CN116017465A - RIS-based auxiliary wireless communication secret rate maximization model and method - Google Patents
RIS-based auxiliary wireless communication secret rate maximization model and method Download PDFInfo
- Publication number
- CN116017465A CN116017465A CN202211680905.9A CN202211680905A CN116017465A CN 116017465 A CN116017465 A CN 116017465A CN 202211680905 A CN202211680905 A CN 202211680905A CN 116017465 A CN116017465 A CN 116017465A
- Authority
- CN
- China
- Prior art keywords
- ris
- base station
- wireless communication
- beamforming vector
- vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000005457 optimization Methods 0.000 claims description 16
- 239000011159 matrix material Substances 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000010363 phase shift Effects 0.000 claims description 7
- 239000000654 additive Substances 0.000 claims description 6
- 230000000996 additive effect Effects 0.000 claims description 6
- 238000000354 decomposition reaction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a security rate maximization model and a security rate maximization method based on RIS auxiliary wireless communication, wherein the method comprises the following steps: calculating the received power of legal users and eavesdroppers, and calculating the signal-to-interference-and-noise ratio of the legal users and the eavesdroppers by utilizing the obtained received power and combining distortion noise caused by hardware damage; obtaining the reachable rates of legal users and eavesdroppers according to the signal-to-interference-and-noise ratio, and establishing a wireless communication secret rate maximization model; fixing RIS passive beam forming vector to optimize active beam forming vector of base station; the fixed base station active beamforming vector optimizes the RIS passive beamforming vector; and (3) introducing the optimized base station active beam forming vector and the RIS passive beam forming vector into a system security rate maximization model, and calculating to obtain a maximum security rate value. The RIS-assisted wireless communication secret rate maximization model and the RIS-assisted wireless communication secret rate maximization method can reduce hardware implementation difficulty and improve secret rate of a system.
Description
Technical Field
The invention relates to the technical field of wireless communication physical layer security, in particular to a RIS-assisted wireless communication secret rate maximization model and a method.
Background
The intelligent super surface (Reconfigurable Intelligence Surface, RIS) is an artificial electromagnetic surface structure with programmable electromagnetic characteristics, and is formed by arranging a large number of carefully designed electromagnetic units, the electromagnetic properties of the electromagnetic units can be dynamically regulated and controlled through a control circuit, the intelligent reconstruction of the wireless signal propagation characteristics in a three-dimensional space is realized, and the limitation of passive adaptation of the traditional wireless environment is further broken through. The intelligent super-surface is used as a basic innovation technology, has the advantages of low cost, low power consumption and easy deployment, and the application scene comprises deterministic wireless transmission, wireless coverage blind supplement, wireless coverage expansion, wireless system capacity enhancement, special scene coverage of indoor carriages and the like.
The dominant aspect of RIS-assisted wireless communication at present, especially in terms of suppressing the eavesdropper rate by taking noise into account, is to suppress the eavesdropper rate of an eavesdropper by introducing artificial noise at the base station side. However, the conventional RIS-assisted wireless communication system is still in a start-up phase in consideration of hardware damage, and the current RIS-assisted wireless communication system is still in a start-up phase, and a situation of large-scale implementation does not occur, even though a large number of conventional methods have been applied to the wireless communication system to improve the privacy rate, a satisfactory result has not been obtained yet.
In recent years, in the article of expert, the rate of an eavesdropper is basically restrained by a method of introducing artificial noise into a base station side, so that the confidentiality rate of the whole wireless communication system is improved, and the complexity of hardware implementation is increased due to the introduction of the artificial noise, so that the energy consumption of the system is increased. Meanwhile, the established optimization problem constraint is increased, and the complexity of solving the optimization problem is increased.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a RIS-based auxiliary wireless communication security rate maximization model and a RIS-based auxiliary wireless communication security rate maximization method which can reduce hardware implementation difficulty and improve security rate of a system.
In order to solve the problems, the technical scheme of the invention is as follows:
a security rate maximization model based on RIS auxiliary wireless communication, which is applied to a RIS auxiliary wireless communication system, the system comprises a base station provided with M antennas, an RIS comprising N reflecting units, one legal user and K eavesdroppers, wherein the base station transmits a reflected signal to the legal user through the RIS to prevent eavesdroppers from eavesdropping,base station to RIS channel matrixThe channels from the base station to the legal user and the kth eavesdropper are +.>Andthe RIS channel to legal user and kth eavesdropper is +.> and />The transmission signals of the base station are: x=fs+m t Where s represents a secret independent Gaussian signal and satisfies E [ |s| | ] 2 ]=1,/>For the beamforming vector of the base station,>for independent gaussian emission distortion noise, the signal received by a legitimate user is expressed as: /> wherein ,/> Representing a complex additive white gaussian noise at a legitimate user, m U For independent zero-mean gaussian distortion noise at legitimate users, the signal received by an eavesdropper is represented as: /> wherein ,/>Representing Additive White Gaussian Noise (AWGN) at the eavesdropper, the signal-to-interference-and-noise ratios at the legitimate user and the kth eavesdropper are expressed as:
preferably, the achievable rates of the legitimate user and the kth eavesdropper are expressed as: r is R U =log 2 (1+γ U) and
preferably, under the condition of maximum transmitting power constraint of the base station and RIS phase shift unit mode constraint, the active beam forming vector at the base station and the passive beam forming vector at the RIS are jointly optimized, so that the confidentiality rate is maximized, and the optimization expression formula is as follows: wherein ,Pmax Is the maximum transmit power at the base station.
Further, the invention also provides a security rate maximizing method based on RIS auxiliary wireless communication, which comprises the following steps:
calculating the received power of legal users and eavesdroppers, calculating the signal-to-interference-plus-noise ratio of the legal users and the eavesdroppers and the reachable rate of the eavesdroppers by utilizing the obtained received power and combining the distortion noise caused by hardware damage, and establishing a wireless communication confidentiality rate maximization model;
fixing RIS passive beam forming vector to optimize active beam forming vector of base station;
the fixed base station active beamforming vector optimizes the RIS passive beamforming vector;
and (3) introducing the optimized base station active beam forming vector and the RIS passive beam forming vector into a system security rate maximization model, and calculating to obtain a maximum security rate value.
Preferably, the signal-to-interference-and-noise ratio at the legitimate user and the kth eavesdropper is expressed as:
preferably, the achievable rates at the legitimate user and the kth eavesdropper can be expressed as: r is R U =log 2 (1+γ U) and establishing a secret rate maximization model by using the obtained rate, the total transmission power of the base station and the constraint of the RIS phase shift unit mode: /> wherein ,Pmax Is the maximum transmit power at the base station.
Preferably, the step of optimizing the base station active beamforming vector by the fixed RIS passive beamforming vector specifically includes: optimizing the base station active beamforming vector for any given RIS passive beamforming vector can be translated into:
s.t.f H f≤P max
the problem is simplified into by applying a semi-definite relaxation method:
s.t. Tr(F)≤P max ,F±0
obtaining optimal F:s.t.Tr(F)≤P max f+/-0, and effectively solving by introducing a relaxation variable and adopting a convex optimization solver CVX.
Preferably, the step of optimizing the RIS passive beamforming vector by the fixed base station active beamforming vector specifically includes: optimizing the RIS passive beamforming vector for any given base station active beamforming vector can be translated into:
s.t. |v n |=1,n=1,...,N
the problem is simplified into by applying a semi-definite relaxation method:
s.t. V±0,V n,n =1,n=1,…,N+1
By introducing a relaxation variable and adopting a convex optimization solver CVX, effective solving is carried out.
Preferably, the step of introducing the optimized active beamforming vector of the base station and the RIS passive beamforming vector into a system security rate maximization model to calculate a maximum security rate value specifically includes: and (3) bringing the optimized base station active beam forming vector f and the RIS passive beam forming vector v into a system security rate maximization model, calculating to obtain a maximum security rate value, and analyzing the complexity of the overall algorithm.
