WO2023165183A1 - Method and apparatus for designing multiple-input multiple-output transceiver - Google Patents

Method and apparatus for designing multiple-input multiple-output transceiver Download PDF

Info

Publication number
WO2023165183A1
WO2023165183A1 PCT/CN2022/134716 CN2022134716W WO2023165183A1 WO 2023165183 A1 WO2023165183 A1 WO 2023165183A1 CN 2022134716 W CN2022134716 W CN 2022134716W WO 2023165183 A1 WO2023165183 A1 WO 2023165183A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
downlink
user
interference
uplink
Prior art date
Application number
PCT/CN2022/134716
Other languages
French (fr)
Chinese (zh)
Inventor
夏心江
王东明
尤肖虎
Original Assignee
网络通信与安全紫金山实验室
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 网络通信与安全紫金山实验室 filed Critical 网络通信与安全紫金山实验室
Publication of WO2023165183A1 publication Critical patent/WO2023165183A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/40Circuits
    • H04B1/401Circuits for selecting or indicating operating mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/06TPC algorithms
    • H04W52/14Separate analysis of uplink or downlink
    • H04W52/146Uplink power control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/26TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service]
    • H04W52/267TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service] taking into account the information rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present application relates to the technical field of communications, and in particular to a design method and device for a multiple-input multiple-output transceiver.
  • the existing network-assisted full-duplex system combined with the non-cellular large-scale MIMO technology can integrate the existing simultaneous and same-frequency full-duplex, flexible duplex and hybrid duplex All access points are connected to the central processing unit through the backhaul, and cooperate to provide services for users.
  • the access point can work at the same frequency full-duplex or half-duplex at the same time, but because the interference between the transceiver antennas of the same access point can be eliminated by analog means, the access point of the same frequency full-duplex at the same time can also be regarded as Two half-duplex access points.
  • the possible eavesdropping equipment will extract or intercept the private information of uplink and downlink users from the wireless communication network, causing security risks.
  • the embodiments of the present application provide a design method and device for a multiple-input multiple-output transceiver.
  • This application provides a method for designing a multiple-input multiple-output transceiver, including:
  • the target optimization model is constructed
  • the optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
  • the security rate model is determined based on signal security rates associated with all users with the bugging device.
  • the solving of the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system includes:
  • the objective function is to optimize the maximum signal security rate of all users
  • the constraints are based on the total power of the sending access point and the total power consumption of the uplink users.
  • the objective function and constraint conditions of the objective optimization model are approximately optimized according to the working mode, and the solution optimization model is constructed, including:
  • an approximate convex optimization solution is performed on the objective function to determine a new optimization function
  • the solution optimization model is constructed according to the convergent optimization function.
  • the determination of the working mode of the signal transmission system includes:
  • all users include all downlink users and all uplink users, and before the target optimization model is constructed based on the safe rate model of user signals in the signal transmission system, Also includes:
  • the security rate model is constructed according to the signal security rate functions of all uplink users and the signal security rate functions of all downlink users.
  • the signal-to-interference-noise ratio at the downlink user is obtained based on the following method:
  • the signal-to-interference-noise ratio of the received signal of the uplink user is obtained based on the following method:
  • the received signal of each uplink access point the received signal of the cascaded central processing unit is obtained;
  • the signal-to-interference ratio of the received signal of each uplink user is obtained.
  • the signal-to-interference-noise ratio of the leaked signal of the downlink user at all eavesdropping device locations is obtained based on the following method:
  • the signal-to-interference-noise ratio of the leakage signal of the uplink user at all eavesdropping device locations is obtained based on the following method:
  • each uplink user and the interference covariance of each uplink user at each eavesdropping device determine the signal-to-interference-noise ratio of each uplink user leaking signals at all eavesdropping device locations.
  • the present application also provides a device for designing a multiple-input multiple-output transceiver, including:
  • the building block is based on the safe rate model of the user signal in the signal transmission system, and constructs the target optimization model
  • a solving module solving the target optimization model, and determining the optimal design parameters of the transceiver in the signal transmission system
  • the optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
  • the security rate model is determined based on signal security rates associated with all users with the bugging device.
  • the present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the program, the multi-input, multi-input Output transceiver design methodology.
  • the present application also provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the design method for the multiple-input multiple-output transceiver as described in any one of the above is implemented.
  • the present application also provides a computer program product, including a computer program.
  • a computer program product including a computer program.
  • the design method for the multiple-input multiple-output transceiver described in any one of the above is implemented.
  • the multi-input multi-output transceiver design method and device provided by this application by constructing the target optimization model, and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices, and ensure Communication security for signal transmission systems.
  • Fig. 1 is one of the flow diagrams of the MIMO design method provided by the present application.
  • Fig. 2 is a schematic structural diagram of the signal transmission system provided by the present application.
  • Fig. 3 is the second schematic flow diagram of the design method of the multi-input multi-output transceiver provided by the present application;
  • Figure 4 is one of the security spectrum performance comparison diagrams provided by the present application.
  • Figure 5 is the second comparison chart of safety spectrum performance provided by this application.
  • FIG. 6 is a schematic structural diagram of a design device for a multiple-input multiple-output transceiver provided by the present application
  • FIG. 7 is a schematic structural diagram of an electronic device provided by the present application.
  • the flexible duplex mode supported by the fifth generation mobile communication technology (5th generation mobile networks, 5G) can further improve the utilization efficiency of communication resources.
  • Simultaneous same-frequency full-duplex is a full-duplex mode that allows simultaneous uplink and downlink communication on the same frequency. Since the interference between the transmitting and receiving antennas of the same base station can be eliminated well, the main problem faced by the signal transmission system becomes the interference elimination between uplink and downlink access points and users, that is, cross-link interference elimination. Technologies such as airspace duplex communication for cross-link interference cancellation fail to solve this cross-interference problem.
  • the security issue of communication is also very important.
  • the grouping partial time model arranges the users in different time-frequency slots to maximize the minimum safe rate, and there are also schemes such as hybrid time switch and power division to improve system security, but it does not It involves the security of the physical layer of the network-assisted full-duplex system.
  • the flexible selection of the duplex mode according to the channel conditions can effectively reduce cross-link interference and prevent the access of eavesdropping devices.
  • the non-cellular network-assisted full-duplex system will have a greater degree of freedom, and can obtain the optimal uplink and downlink direction selection during the optimization process.
  • this application proposes to maximize the uplink and downlink security spectrum efficiency in the signal transmission system as the optimization goal, and the downlink precoding vector, downlink manual
  • the noise vector, the uplink transmission power and the mode selection vector are the optimization models, and the corresponding mode selection and security transceiver design schemes are given.
  • Fig. 1 is one of the flow diagrams of the multi-input multi-output transceiver design method provided in this application, as shown in Fig. 1, including but not limited to the following steps:
  • step S1 based on the safe rate model of user signals in the signal transmission system, a target optimization model is constructed.
  • Users in the signal transmission system include uplink users and downlink users.
  • Fig. 2 is a schematic structural diagram of the signal transmission system provided by the present application.
  • the duplex modes in the signal transmission system may include: working modes such as flexible duplex, hybrid duplex and full duplex; network-assisted full duplex In the working mode, each access point is connected to the central processing unit through the fronthaul network.
  • the transmitting antenna will form self-interference to the receiving antenna; the uplink user will form uplink to downlink interference to the downlink user; in the same working mode, the receiving antenna will form downlink to uplink interference; eavesdropping
  • the device can eavesdrop on leaked signals to uplink users and transmit antennas.
  • each wiretapping device can wiretap all user equipments.
  • the spectrum detection device it is possible to determine the detected wiretapping device in the signal transmission system and the location of the wiretapping device.
  • the mode selection vector is a duplex mode selection vector.
  • the security rate model includes an uplink user security rate function and a downlink user security rate function.
  • the objective optimization model includes an objective function and constraints.
  • the objective function and constraints are constructed.
  • the target optimization model is solved to determine the optimal design parameters of the transceiver in the signal transmission system;
  • the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of link transmission power and mode selection vector;
  • the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
  • the working modes in the signal transmission system may include: flexible duplex mode, hybrid duplex mode and full duplex mode.
  • the SINR of the most leaked signal is determined, and then the signal security rate associated with each user and the eavesdropping device is determined through the SINR.
  • the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization.
  • Input multiple output transceiver design Since the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization. Input multiple output transceiver design.
  • the outer loop is based on the quantum tabu algorithm to solve the optimal duplex mode selection of the signal transmission system in a single loop.
  • a series of non-convex-to-convex approximations such as equivalent conversion or concave-convex process, will be used on the basis of the best working mode to solve the target optimization model, and finally the signal can be calculated
  • the optimized design parameters of the transceivers in the transmission system can also determine the eavesdropping devices with the strongest interference to each user respectively.
  • the multi-input multi-output transceiver design method provided by this application by constructing the target optimization model and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices and ensure signal transmission System communication security.
  • the all users include all downlink users and all uplink users, and before constructing the target optimization model based on the safe rate model of user signals in the signal transmission system, it further includes:
  • the security rate model is constructed according to the signal security rate functions of all uplink users and the signal security rate functions of all downlink users.
  • the SINR at the downlink user is obtained based on the following method:
  • the signal-to-interference-noise ratio of the received signal of the uplink user is obtained based on the following method:
  • the received signal of each uplink access point the received signal of the cascaded central processing unit is obtained;
  • the signal-to-interference ratio of the received signal of each uplink user is acquired.
  • the signal-to-interference-noise ratio of the leakage signal of the downlink user at all eavesdropping device positions is obtained based on the following method:
  • each eavesdropping device position in the downlink and the interference covariance of each downlink user at each eavesdropping device, determine the signal interference noise of each downlink user leaking signal at all eavesdropping device positions Compare.
  • the signal-to-interference-noise ratio of the leakage signal of the uplink user at all eavesdropping device locations is obtained based on the following method:
  • each uplink user and the interference covariance of each uplink user at each eavesdropping device determine the signal-to-interference-noise ratio of each uplink user's leaked signal at all eavesdropping device locations.
  • the access point In the network-assisted full-duplex mode, the access point is connected to the central processing unit through the fronthaul network, and can work in half-duplex, same-frequency duplex, hybrid duplex and flexible duplex modes.
  • Each access point can work in uplink or downlink mode, which is obtained by solving the optimization result.
  • the signal transmission system has X access points, K downlink users, J uplink users and L eavesdropping devices. Each access point is equipped with M antennas, and each user and eavesdropping device is a single antenna.
  • the access point metrics set is The downlink user indicator set is The uplink user indicator set is and the eavesdropping device indicator set is
  • x' is the access point index set in which is not an access point of x
  • k' is the downlink user index set The downlink user in is not k
  • j' is the uplink user index set Uplink users other than j in .
  • variables q D,x ,q U,x′ ⁇ ⁇ 0,1 ⁇ to represent the uplink and downlink mode selection of the access point respectively, and q D,x (q U,x′ ) takes 1 or 0 to correspond to the access point Click to select downlink or uplink.
  • s D,k is the data signal sent to user k, is the artificial noise superimposed in the transmitted signal by the downlink access point, Anti-eavesdropping equipment interception by superimposing artificial noise on the transmitted signal.
  • the received signal y D, k of user k from the downlink access point is:
  • h IUI,j,k indicates the channel vector between uplink user j and downlink user k
  • p U,j is the signal transmission power of uplink user j
  • the signal-to-interference-noise ratio r D,k at the downlink user k is:
  • ⁇ D,k is the interference covariance at downlink user k:
  • g U,j,k represents the channel state information from uplink transmitting user j to downlink receiving user k;
  • ⁇ D,k represents Gaussian white noise at user k.
  • the central processing unit often cannot completely remove the interference between the uplink and downlink antennas of the base station based only on its known downlink baseband signals and estimated channel information.
  • the estimation error of the channel between base station antennas is And also assume that it obeys a Gaussian distribution: Indicates the residual inter-antenna interference power not canceled in the digital or analog domain.
  • the received signal of the central processing unit becomes The specific calculation is as follows:
  • the signal-to-interference-noise ratio r U,j of the received signal of the uplink user j at the central processing unit can be obtained, and the expression is:
  • u U,j,x' represents the receiver precoding vector at the receiving access point x'
  • Q U,x' represents the duplex working mode assignment matrix at the receiving access point x'
  • Q D,x represents The duplex working mode allocation matrix at the transmitting access point x
  • w D,x,k represents the downlink precoding vector of the transmitting access point x for user k
  • v AN,x represents the artificial noise superimposed at the access point x
  • ⁇ U,x' represents the Gaussian white noise at the access point x'
  • ⁇ IAI,x,x' represents the residual interference power between the access point x and the access point x' after interference cancellation.
  • the expression of the leaked signal y EV,l at the eavesdropping device l can be listed as follows:
  • ⁇ DE ,k,l and ⁇ UE ,j,l are the interference covariance of downlink user k and uplink user j at the eavesdropping device l respectively, and the expressions are written as:
  • ⁇ DE,l represents the white noise power when the eavesdropping device l eavesdrops on the downlink user k
  • ⁇ UE,l represents the white noise power when the eavesdropping device l eavesdrops on the uplink user j.
  • the security rate model of the whole signal transmission system is constructed.
  • the entire signal transmission system aims at maximizing the safe rate of the uplink and downlink signals of the system, and takes the total transmission power of the access point and the total transmission power of the uplink users as constraints to realize the downlink precoding vector, downlink artificial noise vector, uplink
  • the joint optimal design of channel transmit power and mode selection vector aims at maximizing the safe rate of the uplink and downlink signals of the system, and takes the total transmission power of the access point and the total transmission power of the uplink users as constraints to realize the downlink precoding vector, downlink artificial noise vector, uplink.
  • q D, x is the duplex working mode allocation vector at the sending access point x
  • q U, x is the duplex working mode allocation vector at the receiving access point x
  • PD, x is the preset xth
  • the total transmit power of access points is taken as the maximum transmit power consumption of access points
  • P U,j is the total transmit power of uplink user j, which is taken as the maximum transmit power of uplink user j.
  • the non-convex optimization problem is a non-deterministic polynomial hard (NP-hard) mixed integer problem.
  • NP-hard polynomial hard
  • the outer loop uses a duplex mode selection algorithm based on quantum tabu search to determine the working direction of each access point;
  • the inner loop optimizes the downlink precoding vector w D, k , the downlink artificial noise vector v AN , the value of the uplink transmit power p U,j, and the mode selection vector based on the duplex direction determined by the outer loop Q D and Q U .
  • the solving the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system includes:
  • the objective function is to optimize the maximum signal security rate of all users
  • the constraints are based on the total power of the sending access point and the total power consumption of the uplink users.
  • the determining the working mode of the signal transmission system includes:
  • the quantum tabu search algorithm combines the two basic concepts of tabu search and quantum computing, so the quantum tabu search algorithm can not only use the quantum algorithm to fully reflect the change of the system information state, but also use the tabu search algorithm to improve the search efficiency.
  • the duplex mode of each access point can be optimized, and the specific calculation method is as follows:
  • ⁇ x and ⁇ x represent the probability that the qubit is in the 0 state and the 1 state, respectively, Indicates that being in the 0 state is equally likely to be in the 1 state.
  • the random matrix V generates feasible solutions and adjacent solutions, where C represents the number of feasible solutions; the elements in the matrix V are between 0 and 1, and each row of the matrix V represents a possible duplex mode; Represents a matrix of dimension C ⁇ X.
  • the obtained feasible solution is stored in the matrix , specifically as follows:
  • each bit can be obtained value.
  • Table 1 is a lookup table for a revolving door provided in the present application, wherein ⁇ represents the angle of rotation.
  • update value. U( ⁇ ) represents the quantum gate, according to the quantum gate and The calculation of the next cycle state of each access point in the signal transmission system can be obtained
  • the working mode of the transceiver in the signal transmission system can be determined.
  • performing approximate optimization on the objective function and constraint conditions of the objective optimization model, and constructing a solution optimization model including:
  • an approximate convex optimization solution is performed on the objective function to determine a new optimization function
  • the solution optimization model is constructed according to the convergent optimization function.
  • the inner loop adopts an optimization algorithm based on Successive Convex Approximation (SCA), fixes the duplex mode, and optimizes the design of the transceiver.
  • SCA Successive Convex Approximation
  • the original problem can be approximated by a new optimization problem to solve, but because w D,k ,p U,j ,u U,j are tightly coupled together in constraints, the optimal solution of the new optimization problem is still difficult to find untie.
  • the values of Q D,x and Q U,x′ can be fixed first, and the optimization problem can be written as:
  • a represents the optimization variable
  • w represents the vector variable
  • A represents the matrix constant.
  • a and b are variables, a>0, b>0,
  • t UE,j,l represents the upper bound of p U,j
  • ⁇ UE,j,l represents the lower bound of ⁇ UE,j,l .
  • Constraint C9 can be written as:
  • constraints C21 and C22 can be approximated as:
  • constraint C23 is approximated as:
  • Constraint C10 is finally dealt with. Constraint C10 is the most intractable due to the coupling of variables p U,j ,v AN ,w D,k and u U,j in r U,j . And introduce a new variable, get the lower bound of r U, j , the constraint condition C27, specifically:
  • Constraints C28 to C30 can be further approximated as:
  • constraint C10 can be transformed into:
  • the target optimization model is finally transformed into a solution optimization model, as follows:
  • the optimal design parameters of the transceiver in the signal transmission system can be obtained, including: downlink precoding vector Downstream Artifact Vector Uplink transmit power and the mode selection vector Can also include receiver precoding vector
  • any one or multiple items of optimal design parameters can be obtained according to specific requirements.
  • the multi-input multi-output transceiver design method provided by this application uses a double-loop strategy to solve the non-convex subproblem of the inner loop.
  • the outer loop uses the quantum taboo algorithm to find the optimal mode selection for a single iteration, and then through the inner loop, Using continuous concave-convex process, equivalent transformation, etc. to solve non-convex to convex, and then determine the design of transceiver and uplink transmission power, and realize the communication security of signal transmission system.
  • Fig. 3 is the second schematic flow diagram of the multi-input multi-output transceiver design method provided by the present application, as shown in Fig. 3, including:
  • the multi-input multi-output transceiver design method provided by this application is constrained by the total power of the transmission access point and the total power of the uplink, so as to maximize the total rate of the uplink and downlink of the system under the limitation of power consumption, and realize the signal transmission system
  • the uplink security transmission rate and the downlink security transmission rate maximization problem are constrained by the total power of the transmission access point and the total power of the uplink, so as to maximize the total rate of the uplink and downlink of the system under the limitation of power consumption, and realize the signal transmission system.
  • Fig. 4 is one of the security spectrum performance comparison diagrams provided by the present application.
  • the horizontal axis is the self-interference intensity ⁇ , and the unit is decibel (dB);
  • the vertical axis is the spectral efficiency, and the unit is bit rate/Hz (bps /Hz).
  • dB decibel
  • bps bit rate/Hz
  • the spectral efficiency performance of the quantum tabu search algorithm is also closer to the spectral efficiency of the exhaustive algorithm.
  • the self-interference is less than or equal to 0dB
  • the security spectral efficiency performance of the greedy algorithm, fixed duplex mode network-assisted full-duplex, time-division duplex, exhaustive algorithm and the proposed quantum tabu search algorithm changes relatively smoothly.
  • the self-interference is greater than 0dB
  • the performance of these five algorithms decreases sharply with the increase of self-interference. But on the whole, when the self-interference is in a low range, the energy efficiency improvement of this solution is very effective.
  • the design based on the quantum taboo search algorithm has higher security spectrum efficiency and can provide a higher degree of freedom to overcome the influence of self-interference.
  • FIG. 5 is the second security spectrum performance comparison diagram provided by the present application. As shown in FIG. 5 , the horizontal axis is the number of access points, and the vertical axis is the spectrum efficiency, and the unit is bit rate/hertz (bps/Hz). Figure 5 shows the impact of different access point settings on the system security spectrum.
  • Security algorithms include quantum tabu search algorithm, greedy algorithm, network-assisted full-duplex and time-division duplex.
  • the security spectral efficiency of all algorithms increases with the access point As the number increases, as the number of access points increases from 6 to 20, the security spectral efficiency range increases from 23.63bps/Hz to 50.76bps/Hz to 37.52bps/Hz to 74.34bps/Hz. And under the same parameter settings, the performance of the algorithm proposed in this application is better than other algorithms to achieve higher security spectrum efficiency, followed by greedy algorithm and fixed uplink and downlink network assisted full-duplex network, and the system security under time-division duplex mode Spectral effects came last.
  • the MIMO transceiver design device provided by this application is described below, and the MIMO transceiver design device described below and the MIMO transceiver design method described above can be referred to in correspondence.
  • Fig. 6 is a structural schematic diagram of the multi-input multi-output transceiver design device provided by the present application, as shown in Fig. 6, including:
  • a construction module 601 configured to construct a target optimization model based on a security rate model of user signals in the signal transmission system
  • a solving module 602 configured to solve the target optimization model based on the working mode, and determine optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vectors, downlink manual At least one of a noise vector, an uplink transmission power, and a mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
  • the construction module 601 constructs a target optimization model based on a safe rate model of user signals in the signal transmission system.
  • Users in the signal transmission system include uplink users and downlink users.
  • the duplex mode in the signal transmission system may include: flexible duplex, hybrid duplex, and full duplex; in network-assisted full-duplex mode, each access point into the central processing unit.
  • the transmitting antenna will form self-interference to the receiving antenna; the uplink user will form uplink to downlink interference to the downlink user; in the same working mode, the receiving antenna will form downlink to uplink interference; eavesdropping
  • the device can eavesdrop on leaked signals to uplink users and transmit antennas.
  • each wiretapping device can wiretap all user equipments.
  • the spectrum detection device it is possible to determine the detected wiretapping device in the signal transmission system and the location of the wiretapping device.
  • the mode selection vector is a duplex mode selection vector.
  • the security rate model includes an uplink user security rate function and a downlink user security rate function.
  • the objective optimization model includes an objective function and constraints.
  • the objective function and constraints are constructed.
  • the solving module 602 solves the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system;
  • the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of transmission power and mode selection vector;
  • the safe rate model is determined based on the signal safe rates associated with all users and eavesdropping devices.
  • the working modes in the signal transmission system may include: flexible duplex mode, hybrid duplex mode and full duplex mode.
  • the SINR of the most leaked signal is determined, and then the signal security rate associated with each user and the eavesdropping device is determined through the SINR.
  • the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization.
  • Input multiple output transceiver design Since the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization. Input multiple output transceiver design.
  • the outer loop is based on the quantum tabu algorithm to solve the optimal duplex mode selection of the signal transmission system in a single loop.
  • a series of non-convex-to-convex approximations such as equivalent conversion or concave-convex process, will be used on the basis of the best working mode to solve the target optimization model, and finally the signal can be calculated
  • the optimized design parameters of the transceivers in the transmission system can also determine the eavesdropping devices with the strongest interference to each user respectively.
  • the multi-input multi-output transceiver design device provided by this application, by constructing the target optimization model and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices and ensure signal transmission System communication security.
  • FIG. 7 is a schematic structural diagram of an electronic device provided by the present application.
  • the electronic device may include: a processor (processor) 710, a communication interface (Communications Interface) 720, a memory (memory) 730 and a communication bus 740, Wherein, the processor 710 , the communication interface 720 , and the memory 730 communicate with each other through the communication bus 740 .
  • the processor 710 can call the logic instructions in the memory 730 to execute the design method of the multiple-input multiple-output transceiver.
  • the method includes: building a target optimization model based on the safe rate model of the user signal in the signal transmission system; determining the signal transmission system Based on the working mode, the target optimization model is solved to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vectors, downlink artificial noise vectors At least one of , uplink transmission power, and mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
  • the above-mentioned logic instructions in the memory 730 may be implemented in the form of software functional units and may be stored in a computer-readable storage medium when sold or used as an independent product.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
  • the present application also provides a computer program product
  • the computer program product includes a computer program stored on a non-transitory computer-readable storage medium
  • the computer program includes program instructions, and when the program instructions are executed by a computer During execution, the computer can execute the multiple-input multiple-output transceiver design method provided by the above-mentioned methods, the method includes: building a target optimization model based on the safe rate model of the user signal in the signal transmission system; determining the working mode of the signal transmission system mode; based on the working mode, solve the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of link transmission power and mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
  • the present application also provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, it is implemented to implement the design of the MIMO transceiver provided by the above-mentioned embodiments.
  • the method includes: constructing a target optimization model based on a safe rate model of user signals in a signal transmission system; determining the working mode of the signal transmission system; solving the target optimization model based on the working mode, and determining the The optimized design parameters of the transceiver in the signal transmission system; the optimized design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmission power, and a mode selection vector; the safe rate model is determined based on the signal security rate associated with the listening device for all users.
  • the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in One place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without any creative effort.
  • each implementation can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware.
  • the essence of the above technical solution or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic discs, optical discs, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments.

Abstract

The present application provides a method and apparatus for designing a multiple-input multiple-output transceiver, comprising: on the basis of a security rate model of a user signal in a signal transmission system, constructing a target optimization model; solving the target optimization model, and determining an optimization design parameter of a transceiver in the signal transmission system; the optimization design parameter comprising at least one of: a downlink precoding vector, a downlink artificial noise vector, an uplink transmission power, and a mode selection vector; and the security rate model being determined on the basis of signal security rates associating all users with eavesdropping devices. In the method and apparatus for designing a multiple-input multiple-output transceiver provided by the present application, by constructing a target optimization model, solving the target optimization model, and further obtaining optimization design parameters for a transceiver, it is possible to effectively prevent the interception of a signal by an eavesdropping device, thus ensuring the communication security of a signal transmission system.

Description

一种多输入多输出收发机设计方法及装置Design method and device for a multi-input multi-output transceiver
相关申请的交叉引用Cross References to Related Applications
本申请要求于2022年03月02日提交的申请号为202210200224.1,发明名称为“一种多输入多输出收发机设计方法及装置”的中国专利申请的优先权,其通过引用方式全部并入本文。This application claims the priority of the Chinese patent application with the application number 202210200224.1 filed on March 2, 2022, and the title of the invention is "a multi-input multi-output transceiver design method and device", which is incorporated herein by reference in its entirety .
技术领域technical field
本申请涉及通信技术领域,尤其涉及一种多输入多输出收发机设计方法及装置。The present application relates to the technical field of communications, and in particular to a design method and device for a multiple-input multiple-output transceiver.
背景技术Background technique
为了提升信号传输系统的谱效,现有的与无蜂窝大规模多输入多输出技术相结合的网络辅助全双工系统,能够集合现有的同时同频全双工、灵活双工以及混合双工的特点,所有接入点均与中央处理单元通过回程相连,协作为用户提供服务。In order to improve the spectral efficiency of the signal transmission system, the existing network-assisted full-duplex system combined with the non-cellular large-scale MIMO technology can integrate the existing simultaneous and same-frequency full-duplex, flexible duplex and hybrid duplex All access points are connected to the central processing unit through the backhaul, and cooperate to provide services for users.
接入点可工作在同时同频全双工或是半双工下,但由于同接入点收发天线间干扰可通过模拟手段消除,所以同时同频全双工的接入点也可以看作两个半双工接入点。The access point can work at the same frequency full-duplex or half-duplex at the same time, but because the interference between the transceiver antennas of the same access point can be eliminated by analog means, the access point of the same frequency full-duplex at the same time can also be regarded as Two half-duplex access points.
但在信号传输系统中,可能存在的窃听设备会从无线通信网中抽取或拦截上下行用户的隐私信息,造成安全隐患。However, in the signal transmission system, the possible eavesdropping equipment will extract or intercept the private information of uplink and downlink users from the wireless communication network, causing security risks.
发明内容Contents of the invention
针对现有技术存在的问题,本申请实施例提供一种多输入多输出收发机设计方法及装置。In view of the problems existing in the prior art, the embodiments of the present application provide a design method and device for a multiple-input multiple-output transceiver.
本申请提供一种多输入多输出收发机设计方法,包括:This application provides a method for designing a multiple-input multiple-output transceiver, including:
基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;Based on the safe rate model of user signals in the signal transmission system, the target optimization model is constructed;
对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;Solving the target optimization model to determine optimal design parameters of the transceiver in the signal transmission system;
所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;The optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。The security rate model is determined based on signal security rates associated with all users with the bugging device.
根据本申请提供的一种多输入多输出收发机设计方法,所述对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数,包括:According to a method for designing a multiple-input multiple-output transceiver provided in the present application, the solving of the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system includes:
确定所述信号传输系统的工作模式;determining the working mode of the signal transmission system;
根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行 近似优化,构建求解优化模型;According to described mode of work, carry out approximate optimization to the objective function of described objective optimization model and constraint condition, construct solution optimization model;
基于所述求解优化模型,确定所述优化设计参数;Determining the optimal design parameters based on the solution optimization model;
所述目标函数是以所述所有用户的信号安全速率最大为优化目标;The objective function is to optimize the maximum signal security rate of all users;
所述约束条件是以发送接入点总功率和上行用户发送总功耗为约束。The constraints are based on the total power of the sending access point and the total power consumption of the uplink users.
根据本申请提供的一种多输入多输出收发机设计方法,所述根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行近似优化,构建求解优化模型,包括:According to a method for designing a multiple-input multiple-output transceiver provided by the present application, the objective function and constraint conditions of the objective optimization model are approximately optimized according to the working mode, and the solution optimization model is constructed, including:
根据所述工作模式,对所述目标函数进行近似凸优化求解,确定新的优化函数;According to the working mode, an approximate convex optimization solution is performed on the objective function to determine a new optimization function;
在所述优化函数不收敛的情况下,对所述新的优化函数进行近似凸优化求解,直至得到的优化函数收敛,确定收敛优化函数;In the case that the optimization function does not converge, performing an approximate convex optimization solution to the new optimization function until the obtained optimization function converges, and then determining the convergence optimization function;
根据所述收敛优化函数,构建所述求解优化模型。The solution optimization model is constructed according to the convergent optimization function.
根据本申请提供的一种多输入多输出收发机设计方法,所述确定所述信号传输系统的工作模式,包括:According to a design method of a multiple-input multiple-output transceiver provided by the present application, the determination of the working mode of the signal transmission system includes:
根据所述信号传输系统中的接入点状态,构建所述信号传输系统的量子系统;Constructing a quantum system of the signal transmission system according to the state of the access point in the signal transmission system;
利用随机矩阵对所述量子系统进行测量,确定可行解矩阵;Measuring the quantum system by using a random matrix to determine a feasible solution matrix;
利用所述可行解矩阵进行优化求解,确定所述信号传输系统的工作模式。Using the feasible solution matrix to optimize and solve, determine the working mode of the signal transmission system.
根据本申请提供的一种多输入多输出收发机设计方法,所述所有用户包括所有下行用户和所有上行用户,在所述基于信号传输系统中用户信号的安全速率模型,构建目标优化模型之前,还包括:According to a method for designing a multiple-input multiple-output transceiver provided by the present application, all users include all downlink users and all uplink users, and before the target optimization model is constructed based on the safe rate model of user signals in the signal transmission system, Also includes:
根据任一下行用户处的信干噪比和所述任一下行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一下行用户的信号安全速率函数;Determine the signal security rate function of any downlink user according to the signal-to-interference-noise ratio at any downlink user and the signal-to-interference-noise ratio of any downlink user at all eavesdropping device positions;
并根据任一上行用户接收信号的信干噪比和所述任一上行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一上行用户的信号安全速率函数;And according to the signal-to-interference-noise ratio of any uplink user's received signal and the signal-to-interference-noise ratio of any uplink user's leaked signal at all eavesdropping device positions, determine the signal security rate function of any uplink user;
根据所有上行用户的信号安全速率函数和所有下行用户的信号安全速率函数,构建所述安全速率模型。The security rate model is constructed according to the signal security rate functions of all uplink users and the signal security rate functions of all downlink users.
根据本申请提供的一种多输入多输出收发机设计方法,所述下行用户处的信干噪比,是基于以下方法得到的:According to a method for designing a multiple-input multiple-output transceiver provided by the present application, the signal-to-interference-noise ratio at the downlink user is obtained based on the following method:
基于每个接入点的模式选择向量函数、下行链路预编码向量函数和下行人工噪声向量函数,确定所述信号传输系统中下行接入点的发送信号;Determine the transmission signal of the downlink access point in the signal transmission system based on the mode selection vector function, the downlink precoding vector function and the downlink artificial noise vector function of each access point;
根据所述下行接入点的发送信号,确定每个下行用户从所述下行接入点接收到的接收信号;determining a received signal received by each downlink user from the downlink access point according to the signal sent by the downlink access point;
根据所述各用户接收信号的干扰协方差,确定所述每个下行用户处的信干噪比。Determine the signal-to-interference-noise ratio at each downlink user according to the interference covariance of the signals received by each user.
根据本申请提供的一种多输入多输出收发机设计方法,所述上行用户 接收信号的信干噪比,是基于以下方法得到的:According to a kind of multi-input multi-output transceiver design method provided by the present application, the signal-to-interference-noise ratio of the received signal of the uplink user is obtained based on the following method:
根据每个上行接入点的接收信号,获取中央处理单元联级的接收信号;According to the received signal of each uplink access point, the received signal of the cascaded central processing unit is obtained;
对所述中央处理单元联级的接收信号进行干扰消除,获取中央处理单元的接收信号;Performing interference elimination on the received signal of the cascaded central processing unit, and obtaining the received signal of the central processing unit;
根据每个上行用户的干扰信号和所述中央处理单元的接收信号,获取所述每个上行用户接收信号的信干燥比。According to the interference signal of each uplink user and the received signal of the central processing unit, the signal-to-interference ratio of the received signal of each uplink user is obtained.
根据本申请提供的一种多输入多输出收发机设计方法,所述下行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:According to a design method of a multiple-input multiple-output transceiver provided by the present application, the signal-to-interference-noise ratio of the leaked signal of the downlink user at all eavesdropping device locations is obtained based on the following method:
获取下行链路中各窃听设备位置的泄露信号;Obtain the leaked signal of the location of each eavesdropping device in the downlink;
根据所述下行链路中各窃听设备位置的泄露信号,以及每个下行用户在所述各窃听设备处的干扰协方差,确定所述每个下行用户在所有窃听设备位置泄露信号的信干噪比。According to the leaked signal of each eavesdropping device position in the downlink, and the interference covariance of each downlink user at each eavesdropping device, determine the signal interference noise of the leaked signal of each downlink user at all eavesdropping device positions Compare.
根据本申请提供的一种多输入多输出收发机设计方法,所述上行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:According to a design method for a multiple-input multiple-output transceiver provided by the present application, the signal-to-interference-noise ratio of the leakage signal of the uplink user at all eavesdropping device locations is obtained based on the following method:
根据每个上行用户的信号发送功率,以及所述每个上行用户在各窃听设备处的干扰协方差,确定所述每个上行用户在所有窃听设备位置泄露信号的信干噪比。According to the signal transmission power of each uplink user and the interference covariance of each uplink user at each eavesdropping device, determine the signal-to-interference-noise ratio of each uplink user leaking signals at all eavesdropping device locations.
本申请还提供一种多输入多输出收发机设计装置,包括:The present application also provides a device for designing a multiple-input multiple-output transceiver, including:
构建模块,基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;The building block is based on the safe rate model of the user signal in the signal transmission system, and constructs the target optimization model;
求解模块,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;A solving module, solving the target optimization model, and determining the optimal design parameters of the transceiver in the signal transmission system;
所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;The optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。The security rate model is determined based on signal security rates associated with all users with the bugging device.
本申请还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如上述任一种所述多输入多输出收发机设计方法。The present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and operable on the processor. When the processor executes the program, the multi-input, multi-input Output transceiver design methodology.
本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如上述任一种所述多输入多输出收发机设计方法。The present application also provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the design method for the multiple-input multiple-output transceiver as described in any one of the above is implemented.
本申请还提供一种计算机程序产品,包括计算机程序,所述计算机程序被处理器执行时实现如上述任一种所述多输入多输出收发机设计方法。The present application also provides a computer program product, including a computer program. When the computer program is executed by a processor, the design method for the multiple-input multiple-output transceiver described in any one of the above is implemented.
本申请提供的多输入多输出收发机设计方法及装置,通过构建目标优化模型,并对目标优化模型进行求解,进而得到收发机的优化设计参数,能够有效防止窃听设备对信号的截取,保证了信号传输系统的通信安全。The multi-input multi-output transceiver design method and device provided by this application, by constructing the target optimization model, and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices, and ensure Communication security for signal transmission systems.
附图说明Description of drawings
为了更清楚地说明本申请或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in this application or the prior art, the accompanying drawings that need to be used in the description of the embodiments or the prior art will be briefly introduced below. Obviously, the accompanying drawings in the following description are the present For some embodiments of the application, those skilled in the art can also obtain other drawings based on these drawings without creative work.
图1是本申请提供的多输入多输出收发机设计方法的流程示意图之一;Fig. 1 is one of the flow diagrams of the MIMO design method provided by the present application;
图2是本申请提供的信号传输系统的结构示意图;Fig. 2 is a schematic structural diagram of the signal transmission system provided by the present application;
图3是本申请提供的多输入多输出收发机设计方法的流程示意图之二;Fig. 3 is the second schematic flow diagram of the design method of the multi-input multi-output transceiver provided by the present application;
图4是本申请提供的安全频谱性能对比图之一;Figure 4 is one of the security spectrum performance comparison diagrams provided by the present application;
图5是本申请提供的安全频谱性能对比图之二;Figure 5 is the second comparison chart of safety spectrum performance provided by this application;
图6是本申请提供的多输入多输出收发机设计装置的结构示意图;FIG. 6 is a schematic structural diagram of a design device for a multiple-input multiple-output transceiver provided by the present application;
图7是本申请提供的电子设备的结构示意图。FIG. 7 is a schematic structural diagram of an electronic device provided by the present application.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请中的附图,对本申请中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions and advantages of this application clearer, the technical solutions in this application will be clearly and completely described below in conjunction with the accompanying drawings in this application. Obviously, the described embodiments are part of the embodiments of this application , but not all examples. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.
相较于以往的时分复用或频分复用半双工模式,第五代移动通信技术(5th generation mobile networks,5G)所支持的灵活双工模式可以进一步提高通信资源的利用效率。Compared with the previous half-duplex mode of time division multiplexing or frequency division multiplexing, the flexible duplex mode supported by the fifth generation mobile communication technology (5th generation mobile networks, 5G) can further improve the utilization efficiency of communication resources.
同时同频全双工是允许在同一频率上同时进行上下行通信的全双工模式。由于同基站收发天线间干扰已经可以很好地消除,信号传输系统主要面临的问题变为上下行接入点及用户间的干扰消除,即交叉链路干扰消除。针对交叉链路干扰消除的空域双工通信等技术未能解决该交叉干扰问题。Simultaneous same-frequency full-duplex is a full-duplex mode that allows simultaneous uplink and downlink communication on the same frequency. Since the interference between the transmitting and receiving antennas of the same base station can be eliminated well, the main problem faced by the signal transmission system becomes the interference elimination between uplink and downlink access points and users, that is, cross-link interference elimination. Technologies such as airspace duplex communication for cross-link interference cancellation fail to solve this cross-interference problem.
除此之外,通信的安全问题也非常重要。针对在信号传输系统中的信号传输,分组部分时间模型将用户安排在不同的时频槽中以最大化最小安全速率,还有混合时间开关以及功率分割等方案以提高系统安全性,但并未涉及网络辅助全双工系统的物理层安全问题,其根据信道状况灵活选择双工模式的工作方式可以有效降低交叉链路干扰以及预防窃听设备接入。In addition, the security issue of communication is also very important. For the signal transmission in the signal transmission system, the grouping partial time model arranges the users in different time-frequency slots to maximize the minimum safe rate, and there are also schemes such as hybrid time switch and power division to improve system security, but it does not It involves the security of the physical layer of the network-assisted full-duplex system. The flexible selection of the duplex mode according to the channel conditions can effectively reduce cross-link interference and prevent the access of eavesdropping devices.
无蜂窝网络辅助全双工系统相较于传统固定双工模式将拥有更大的自由度,可以在优化过程中获得最优的上下行方向选择。Compared with the traditional fixed duplex mode, the non-cellular network-assisted full-duplex system will have a greater degree of freedom, and can obtain the optimal uplink and downlink direction selection during the optimization process.
针对网络辅助全双工无蜂窝大规模多输入多输出网络中安全传输问题,本申请提出了以最大化信号传输系统中上下行安全频谱效率为优化目标,以下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量为变量的优化模型,并给出了相应的模式选择及安全收发机设计方案。Aiming at the problem of secure transmission in a network-assisted full-duplex non-cellular large-scale MIMO network, this application proposes to maximize the uplink and downlink security spectrum efficiency in the signal transmission system as the optimization goal, and the downlink precoding vector, downlink manual The noise vector, the uplink transmission power and the mode selection vector are the optimization models, and the corresponding mode selection and security transceiver design schemes are given.
下面结合图1至图7描述本申请实施例所提供的多输入多输出收发机 设计方法及装置。The design method and device for the MIMO transceiver provided by the embodiment of the present application will be described below with reference to FIG. 1 to FIG. 7 .
图1是本申请提供的多输入多输出收发机设计方法的流程示意图之一,如图1所示,包括但不限于以下步骤:Fig. 1 is one of the flow diagrams of the multi-input multi-output transceiver design method provided in this application, as shown in Fig. 1, including but not limited to the following steps:
首先,在步骤S1中,基于信号传输系统中用户信号的安全速率模型,构建目标优化模型。First, in step S1, based on the safe rate model of user signals in the signal transmission system, a target optimization model is constructed.
信号传输系统中的用户包括上行用户和下行用户。Users in the signal transmission system include uplink users and downlink users.
图2是本申请提供的信号传输系统的结构示意图,如图2所示,信号传输系统中的双工模式可以包括:灵活双工、混合双工和全双工等工作模式;网络辅助全双工模式下,每个接入点均通过前传网络接入到中央处理单元。Fig. 2 is a schematic structural diagram of the signal transmission system provided by the present application. As shown in Fig. 2, the duplex modes in the signal transmission system may include: working modes such as flexible duplex, hybrid duplex and full duplex; network-assisted full duplex In the working mode, each access point is connected to the central processing unit through the fronthaul network.
在同一个接入点中,传输天线会对接收天线形成自干扰;上行用户会对下行用户形成上行对下行的干扰;同一个工作模式中,接收天线之间会形成下行对上行的干扰;窃听设备可以窃听对上行用户和传输天线的泄露信号。In the same access point, the transmitting antenna will form self-interference to the receiving antenna; the uplink user will form uplink to downlink interference to the downlink user; in the same working mode, the receiving antenna will form downlink to uplink interference; eavesdropping The device can eavesdrop on leaked signals to uplink users and transmit antennas.
在本申请提供的信号传输系统中,每台窃听设备可以对所有的用户设备进行窃听。通过设置频谱检测设备,可以确定检测到信号传输系统中的进行窃听的窃听设备以及该窃听设备的位置。In the signal transmission system provided by the present application, each wiretapping device can wiretap all user equipments. By setting the spectrum detection device, it is possible to determine the detected wiretapping device in the signal transmission system and the location of the wiretapping device.
模式选择向量为双工模式选择向量。The mode selection vector is a duplex mode selection vector.
安全速率模型包括上行用户安全速率函数和下行用户安全速率函数。The security rate model includes an uplink user security rate function and a downlink user security rate function.
目标优化模型包括目标函数和约束条件。The objective optimization model includes an objective function and constraints.
具体地,根据信号传输系统中用户信号的安全速率模型,构建目标函数和约束条件。Specifically, according to the safe rate model of user signals in the signal transmission system, the objective function and constraints are constructed.
进一步地,在步骤S2中,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。Further, in step S2, the target optimization model is solved to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of link transmission power and mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
信号传输系统中的工作模式可以包括:灵活双工模式、混合双工模式和全双工模式。The working modes in the signal transmission system may include: flexible duplex mode, hybrid duplex mode and full duplex mode.
通过对每个用户在所有的窃听设备处泄露的信号中,确定泄露信号最多的信干噪比,进而通过该信干噪比确定每个用户与窃听设备相关联的信号安全速率。For each user, among the signals leaked by all the eavesdropping devices, the SINR of the most leaked signal is determined, and then the signal security rate associated with each user and the eavesdropping device is determined through the SINR.
由于目标优化模型本身存在整数变量且多变量间相互耦合,属于非平滑非凸优化,为了解决高耦合度的优化问题,本申请提供了一种内外两层双循环求解的优化算法,用于多输入多输出收发机设计。Since the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization. Input multiple output transceiver design.
具体地,外循环基于量子禁忌算法,在单次循环中求解信号传输系统的最佳双工模式选择。通过内层循环,将在所求出的最佳工作模式基础上,使用一系列非凸转凸的近似,例如等价转换或是凹凸过程等,以求解该目 标优化模型,最后可以计算出信号传输系统中收发机的优化设计参数,还可以分别确定对每个用户干扰最强的窃听设备。Specifically, the outer loop is based on the quantum tabu algorithm to solve the optimal duplex mode selection of the signal transmission system in a single loop. Through the inner loop, a series of non-convex-to-convex approximations, such as equivalent conversion or concave-convex process, will be used on the basis of the best working mode to solve the target optimization model, and finally the signal can be calculated The optimized design parameters of the transceivers in the transmission system can also determine the eavesdropping devices with the strongest interference to each user respectively.
本申请提供的多输入多输出收发机设计方法,通过构建目标优化模型,并对目标优化模型进行求解,进而得到收发机的优化设计参数,能够有效防止窃听设备对信号的截取,保证了信号传输系统的通信安全。The multi-input multi-output transceiver design method provided by this application, by constructing the target optimization model and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices and ensure signal transmission System communication security.
可选地,所述所有用户包括所有下行用户和所有上行用户,在所述基于信号传输系统中用户信号的安全速率模型,构建目标优化模型之前,还包括:Optionally, the all users include all downlink users and all uplink users, and before constructing the target optimization model based on the safe rate model of user signals in the signal transmission system, it further includes:
根据任一下行用户处的信干噪比和所述任一下行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一下行用户的信号安全速率函数;Determine the signal security rate function of any downlink user according to the signal-to-interference-noise ratio at any downlink user and the signal-to-interference-noise ratio of any downlink user at all eavesdropping device positions;
并根据任一上行用户接收信号的信干噪比和所述任一上行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一上行用户的信号安全速率函数;And according to the signal-to-interference-noise ratio of any uplink user's received signal and the signal-to-interference-noise ratio of any uplink user's leaked signal at all eavesdropping device positions, determine the signal security rate function of any uplink user;
根据所有上行用户的信号安全速率函数和所有下行用户的信号安全速率函数,构建所述安全速率模型。The security rate model is constructed according to the signal security rate functions of all uplink users and the signal security rate functions of all downlink users.
可选地,所述下行用户处的信干噪比,是基于以下方法得到的:Optionally, the SINR at the downlink user is obtained based on the following method:
基于每个接入点的模式选择向量函数、下行链路预编码向量函数和下行人工噪声向量函数,确定所述信号传输系统中下行接入点的发送信号;Determine the transmission signal of the downlink access point in the signal transmission system based on the mode selection vector function, the downlink precoding vector function and the downlink artificial noise vector function of each access point;
根据所述下行接入点的发送信号,确定每个下行用户从所述下行接入点接收到的接收信号;determining a received signal received by each downlink user from the downlink access point according to the signal sent by the downlink access point;
根据所述各用户接收信号的干扰协方差,确定所述每个下行用户处的信干噪比。Determine the signal-to-interference-noise ratio at each downlink user according to the interference covariance of the signals received by each user.
可选地,所述上行用户接收信号的信干噪比,是基于以下方法得到的:Optionally, the signal-to-interference-noise ratio of the received signal of the uplink user is obtained based on the following method:
根据每个上行接入点的接收信号,获取中央处理单元联级的接收信号;According to the received signal of each uplink access point, the received signal of the cascaded central processing unit is obtained;
对所述中央处理单元联级的接收信号进行干扰消除,获取中央处理单元的接收信号;Performing interference elimination on the received signal of the cascaded central processing unit, and obtaining the received signal of the central processing unit;
根据每个上行用户的干扰信号和所述中央处理单元的接收信号,获取所述每个上行用户接收信号的信干燥比。According to the interference signal of each uplink user and the received signal of the central processing unit, the signal-to-interference ratio of the received signal of each uplink user is acquired.
可选地,所述下行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:Optionally, the signal-to-interference-noise ratio of the leakage signal of the downlink user at all eavesdropping device positions is obtained based on the following method:
获取下行链路中各窃听设备位置的泄露信号;Obtain the leaked signal of the location of each eavesdropping device in the downlink;
根据所述下行链路中各窃听设备位置的泄露信号,以及每个下行用户在所述各窃听设备处的干扰协方差,确定所述每个下行用户在所有窃听设备位置泄露信号的信干噪比。According to the leaked signal of each eavesdropping device position in the downlink, and the interference covariance of each downlink user at each eavesdropping device, determine the signal interference noise of each downlink user leaking signal at all eavesdropping device positions Compare.
可选地,所述上行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:Optionally, the signal-to-interference-noise ratio of the leakage signal of the uplink user at all eavesdropping device locations is obtained based on the following method:
根据每个上行用户的信号发送功率,以及所述每个上行用户在各窃听设备处的干扰协方差,确定所述每个上行用户在所有窃听设备位置泄露信 号的信干噪比。According to the signal transmission power of each uplink user and the interference covariance of each uplink user at each eavesdropping device, determine the signal-to-interference-noise ratio of each uplink user's leaked signal at all eavesdropping device locations.
网络辅助全双工模式下,接入点通过前传网络接入到中央处理单元,可以工作在半双工,同时同频双工、混合双工及灵活双工等模式下。考虑同时同频双工基站的上下行天线及上下行接入点间的天线干扰,以及上行用户对下行用户的用户间干扰。各接入点可以在上行或下行模式下工作,由优化结果求解得到。In the network-assisted full-duplex mode, the access point is connected to the central processing unit through the fronthaul network, and can work in half-duplex, same-frequency duplex, hybrid duplex and flexible duplex modes. Consider the uplink and downlink antennas of the same-frequency duplex base station and the antenna interference between uplink and downlink access points, as well as the inter-user interference between uplink users and downlink users. Each access point can work in uplink or downlink mode, which is obtained by solving the optimization result.
信号传输系统共有X个接入点,K个下行用户,J个上行用户以及L个窃听设备,各接入点配有M根天线,各用户及窃听设备均为单天线。接入点指标集为
Figure PCTCN2022134716-appb-000001
下行用户指标集为
Figure PCTCN2022134716-appb-000002
上行用户指标集为
Figure PCTCN2022134716-appb-000003
及窃听设备指标集为
Figure PCTCN2022134716-appb-000004
The signal transmission system has X access points, K downlink users, J uplink users and L eavesdropping devices. Each access point is equipped with M antennas, and each user and eavesdropping device is a single antenna. The access point metrics set is
Figure PCTCN2022134716-appb-000001
The downlink user indicator set is
Figure PCTCN2022134716-appb-000002
The uplink user indicator set is
Figure PCTCN2022134716-appb-000003
and the eavesdropping device indicator set is
Figure PCTCN2022134716-appb-000004
可以理解的是,在下文的公式中,x’是接入点指标集
Figure PCTCN2022134716-appb-000005
中不为x的接入点;k’是下行用户指标集
Figure PCTCN2022134716-appb-000006
中不为k的下行用户;j’是上行用户指标集
Figure PCTCN2022134716-appb-000007
中不为j的上行用户。
It can be understood that in the formula below, x' is the access point index set
Figure PCTCN2022134716-appb-000005
in which is not an access point of x; k' is the downlink user index set
Figure PCTCN2022134716-appb-000006
The downlink user in is not k; j' is the uplink user index set
Figure PCTCN2022134716-appb-000007
Uplink users other than j in .
定义变量q D,x,q U,x′∈{0,1}分别表示接入点的上行及下行模式选择,q D,x(q U,x′)取1或取0对应该接入点选择下行或上行。 Define variables q D,x ,q U,x′ ∈ {0,1} to represent the uplink and downlink mode selection of the access point respectively, and q D,x (q U,x′ ) takes 1 or 0 to correspond to the access point Click to select downlink or uplink.
令q D=[q D,1,q D,2,…,q D,X]∈{0,1} X×1,q U=[q U,1,q U,2,…,q U,X]∈{0,1} X×1,相应对角分配矩阵为:
Figure PCTCN2022134716-appb-000008
Let q D =[q D,1 ,q D,2 ,…,q D,X ]∈{0,1} X×1 , q U =[q U,1 ,q U,2 ,…,q U ,X ]∈{0,1} X×1 , the corresponding diagonal distribution matrix is:
Figure PCTCN2022134716-appb-000008
由此,可得出下行接入点的发送信号x D为: From this, it can be concluded that the transmission signal x D of the downlink access point is:
Figure PCTCN2022134716-appb-000009
Figure PCTCN2022134716-appb-000009
其中,
Figure PCTCN2022134716-appb-000010
为针对用户k的下行链路预编码向量,
Figure PCTCN2022134716-appb-000011
为一个维度为MX×1的向量;s D,k为发送给用户k的数据信号,
Figure PCTCN2022134716-appb-000012
为下行接入点在发送信号中叠加的人工噪声,
Figure PCTCN2022134716-appb-000013
通过在发送信号上叠加人工噪声的方式对抗窃听设备拦截。
in,
Figure PCTCN2022134716-appb-000010
is the downlink precoding vector for user k,
Figure PCTCN2022134716-appb-000011
is a vector whose dimension is MX×1; s D,k is the data signal sent to user k,
Figure PCTCN2022134716-appb-000012
is the artificial noise superimposed in the transmitted signal by the downlink access point,
Figure PCTCN2022134716-appb-000013
Anti-eavesdropping equipment interception by superimposing artificial noise on the transmitted signal.
进一步地,根据下行接入点的发送信号x D,可得出用户k处从下行接入点的接收信号y D,k为: Further, according to the transmission signal x D of the downlink access point, it can be obtained that the received signal y D, k of user k from the downlink access point is:
Figure PCTCN2022134716-appb-000014
Figure PCTCN2022134716-appb-000014
其中,
Figure PCTCN2022134716-appb-000015
表示所有接入点到用户k处的信道矢量;h IUI,j,k表示上行用户j到下行用户k之间的信道矢量;p U,j为上行用户 j的信号发送功率;
Figure PCTCN2022134716-appb-000016
表示来自上行用户j的数据信号;
Figure PCTCN2022134716-appb-000017
表示下行用户k处的加性高斯白噪声。
in,
Figure PCTCN2022134716-appb-000015
Indicates the channel vector from all access points to user k; h IUI,j,k indicates the channel vector between uplink user j and downlink user k; p U,j is the signal transmission power of uplink user j;
Figure PCTCN2022134716-appb-000016
Indicates the data signal from uplink user j;
Figure PCTCN2022134716-appb-000017
Indicates the additive white Gaussian noise at the downlink user k.
根据下行用户k处的接收信号y D,k,可列出下行用户k处的信干噪比r D,k,表达式为: According to the received signal y D, k at the downlink user k, the signal-to-interference-noise ratio r D,k at the downlink user k can be listed, the expression is:
Figure PCTCN2022134716-appb-000018
Figure PCTCN2022134716-appb-000018
其中,γ D,k是下行用户k处的干扰协方差: where γ D,k is the interference covariance at downlink user k:
Figure PCTCN2022134716-appb-000019
Figure PCTCN2022134716-appb-000019
其中,g U,j,k表示上行发射用户j到下行接收用户k的信道状态信息;σ D,k表示用户k处的高斯白噪声。 Among them, g U,j,k represents the channel state information from uplink transmitting user j to downlink receiving user k; σ D,k represents Gaussian white noise at user k.
对于上行链路,首先列出任意接入点x′处的接收信号y U,x′,具体公式如下: For the uplink, first list the received signal y U,x′ at any access point x′, the specific formula is as follows:
Figure PCTCN2022134716-appb-000020
Figure PCTCN2022134716-appb-000020
其中,
Figure PCTCN2022134716-appb-000021
表示上行用户j到接入点x′处的信道矢量;
Figure PCTCN2022134716-appb-000022
表示接入点x与接入点x′之间的信道矢量;x D,x为下行接入点x的发送信号;n U,x′为接入点x′处的加性高斯白噪声矢量,
Figure PCTCN2022134716-appb-000023
in,
Figure PCTCN2022134716-appb-000021
Indicates the channel vector from uplink user j to access point x′;
Figure PCTCN2022134716-appb-000022
Indicates the channel vector between access point x and access point x′; x D, x is the transmitted signal of downlink access point x; n U, x′ is the additive white Gaussian noise vector at access point x′ ,
Figure PCTCN2022134716-appb-000023
由此,可得出在中央处理单元级联的接收信号y U为: Thus, it can be concluded that the received signal y U cascaded in the central processing unit is:
Figure PCTCN2022134716-appb-000024
Figure PCTCN2022134716-appb-000024
其中,
Figure PCTCN2022134716-appb-000025
由于信道估计误差的存在,中央处理器往往无法仅基于其已知的下行基带信号和所估计出的信道信息来完全去除基站上下行天线间的干扰。出于实际考虑,假设基站天线间信道的估计误差为
Figure PCTCN2022134716-appb-000026
并同时假设其服从高斯分布:
Figure PCTCN2022134716-appb-000027
表示数字或模拟域未消除的天线间剩余干扰功率。
in,
Figure PCTCN2022134716-appb-000025
Due to the existence of channel estimation errors, the central processing unit often cannot completely remove the interference between the uplink and downlink antennas of the base station based only on its known downlink baseband signals and estimated channel information. For practical considerations, it is assumed that the estimation error of the channel between base station antennas is
Figure PCTCN2022134716-appb-000026
And also assume that it obeys a Gaussian distribution:
Figure PCTCN2022134716-appb-000027
Indicates the residual inter-antenna interference power not canceled in the digital or analog domain.
经过适当的干扰消除后,中央处理单元的接收信号变为
Figure PCTCN2022134716-appb-000028
具体计算如下:
After proper interference cancellation, the received signal of the central processing unit becomes
Figure PCTCN2022134716-appb-000028
The specific calculation is as follows:
Figure PCTCN2022134716-appb-000029
Figure PCTCN2022134716-appb-000029
由此,可以得出中央处理单元处上行用户j的接收信号的信干噪比r U,j,表达式为: Thus, the signal-to-interference-noise ratio r U,j of the received signal of the uplink user j at the central processing unit can be obtained, and the expression is:
Figure PCTCN2022134716-appb-000030
Figure PCTCN2022134716-appb-000030
其中,
Figure PCTCN2022134716-appb-000031
是接收机预编码矢量;γ U,j是处理上行用户j信号时的干扰及噪声,表达式如下:
in,
Figure PCTCN2022134716-appb-000031
is the receiver precoding vector; γ U,j is the interference and noise when processing the signal of uplink user j, the expression is as follows:
Figure PCTCN2022134716-appb-000032
Figure PCTCN2022134716-appb-000032
其中,u U,j,x'表示接收接入点x′处的接收机预编码矢量;Q U,x'表示接收接入点x′处的双工工作模式分配矩阵;Q D,x表示发送接入点x处的双工工作模式分配矩阵;w D,x,k表示发送接入点x针对用户k的下行预编码向量;v AN,x表示接入点x处叠加的人工噪声;σ U,x'表示接入点x′处的高斯白噪声;δ IAI,x,x'表示接入点x与接入点x′之间经过干扰消除后的残余干扰功率。 Among them, u U,j,x' represents the receiver precoding vector at the receiving access point x'; Q U,x' represents the duplex working mode assignment matrix at the receiving access point x'; Q D,x represents The duplex working mode allocation matrix at the transmitting access point x; w D,x,k represents the downlink precoding vector of the transmitting access point x for user k; v AN,x represents the artificial noise superimposed at the access point x; σ U,x' represents the Gaussian white noise at the access point x'; δ IAI,x,x' represents the residual interference power between the access point x and the access point x' after interference cancellation.
假设窃听设备同样可获得下行链路信息,可列出窃听设备l处泄露的信号y EV,l的表达式: Assuming that the eavesdropping device can also obtain downlink information, the expression of the leaked signal y EV,l at the eavesdropping device l can be listed as follows:
Figure PCTCN2022134716-appb-000033
Figure PCTCN2022134716-appb-000033
其中,
Figure PCTCN2022134716-appb-000034
表示所有接入点到窃听设备l的窃听信道矢量;
Figure PCTCN2022134716-appb-000035
是对窃听设备l的加性高斯白噪声;h UE,j,l表示上行用户j到窃听设备l处的信道参量;n DE,l表示窃听设备l处的高斯白噪声。
in,
Figure PCTCN2022134716-appb-000034
Represent the eavesdropping channel vectors from all access points to eavesdropping device l;
Figure PCTCN2022134716-appb-000035
is the additive white Gaussian noise to the eavesdropping device l; h UE,j,l represents the channel parameter from the uplink user j to the eavesdropping device l; n DE,l represents the Gaussian white noise at the eavesdropping device l.
由此,可以得到窃听设备l处泄露的下行用户k信号的信干噪比r DE,k,l,以及窃听设备l处泄露的上行用户j信号的信干噪比r UE,j,l,具体表达式为: Thus, the signal-to-interference-noise ratio r DE,k,l of the downlink user k signal leaked at the eavesdropping device l, and the SINR r UE,j,l of the uplink user j signal leaked at the eavesdropping device l , The specific expression is:
Figure PCTCN2022134716-appb-000036
Figure PCTCN2022134716-appb-000036
Figure PCTCN2022134716-appb-000037
Figure PCTCN2022134716-appb-000037
其中,γ DE,k,l和γ UE,j,l分别是下行用户k和上行用户j在窃听设备l处的干扰协方差,表达式写为: Among them, γDE ,k,l and γUE ,j,l are the interference covariance of downlink user k and uplink user j at the eavesdropping device l respectively, and the expressions are written as:
Figure PCTCN2022134716-appb-000038
Figure PCTCN2022134716-appb-000038
Figure PCTCN2022134716-appb-000039
Figure PCTCN2022134716-appb-000039
其中,σ DE,l表示窃听设备l窃听下行用户k时的白噪声功率;σ UE,l表示窃听设备l窃听上行用户j时的白噪声功率。 Among them, σ DE,l represents the white noise power when the eavesdropping device l eavesdrops on the downlink user k; σ UE,l represents the white noise power when the eavesdropping device l eavesdrops on the uplink user j.
由此,可写出信号系统中各下行用户k和上行用户j的信号安全速率函数分别为R Ds,k和R Us,j,具体计算如下: Therefore, the signal security rate functions of each downlink user k and uplink user j in the signaling system can be written as R Ds,k and R Us,j respectively, and the specific calculation is as follows:
Figure PCTCN2022134716-appb-000040
Figure PCTCN2022134716-appb-000040
Figure PCTCN2022134716-appb-000041
Figure PCTCN2022134716-appb-000041
根据所有上行用户的信号安全速率函数和下行用户的信号安全速率函数,构建整个信号传输系统的安全速率模型。According to the signal security rate function of all uplink users and the signal security rate function of downlink users, the security rate model of the whole signal transmission system is constructed.
整个信号传输系统以最大化系统的上行和下行信号安全速率为目标,以接入点发送总功率和上行用户发送总功率为约束,实现对下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量的联合优化设计。The entire signal transmission system aims at maximizing the safe rate of the uplink and downlink signals of the system, and takes the total transmission power of the access point and the total transmission power of the uplink users as constraints to realize the downlink precoding vector, downlink artificial noise vector, uplink The joint optimal design of channel transmit power and mode selection vector.
首先构建目标优化模型:First build the target optimization model:
Figure PCTCN2022134716-appb-000042
Figure PCTCN2022134716-appb-000042
s.t.C1:
Figure PCTCN2022134716-appb-000043
stC1:
Figure PCTCN2022134716-appb-000043
C2:
Figure PCTCN2022134716-appb-000044
C2:
Figure PCTCN2022134716-appb-000044
C3:
Figure PCTCN2022134716-appb-000045
C3:
Figure PCTCN2022134716-appb-000045
C4:
Figure PCTCN2022134716-appb-000046
C4:
Figure PCTCN2022134716-appb-000046
其中,q D,x为发送接入点x处的双工工作模式分配向量;q U,x为接收接入点x处的双工工作模式分配向量;P D,x为预设的第x个接入点发送总功率,作为接入点的发送功率消耗最大值;P U,j为上行用户j的发送总功率,作为上行用户j发射功率最大值。 Among them, q D, x is the duplex working mode allocation vector at the sending access point x; q U, x is the duplex working mode allocation vector at the receiving access point x; PD, x is the preset xth The total transmit power of access points is taken as the maximum transmit power consumption of access points; P U,j is the total transmit power of uplink user j, which is taken as the maximum transmit power of uplink user j.
由于存在{q D,x,q U,x′}两个二元变量,非凸优化问题是一个非确定性多项式难题(NP-hard)的混合整数问题。当接入点和用户数目有限时,可以通过穷举法来得到全局最优解。但在无蜂窝大规模多输入多输出网络中,接入点的数目非常大,使用穷举法的计算复杂度大大增加,需要运算O(2 X)个子问题。因此,穷举法并不适用于实际情况中。 Since there are two binary variables {q D,x ,q U,x′ }, the non-convex optimization problem is a non-deterministic polynomial hard (NP-hard) mixed integer problem. When the number of access points and users is limited, the global optimal solution can be obtained by exhaustive method. However, in a non-cellular large-scale MIMO network, the number of access points is very large, and the calculation complexity of using the exhaustive method is greatly increased, and O(2 X ) sub-problems need to be calculated. Therefore, the exhaustive method is not applicable in actual situations.
其中外层循环通过采用基于量子禁忌搜索的双工模式选择算法来确定每一个接入点的工作方向;The outer loop uses a duplex mode selection algorithm based on quantum tabu search to determine the working direction of each access point;
内层循环则是基于外层循环确定下的双工方向,优化下行链路预编码向量w D,k、下行人工噪声向量v AN、上行链路发送功率p U,j的值、模式选择向量Q D和Q UThe inner loop optimizes the downlink precoding vector w D, k , the downlink artificial noise vector v AN , the value of the uplink transmit power p U,j, and the mode selection vector based on the duplex direction determined by the outer loop Q D and Q U .
可选地,所述对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数,包括:Optionally, the solving the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system includes:
确定所述信号传输系统的工作模式;determining the working mode of the signal transmission system;
根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行近似优化,构建求解优化模型;According to the working mode, approximate optimization is performed on the objective function and constraint conditions of the objective optimization model, and a solution optimization model is constructed;
基于所述求解优化模型,确定所述优化设计参数;Determining the optimal design parameters based on the solution optimization model;
所述目标函数是以所述所有用户的信号安全速率最大为优化目标;The objective function is to optimize the maximum signal security rate of all users;
所述约束条件是以发送接入点总功率和上行用户发送总功耗为约束。The constraints are based on the total power of the sending access point and the total power consumption of the uplink users.
可选地,所述确定所述信号传输系统的工作模式,包括:Optionally, the determining the working mode of the signal transmission system includes:
根据所述信号传输系统中的接入点状态,构建所述信号传输系统的量子系统;Constructing a quantum system of the signal transmission system according to the state of the access point in the signal transmission system;
利用随机矩阵对所述量子系统进行测量,确定可行解矩阵;Measuring the quantum system by using a random matrix to determine a feasible solution matrix;
利用所述可行解矩阵进行优化求解,确定所述信号传输系统的工作模式。Using the feasible solution matrix to optimize and solve, determine the working mode of the signal transmission system.
量子禁忌搜索算法结合了禁忌搜索和量子计算的两种基本概念,因此量子禁忌搜索算法不仅可以利用量子算法来充分反映系统信息状态的改变,还可以利用禁忌搜索算法来提高搜索效率。根据所提出的量子禁忌搜索方法,可以优化每一个接入点的双工模式,具体计算方法如下所示:The quantum tabu search algorithm combines the two basic concepts of tabu search and quantum computing, so the quantum tabu search algorithm can not only use the quantum algorithm to fully reflect the change of the system information state, but also use the tabu search algorithm to improve the search efficiency. According to the proposed quantum taboo search method, the duplex mode of each access point can be optimized, and the specific calculation method is as follows:
首先,根据信号传输系统中接入点数量,初始化
Figure PCTCN2022134716-appb-000047
和μ的值,
Figure PCTCN2022134716-appb-000048
表示有X个量子比特的量子系统,μ用来记录所取得最优解,初始值设为0。
First, according to the number of access points in the signal transmission system, initialize
Figure PCTCN2022134716-appb-000047
and the value of μ,
Figure PCTCN2022134716-appb-000048
Represents a quantum system with X qubits, μ is used to record the optimal solution obtained, and the initial value is set to 0.
Figure PCTCN2022134716-appb-000049
Figure PCTCN2022134716-appb-000049
其中,α x和β x分别表示量子比特处于0状态和1状态的概率,
Figure PCTCN2022134716-appb-000050
表示处于0状态和1状态的可能性相等。
Among them, α x and β x represent the probability that the qubit is in the 0 state and the 1 state, respectively,
Figure PCTCN2022134716-appb-000050
Indicates that being in the 0 state is equally likely to be in the 1 state.
进一步地,随机产生一个随机矩阵
Figure PCTCN2022134716-appb-000051
随机矩阵V产生可行解和相邻解,其中C表示可行解的数目;矩阵V中的元素在0和1之间,矩阵V的每一行表示一种可能的双工模式;
Figure PCTCN2022134716-appb-000052
表示一个维度为C×X的矩阵。
Further, randomly generate a random matrix
Figure PCTCN2022134716-appb-000051
The random matrix V generates feasible solutions and adjacent solutions, where C represents the number of feasible solutions; the elements in the matrix V are between 0 and 1, and each row of the matrix V represents a possible duplex mode;
Figure PCTCN2022134716-appb-000052
Represents a matrix of dimension C×X.
进一步地,通过测量
Figure PCTCN2022134716-appb-000053
次,将获得的可行解存储到矩阵
Figure PCTCN2022134716-appb-000054
中,具体如下所示:
Furthermore, by measuring
Figure PCTCN2022134716-appb-000053
Times, the obtained feasible solution is stored in the matrix
Figure PCTCN2022134716-appb-000054
, specifically as follows:
Figure PCTCN2022134716-appb-000055
Figure PCTCN2022134716-appb-000055
其中,通过比较
Figure PCTCN2022134716-appb-000056
中的
Figure PCTCN2022134716-appb-000057
和矩阵V中对应列元素的值,可以获得每一个比特
Figure PCTCN2022134716-appb-000058
的值。
Among them, by comparing
Figure PCTCN2022134716-appb-000056
middle
Figure PCTCN2022134716-appb-000057
And the value of the corresponding column element in the matrix V, each bit can be obtained
Figure PCTCN2022134716-appb-000058
value.
进一步地,为了满足可行域,引入一个新的表示可行解的变量ρ,令
Figure PCTCN2022134716-appb-000059
并且求解优化问题,评估合适的解。其中
Figure PCTCN2022134716-appb-000060
Figure PCTCN2022134716-appb-000061
Further, in order to satisfy the feasible region, a new variable ρ representing the feasible solution is introduced, so that
Figure PCTCN2022134716-appb-000059
And solve the optimization problem and evaluate the suitable solution. in
Figure PCTCN2022134716-appb-000060
Figure PCTCN2022134716-appb-000061
进一步地,更新最优解μ。如果当前循环适应度值比μ更好,则μ被当前循环适应度值所替代。Further, update the optimal solution μ. If the current loop fitness value is better than μ, then μ is replaced by the current loop fitness value.
进一步地,在循环的过程中,能从领域解中获得两种解。一种是最佳解,存储到ρ b中;一种是最差解,存进ρ w中。 Furthermore, in the process of looping, two kinds of solutions can be obtained from domain solutions. One is the best solution, which is stored in ρ b ; the other is the worst solution, which is stored in ρ w .
进一步地,表1是本申请提供的旋转门查找表,其中,Δθ表示旋转的角度。Further, Table 1 is a lookup table for a revolving door provided in the present application, wherein Δθ represents the angle of rotation.
表1旋转门查找表Table 1 Revolving door lookup table
Figure PCTCN2022134716-appb-000062
Figure PCTCN2022134716-appb-000062
根据表1,更新
Figure PCTCN2022134716-appb-000063
的值。U(θ)表示量子门,根据量子门和
Figure PCTCN2022134716-appb-000064
的计算,可以获得信号传输系统中每个接入点的下一个循环状态的
Figure PCTCN2022134716-appb-000065
Based on Table 1, update
Figure PCTCN2022134716-appb-000063
value. U(θ) represents the quantum gate, according to the quantum gate and
Figure PCTCN2022134716-appb-000064
The calculation of the next cycle state of each access point in the signal transmission system can be obtained
Figure PCTCN2022134716-appb-000065
Figure PCTCN2022134716-appb-000066
Figure PCTCN2022134716-appb-000066
此时,可以确定信号传输系统中收发机的工作模式。At this time, the working mode of the transceiver in the signal transmission system can be determined.
可选地,所述根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行近似优化,构建求解优化模型,包括:Optionally, according to the working mode, performing approximate optimization on the objective function and constraint conditions of the objective optimization model, and constructing a solution optimization model, including:
根据所述工作模式,对所述目标函数进行近似凸优化求解,确定新的优化函数;According to the working mode, an approximate convex optimization solution is performed on the objective function to determine a new optimization function;
在所述优化函数不收敛的情况下,对所述新的优化函数进行近似凸优化求解,直至得到的优化函数收敛,确定收敛优化函数;In the case that the optimization function does not converge, performing an approximate convex optimization solution to the new optimization function until the obtained optimization function converges, and then determining the convergence optimization function;
根据所述收敛优化函数,构建所述求解优化模型。The solution optimization model is constructed according to the convergent optimization function.
内层循环采用基于连续凸近似(Successive Convex Approximation,SCA)的优化算法,固定双工模式,优化收发机设计。首先考虑优化问题中的目 标函数,通过引入两个变量λ D,k和λ U,j,分别表示下行安全速率和上行安全速率的下界,优化问题可以变形为: The inner loop adopts an optimization algorithm based on Successive Convex Approximation (SCA), fixes the duplex mode, and optimizes the design of the transceiver. First consider the objective function in the optimization problem. By introducing two variables λ D,k and λ U,j , which respectively represent the lower bounds of the downlink security rate and uplink security rate, the optimization problem can be transformed into:
Figure PCTCN2022134716-appb-000067
Figure PCTCN2022134716-appb-000067
s.t.C5:
Figure PCTCN2022134716-appb-000068
stC5:
Figure PCTCN2022134716-appb-000068
C6:
Figure PCTCN2022134716-appb-000069
C6:
Figure PCTCN2022134716-appb-000069
然后,引入一系列新的变量{ψ D,k}和{ψ U,j},分别表示窃听设备窃听到下行用户的速率和窃听设备窃听到上行用户的速率的上界,优化问题可以近似为: Then, a series of new variables {ψ D,k } and {ψ U,j } are introduced, respectively representing the upper bounds of the rate at which the eavesdropping device eavesdrops on the downlink user and the rate at which the eavesdropping device eavesdrops on the uplink user, and the optimization problem can be approximated as :
Figure PCTCN2022134716-appb-000070
Figure PCTCN2022134716-appb-000070
s.t.C7:ln(1+r DE,k,l)≤ψ D,k stC7: ln(1+r DE,k,l )≤ψ D,k
C8:ln(1+r D,k)-ψ D,k≥λ D,k C8: ln(1+r D,k )-ψ D,k ≥λ D,k
C9:ln(1+r UE,j,l)≤ψ U,j C9: ln(1+r UE,j,l )≤ψ U,j
C10:ln(1+r U,j)-ψ U,j≥λ U,jC10: ln(1+r U,j )-ψ U,j ≥λ U,j ;
尽管原问题可以近似得到新的优化问题来求解,但是由于w D,k,p U,j,u U,j在约束中紧密耦合在一起,因此新的优化问题的最优解仍然很难求解。根据外层循环确定的双工模式,可以先固定Q D,x和Q U,x′的值,优化问题可以写成: Although the original problem can be approximated by a new optimization problem to solve, but because w D,k ,p U,j ,u U,j are tightly coupled together in constraints, the optimal solution of the new optimization problem is still difficult to find untie. According to the duplex mode determined by the outer loop, the values of Q D,x and Q U,x′ can be fixed first, and the optimization problem can be written as:
Figure PCTCN2022134716-appb-000071
Figure PCTCN2022134716-appb-000071
s.t.C1,C2,C7,C8,C9,C10;s.t. C1, C2, C7, C8, C9, C10;
其中,
Figure PCTCN2022134716-appb-000072
由于约束条件C7至C10,所以优化问题非凸,需要进一步变化处理。
in,
Figure PCTCN2022134716-appb-000072
Due to the constraints C7 to C10, the optimization problem is non-convex and needs further variation processing.
首先,针对约束式C7,通过引入新的变量τ DE,k,l,表示窃听设备窃听到下行用户的信干燥比的优化上界,不等式C7和函数r DE,k,l可以近似为: First, for the constraint C7, by introducing a new variable τ DE,k,l , which represents the optimized upper bound of the SNR of the eavesdropping device to the downlink user, the inequality C7 and the function r DE,k,l can be approximated as:
C11:ln(1+τ DE,k,l)≤ψ D,k C11: ln(1+τ DE,k,l )≤ψ D,k
C12:
Figure PCTCN2022134716-appb-000073
C12:
Figure PCTCN2022134716-appb-000073
D1:
Figure PCTCN2022134716-appb-000074
D1:
Figure PCTCN2022134716-appb-000074
D2:
Figure PCTCN2022134716-appb-000075
D2:
Figure PCTCN2022134716-appb-000075
其中,a表示优化变量;w表示向量变量;A表示矩阵常数。利用不等 式D1和D2对约束条件C11和约束条件C12进行一阶泰勒展开,分别得到约束条件C13和约束条件C14:Among them, a represents the optimization variable; w represents the vector variable; A represents the matrix constant. Using inequalities D1 and D2 to carry out first-order Taylor expansion on constraint condition C11 and constraint condition C12, respectively obtain constraint condition C13 and constraint condition C14:
C13:
Figure PCTCN2022134716-appb-000076
C13:
Figure PCTCN2022134716-appb-000076
C14:
Figure PCTCN2022134716-appb-000077
C14:
Figure PCTCN2022134716-appb-000077
其中,
Figure PCTCN2022134716-appb-000078
in,
Figure PCTCN2022134716-appb-000078
接下来,对于约束条件C8,引入变量{t D,k},表示表达式
Figure PCTCN2022134716-appb-000079
的优化下界,r D,k可以近似为:
Next, for constraint C8, a variable {t D,k } is introduced, representing the expression
Figure PCTCN2022134716-appb-000079
The optimal lower bound of r D,k can be approximated as:
C15:
Figure PCTCN2022134716-appb-000080
C15:
Figure PCTCN2022134716-appb-000080
其中,in,
C16:
Figure PCTCN2022134716-appb-000081
C16:
Figure PCTCN2022134716-appb-000081
C17:t D,k≥0; C17: t D,k ≥ 0;
利用不等式D2,对约束条件C16做一阶泰勒展开,可以近似为:Using the inequality D2, the first-order Taylor expansion of the constraint C16 can be approximated as:
C18:
Figure PCTCN2022134716-appb-000082
C18:
Figure PCTCN2022134716-appb-000082
D3:
Figure PCTCN2022134716-appb-000083
D3:
Figure PCTCN2022134716-appb-000083
其中,a和b均为变量,a>0,b>0,
Figure PCTCN2022134716-appb-000084
Among them, a and b are variables, a>0, b>0,
Figure PCTCN2022134716-appb-000084
由于约束条件C15是非凸的,最后利用D3不等式对C15近似,得到:Since the constraint condition C15 is non-convex, finally use the D3 inequality to approximate C15, and get:
C19:
Figure PCTCN2022134716-appb-000085
C19:
Figure PCTCN2022134716-appb-000085
完成对两个下行约束条件C7和C8的处理和近似后,接下来处理约束条件C9和C10。After completing the processing and approximation of the two downlink constraints C7 and C8, the constraints C9 and C10 are processed next.
对约束条件C9,首先考虑函数r UE,j,l。r UE,j,l上界可以表示为: For constraint C9, first consider the function r UE,j,l . The upper bound of r UE,j,l can be expressed as:
C20:
Figure PCTCN2022134716-appb-000086
C20:
Figure PCTCN2022134716-appb-000086
其中,t UE,j,l表示p U,j|h UE,j,l| 2的上界;τ UE,j,l表示γ UE,j,l的下界。 Among them, t UE,j,l represents the upper bound of p U,j |h UE,j,l | 2 ; τ UE,j,l represents the lower bound of γ UE,j,l .
C21:
Figure PCTCN2022134716-appb-000087
C21:
Figure PCTCN2022134716-appb-000087
C22:γ UE,j,l≥τ UE,j,lC22: γ UE,j,l ≥τ UE,j,l ;
约束条件C9可以写成:Constraint C9 can be written as:
C23:
Figure PCTCN2022134716-appb-000088
C23:
Figure PCTCN2022134716-appb-000088
给定
Figure PCTCN2022134716-appb-000089
其中,
Figure PCTCN2022134716-appb-000090
表示优化变量{τ UE,l,k,t UE,j,l,v AN,w D,k′}在第n次迭代的输出常数结果,当n=0表示输入的初始值,利用不等式D1和D2,约束条件C21和C22可以近似为:
given
Figure PCTCN2022134716-appb-000089
in,
Figure PCTCN2022134716-appb-000090
Indicates the output constant result of the optimization variable {τ UE,l,k ,t UE,j,l ,v AN ,w D,k′ } in the nth iteration, when n=0 represents the initial value of the input, using the inequality D1 and D2, constraints C21 and C22 can be approximated as:
C24:
Figure PCTCN2022134716-appb-000091
C24:
Figure PCTCN2022134716-appb-000091
C25:
Figure PCTCN2022134716-appb-000092
C25:
Figure PCTCN2022134716-appb-000092
利用不等式D1,约束C23近似为:Using inequality D1, constraint C23 is approximated as:
C26:
Figure PCTCN2022134716-appb-000093
C26:
Figure PCTCN2022134716-appb-000093
最后处理约束条件C10。由于变量p U,j,v AN,w D,k和u U,j在r U,j中耦合在一起,导致约束条件C10是最难处理的。而引入新的变量,得到r U,j的下界,约束条件C27,具体为: Constraint C10 is finally dealt with. Constraint C10 is the most intractable due to the coupling of variables p U,j ,v AN ,w D,k and u U,j in r U,j . And introduce a new variable, get the lower bound of r U, j , the constraint condition C27, specifically:
C27:
Figure PCTCN2022134716-appb-000094
C27:
Figure PCTCN2022134716-appb-000094
其中,
Figure PCTCN2022134716-appb-000095
Figure PCTCN2022134716-appb-000096
是引入的新变量,分别表示表达式
Figure PCTCN2022134716-appb-000097
Figure PCTCN2022134716-appb-000098
的上界,并且可以得到以下约束条件:
in,
Figure PCTCN2022134716-appb-000095
Figure PCTCN2022134716-appb-000096
are the new variables introduced, representing the expressions
Figure PCTCN2022134716-appb-000097
Figure PCTCN2022134716-appb-000098
The upper bound of , and the following constraints can be obtained:
C28:
Figure PCTCN2022134716-appb-000099
C28:
Figure PCTCN2022134716-appb-000099
C29:
Figure PCTCN2022134716-appb-000100
C29:
Figure PCTCN2022134716-appb-000100
C30:
Figure PCTCN2022134716-appb-000101
C30:
Figure PCTCN2022134716-appb-000101
C31:
Figure PCTCN2022134716-appb-000102
C31:
Figure PCTCN2022134716-appb-000102
约束条件C28至C30可以进一步分别近似为:Constraints C28 to C30 can be further approximated as:
C32:
Figure PCTCN2022134716-appb-000103
C32:
Figure PCTCN2022134716-appb-000103
C33:
Figure PCTCN2022134716-appb-000104
C33:
Figure PCTCN2022134716-appb-000104
C34:
Figure PCTCN2022134716-appb-000105
C34:
Figure PCTCN2022134716-appb-000105
最后,约束条件C10可以变换为:Finally, constraint C10 can be transformed into:
C35:
Figure PCTCN2022134716-appb-000106
C35:
Figure PCTCN2022134716-appb-000106
其中,
Figure PCTCN2022134716-appb-000107
in,
Figure PCTCN2022134716-appb-000107
目标优化模型最终转化为求解优化模型,具体如下所示:The target optimization model is finally transformed into a solution optimization model, as follows:
Figure PCTCN2022134716-appb-000108
Figure PCTCN2022134716-appb-000108
s.t.C1,C2,C13,C14,C17,C19,C24,C25,C26,C31,C32,C33,C34,C35;s.t. C1, C2, C13, C14, C17, C19, C24, C25, C26, C31, C32, C33, C34, C35;
此时,根据求解优化模型,可以得到信号传输系统中收发机的优化设计参数,包括:下行链路预编码向量
Figure PCTCN2022134716-appb-000109
下行人工噪声向量
Figure PCTCN2022134716-appb-000110
上行链路发送功率
Figure PCTCN2022134716-appb-000111
以及模式选择向量
Figure PCTCN2022134716-appb-000112
还可以包括接收机预编码矢量
Figure PCTCN2022134716-appb-000113
在实际的应用中,可以根据具体的需求,求解出优化设计参数中的任意一项或是多项。
At this time, according to the optimization model, the optimal design parameters of the transceiver in the signal transmission system can be obtained, including: downlink precoding vector
Figure PCTCN2022134716-appb-000109
Downstream Artifact Vector
Figure PCTCN2022134716-appb-000110
Uplink transmit power
Figure PCTCN2022134716-appb-000111
and the mode selection vector
Figure PCTCN2022134716-appb-000112
Can also include receiver precoding vector
Figure PCTCN2022134716-appb-000113
In practical applications, any one or multiple items of optimal design parameters can be obtained according to specific requirements.
本申请提供的多输入多输出收发机设计方法,利用双循环策略解决内层循环的非凸子问题,外层循环通过量子禁忌算法求出单次迭代最优模式选择,再通过内层循环,利用连续凹凸过程、等价变换等将非凸转凸求解,进而确定收发机及上行链路发送功率设计,实现信号传输系统的通信安全。The multi-input multi-output transceiver design method provided by this application uses a double-loop strategy to solve the non-convex subproblem of the inner loop. The outer loop uses the quantum taboo algorithm to find the optimal mode selection for a single iteration, and then through the inner loop, Using continuous concave-convex process, equivalent transformation, etc. to solve non-convex to convex, and then determine the design of transceiver and uplink transmission power, and realize the communication security of signal transmission system.
图3是本申请提供的多输入多输出收发机设计方法的流程示意图之二,如图3所示,包括:Fig. 3 is the second schematic flow diagram of the multi-input multi-output transceiver design method provided by the present application, as shown in Fig. 3, including:
首先,初始化
Figure PCTCN2022134716-appb-000114
First, initialize
Figure PCTCN2022134716-appb-000114
进一步地,生成随机矩阵V,对
Figure PCTCN2022134716-appb-000115
进行修正。
Further, generate a random matrix V, for
Figure PCTCN2022134716-appb-000115
Make corrections.
进一步地,在固定
Figure PCTCN2022134716-appb-000116
下求解近似凸优化问题,并以所求最优解更新下次凸优化迭代中参数
Figure PCTCN2022134716-appb-000117
Further, in the fixed
Figure PCTCN2022134716-appb-000116
Solve the approximate convex optimization problem below, and update the parameters in the next convex optimization iteration with the optimal solution obtained
Figure PCTCN2022134716-appb-000117
进一步地,判断近似凸优化问题是否收敛,在不收敛的情况下,对问 题进行进一步近似求解;在收敛的情况下,返回近似凸优化最优解
Figure PCTCN2022134716-appb-000118
Further, it is judged whether the approximate convex optimization problem is converged, and if it is not converged, the problem is further approximated; in the case of convergence, the optimal solution of the approximate convex optimization is returned
Figure PCTCN2022134716-appb-000118
进一步地,更新适应度μ及
Figure PCTCN2022134716-appb-000119
找到最优解ρ b及最差解ρ w
Further, update fitness μ and
Figure PCTCN2022134716-appb-000119
Find the optimal solution ρ b and the worst solution ρ w .
进一步地,判断量子禁忌搜索算法是否收敛,在不收敛的情况下,再次生成随机矩阵对
Figure PCTCN2022134716-appb-000120
进行修正;在收敛的情况下,结束并返回最优解
Figure PCTCN2022134716-appb-000121
Further, it is judged whether the quantum tabu search algorithm converges, and if it does not converge, the random matrix pair is generated again
Figure PCTCN2022134716-appb-000120
Make corrections; in the case of convergence, end and return the optimal solution
Figure PCTCN2022134716-appb-000121
本申请提供的多输入多输出收发机设计方法,以发送接入点总功率和上行链路总功率为约束,以在功耗限制下最大化系统的上下行链路总速率,实现信号传输系统的上行安全传输速率以及下行安全传输速率最大化问题。The multi-input multi-output transceiver design method provided by this application is constrained by the total power of the transmission access point and the total power of the uplink, so as to maximize the total rate of the uplink and downlink of the system under the limitation of power consumption, and realize the signal transmission system The uplink security transmission rate and the downlink security transmission rate maximization problem.
图4是本申请提供的安全频谱性能对比图之一,如图4所示,横轴为自干扰强度△,单位为分贝(dB);纵轴为频谱效率,单位为比特率/赫兹(bps/Hz)。在不同自干扰抑制条件下,根据图4中的安全频谱效率性能曲线,随着自干扰的强度变化时,相比于贪婪算法、固定双工模式的网络辅助全双工以及时分双工,基于量子禁忌搜索算法设计的系统安全谱效性能增益更高。Fig. 4 is one of the security spectrum performance comparison diagrams provided by the present application. As shown in Fig. 4, the horizontal axis is the self-interference intensity △, and the unit is decibel (dB); the vertical axis is the spectral efficiency, and the unit is bit rate/Hz (bps /Hz). Under different self-interference suppression conditions, according to the safety spectrum efficiency performance curve in Figure 4, as the strength of self-interference changes, compared with the greedy algorithm, network-assisted full-duplex and time-division duplex in fixed duplex mode, based on The system security spectral efficiency and performance gain of the quantum tabu search algorithm are higher.
并且量子禁忌搜索算法的谱效性能也更加接近使用穷举算法的频谱效率。当自干扰小于等于0dB时,贪婪算法、固定双工模式的网络辅助全双工、时分双工、穷举算法以及所提出的量子禁忌搜索算法的安全频谱效率性能改变较为平缓。当自干扰大于0dB时,这五种算法的性能随着自干扰的增加而急剧下降。但是整体来说在自干扰处于较低范围内时,本方案的能效提升是非常有效的。并且,可以发现在自干扰大于20dB时,量子禁忌搜索算法的性能和贪婪算法、固定双工模式的网络辅助全双工性能之间的差距进一步扩大。因为当自干扰过大时,系统需要更灵活的接入点调度机制来克服过高的自干扰带来的负面影响。因此对比贪婪算法和固定双工模式的网络辅助全双工以及时分双工机制,基于量子禁忌搜索算法设计拥有更高的安全频谱效率并且能够提供更高的自由度来克服自干扰的影响。And the spectral efficiency performance of the quantum tabu search algorithm is also closer to the spectral efficiency of the exhaustive algorithm. When the self-interference is less than or equal to 0dB, the security spectral efficiency performance of the greedy algorithm, fixed duplex mode network-assisted full-duplex, time-division duplex, exhaustive algorithm and the proposed quantum tabu search algorithm changes relatively smoothly. When the self-interference is greater than 0dB, the performance of these five algorithms decreases sharply with the increase of self-interference. But on the whole, when the self-interference is in a low range, the energy efficiency improvement of this solution is very effective. Moreover, it can be found that when the self-interference is greater than 20dB, the gap between the performance of the quantum taboo search algorithm and the greedy algorithm and the network-assisted full-duplex performance of the fixed duplex mode further widens. Because when the self-interference is too large, the system needs a more flexible access point scheduling mechanism to overcome the negative impact of excessive self-interference. Therefore, compared with the greedy algorithm and the network-assisted full-duplex and time-division duplex mechanisms of the fixed duplex mode, the design based on the quantum taboo search algorithm has higher security spectrum efficiency and can provide a higher degree of freedom to overcome the influence of self-interference.
图5是本申请提供的安全频谱性能对比图之二,如图5所示,横轴为接入点数,纵轴为频谱效率,单位为比特率/赫兹(bps/Hz)。图5展示了不同接入点数设置对系统安全谱效的影响。安全算法包括量子禁忌搜索算法、贪婪算法、网络辅助全双工和时分双工,在设定固定自干扰为-5dB,天线数为2的情况下,所有算法的安全谱效随着接入点数量的增加而增加,随着接入点数目从6增加到20,安全谱效区间从23.63bps/Hz至50.76bps/Hz增加到了37.52bps/Hz至74.34bps/Hz。且同等参数设置下,本申请所提算法性能要优于其他算法,以实现更高的安全频谱效率,贪婪算法和固定上下行网络辅助全双工网络次之,时分双工模式下的系统安全谱效位列最后。FIG. 5 is the second security spectrum performance comparison diagram provided by the present application. As shown in FIG. 5 , the horizontal axis is the number of access points, and the vertical axis is the spectrum efficiency, and the unit is bit rate/hertz (bps/Hz). Figure 5 shows the impact of different access point settings on the system security spectrum. Security algorithms include quantum tabu search algorithm, greedy algorithm, network-assisted full-duplex and time-division duplex. When the fixed self-interference is set to -5dB and the number of antennas is 2, the security spectral efficiency of all algorithms increases with the access point As the number increases, as the number of access points increases from 6 to 20, the security spectral efficiency range increases from 23.63bps/Hz to 50.76bps/Hz to 37.52bps/Hz to 74.34bps/Hz. And under the same parameter settings, the performance of the algorithm proposed in this application is better than other algorithms to achieve higher security spectrum efficiency, followed by greedy algorithm and fixed uplink and downlink network assisted full-duplex network, and the system security under time-division duplex mode Spectral effects came last.
下面对本申请提供的多输入多输出收发机设计装置进行描述,下文描述的多输入多输出收发机设计装置与上文描述的多输入多输出收发机设计 方法可相互对应参照。The MIMO transceiver design device provided by this application is described below, and the MIMO transceiver design device described below and the MIMO transceiver design method described above can be referred to in correspondence.
图6是本申请提供的多输入多输出收发机设计装置的结构示意图,如图6所示,包括:Fig. 6 is a structural schematic diagram of the multi-input multi-output transceiver design device provided by the present application, as shown in Fig. 6, including:
构建模块601,用于基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;A construction module 601, configured to construct a target optimization model based on a security rate model of user signals in the signal transmission system;
求解模块602,用于基于所述工作模式,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。A solving module 602, configured to solve the target optimization model based on the working mode, and determine optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vectors, downlink manual At least one of a noise vector, an uplink transmission power, and a mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
首先,构建模块601基于信号传输系统中用户信号的安全速率模型,构建目标优化模型。First, the construction module 601 constructs a target optimization model based on a safe rate model of user signals in the signal transmission system.
信号传输系统中的用户包括上行用户和下行用户。Users in the signal transmission system include uplink users and downlink users.
如图2所示,信号传输系统中的双工模式可以包括:灵活双工、混合双工和全双工等工作模式;网络辅助全双工模式下,每个接入点均通过前传网络接入到中央处理单元。As shown in Figure 2, the duplex mode in the signal transmission system may include: flexible duplex, hybrid duplex, and full duplex; in network-assisted full-duplex mode, each access point into the central processing unit.
在同一个接入点中,传输天线会对接收天线形成自干扰;上行用户会对下行用户形成上行对下行的干扰;同一个工作模式中,接收天线之间会形成下行对上行的干扰;窃听设备可以窃听对上行用户和传输天线的泄露信号。In the same access point, the transmitting antenna will form self-interference to the receiving antenna; the uplink user will form uplink to downlink interference to the downlink user; in the same working mode, the receiving antenna will form downlink to uplink interference; eavesdropping The device can eavesdrop on leaked signals to uplink users and transmit antennas.
在本申请提供的信号传输系统中,每台窃听设备可以对所有的用户设备进行窃听。通过设置频谱检测设备,可以确定检测到信号传输系统中的进行窃听的窃听设备以及该窃听设备的位置。In the signal transmission system provided by the present application, each wiretapping device can wiretap all user equipments. By setting the spectrum detection device, it is possible to determine the detected wiretapping device in the signal transmission system and the location of the wiretapping device.
模式选择向量为双工模式选择向量。The mode selection vector is a duplex mode selection vector.
安全速率模型包括上行用户安全速率函数和下行用户安全速率函数。The security rate model includes an uplink user security rate function and a downlink user security rate function.
目标优化模型包括目标函数和约束条件。The objective optimization model includes an objective function and constraints.
具体地,根据信号传输系统中用户信号的安全速率模型,构建目标函数和约束条件。Specifically, according to the safe rate model of user signals in the signal transmission system, the objective function and constraints are constructed.
进一步地,求解模块602对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。Further, the solving module 602 solves the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of transmission power and mode selection vector; the safe rate model is determined based on the signal safe rates associated with all users and eavesdropping devices.
信号传输系统中的工作模式可以包括:灵活双工模式、混合双工模式和全双工模式。The working modes in the signal transmission system may include: flexible duplex mode, hybrid duplex mode and full duplex mode.
通过对每个用户在所有的窃听设备处泄露的信号中,确定泄露信号最多的信干噪比,进而通过该信干噪比确定每个用户与窃听设备相关联的信号安全速率。For each user, among the signals leaked by all the eavesdropping devices, the SINR of the most leaked signal is determined, and then the signal security rate associated with each user and the eavesdropping device is determined through the SINR.
由于目标优化模型本身存在整数变量且多变量间相互耦合,属于非平滑非凸优化,为了解决高耦合度的优化问题,本申请提供了一种内外两层双循环求解的优化算法,用于多输入多输出收发机设计。Since the objective optimization model itself has integer variables and multi-variables are coupled with each other, it belongs to non-smooth and non-convex optimization. Input multiple output transceiver design.
具体地,外循环基于量子禁忌算法,在单次循环中求解信号传输系统的最佳双工模式选择。通过内层循环,将在所求出的最佳工作模式基础上,使用一系列非凸转凸的近似,例如等价转换或是凹凸过程等,以求解该目标优化模型,最后可以计算出信号传输系统中收发机的优化设计参数,还可以分别确定对每个用户干扰最强的窃听设备。Specifically, the outer loop is based on the quantum tabu algorithm to solve the optimal duplex mode selection of the signal transmission system in a single loop. Through the inner loop, a series of non-convex-to-convex approximations, such as equivalent conversion or concave-convex process, will be used on the basis of the best working mode to solve the target optimization model, and finally the signal can be calculated The optimized design parameters of the transceivers in the transmission system can also determine the eavesdropping devices with the strongest interference to each user respectively.
本申请提供的多输入多输出收发机设计装置,通过构建目标优化模型,并对目标优化模型进行求解,进而得到收发机的优化设计参数,能够有效防止窃听设备对信号的截取,保证了信号传输系统的通信安全。The multi-input multi-output transceiver design device provided by this application, by constructing the target optimization model and solving the target optimization model, and then obtaining the optimal design parameters of the transceiver, can effectively prevent interception of signals by eavesdropping devices and ensure signal transmission System communication security.
图7是本申请提供的电子设备的结构示意图,如图7所示,该电子设备可以包括:处理器(processor)710、通信接口(Communications Interface)720、存储器(memory)730和通信总线740,其中,处理器710,通信接口720,存储器730通过通信总线740完成相互间的通信。处理器710可以调用存储器730中的逻辑指令,以执行多输入多输出收发机设计方法,该方法包括:基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;确定所述信号传输系统的工作模式;基于所述工作模式,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。FIG. 7 is a schematic structural diagram of an electronic device provided by the present application. As shown in FIG. 7, the electronic device may include: a processor (processor) 710, a communication interface (Communications Interface) 720, a memory (memory) 730 and a communication bus 740, Wherein, the processor 710 , the communication interface 720 , and the memory 730 communicate with each other through the communication bus 740 . The processor 710 can call the logic instructions in the memory 730 to execute the design method of the multiple-input multiple-output transceiver. The method includes: building a target optimization model based on the safe rate model of the user signal in the signal transmission system; determining the signal transmission system Based on the working mode, the target optimization model is solved to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vectors, downlink artificial noise vectors At least one of , uplink transmission power, and mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
此外,上述的存储器730中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。In addition, the above-mentioned logic instructions in the memory 730 may be implemented in the form of software functional units and may be stored in a computer-readable storage medium when sold or used as an independent product. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
另一方面,本申请还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法所提供的多输入多输出收发机设计方法,该方法包括:基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;确定所述信号传输系统的工作模式;基于所述工作模式,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下 行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。On the other hand, the present application also provides a computer program product, the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by a computer During execution, the computer can execute the multiple-input multiple-output transceiver design method provided by the above-mentioned methods, the method includes: building a target optimization model based on the safe rate model of the user signal in the signal transmission system; determining the working mode of the signal transmission system mode; based on the working mode, solve the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system; the optimal design parameters include downlink precoding vector, downlink artificial noise vector, uplink At least one item of link transmission power and mode selection vector; the security rate model is determined based on signal security rates associated with all users and eavesdropping devices.
又一方面,本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各实施例提供的多输入多输出收发机设计方法,该方法包括:基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;确定所述信号传输系统的工作模式;基于所述工作模式,对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。In yet another aspect, the present application also provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, it is implemented to implement the design of the MIMO transceiver provided by the above-mentioned embodiments. The method includes: constructing a target optimization model based on a safe rate model of user signals in a signal transmission system; determining the working mode of the signal transmission system; solving the target optimization model based on the working mode, and determining the The optimized design parameters of the transceiver in the signal transmission system; the optimized design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmission power, and a mode selection vector; the safe rate model is determined based on the signal security rate associated with the listening device for all users.
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in One place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without any creative effort.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。Through the above description of the implementations, those skilled in the art can clearly understand that each implementation can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware. Based on this understanding, the essence of the above technical solution or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic discs, optical discs, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments.
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, rather than limiting them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still Modifications are made to the technical solutions described in the foregoing embodiments, or equivalent replacements are made to some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the present application.

Claims (13)

  1. 一种多输入多输出收发机设计方法,包括:A method for designing a multiple-input multiple-output transceiver, comprising:
    基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;Based on the safe rate model of user signals in the signal transmission system, the target optimization model is constructed;
    对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数;Solving the target optimization model to determine optimal design parameters of the transceiver in the signal transmission system;
    所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;The optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
    所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。The security rate model is determined based on signal security rates associated with all users with the bugging device.
  2. 根据权利要求1所述的多输入多输出收发机设计方法,其中,所述对所述目标优化模型进行求解,确定所述信号传输系统中收发机的优化设计参数,包括:The multi-input multi-output transceiver design method according to claim 1, wherein said solving the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system includes:
    确定所述信号传输系统的工作模式;determining the working mode of the signal transmission system;
    根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行近似优化,构建求解优化模型;According to the working mode, approximate optimization is performed on the objective function and constraint conditions of the objective optimization model, and a solution optimization model is constructed;
    基于所述求解优化模型,确定所述优化设计参数;Determining the optimal design parameters based on the solution optimization model;
    所述目标函数是以所述所有用户的信号安全速率最大为优化目标;The objective function is to optimize the maximum signal security rate of all users;
    所述约束条件是以发送接入点总功率和上行用户发送总功耗为约束。The constraints are based on the total power of the sending access point and the total power consumption of the uplink users.
  3. 根据权利要求2所述的多输入多输出收发机设计方法,其中,所述根据所述工作模式,对所述目标优化模型的目标函数和约束条件进行近似优化,构建求解优化模型,包括:The method for designing a multiple-input multiple-output transceiver according to claim 2, wherein, according to the operating mode, performing approximate optimization on the objective function and constraint conditions of the objective optimization model, and constructing a solution optimization model, comprising:
    根据所述工作模式,对所述目标函数进行近似凸优化求解,确定新的优化函数;According to the working mode, an approximate convex optimization solution is performed on the objective function to determine a new optimization function;
    在所述优化函数不收敛的情况下,对所述新的优化函数进行近似凸优化求解,直至得到的优化函数收敛,确定收敛优化函数;In the case that the optimization function does not converge, performing an approximate convex optimization solution to the new optimization function until the obtained optimization function converges, and then determining the convergence optimization function;
    根据所述收敛优化函数,构建所述求解优化模型。The solution optimization model is constructed according to the convergent optimization function.
  4. 根据权利要求2所述的多输入多输出收发机设计方法,其中,所述确定所述信号传输系统的工作模式,包括:The method for designing a multiple-input multiple-output transceiver according to claim 2, wherein said determining the working mode of said signal transmission system comprises:
    根据所述信号传输系统中的接入点状态,构建所述信号传输系统的量子系统;Constructing a quantum system of the signal transmission system according to the state of the access point in the signal transmission system;
    利用随机矩阵对所述量子系统进行测量,确定可行解矩阵;Measuring the quantum system by using a random matrix to determine a feasible solution matrix;
    利用所述可行解矩阵进行优化求解,确定所述信号传输系统的工作模式。Using the feasible solution matrix to optimize and solve, determine the working mode of the signal transmission system.
  5. 根据权利要求1所述的多输入多输出收发机设计方法,其中,所述所有用户包括所有下行用户和所有上行用户,在所述基于信号传输系统中用户信号的安全速率模型,构建目标优化模型之前,还包括:The multiple-input multiple-output transceiver design method according to claim 1, wherein said all users include all downlink users and all uplink users, and in said signal transmission system based on the safe rate model of user signals, an objective optimization model is constructed Previously, also included:
    根据任一下行用户处的信干噪比和所述任一下行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一下行用户的信号安全速率函数;Determine the signal security rate function of any downlink user according to the signal-to-interference-noise ratio at any downlink user and the signal-to-interference-noise ratio of any downlink user at all eavesdropping device positions;
    并根据任一上行用户接收信号的信干噪比和所述任一上行用户在所有窃听设备位置泄露信号的信干噪比,确定所述任一上行用户的信号安全速率函数;And according to the signal-to-interference-noise ratio of any uplink user's received signal and the signal-to-interference-noise ratio of any uplink user's leaked signal at all eavesdropping device positions, determine the signal security rate function of any uplink user;
    根据所有上行用户的信号安全速率函数和所有下行用户的信号安全速率函数,构建所述安全速率模型。The security rate model is constructed according to the signal security rate functions of all uplink users and the signal security rate functions of all downlink users.
  6. 根据权利要求5所述的多输入多输出收发机设计方法,其中,所述下行用户处的信干噪比,是基于以下方法得到的:The method for designing a multiple-input multiple-output transceiver according to claim 5, wherein the SINR at the downlink user is obtained based on the following method:
    基于每个接入点的模式选择向量函数、下行链路预编码向量函数和下行人工噪声向量函数,确定所述信号传输系统中下行接入点的发送信号;Determine the transmission signal of the downlink access point in the signal transmission system based on the mode selection vector function, the downlink precoding vector function and the downlink artificial noise vector function of each access point;
    根据所述下行接入点的发送信号,确定每个下行用户从所述下行接入点接收到的接收信号;determining a received signal received by each downlink user from the downlink access point according to the signal sent by the downlink access point;
    根据所述各用户接收信号的干扰协方差,确定每个下行用户处的信干噪比。The SINR at each downlink user is determined according to the interference covariance of the signals received by each user.
  7. 根据权利要求5所述的多输入多输出收发机设计方法,其中,所述上行用户接收信号的信干噪比,是基于以下方法得到的:The method for designing a multiple-input multiple-output transceiver according to claim 5, wherein the signal-to-interference-noise ratio of the received signal of the uplink user is obtained based on the following method:
    根据每个上行接入点的接收信号,获取中央处理单元联级的接收信号;According to the received signal of each uplink access point, the received signal of the cascaded central processing unit is obtained;
    对所述中央处理单元联级的接收信号进行干扰消除,获取中央处理单元的接收信号;Performing interference elimination on the received signal of the cascaded central processing unit, and obtaining the received signal of the central processing unit;
    根据每个上行用户的干扰信号和所述中央处理单元的接收信号,获取所述每个上行用户接收信号的信干燥比。According to the interference signal of each uplink user and the received signal of the central processing unit, the signal-to-interference ratio of the received signal of each uplink user is obtained.
  8. 根据权利要求5所述的多输入多输出收发机设计方法,其中,所述下行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:The method for designing a multiple-input multiple-output transceiver according to claim 5, wherein the signal-to-interference-noise ratio of the leakage signal of the downlink user at all eavesdropping device positions is obtained based on the following method:
    获取下行链路中各窃听设备位置的泄露信号;Obtain the leaked signal of the location of each eavesdropping device in the downlink;
    根据所述下行链路中各窃听设备位置的泄露信号,以及每个下行用户在所述各窃听设备处的干扰协方差,确定所述每个下行用户在所有窃听设备位置泄露信号的信干噪比。According to the leaked signal of each eavesdropping device position in the downlink, and the interference covariance of each downlink user at each eavesdropping device, determine the signal interference noise of the leaked signal of each downlink user at all eavesdropping device positions Compare.
  9. 根据权利要求5所述的多输入多输出收发机设计方法,其中,所述上行用户在所有窃听设备位置泄露信号的信干噪比,是基于以下方法得到的:The method for designing a multiple-input multiple-output transceiver according to claim 5, wherein the signal-to-interference-noise ratio of the leakage signal of the uplink user at all eavesdropping device positions is obtained based on the following method:
    根据每个上行用户的信号发送功率,以及所述每个上行用户在各窃听设备处的干扰协方差,确定所述每个上行用户在所有窃听设备位置泄露信号的信干噪比。According to the signal transmission power of each uplink user and the interference covariance of each uplink user at each eavesdropping device, determine the signal-to-interference-noise ratio of each uplink user leaking signals at all eavesdropping device locations.
  10. 一种多输入多输出收发机设计装置,包括:A design device for a multiple-input multiple-output transceiver, comprising:
    构建模块,基于信号传输系统中用户信号的安全速率模型,构建目标优化模型;The building block is based on the safe rate model of the user signal in the signal transmission system, and constructs the target optimization model;
    求解模块,对所述目标优化模型进行求解,确定所述信号传输系统中 收发机的优化设计参数;A solution module solves the target optimization model to determine the optimal design parameters of the transceiver in the signal transmission system;
    所述优化设计参数包括下行链路预编码向量、下行人工噪声向量、上行链路发送功率以及模式选择向量中的至少一项;The optimal design parameters include at least one of a downlink precoding vector, a downlink artificial noise vector, an uplink transmit power, and a mode selection vector;
    所述安全速率模型是基于所有用户与窃听设备相关联的信号安全速率确定的。The security rate model is determined based on signal security rates associated with all users with the bugging device.
  11. 一种电子设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求1至9任一项所述多输入多输出收发机设计方法。An electronic device, comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein, when the processor executes the program, the computer program according to any one of claims 1 to 9 is realized. Design method of multiple-input multiple-output transceiver described in item.
  12. 一种非暂态计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至9任一项所述多输入多输出收发机设计方法。A non-transitory computer-readable storage medium, on which a computer program is stored, wherein, when the computer program is executed by a processor, the design method for a multiple-input multiple-output transceiver according to any one of claims 1 to 9 is realized.
  13. 一种计算机程序产品,包括计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至9任一项所述多输入多输出收发机设计方法。A computer program product, including a computer program, wherein, when the computer program is executed by a processor, the design method for a multiple-input multiple-output transceiver according to any one of claims 1 to 9 is implemented.
PCT/CN2022/134716 2022-03-02 2022-11-28 Method and apparatus for designing multiple-input multiple-output transceiver WO2023165183A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210200224.1A CN114665937B (en) 2022-03-02 2022-03-02 Design method and device of multi-input multi-output transceiver
CN202210200224.1 2022-03-02

Publications (1)

Publication Number Publication Date
WO2023165183A1 true WO2023165183A1 (en) 2023-09-07

Family

ID=82028011

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/134716 WO2023165183A1 (en) 2022-03-02 2022-11-28 Method and apparatus for designing multiple-input multiple-output transceiver

Country Status (2)

Country Link
CN (1) CN114665937B (en)
WO (1) WO2023165183A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114665937B (en) * 2022-03-02 2023-07-28 网络通信与安全紫金山实验室 Design method and device of multi-input multi-output transceiver
CN115459813B (en) * 2022-07-29 2024-01-23 网络通信与安全紫金山实验室 Performance optimization method, device, equipment and storage medium of MIMO system
CN116567150B (en) * 2023-07-11 2023-09-08 山东凌晓通信科技有限公司 Method and system for preventing eavesdropping and recording in conference room

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110002414A1 (en) * 2008-02-25 2011-01-06 Mikael Coldrey Method Of And A Device For Precoding Transmit Data Signals In A Wireless MIMO Communication System
CN111970035A (en) * 2020-07-14 2020-11-20 重庆邮电大学 Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system
CN112311520A (en) * 2020-10-12 2021-02-02 南京理工大学 Method for constructing full-duplex direction modulation wireless network
CN113037340A (en) * 2021-03-26 2021-06-25 东方红卫星移动通信有限公司 Safe precoding method of multi-beam low-orbit satellite communication system
CN114665937A (en) * 2022-03-02 2022-06-24 网络通信与安全紫金山实验室 Method and device for designing multi-input multi-output transceiver

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8116391B2 (en) * 2006-05-26 2012-02-14 Wi-Lan Inc. Quantization of channel state information in multiple antenna systems
CN103259575B (en) * 2013-04-19 2015-10-21 南京邮电大学 Based on the linear process optimization method of multiple antennas bi-directional relaying wireless communication system
US10050767B2 (en) * 2015-09-18 2018-08-14 Huawei Technologies Canada Co., Ltd. System and method for multiple-input and multiple-output (MIMO) full-duplex precoding algorithms
CN108809365B (en) * 2018-06-13 2021-07-09 华侨大学 Cooperative scrambling secure transmission method based on optimal user selection of relay link
CN109981153B (en) * 2019-04-11 2020-08-07 东南大学 Artificial noise assisted large-scale MIMO security statistics pre-coding method
CN111385011B (en) * 2019-06-20 2022-08-02 南京邮电大学 Wireless power supply relay network system based on full duplex and optimization method
KR102376810B1 (en) * 2019-12-10 2022-03-21 한국과학기술원 Method and apparatus for improving security performance using artificial noise
CN113708804B (en) * 2021-07-28 2022-08-12 广州大学 Whale algorithm-based user scheduling and simulated beam selection optimization method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110002414A1 (en) * 2008-02-25 2011-01-06 Mikael Coldrey Method Of And A Device For Precoding Transmit Data Signals In A Wireless MIMO Communication System
CN111970035A (en) * 2020-07-14 2020-11-20 重庆邮电大学 Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system
CN112311520A (en) * 2020-10-12 2021-02-02 南京理工大学 Method for constructing full-duplex direction modulation wireless network
CN113037340A (en) * 2021-03-26 2021-06-25 东方红卫星移动通信有限公司 Safe precoding method of multi-beam low-orbit satellite communication system
CN114665937A (en) * 2022-03-02 2022-06-24 网络通信与安全紫金山实验室 Method and device for designing multi-input multi-output transceiver

Also Published As

Publication number Publication date
CN114665937B (en) 2023-07-28
CN114665937A (en) 2022-06-24

Similar Documents

Publication Publication Date Title
WO2023165183A1 (en) Method and apparatus for designing multiple-input multiple-output transceiver
Chen et al. Secure primary transmission assisted by a secondary full-duplex NOMA relay
CN111970035B (en) Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system
CN110381503B (en) Interference blocking scheme switching method for uplink safe transmission of millimeter wave cellular network
CN105657839B (en) The power distribution method of full duplex multicarrier security system based on qos requirement
CN108880734B (en) CCFD-Massive MIMO system power distribution method based on quantum backtracking search optimization
Lee et al. Learning-based joint optimization of transmit power and harvesting time in wireless-powered networks with co-channel interference
Xia et al. Joint optimization of spectral efficiency for cell-free massive MIMO with network-assisted full duplexing
CN114006645A (en) Relay-assisted secure transmission method and system for cognitive unmanned aerial vehicle
Garcia et al. Relay selection and power allocation for secrecy sum rate maximization in underlying cognitive radio with cooperative relaying NOMA
Fazel et al. Secure throughput optimization for cache-enabled multi-UAVs networks
Hashemi et al. Energy efficiency maximization in the uplink delta-OMA networks
Lee et al. Deep learning framework for secure communication with an energy harvesting receiver
Gharagezlou et al. Secrecy sum rate analysis and power allocation with OSTBC and artificial noise for MIMO systems
Li et al. CSI-Impaired Secure Resource Allocation for SWIPT-Enabled Full-Duplex Consumer Internet of Things Networks in Smart Healthcare
CN110417445B (en) Sparse beam design and power control method of network-assisted full-duplex system
Xu et al. Sum Secrecy Rate Maximization for IRS-aided Multi-Cluster MIMO-NOMA Terahertz Systems
CN116321236A (en) RIS-assisted safe honeycomb-free large-scale MIMO system energy efficiency optimization method
CN110601736A (en) Multi-antenna full-duplex cognitive radio energy capturing and information transmission method
Perdana et al. Deep Learning-based Spectral Efficiency Maximization in Massive MIMO-NOMA Systems with STAR-RIS
Zhang et al. Performance analysis of relay based NOMA cooperative transmission under cognitive radio network
CN115278896A (en) MIMO full duplex power distribution method based on intelligent antenna
Xia et al. Transceiver design for large-scale DAS with network assisted full duplex
CN114501580A (en) Cooperative rate segmentation network security transmission method with untrusted relay threat
NaseriTehrani et al. Resource allocation for irs-enabled secure multiuser multi-carrier downlink urllc systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22929611

Country of ref document: EP

Kind code of ref document: A1