CN105007578A - Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system - Google Patents
Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system Download PDFInfo
- Publication number
- CN105007578A CN105007578A CN201510309682.9A CN201510309682A CN105007578A CN 105007578 A CN105007578 A CN 105007578A CN 201510309682 A CN201510309682 A CN 201510309682A CN 105007578 A CN105007578 A CN 105007578A
- Authority
- CN
- China
- Prior art keywords
- signal
- node
- antenna
- base
- safe transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an uplink secure transmission method based on downlink auxiliary feedback in a 5G communication system. In the first stage, a multi-antenna base station end sends both artificial interference and artificial noise signals on a downlink by means of a wave beam formation technology; and a single-antenna user end receives an emission signal from the base station end, and scrambles the received signal to a to-be-sent secret signal so that a mixed emission signal is formed. In the second stage, the user terminal broadcasts the mixed emission signal; and the base station end receives the mixed emission signal. Since the base station end already knows an artificial interference signal emitted by the base station itself, an expected secret signal can be separated from the received signal. A single-antenna passive eavesdropping end receives mixed signals during both transmission stages, and cannot know any prior information about the artificial interference and artificial noise signals, so the possibility of stealing secret information is low. Therefore, the transmission security of a 5G uplink single-input and multi-output system is effectively guaranteed.
Description
Technical field
The present invention relates to a kind of safe transmission method of wireless communication system, particularly relate to a kind of safe transmission method for the up single input and multi-output of the 5G under TDD mode (SIMO) wireless communication system.
Background technology
Wireless communication technology, while offering convenience for the daily production of people, life, also inevitably because of the unboundedness of its physical transfer, brings the puzzlement that Content of Communication is easy to stolen to communicating pair.Along with the intensification day by day of wireless communication technology development degree and popularity, the safety problem of communication is also taken seriously further.Adopt which kind of means effectively take precautions against information leakage, guarantee that the safe transmission of information will become a long-term focus Journal of Sex Research problem.
As the key technology of a most prospect in 5G radio communication, extensive multiple-input and multiple-output (MassiveMultiple-Input Multiple-Output, Massive MIMO) technology has been subject to paying close attention to more and more widely from academia and industrial quarters.Under this technical background, 5G system base-station end is configured extensive antenna array, thus the transmission of the safety of physical layer of 5G downlink communication can obtain effective guarantee, and correlative study achievement also emerged in multitude in nearly 5 years.But the transmitting power limited due to user side and transmit antenna number, rare document can provide effective technological means to ensure the fail safe of 5G uplink.
Existing radio physical layer secure transmission technique roughly has cipher key technique and the large class of multi-antenna technology two.Cipher key technique aspect, in being entitled as in the document of " Feedback-basedcollaborative secrecy encoding over binary symmetric channels " that IEEE Transactions on Information Theory delivers in August, 2012, proposing a kind of system safety performance based on key feedback and strengthen strategy.Although this strategy make use of the key that destination feeds back to source, and effectively ensure that the fail safe that source secret signal is transmitted, the communication system of single antenna node composition can only be served, and only limited security performance can be brought to promote for system.In the large class of multi-antenna technology, the anti-eavesdrop technology that man made noise assists is again the branch of an outbalance.In being entitled as in the document of " Secure transmission with artificial noise over fading channels:Achievable rate andoptimal power allocation " that IEEE Transactions on Vehicular Technology delivers in October, 2010, propose a kind of system safety transmission policy injected based on man made noise's optimal power.Although this strategy is on the basis completing optimal power proportioning between secret signal and man made noise's signal, the maximization that can reach safe rate to system can be realized, but the SIMO wireless communication system be made up of single antenna source and multiple antennas destination can not be served.
Summary of the invention
The object of the invention is to for the up single input and multi-output of the 5G under TDD mode (SIMO) wireless communication system, up safe transmission method auxiliary based on downstream feedback in a kind of 5G communication system is proposed, 5G ascending communication system cannot be directly applied for solve existing radio physical layer secure transmission technique, or the problem of limited safe performance gain can only be brought.
For reaching above object, the present invention adopts following technical scheme to be achieved:
Based on the up safe transmission method that downstream feedback is auxiliary in 5G communication system, described 5G communication system includes a single-antenna subscriber node Alice, a M root antenna base station Node B ob, and a single antenna passive wiretapping node Eve; Comprise the following steps based on the up safe transmission method that downstream feedback is auxiliary in described 5G communication system:
Step 1, single-antenna subscriber node Alice sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob; Base-station node Bob utilizes pilot sequence information to estimate M dimensional vector channel information from single-antenna subscriber node Alice to base-station node Bob;
Step 2, base-station node Bob utilizes the small scale channel information h estimated
aB, the M dimension feedback signal vector designing the safe transmission first stage is
wherein β ∈ (0,1) is the power allocation factor between the Human disturbance feedback signal that presets and man made noise's feedback signal, P
bfor the signal transmission power of base-station node Bob,
represent the Wave beam forming weighted vector of downstream feedback link maximum ratio transmission, z is the random Gauss AI signal again that distribution meets zero mean unit variance,
represent base-station node Bob to single-antenna subscriber node Alice small scale channel
null space matrix and Ψ
hΨ=I,
for M-1 ties up random AN signal train vector, each random element of vector obeys average mutually to be independently 0 variance be 1 multiple Gaussian Profile;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve completes the reception to base-station node Bob feedback signal respectively: the signal that single-antenna subscriber node Alice received in the safe transmission first stage is
wherein r represents the distance between single-antenna subscriber node Alice and eavesdropping node Eve, and α represents the path attenuation factor that wireless channel large scale declines, α>=2; n
afor the reception noise at single-antenna subscriber node Alice place; Accordingly, eavesdropping node Eve at the signal that the safe transmission first stage receives is
Wherein r
bErepresent the distance between base-station node Bob to eavesdropping node Eve,
multipath fading channel between representative eavesdropping node Eve to base-station node Bob,
for eavesdropping the reception noise at node Eve place;
Step 4, in the second stage of safe transmission, single-antenna subscriber node Alice designs and broadcast singal
Here η ∈ (0,1) represents the power allocation factor between secret signal s and normalization interference signal, P
arepresent single-antenna subscriber node Alice end signal transmitting power,
for random noise n
avariance;
Step 5, base-station node Bob and eavesdropping node Eve completes the reception to single-antenna subscriber node Alice broadcast singal respectively: the vector mixed signal that base-station node Bob receives in safe transmission second stage is
Wherein n
brepresent the reception noise at base-station node Bob place; Correspondingly, the scalar mixing signal that eavesdropping node Eve receives in safe transmission second stage is
Wherein r
aErepresent the distance between single-antenna subscriber node Alice and eavesdropping node Eve,
represent the multipath fading channel between single-antenna subscriber node Alice and eavesdropping node Eve,
for eavesdropping node Eve is at the reception noise of safe transmission second stage.
When proceeding to the transmit stage of next secret signal, automatically repeat the process in step 1 to step 5.
Based on the up safe transmission method that downstream feedback is auxiliary in 5G communication system, comprise the following steps:
First, in the first stage of safe transmission, multi-antenna base station end utilizes beam-forming technology to send Human disturbance and man made noise's signal on the uplink simultaneously;
Then, single-antenna subscriber end completes the reception transmitted to base station end, and transmits on the signal scrambling received to secret signal pending to form mixing;
Secondly, in the second stage of safe transmission, single-antenna subscriber end is broadcasted this mixing and is transmitted;
Finally, upstream multi-antenna communication base station end completes mixing the reception transmitted, and multi-antenna communication base station utilizes maximum likelihood detection method, from mixing transmits, estimate secret signal exactly.
Compared with safety of physical layer transmission plan existing in prior art, the invention has the advantages that:
1, the present invention is on safe transmission conceptual design, considers simultaneously and has used large scale and the multipath fading information of wireless channel.
2, on security information safe transmission ensures, the present invention has only used the feedback of destination random signal.Compared with existing safe transmission scheme feed back based on key, the present invention, without the need to carrying out necessary key agreement or pre-share operates between receiving-transmitting sides, reduces the resource consumption of system.
3, in the use of feedback signal, scheme designed by the present invention, only in the second stage of secret signal transmission, to the mixed signal including feedback random signal received in the first stage, carries out the energy normalized process of indifference.The present invention, while guarantee system safety performance, does not add other hardware and power loss.
4, the present invention has used the multiple antennas advantage of destination, and compared with the safe transmission scheme fed back based on single antenna destination key of routine, can effectively enhance system security energy.
5, on destination antenna array uses, the present invention's design employs Human disturbance Wave beam forming and man made noise injects this United Technologies, make use of the transmitting degree of freedom of destination fully.
6, two benches through-put power configuration aspect, the present invention is under the poorest safe transmission scene, to maximize the ergodic safe rate of system for target, complete respectively at Human disturbance signal and man made noise's signal, and the optimal power allocation operation between secret signal and normalization mixed signal.Compared with constant power batch operation, two benches optimal power allocation operation of the present invention effectively improves the security performance of system.
Under the present invention considers that wireless communication system is operated in time division duplex (Time Division Duplex, TDD) pattern, system has used the reciprocity of channel in the acquisition of channel information; In addition, in order to weigh between node, relative distance is on the impact of system safety performance, and large scale gain and the small scale gain of wireless fading channel have been taken into account in modeling analysis simultaneously.
In step 1 to 5 of the present invention, each fail safe taking turns Secret Information Transmission all needs the signals transmission in two stages to ensure.
In step 2 of the present invention, the effect of man made noise and Human disturbance is respectively: in the first stage of secret signal safe transmission, and man made noise's signal is used for protecting Human disturbance signal intactly not intercepted by Eve by Bob; In the second stage of safe transmission, do not comprise man made noise's signal due in the signal that Alice received in the first stage, Human disturbance signal is then used for weakening the eavesdropping capability of Eve to secret signal as much as possible by Alice.
Below in conjunction with the drawings and the specific embodiments, the present invention is described in further detail.
Accompanying drawing explanation
Based on the up two benches safe transmission method schematic diagram that downstream feedback is auxiliary in Fig. 1 5G wireless communication system designed by the present invention; Wherein Fig. 1 (A) first stage of transmitting for two benches, also i.e. feedback stage; The second stage that Fig. 1 (B) transmits for two benches is also the forward direction stage of Secret Information Transmission.Single-antenna subscriber A in figure represents single antenna source node Alice, and M antenna base station B represents that M (M >=3) root antenna expects that destination node Bob, single antenna listener-in E represent single antenna passive wiretapping node Eve.
To be that the system under different capacity allocation strategy is ergodic reach safe rate and the ergodic simulation curve comparison diagram reaching safe rate of the poorest safe transmission scene system to Fig. 2.
Fig. 3 is in the poorest safe transmission scene, and different capacity distributes the system safety outage probability simulation curve under setting, system safety outage probability high s/n ratio is similar to simulation curve, system safety outage probability high s/n ratio approximation theory curve comparison figure.
Embodiment
Below in conjunction with attached embodiment illustrated in fig. 1, the embodiment of scheme designed by the present invention is described in detail.
Based on the up safe transmission method that downstream feedback is auxiliary in a kind of 5G of the present invention communication system, comprise the following steps:
Step 1, before two benches transmission is opened, single-antenna subscriber node Alice (in figure single-antenna subscriber A) first sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob (in figure M antenna base station B).The pilot sequence information that base-station node Bob utilizes pre-share and the mixed information received, estimate the M dimensional vector channel information from Alice to Bob, and perform the preparation of feedback information transmitting;
Step 2, after completing the estimation to minor channel information (channel of Alice to Bob), base-station node Bob completes the transmission operation of feedback signal.Due to system works in TDD mode and communication channel become slowly, base-station node Bob is first according to the reciprocity of channel between Alice and Bob, and estimated small scale channel information h
aB(being included in the M dimensional vector channel information that step 1 estimates), designing safe transmission first stage downstream feedback link maximum ratio transmission Wave beam forming weighted vector is
secondly, designing the null space matrix calculating Bob to Alice channel is
here Ψ meets Ψ simultaneously
hΨ=I.Then, safe rate maximizing performance criterion is reached according to system is ergodic, computing draws in the safe transmission first stage, Human disturbance (Artificial Interference, AI) feedback signal and man made noise (Artificial Noise, AN) the power allocation factor β ∈ (0,1) between feedback signal is
Wherein, ρ
aand ρ
bbe respectively the transmitting signal to noise ratio of node Alice and Bob.
Finally, base-station node Bob is according to available signal transmission power P
b, design and launch M n dimensional vector n feedback signal
wherein z is the random Gauss AI signal again that distribution meets zero mean unit variance,
for M-1 ties up random AN signal phasor, and each random element of vector obeys the multiple Gaussian Profile that average is 0, variance is 1 mutually independently;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve (in figure single antenna listener-in E) complete the reception to safe transmission first stage base station end feedback signal respectively.Via the effect of corresponding slow change wireless channel, the signal that Alice received in the feedback signal transmission stage is
Wherein r represents the distance between Alice and Bob, and α (α>=2) represents wireless channel paths decay factor, n
afor the reception noise at Alice place.Correspondingly, Eve at the signal that the safe transmission first stage receives is
Wherein r
bErepresent the distance between Bob to Eve,
represent the multipath fading channel vector between Eve to Bob,
for the reception noise of Eve first stage in two benches eavesdropping process;
Step 4, Alice design also broadcast packet contains the mixed signal of secret signal (being contemplated for Bob to receive), to open the second stage of two benches safe transmission.In mixed-signal designs, first Alice to make the normalized on energy at the signal that the first stage receives to it.Secondly, reach safe rate maximizing performance criterion according to system is ergodic equally, the power allocation factor η ∈ (0,1) between design secret signal and normalized signal is,
Here, B=((M-1) (β)
2+ (M-2) (1-β)
2) ρ
a+ (M-1) (β)
2ρ
b.Finally, single-antenna subscriber node Alice is according to self available signal transmission power P
a, design and broadcast mixed signal
Wherein s represents secret signal,
for random noise n
avariance;
Step 5, secret signal expects that receiving terminal Bob and eavesdropping node Eve completes the reception of the mixed signal to Alice broadcast respectively.Through the impact of respective wireless fading channel, the vector signal that Bob receives in safe transmission second stage is
Wherein n
brepresent the reception noise at Bob place.Further, due to known self send out AI signal z, Bob eliminates z and also makes maximum-ratio combing to above-mentioned vector signal and receive operation, obtains Received signal strength
Correspondingly, the signal that Eve receives in safe transmission second stage is
Wherein r
aErepresent the distance between Alice and Eve,
represent the multipath fading channel between Alice and Eve,
for the reception noise of the second stage that Eve eavesdrops at two benches;
Step 6, when proceeding to the transmit stage of next secret signal, system repeats the two benches secure transfer process in above-mentioned steps 1 to step 5 automatically.
In above-mentioned steps 5, Bob utilizes maximum likelihood detection method, can from y
bin estimate secret signal s exactly.And on the other hand, because Eve cannot know any prior information about scalar AI signal and vector AN signal, thus cannot from two benches Received signal strength
with
obtain about the accurate estimation of secret signal s, thus the effective guarantee fail safe of secret signal transmission.
To set M=4, Fig. 2 and Fig. 3 respectively depict ergodic under the input of multiple gaussian signal and different parameters and scene suppose of system and reaches safe rate and security interrupt probability performance curve, further from the angle of system safety performance emulation, illustrate the present invention quantitatively and ensureing the effect in 5G up single input and multi-output (SIMO) system wireless safe transmission.
To be that the system under different capacity allocation strategy is ergodic reach safe rate and the ergodic simulation curve comparison diagram reaching safe rate of the poorest safe transmission scene system to Fig. 2.In figure
and aR
sergodic under optimal power allocation and constant power distribute of representative system reaches safe rate respectively;
with
represent in the poorest safe transmission scene respectively, ergodic under optimal power allocation of system reaches safe rate, ergodic under constant power distributes reach the high s/n ratio approximation of safe rate and constant power distribute under ergodicly reach safe rate; ρ
aand ρ
bbe respectively the transmitting signal to noise ratio of node Alice and Bob.
Fig. 3 is in the poorest safe transmission scene, and different capacity distributes the system safety outage probability simulation curve under setting, system safety outage probability high s/n ratio is similar to simulation curve, system safety outage probability high s/n ratio approximation theory curve comparison figure.In figure
represent in the poorest safe transmission scene respectively, the system safety outage probability under given power division, the system safety outage probability high s/n ratio under given power division be similar to, system safety outage probability under optimal power allocation;
represent the targeted security speed preset.
Claims (6)
1. in a 5G communication system based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, described 5G communication system includes a single-antenna subscriber node Alice, a M root antenna base station Node B ob, and a single antenna passive wiretapping node Eve; Comprise the following steps based on the up safe transmission method that downstream feedback is auxiliary in described 5G communication system:
Step 1, single-antenna subscriber node Alice sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob; Base-station node Bob utilizes pilot sequence information to estimate M dimensional vector channel information from single-antenna subscriber node Alice to base-station node Bob;
Step 2, base-station node Bob utilizes the small scale channel information h estimated
aB, the M dimension feedback signal vector designing the safe transmission first stage is
wherein β ∈ (0,1) is the power allocation factor between the Human disturbance feedback signal that presets and man made noise's feedback signal, P
bfor the signal transmission power of base-station node Bob,
represent the Wave beam forming weighted vector of downstream feedback link maximum ratio transmission, z is the random Gauss AI signal again that distribution meets zero mean unit variance,
represent base-station node Bob to single-antenna subscriber node Alice small scale channel
null space matrix and Ψ
hΨ=I,
for M-1 ties up random AN signal train vector, each random element of vector obeys average mutually to be independently 0 variance be 1 multiple Gaussian Profile;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve completes the reception to base-station node Bob feedback signal respectively: the signal that single-antenna subscriber node Alice received in the safe transmission first stage is
wherein r represents the distance between single-antenna subscriber node Alice and eavesdropping node Eve, and α represents the path attenuation factor that wireless channel large scale declines, α>=2; n
afor the reception noise at single-antenna subscriber node Alice place; Accordingly, eavesdropping node Eve at the signal that the safe transmission first stage receives is
Wherein r
bErepresent the distance between base-station node Bob to eavesdropping node Eve,
multipath fading channel between representative eavesdropping node Eve to base-station node Bob,
for eavesdropping the reception noise at node Eve place;
Step 4, in the second stage of safe transmission, single-antenna subscriber node Alice designs and broadcast singal
Step 5, base-station node Bob and eavesdropping node Eve completes the reception to single-antenna subscriber node Alice broadcast singal respectively: the vector mixed signal that base-station node Bob receives in safe transmission second stage is
2. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, when proceeding to the transmit stage of next secret signal, automatically repeating the process in step 1 to step 5.
3. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, M >=3.
4. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, in step 5, base-station node Bob utilizes maximum likelihood detection method, from y
bin estimate secret signal s exactly.
5. in 5G communication system based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, comprise the following steps:
First, in the first stage of safe transmission, multi-antenna base station end utilizes beam-forming technology to send Human disturbance and man made noise's signal on the uplink simultaneously;
Then, single-antenna subscriber end completes the reception transmitted to base station end, and transmits on the signal scrambling received to secret signal pending to form mixing;
Secondly, in the second stage of safe transmission, single-antenna subscriber end is broadcasted this mixing and is transmitted;
Finally, upstream multi-antenna communication base station end completes mixing the reception transmitted.
6. in a kind of 5G communication system according to claim 5 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, multi-antenna communication base station utilizes maximum likelihood detection method, from mixing transmits, estimate secret signal exactly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510309682.9A CN105007578B (en) | 2015-06-05 | 2015-06-05 | Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510309682.9A CN105007578B (en) | 2015-06-05 | 2015-06-05 | Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105007578A true CN105007578A (en) | 2015-10-28 |
CN105007578B CN105007578B (en) | 2019-02-05 |
Family
ID=54380057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510309682.9A Active CN105007578B (en) | 2015-06-05 | 2015-06-05 | Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105007578B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105847010A (en) * | 2016-03-18 | 2016-08-10 | 西安交通大学 | CSI deception prevention method in multi-user MIMO uplink transmission |
CN106131823A (en) * | 2016-06-06 | 2016-11-16 | 西安交通大学 | Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene |
CN106211301A (en) * | 2015-12-09 | 2016-12-07 | 厦门大学 | A kind of full duplex communication system realizes the method for safety of physical layer and power optimization |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN107026684A (en) * | 2017-03-31 | 2017-08-08 | 南京邮电大学 | A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise |
CN108494995A (en) * | 2018-04-10 | 2018-09-04 | ***联合参谋部第五十五研究所 | A kind of passive filter device |
CN109194378A (en) * | 2018-08-06 | 2019-01-11 | 重庆邮电大学 | Safety of physical layer beam form-endowing method based on linear neural network |
CN110071748A (en) * | 2019-04-30 | 2019-07-30 | 西安交通大学 | A kind of artifact power's distribution method of multiple illuminators and single receiver system |
CN110177350A (en) * | 2019-05-27 | 2019-08-27 | 清华大学 | Distributed anti-eavesdrop sparse signal detection method and device |
CN110278537A (en) * | 2019-07-11 | 2019-09-24 | 北京邮电大学 | A kind of incoherent transmission plan of safety for move vehicle system |
CN110880950A (en) * | 2019-11-13 | 2020-03-13 | 电子科技大学 | Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system |
WO2020151383A1 (en) * | 2019-01-25 | 2020-07-30 | 伍仁勇 | Multi-antenna two-dimensional vector transmission method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986545A (en) * | 2014-05-09 | 2014-08-13 | 西安交通大学 | Physical layer safety transmission method used for SIMO wireless communication system |
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
-
2015
- 2015-06-05 CN CN201510309682.9A patent/CN105007578B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986545A (en) * | 2014-05-09 | 2014-08-13 | 西安交通大学 | Physical layer safety transmission method used for SIMO wireless communication system |
CN104378757A (en) * | 2014-12-10 | 2015-02-25 | 山东大学 | Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network |
Non-Patent Citations (1)
Title |
---|
BIN YANG ET AL.: "Secret Wireless Communication with Public Feedback by Common Randomness", 《IEEE WIRELESS COMMUNICATIONS LETTERS》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106211301A (en) * | 2015-12-09 | 2016-12-07 | 厦门大学 | A kind of full duplex communication system realizes the method for safety of physical layer and power optimization |
CN106211301B (en) * | 2015-12-09 | 2019-10-25 | 厦门大学 | A kind of method that full duplex communication system realizes safety of physical layer and power optimization |
CN105847010A (en) * | 2016-03-18 | 2016-08-10 | 西安交通大学 | CSI deception prevention method in multi-user MIMO uplink transmission |
CN105847010B (en) * | 2016-03-18 | 2019-01-18 | 西安交通大学 | CSI in multiuser MIMO uplink cheats prevention method |
CN106131823B (en) * | 2016-06-06 | 2019-08-23 | 西安交通大学 | Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene |
CN106131823A (en) * | 2016-06-06 | 2016-11-16 | 西安交通大学 | Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN106685639B (en) * | 2016-12-15 | 2019-12-24 | 西安交通大学 | Sequence cipher encryption safe transmission method based on artificial noise addition in 5G communication system |
CN107026684A (en) * | 2017-03-31 | 2017-08-08 | 南京邮电大学 | A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise |
CN107026684B (en) * | 2017-03-31 | 2020-05-12 | 南京邮电大学 | Cognitive communication physical layer safety energy efficiency optimization method based on artificial noise |
CN108494995A (en) * | 2018-04-10 | 2018-09-04 | ***联合参谋部第五十五研究所 | A kind of passive filter device |
CN108494995B (en) * | 2018-04-10 | 2019-07-19 | ***联合参谋部第五十五研究所 | A kind of passive filter device |
CN109194378A (en) * | 2018-08-06 | 2019-01-11 | 重庆邮电大学 | Safety of physical layer beam form-endowing method based on linear neural network |
CN109194378B (en) * | 2018-08-06 | 2021-07-13 | 重庆邮电大学 | Physical layer safety wave beam shaping method based on linear neural network |
WO2020151383A1 (en) * | 2019-01-25 | 2020-07-30 | 伍仁勇 | Multi-antenna two-dimensional vector transmission method and system |
CN110071748A (en) * | 2019-04-30 | 2019-07-30 | 西安交通大学 | A kind of artifact power's distribution method of multiple illuminators and single receiver system |
CN110177350A (en) * | 2019-05-27 | 2019-08-27 | 清华大学 | Distributed anti-eavesdrop sparse signal detection method and device |
CN110177350B (en) * | 2019-05-27 | 2020-10-27 | 清华大学 | Distributed anti-eavesdrop sparse signal detection method and device |
CN110278537A (en) * | 2019-07-11 | 2019-09-24 | 北京邮电大学 | A kind of incoherent transmission plan of safety for move vehicle system |
CN110880950A (en) * | 2019-11-13 | 2020-03-13 | 电子科技大学 | Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system |
Also Published As
Publication number | Publication date |
---|---|
CN105007578B (en) | 2019-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105007578A (en) | Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system | |
Feng et al. | Beamforming design and power allocation for secure transmission with NOMA | |
Wang et al. | Artificial noise assisted secure transmission under training and feedback | |
Pan et al. | On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI | |
Nguyen et al. | A new design paradigm for secure full-duplex multiuser systems | |
Liu et al. | Secrecy wireless information and power transfer with MISO beamforming | |
CN102664669B (en) | Method for improving channel capacity of indoor distributed multi-input and multi-output system | |
CN107888270A (en) | Recognize the safe transmission method of physical layer in satellite ground UNE | |
Dhok et al. | Rate-splitting multiple access with STAR RIS over spatially-correlated channels | |
CN101515917A (en) | Multi-user wireless communication system based on both-way trunk and method thereof | |
CN106533516A (en) | Physical layer security transmission method for multi-antenna multi-relay cognitive wiretapping network | |
CN105657698B (en) | Safe transmission method based on cooperation interference in multicell network | |
CN105375956B (en) | Queue in safety of physical layer communication caches relay transmission method | |
Lam et al. | System-level analysis of SWIPT MIMO cellular networks | |
CN105933040A (en) | Secure transmission method adopting information source and relay-combined transmitting antenna selection | |
CN110048751A (en) | A kind of optimization method based on multicast frequency control battle array direction modulation | |
CN110519756A (en) | Physical layer safety transmission method of full duplex relay network | |
CN105744516A (en) | Communication system and method for improving security performance of physical layer by energy station | |
Yang et al. | Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise | |
CN107070520A (en) | A kind of D2D Communication Jamming alignment schemes based on cascade precoding and ESINR criterions | |
CN105007248B (en) | A kind of downlink precoding method of MIMO Full-duplex cellular systems | |
CN102394682B (en) | Multi-user multi-input and multi-output cooperative relay system information processing method | |
US10236958B2 (en) | Method for signal transmission to multiple user equipments utilizing reciprocity of wireless channel | |
Lin et al. | Security-reliability trade-off analysis of RIS-aided multiuser communications | |
CN103269242A (en) | Uplink collaboration relaying beam forming method based on convex optimization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |