CN116456391A - Uplink non-orthogonal multiple access hidden wireless communication method and system - Google Patents

Uplink non-orthogonal multiple access hidden wireless communication method and system Download PDF

Info

Publication number
CN116456391A
CN116456391A CN202310714976.4A CN202310714976A CN116456391A CN 116456391 A CN116456391 A CN 116456391A CN 202310714976 A CN202310714976 A CN 202310714976A CN 116456391 A CN116456391 A CN 116456391A
Authority
CN
China
Prior art keywords
user
hidden
public
node
destination node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310714976.4A
Other languages
Chinese (zh)
Other versions
CN116456391B (en
Inventor
鲁兴波
黄育侦
韩寒
张玉立
白韡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Defense Technology Innovation Institute PLA Academy of Military Science
Original Assignee
National Defense Technology Innovation Institute PLA Academy of Military Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Defense Technology Innovation Institute PLA Academy of Military Science filed Critical National Defense Technology Innovation Institute PLA Academy of Military Science
Priority to CN202310714976.4A priority Critical patent/CN116456391B/en
Publication of CN116456391A publication Critical patent/CN116456391A/en
Application granted granted Critical
Publication of CN116456391B publication Critical patent/CN116456391B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0231Traffic management, e.g. flow control or congestion control based on communication conditions
    • H04W28/0236Traffic management, e.g. flow control or congestion control based on communication conditions radio quality, e.g. interference, losses or delay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an uplink non-orthogonal multiple access hidden wireless communication method and a system, comprising the following steps: step S1: calculating a channel; the destination node B starts broadcasting pilot signals in each time slot, and the hidden user A calculates the instantaneous channel gainThe method comprises the steps of carrying out a first treatment on the surface of the Step S2: accessing and pairing; the hidden user A obtains instantaneous channel gain according to calculationAnd a threshold valueTo determine whether the current time slot satisfies the pairing condition, when the pairing condition is satisfiedThe pairing transmission is carried out with the public user R; step S3: encoding information; step S4: information sending; step S5: decoding information; the destination node B decodes the received signal. The hidden users are paired with the public users for transmission based on the instantaneous channel gain setting double thresholds, the influence of the privacy signals of the hidden users on the decoding of the public user signals of the destination nodes is reduced, the interference of the non-ideal serial interference elimination of the destination nodes on the decoding of the hidden user signals is reduced, and the effective hidden rate of the hidden users is improved.

Description

Uplink non-orthogonal multiple access hidden wireless communication method and system
Technical Field
The invention relates to the technical field of wireless network information transmission, in particular to an uplink non-orthogonal multiple access hidden wireless communication method and system based on double-threshold pairing.
Background
Along with the rapid promotion of related researches and technologies of the fifth generation mobile communication, the Internet of things equipment is gradually changed from the stage of connecting people to people, people to things, and the arrival of the Internet of things era enables the production and the living of people to be extremely convenient. However, the huge connection requirements present a serious challenge to the limited communication resource utilization of the fifth generation mobile communication system due to the access of the mass devices. As one of key technologies that is expected to improve access amount and spectrum efficiency of users, a non-orthogonal multiple access technology is receiving a great deal of attention in industry and academia. Typical non-orthogonal multiple access techniques include power domain non-orthogonal multiple access, which is widely studied because of its simplicity of implementation and integration with a variety of existing communication techniques, and code domain non-orthogonal multiple access. In the power domain non-orthogonal multiple access technology, a plurality of users transmit information on the same resource block at the same time after proper pairing, and a receiving end distinguishes a plurality of user information sharing the same non-orthogonal resource through a serial interference elimination technology, wherein reasonable user pairing is a key for reducing the serial interference elimination failure of the receiving end, increasing the number of user connections and improving the system performance.
Meanwhile, due to the open nature of wireless channels, the security of information transmission in non-orthogonal multiple access systems is also attracting attention. The traditional communication security mechanism mainly depends on the computational complexity of encryption and decryption algorithms to ensure the secure transmission of information, however, the communication security mechanism based on the computational complexity is difficult to ensure the absolute security of the information. As a supplement to the traditional security mechanism, the physical layer security technology ensures the security of information transmission by utilizing the fading characteristic of a wireless channel, and realizes absolute security in the sense of shannon information theory. It should be noted that, the conventional information security transmission mechanism based on encryption and physical layer security only protects the content of the information from being decoded by illegal eavesdropping nodes, and focuses more on the security of the transmitted information itself, but ignores the non-detectability of the information transmission process. In fact, the basis for information decoding by the eavesdropping node is the correct detection of the information transmission behavior, so that stronger security can be achieved by hiding the wireless transmission behavior. In addition, in military application scenarios such as battlefield situation monitoring and unmanned plane reconnaissance, a monitor may not care about specific content of information, but pay more attention to existence of transmission behavior. Once the occurrence of the information transmission process is monitored, the information transmission process may be destroyed by means such as full-band high-power interference, even by physical attack, etc. The hidden wireless communication technology ensures undetectable information transmission by hiding wireless transmission behaviors by utilizing randomness of wireless communication environment, and attracts attention of researchers. In particular, in the covert communication technology, the source node transmits the private message at a lower power after adopting a proper signal processing technology, so that the private signal transmission behavior is skillfully hidden in background noise or other signals in a wireless environment, and as the source node does not continuously transmit the message, it is difficult for the monitoring node to accurately infer whether the observed signal contains the private message.
In a non-orthogonal multiple access system, users with different requirements provide a large number of shelters for hidden communication design, and a public user dynamically adjusts the transmission power of the public user based on a truncated channel reverse power control strategy, so that the signal power of the public user received by a destination node is a constant value, and meanwhile, the shelter with random power is provided for the hidden user to assist the hidden user to hide the wireless transmission behavior of the hidden user. However, in the above document, the hidden user is considered to be randomly paired with the public user with a prior probability of 0.5, the influence of the random fading characteristic of the wireless channel on the user pairing is not considered, the possibility of failure of serial interference cancellation at the destination node is increased, and even under the condition that the channel quality of the hidden user is better, the destination node cannot perform serial interference cancellation, so that the decoding performance of the public user and the hidden user is influenced. In fact, covert communication requires the transmission of private information that the covert user has an opportunity to, meaning that the covert user does not always transmit a message. Therefore, if the hidden user can be paired with the public user only when the serial interference elimination probability is high through reasonable scheme design, the performance of the system is obviously improved, and related researches are not yet carried out.
Disclosure of Invention
The invention provides an uplink non-orthogonal multiple access hidden wireless communication method and system based on double-threshold pairing, wherein a hidden user is paired with a public user for transmission based on the setting of instantaneous channel gain, the influence of the privacy signal of the hidden user on the decoding of the public user signal of a destination node is reduced, the interference of non-ideal serial interference elimination of the destination node on the decoding of the hidden user signal is reduced, and the effective hiding rate of the hidden user is improved.
In order to achieve the above object, the present invention provides an uplink non-orthogonal multiple access covert wireless communication method, which includes the following steps:
step S1: calculating a channel; the destination node B starts broadcasting pilot signals in each time slot, and the hidden user A calculates the instantaneous channel gain from the destination node B to the destination node B in the current time slot by using the received pilot signals, thereby obtaining the instantaneous channel gain from the destination node B according to the channel reciprocity
Step S2: accessing and pairing; the hidden user A obtains instantaneous channel gain according to calculationThreshold value->、/>Determining whether the current time slot meets a pairing condition, and carrying out pairing transmission with the public user R under the condition that the pairing condition is met;
step S3: encoding information; the public user R adopts a Gaussian codebook shared with the target node B to encode the public signal to form a non-private data packet; the hidden user A adopts a Gaussian codebook shared with the target node B to encode a privacy signal to form a privacy data packet;
step S4: information sending; disclosing the user R to random transmit powerTransmitting the non-private data packet to the target node B through a wireless channel; meanwhile, in case that the pairing condition is satisfied, the hidden user A adopts the fixed power +.>Sending the privacy data packet to a target node B;
step S5: decoding information; the target node B decodes according to the received signal; when the hidden user A and the public user R are paired for transmission, the target node B firstly takes the privacy signal sent by the hidden user A as the non-privacy signal for interfering and decoding the public user R, recodes and subtracts the decoded non-privacy signal from the received signal, and then decodes the privacy signal sent by the hidden user A.
Further, in step S1, the channel calculation method is applicable to a time division duplex system with channel reciprocity, and the hidden user a calculates the instantaneous channel gain from the destination node B of the current time slot to itself by using the received pilot signal, wherein ,/> and />The pilot signal receiving power at the destination node B and the pilot signal transmitting power at the hidden user A are respectively represented; based on channel reciprocity, hidden user A can obtain the instantaneous channel gain from itself to the destination node B
Further, in step S2, when concealing the instantaneous channel gain value from user A to destination node BSatisfy the following requirementsWhen the hidden user A and the public user R are paired for transmission, otherwise, the hidden user A keeps silent; the probability of success of access pairing of hidden user A is +.>The probability of unsuccessful access pairing is +.>, wherein />Representing a probability-fetching operation.
Further, in step S2, the access pairing threshold value of the hidden user a、/>The setting condition of (2) is to maximize the effective concealment rate of the concealed user on the premise of meeting the average concealment constraint and the interference constraint on the exposed user.
Further, the mean concealment constraint is satisfied by the following calculation: the average concealment constraint requires the third party monitoring node W to judge whether the concealed user A has data packets to send according to the observation signal of each time slot, and the third party monitoring node W is in a given tolerance levelTime random guess, the average decision error probability of the monitoring node W is not lower than +.>The probability of the judgment error of the monitoring node W comprises a false alarm probability and a missing detection probability, wherein the false alarm probability indicates that the hidden user A does not transmit a data packet, and the monitoring node W judges that the hidden user A transmits the data packet; the missing detection probability indicates that the hidden user A has data packet transmission and the monitoring node W judges that the hidden user A has no data packet transmission; within one time slot, the observed signal of the monitoring node W is expressed as:
wherein (1)>Indicating channel use index value,/-> and />Indicating the transmit power of the public user R and the hidden user a,/-> and />The path loss of the public user R to the monitoring node W and the hidden user a to the monitoring node W are indicated respectively, and />Representing small-scale fading of open user R to monitoring node W and hidden user A to monitoring node W, respectively, +.> and />Respectively indicate that the public user R and the hidden user A are at the +.>Signals transmitted on the individual channel uses; />Indicating that the monitoring node W is at +.>Noise observed over individual channel usage; />Indicating that hidden user a has no data packet to send in the current time slot,/->Indicating that the hidden user a has a packet to send in the current slot.
Further, the monitoring node W makes decisions based on the average energy of the observed signal, taking into account channel usageSatisfying the law of large numbers, the energy meter-based decision can be expressed as:
wherein , and />Respectively representing that the monitoring node W decides that the hidden user A has no/data packet transmission in the current time slot,/no/data packet transmission in the current time slot>And the optimal judgment threshold value set by the monitoring node W according to the priori knowledge is represented. At this time, the monitoring node W may still have decision error, and its false alarm probability is +.>Whereas the probability of missing is +.>The total error detection probability is +.>,/> and />Respectively representing the prior silence and transmission probability of the hidden user A; average error detection probability +.>The average concealment constraint requires that the average error detection probability is not less than +.>
Further, the calculation manner satisfying the interference constraint on the public user is as follows: the interference constraint on the public user requires that the interference of the hidden communication of the hidden user A on the public user R cannot exceed a given threshold, when the hidden user A and the public user R adopt non-orthogonal multiple access to transmit data packets, the destination node B firstly decodes the data packets of the public user R with the interference of the hidden user A, and at the moment, the receiving signal-to-noise ratio when the destination node B decodes the data packets of the public user R is as follows:
wherein ,satisfy->,/>Representing noise variance at the destination node B; at this time, for the coding rate +.>The outage probability of the destination node B decoding public user R can be expressed as:
wherein ,representing satisfaction event->Event->Probability of occurrence. Interference constraint requirements for public users>, wherein />Is a predefined interference tolerance value.
Further, the effective concealment rate for the concealment user is maximized by the following calculation: under the condition that the hiding constraint and the interference constraint condition on the public user R are met, the maximum information rate of the hidden user A reliably transmitted to the destination node B is achieved; when the destination node B decodes the data packet transmitted by the hidden user A, the result of decoding the public user R according to the data packet is divided into the following two cases: after the destination node B successfully decodes the data packet of the public user R, the signal to noise ratio when the destination node B decodes the data packet of the hidden user A is as follows:
at this time, for the coding rate ofThe outage probability for destination node B to decode hidden user a can be expressed as:
when the destination node B fails to decode the data packet of the public user R, the interference of the public user R to the hidden user A cannot be completely eliminated but is partially left, and the left coefficient isAt this time, the signal-to-noise ratio when decoding the hidden user a packet at the destination node B is:
at this time, for the coding rate ofThe outage probability for destination node B to decode hidden user a can be expressed as:
in summary, the outage probability in decoding the hidden user a packet at the destination node B can be expressed as:
accordingly, the effective concealment rate for a concealed user can be expressed asHidden user A accesses the pairing threshold +.>、/>And transmit power->The optimization of (2) can be obtained by solving the following optimization problem
Further, when the information is encoded in step 3, both the public user R and the hidden user a use a gaussian codebook shared only with the destination node B to encode the information, and the third party nodes except the destination node B cannot directly decode after receiving the information.
Further, in step S4, the transmission power of the user R is disclosed for each time slot during information transmissionAt its maximum valueAnd minimum->Randomly and equiprobability selecting the two; transmit power of hidden user a +.>Is configured to maximize the effective concealment rate for the concealed user while satisfying the concealment constraints and interference constraints on the exposed user.
In another aspect, the present invention provides an uplink non-orthogonal multiple access covert wireless communication system for implementing the method according to the present invention; the system comprises a public user R, a hidden user A, a target node B and a monitoring node W, wherein all nodes are provided with single antennas and work in a half duplex mode; in order to assist the hidden user A to hide the private message transmission, the public user R continuously transmits a message which does not relate to privacy to the destination node with random power, and the hidden user A is paired with the public user R and then transmits the private message to the destination node B with fixed power; when the hidden user A and the public user R adopt uplink non-orthogonal multiple access and simultaneously transmit data packets, the target node B adopts a serial interference cancellation technology to firstly decode the information of the public user R, then subtracts the non-privacy signal of the public user R from a received signal and then decodes the privacy signal transmitted by the hidden user A; when the hidden user A does not transmit the privacy data packet, the destination node B directly decodes the non-privacy signal of the public user R.
The invention provides an uplink non-orthogonal multiple access hidden wireless communication method and a system, wherein when the method and the system are specifically operated, a hidden user A is matched with a public user R according to the channel gain of the hidden user A and a destination node B, when the channel gain between the hidden user A and the destination node B is between two threshold values, the hidden user A is matched with the public user R and transmits a private data packet, otherwise, the hidden user A keeps silent, thereby reducing the influence of the private signal of the hidden user A on the R signal of the destination node B, reducing the interference of the non-ideal serial interference of a destination node Bob on the signal of the decoded hidden user A, and compared with the uplink non-orthogonal multiple access hidden wireless communication method without the threshold random matching, the method can obtain higher effective hidden rate under the same condition.
Drawings
Fig. 1 shows a schematic diagram of a system model of an uplink non-orthogonal multiple access covert wireless communication method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a hidden user sending information in an embodiment of the invention;
fig. 3 is a graph of effective concealment rate as a function of maximum transmit power for a public user.
Detailed Description
The following description of the embodiments of the present invention will be made more apparent and fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
Specific embodiments of the present invention are described in detail below with reference to fig. 1-3. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
An uplink non-orthogonal multiple access covert wireless communication system based on double threshold pairing as shown in fig. 1, wherein the system comprises a public user Roy (called public user R), a covert user Alice (called covert user a), a destination node Bob (called destination node B) and a monitoring node Willie (called monitoring node W), all the nodes are configured with single antennas and work in a half duplex mode; in order to assist the hidden user A to hide the private message transmission, the public user R continuously transmits a message which does not relate to privacy to the destination node with random power, and the hidden user A opportunistically pairs with the public user R and then transmits the private message to the destination node B with fixed power; considering that the transmitting power of the public user R is far greater than that of the hidden user A, when the hidden user A and the public user R transmit data packets simultaneously by adopting uplink non-orthogonal multiple access, the target node B firstly decodes the information of the public user R by adopting a serial interference cancellation technology, then subtracts the non-privacy signal of the public user R from the received signal and then decodes the privacy signal transmitted by the hidden user A; when the hidden user A does not transmit the privacy data packet, the destination node B directly decodes the non-privacy signal of the public user R.
An uplink non-orthogonal multiple access hidden wireless communication method based on double-threshold pairing, as shown in fig. 2, comprises the following steps:
step S1: and (5) calculating a channel. The destination node B starts broadcasting pilot signals in each time slot, and the hidden user A calculates the instantaneous channel gain from the destination node B to the hidden user A in the current time slot by using the received pilot signals, wherein ,/> and />The pilot signal receiving power at the destination node B and the pilot signal transmitting power at the hidden user A are respectively represented; for time division duplex system, based on channel reciprocity, hidden user A can obtain its own instantaneous channel gain to destination node B
Step S2: and (5) accessing the pairing. The hidden user A obtains instantaneous channel gain according to calculationThreshold value->Determining whether the current time slot is paired with the public user for transmission; instantaneous channel gain value when concealing user A to destination node B>Satisfy->And when the hidden user A is paired with the public user R for transmission, otherwise, the hidden user A keeps silent. Thus, the probability of success of the access pairing of hidden user A is +.>The probability of unsuccessful access pairing is +.>, wherein />Representing a probability-fetching operation.
Step S3: and (5) information coding. The public user R adopts Gaussian codebook shared with the destination node B to encode the public signal, and the encoding rate is thatThe method comprises the steps of carrying out a first treatment on the surface of the Meanwhile, when the pairing condition in step S2 is satisfied, the hidden user a encodes the privacy signal using the gaussian codebook shared with the destination node B at a coding rate of +.>The method comprises the steps of carrying out a first treatment on the surface of the When the pairing condition in step S2 is not satisfied, the hidden user a remains silent;
step S4: and (5) information transmission. Disclosing the user R to random transmit powerTransmitting the non-private data packet encoded in the step S3 to a target node B through a wireless channel; meanwhile, when the pairing condition in step S2 is satisfied, the hidden user a uses a fixed power to encode the private data encoded in step 3The packet is sent to the destination node B; when the pairing condition in step S2 is not satisfied, the hidden user a remains silent. Wherein each time slot discloses the transmit power of user R +.>At its maximum->And minimum->Randomly and equiprobability selecting the two; while concealing the transmit power of user a>The effective concealing rate of the concealing user is maximized on the premise of meeting concealing constraint and interference constraint on the public user;
step S5: and (5) information decoding. The target node B decodes according to the received signal; when the hidden user A and the public user R are paired for transmission, the target node B firstly takes the privacy signal sent by the hidden user A as the non-privacy signal for interfering and decoding the public user R, recodes the decoded non-privacy signal and subtracts the recoded non-privacy signal from the received signal, and then decodes the privacy signal sent by the hidden user A; when the pairing condition in step S2 is not satisfied, the destination node B directly decodes the non-private signal of the public user R. If the target node B fails to decode the signal of the public user R, ideal serial interference elimination cannot be realized, the residual public user R signal becomes the interference when the target node B decodes the privacy signal of the hidden user A, and the residual coefficientSatisfy->, wherein />Indicating no signal cancellation.
In step S2, the hidden user A accesses the pairing threshold value、/>The setting of (2) should maximize the effective concealment rate for the concealed user while satisfying the average concealment constraint and the interference constraint on the exposed user. Wherein, the average concealing constraint requires the third party monitoring node W to judge whether the concealing user A has data packet to send according to the observation signal of each time slot, and the third party monitoring node W is in the given tolerance level +.>Equivalent to random guessing, i.e. the average decision error probability of the monitoring node W is not lower thanThe probability of the judgment error of the monitoring node W comprises a false alarm probability and a missing detection probability, wherein the false alarm probability indicates that the hidden user A does not transmit a data packet, and the monitoring node W judges that the hidden user A transmits the data packet; the missing probability indicates that the hidden user a has a data packet to send and the monitoring node W decides that the hidden user a has no data packet to send. Specifically, in one time slot, the observation signal of the monitoring node W may be expressed as
wherein ,indicating channel use index value,/-> and />Representing the transmit power of the public user R and the hidden user, < >> and />The path loss of the public user R to the monitoring node W and the hidden user a to the monitoring node W are indicated respectively, and />Representing small-scale fading of open user R to monitoring node W and hidden user A to monitoring node W, respectively, +.> and />Respectively indicate that the public user R and the hidden user A are at the +.>Signals transmitted on the individual channel uses; />Indicating that the monitoring node W is at +.>Noise observed over individual channel usage; /> and />Indicating that the hidden user a has no/no data packet to transmit in the current time slot, respectively.
The monitoring node W makes a decision according to the average energy of the observed signal, taking into account the channel usageSatisfying the law of large numbers, then the energy meter-based decision can be expressed as
wherein ,/> and />Respectively representing that the monitoring node W decides that the hidden user A has no/data packet transmission in the current time slot,/no/data packet transmission in the current time slot>And the optimal judgment threshold value set by the monitoring node W according to the priori knowledge is represented. At this time, the monitoring node W may still have decision error, and its false alarm probability is +.>And the probability of missing detection isThe total error detection probability is +.>,/> and />Respectively representing the probabilities of the hidden user a being a priori muted and transmitted. Since it is difficult for the hidden user A and the public user R to know the instantaneous channel information of the detection node, < + >>Containing the random variable-> and />. Therefore, the average error detection probability is obtained by averaging the error detection probabilities +.>, wherein ,representation pair comprising random variable-> and />Variable +.>Averaging. Accordingly, the average concealment constraint can be expressed as +.>
In step 2, the hidden user A accesses the pairing threshold value、/>The setting of (2) should maximize the effective concealment rate for the concealed user while satisfying the average concealment constraint and the interference constraint on the exposed user. Wherein the interference constraint on the public user requires that the interference of the hidden communication of the hidden user a on the public user R cannot exceed a given threshold, i.e. the transmission interruption probability of the public user R is smaller than the given threshold. Specifically, when the hidden user a and the public user R transmit data packets by using non-orthogonal multiple access, the destination node B decodes the data packet of the public user R with the interference of the hidden user a, and at this time, the destination node B decodes the data packet of the public user R with a received signal-to-noise ratio of
wherein ,satisfy->,/>Representing the noise variance at the destination node B. At this time, for the coding rate +.>The outage probability of the destination node B decoding public user R can be expressed as
wherein ,representing satisfaction event->Event->Probability of occurrence. Interference constraint requirements for public users>, wherein />Is a predefined interference tolerance value.
In step 2, the hidden user A accesses the pairing threshold value、/>The setting of (2) should maximize the effective concealment rate for the concealed user while satisfying the average concealment constraint and the interference constraint on the exposed user. Wherein the effective concealment rate of the concealed user is defined as the maximum information rate that the concealed user a reliably transmits to the destination node B under conditions that satisfy the concealment constraint and the interference constraint on the open user R. Specifically, when the destination node B decodes the packet transmitted by the hidden user a, the result of decoding the public user R according to the result is classified into the following two cases. When the purpose isAfter the node B successfully decodes the data packet of the public user R, the signal to noise ratio is as follows when the target node B decodes the hidden user A data packet by utilizing the serial interference elimination technology
At this time, for the coding rate ofThe outage probability of destination node B decoding hidden user a can be expressed as
When the destination node B fails to decode the data packet of the public user R, the interference of the public user R to the hidden user A cannot be completely eliminated but is partially left, and the left coefficient isAt this time, the signal-to-noise ratio when decoding the hidden user A packet at the destination node B is
At this time, for the coding rate ofThe outage probability of destination node B decoding hidden user a can be expressed as
In summary, the outage probability at the destination node B in decoding the hidden user A packet can be expressed as
Accordingly, concealThe effective rate of concealment of the user can be expressed asFurther, hidden user A accesses the pairing threshold +.>、/>And transmit power->The optimization of (2) can be obtained by solving the following optimization problem
In specific operation, the hidden user A is paired with the public user R according to the channel gain setting double threshold of the hidden user A and the destination node B, when the channel gain between the hidden user A and the destination node B is between two threshold values, the hidden user A is paired with the public user R and transmits a privacy data packet, otherwise, the hidden user A keeps silent, thereby reducing the influence of the privacy signal of the hidden user A on the destination node B to decode the signal of the public user R, reducing the interference of the non-ideal serial interference of the destination node Bob to decode the signal of the hidden user A, and compared with an uplink non-orthogonal multiple access hidden wireless communication method without the threshold random pairing, the invention can obtain higher hidden rate under the same condition. The influence of the privacy signal of the hidden user on the decoding of the public user signal of the destination node is reduced, and the interference of the non-ideal serial interference elimination of the destination node on the decoding of the hidden user signal is reduced.
Next, embodiments are given by specific values, in which the maximum transmission power of the user is disclosedMinimum transmit power->Of open usersCoding rate->Interference constraints on public usersThe method comprises the steps of carrying out a first treatment on the surface of the Coding rate +.>Conceal tolerance value->The method comprises the steps of carrying out a first treatment on the surface of the Signal residual coefficient +.>The method comprises the steps of carrying out a first treatment on the surface of the The background noise variance at the destination node and the detection node is +.>Public user and destination node, public user and detection node, hidden user and destination node, hidden user and detection node large scale fading same +.>The corresponding small-scale fading obeys a complex gaussian distribution with mean value 0 and variance 1, and threshold value +.>、/>
According to the above parameters, the prior transmission probability of the hidden user in step S2 can be calculated. And then can calculate to meet the hidden constraintThe maximum transmit power of the hidden user is +.>. From the above parameters, the maximum transmit power satisfying the interference constraint on the public user can be calculated>. Thereby, the transmission power of the hidden user is +.>. Furthermore, the error probability of decoding the hidden user of the destination node is obtained according to the transmission power of the hidden user>Thereby obtaining the effective concealing rate of +.>
The numerical embodiments are given a threshold value、/>And given in case of disclosure of the maximum transmission power of the user. Fig. 3 shows the variation of the effective concealment rate along with the maximum transmission power of the public user under the parameter setting condition, and compares the effective concealment rate with the conventional non-threshold access pairing scheme, and as can be observed from fig. 3, the double-threshold scheme provided by the application can effectively improve the effective concealment rate of the system under the same condition, so that the superiority of the scheme provided by the application is proved.
Any process or method description in a flowchart or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, which may be implemented in any computer-readable medium for use by an instruction execution system, apparatus, or device, which may be any medium that contains a program for storing, communicating, propagating, or transmitting for use by the execution system, apparatus, or device. Including read-only memory, magnetic or optical disks, and the like.
In the description herein, reference to the term "embodiment," "example," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the different embodiments or examples described in this specification and the features therein may be combined or combined by those skilled in the art without creating contradictions.
While embodiments of the present invention have been shown and described, it will be understood that the embodiments are illustrative and not to be construed as limiting the invention, and that various changes, modifications, substitutions and alterations may be made by those skilled in the art without departing from the scope of the invention.

Claims (10)

1. An uplink non-orthogonal multiple access covert wireless communication method, comprising the steps of:
step S1: calculating a channel; the destination node B starts broadcasting pilot signals in each time slot, and the hidden user A calculates the instantaneous channel gain from the destination node B to the destination node B in the current time slot by using the received pilot signals, thereby obtaining the instantaneous channel gain from the destination node B according to the channel reciprocity
Step S2: accessing and pairing; the hidden user A obtains instantaneous channel gain according to calculationThreshold value->、/>Determining whether the current time slot meets a pairing condition, and carrying out pairing transmission with the public user R under the condition that the pairing condition is met;
step S3: encoding information; the public user R adopts a Gaussian codebook shared with the target node B to encode the public signal to form a non-private data packet; the hidden user A adopts a Gaussian codebook shared with the target node B to encode a privacy signal to form a privacy data packet;
step S4: information sending; disclosing the user R to random transmit powerTransmitting the non-private data packet to the target node B through a wireless channel; meanwhile, in case that the pairing condition is satisfied, the hidden user A adopts the fixed power +.>Sending the privacy data packet to a target node B;
step S5: decoding information; the target node B decodes according to the received signal; when the hidden user A and the public user R are paired for transmission, the target node B firstly takes the privacy signal sent by the hidden user A as the non-privacy signal for interfering and decoding the public user R, recodes and subtracts the decoded non-privacy signal from the received signal, and then decodes the privacy signal sent by the hidden user A.
2. The uplink non-orthogonal multiple access covert wireless communication method according to claim 1, wherein in step S1, said channel calculation method is applied to a time division duplex system with channel reciprocity, and the covert user a calculates the instantaneous channel gain from the current time slot destination node B to itself by using the received pilot signal, wherein ,/> and />The pilot signal receiving power at the destination node B and the pilot signal transmitting power at the hidden user A are respectively represented; based on the channel reciprocity, hidden user A gets the instantaneous channel gain from itself to the destination node B +.>
3. The method for uplink non-orthogonal multiple access covert wireless communication according to claim 1, wherein in step S2, when concealing the instantaneous channel gain value of user a to destination node BSatisfy->When the hidden user A and the public user R are paired for transmission, otherwise, the hidden user A keeps silent; the probability of success of access pairing of hidden user A is +.>The probability of unsuccessful access pairing is +.>, wherein />Representing a probability-fetching operation.
4. The method for uplink non-orthogonal multiple access covert wireless communication according to claim 3, wherein in step S2, the covert user a accesses the pairing threshold value、/>The setting condition of (2) is to maximize the effective concealment rate of the concealed user on the premise of meeting the average concealment constraint and the interference constraint on the exposed user.
5. The method for uplink non-orthogonal multiple access covert wireless communication of claim 4, wherein the average covert constraint is satisfied by the following calculation: the average concealment constraint requires the third party monitoring node W to judge whether the concealed user A has data packets to send according to the observation signal of each time slot, and the third party monitoring node W is in a given tolerance levelTime random guess, the average decision error probability of the monitoring node W is not lower than +.>The probability of the judgment error of the monitoring node W comprises a false alarm probability and a missing detection probability, wherein the false alarm probability indicates that the hidden user A does not transmit a data packet, and the monitoring node W judges that the hidden user A transmits the data packet; the missing detection probability indicates that the hidden user A has data packet transmission and the monitoring node W judges that the hidden user A has no data packet transmission; within one time slot, the observed signal of the monitoring node W is expressed as:
wherein ,indicating channel use index value,/-> and />Representing the transmit power of the open user R and the hidden user a, and />The path loss of the public user R to the monitoring node W and the hidden user a to the monitoring node W are indicated respectively, and />Representing small-scale fading of open user R to monitoring node W and hidden user A to monitoring node W, respectively, +.> and />Respectively indicate that the public user R and the hidden user A are at the +.>Signals transmitted on the individual channel uses; />Indicating that the monitoring node W is at +.>Noise observed over individual channel usage; />Indicating that hidden user a has no data packet to send in the current time slot,/->Indicating that the hidden user a has a packet to send in the current slot.
6. The uplink non-orthogonal multiple access covert wireless communication method of claim 5Wherein the monitoring node W makes decisions based on the average energy of the observed signal, taking into account channel usageSatisfying the law of large numbers, the energy meter-based decision is expressed as:
wherein ,/> and />Respectively representing that the monitoring node W decides that the hidden user A has no/data packet transmission in the current time slot,/no/data packet transmission in the current time slot>Representing an optimal judgment threshold value set by the monitoring node W according to priori knowledge; at this time, the monitoring node W may still have decision error, and its false alarm probability is +.>Whereas the probability of missing is +.>The total error detection probability is +.> and />Respectively representing the prior silence and transmission probability of the hidden user A; average error detection probability +.>The average concealment constraint requires that the average error detection probability is not less than +.>I.e. +.>
7. The method for uplink non-orthogonal multiple access covert wireless communication of claim 4, wherein the calculation manner satisfying the interference constraint on the public user is as follows: the interference constraint on the public user requires that the interference of the hidden communication of the hidden user A on the public user R cannot exceed a given threshold, when the hidden user A and the public user R adopt non-orthogonal multiple access to transmit data packets, the destination node B firstly decodes the data packets of the public user R with the interference of the hidden user A, and at the moment, the receiving signal-to-noise ratio when the destination node B decodes the data packets of the public user R is as follows:
wherein ,satisfy->,/>Representing the noise variance at the destination node B.
8. The method according to claim 1, wherein when the information is encoded in step S3, both the public user R and the hidden user a encode the information by using a gaussian codebook shared only with the destination node B, and the third party nodes other than the destination node B cannot directly decode the information after receiving the information.
9. The method for uplink non-orthogonal multiple access covert wireless communication according to claim 1, wherein in step S4, the transmission power of the user R is disclosed per time slot during information transmissionAt its maximum->And minimum valueRandomly and equiprobability selecting the two; transmit power of hidden user a +.>Is configured to maximize the effective transmission rate of the hidden user while satisfying both the hidden constraint and the interference constraint on the public user.
10. An uplink non-orthogonal multiple access covert wireless communication system, characterized in that said system is adapted to implement the method according to any one of claims 1-9; the system comprises a public user R, a hidden user A, a target node B and a monitoring node W, wherein all nodes are provided with single antennas and work in a half duplex mode; in order to assist the hidden user A to hide the private message transmission, the public user R continuously transmits a message which does not relate to privacy to the destination node with random power, and the hidden user A is paired with the public user R and then transmits the private message to the destination node B with fixed power; when the hidden user A and the public user R adopt uplink non-orthogonal multiple access and simultaneously transmit data packets, the target node B adopts a serial interference cancellation technology to firstly decode the information of the public user R, then subtracts the non-privacy signal of the public user R from a received signal and then decodes the privacy signal transmitted by the hidden user A; when the hidden user A does not transmit the privacy data packet, the destination node B directly decodes the non-privacy signal of the public user R.
CN202310714976.4A 2023-06-16 2023-06-16 Uplink non-orthogonal multiple access hidden wireless communication method and system Active CN116456391B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310714976.4A CN116456391B (en) 2023-06-16 2023-06-16 Uplink non-orthogonal multiple access hidden wireless communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310714976.4A CN116456391B (en) 2023-06-16 2023-06-16 Uplink non-orthogonal multiple access hidden wireless communication method and system

Publications (2)

Publication Number Publication Date
CN116456391A true CN116456391A (en) 2023-07-18
CN116456391B CN116456391B (en) 2023-09-05

Family

ID=87124166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310714976.4A Active CN116456391B (en) 2023-06-16 2023-06-16 Uplink non-orthogonal multiple access hidden wireless communication method and system

Country Status (1)

Country Link
CN (1) CN116456391B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117835371A (en) * 2024-03-05 2024-04-05 南京信息工程大学 UAV cluster hidden access collaborative optimization method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101869742B1 (en) * 2016-12-29 2018-06-21 금오공과대학교 산학협력단 Complex pairing method and communication method program in non-orthogonal multiple access
CN108834113A (en) * 2018-06-20 2018-11-16 江苏大学 A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer
CN112383380A (en) * 2020-10-21 2021-02-19 西安交通大学 Covert vehicle communication method based on non-orthogonal multiple access technology
CN113438651A (en) * 2021-06-17 2021-09-24 河南理工大学 NOMA-based physical layer authentication method of environment backscatter communication system
CN115665729A (en) * 2022-10-18 2023-01-31 南京理工大学 Hidden transmission method under multi-eavesdropper joint detection environment
CN115835196A (en) * 2022-09-28 2023-03-21 中国人民解放军陆军工程大学 Interference truncation-assisted finite packet length concealed wireless communication method
CN115941112A (en) * 2022-12-12 2023-04-07 南京信息工程大学 Portable covert communication method, computer equipment and storage medium
CN116249190A (en) * 2022-09-09 2023-06-09 北京邮电大学 Multi-user pairing transmission determining method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101869742B1 (en) * 2016-12-29 2018-06-21 금오공과대학교 산학협력단 Complex pairing method and communication method program in non-orthogonal multiple access
CN108834113A (en) * 2018-06-20 2018-11-16 江苏大学 A kind of D2D convert communication system and its communication means towards 5G Cellular Networks safety of physical layer
CN112383380A (en) * 2020-10-21 2021-02-19 西安交通大学 Covert vehicle communication method based on non-orthogonal multiple access technology
CN113438651A (en) * 2021-06-17 2021-09-24 河南理工大学 NOMA-based physical layer authentication method of environment backscatter communication system
CN116249190A (en) * 2022-09-09 2023-06-09 北京邮电大学 Multi-user pairing transmission determining method and device
CN115835196A (en) * 2022-09-28 2023-03-21 中国人民解放军陆军工程大学 Interference truncation-assisted finite packet length concealed wireless communication method
CN115665729A (en) * 2022-10-18 2023-01-31 南京理工大学 Hidden transmission method under multi-eavesdropper joint detection environment
CN115941112A (en) * 2022-12-12 2023-04-07 南京信息工程大学 Portable covert communication method, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁郑宇等: "面向战场侦察情报信息传输的隐蔽无线通信", 《 第十届中国指挥控制大会论文集》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117835371A (en) * 2024-03-05 2024-04-05 南京信息工程大学 UAV cluster hidden access collaborative optimization method and system
CN117835371B (en) * 2024-03-05 2024-05-17 南京信息工程大学 UAV cluster hidden access collaborative optimization method and system

Also Published As

Publication number Publication date
CN116456391B (en) 2023-09-05

Similar Documents

Publication Publication Date Title
CN104320826B (en) The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment
Tekin et al. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
CN108834113B (en) D2D covert communication system facing 5G cellular network physical layer security and communication method thereof
CN116456391B (en) Uplink non-orthogonal multiple access hidden wireless communication method and system
Wang et al. Cooperative key agreement for wireless networking: Key rates and practical protocol design
Lv et al. Achieving covert wireless communication with a multi-antenna relay
CN107359929B (en) Air interface encryption method based on constellation overlapping in bidirectional relay system
CN112383380B (en) Covert vehicle communication method based on non-orthogonal multiple access technology
CN110730452A (en) Performance analysis method of combined relay and interference selection scheme in wireless communication system
Ghanem et al. Defense against selfish PUEA in cognitive radio networks based on hash message authentication code
CN115665729A (en) Hidden transmission method under multi-eavesdropper joint detection environment
Atallah et al. Design and performance analysis of secure multicasting cooperative protocol for wireless sensor network applications
Perazzone et al. Physical layer authentication via fingerprint embedding: Min-entropy analysis: Invited presentation
Yang et al. Covert Communication for Wireless Networks with Full‐Duplex Multiantenna Relay
Fu et al. A simple quantization-based multibit cooperative spectrum sensing for cognitive radio networks
Zhang et al. Covert Communications for STAR-RIS-Assisted Industrial Networks With a Full Duplex Receiver and RSMA
CN110784866A (en) Untrusted relay network safety transmission method based on blocking type fault-tolerant decoding and forwarding
CN116032415A (en) Wireless covert communication method and system combining cooperative interference and relay selection
CN114531674A (en) Combined secrecy and covert communication method and system based on rate segmentation
CN115835196A (en) Interference truncation-assisted finite packet length concealed wireless communication method
KR102443657B1 (en) Improper gaussian signal design method for improvement the secure communication in downmlink noma network and the system thereof
CN111787536B (en) Physical layer cooperation key generation method in wireless relay network
Pan et al. Physical layer security in untrusted decode-and-forward relay networks allowing intra-link errors
Shah et al. Resource allocation in fading multiple access wiretap channel via game theoretic learning
Sadig et al. Encryption-Aided Physical Layer Security via Cooperative Jamming: Beyond Secrecy Capacity with Noisy Ciphertext

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant