughput of the system provided by the present invention;
fig. 9 is a diagram of the relationship between the upper power bound of AN area with different UZ radii and the effective throughput of the system provided by the present invention.
Detailed Description
The present invention will be described in further detail with reference to specific examples, but the embodiments of the present invention are not limited thereto.
The deployment method of the covert communication system is used for deploying the covert communication system, as shown in figure 1, the covert communication system comprises a sender, a legal receiver and an illegal eavesdropping party, the legal receiver has a deployable area, the illegal eavesdropping party has an uncertain area, and the positions of the sender, the legal receiver and the illegal eavesdropping party form a triangular relation.
The covert communication system structure of the present invention is generally as shown in fig. 1, where a legitimate sender Alice wants to send covert information to a receiver Bob under the supervision of an illegitimate eavesdropper Willie, whose purpose is to detect whether Alice has sent covert information to Bob. Different from the basic model, the legal receiver Bob of the present invention may adopt a full duplex receiver equipped with two antennas, one for receiving Alice's transmitted signal and the other for transmitting interference noise (AN) with a certain power to interfere with Willie's detection process. Compared with the basic model and the model of adding the auxiliary interference node, the covert communication model based on the full-duplex receiver has the following advantages: first, the system does not need to add additional functional nodes to assist communication, thereby optimizing the system structure and reducing the overall implementation difficulty. Second, the AN power can be autonomously controlled and optimized by the full-duplex antenna Bob to facilitate reception of the transmission signal. Third, Bob can mitigate the effect of the AN signal on itself through technical means, such as self-interference cancellation techniques, thereby reducing the overall interference of the system.
In the invention, the two-dimensional Cartesian coordinates corresponding to the nodes Alice, Bob and Willie are respectively expressed as
Figure BDA0003628382560000051
Meanwhile, the distance between Alice and Willie is defined as d aw Defining the distance between Willie and Bob as d bw Defining the distance between Willie and Bob as d bw . Assuming that the channels all follow independent quasi-stationary rayleigh fading channels, the channel coefficients remain unchanged for the length of one time slot and vary independently from time slot to time slot. To simplify the analysis, current research often considers only one of the time slots. Further, let h be the channel coefficient of the fading channel between the communication nodes aw 、h ab 、h bw . Since there is self-interference between Bob's receive and interfering antennas, h is used here bb Representing Bob's self-interference channel coefficients. The application generally sets the transmission power of Alice as P a The power level is known to Bob and Willie. Bob has AN power P b The power level of which is unknown to Willie and P b >>P a . Since the full-duplex receiver can not realize perfect self-interference elimination in practical applicationThis Bob also has some degree of AN self-interference while receiving the transmitted signal. If Alice transmits a concealment signal to Bob, the signal received at Bob is
Figure BDA0003628382560000061
Wherein s is a [·]Represents a standard transmission signal of Alice and satisfies
Figure BDA0003628382560000062
s b [·]Then Bob's standard AN signal strength is indicated and satisfied
Figure BDA0003628382560000063
And alpha is a path loss index, lambda (0 ≦ lambda ≦ 1) represents self-interference cancellation coefficients of different levels, and when lambda is 0, the self-interference cancellation coefficients represent an ideal case that self-interference can be completely cancelled, and when lambda is 1, the self-interference cancellation operation is not performed at all.
The invention mainly discusses the signal detection performance of Willie in the full-duplex concealment system in FIG. 2, and the purpose of Willie is to deduce whether both communication parties are carrying out information transmission, so as to intercept signals for information extraction. Here the station considers a more pessimistic case from the perspective of the legitimate correspondent: willie has strong a priori sensing capability and can know more information of Alice and Bob, such as relative distances between Alice and Bob, channel gain and path exponential factor of each time slot, noise level, and the like. Based on the energy detection principle, Willie compares the received signal r w [n]And making a judgment decision according to the difference between the background noise signal and the self background noise signal. Based on this application, a binary hypothesis testing model is presented, in which the null hypothesis (H) is 0 ) The valid hypothesis (H) indicates that there is no information transfer behavior between Alice and Bob 1 ) Indicating that there is information transmission between Alice and Bob, in which case the received signal of Willie is shown separately
H 0 :
Figure BDA0003628382560000064
H 1 :
Figure BDA0003628382560000065
Wherein v is w [n]So as to make
Figure BDA0003628382560000066
Is a gaussian white noise signal of variance. Assuming that the channels are quasi-stationary rayleigh channels, the application uses the average power statistics over n available channel periods
Figure BDA0003628382560000067
Will characterize the power detection criteria of Willie and will
Figure BDA0003628382560000071
And comparing with a preset threshold to deduce whether the two hypotheses are correct or not. According to the Neyman-Pearson criterion, the optimal decision specification under the condition of the least detection error of the likelihood ratio test can be given, and the formula is shown as follows
Figure BDA0003628382560000072
Where gamma denotes a predetermined power detection threshold, N s Representing the number of samples sampled, at N s In the case of → ∞, i.e. allowing Willie to observe an infinite number of samples, the application can obtain the following approximation
H 0 :
Figure BDA0003628382560000073
H 1 :
Figure BDA0003628382560000074
After the hypothesis testing model is determined, Willie has a false alarm probability and a false negative probability of being
Figure BDA0003628382560000075
Figure BDA0003628382560000076
Thus Willie's probability of false detection can be written as
Figure BDA0003628382560000077
Considering from the viewpoint of an illegal eavesdropper, Willie needs to select a proper power detection threshold gamma to minimize the detection error probability P DE So that the optimal detection threshold gamma is * Can be expressed as
Figure BDA0003628382560000078
As shown in fig. 3, the deployment method of the covert communication system provided by the present invention includes:
s1, obtaining the maximum interference power of the legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
in the invention, a relatively realistic scene is considered: alice and Bob know only Willie randomly distributed within some limited area and do not know its exact location coordinates, which area is referred to herein as Willie's location uncertainty area (UZ). In addition, the application assumes that the location of Alice is fixed in the communication network, and Bob as a mobile full-duplex receiver can autonomously adjust own AN transmission power P in a deployable area (DZ) b And deployment location to achieve better concealment. It is assumed that Alice's location is public and known to Bob and Willie, but Alice and Bob do not know the exact location of Willie. To reach a more intuitive conclusion and simplify subsequent analysis, Willie's UZ is assumed to be one or more
Figure BDA0003628382560000081
As a circle center and has a radius of r w The same probability that Willie may be distributed at any position within the UZ (including the boundary region) is not difficult to see that r is w The larger the position uncertainty of Willie. Therefore, from the perspective of both legitimate communications, Willie's coordinates can be expressed as
Figure BDA0003628382560000082
Figure BDA0003628382560000083
Wherein e is w Indicating the position estimation error. Similarly, the present application assumes that the DZ region of the full-duplex receiver Bob is also one or more
Figure BDA0003628382560000084
As the center of circle, with r b Is a standard circular area of radius. In a particular optimization scenario, Bob's location coordinates may be expressed as
Figure BDA0003628382560000085
Figure BDA0003628382560000086
Wherein e is b Representing Bob's actual deployment location (q) b ) And DZ center position
Figure BDA0003628382560000087
The relative distance therebetween. Similarly, this application will describe
Figure BDA0003628382560000088
Are respectively defined as
Figure BDA0003628382560000089
According to the geometric relation and the triangle inequality relation in the graph, the distance constraint can be obtained by the method
Figure BDA00036283825600000810
Figure BDA00036283825600000811
Figure BDA00036283825600000812
It is assumed here that
Figure BDA00036283825600000813
And
Figure BDA00036283825600000814
the included angle therebetween is theta. In addition, the application refers to the distance within the UZ
Figure BDA00036283825600000815
The nearest position is defined as S 1 Point, distance in UZ
Figure BDA0003628382560000091
The farthest position is defined as S 2 And (4) point. In the system model of the present invention, the mobile full-duplex receiver Bob makes a trade-off between system goodput and concealment performance by varying the deployment location and the AN transmit power. Suppose AN power P of Bob b Is randomly changed among different time slots, and Willie only knows P b Satisfies the following relationship in the Probability Density Function (PDF)
Figure BDA0003628382560000092
Wherein,Σ P =[P U ,P L ]Power Uncertainty Range (PUR). P U ,P L Respectively an upper bound and a lower bound of the power uncertainty range, and satisfies 0 ≦ P L ≤P b ≤P U ≤P bmax Wherein
Figure BDA0003628382560000093
Representing the maximum AN power that Bob's interfering antenna can generate. In addition, the present application assumes Alice's transmitted signal power P a Are fixed and are disclosed by Bob and Willie. In view of the utility of the model in open ground or indoor environments, the present invention mainly analyzes and discusses the problem in the case where α ═ 2.
Willie should satisfy the following formula for its power detection threshold γ in order to minimize from the perspective of optimal detection
Figure BDA0003628382560000094
Satisfying the condition gamma in the above formula can be regarded as the optimal detection threshold gamma * Corresponding to Willie's minimum probability of false detection of
Figure BDA0003628382560000095
From the above equation, it can be seen that the best detection performance of Willie is related to the transmit power of both Alice and Bob when P is a Willie can detect Alice's signaling behavior completely error-free by selection of the optimal threshold → ∞ while P is U On → ∞, it is almost impossible to detect the transmission behavior of the system even under Willie's selection of the optimal threshold. The conclusion also shows that when Alice's transmit power is constant, reasonably increasing Bob's AN power upper bound will reduce Willie's probability of correct detection, thereby facilitating the information transmission behavior of the hidden system. The signal to interference plus noise ratio at Bob can be expressed as
Figure BDA0003628382560000101
In the invention, the connection interruption probability delta is adopted ab The reliability of a legal transmission link is measured by the derivation process of
Figure BDA0003628382560000102
Wherein R is ab Representing a preset transmission rate, C, between Alice and Bob ab Representing the instantaneous channel capacity from Alice to Bob. When C is present ab <R ab When the system transmission is interrupted, reliable transmission of information cannot be guaranteed. In order to simplify the analysis process in the present invention, the present application assumes that there is no channel fading, i.e., h, in the transmission channel described above aw =h abh bw 1. For both sides of legal transmission, when Willie uses the optimal detection threshold gamma * When detecting Alice's signal, the minimum false detection probability is
Figure BDA0003628382560000103
In order to give consideration to the transmission performance and reliability of the system and combine the analysis of the progressive capacity of the system, the method uses the effective throughput eta of a hidden system to measure the performance of a legal transmission link, and at a given pre-transmission rate R ab On the premise that it is given by the following formula
Figure BDA0003628382560000111
Based on the foregoing analysis and description, in order to achieve a reasonable covert communication objective, it is necessary to increase the covert throughput of a legitimate communication link as much as possible under the given covert constraint and under the premise of satisfying the location constraint. The optimization problem of the system can thus be described as
P1:
Figure BDA0003628382560000112
Figure BDA0003628382560000113
Figure BDA0003628382560000114
b∈D1,w∈D2
Wherein the optimization objective is to maximize the system goodput, and the optimization variables are the deployment location and AN power (including P) of Bob U And P L ). Constraint C1 shows the concealment requirements of the system from the worst case in terms of a legitimate transmitter, where ε reflects the stringency of the detection constraints, and smaller ε gives stronger concealment constraints; constraint C2 sets the upper and lower limits of FD receiver interference power,
Figure BDA0003628382560000115
represents the maximum AN power that a full duplex receiver can generate; constraint C3 gives the position distribution areas of Bob and Willie, b and w are the actual position coordinates of Bob and Willie, respectively, D1 represents the deployable area DZ of Bob, and D2 represents the position uncertainty range UZ of Willie. To simplify subsequent analysis, the present application first determines η relative to P L Monotonicity of (2). The application pair eta relates to P L Performing a first-order derivation operation
Figure BDA0003628382560000116
Obviously, η is about P L Is a monotonically decreasing function of (a). Thus, the optimum P to maximize η L Is 0, i.e. the achievable lower PUR bound is 0, so this application applies this conclusion to subsequent analysis and the optimization problem can be re-described as
maximize PU,b {η}
Note that the PUR range at this time is only with P U Related to and following P U Is increased, so that in subsequent analysis, the AN power P is measured b Is equal to P U And (4) optimizing. The method can convert covert communication constraint into distance constraint between Bob and Willie
Figure BDA0003628382560000121
The above formula can be understood as follows: in order to satisfy the concealment of system communication, Bob should be deployed to a position close to Willie, otherwise the AN interference capability would be greatly reduced. By further converting the above formula, the application can obtain P satisfying the concealment constraint from another angle U Range
Figure BDA0003628382560000122
According to the foregoing analysis, the greater the distance between Alice and Willie, the less easily the communication process is detected, and therefore P needs to be set U The smaller the value. The larger the distance between Bob and Willie, the smaller the coverage area covered by the AN interference, and the larger the interference uncertainty existing in the communication process, so that a larger AN interference power needs to be set to realize reliable communication.
S2, determining the concealment feasible region of the legal receiver according to the maximum interference power and the uncertain region;
as an alternative embodiment of the present invention, S2 includes:
s21: taking the central point of the uncertain area as the virtual position of the illegal eavesdropper;
s22: calculating the maximum radius of a hidden feasible region according to the transmitting power of a sender, the distance between the sender and the virtual position and the maximum interference power of a legal receiver;
s23: and determining the hidden feasible region by taking the virtual position as a circle center and the maximum radius as the original radius.
The maximum radius of the covert feasibility region is expressed as:
Figure BDA0003628382560000131
wherein r is CE Maximum radius, P, representing the hidden feasible region bmax Representing the maximum interference power, P a Indicating the transmission power of the sender, d aw Indicating the distance of the sender from an illegal eavesdropper and epsilon indicating the severity of the detection constraint.
S3, determining an overlapping area of the hidden feasible area and the deployable area;
to simplify subsequent proof of analysis, the present application describes the detection problem from the perspective of Willie, first defined such that
Figure BDA0003628382560000132
Obtaining d under equal conditions bw Is r CE And assume that Willie is the center of circle and r is the center of circle CE The standard circular area of radius is the Covert-enabler zone (CEZ). It will be appreciated that both the blind and power constraints may be satisfied when Bob's deployment location is within the CEZ. Furthermore, in view of the location constraints discussed above, the present application defines the coverage portion of both the covert feasible region and the deployable region collectively as an covert overlap region (OZ), and when Bob's deployment location is within OZ, the system can achieve forward covert throughput while satisfying the covert constraints. On this basis, if there is an overlapping zone OZ between CEZ and DZ, the application defines S N The point is the intersection of the lower half parts of the CEZ and the DZ, and S is defined M The point is the intersection of the upper halves of the CEZ and DZ. From the random geometric relationships, one can derive
Figure BDA0003628382560000133
Thus P can be further reduced U Is converted into
Figure BDA0003628382560000134
Then, the eta relative to P is determined U Monotonicity of (2). Pair formula (about P) U The first-order derivation operation is carried out by
Figure BDA0003628382560000141
Similar to the above demonstration process, it can be seen that η is related to P U Is a monotonically decreasing function of (a). Therefore when
Figure BDA0003628382560000142
When the data is isochronous, the effective concealment throughput η of the system can be maximized as follows
Figure BDA0003628382560000143
It can be seen that for a set of predetermined d aw 、R ab And P a ,η * Only by the distance d between Alice and Bob ab A function of correlation, and d ab The larger the system the less efficient concealment throughput can be achieved. Subsequently, the present application addresses the above formula for d ab Performing a first-order derivation operation to obtain
Figure BDA0003628382560000144
Wherein the content of the first and second substances,
Figure BDA0003628382560000145
as the formula describes, η is a constant independent of η. The application then masks the throughput maximum η for effective concealment * With respect to d ab Performing a second-order derivation operation, and obtaining the result by the same way
Figure BDA0003628382560000146
Easily obtain eta * Is about d ab Is a monotonically decreasing function of (a).
S4, searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
as an optional embodiment of the present invention, before determining the overlapping area of the hidden feasible area and the deployable area, the method further includes:
step a: determining a first target position point closest to a sender on the boundary of the deployable area according to the central position point of the deployable area and the position point of the sender;
step b: and determining a second target position point closest to the sender on the boundary of the hidden feasible region according to the central position point of the hidden feasible region and the position point of the sender.
As an optional implementation manner of the present invention, finding a location point closest to a sender in an overlap area as an optimal deployment point of a legal recipient includes:
s41, judging whether the overlapping area covers the first target position point, if so, determining the first target position point as the optimal deployment point of the legal receiver;
s42, if not, determining the second target location point as the optimal deployment point for the legitimate recipient.
When the second target position point is the optimal deployment point, the optimal interference power is the maximum interference power; when the first target location point is the optimal deployment point, the optimal interference power is expressed as:
Figure BDA0003628382560000151
wherein, P a Which indicates the transmission power of the transmitting side,
Figure BDA0003628382560000152
representing the mean value of the distances, r, between a legitimate receiver and an illegitimate eavesdropper w Radius representing the uncertainty area, r b A radius representing an illegal eavesdropper,
Figure BDA0003628382560000153
representing the average of the distance of the sender from the legitimate receiver,
Figure BDA0003628382560000154
representing the average of the distances between the sender and the illegal eavesdropper, and epsilon represents the strictness of the detection constraint.
Considering from the perspective of both legitimate communication parties, the optimal deployment position of Bob is located at the closest point to Alice within DZ, and for the convenience of later analysis and verification, the application assumes that Alice and Bob know the accurate distribution position of Willie, that is, Alice and Bob know
Figure BDA0003628382560000155
Since the range relationship between CEZ and OZ is not clear, the present application discusses the classification of the size of the range of its region.
Case 1: CEZ and DZ do not overlap with each other, i.e. no OZ is present.
This situation is illustrated in fig. 4. From the geometrical relationships in FIG. 4, it can be seen that
Figure BDA0003628382560000156
This means that Bob cannot find a deployment point in the deployable region that satisfies the concealment constraint, i.e., forward system effective concealment throughput cannot be achieved regardless of Bob's deployment anywhere in the DZ. According to the hidden constraint condition
Figure BDA0003628382560000161
The present application is hereby given the following definitions
Figure BDA0003628382560000162
It is clear that, in one possible covert communication system,
Figure BDA0003628382560000163
should be greater than P 1 Can ensure system dataThe validity of the transmission process.
Case 2: the overlapping region OZ exists between CEZ and DZ, but S Q The dots are not inside the OZ.
This situation is illustrated in fig. 5. Bob can be in
Figure BDA0003628382560000164
On the premise of finding a deployment position meeting the concealment constraint in the DZ, and meanwhile, the system can also have forward concealment throughput. On the other hand, due to S N The point is the closest position to Alice within OZ, S M The point is the farthest position from Alice within OZ, so Bob' S best deployment position is at S N And (4) point. It is clear that the coverage of CEZ follows S N Is increased, and then S is increased N The point will follow S N Along the boundary of DZ to S N The point moves until the two coincide, at which time r at the critical position CE Can be expressed as
Figure BDA0003628382560000165
Therefore, when S is N And S Q At the time of coincidence, of
Figure BDA0003628382560000166
Is also a critical value of considerable importance, for the purposes of this application P 2 To indicate this time
Figure BDA0003628382560000167
It is expressed as follows
Figure BDA0003628382560000168
Case 3: the overlapping region OZ, S exists between CEZ and DZ Q The points are located inside the OZ.
This situation is illustrated in fig. 6. In that
Figure BDA0003628382560000169
Precondition of (2)Next, Bob can find a deployment location within the DZ that satisfies the concealment constraint, while the system can also achieve forward concealment throughput. At this time, since S Q The point is the closest position to Alice within OZ and S P The point is the farthest position from Alice within OZ, so Bob' S best deployment position is at S Q And (4) point.
In combination with the above three cases, the present application can draw the following conclusions: optimal deployment of Bob depends on the maximum achievable AN power of the interfering antennas
Figure BDA0003628382560000171
Based on the foregoing analysis, the present application will
Figure BDA0003628382560000172
Substituting the formula into the formula, when the inequality equal condition is satisfied, the AN power P corresponding to the optimal deployment position can be calculated U The value is obtained. However, the analysis is based on the fact that Willie is accurately known, and on the premise that Willie position uncertainty is considered, the method needs to expand the conclusion according to a single-stage classical robust optimization principle to obtain d aw And d bw Worst case conservative value
Figure BDA0003628382560000173
Figure BDA0003628382560000174
The present application can understand the above conclusions: in order to obtain the function parameters of the optimization objective when Willie position is uncertain, Alice and Bob are required to consider the worst case from the respective viewpoints. Willie is at S if analyzed from Alice' S perspective 1 The point-time is the worst case because Willie can optimally detect the transmission link at the closest location to Alice. But analysis from Bob' S perspective, Willie is at S 2 The point-time is the worst case because of S 2 The point is the farthest position from Bob within the UZ,the AN interference can be avoided to the maximum extent. Although the two position relations cannot be satisfied at the same time, the method has important guiding value in optimizing performance analysis.
S5, determining the best interference power of the legal receiver according to the distance between the sender and the best deployment point;
corresponding optimization when the system obtains maximum throughput
Figure BDA0003628382560000175
Is given by the following formula
Figure BDA0003628382560000176
Wherein
Figure BDA0003628382560000181
Figure BDA0003628382560000182
The optimal interference power of the legal receiver can be calculated according to the transmitting power of the sender, the distance between the receiver and the virtual position of the illegal eavesdropper and the distance between the sender and the virtual position of the illegal eavesdropper.
S6, calculating the best throughput according to the best deployment point and the best interference power;
wherein the maximum throughput is expressed as:
Figure BDA0003628382560000183
wherein R is ab Representing a given pre-transmission rate, λ represents self-interference cancellation coefficients of different levels, λ being 0 represents an ideal case where self-interference can be completely cancelled, λ being 1 represents no self-interference cancellation operation at all, and σ represents no self-interference cancellation operation at all b Representing the Gaussian white noise signal of the channel at BobThe variance of the sign,. Theta denotes a vector
Figure BDA0003628382560000184
And
Figure BDA0003628382560000185
the included angle therebetween.
By the above analysis, the throughput maximum η is effectively concealed * Formula (ii) and d aw And d bw In the worst case conservative value formula, the following conclusions can be obtained:
Figure BDA0003628382560000186
wherein eta is N And η N Respectively represent Bob to be deployed at S N Dot sum S Q System goodput at point. The range size of the CEZ and due to the power setting
Figure BDA0003628382560000191
Showing a positive correlation. When in use
Figure BDA0003628382560000192
When the system is in the OZ, Bob cannot find a deployment position meeting the concealment condition in the OZ, so that the effective concealment throughput of the system is 0; when in use
Figure BDA0003628382560000193
There is an overlapping zone OZ between CEZ and DZ, where Bob' S optimal deployment location is S within OZ, closest to Alice N Point, if P at this time U Value equal to
Figure BDA0003628382560000194
The system can achieve maximum effective throughput; when in use
Figure BDA0003628382560000195
There is an overlapping zone OZ between CEZ and DZ, where Bob' S optimal deployment location is S within OZ, closest to Alice Q Point of whenP U Size equal to P 2 The system can achieve maximum goodput.
And S7, deploying the legal receiver at the optimal deployment position, so that the legal receiver transmits an interference signal interfering the illegal eavesdropping party according to the optimal interference power, and the transmission with the optimal throughput is realized with the sender.
The effect of the invention is verified through simulation.
Referring to fig. 7, 8 and 9, fig. 7 is a graph of maximum AN power in different UZ zone radii versus maximum achievable throughput of the system; FIG. 8 is a diagram of the relationship between the radius of a different UZ region, the deployable region and the maximum achievable throughput of the system; fig. 9 is a graph of the power upper bound of AN area with different UZ areas and the effective throughput of the system.
The simulation results show that: the concealment optimization strategy provided by the invention can ensure that the system can still keep effective concealment transmission even if the eavesdropper is in the best detection condition. The reliability of the concealment system under the condition of resisting uncertain factors of extreme scenes is improved, and the analysis result has wider applicability.
The invention provides a deployment method, a deployment device and a storage medium of a covert communication system, which are used for acquiring the maximum interference power of a legal receiver under the condition that the position of an illegal eavesdropper is uncertain; determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region; determining an overlapping area of the hidden feasible area and the deployable area; searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver; determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point; calculating optimal throughput jointly by the optimal deployment point and the optimal interference power; and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power to realize the maximization of the legal transmission effective throughput of the system and finish transmission in the shortest time to improve the security of covert communication.
In a second aspect, the present invention provides a deployment apparatus for a covert communication system, configured to deploy the covert communication system, where the covert communication system includes a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable region, the illegal eavesdropper has an uncertain region, and positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relationship, and the deployment apparatus includes:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
the feasible region determining module is used for determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
the overlapping area determining module is used for determining the overlapping area of the hidden feasible area and the deployable area;
the deployment point searching module is used for searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and the transmission of the optimal throughput is realized with the sender.
In a third aspect, the present invention provides a storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the deployment method of the first aspect.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. A deployment method of a covert communication system is used for deploying the covert communication system, the covert communication system comprises a sender, a legal receiver and an illegal eavesdropper, the legal receiver has a deployable area, the illegal eavesdropper has an uncertain area, and the positions of the sender, the legal receiver and the illegal eavesdropper form a triangular relation, and the deployment method comprises the following steps:
acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
determining a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
determining an overlapping area of the covert feasible area and a deployable area;
searching a position point closest to the sender in the overlapping area as an optimal deployment point of a legal receiver;
determining the optimal interference power of a legal receiver according to the distance between a sender and an optimal deployment point;
calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission of the optimal throughput with the sender.
2. The deployment method of claim 1 wherein the determining the blind feasible region for the legitimate receiver according to the maximum interference power and the uncertain region comprises:
taking the central point of the uncertain area as the virtual position of the illegal eavesdropper;
calculating the maximum radius of a hidden feasible region according to the transmitting power of a sender, the distance between the sender and the virtual position and the maximum interference power of a legal receiver;
and determining a hidden feasible region by taking the virtual position as a circle center and the maximum radius as an original radius.
3. The deployment method of claim 2 wherein the maximum radius of the covertly feasible region is expressed as:
Figure FDA0003628382550000021
wherein r is CE Maximum radius, P, representing the hidden feasible region bmax Representing the maximum interference power, P a Indicating the transmission power of the sender, d aw Indicating the distance of the sender from an illegal eavesdropper and epsilon indicating the severity of the detection constraint.
4. The method of deployment of claim 1, wherein prior to said determining the area of overlap of the covertly available area and the deployable area, the method further comprises:
determining a first target position point closest to a sender on the boundary of the deployable area according to the central position point of the deployable area and the position point of the sender;
and determining a second target position point closest to the sender on the boundary of the hidden feasible region according to the central position point of the hidden feasible region and the position point of the sender.
5. The deployment method of claim 4, wherein finding the location point closest to the sender in the overlap area as the best deployment point for the legitimate receiver comprises:
judging whether the overlapping area covers the first target position point, and if so, determining the first target position point as the optimal deployment point of a legal receiver;
if not, the second target location point is determined to be the best deployment point for the legitimate recipient.
6. The deployment method of claim 5, wherein the determining the optimal interference power of the legal receiver according to the distance between the sender and the optimal deployment point comprises:
and calculating the optimal interference power of the legal receiver according to the transmitting power of the sender, the distance between the receiver and the virtual position of the illegal eavesdropper and the distance between the sender and the virtual position of the illegal eavesdropper.
7. The deployment method of claim 6,
when the second target position point is the optimal deployment point, the optimal interference power is the maximum interference power;
when the first target location point is the optimal deployment point, the optimal interference power is expressed as:
Figure FDA0003628382550000031
wherein, P a Which indicates the transmission power of the transmitting side,
Figure FDA0003628382550000032
representing the mean value of the distances, r, between a legitimate receiver and an illegitimate eavesdropper w Radius representing the uncertainty area, r b A radius representing an illegal eavesdropper,
Figure FDA0003628382550000033
representing the average of the distance of the sender from the legitimate receiver,
Figure FDA0003628382550000034
representing the average of the distances between the sender and the illegal eavesdropper, and epsilon represents the strictness of the detection constraint.
8. The deployment method of claim 7 wherein the maximum throughput is expressed as:
Figure FDA0003628382550000035
wherein R is ab Representing a given pre-transmission rate, λ represents self-interference cancellation coefficients of different levels, λ being 0 represents an ideal case where self-interference can be completely cancelled, λ being 1 represents no self-interference cancellation operation at all, and σ represents no self-interference cancellation operation at all b Represents the variance of the Gaussian white noise signal of the channel at Bob, and theta represents the vector
Figure FDA0003628382550000036
And
Figure FDA0003628382550000037
the included angle therebetween.
9. A deployment device of a covert communication system, for deploying the covert communication system, the covert communication system comprising a sender, a legal receiver and an illegal eavesdropper, the legal receiver having a deployable area, the illegal eavesdropper having an uncertain area, the positions of the sender, the legal receiver and the illegal eavesdropper forming a triangular relationship, the deployment device comprising:
the power acquisition module is used for acquiring the maximum interference power of a legal receiver;
the maximum interference power is the power of an illegal eavesdropper interfered by a signal transmitted by a legal receiver antenna;
a feasible region determining module, configured to determine a hidden feasible region of a legal receiver according to the maximum interference power and the uncertain region;
an overlapping area determining module, configured to determine an overlapping area between the hidden feasible area and the deployable area;
a deployment point searching module for searching the position point nearest to the sender in the overlapping area as the optimal deployment point of the legal receiver;
the optimal interference power determining module is used for determining the optimal interference power of a legal receiver according to the distance between the sender and the optimal deployment point;
the optimal throughput calculation module is used for calculating the optimal throughput according to the optimal deployment point and the optimal interference power;
and the deployment module is used for deploying the legal receiver at the optimal deployment position so that the legal receiver transmits an interference signal interfering the illegal eavesdropper according to the optimal interference power and realizes the transmission with the optimal throughput with the sender.
10. A storage medium, characterized in that a computer program is stored in the storage medium, which computer program, when being executed by a processor, carries out the steps of the deployment method according to any one of claims 1-8.
CN202210482483.8A 2022-05-05 2022-05-05 Deployment method, deployment device and storage medium of covert communication system Pending CN114884607A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210482483.8A CN114884607A (en) 2022-05-05 2022-05-05 Deployment method, deployment device and storage medium of covert communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210482483.8A CN114884607A (en) 2022-05-05 2022-05-05 Deployment method, deployment device and storage medium of covert communication system

Publications (1)

Publication Number Publication Date
CN114884607A true CN114884607A (en) 2022-08-09

Family

ID=82674560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210482483.8A Pending CN114884607A (en) 2022-05-05 2022-05-05 Deployment method, deployment device and storage medium of covert communication system

Country Status (1)

Country Link
CN (1) CN114884607A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800367B1 (en) * 2017-02-14 2017-10-24 Macau University Of Science And Technology Anti-eavesdropping shelter for protection of wireless communication
CN111328079A (en) * 2020-02-25 2020-06-23 大连理工大学 Multi-antenna covert communication method for movable eavesdropper
CN114071468A (en) * 2021-11-16 2022-02-18 西北工业大学 Ground mobile interference method and device for preventing aerial eavesdropping attack

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800367B1 (en) * 2017-02-14 2017-10-24 Macau University Of Science And Technology Anti-eavesdropping shelter for protection of wireless communication
CN111328079A (en) * 2020-02-25 2020-06-23 大连理工大学 Multi-antenna covert communication method for movable eavesdropper
CN114071468A (en) * 2021-11-16 2022-02-18 西北工业大学 Ground mobile interference method and device for preventing aerial eavesdropping attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RUI XU等: "Robust Power and Position Optimization for the Full-Duplex Receiver in Covert Communication", 《2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)》, 2 February 2022 (2022-02-02), pages 2 - 5 *

Similar Documents

Publication Publication Date Title
KR101469659B1 (en) Method for controlling random access for the efficient sensing of the cooperative spectrum in a cognitive radio-based frequency resource sharing system
US8838162B2 (en) Power control method in cognitive radio communication, cognitive radio communication system, and radio communication device
US9628996B2 (en) Spectrum sensing apparatus and method for cooperative cognitive radio network in non-gaussian noise environment, and fusion center apparatus and cooperative cognitive radio system using the same
US11330434B2 (en) Security detection for a physical layer authentication system that considers signal-discriminating capability of an active adversary
Zarrin et al. Belief propagation on factor graphs for cooperative spectrum sensing in cognitive radio
CN109168166A (en) The safety detecting method of physical layer Verification System
Viswanathan et al. A review of sensing and distributed detection algorithms for cognitive radio systems
Liu et al. Wireless jamming localization by exploiting nodes’ hearing ranges
Ahsant et al. A review of cooperative spectrum sensing in cognitive radios
Xu et al. Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework
CN113472463A (en) Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network
CN109861784A (en) Full duplex receiver covert communications implementation method based on channel distribution information
CN111065070B (en) Cooperative millimeter wave frequency spectrum sensing method in cognitive Internet of vehicles
CN114884607A (en) Deployment method, deployment device and storage medium of covert communication system
CN115442829A (en) Selection and transmission power optimization method for hidden communication network jammer
Viswanathan Cooperative spectrum sensing for primary user detection in cognitive radio
Xu et al. Robust power and position optimization for the full-duplex receiver in covert communication
Hassan et al. Predicted eigenvalue threshold based spectrum sensing with correlated multiple-antennas
Bi et al. Deep reinforcement learning for IRS-assisted UAV covert communications
Wang et al. Blind spectrum sensing by information theoretic criteria
Liang et al. OAM-based hybrid-duplex cognitive frequency hopping
KR101380397B1 (en) Apparatus for cognitive radio and method thereof
Li et al. High-diversity cooperative spectrum sensing in cognitive radio networks
CN118250717A (en) Method for maximizing energy efficiency in antenna re-radiated covert communication system
Ammar et al. Detection Threats and Mitigation Techniques in Cognitive Radio based on Localization of Signal Source and Trustworthiness

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination