WO2020151383A1 - 一种多天线二维矢量传输方法及系统 - Google Patents
一种多天线二维矢量传输方法及系统 Download PDFInfo
- Publication number
- WO2020151383A1 WO2020151383A1 PCT/CN2019/124226 CN2019124226W WO2020151383A1 WO 2020151383 A1 WO2020151383 A1 WO 2020151383A1 CN 2019124226 W CN2019124226 W CN 2019124226W WO 2020151383 A1 WO2020151383 A1 WO 2020151383A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vector
- weight coefficient
- coefficient matrix
- channel
- symbol
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
Definitions
- the invention relates to the field of information communication, in particular to a multi-antenna two-dimensional vector transmission method.
- the channel security capacity depends on the channel advantage (must be a positive value) of the legitimate receiver over the illegal (eavesdropping) user, which is often difficult to satisfy in practical applications.
- existing researches mostly use technical means at the transmitter to reduce the channel/signal quality of illegal receivers.
- secure beamforming is an effective (or even optimal) physical layer secure transmission scheme.
- the secure beamforming technology relies on the precise state information of the eavesdropping channel to design a transmission scheme.
- the eavesdropper When the eavesdropper only receives and does not send any electromagnetic signals, it means that a complete passive eavesdropping is implemented, and the sender may not be able to obtain any useful information of the eavesdropping channel at all. At this time, the design of its transmission scheme cannot be started at all. This limits the practical application of the safe beamforming scheme.
- some people have proposed random beamforming schemes: artificial noise schemes and random array weighting schemes, which generate additive and multiplicative random noise respectively, and reduce the channel/signal quality of illegal receivers.
- the eavesdropper can always use the spatial dimension advantage obtained by more receiving antennas to crack (Such as MUSIC-like algorithm). But the fact is that almost all existing communication systems use a one-dimensional transmission system.
- the technical problem to be solved by the present invention is to provide a multi-antenna two-dimensional vector transmission method to ensure the safety of wireless transmission in view of the shortcomings of the prior art.
- the technical solution adopted by the present invention is: a multi-antenna two-dimensional vector transmission method, including the following steps:
- the present invention still obeys the classical information theory, and expands the existing one-dimensional transmission system (that is, only one symbol is sent per transmission antenna per symbol period) to the two-dimensional transmission system, and realizes the security of the physical layer. transmission.
- a weight item is added before each channel coefficient
- is different enough to reduce the bit error rate at the receiving end and make the receiving end perform better.
- ⁇ 1 , ⁇ 2 ,..., ⁇ L ⁇ 1 , ⁇ 2 ,..., ⁇ L :
- step 2) Repeat step 2) and step 3) until the values of ⁇ 1 , ⁇ 2 ,..., ⁇ L all reach the upper limit, and output the last saved ⁇ 1 , ⁇ 2 ,..., ⁇ L value, which is the optimal value.
- ⁇ 1 , ⁇ 2 ,..., ⁇ L The above solution process of ⁇ 1 , ⁇ 2 ,..., ⁇ L is simple and easy to implement.
- ⁇ 1 , ⁇ 2 ,..., ⁇ L can all be initialized to 0.1.
- the random weight coefficient matrix sequence generated by the sender satisfies the following linear constraints among them, Represents the vector obtained after the channel vector h AB,l is Hermite transform, 1 ⁇ l ⁇ L.
- the generating process of the random weight coefficient matrix includes:
- Weight represents the element in the jth row and lth column of the weight coefficient matrix W L ; then Represents the complex conjugate of the jth component of the channel vector h AB,L ; It represents the vector obtained after the channel vector h AB,l is transformed by Hermite.
- the present invention also provides a multi-antenna two-dimensional vector transmission system, which includes:
- the sending end generates a random weight coefficient matrix W 1 in the first time block; compares W 1 to each symbol vector to be sent Multiply to get among them It is a superimposed signal vector of J ⁇ 1; each component of the superimposed signal vector is loaded on the corresponding antenna and sent; in the first time block of consecutive N symbol periods, it is sent sequentially In each subsequent time block, a new random weight coefficient matrix is generated, and the above sending process is repeated in each time block; among them, Represents the symbol vector to be transmitted in the nth symbol period; J is the number of transmitting antennas; x(n) represents the nth symbol of the symbol sequence to be transmitted; J ⁇ 2; the random weight coefficient matrix is a unitary matrix, and The real and imaginary parts of the elements in the random weight coefficient matrix are uniformly distributed;
- the receiving end is used to demodulate after receiving the signal sent by the transmitting end to obtain the signal vector
- the present invention Compared with the prior art, the present invention has the following beneficial effects: the present invention still obeys the classical information theory, and expands the existing one-dimensional transmission system (that is, only one symbol is sent per transmission antenna per symbol period) to two-dimensional
- the transmission system realizes the secure transmission of the physical layer, thereby ensuring the safety of wireless transmission.
- the transmission security of the present invention no longer depends on the channel advantages of legal users, and only needs to be independent between the legal channel and the eavesdropping channel, that is, there is sufficient difference.
- the matrix of random weight coefficients used for precoding does not need to be transmitted to the receiver. All of these make the present invention easy to physically implement.
- the present invention can resist MUSIC-like security attacks and realize unconditional security, that is, keep the eavesdropper’s bit error rate not less than 10 -1 (not effective decoding).
- Figure 1 is a diagram of the communication model of the present invention
- Figure 2 is a diagram of MUSIC-like algorithm cracking random weighting scheme
- the communication model of the present invention is shown in Figure 1.
- the sender Alice has J antennas, and the legal receiver Bob and the multi-eavesdropper Eve are both receiving with a single antenna.
- Eve is completely passive eavesdropping and does not send out any electromagnetic signals.
- the channel from Alice to Bob is denoted as The channel information can be accurately estimated by both communicating parties; the channel from Alice to Eve is recorded as The channel information can only be accurately estimated by Eve, and Alice cannot get any useful information.
- all wireless channels in this model are independent and identically distributed flat fading Rayleigh channels.
- the channel is block fading, and the block duration is uniformly abbreviated as N symbol periods.
- each antenna transmits a symbol vector of dimension L in parallel in each symbol period. Therefore, the LN symbols to be transmitted corresponding to N consecutive symbol periods (one block) can be written in the form of an L ⁇ N symbol matrix.
- the difference between the present invention and the existing one-dimensional physical layer security transmission scheme is: the existing scheme introduces random changes through random (complex) weight vectors corresponding to multiple antennas, while the present invention retains the use of random vectors in the existing schemes. Disturbing the advantages of the received signal, and at the same time, the expanded random matrix performs random weighted pre-aliasing on multi-dimensional symbols, preventing the eavesdropper from cracking the signal through joint detection. But because each transmission is an L-dimensional symbol vector, according to the principle of maximum entropy, each symbol vector needs to be repeatedly transmitted at least L times before the receiving end can restore the correct position information of each component in the vector.
- column vector represents the symbol vector to be sent in the nth symbol period.
- Alice uses a random weight coefficient matrix to pre-encode each symbol vector to be sent to generate a J-dimensional random weighted superimposed signal vector, and then send it out through J antennas. Therefore, Alice needs to generate a J ⁇ L random weight coefficient matrix (the weight coefficient matrix is only related to the channel)
- each column vector is a J-dimensional superimposed signal, which corresponds to J transmit antennas.
- the specific sending process is as follows: In the first time block (the stationary block corresponding to the block fading channel), Alice first generates a random weight coefficient matrix W 1 . W 1 and each symbol vector to be sent Multiply to get among them It is the superimposed signal vector of J ⁇ 1. Then each element in the vector (corresponding to a superimposed signal) is loaded on the corresponding antenna for transmission. In this way, in consecutive N symbol periods, Send it once. In the next time block, a new random weight coefficient matrix is generated, and the same sending process is repeated. This sending process is repeated at least L times in total, and the number of symbol periods is N each time. Therefore, the total time for sending LN symbols is still LN, which is the same as the existing one-dimensional transmission system.
- the random weight coefficient matrix is a unitary matrix, and the real part and imaginary part of the elements in the random weight coefficient matrix both obey a uniform distribution.
- the superimposed signal vector sent by Alice is After the channel vector h AB,1 (subscript 1 represents the first time block, the same below), the superimposed vector signal Bob receives is
- v Bob,1 (n) is circuit noise (noise brought by hardware), generally additive white Gaussian noise.
- the channel vector is h AB,l
- the weight coefficient matrix becomes W l .
- the superimposed vector signal received by Bob is y l (1), y l (2),..., y l (N). Therefore, after L transmissions, that is, within the total time LN, the signals received by Bob in turn can be written as an L ⁇ N received signal matrix
- each element in the matrix actually represents a superimposed vector signal
- the matrix can be regarded as a three-dimensional matrix. All components of each column vector of the matrix come from the same transmission symbol vector.
- the cumulative vector is Bob accumulates the superimposed signals of equation (4) corresponding to the same transmitted symbol vector
- represents the 2-normal form of the channel vector h AB,1 .
- ⁇ 1 , ⁇ 2 ,..., ⁇ L is a set of public real coefficients.
- have obvious differences, so we need to add ⁇ 1 , ⁇ 2 ,..., ⁇ L to ensure that Bob can demodulate correctly.
- the algorithm for generating a simple weight coefficient matrix corresponding to equation (6) is as follows: first randomly generate L-1 weight coefficient matrices W 1 , W 2 ,..., W L-1 , and then solve it through the constraint of equation (6) The last matrix W L. Assume Then
- Figure 2 is a performance curve diagram of using the MUSIC-like algorithm to crack the existing random weighting scheme.
- Alice has 4 transmitting antennas.
- the simulation experiment on the performance of the scheme takes the bit error rate as the performance index to measure the system security.
- the elements in the channel vector (matrix) from Alice to Bob and Eve are independent and identically distributed complex Gauss random variables with zero mean and unit variance, and they remain unchanged within a block.
- Alice sends a total of 10,000 symbols, and each signal symbol is generated from the set ⁇ +1, -1 ⁇ with a medium probability.
- Fig. 3 is the receiving performance curve of the system of the present invention.
- Eve uses two cracking methods: one is MUSIC-like; the other is type (9).
- the symbol sequence (x(1), x(2),...) sent in the present invention is still a conventional modulated signal, which is no different from the existing communication system.
- ⁇ 1 , ⁇ 2 ,..., ⁇ L are all positive numbers, which are only needed when calculating the random weight coefficient matrix W L in the last transmission. At this time, the previous L-1 transmissions have been completed.
- ⁇ 1 2 + ⁇ 2 2 +...+ ⁇ L 2 L, and L represents the dimension of the symbol vector (also That is the number of repetitions).
- the bit error rate largely depends on ⁇ 1
- that is, the coefficients ⁇ 1 , ⁇ 2 ,..., ⁇ L should let ⁇ 1
- Min(d m,n ) represents the minimum value among all d m,n (1 ⁇ m ⁇ L, 1 ⁇ n ⁇ L, m ⁇ n) values.
- the criterion is ⁇ 1 , ⁇ 2 ,..., ⁇ L coefficients should maximize Min(d m,n ).
- the generation algorithm of ⁇ 1 , ⁇ 2 ,..., ⁇ L is as follows. Obviously, this algorithm is an exhaustive algorithm, and each cycle ⁇ i is incremented by t (t is 0.1 in the experiment). Obviously, the minimum value of ⁇ i is 0.1 (cannot be 0), and the maximum value In practical applications, the optimization process can be further optimized based on various prior knowledge.
- the solving process of ⁇ 1 , ⁇ 2 ,..., ⁇ L includes:
- the step size is set to 0.1 in order to ensure the calculation accuracy under the premise of a suitable calculation amount.
- each antenna eavesdropper
- N superimposed signals transmitted L times.
- the L transmitted signals received by M eavesdroppers can be written in the form of an M ⁇ N matrix
- W l (n) is a J ⁇ L matrix
- y Eve,1 (n) be the nth received signal of any eavesdropper's lth transmission. If Eve detects the signal in the same way as Bob, similarly, for each nth received signal transmitted, its accumulation can be written as
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Radio Transmission System (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (10)
- 一种多天线二维矢量传输方法,其特征在于,包括以下步骤:1)在第一个时间块,生成随机权值系数矩阵W 1;W 1与每个待发送符号矢量 相乘得到 其中 为J×1的叠加信号矢量;将该叠加信号矢量中每个分量分别加载到对应天线上发送;在该第一个时间块的连续N个符号周期内,依次发送 在接下来的每个时间块再分别生成新的随机权值系数矩阵,并在每个时间块重复上述发送过程;其中, 表示第n个符号周期待发送的符号矢量;J为发送天线的数量;x(n)表示待发送符号序列的第n个符号;J≥2;所述随机权值系数矩阵为酉矩阵,且随机权值系数矩阵中元素的实部和虚部均服从均匀分布;
- 根据权利要求1所述的多天线二维矢量传输方法,其特征在于,λ 1 2+λ 2 2+…+λ L 2=L。
- 根据权利要求1或2所述的多天线二维矢量传输方法,其特征在于,λ 1,λ 2,…,λ L的求解过程包括:1)设r=0;步长为t;初始化λ 1,λ 2,…,λ L;2)对于λ s,递增t,然后计算Min(d m,n),其中d m,n=(λ m||h AB,m||-λ n||h AB,n||) 2,1≤m≤L,1≤n≤L,m≠n;Min(d m,n)是指所有d m,n值中的最小值;1≤s≤L;4)重复步骤2)和步骤3),直至λ 1,λ 2,…,λ L的值都达到上限,输出最后保存的λ 1,λ 2,…,λ L值,即为最优值。
- 一种多天线二维矢量传输系统,其特征在于,包括:发送端,在第一个时间块,生成随机权值系数矩阵W 1;将W 1与每个待发送符号矢量 相乘得到 其中 为J×1的叠加信号矢量;将该叠加信号矢量中每个分量分别加载到对应天线上发送;在该第一个时间块的连续N个符号周期内,依次发送 在接下来的每个时间块再分别生成新的随机权值系数矩阵,并在每个时间块重复上述发送过程; 表示第n个符号周期待发送的符号矢量;J为发送天线的数量;x(n)表示待发符号序列的第n个符号;J≥2;所述随机权值系数矩阵为酉矩阵,且随机权值系数矩阵中元素的实部和虚部均服从均匀分布;
- 根据权利要求6所述的系统,其特征在于,λ 1 2+λ 2 2+…+λ L 2=L。
- 根据权利要求6或7所述的系统,其特征在于,λ 1,λ 2,…,λ L的求解过程包括:1)设r=0;步长为t;初始化λ 1,λ 2,…,λ L;2)对于λ s,递增t,然后计算Min(d m,n)1≤s≤L,其中d m,n=(λ m||h AB,m||-λ n||h AB,n||) 2,1≤m≤L,1≤n≤L,m≠n;Min(d m,n)是指所有d m,n值中的最小值;4)重复步骤2)和步骤3),直至λ 1,λ 2,…,λ L的值都达到上限,输出最后保存的λ 1,λ 2,…,λ L值,即为最优值。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910072420.3A CN109714090B (zh) | 2019-01-25 | 2019-01-25 | 一种多天线二维矢量传输方法及系统 |
CN201910072420.3 | 2019-01-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020151383A1 true WO2020151383A1 (zh) | 2020-07-30 |
Family
ID=66262895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/124226 WO2020151383A1 (zh) | 2019-01-25 | 2019-12-10 | 一种多天线二维矢量传输方法及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109714090B (zh) |
WO (1) | WO2020151383A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714090B (zh) * | 2019-01-25 | 2021-06-25 | 伍仁勇 | 一种多天线二维矢量传输方法及系统 |
CN114697103B (zh) * | 2022-03-25 | 2023-04-21 | 电子科技大学 | 一种基于镜像操作的物理层安全传输发射权向量计算方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150188662A1 (en) * | 2011-02-22 | 2015-07-02 | Celeno Communications (Israel) Ltd. | Phy-level wireless security |
CN105007578A (zh) * | 2015-06-05 | 2015-10-28 | 西安交通大学 | 5g通信系统中基于下行反馈辅助的上行安全传输方法 |
CN108712228A (zh) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | 一种基于协作干扰的防窃听最优安全传输方法 |
CN108833341A (zh) * | 2018-04-26 | 2018-11-16 | 西安交通大学 | 一种ofdm系统中基于子载波排序和xor运算的物理层安全传输方法 |
CN109714090A (zh) * | 2019-01-25 | 2019-05-03 | 伍仁勇 | 一种多天线二维矢量传输方法及系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028521A1 (en) * | 2013-03-13 | 2016-01-28 | Sharp Kabushiki Kaisha | Base station, terminal, communication system, communication method, and integrated circuit |
WO2015096143A1 (zh) * | 2013-12-27 | 2015-07-02 | 华为技术有限公司 | 一种传输信道状态信息的传输方法和设备 |
US10547366B2 (en) * | 2015-09-04 | 2020-01-28 | Samsung Electronics Co., Ltd. | Method and apparatus for CSI reporting on PUCCH |
CN106685496A (zh) * | 2015-11-06 | 2017-05-17 | 北京信威通信技术股份有限公司 | 一种多输入输出系统中反馈信道状态信息的方法 |
-
2019
- 2019-01-25 CN CN201910072420.3A patent/CN109714090B/zh active Active
- 2019-12-10 WO PCT/CN2019/124226 patent/WO2020151383A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150188662A1 (en) * | 2011-02-22 | 2015-07-02 | Celeno Communications (Israel) Ltd. | Phy-level wireless security |
CN105007578A (zh) * | 2015-06-05 | 2015-10-28 | 西安交通大学 | 5g通信系统中基于下行反馈辅助的上行安全传输方法 |
CN108833341A (zh) * | 2018-04-26 | 2018-11-16 | 西安交通大学 | 一种ofdm系统中基于子载波排序和xor运算的物理层安全传输方法 |
CN108712228A (zh) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | 一种基于协作干扰的防窃听最优安全传输方法 |
CN109714090A (zh) * | 2019-01-25 | 2019-05-03 | 伍仁勇 | 一种多天线二维矢量传输方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN109714090A (zh) | 2019-05-03 |
CN109714090B (zh) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Deep learning-based CSI feedback approach for time-varying massive MIMO channels | |
He et al. | Pilot allocation for distributed-compressed-sensing-based sparse channel estimation in MIMO-OFDM systems | |
CN109194378B (zh) | 基于线性神经网络的物理层安全波束赋形方法 | |
WO2020192524A1 (zh) | 抵抗导频污染攻击的无线传输方法及系统 | |
CN110086610B (zh) | 一种基于初始密钥不一致率的生成密钥自适应调和方法 | |
CN106102055B (zh) | 基于特征分布变换的无线信道密钥生成方法 | |
WO2020151383A1 (zh) | 一种多天线二维矢量传输方法及系统 | |
CN111130802A (zh) | 基于物理层激励-响应机制的物理层安全认证算法 | |
CN113395096B (zh) | 一种fdd系统中基于深度学习的物理层安全传输方法 | |
CN109728865A (zh) | 一种大规模天线阵中基于人工噪声的窃听编码方法 | |
CN111065096A (zh) | 针对无线通信的物理层加密传输系统及其方法 | |
Wang et al. | Online LSTM-based channel estimation for HF MIMO SC-FDE system | |
CN114696849B (zh) | 消除人工噪声的信号接收方法 | |
Quist et al. | Bound on the key establishment rate for multi-antenna reciprocal electromagnetic channels | |
Zhou et al. | Physical layer secret key generation for spatially correlated channels based on multi-task autoencoder | |
Han et al. | A novel physical layer key generation method based on WGAN-GP adversarial autoencoder | |
CN108494447B (zh) | 一种物理层安全通信中的资源分配方法 | |
CN116017451A (zh) | 一种利用5G NR物理层信息的IPv6终端身份认证方法 | |
CN112134603B (zh) | Mu-mimo系统安全传输发射信号合成方法 | |
CN114980086A (zh) | 模型训练、密钥生成方法、训练设备、通信方及系统 | |
Tang et al. | Fast and efficient physical layer secret key generation over static wireless channels | |
CN111464299B (zh) | 基于频分双工模式下构建互易信道参数的物理层密钥生成方法 | |
CN114125826A (zh) | 一种基于信号强度的物理层密钥提取方法、系统、设备和介质 | |
CN110719126B (zh) | 一种适用于mimo通信系统的隐蔽通信方法 | |
Zhang et al. | 4-WFRFT for Physical Layer Security Enhancement Based on MIMO Correlated Channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19911409 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19911409 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19911409 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07/02/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19911409 Country of ref document: EP Kind code of ref document: A1 |