WO2021227482A1 - Secure transmission method in large-scale antenna system - Google Patents
Secure transmission method in large-scale antenna system Download PDFInfo
- Publication number
- WO2021227482A1 WO2021227482A1 PCT/CN2020/135741 CN2020135741W WO2021227482A1 WO 2021227482 A1 WO2021227482 A1 WO 2021227482A1 CN 2020135741 W CN2020135741 W CN 2020135741W WO 2021227482 A1 WO2021227482 A1 WO 2021227482A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- channel
- main channel
- uplink
- sender
- antenna system
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
Definitions
- This application belongs to the field of wireless communication technology, and particularly relates to a secure transmission method in a large-scale antenna system.
- Massive MIMO Multiple-Input Multiple-Output
- 5G Fifth-Generation, fifth-generation mobile communication technology
- 5G Fifth-Generation, fifth-generation mobile communication technology
- the spatial resolution of the antenna array increases.
- physical layer security has become an effective method to ensure secure transmission in massive MIMO systems.
- the massive MIMO system Due to the narrowing of the user's beam and the increase in the number of transmitting antennas, the massive MIMO system usually adopts low-complexity linear beamforming, so as to have good safe transmission performance.
- the legitimate receiver and the eavesdropper have almost the same spatial direction relative to the sender, it means that the main channel and the eavesdropping channel are highly correlated. In this case, the design of a secure transmission scheme becomes very necessary.
- the beamforming solution requires the sender to obtain accurate CSI (Channel State Information) of the receiver and the eavesdropper.
- the sender designs the transmitting beam so that the nulls are aimed at the eavesdropper, so that the eavesdropper cannot demodulate the correct information under a low signal-to-noise ratio.
- the design of the beam will introduce extremely high complexity, making practical applications very difficult.
- the main step is to introduce noise into the null space of the main channel (the channel between the sender and the legal receiver), which reduces the eavesdropper’s channel quality without affecting the signal-to-noise ratio of the legal receiver, thereby improving the system The safe capacity.
- the legal receiver and the eavesdropper have similar spatial directions relative to the sender, a large amount of transmission power needs to be consumed to generate artificial noise to produce obvious interference effects, and the overall performance of the system is not ideal.
- the beamforming solution requires the sender to obtain accurate CSI (Channel State Information) of the receiver and the eavesdropper.
- the sender designs the transmitting beam so that the nulls are aimed at the eavesdropper, so that the eavesdropper cannot demodulate the correct information under a low signal-to-noise ratio.
- the design of the beam will introduce extremely high complexity, making practical applications very difficult.
- the main step is to introduce noise into the null space of the main channel (the channel between the sender and the legal receiver), which reduces the eavesdropper’s channel quality without affecting the signal-to-noise ratio of the legal receiver, thereby improving the system The safe capacity.
- the legal receiver and the eavesdropper are close to the sender in spatial direction, a large amount of transmission power needs to be consumed to generate artificial noise to produce obvious interference effects, and the overall performance of the system is not ideal.
- This application provides a large-scale antenna system Secure transmission method in.
- this application provides a secure transmission method in a large-scale antenna system.
- the method includes the following steps:
- Step 1) The sender obtains the uplink channel vector of the legal receiver through channel estimation
- Step 2) The sender extracts the angle characteristic parameters of the uplink main channel according to the uplink channel vector;
- Step 3) The sender modulates the transmitted data according to the angle characteristic parameters of the uplink main channel, and performs downlink data transmission in the same coherent time slot.
- the uplink channel vector in the step 1) is obtained as follows:
- the base station has M>>1 antenna and is a uniform linear array, the legal receivers and eavesdroppers are randomly distributed in the coverage of the base station and both are configured with a single antenna, the length of the training sequence is L ⁇ T, where T is the channel coherence time length ,
- the sender obtains the estimated value of the uplink main channel based on the received signal.
- h r represents the uplink main channel in the form of an M ⁇ 1 vector
- the power normalization coefficient Represents the energy of the training sequence.
- N is an M ⁇ L noise matrix, where each element is the same and independently meets the mean value of 0, and the variance is The complex Gaussian distribution, Represents the power of noise.
- the estimated value of the uplink primary channel is:
- n is an M ⁇ 1 noise vector, where each element is identical and independently meets a complex Gaussian distribution with a mean value of 0 and a variance of 1.
- the uplink channel angle characteristic parameter is extracted as follows:
- the discrete Fourier transform of the uplink main channel can be expressed as Where F is an M ⁇ M matrix, and the elements in the p-th row and q-th column are Define q max as The subscript of the point with the largest energy in the middle;
- the spatial rotation matrix ⁇ ( ⁇ ) as a diagonal matrix composed of elements ⁇ 1,e j ⁇ ,...,e j(M-1) ⁇ ⁇ , the discrete Fourier transform of the channel after rotating with ⁇ as the parameter for The range of ⁇ is Solve the optimal space rotation angle ⁇ opt ; define the set
- ⁇ M represents the number of DFT points used for channel sparse representation
- the spatial characteristic parameters as Calculate the spatial characteristic parameter a 1 of the uplink main channel.
- step 3 the downlink data transmission process in step 3 is as follows:
- the sender performs the spatial rotation operation of the beam with a parameter of ⁇ 0 at the sending end, and the signal is received by the legal receiver;
- the legal receiver calculates the estimated value of the rotated downlink main channel based on the received signal according to Obtain the subscript q max2 of the maximum energy point of the downlink main channel; calculate the sparse estimation value of the downlink main channel after rotation according to the received signal according to With reference to the method in step 2), ⁇ opt2 of the downlink primary channel can be obtained;
- the estimated value of the angle characteristic parameter of the downlink main channel obtained by the legal receiver is obtained.
- the N-bit data sent by the transmitting end can be demodulated according to the mapping relationship.
- the normalized training matrix SS H is a matrix of ⁇ L, the parameter ⁇ satisfies ⁇ M, and the normalized training matrix as a whole satisfies the trace of SS H not exceeding ⁇ , other parameter variables are the same as defined above.
- the sender can obtain the estimated value of the angular characteristic parameter of the downlink main channel:
- the estimated value of the downlink primary channel is as follows:
- C spa2 is a To The set of integers at the center.
- the secure transmission method in a large-scale antenna system is a secure transmission method in a large-scale antenna system based on feature reciprocity in a large-scale antenna system.
- the secure transmission method in the large-scale antenna system uses the angular reciprocity of the uplink and downlink channels in the massive MIMO system to propose a new feature reciprocity-based secure transmission scheme.
- the channel model adopts a typical low-rank channel model, which is based on the average DOA (Direction of Arrivals) and AS (Angle Spread) of the incident path. ) Modeling.
- this application proposes a method for extracting the angular feature of the multipath channel, which uses the reciprocity of the single path to realize the feature reciprocity of the multipath. It is easy to ensure that only legitimate receivers can correctly extract the sender’s information, and secure transmission can be ensured in multiple scenarios.
- the secure transmission method in the large-scale antenna system overcomes the defects of the prior art, uses the physical uplink and downlink angular reciprocity to extract the angular characteristic parameter reciprocity of the channel, and performs the channel performance based on the transmitted data.
- the spatial rotation at a certain angle ensures that the legitimate receiver can extract the desired data value according to the downlink channel, and secure transmission can be ensured without knowing the eavesdropper's channel.
- the secure transmission method in the large-scale antenna system provided by this application is not affected by the eavesdropper's position, channel quality, number of antennas, and other parameters, and is suitable for multi-scene secure transmission under the large-scale antenna system.
- the secure transmission method in the large-scale antenna system provided by this application is based on the extraction of the angle characteristic parameters of the uplink and downlink channels. Compared with the traditional beamforming technology, as the number of antennas increases, there is no need to perform complex beam design, and the overall system complexity is not Will increase significantly and is relatively easy to implement.
- the secure transmission method in the large-scale antenna system provided by this application is based on the consistency of the arrival angle and the complex gain of each path of the uplink and downlink main channels. As long as the eavesdropper and the legal receiver are separated by several wavelengths, the probability of eavesdropping success is almost zero.
- This secure transmission premise is easy to implement in the millimeter wave band. Therefore, the sender does not need to know the channel state information of the eavesdropping channel.
- the secure transmission method in a large-scale antenna system provided in this application is suitable for transmitting bit-level key parameters within a coherent time.
- the overall transmission rate is not based on the security capacity theory in the information theory, so arbitrarily increasing the number of antennas on the eavesdropping side will not affect the security performance.
- the secure transmission method in the large-scale antenna system overcomes the limitations of the existing traditional physical layer secure transmission scheme in the massive MIMO scenario, and has security performance in scenarios where the eavesdropper and the legitimate receiver are particularly close. Unaffected, it provides a new idea for the design of the secure transmission scheme.
- Fig. 1 is a schematic diagram of a single-antenna single-eavesdropper model of the massive MIMO system of the present application
- Figure 2 is a comparison diagram of the secure transmission performance of the present application under different bit data rates
- Figure 3 is a comparison diagram of the secure transmission performance of the present application under different channel sparsity degrees.
- this application provides reference to FIG. 1.
- both the legitimate receiver and the eavesdropper are single-antenna users randomly distributed in the coverage area of the base station (sender). There are few scattering objects around the base station, the incident angle at the base station is extremely narrow, and the correlation between the multipath channel paths is very strong. Assume that the eavesdropper is in a silent eavesdropping state, that is, not actively sending out any signals.
- the sender, the legal receiver, and the eavesdropper all know the normalized training matrix S, the parameters ⁇ , ⁇ ,N, ⁇ 1 , ⁇ 2 , the eavesdropper knows the data demodulation method and will perform the same method according to the eavesdropping channel demodulation.
- this application provides a secure transmission method in a large-scale antenna system.
- the method includes the following steps:
- Step 1) The sender (base station) obtains the uplink channel vector of the legal receiver through channel estimation;
- Step 2) The sender (base station) extracts the angle characteristic parameters of the uplink main channel according to the uplink channel vector;
- Step 3) The sender (base station) modulates the transmitted data according to the angle characteristic parameters of the uplink main channel, and performs downlink data transmission in the same coherent time slot.
- the uplink channel vector in the step 1) is obtained as follows:
- the base station has M>>1 antenna and is a uniform linear array, the legal receivers and eavesdroppers are randomly distributed in the coverage of the base station and both are configured with a single antenna, the length of the training sequence is L ⁇ T, where T is the channel coherence time length ,
- the sender obtains the estimated value of the uplink main channel based on the received signal.
- the signal received by the sender is:
- h r represents the uplink main channel in the form of an M ⁇ 1 vector
- the power normalization coefficient Represents the energy of the training sequence.
- N is an M ⁇ L noise matrix, where each element is the same and independently meets the mean value of 0, and the variance is The complex Gaussian distribution, Represents the power of noise.
- the estimated value of the uplink primary channel is:
- n is an M ⁇ 1 noise vector, where each element is identical and independently satisfies a complex Gaussian distribution with a mean value of 0 and a variance of 1.
- the uplink channel angle characteristic parameters are extracted as follows:
- the discrete Fourier transform of the uplink main channel can be expressed as Where F is an M ⁇ M matrix, and the elements in the p-th row and q-th column are When the number of base station antennas tends to infinity, the energy of each path is concentrated at a point in the DFT domain, and the position of this point reflects the angular characteristics of the path; when the number of base station antennas is limited, due to the limitation of spatial resolution, the energy Leakage occurs, according to the characteristic of decreasing energy leakage edge; define q max as The subscript of the point with the largest energy in the middle; q max roughly reflects the distribution characteristics of the incident angle of the multipath channel. In order to more accurately extract the angle characteristics of the channel, a spatial rotation operation needs to be introduced.
- the spatial rotation matrix ⁇ ( ⁇ ) as a diagonal matrix composed of elements ⁇ 1,e j ⁇ ,...,e j(M-1) ⁇ ⁇ , the discrete Fourier transform of the channel after rotating with ⁇ as the parameter for The range of ⁇ is Solve the optimal space rotation angle ⁇ opt ; define the set
- ⁇ M represents the number of DFT points used for channel sparse representation
- the sub-vector of the vector contains the elements in the set C spa as the subscript index Therefore, it is only necessary to take several values within the value range of the parameter ⁇ and compare the corresponding channel energy to determine the maximum channel energy and the corresponding optimal spatial rotation angle ⁇ opt .
- the spatial characteristic parameters as Calculate the spatial characteristic parameter a 1 of the uplink main channel.
- the downlink data transmission process in the step 3 is as follows:
- the sender performs the spatial rotation operation of the beam with a parameter of ⁇ 0 at the sending end, and the signal is received by the legal receiver;
- the legal receiver calculates the estimated value of the rotated downlink main channel based on the received signal according to Obtain the subscript q max2 of the maximum energy point of the downlink main channel; calculate the sparse estimation value of the downlink main channel after rotation according to the received signal according to With reference to the method in step 2), ⁇ opt2 of the downlink primary channel can be obtained;
- the estimated value of the angle characteristic parameter of the downlink main channel obtained by the legal receiver is obtained.
- the N-bit data sent by the transmitting end can be demodulated according to the mapping relationship.
- the received signal of the legal receiver is the received signal of the legal receiver.
- the normalized training matrix SS H is a matrix of ⁇ L, the parameter ⁇ satisfies ⁇ M, and the normalized training matrix as a whole satisfies the trace of SS H not exceeding ⁇ , other parameter variables are the same as defined above.
- the parameter ⁇ 0 depends on the bit data that needs to be sent currently, and the specific determination method is as follows:
- the sender For TDD (Time Division Duplex, Time Division Duplex)/FDD (Frequency Division Duplex, Frequency Division Duplex) systems, assuming that the uplink electromagnetic wave wavelength is ⁇ 1 and the downlink electromagnetic wave wavelength is ⁇ 2 , according to the angular reciprocity of the path, the sender The estimated value of the angle characteristic parameter of the downlink main channel can be obtained
- the estimated value of the main downlink channel is as follows:
- the sparse estimation value is:
- C spa2 is a To The set of integers at the center.
- Figures 2 and 3 show the bit error rate performance of eavesdroppers and legitimate receivers under the secure transmission method in this large-scale antenna system.
- L 128, the signal-to-noise ratio of the simulation independent variable is defined as It can be seen that with the change of the signal-to-noise ratio and system parameters, the bit error rate of the eavesdropper has always been maintained above 0.45, that is, basically no useful information can be deciphered from the data demodulation.
- Figure 2 compares the variation of the bit error rate of the legal receiver and the eavesdropper with the signal-to-noise ratio under different bit transmission rates.
- Set ⁇ 128 in the simulation. Since the angular characteristic parameter range of the channel is a fixed value, as the bit transmission rate increases, the single interval becomes narrower, the interval center distance decreases, and the bit error rate rises under the same signal-to-noise ratio. Therefore, in practical applications, data transmission is required. Fastness and reliability are compromised.
- the angular characteristic parameters of the eavesdropping channel and the main channel basically satisfy independent and identical distributions, so the bit error rate of the demodulated bit data is always close to 0.5.
- Figure 3 compares the variation of the bit error rate of the legal receiver and the eavesdropper with the signal-to-noise ratio under different channel sparsity levels.
- Set N 2 in the simulation.
- Channel sparse processing is an effective means to reduce the impact of noise in the massive MIMO scenario.
- the channel is sparsely processed to improve the feature reciprocity Accuracy of extraction. Since the security performance of the system has nothing to do with the quality of the eavesdropper's channel, the security transmission performance will not be affected.
Abstract
The present application relates to a secure transmission method in a large-scale antenna system. As the number of antennas increases, extremely high complexity is introduced into the design of beams, and a practical application is difficult. For a scenario that spatial directions of a legitimate receiver and an eavesdropper with respect to a sender are similar, an obvious interference effect can be generated only by consuming a large amount of transmitting power to generate artificial noise, so that the overall system performance is unsatisfactory. The present application provides a secure transmission method in a large-scale antenna system. The method comprises the following steps: a sender obtains an uplink channel vector of a legitimate receiver by means of channel estimation; the sender extracts an angle feature parameter of a main uplink channel according to the uplink channel vector; and the sender modulates sent data according to the angle feature parameter of the main uplink channel, and performs downlink data transmission within the same coherent time slot. The method ensures that only the legitimate receiver can correctly extract information from the sender, and secure transmission can be ensured in multiple scenarios of the large-scale antenna system.
Description
本申请属于无线通信技术领域,特别是涉及一种大规模天线系统中的安全传输方法。This application belongs to the field of wireless communication technology, and particularly relates to a secure transmission method in a large-scale antenna system.
大规模MIMO(Multiple-Input Multiple-Output,多输入多输出)技术被视作5G(5th-Generation,第五代移动通信技术)物理层中最有前景的技术。随着天线数量的增加,天线阵列的空间分辨率提升。利用空间域中信道的特性,物理层安全已成为确保大规模MIMO系统中安全传输的有效方法。Massive MIMO (Multiple-Input Multiple-Output) technology is regarded as the most promising technology in the 5G (5th-Generation, fifth-generation mobile communication technology) physical layer. As the number of antennas increases, the spatial resolution of the antenna array increases. Using the characteristics of the channel in the spatial domain, physical layer security has become an effective method to ensure secure transmission in massive MIMO systems.
基于用户的波束变窄,发射天线的数目增加的特性,大规模MIMO系统通常采用低复杂度的线性波束成形,从而具有良好的安全传输性能。但是,如果合法接收者和窃听者相对于发送者几乎具有相同的空间方向,则意味着主信道和窃听信道具有高度相关性,这种情况下安全传输方案设计变得十分必要。Due to the narrowing of the user's beam and the increase in the number of transmitting antennas, the massive MIMO system usually adopts low-complexity linear beamforming, so as to have good safe transmission performance. However, if the legitimate receiver and the eavesdropper have almost the same spatial direction relative to the sender, it means that the main channel and the eavesdropping channel are highly correlated. In this case, the design of a secure transmission scheme becomes very necessary.
对于MIMO系统,已有解决方案主要包含波束成形和人工噪声两个方面:其中,波束成形方案要求发送者获取接收者和窃听者准确的CSI(Channel State Information,信道状态信息)。发送者对发射波束进行设计,使零陷对准窃听者,从而使窃听者在低信噪比下无法解调出正确信息。在大规模MIMO系统中,随着天线数量上升,对波束的设计将引入极高的复杂度,实际应用十分困难。对于人工噪声方案,主要步骤是通过在主信道(发送者与合法接收者间的信道)的零空间引入噪声,在不影响合法接收者信噪比的同时降低窃听者的信道质量,从而提升系统的安全容量。对于合法接收者和窃听者相对于发送者空间方向相近的场景,需要消耗大量发射功率产生人工噪声才能产生明显的干扰效果,系统整体性能不理想。For MIMO systems, existing solutions mainly include beamforming and artificial noise. Among them, the beamforming solution requires the sender to obtain accurate CSI (Channel State Information) of the receiver and the eavesdropper. The sender designs the transmitting beam so that the nulls are aimed at the eavesdropper, so that the eavesdropper cannot demodulate the correct information under a low signal-to-noise ratio. In a massive MIMO system, as the number of antennas increases, the design of the beam will introduce extremely high complexity, making practical applications very difficult. For the artificial noise scheme, the main step is to introduce noise into the null space of the main channel (the channel between the sender and the legal receiver), which reduces the eavesdropper’s channel quality without affecting the signal-to-noise ratio of the legal receiver, thereby improving the system The safe capacity. For scenarios where the legal receiver and the eavesdropper have similar spatial directions relative to the sender, a large amount of transmission power needs to be consumed to generate artificial noise to produce obvious interference effects, and the overall performance of the system is not ideal.
发明内容Summary of the invention
1.要解决的技术问题1. Technical problems to be solved
基于对于MIMO系统,已有解决方案主要包含波束成形和人工噪声两个方面:其中,波束成形方案要求发送者获取接收者和窃听者准确的CSI(Channel State Information,信道状态信息)。发送者对发射波束进行设计,使零陷对准窃听者,从而使窃听者在低信噪比下无法解调出正确信息。在大规模MIMO系统中,随着天线数量上升,对波束的设计将引入极高的复杂度,实际应用十分困难。对于人工噪声方案,主要步骤是通过在主信道(发送者与合法接收者间的信道)的零空间引入噪声,在不影响合法接收者信噪比的同时降低窃听者的信道质量,从而提升系统的安全容量。对于合法接收者和窃听者相对于发送者空间方向相近的场 景,需要消耗大量发射功率产生人工噪声才能产生明显的干扰效果,系统整体性能不理想的问题,本申请提供了一种大规模天线系统中的安全传输方法。Based on the MIMO system, existing solutions mainly include beamforming and artificial noise. Among them, the beamforming solution requires the sender to obtain accurate CSI (Channel State Information) of the receiver and the eavesdropper. The sender designs the transmitting beam so that the nulls are aimed at the eavesdropper, so that the eavesdropper cannot demodulate the correct information under a low signal-to-noise ratio. In a massive MIMO system, as the number of antennas increases, the design of the beam will introduce extremely high complexity, making practical applications very difficult. For the artificial noise scheme, the main step is to introduce noise into the null space of the main channel (the channel between the sender and the legal receiver), which reduces the eavesdropper’s channel quality without affecting the signal-to-noise ratio of the legal receiver, thereby improving the system The safe capacity. For the scenario where the legal receiver and the eavesdropper are close to the sender in spatial direction, a large amount of transmission power needs to be consumed to generate artificial noise to produce obvious interference effects, and the overall performance of the system is not ideal. This application provides a large-scale antenna system Secure transmission method in.
2.技术方案2. Technical solution
为了达到上述的目的,本申请提供了一种大规模天线系统中的安全传输方法,所述方法包括如下步骤:In order to achieve the above objective, this application provides a secure transmission method in a large-scale antenna system. The method includes the following steps:
步骤1):发送者通过信道估计获取合法接收者上行信道向量;Step 1): The sender obtains the uplink channel vector of the legal receiver through channel estimation;
步骤2):发送者根据所述上行信道向量提取出上行主信道的角度特征参数;Step 2): The sender extracts the angle characteristic parameters of the uplink main channel according to the uplink channel vector;
步骤3):发送者根据所述上行主信道的角度特征参数对发送数据进行调制,在同一相干时隙内进行下行数据传输。Step 3): The sender modulates the transmitted data according to the angle characteristic parameters of the uplink main channel, and performs downlink data transmission in the same coherent time slot.
本申请提供的另一种实施方式为:所述步骤1)中上行信道向量获取如下:Another implementation manner provided by this application is: the uplink channel vector in the step 1) is obtained as follows:
设基站端有M>>1根天线且为均匀线阵,合法接收者和窃听者随机分布在基站覆盖范围且均为单天线配置,训练序列的长度L<T,其中T为信道相干时间长度,Suppose that the base station has M>>1 antenna and is a uniform linear array, the legal receivers and eavesdroppers are randomly distributed in the coverage of the base station and both are configured with a single antenna, the length of the training sequence is L<T, where T is the channel coherence time length ,
发送者根据接收信号获得上行主信道的估计值。The sender obtains the estimated value of the uplink main channel based on the received signal.
本申请提供的另一种实施方式为:所述上行信道估计中,发送者接收到的信号为:Another implementation manner provided by this application is: in the uplink channel estimation, the signal received by the sender is:
其中,h
r以M×1的向量的形式表示上行主信道,s
H表示满足s
Hs=L的归一化的正交训练序列s的共轭转置,
定义为功率归一化系数,
表示训练序列的能量。N为M×L的噪声矩阵,其中每个元素相同且独立地满足均值为0,方差为
的复高斯分布,
表示噪声的功率。
Among them, h r represents the uplink main channel in the form of an M×1 vector, and s H represents the conjugate transpose of the normalized orthogonal training sequence s that satisfies s H s=L, Defined as the power normalization coefficient, Represents the energy of the training sequence. N is an M×L noise matrix, where each element is the same and independently meets the mean value of 0, and the variance is The complex Gaussian distribution, Represents the power of noise.
本申请提供的另一种实施方式为:所述上行主信道的估计值为:Another implementation manner provided by this application is: the estimated value of the uplink primary channel is:
其中
,n为M×1噪声向量,其中每个元素相同且独立地满足均值为0,方差为1的复高斯分布。
Among them , n is an M×1 noise vector, where each element is identical and independently meets a complex Gaussian distribution with a mean value of 0 and a variance of 1.
本申请提供的另一种实施方式为:所述步骤2)中上行信道角度特征参数提取如下:Another implementation manner provided by this application is: in the step 2), the uplink channel angle characteristic parameter is extracted as follows:
上行主信道的离散傅里叶变换可以表示为
其中F是M×M的矩阵,其第p行第q列的元素为
定义q
max为
中能量最大的点的下标;
The discrete Fourier transform of the uplink main channel can be expressed as Where F is an M×M matrix, and the elements in the p-th row and q-th column are Define q max as The subscript of the point with the largest energy in the middle;
定义空间旋转矩阵Φ(φ)是由元素{1,e
jφ,...,e
j(M-1)φ}组成的对角矩阵,信道以φ为参数进行旋转后的离散傅里叶变换为
φ取值范围为
求解最优空间旋转角度φ
opt;定义集合
Define the spatial rotation matrix Φ(φ) as a diagonal matrix composed of elements {1,e jφ ,...,e j(M-1)φ }, the discrete Fourier transform of the channel after rotating with φ as the parameter for The range of φ is Solve the optimal space rotation angle φ opt ; define the set
其中,μ<<M表示用于信道稀疏化表示的DFT点的数量,因此Among them, μ<<M represents the number of DFT points used for channel sparse representation, so
其中
表示
的子向量,该向量包含了以集合C
spa中元素作为下标索引的
中的元素;
in Express The sub-vector of the vector contains the elements in the set C spa as the subscript index Elements in
定义空间特征参数为
计算出上行主信道的空间特征参数a
1。
Define the spatial characteristic parameters as Calculate the spatial characteristic parameter a 1 of the uplink main channel.
本申请提供的另一种实施方式为:所述步骤3)中下行数据传输流程如下:Another implementation manner provided by this application is: the downlink data transmission process in step 3) is as follows:
发送者在发送端进行参数为φ
0的波束的空间旋转操作,合法接收者端的接收信号;
The sender performs the spatial rotation operation of the beam with a parameter of φ 0 at the sending end, and the signal is received by the legal receiver;
合法接收者根据所述接收信号计算出旋转后的下行主信道的估计值
根据
得出下行主信道的最大能量点的下标q
max2;根据所述接收信号计算出旋转后的下行主信道的稀疏估计值
根据
参照步骤2)的方法,可以得出下行主信道的φ
opt2;
The legal receiver calculates the estimated value of the rotated downlink main channel based on the received signal according to Obtain the subscript q max2 of the maximum energy point of the downlink main channel; calculate the sparse estimation value of the downlink main channel after rotation according to the received signal according to With reference to the method in step 2), φ opt2 of the downlink primary channel can be obtained;
综上,得出合法接收者端得出的下行主信道的角度特征参数的估计值,根据此参数的区间位置,根据映射关系可以解调出发送端发送的N比特数据。In summary, the estimated value of the angle characteristic parameter of the downlink main channel obtained by the legal receiver is obtained. According to the interval position of this parameter, the N-bit data sent by the transmitting end can be demodulated according to the mapping relationship.
本申请提供的另一种实施方式为:所述合法接收者端的接收信号为Another implementation manner provided by this application is: the received signal from the legal receiver is
其中,
为下行主信道向量g
r的共轭转置,归一化训练矩阵SS
H为τ×L的矩阵,参数τ满足μ<τ<<M,归一化训练矩阵整体满足SS
H的迹不超过τ,其他参数变量与前文定义相同。
in, Is the conjugate transpose of the downlink main channel vector g r , the normalized training matrix SS H is a matrix of τ×L, the parameter τ satisfies μ<τ<<M, and the normalized training matrix as a whole satisfies the trace of SS H not exceeding τ, other parameter variables are the same as defined above.
本申请提供的另一种实施方式为:所述参数φ
0取决于当前需要发送的比特数据,具体确定方式如下:
Another implementation manner provided by this application is that the parameter φ 0 depends on the bit data that needs to be sent currently, and the specific determination method is as follows:
对于时分双工和频分双工系统,假设上行电磁波波长为λ
1,下行电磁波波长为λ
2,根据 径的角度互易性,发送者可以得出下行主信道的角度特征参数的估计值:
For time division duplex and frequency division duplex systems, assuming that the wavelength of the uplink electromagnetic wave is λ 1 and the wavelength of the downlink electromagnetic wave is λ 2 , according to the angular reciprocity of the path, the sender can obtain the estimated value of the angular characteristic parameter of the downlink main channel:
假设上下行主信道的DOA范围为[θ
r-Δθ
r,θ
r+Δθ
r],对应的下行主信道角度特征参数的范围为
假设单次传输需要发送N比特数据,则需要根据角度特征参数的范围均匀划分出K=2
N个区间;参数φ
0满足:将下行主信道进行参数为φ
0的空间旋转,旋转后的下行主信道的角度特征参数估计值
正好位于当前发送数据对应的区间的中心。
Assuming that the DOA range of the uplink and downlink main channel is [θ r -Δθ r ,θ r +Δθ r ], the corresponding range of the angle characteristic parameter of the downlink main channel is Assuming that a single transmission needs to send N-bit data, K=2 N intervals need to be divided evenly according to the range of the angle characteristic parameters; the parameter φ 0 satisfies: the downlink main channel is subjected to spatial rotation with the parameter φ 0 , and the rotated downlink Estimated value of the angle characteristic parameter of the main channel It is located exactly in the center of the interval corresponding to the currently sent data.
本申请提供的另一种实施方式为:所述下行主信道的估计值如下:Another implementation manner provided by this application is: the estimated value of the downlink primary channel is as follows:
本申请提供的另一种实施方式为:所述稀疏估计值为:Another implementation manner provided by this application is: the sparse estimation value is:
其中,根据角度互易性可知,C
spa2是一个包含了
个以
为中心的整数的集合。
Among them, according to the angle reciprocity, C spa2 is a To The set of integers at the center.
与现有技术相比,本申请提供的一种大规模天线系统中的安全传输方法的有益效果在于:Compared with the prior art, the beneficial effects of the secure transmission method in a large-scale antenna system provided by this application are:
本申请提供的大规模天线系统中的安全传输方法,为一种大规模天线系统中基于特征互易的大规模天线系统中的安全传输方法。The secure transmission method in a large-scale antenna system provided in this application is a secure transmission method in a large-scale antenna system based on feature reciprocity in a large-scale antenna system.
本申请提供的大规模天线系统中的安全传输方法,利用大规模MIMO系统中上下行信道的角度互易性,提出了一种新的基于特征互易的安全传输方案。The secure transmission method in the large-scale antenna system provided by this application uses the angular reciprocity of the uplink and downlink channels in the massive MIMO system to propose a new feature reciprocity-based secure transmission scheme.
本申请提供的大规模天线系统中的安全传输方法,信道模型采用一种典型的低秩信道模型,其根据入射径的平均DOA(Direction of Arrivals,波达方向)和AS(Angle Spread,角度扩展)建模。In the secure transmission method in the large-scale antenna system provided by this application, the channel model adopts a typical low-rank channel model, which is based on the average DOA (Direction of Arrivals) and AS (Angle Spread) of the incident path. ) Modeling.
本申请提供的大规模天线系统中的安全传输方法,根据径的角度互易性,本申请提出了一种多径信道角度特征提取方法,利用单径的互易性实现了多径的特征互易,从而保证了只 有合法接收者能够正确提取出发送者的信息,在多场景下皆能保证安全传输。According to the secure transmission method in the large-scale antenna system provided by this application, according to the angular reciprocity of the path, this application proposes a method for extracting the angular feature of the multipath channel, which uses the reciprocity of the single path to realize the feature reciprocity of the multipath. It is easy to ensure that only legitimate receivers can correctly extract the sender’s information, and secure transmission can be ensured in multiple scenarios.
本申请提供的大规模天线系统中的安全传输方法,克服现有技术的缺陷,利用径物理上的上下行角度互易性提取出信道的角度特征参数互易性,根据发送的数据对信道进行一定角度的空间旋转,保证合法接收者能根据下行信道提取出期望的数据值,无需获知窃听者的信道即可保证安全传输。The secure transmission method in the large-scale antenna system provided by this application overcomes the defects of the prior art, uses the physical uplink and downlink angular reciprocity to extract the angular characteristic parameter reciprocity of the channel, and performs the channel performance based on the transmitted data. The spatial rotation at a certain angle ensures that the legitimate receiver can extract the desired data value according to the downlink channel, and secure transmission can be ensured without knowing the eavesdropper's channel.
本申请提供的大规模天线系统中的安全传输方法,安全传输性能不受窃听者位置、信道质量、天线数量等参数的影响,适用于大规模天线系统下多场景的安全传输。The secure transmission method in the large-scale antenna system provided by this application is not affected by the eavesdropper's position, channel quality, number of antennas, and other parameters, and is suitable for multi-scene secure transmission under the large-scale antenna system.
本申请提供的大规模天线系统中的安全传输方法,基于上下行信道角度特征参数的提取,相比于传统波束成形技术,随着天线数量增加,无需进行复杂的波束设计,系统整体复杂度不会显著增加,实现相对容易。The secure transmission method in the large-scale antenna system provided by this application is based on the extraction of the angle characteristic parameters of the uplink and downlink channels. Compared with the traditional beamforming technology, as the number of antennas increases, there is no need to perform complex beam design, and the overall system complexity is not Will increase significantly and is relatively easy to implement.
本申请提供的大规模天线系统中的安全传输方法,安全传输建立在上下行主信道每条径的波达角和复增益的一致性。只要窃听者和合法接收者相隔了若干波长的距离,窃听成功可能性几乎为零。这个安全传输前提在毫米波波段是容易实现的。因此发送者无需获知窃听信道的信道状态信息。The secure transmission method in the large-scale antenna system provided by this application is based on the consistency of the arrival angle and the complex gain of each path of the uplink and downlink main channels. As long as the eavesdropper and the legal receiver are separated by several wavelengths, the probability of eavesdropping success is almost zero. This secure transmission premise is easy to implement in the millimeter wave band. Therefore, the sender does not need to know the channel state information of the eavesdropping channel.
本申请提供的大规模天线系统中的安全传输方法,适用于在一个相干时间内传输比特级关键参数。整体传输速率不建立在信息论中安全容量理论上,因此在窃听端任意增加天线数量不会影响安全性能。The secure transmission method in a large-scale antenna system provided in this application is suitable for transmitting bit-level key parameters within a coherent time. The overall transmission rate is not based on the security capacity theory in the information theory, so arbitrarily increasing the number of antennas on the eavesdropping side will not affect the security performance.
本申请提供的大规模天线系统中的安全传输方法,克服了已有的传统物理层安全传输方案在大规模MIMO场景下应用的局限性,在窃听者和合法接收者位置特别接近的场景安全性能不受影响,为安全传输方案设计提供了新思路。The secure transmission method in the large-scale antenna system provided by this application overcomes the limitations of the existing traditional physical layer secure transmission scheme in the massive MIMO scenario, and has security performance in scenarios where the eavesdropper and the legitimate receiver are particularly close. Unaffected, it provides a new idea for the design of the secure transmission scheme.
图1是本申请的大规模MIMO系统单天线单窃听者模型示意图;Fig. 1 is a schematic diagram of a single-antenna single-eavesdropper model of the massive MIMO system of the present application;
图2是本申请在不同的比特数据速率下安全传输性能比较图;Figure 2 is a comparison diagram of the secure transmission performance of the present application under different bit data rates;
图3是本申请在不同的信道稀疏程度下安全传输性能比较图。Figure 3 is a comparison diagram of the secure transmission performance of the present application under different channel sparsity degrees.
在下文中,将参考附图对本申请的具体实施例进行详细地描述,依照这些详细的描述,所属领域技术人员能够清楚地理解本申请,并能够实施本申请。在不违背本申请原理的情况下,各个不同的实施例中的特征可以进行组合以获得新的实施方式,或者替代某些实施例中的某些特征,获得其它优选的实施方式。Hereinafter, specific embodiments of the application will be described in detail with reference to the accompanying drawings. According to these detailed descriptions, those skilled in the art can clearly understand the application and can implement the application. Without violating the principle of the present application, the features in various embodiments can be combined to obtain new implementations, or replace some features in some embodiments to obtain other preferred implementations.
参考图1~3,本申请提供参考图1,本申请中假设合法接收者和窃听者均为随机分布在 基站(发送者)覆盖范围的单天线用户。基站周围散射物较少,基站端入射角极窄,多径信道径之间的相关性很强。假设窃听者处于静默窃听状态,即不主动发出任何信号。发送者,合法接收者,窃听者均已知归一化训练矩阵S,参数μ,τ,N,λ
1,λ
2,窃听者已知数据的解调方式且会根据窃听信道进行相同方式的解调。
Referring to FIGS. 1 to 3, this application provides reference to FIG. 1. In this application, it is assumed that both the legitimate receiver and the eavesdropper are single-antenna users randomly distributed in the coverage area of the base station (sender). There are few scattering objects around the base station, the incident angle at the base station is extremely narrow, and the correlation between the multipath channel paths is very strong. Assume that the eavesdropper is in a silent eavesdropping state, that is, not actively sending out any signals. The sender, the legal receiver, and the eavesdropper all know the normalized training matrix S, the parameters μ,τ,N,λ 1 ,λ 2 , the eavesdropper knows the data demodulation method and will perform the same method according to the eavesdropping channel demodulation.
针对以上系统模型,本申请提供一种大规模天线系统中的安全传输方法,所述方法包括如下步骤:In view of the above system model, this application provides a secure transmission method in a large-scale antenna system. The method includes the following steps:
步骤1):发送者(基站)通过信道估计获取合法接收者上行信道向量;Step 1): The sender (base station) obtains the uplink channel vector of the legal receiver through channel estimation;
步骤2):发送者(基站)根据所述上行信道向量提取出上行主信道的角度特征参数;Step 2): The sender (base station) extracts the angle characteristic parameters of the uplink main channel according to the uplink channel vector;
步骤3):发送者(基站)根据所述上行主信道的角度特征参数对发送数据进行调制,在同一相干时隙内进行下行数据传输。Step 3): The sender (base station) modulates the transmitted data according to the angle characteristic parameters of the uplink main channel, and performs downlink data transmission in the same coherent time slot.
进一步地,所述步骤1)中上行信道向量获取如下:Further, the uplink channel vector in the step 1) is obtained as follows:
设基站端有M>>1根天线且为均匀线阵,合法接收者和窃听者随机分布在基站覆盖范围且均为单天线配置,训练序列的长度L<T,其中T为信道相干时间长度,Suppose that the base station has M>>1 antenna and is a uniform linear array, the legal receivers and eavesdroppers are randomly distributed in the coverage of the base station and both are configured with a single antenna, the length of the training sequence is L<T, where T is the channel coherence time length ,
发送者根据接收信号获得上行主信道的估计值。The sender obtains the estimated value of the uplink main channel based on the received signal.
进一步地,所述上行信道估计中,发送者接收到的信号为:Further, in the uplink channel estimation, the signal received by the sender is:
其中,h
r以M×1的向量的形式表示上行主信道,s
H表示满足s
Hs=L的归一化的正交训练序列s的共轭转置,
定义为功率归一化系数,
表示训练序列的能量。N为M×L的噪声矩阵,其中每个元素相同且独立地满足均值为0,方差为
的复高斯分布,
表示噪声的功率。
Among them, h r represents the uplink main channel in the form of an M×1 vector, and s H represents the conjugate transpose of the normalized orthogonal training sequence s that satisfies s H s=L, Defined as the power normalization coefficient, Represents the energy of the training sequence. N is an M×L noise matrix, where each element is the same and independently meets the mean value of 0, and the variance is The complex Gaussian distribution, Represents the power of noise.
进一步地,所述上行主信道的估计值为:Further, the estimated value of the uplink primary channel is:
其中,n为M×1噪声向量,其中每个元素相同且独立地满足均值为0,方差为1的复高斯分布。Among them, n is an M×1 noise vector, where each element is identical and independently satisfies a complex Gaussian distribution with a mean value of 0 and a variance of 1.
进一步地,所述步骤2)中上行信道角度特征参数提取如下:Further, in the step 2), the uplink channel angle characteristic parameters are extracted as follows:
上行主信道的离散傅里叶变换可以表示为
其中F是M×M的矩阵,其第p 行第q列的元素为
当基站天线数量趋于无穷时,每条径的能量集中在DFT域的一个点,这个点的位置反应了这条径的角度特征;当基站天线数量有限时,由于空间分辨率的限制,能量泄漏出现,根据能量泄漏边缘递减的特点;定义q
max为
中能量最大的点的下标;q
max粗略地反映了多径信道入射角角度的分布特点,为了更精确地提取出信道的角度特征,需要引入空间旋转操作。
The discrete Fourier transform of the uplink main channel can be expressed as Where F is an M×M matrix, and the elements in the p-th row and q-th column are When the number of base station antennas tends to infinity, the energy of each path is concentrated at a point in the DFT domain, and the position of this point reflects the angular characteristics of the path; when the number of base station antennas is limited, due to the limitation of spatial resolution, the energy Leakage occurs, according to the characteristic of decreasing energy leakage edge; define q max as The subscript of the point with the largest energy in the middle; q max roughly reflects the distribution characteristics of the incident angle of the multipath channel. In order to more accurately extract the angle characteristics of the channel, a spatial rotation operation needs to be introduced.
定义空间旋转矩阵Φ(φ)是由元素{1,e
jφ,...,e
j(M-1)φ}组成的对角矩阵,信道以φ为参数进行旋转后的离散傅里叶变换为
φ取值范围为
求解最优空间旋转角度φ
opt;定义集合
Define the spatial rotation matrix Φ(φ) as a diagonal matrix composed of elements {1,e jφ ,...,e j(M-1)φ }, the discrete Fourier transform of the channel after rotating with φ as the parameter for The range of φ is Solve the optimal space rotation angle φ opt ; define the set
其中,μ<<M表示用于信道稀疏化表示的DFT点的数量,因此Among them, μ<<M represents the number of DFT points used for channel sparse representation, so
其中
表示
的子向量,该向量包含了以集合C
spa中元素作为下标索引的
中的元素;因此,仅需在参数φ的取值范围内取若干个值,比较其对应的信道能量大小,方可决定最大信道能量和对应的最优空间旋转角度φ
opt。
in Express The sub-vector of the vector contains the elements in the set C spa as the subscript index Therefore, it is only necessary to take several values within the value range of the parameter φ and compare the corresponding channel energy to determine the maximum channel energy and the corresponding optimal spatial rotation angle φ opt .
定义空间特征参数为
计算出上行主信道的空间特征参数a
1。
Define the spatial characteristic parameters as Calculate the spatial characteristic parameter a 1 of the uplink main channel.
进一步地,所述步骤3)中下行数据传输流程如下:Further, the downlink data transmission process in the step 3) is as follows:
发送者在发送端进行参数为φ
0的波束的空间旋转操作,合法接收者端的接收信号;
The sender performs the spatial rotation operation of the beam with a parameter of φ 0 at the sending end, and the signal is received by the legal receiver;
合法接收者根据所述接收信号计算出旋转后的下行主信道的估计值
根据
得出下行主信道的最大能量点的下标q
max2;根据所述接收信号计算出旋转后的下行主信道的稀疏估计值
根据
参照步骤2)的方法,可以得出下行主信道的φ
opt2;
The legal receiver calculates the estimated value of the rotated downlink main channel based on the received signal according to Obtain the subscript q max2 of the maximum energy point of the downlink main channel; calculate the sparse estimation value of the downlink main channel after rotation according to the received signal according to With reference to the method in step 2), φ opt2 of the downlink primary channel can be obtained;
综上,得出合法接收者端得出的下行主信道的角度特征参数的估计值,根据此参数的区间位置,根据映射关系可以解调出发送端发送的N比特数据。In summary, the estimated value of the angle characteristic parameter of the downlink main channel obtained by the legal receiver is obtained. According to the interval position of this parameter, the N-bit data sent by the transmitting end can be demodulated according to the mapping relationship.
进一步地,所述合法接收者端的接收信号为Further, the received signal of the legal receiver is
其中,
为下行主信道向量g
r的共轭转置,归一化训练矩阵SS
H为τ×L的矩阵,参数τ满足μ<τ<<M,归一化训练矩阵整体满足SS
H的迹不超过τ,其他参数变量与前文定义相同。
in, Is the conjugate transpose of the downlink main channel vector g r , the normalized training matrix SS H is a matrix of τ×L, the parameter τ satisfies μ<τ<<M, and the normalized training matrix as a whole satisfies the trace of SS H not exceeding τ, other parameter variables are the same as defined above.
进一步地,所述参数φ
0取决于当前需要发送的比特数据,具体确定方式如下:
Further, the parameter φ 0 depends on the bit data that needs to be sent currently, and the specific determination method is as follows:
对于TDD(Time Division Duplex,时分双工)/FDD(Frequency Division Duplex,频分双工)系统,假设上行电磁波波长为λ
1,下行电磁波波长为λ
2,根据径的角度互易性,发送者可以得出下行主信道的角度特征参数的估计值
For TDD (Time Division Duplex, Time Division Duplex)/FDD (Frequency Division Duplex, Frequency Division Duplex) systems, assuming that the uplink electromagnetic wave wavelength is λ 1 and the downlink electromagnetic wave wavelength is λ 2 , according to the angular reciprocity of the path, the sender The estimated value of the angle characteristic parameter of the downlink main channel can be obtained
假设上下行主信道的DOA范围为[θ
r-Δθ
r,θ
r+Δθ
r],对应的下行主信道角度特征参数的范围为
假设单次传输需要发送N比特数据,则需要根据角度特征参数的范围均匀划分出K=2
N个区间;参数φ
0满足:根据当前发送数据对应的区间,将下行主信道进行参数为φ
0的空间旋转,旋转后的下行主信道的角度特征参数估计值
正好位于当前发送数据对应的区间的中心。
Assuming that the DOA range of the uplink and downlink main channel is [θ r -Δθ r ,θ r +Δθ r ], the corresponding range of the angle characteristic parameter of the downlink main channel is Assuming that a single transmission needs to send N-bit data, K=2 N intervals need to be divided evenly according to the range of the angle characteristic parameters; the parameter φ 0 satisfies: According to the interval corresponding to the current transmission data, the downlink main channel is set to the parameter φ 0 The space rotation, the estimated value of the angle characteristic parameter of the downlink main channel after rotation It is located exactly in the center of the interval corresponding to the currently sent data.
进一步地,所述下行主信道的估计值如下:Further, the estimated value of the main downlink channel is as follows:
进一步地,所述稀疏估计值为:Further, the sparse estimation value is:
其中,根据角度互易性可知,C
spa2是一个包含了
个以
为中心的整数的集合。
Among them, according to the angle reciprocity, C spa2 is a To The set of integers at the center.
图2、3展示了本大规模天线系统中的安全传输方法下窃听者和合法接收者的误码率性能。仿真中假设系统为TDD系统,即λ
1=λ
2,基站端天线数为128,合法接收者与窃听者平均波达角均为30°,单边角度扩展均为2°,系统参数μ=12,L=128,仿真自变量信噪比 定义为
可以看出,随着信噪比和系统参数的变化,窃听者的误码率始终维持在0.45以上,即基本未从数据解调中破解出任何有用信息。
Figures 2 and 3 show the bit error rate performance of eavesdroppers and legitimate receivers under the secure transmission method in this large-scale antenna system. In the simulation, it is assumed that the system is a TDD system, that is, λ 1 =λ 2 , the number of base station antennas is 128, the average arrival angle of the legal receiver and the eavesdropper is 30°, the unilateral angle extension is 2°, and the system parameter μ= 12. L=128, the signal-to-noise ratio of the simulation independent variable is defined as It can be seen that with the change of the signal-to-noise ratio and system parameters, the bit error rate of the eavesdropper has always been maintained above 0.45, that is, basically no useful information can be deciphered from the data demodulation.
图2对比了不同的比特传输速率下合法接收者和窃听者的误码率随信噪比的变化情况。仿真中设置τ=128。由于信道的角度特征参数范围是固定值,随着比特传输速率上升,单个区间变窄,区间中心距离缩短,在相同的信噪比下误码率上升,因此在实际应用中需要对数据传输的快速性和可靠性进行折中。对于窃听者,窃听信道与主信道的的角度特征参数基本满足独立且相同的分布,因此解调出的比特数据的误码率始终接近0.5。Figure 2 compares the variation of the bit error rate of the legal receiver and the eavesdropper with the signal-to-noise ratio under different bit transmission rates. Set τ=128 in the simulation. Since the angular characteristic parameter range of the channel is a fixed value, as the bit transmission rate increases, the single interval becomes narrower, the interval center distance decreases, and the bit error rate rises under the same signal-to-noise ratio. Therefore, in practical applications, data transmission is required. Fastness and reliability are compromised. For eavesdroppers, the angular characteristic parameters of the eavesdropping channel and the main channel basically satisfy independent and identical distributions, so the bit error rate of the demodulated bit data is always close to 0.5.
图3对比了不同的信道稀疏程度下合法接收者和窃听者的误码率随信噪比的变化情况。仿真中设置N=2。信道的稀疏处理大规模MIMO场景下是减轻噪声影响的有效手段,为了进一步提升系统性能,在下行数据传输的信道角度特征参数的提取过程中,对信道采取了稀疏化处理,提升了特征互易提取的精确性。由于系统安全性能与窃听者信道质量无关,因此安全传输性能不会受到影响。Figure 3 compares the variation of the bit error rate of the legal receiver and the eavesdropper with the signal-to-noise ratio under different channel sparsity levels. Set N=2 in the simulation. Channel sparse processing is an effective means to reduce the impact of noise in the massive MIMO scenario. In order to further improve the system performance, in the process of extracting the channel angle characteristic parameters of the downlink data transmission, the channel is sparsely processed to improve the feature reciprocity Accuracy of extraction. Since the security performance of the system has nothing to do with the quality of the eavesdropper's channel, the security transmission performance will not be affected.
尽管在上文中参考特定的实施例对本申请进行了描述,但是所属领域技术人员应当理解,在本申请公开的原理和范围内,可以针对本申请公开的配置和细节做出许多修改。本申请的保护范围由所附的权利要求来确定,并且权利要求意在涵盖权利要求中技术特征的等同物文字意义或范围所包含的全部修改。Although the application is described above with reference to specific embodiments, those skilled in the art should understand that within the principles and scope disclosed in the application, many modifications can be made to the configuration and details disclosed in the application. The protection scope of this application is determined by the appended claims, and the claims are intended to cover all modifications included in the literal meaning or scope of equivalent technical features in the claims.
Claims (10)
- 一种大规模天线系统中的安全传输方法,其特征在于:所述方法包括如下步骤:A secure transmission method in a large-scale antenna system, characterized in that: the method includes the following steps:步骤1):发送者通过信道估计获取合法接收者上行信道向量;Step 1): The sender obtains the uplink channel vector of the legal receiver through channel estimation;步骤2):发送者根据所述上行信道向量提取出上行主信道的角度特征参数;Step 2): The sender extracts the angle characteristic parameters of the uplink main channel according to the uplink channel vector;步骤3):发送者根据所述上行主信道的角度特征参数对发送数据进行调制,在同一相干时隙内进行下行数据传输。Step 3): The sender modulates the transmitted data according to the angle characteristic parameters of the uplink main channel, and performs downlink data transmission in the same coherent time slot.
- 如权利要求1所述的大规模天线系统中的安全传输方法,其特征在于:所述步骤1)中上行信道向量获取如下:The secure transmission method in a large-scale antenna system according to claim 1, wherein the uplink channel vector in said step 1) is obtained as follows:设基站端有M>>1根天线且为均匀线阵,合法接收者和窃听者随机分布在基站覆盖范围且均为单天线配置,训练序列的长度L<T,其中T为信道相干时间长度,Suppose that the base station has M>>1 antenna and is a uniform linear array, the legal receivers and eavesdroppers are randomly distributed in the coverage of the base station and both are configured with a single antenna, the length of the training sequence is L<T, where T is the channel coherence time length ,发送者根据接收信号获得上行主信道的估计值。The sender obtains the estimated value of the uplink main channel based on the received signal.
- 如权利要求2所述的大规模天线系统中的安全传输方法,其特征在于:所述上行信道估计中,发送者接收到的信号为:The secure transmission method in a large-scale antenna system according to claim 2, wherein in the uplink channel estimation, the signal received by the sender is:其中,h r以M×1的向量的形式表示上行主信道,s H表示满足s Hs=L的归一化的正交训练序列s的共轭转置, 定义为功率归一化系数, 表示训练序列的能量。N为M×L的噪声矩阵,其中每个元素相同且独立地满足均值为0,方差为 的复高斯分布, 表示噪声的功率。 Among them, h r represents the uplink main channel in the form of an M×1 vector, and s H represents the conjugate transpose of the normalized orthogonal training sequence s that satisfies s H s=L, Defined as the power normalization coefficient, Represents the energy of the training sequence. N is an M×L noise matrix, where each element is the same and independently meets the mean value of 0, and the variance is The complex Gaussian distribution, Represents the power of noise.
- 如权利要求2所述的大规模天线系统中的安全传输方法,其特征在于:所述上行主信道的估计值为:The secure transmission method in a large-scale antenna system according to claim 2, wherein the estimated value of the uplink main channel is:其中,n为M×1噪声向量,其中每个元素相同且独立地满足均值为0,方差为1的复高斯分布。Among them, n is an M×1 noise vector, where each element is identical and independently satisfies a complex Gaussian distribution with a mean value of 0 and a variance of 1.
- 如权利要求1所述的大规模天线系统中的安全传输方法,其特征在于:所述步骤2)中上行信道角度特征参数提取如下:The secure transmission method in a large-scale antenna system according to claim 1, characterized in that: in the step 2), the angle characteristic parameters of the uplink channel are extracted as follows:上行主信道的离散傅里叶变换可以表示为 其中F是M×M的矩阵,其第p行第q列的元素为 定义q max为 中能量最大的点的下标; The discrete Fourier transform of the uplink main channel can be expressed as Where F is an M×M matrix, and the elements in the p-th row and q-th column are Define q max as The subscript of the point with the largest energy in the middle;定义空间旋转矩阵Φ(φ)是由元素{1,e jφ,...,e j(M-1)φ}组成的对角矩阵,信道以φ为参数进行旋转后的离散傅里叶变换为 φ取值范围为 求解最优空间旋转角度φ opt;定义集合 Define the spatial rotation matrix Φ(φ) as a diagonal matrix composed of elements {1,e jφ ,...,e j(M-1)φ }, the discrete Fourier transform of the channel after rotating with φ as the parameter for The range of φ is Solve the optimal space rotation angle φ opt ; define the set其中,μ<<M表示用于信道稀疏化表示的DFT点的数量,因此Among them, μ<<M represents the number of DFT points used for channel sparse representation, so其中 表示 的子向量,该向量包含了以集合 中元素作为下标索引的 中的元素; in Express The sub-vector of the vector contains the set The element in the index as a subscript Elements in
- 如权利要求1所述的大规模天线系统中的安全传输方法,其特征在于:所述步骤3)中下行数据传输流程如下:The method for secure transmission in a large-scale antenna system according to claim 1, wherein the downlink data transmission process in step 3) is as follows:发送者在发送端进行参数为φ 0的波束的空间旋转操作,合法接收者端的接收信号; The sender performs the spatial rotation operation of the beam with a parameter of φ 0 at the sending end, and the signal is received by the legal receiver;合法接收者根据所述接收信号计算出旋转后的下行主信道的估计值 根据 得出下行主信道的最大能量点的下标q max2;根据所述接收信号计算出旋转后的下行主信道的稀疏估计值 根据 参照步骤2)的方法,可以得出下行主信道的φ opt2; The legal receiver calculates the estimated value of the rotated downlink main channel based on the received signal according to Obtain the subscript q max2 of the maximum energy point of the downlink main channel; calculate the sparse estimation value of the downlink main channel after rotation according to the received signal according to With reference to the method in step 2), φ opt2 of the downlink primary channel can be obtained;综上,得出合法接收者端得出的下行主信道的角度特征参数的估计值,根据此参数的区间位置,根据映射关系可以解调出发送端发送的N比特数据。In summary, the estimated value of the angle characteristic parameter of the downlink main channel obtained by the legal receiver is obtained. According to the interval position of this parameter, the N-bit data sent by the transmitting end can be demodulated according to the mapping relationship.
- 如权利要求6所述的大规模天线系统中的安全传输方法,其特征在于:所述合法接收者端的接收信号为The method of secure transmission in a large-scale antenna system according to claim 6, wherein the received signal from the legal receiver is其中, 为下行主信道向量g r的共轭转置,归一化训练矩阵SS H为τ×L的矩阵,参数τ满足μ<τ<<M,归一化训练矩阵整体满足SS H的迹不超过τ。 in, Is the conjugate transpose of the downlink main channel vector g r , the normalized training matrix SS H is a matrix of τ×L, the parameter τ satisfies μ<τ<<M, and the normalized training matrix as a whole satisfies the trace of SS H not exceeding τ.
- 如权利要求6所述的大规模天线系统中的安全传输方法,其特征在于:所述参数φ 0取决于当前需要发送的比特数据,具体确定方式如下: The secure transmission method in a large-scale antenna system according to claim 6, wherein the parameter φ 0 depends on the bit data that needs to be sent currently, and the specific determination method is as follows:对于时分双工和频分双工系统,假设上行电磁波波长为λ 1,下行电磁波波长为λ 2,根据径的角度互易性,发送者可以得出下行主信道的角度特征参数的估计值 For time division duplex and frequency division duplex systems, assuming that the wavelength of the uplink electromagnetic wave is λ 1 and the wavelength of the downlink electromagnetic wave is λ 2 , according to the angular reciprocity of the path, the sender can obtain the estimated value of the angular characteristic parameter of the downlink main channel假设上下行主信道的DOA范围为[θ r-Δθ r,θ r+Δθ r],对应的下行主信道角度特征参数的范围为 假设单次传输需要发送N比特数据,则需要根据角度特征参数的范围均匀划分出K=2 N个区间;参数φ 0满足:将下行主信道进行参数为φ 0的空间旋转,旋转后的下行主信道的角度特征参数估计值 正好位于当前发送数据对应的区间的中心。 Assuming that the DOA range of the uplink and downlink main channel is [θ r -Δθ r ,θ r +Δθ r ], the corresponding range of the angle characteristic parameter of the downlink main channel is Assuming that a single transmission needs to send N-bit data, K=2 N intervals need to be divided evenly according to the range of the angle characteristic parameters; the parameter φ 0 satisfies: the downlink main channel is subjected to spatial rotation with the parameter φ 0 , and the rotated downlink Estimated value of the angle characteristic parameter of the main channel It is located exactly in the center of the interval corresponding to the currently sent data.
- 如权利要求6所述的大规模天线系统中的安全传输方法,其特征在于:所述稀疏估计值为:8. The secure transmission method in a large-scale antenna system according to claim 6, wherein the sparse estimation value is:
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010399066.8 | 2020-05-12 | ||
CN202010399066.8A CN111614387B (en) | 2020-05-12 | 2020-05-12 | Safe transmission method in large-scale antenna system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021227482A1 true WO2021227482A1 (en) | 2021-11-18 |
Family
ID=72201232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/135741 WO2021227482A1 (en) | 2020-05-12 | 2020-12-11 | Secure transmission method in large-scale antenna system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111614387B (en) |
WO (1) | WO2021227482A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114389654A (en) * | 2022-01-13 | 2022-04-22 | 郑州轻工业大学 | Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO |
CN114726464A (en) * | 2022-03-07 | 2022-07-08 | 东南大学 | Method for generating parameters of uplink and downlink asymmetric channel model |
CN114745031A (en) * | 2022-03-10 | 2022-07-12 | 西安电子科技大学 | Full-duplex MIMO physical layer secure transmission method |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111614387B (en) * | 2020-05-12 | 2021-06-22 | 西安交通大学 | Safe transmission method in large-scale antenna system |
CN114640378A (en) * | 2020-11-30 | 2022-06-17 | 中兴通讯股份有限公司 | Transmission channel determining method, transmission method, device, system, equipment and medium |
CN112995989B (en) * | 2021-04-30 | 2021-08-06 | 电子科技大学 | 5G application-oriented safe transmission method based on large-scale reconfigurable intelligent surface |
CN115412195B (en) * | 2022-08-26 | 2024-02-27 | 哈尔滨工业大学 | Generalized multi-fraction Fourier transform multi-component secure transmission method based on imperfect channel state information |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140161091A1 (en) * | 2011-08-03 | 2014-06-12 | Ansuman Adhikary | Method and apparatus for scheduling and mu-mimo transmission based on outdated channel state information at the transmitter |
CN106533625A (en) * | 2016-11-29 | 2017-03-22 | 河南科技大学 | Physical layer safety transmission method applicable to ZigBee network star type topology structure |
CN107294575A (en) * | 2017-06-16 | 2017-10-24 | 东南大学 | Extensive MIMO Beam Domain safety communicating methods |
CN109347527A (en) * | 2018-11-12 | 2019-02-15 | 东南大学 | A kind of extensive MIMO safe transmission method of service quality guarantee |
CN109618336A (en) * | 2019-01-24 | 2019-04-12 | 东南大学 | A kind of key extraction method in frequency division duplex system |
CN109639325A (en) * | 2019-01-24 | 2019-04-16 | 电子科技大学 | A kind of phased communication means of multicarrier based on communication distance |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN111614387A (en) * | 2020-05-12 | 2020-09-01 | 西安交通大学 | Safe transmission method in large-scale antenna system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013173251A2 (en) * | 2012-05-13 | 2013-11-21 | Invention Mine Llc | Wireless transmission with channel state perturbation |
CN106161297B (en) * | 2016-06-22 | 2019-03-01 | 西安交通大学 | Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis |
US10498449B2 (en) * | 2017-03-15 | 2019-12-03 | Nec Corporation | Secured hybrid coded modulation for 5G—and beyond—access networks |
CN107896125B (en) * | 2017-12-04 | 2020-11-24 | 华北电力大学(保定) | Physical layer secure transmission method of full-dimensional multi-antenna SWIPT system |
CN108366026B (en) * | 2018-03-16 | 2020-04-07 | 西安电子科技大学 | Physical layer safety transmission method of artificial noise based on constellation rotation |
-
2020
- 2020-05-12 CN CN202010399066.8A patent/CN111614387B/en active Active
- 2020-12-11 WO PCT/CN2020/135741 patent/WO2021227482A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140161091A1 (en) * | 2011-08-03 | 2014-06-12 | Ansuman Adhikary | Method and apparatus for scheduling and mu-mimo transmission based on outdated channel state information at the transmitter |
CN106533625A (en) * | 2016-11-29 | 2017-03-22 | 河南科技大学 | Physical layer safety transmission method applicable to ZigBee network star type topology structure |
CN107294575A (en) * | 2017-06-16 | 2017-10-24 | 东南大学 | Extensive MIMO Beam Domain safety communicating methods |
CN109347527A (en) * | 2018-11-12 | 2019-02-15 | 东南大学 | A kind of extensive MIMO safe transmission method of service quality guarantee |
CN109618336A (en) * | 2019-01-24 | 2019-04-12 | 东南大学 | A kind of key extraction method in frequency division duplex system |
CN109639325A (en) * | 2019-01-24 | 2019-04-16 | 电子科技大学 | A kind of phased communication means of multicarrier based on communication distance |
CN110518947A (en) * | 2019-09-27 | 2019-11-29 | 苏州大学 | It is a kind of that beam forming optimization method under environment is actively eavesdropped based on millimetre-wave attenuator |
CN111614387A (en) * | 2020-05-12 | 2020-09-01 | 西安交通大学 | Safe transmission method in large-scale antenna system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114389654A (en) * | 2022-01-13 | 2022-04-22 | 郑州轻工业大学 | Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO |
CN114726464A (en) * | 2022-03-07 | 2022-07-08 | 东南大学 | Method for generating parameters of uplink and downlink asymmetric channel model |
CN114726464B (en) * | 2022-03-07 | 2024-01-30 | 东南大学 | Method for generating uplink and downlink asymmetric channel model parameters |
CN114745031A (en) * | 2022-03-10 | 2022-07-12 | 西安电子科技大学 | Full-duplex MIMO physical layer secure transmission method |
CN114745031B (en) * | 2022-03-10 | 2024-03-01 | 西安电子科技大学 | Full-duplex MIMO physical layer safe transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN111614387B (en) | 2021-06-22 |
CN111614387A (en) | 2020-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021227482A1 (en) | Secure transmission method in large-scale antenna system | |
Hu et al. | Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays | |
Alkhateeb et al. | Channel estimation and hybrid precoding for millimeter wave cellular systems | |
US9948377B1 (en) | System and method for spatial beamforming modulation | |
Sun et al. | RIS-assisted robust hybrid beamforming against simultaneous jamming and eavesdropping attacks | |
Song et al. | Adaptive millimeter wave beam alignment for dual-polarized MIMO systems | |
CN108667493B (en) | Beam forming method for large-scale MIMO NLOS scene | |
Wang et al. | Fast beam training and alignment for IRS-assisted millimeter wave/terahertz systems | |
Rusu et al. | An attack on antenna subset modulation for millimeter wave communication | |
CN113472411A (en) | Random frequency array auxiliary direction modulation transmission method based on deep learning | |
Hussein et al. | Reconfigurable intelligent surface index modulation with signature constellations | |
Quist et al. | Bound on the key establishment rate for multi-antenna reciprocal electromagnetic channels | |
Ji et al. | Wireless secret key generation for distributed antenna systems: A joint space-time-frequency perspective | |
CN110912596B (en) | Beam forming method based on precise interference and precise communication integrated system | |
US9444532B1 (en) | Wideband transceiver for antenna array | |
Shu et al. | Directional modulation: A secure solution to 5G and beyond mobile networks | |
CN106301492B (en) | A kind of data transmission method and device based on SM-MIMO | |
Zhang et al. | Impact of imperfect angle estimation on spatial and directional modulation | |
Nusenu et al. | Directional radar-embedded communications based on hybrid MIMO and frequency diverse arrays | |
Wang et al. | Low complexity channel estimation based on DFT for short range communication | |
WO2021196726A1 (en) | Quick search method | |
Chowdhury et al. | Multiplexing-diversity tradeoffs in noncoherent massive MIMO systems | |
CN113242073B (en) | Multi-user terahertz array safety modulation method based on cross entropy iteration | |
Dong et al. | Low-complexity hybrid precoding design for MIMO-OFDM millimeter wave communications | |
Cheng et al. | SWISS: Spectrum weighted identification of signal sources for mmWave systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20935023 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20935023 Country of ref document: EP Kind code of ref document: A1 |