Preferably, the complexity of the overall algorithm is: o (L) 3 (L 1 max{M,K} 4 M 1/2 +L 2 max{N,K} 4 N 1/2 ) And), wherein L 1 Representing the number of iterations to solve the active beamforming problem of the base station, L 2 Representing the number of iterations to solve the RIS passive beamforming problem, L 3 Representing the number of iterations of the overall algorithm.
Compared with the prior art, the invention provides a novel RIS-assisted wireless communication security rate maximization model and method based on distortion noise caused by RIS and hardware damage, and the maximum security rate is obtained by adopting an alternate optimization method to jointly optimize the active beamforming vector of the base station and the passive beamforming vector of the RIS, so that the hardware implementation difficulty is reduced, and the security rate of the system is improved.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, given with reference to the accompanying drawings in which:
FIG. 1 is a schematic diagram of a RIS assisted wireless communication system according to an embodiment of the present invention;
fig. 2 is a flowchart of a security rate maximizing method based on RIS-assisted wireless communication according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the present invention, and will make the technical solution of the present invention and its advantageous effects obvious.
Specifically, fig. 1 is a schematic diagram of an RIS-assisted wireless communication system according to an embodiment of the present invention, where the system includes a base station equipped with M antennas, an RIS including N reflection units, a legal user, and K eavesdroppers, as shown in fig. 1. The base station equipped with M antennas transmits the reflected signals to legal users through RIS, preventing eavesdroppers from eavesdropping. Base station to RIS channel matrixThe channels from the base station to the legal user and the kth eavesdropper are +.> and />The RIS channel to legal user and kth eavesdropper is +.> and />
Considering hardware impairments at the base station and at the legitimate user, the signal received by the legitimate user can be expressed as: wherein ,/> Representing a complex additive Gaussian white noise at the legal user, the variance of the noise being +.>m U Representing independent zero-mean gaussian distortion noise at the legitimate user.
the signal received by the kth eavesdropper can be expressed as: wherein ,representing Additive White Gaussian Noise (AWGN) at an eavesdropper with a noise variance of +.>
The signal-to-interference-and-noise ratio (SINR) at the legitimate user and the kth eavesdropper can be expressed as:
then the achievable rates at the legitimate user and the kth eavesdropper can be expressed as: r is R U =log 2 (1+γ U) and
and establishing a confidentiality rate maximization model by using the obtained rate, the total transmission power of the base station and the constraint of the RIS phase shift unit mode.
The optimization problem can be expressed specifically as: wherein ,Pmax Is the maximum transmit power at the base station.
Fig. 2 is a flowchart of a security rate maximizing method based on RIS-assisted wireless communication according to an embodiment of the present invention, as shown in fig. 2, where the method includes the following steps:
s1: calculating the received power of legal users and eavesdroppers, and calculating the signal-to-interference-and-noise ratio of the legal users and the eavesdroppers by utilizing the obtained received power and combining distortion noise caused by hardware damage;
specifically, the receiving power of the legal user is calculated according to the transmitting power of the base station, the channel matrix from the base station to the RIS and the channel matrix from the RIS to the legal user, the receiving power of the eavesdropper is calculated according to the transmitting power of the base station, the channel matrix from the base station to the RIS and the channel matrix from the RIS to the eavesdropper, and the signal-to-interference-and-noise ratio of the legal user and the eavesdropper is calculated by utilizing the obtained receiving power and combining distortion noise caused by hardware damage.
The signal-to-interference-and-noise ratio (SINR) at the legitimate user and the kth eavesdropper can be expressed as:
s2: obtaining the reachable rates of legal users and eavesdroppers according to the signal-to-interference-and-noise ratio, and establishing a wireless communication secret rate maximization model;
in particular, the achievable rates at the legitimate user and the kth eavesdropper can be expressed as: r is R U =log 2 (1+γ U) and and establishing a confidentiality rate maximization model by using the obtained rate, the total transmission power of the base station and the constraint of the RIS phase shift unit mode.
The optimization problem can be expressed specifically as: wherein ,Pmax Is the maximum transmit power at the base station. />
S3: fixing RIS passive beam forming vector to optimize active beam forming vector of base station;
specifically, optimizing the base station active beamforming vector f for any given RIS passive beamforming vector v, the problem can be expressed as:
s.t.f H f≤P max
by applying the semi-definite relaxation method, the problem can be reduced to:
s.t.Tr(F)≤P max ,F±0
wherein f=ff H . According to solving equationsObtained->The maximum and Sion's minimum max theorem converts the optimization problem described above into: />For a given F, the optimal closed-loop solution can be expressed as:
for solving the above problemsThe following problems are brought in, an optimal F can be obtained,by introducing relaxation variables and using a convex optimization solver CVX, an efficient solution can be made. F can be recovered by eigenvalue decomposition if the rank of F is 1, otherwise F is recovered by gaussian randomization.
S4: the fixed base station active beamforming vector optimizes the RIS passive beamforming vector;
specifically, optimizing the RIS passive beamforming vector v for any given base station active beamforming vector f, the problem can be expressed as:
s.t. |v n |=1,n=1,...,N
wherein , indicating any phase rotation. By applying the semi-definite relaxation method, the problem can be reduced to:
s.t. V±0,V n,n =1,n=1,…,N+1
wherein v=vv. According to solving equationsObtained->The maximum and Sion's minimum max theorem converts the optimization problem described above into: />
For a given V, the optimal closed-loop solution can be expressed as:
for solving the above problemsThe following problems are brought in, and an optimum V can be obtained.
By introducing relaxation variables and using a convex optimization solver CVX, an efficient solution can be made. V can be recovered by eigenvalue decomposition if the rank of V is 1, otherwise V is recovered by gaussian randomization.
S5: and (3) introducing the optimized base station active beam forming vector and the RIS passive beam forming vector into a system security rate maximization model, and calculating to obtain a maximum security rate value.
Specifically, the optimized base station active beam forming vector f and RIS passive beam forming vector v are brought into a system security rate maximization model, so that a maximum security rate value can be calculated, and finally, complexity analysis of an overall algorithm is carried out.
The complexity of the overall algorithm is: o (L) 3 (L 1 max{M,K} 4 M 1/2 +L 2 max{N,K} 4 N 1/2 ) And), wherein L 1 Representing the number of iterations to solve the active beamforming problem of the base station, L 2 Representing the number of iterations to solve the RIS passive beamforming problem, L 3 Representing the number of iterations of the overall algorithm.
In summary, the invention provides a new security rate maximization model and method based on RIS auxiliary wireless communication based on distortion noise caused by RIS and hardware damage, and the maximum security rate is obtained by adopting an alternate optimization method to jointly optimize the active beamforming vector of the base station and the passive beamforming vector of the RIS, thereby reducing hardware realization difficulty and improving security rate of the system.
The foregoing describes specific embodiments of the present invention. It is to be understood that the invention is not limited to the particular embodiments described above, and that various changes or modifications may be made by those skilled in the art within the scope of the appended claims without affecting the spirit of the invention. The embodiments of the present application and features in the embodiments may be combined with each other arbitrarily without conflict.
Claims (10)
1. A security rate maximization model based on RIS auxiliary wireless communication is applied to a RIS auxiliary wireless communication system, the system comprises a base station provided with M antennas, RIS containing N reflecting units, one legal user and K eavesdroppers, and is characterized in that the base station transmits reflected signals to the legal users through the RIS to prevent eavesdroppers from eavesdropping, and a channel matrix from the base station to the RIS is thatThe channels from the base station to the legal user and the kth eavesdropper are +.>Andthe RIS channel to legal user and kth eavesdropper is +.> and />The transmission signals of the base station are: x=fs+m t Where s represents a secret independent Gaussian signal and satisfies E [ |s| | ] 2 ]=1,/>For the beamforming vector of the base station,>is independent ofGaussian emission distortion noise, and a signal received by a legal user is expressed as: /> wherein , representing a complex additive white gaussian noise at a legitimate user, m U For independent zero-mean gaussian distortion noise at legitimate users, the signal received by an eavesdropper is represented as: /> wherein ,/>Representing Additive White Gaussian Noise (AWGN) at the eavesdropper, the signal-to-interference-and-noise ratios at the legitimate user and the kth eavesdropper are expressed as:
3. the RIS-assisted wireless communication privacy rate maximization model of claim 2, wherein the active beamforming vector at the base station and the passive beamforming vector at the RIS are jointly optimized under the conditions of the maximum transmit power constraint and the RIS phase shift unit mode constraint of the base station to maximize the privacy rate, and the optimization expression is: wherein ,Pmax Is the maximum transmit power at the base station.
4. A method for maximizing security rate of a wireless communication based on RIS assistance, the method comprising the steps of:
calculating the received power of legal users and eavesdroppers, and calculating the signal-to-interference-and-noise ratio of the legal users and the eavesdroppers by utilizing the obtained received power and combining distortion noise caused by hardware damage;
obtaining the reachable rates of legal users and eavesdroppers according to the signal-to-interference-and-noise ratio, and establishing a wireless communication secret rate maximization model;
fixing RIS passive beam forming vector to optimize active beam forming vector of base station;
the fixed base station active beamforming vector optimizes the RIS passive beamforming vector;
and (3) introducing the optimized base station active beam forming vector and the RIS passive beam forming vector into a system security rate maximization model, and calculating to obtain a maximum security rate value.
6. the RIS-based assisted wireless communication privacy rate maximization method of claim 4, wherein the achievable rates at the legitimate user and the kth eavesdropper can be expressed as: r is R U =log 2 (1+γ U) and establishing a secret rate maximization model by using the obtained rate, the total transmission power of the base station and the constraint of the RIS phase shift unit mode: wherein ,Pmax Is the maximum transmit power at the base station.
7. The RIS-assisted wireless communication privacy rate maximization method of claim 4, wherein the step of optimizing the base station active beamforming vector with the fixed RIS passive beamforming vector specifically comprises: optimizing the base station active beamforming vector for any given RIS passive beamforming vector can be translated into:
s.t.f H f≤P max
the problem is simplified into by applying a semi-definite relaxation method:
s.t.Tr(F)≤P max ,F±0
s.t.Tr(F)≤P max f+/-0, and effectively solving by introducing a relaxation variable and adopting a convex optimization solver CVX.
8. The RIS-assisted wireless communication privacy rate maximization method of claim 4, wherein the step of optimizing the RIS passive beamforming vector by the fixed base station active beamforming vector specifically comprises: optimizing the RIS passive beamforming vector for any given base station active beamforming vector can be translated into:
s.t.|v n |=1,n=1,…,N
the problem is simplified into by applying a semi-definite relaxation method:
s.t.V±0,V n,n =1,n=1,…,N+1
By introducing a relaxation variable and adopting a convex optimization solver CVX, effective solving is carried out.
9. The method for maximizing security rate of wireless communication based on RIS assistance according to claim 4, wherein the step of introducing the optimized base station active beamforming vector and the RIS passive beamforming vector into the system security rate maximizing model to calculate the maximum security rate value specifically comprises: and (3) bringing the optimized base station active beam forming vector f and the RIS passive beam forming vector v into a system security rate maximization model, calculating to obtain a maximum security rate value, and analyzing the complexity of the overall algorithm.
10. The RIS-based assisted wireless communication privacy rate maximization method of claim 9, wherein the overall algorithm is of complexity: o (L) 3 (L 1 max{M,K} 4 M 1/2 +L 2 max{N,K} 4 N 1/2 ) And), wherein L 1 Representing the number of iterations to solve the active beamforming problem of the base station, L 2 Representing the number of iterations to solve the RIS passive beamforming problem, L 3 Representing the number of iterations of the overall algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211680905.9A CN116017465A (en) | 2022-12-27 | 2022-12-27 | RIS-based auxiliary wireless communication secret rate maximization model and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211680905.9A CN116017465A (en) | 2022-12-27 | 2022-12-27 | RIS-based auxiliary wireless communication secret rate maximization model and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116017465A true CN116017465A (en) | 2023-04-25 |
Family
ID=86020367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211680905.9A Pending CN116017465A (en) | 2022-12-27 | 2022-12-27 | RIS-based auxiliary wireless communication secret rate maximization model and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116017465A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116489654A (en) * | 2023-05-18 | 2023-07-25 | 北京航空航天大学 | Intelligent super-surface-assisted physical layer secure communication method for resisting pilot spoofing attack |
CN117639945A (en) * | 2023-11-23 | 2024-03-01 | 天津师范大学 | Offshore area direction modulation method based on intelligent reflection surface assistance |
CN117978230A (en) * | 2024-02-22 | 2024-05-03 | 盐城工学院 | Double IRS-assisted MISO channel beam forming method and system |
-
2022
- 2022-12-27 CN CN202211680905.9A patent/CN116017465A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116489654A (en) * | 2023-05-18 | 2023-07-25 | 北京航空航天大学 | Intelligent super-surface-assisted physical layer secure communication method for resisting pilot spoofing attack |
CN117639945A (en) * | 2023-11-23 | 2024-03-01 | 天津师范大学 | Offshore area direction modulation method based on intelligent reflection surface assistance |
CN117978230A (en) * | 2024-02-22 | 2024-05-03 | 盐城工学院 | Double IRS-assisted MISO channel beam forming method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116017465A (en) | RIS-based auxiliary wireless communication secret rate maximization model and method | |
CN108880734B (en) | CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization | |
CN113938891B (en) | Reflective-surface-assisted user node untrusted NOMA network secure communication method | |
CN113691295B (en) | IRS-based interference suppression method in heterogeneous network | |
CN112969225A (en) | RIS auxiliary wireless safety communication transmission method using legal user statistical CSI | |
CN113783812B (en) | Intelligent surface synchronous signal enhancement and interference suppression method based on synchronous transmission and reflection | |
CN113067610B (en) | Millimeter wave NOMA system safe energy efficiency maximization power distribution method based on SWIPT | |
CN106712816B (en) | A kind of design method of the safe beam forming based on energy harvesting cognition network | |
CN114221724A (en) | Intelligent reflecting surface assisted cognitive wireless energy-carrying communication network performance optimization method | |
Xu et al. | Weighted sum rate maximization in IRS-BackCom enabled downlink multi-cell MISO network | |
CN114585005A (en) | Intelligent reflector assisted wireless enabling safety communication method | |
CN112601242A (en) | Intelligent reflecting surface assisted two-cell NOMA uplink low-power-consumption transmission method | |
CN116566444A (en) | MISO wireless energy-carrying communication system energy efficiency maximization method based on IRS assistance | |
CN114828258A (en) | Intelligent reflector assisted cognitive radio system resource allocation optimization method | |
CN117498900A (en) | Resource allocation device and method for honeycomb-removing large-scale MIMO (multiple input multiple output) general sense integrated system | |
CN113518357B (en) | Relay method of passive Internet of things | |
CN111726803A (en) | Cognitive radio-based energy acquisition method and device | |
Hu et al. | Multi-intelligent reflecting surface assisted cell-free massive mimo downlink transmission | |
CN115276879A (en) | Safety speed maximization method and device based on semi-definite relaxation in intelligent reflecting surface | |
CN115038099A (en) | RIS-NOMA uplink transmission method and device under non-ideal SIC | |
CN115276878A (en) | Intelligent reflecting surface safety rate determination method and device based on inverse iteration and manifold optimization | |
CN114157392A (en) | Optimization method for safety transmission of distributed IRS auxiliary communication system | |
Wei et al. | Joint optimization of active and passive beamforming in multi-IRS aided mmWave communications | |
Tran et al. | An efficient beam-sharing algorithm for RIS-aided simultaneous wireless information and power transfer applications | |
Chen et al. | Joint Energy and Information Beamforming Design for RIS-assisted Wireless Powered Communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |