CN105007578A - Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system - Google Patents

Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system Download PDF

Info

Publication number
CN105007578A
CN105007578A CN201510309682.9A CN201510309682A CN105007578A CN 105007578 A CN105007578 A CN 105007578A CN 201510309682 A CN201510309682 A CN 201510309682A CN 105007578 A CN105007578 A CN 105007578A
Authority
CN
China
Prior art keywords
signal
node
antenna
base
safe transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510309682.9A
Other languages
Chinese (zh)
Other versions
CN105007578B (en
Inventor
王文杰
刘超文
邓浩
吴飞龙
杨斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201510309682.9A priority Critical patent/CN105007578B/en
Publication of CN105007578A publication Critical patent/CN105007578A/en
Application granted granted Critical
Publication of CN105007578B publication Critical patent/CN105007578B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an uplink secure transmission method based on downlink auxiliary feedback in a 5G communication system. In the first stage, a multi-antenna base station end sends both artificial interference and artificial noise signals on a downlink by means of a wave beam formation technology; and a single-antenna user end receives an emission signal from the base station end, and scrambles the received signal to a to-be-sent secret signal so that a mixed emission signal is formed. In the second stage, the user terminal broadcasts the mixed emission signal; and the base station end receives the mixed emission signal. Since the base station end already knows an artificial interference signal emitted by the base station itself, an expected secret signal can be separated from the received signal. A single-antenna passive eavesdropping end receives mixed signals during both transmission stages, and cannot know any prior information about the artificial interference and artificial noise signals, so the possibility of stealing secret information is low. Therefore, the transmission security of a 5G uplink single-input and multi-output system is effectively guaranteed.

Description

Based on the up safe transmission method that downstream feedback is auxiliary in 5G communication system
Technical field
The present invention relates to a kind of safe transmission method of wireless communication system, particularly relate to a kind of safe transmission method for the up single input and multi-output of the 5G under TDD mode (SIMO) wireless communication system.
Background technology
Wireless communication technology, while offering convenience for the daily production of people, life, also inevitably because of the unboundedness of its physical transfer, brings the puzzlement that Content of Communication is easy to stolen to communicating pair.Along with the intensification day by day of wireless communication technology development degree and popularity, the safety problem of communication is also taken seriously further.Adopt which kind of means effectively take precautions against information leakage, guarantee that the safe transmission of information will become a long-term focus Journal of Sex Research problem.
As the key technology of a most prospect in 5G radio communication, extensive multiple-input and multiple-output (MassiveMultiple-Input Multiple-Output, Massive MIMO) technology has been subject to paying close attention to more and more widely from academia and industrial quarters.Under this technical background, 5G system base-station end is configured extensive antenna array, thus the transmission of the safety of physical layer of 5G downlink communication can obtain effective guarantee, and correlative study achievement also emerged in multitude in nearly 5 years.But the transmitting power limited due to user side and transmit antenna number, rare document can provide effective technological means to ensure the fail safe of 5G uplink.
Existing radio physical layer secure transmission technique roughly has cipher key technique and the large class of multi-antenna technology two.Cipher key technique aspect, in being entitled as in the document of " Feedback-basedcollaborative secrecy encoding over binary symmetric channels " that IEEE Transactions on Information Theory delivers in August, 2012, proposing a kind of system safety performance based on key feedback and strengthen strategy.Although this strategy make use of the key that destination feeds back to source, and effectively ensure that the fail safe that source secret signal is transmitted, the communication system of single antenna node composition can only be served, and only limited security performance can be brought to promote for system.In the large class of multi-antenna technology, the anti-eavesdrop technology that man made noise assists is again the branch of an outbalance.In being entitled as in the document of " Secure transmission with artificial noise over fading channels:Achievable rate andoptimal power allocation " that IEEE Transactions on Vehicular Technology delivers in October, 2010, propose a kind of system safety transmission policy injected based on man made noise's optimal power.Although this strategy is on the basis completing optimal power proportioning between secret signal and man made noise's signal, the maximization that can reach safe rate to system can be realized, but the SIMO wireless communication system be made up of single antenna source and multiple antennas destination can not be served.
Summary of the invention
The object of the invention is to for the up single input and multi-output of the 5G under TDD mode (SIMO) wireless communication system, up safe transmission method auxiliary based on downstream feedback in a kind of 5G communication system is proposed, 5G ascending communication system cannot be directly applied for solve existing radio physical layer secure transmission technique, or the problem of limited safe performance gain can only be brought.
For reaching above object, the present invention adopts following technical scheme to be achieved:
Based on the up safe transmission method that downstream feedback is auxiliary in 5G communication system, described 5G communication system includes a single-antenna subscriber node Alice, a M root antenna base station Node B ob, and a single antenna passive wiretapping node Eve; Comprise the following steps based on the up safe transmission method that downstream feedback is auxiliary in described 5G communication system:
Step 1, single-antenna subscriber node Alice sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob; Base-station node Bob utilizes pilot sequence information to estimate M dimensional vector channel information from single-antenna subscriber node Alice to base-station node Bob;
Step 2, base-station node Bob utilizes the small scale channel information h estimated aB, the M dimension feedback signal vector designing the safe transmission first stage is wherein β ∈ (0,1) is the power allocation factor between the Human disturbance feedback signal that presets and man made noise's feedback signal, P bfor the signal transmission power of base-station node Bob, represent the Wave beam forming weighted vector of downstream feedback link maximum ratio transmission, z is the random Gauss AI signal again that distribution meets zero mean unit variance, represent base-station node Bob to single-antenna subscriber node Alice small scale channel null space matrix and Ψ hΨ=I, for M-1 ties up random AN signal train vector, each random element of vector obeys average mutually to be independently 0 variance be 1 multiple Gaussian Profile;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve completes the reception to base-station node Bob feedback signal respectively: the signal that single-antenna subscriber node Alice received in the safe transmission first stage is wherein r represents the distance between single-antenna subscriber node Alice and eavesdropping node Eve, and α represents the path attenuation factor that wireless channel large scale declines, α>=2; n afor the reception noise at single-antenna subscriber node Alice place; Accordingly, eavesdropping node Eve at the signal that the safe transmission first stage receives is y E 1 = βP B r B E - α / 2 g E B T h A B * | | h A B | | z + ( 1 - β ) P B M - 1 r B E - α / 2 g E B T Ψ t + n E 1 , Wherein r bErepresent the distance between base-station node Bob to eavesdropping node Eve, multipath fading channel between representative eavesdropping node Eve to base-station node Bob, for eavesdropping the reception noise at node Eve place;
Step 4, in the second stage of safe transmission, single-antenna subscriber node Alice designs and broadcast singal a A = ηP A s + ( 1 - η ) P A βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 , Here η ∈ (0,1) represents the power allocation factor between secret signal s and normalization interference signal, P arepresent single-antenna subscriber node Alice end signal transmitting power, for random noise n avariance;
Step 5, base-station node Bob and eavesdropping node Eve completes the reception to single-antenna subscriber node Alice broadcast singal respectively: the vector mixed signal that base-station node Bob receives in safe transmission second stage is y B 2 = ηP A r - α / 2 h A B s ( 1 - η ) P A r - α / 2 h A B βP B r - α / 2 || h A B || z + n A βP B r - α || h A B || 2 + σ A 2 + n B , Wherein n brepresent the reception noise at base-station node Bob place; Correspondingly, the scalar mixing signal that eavesdropping node Eve receives in safe transmission second stage is y E 2 = ηP A r A E - α / 2 g A E s + ( 1 - η ) P A r A E - α / 2 g A E βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 + n E 2 , Wherein r aErepresent the distance between single-antenna subscriber node Alice and eavesdropping node Eve, represent the multipath fading channel between single-antenna subscriber node Alice and eavesdropping node Eve, for eavesdropping node Eve is at the reception noise of safe transmission second stage.
When proceeding to the transmit stage of next secret signal, automatically repeat the process in step 1 to step 5.
Based on the up safe transmission method that downstream feedback is auxiliary in 5G communication system, comprise the following steps:
First, in the first stage of safe transmission, multi-antenna base station end utilizes beam-forming technology to send Human disturbance and man made noise's signal on the uplink simultaneously;
Then, single-antenna subscriber end completes the reception transmitted to base station end, and transmits on the signal scrambling received to secret signal pending to form mixing;
Secondly, in the second stage of safe transmission, single-antenna subscriber end is broadcasted this mixing and is transmitted;
Finally, upstream multi-antenna communication base station end completes mixing the reception transmitted, and multi-antenna communication base station utilizes maximum likelihood detection method, from mixing transmits, estimate secret signal exactly.
Compared with safety of physical layer transmission plan existing in prior art, the invention has the advantages that:
1, the present invention is on safe transmission conceptual design, considers simultaneously and has used large scale and the multipath fading information of wireless channel.
2, on security information safe transmission ensures, the present invention has only used the feedback of destination random signal.Compared with existing safe transmission scheme feed back based on key, the present invention, without the need to carrying out necessary key agreement or pre-share operates between receiving-transmitting sides, reduces the resource consumption of system.
3, in the use of feedback signal, scheme designed by the present invention, only in the second stage of secret signal transmission, to the mixed signal including feedback random signal received in the first stage, carries out the energy normalized process of indifference.The present invention, while guarantee system safety performance, does not add other hardware and power loss.
4, the present invention has used the multiple antennas advantage of destination, and compared with the safe transmission scheme fed back based on single antenna destination key of routine, can effectively enhance system security energy.
5, on destination antenna array uses, the present invention's design employs Human disturbance Wave beam forming and man made noise injects this United Technologies, make use of the transmitting degree of freedom of destination fully.
6, two benches through-put power configuration aspect, the present invention is under the poorest safe transmission scene, to maximize the ergodic safe rate of system for target, complete respectively at Human disturbance signal and man made noise's signal, and the optimal power allocation operation between secret signal and normalization mixed signal.Compared with constant power batch operation, two benches optimal power allocation operation of the present invention effectively improves the security performance of system.
Under the present invention considers that wireless communication system is operated in time division duplex (Time Division Duplex, TDD) pattern, system has used the reciprocity of channel in the acquisition of channel information; In addition, in order to weigh between node, relative distance is on the impact of system safety performance, and large scale gain and the small scale gain of wireless fading channel have been taken into account in modeling analysis simultaneously.
In step 1 to 5 of the present invention, each fail safe taking turns Secret Information Transmission all needs the signals transmission in two stages to ensure.
In step 2 of the present invention, the effect of man made noise and Human disturbance is respectively: in the first stage of secret signal safe transmission, and man made noise's signal is used for protecting Human disturbance signal intactly not intercepted by Eve by Bob; In the second stage of safe transmission, do not comprise man made noise's signal due in the signal that Alice received in the first stage, Human disturbance signal is then used for weakening the eavesdropping capability of Eve to secret signal as much as possible by Alice.
Below in conjunction with the drawings and the specific embodiments, the present invention is described in further detail.
Accompanying drawing explanation
Based on the up two benches safe transmission method schematic diagram that downstream feedback is auxiliary in Fig. 1 5G wireless communication system designed by the present invention; Wherein Fig. 1 (A) first stage of transmitting for two benches, also i.e. feedback stage; The second stage that Fig. 1 (B) transmits for two benches is also the forward direction stage of Secret Information Transmission.Single-antenna subscriber A in figure represents single antenna source node Alice, and M antenna base station B represents that M (M >=3) root antenna expects that destination node Bob, single antenna listener-in E represent single antenna passive wiretapping node Eve.
To be that the system under different capacity allocation strategy is ergodic reach safe rate and the ergodic simulation curve comparison diagram reaching safe rate of the poorest safe transmission scene system to Fig. 2.
Fig. 3 is in the poorest safe transmission scene, and different capacity distributes the system safety outage probability simulation curve under setting, system safety outage probability high s/n ratio is similar to simulation curve, system safety outage probability high s/n ratio approximation theory curve comparison figure.
Embodiment
Below in conjunction with attached embodiment illustrated in fig. 1, the embodiment of scheme designed by the present invention is described in detail.
Based on the up safe transmission method that downstream feedback is auxiliary in a kind of 5G of the present invention communication system, comprise the following steps:
Step 1, before two benches transmission is opened, single-antenna subscriber node Alice (in figure single-antenna subscriber A) first sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob (in figure M antenna base station B).The pilot sequence information that base-station node Bob utilizes pre-share and the mixed information received, estimate the M dimensional vector channel information from Alice to Bob, and perform the preparation of feedback information transmitting;
Step 2, after completing the estimation to minor channel information (channel of Alice to Bob), base-station node Bob completes the transmission operation of feedback signal.Due to system works in TDD mode and communication channel become slowly, base-station node Bob is first according to the reciprocity of channel between Alice and Bob, and estimated small scale channel information h aB(being included in the M dimensional vector channel information that step 1 estimates), designing safe transmission first stage downstream feedback link maximum ratio transmission Wave beam forming weighted vector is secondly, designing the null space matrix calculating Bob to Alice channel is here Ψ meets Ψ simultaneously hΨ=I.Then, safe rate maximizing performance criterion is reached according to system is ergodic, computing draws in the safe transmission first stage, Human disturbance (Artificial Interference, AI) feedback signal and man made noise (Artificial Noise, AN) the power allocation factor β ∈ (0,1) between feedback signal is
β = - ( M - 2 ) ρ A + ( M - 1 ) ( M - 2 ) ρ A 2 + ( M - 1 ) ( M - 2 ) ρ A ρ B ρ A + ( M - 1 ) ρ B .
Wherein, ρ aand ρ bbe respectively the transmitting signal to noise ratio of node Alice and Bob.
Finally, base-station node Bob is according to available signal transmission power P b, design and launch M n dimensional vector n feedback signal wherein z is the random Gauss AI signal again that distribution meets zero mean unit variance, for M-1 ties up random AN signal phasor, and each random element of vector obeys the multiple Gaussian Profile that average is 0, variance is 1 mutually independently;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve (in figure single antenna listener-in E) complete the reception to safe transmission first stage base station end feedback signal respectively.Via the effect of corresponding slow change wireless channel, the signal that Alice received in the feedback signal transmission stage is
y A 1 = βP B r - α / 2 | | h A B | | z + n A ,
Wherein r represents the distance between Alice and Bob, and α (α>=2) represents wireless channel paths decay factor, n afor the reception noise at Alice place.Correspondingly, Eve at the signal that the safe transmission first stage receives is
y E 1 = βP B r B E - α / 2 g E B T h A B * | | h A B | | z + ( 1 - β ) P B M - 1 r B E - α / 2 g E B T Ψ t + n E 1 ,
Wherein r bErepresent the distance between Bob to Eve, represent the multipath fading channel vector between Eve to Bob, for the reception noise of Eve first stage in two benches eavesdropping process;
Step 4, Alice design also broadcast packet contains the mixed signal of secret signal (being contemplated for Bob to receive), to open the second stage of two benches safe transmission.In mixed-signal designs, first Alice to make the normalized on energy at the signal that the first stage receives to it.Secondly, reach safe rate maximizing performance criterion according to system is ergodic equally, the power allocation factor η ∈ (0,1) between design secret signal and normalized signal is,
η = B - B 2 - 4 ( M - 1 ) ( β ) 2 ( M - 2 ) ( 1 - β ) 2 ρ A 2 2 ( M - 1 ) ( β ) 2 ρ A
Here, B=((M-1) (β) 2+ (M-2) (1-β) 2) ρ a+ (M-1) (β) 2ρ b.Finally, single-antenna subscriber node Alice is according to self available signal transmission power P a, design and broadcast mixed signal
a A = ηP A s + ( 1 - η ) P A βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 ,
Wherein s represents secret signal, for random noise n avariance;
Step 5, secret signal expects that receiving terminal Bob and eavesdropping node Eve completes the reception of the mixed signal to Alice broadcast respectively.Through the impact of respective wireless fading channel, the vector signal that Bob receives in safe transmission second stage is
y B 2 = ηP A r - α / 2 h A B s ( 1 - η ) P A r - α / 2 h A B βP B r - α / 2 || h A B || z + n A βP B r - α || h A B || 2 + σ A 2 + n B ,
Wherein n brepresent the reception noise at Bob place.Further, due to known self send out AI signal z, Bob eliminates z and also makes maximum-ratio combing to above-mentioned vector signal and receive operation, obtains Received signal strength
y B = ηP A r - α / 2 | | h A B | | s + ( 1 - η ) P A r - α / 2 | | h A B | | n A βP B r - α || h A B || 2 + σ A 2 + h A B H | | h A B | | + n B .
Correspondingly, the signal that Eve receives in safe transmission second stage is
y E 2 = ηP A r A E - α / 2 g A E s + ( 1 - η ) P A r A E - α / 2 g A E βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 + n E 2 ,
Wherein r aErepresent the distance between Alice and Eve, represent the multipath fading channel between Alice and Eve, for the reception noise of the second stage that Eve eavesdrops at two benches;
Step 6, when proceeding to the transmit stage of next secret signal, system repeats the two benches secure transfer process in above-mentioned steps 1 to step 5 automatically.
In above-mentioned steps 5, Bob utilizes maximum likelihood detection method, can from y bin estimate secret signal s exactly.And on the other hand, because Eve cannot know any prior information about scalar AI signal and vector AN signal, thus cannot from two benches Received signal strength with obtain about the accurate estimation of secret signal s, thus the effective guarantee fail safe of secret signal transmission.
To set M=4, Fig. 2 and Fig. 3 respectively depict ergodic under the input of multiple gaussian signal and different parameters and scene suppose of system and reaches safe rate and security interrupt probability performance curve, further from the angle of system safety performance emulation, illustrate the present invention quantitatively and ensureing the effect in 5G up single input and multi-output (SIMO) system wireless safe transmission.
To be that the system under different capacity allocation strategy is ergodic reach safe rate and the ergodic simulation curve comparison diagram reaching safe rate of the poorest safe transmission scene system to Fig. 2.In figure and aR sergodic under optimal power allocation and constant power distribute of representative system reaches safe rate respectively; with represent in the poorest safe transmission scene respectively, ergodic under optimal power allocation of system reaches safe rate, ergodic under constant power distributes reach the high s/n ratio approximation of safe rate and constant power distribute under ergodicly reach safe rate; ρ aand ρ bbe respectively the transmitting signal to noise ratio of node Alice and Bob.
Fig. 3 is in the poorest safe transmission scene, and different capacity distributes the system safety outage probability simulation curve under setting, system safety outage probability high s/n ratio is similar to simulation curve, system safety outage probability high s/n ratio approximation theory curve comparison figure.In figure represent in the poorest safe transmission scene respectively, the system safety outage probability under given power division, the system safety outage probability high s/n ratio under given power division be similar to, system safety outage probability under optimal power allocation; represent the targeted security speed preset.

Claims (6)

1. in a 5G communication system based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, described 5G communication system includes a single-antenna subscriber node Alice, a M root antenna base station Node B ob, and a single antenna passive wiretapping node Eve; Comprise the following steps based on the up safe transmission method that downstream feedback is auxiliary in described 5G communication system:
Step 1, single-antenna subscriber node Alice sends the mixed information including feedback signal transmission requests information and pilot sequence information to base-station node Bob; Base-station node Bob utilizes pilot sequence information to estimate M dimensional vector channel information from single-antenna subscriber node Alice to base-station node Bob;
Step 2, base-station node Bob utilizes the small scale channel information h estimated aB, the M dimension feedback signal vector designing the safe transmission first stage is wherein β ∈ (0,1) is the power allocation factor between the Human disturbance feedback signal that presets and man made noise's feedback signal, P bfor the signal transmission power of base-station node Bob, represent the Wave beam forming weighted vector of downstream feedback link maximum ratio transmission, z is the random Gauss AI signal again that distribution meets zero mean unit variance, represent base-station node Bob to single-antenna subscriber node Alice small scale channel null space matrix and Ψ hΨ=I, for M-1 ties up random AN signal train vector, each random element of vector obeys average mutually to be independently 0 variance be 1 multiple Gaussian Profile;
Step 3, single-antenna subscriber node Alice and eavesdropping node Eve completes the reception to base-station node Bob feedback signal respectively: the signal that single-antenna subscriber node Alice received in the safe transmission first stage is wherein r represents the distance between single-antenna subscriber node Alice and eavesdropping node Eve, and α represents the path attenuation factor that wireless channel large scale declines, α>=2; n afor the reception noise at single-antenna subscriber node Alice place; Accordingly, eavesdropping node Eve at the signal that the safe transmission first stage receives is y E 1 = βP B r B E - α / 2 g E B T h A B * | | h A B | | z + ( 1 - β ) P B M - 1 r B E - α / 2 g E B T Ψ t + n E 1 , Wherein r bErepresent the distance between base-station node Bob to eavesdropping node Eve, multipath fading channel between representative eavesdropping node Eve to base-station node Bob, for eavesdropping the reception noise at node Eve place;
Step 4, in the second stage of safe transmission, single-antenna subscriber node Alice designs and broadcast singal
a A = ηP A s + ( 1 - η ) P A βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 , Here η ∈ (0,1) represents the power allocation factor between secret signal s and normalization interference signal, P arepresent single-antenna subscriber node Alice end signal transmitting power, for random noise n avariance;
Step 5, base-station node Bob and eavesdropping node Eve completes the reception to single-antenna subscriber node Alice broadcast singal respectively: the vector mixed signal that base-station node Bob receives in safe transmission second stage is
y B 2 = ηP A r - α / 2 h A B s + ( 1 - η ) P A r - α / 2 h A B βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 + n B , Wherein n brepresent the reception noise at base-station node Bob place; Correspondingly, the scalar mixing signal that eavesdropping node Eve receives in safe transmission second stage is
y E 2 = ηP A r A E - α / 2 g A E s + ( 1 - η ) P A r A E - α / 2 g A E βP B r - α / 2 | | h A B | | z + n A βP B r - α | | h A B | | 2 + σ A 2 + n E 2 , Wherein r aErepresent the distance between single-antenna subscriber node Alice and eavesdropping node Eve, represent the multipath fading channel between single-antenna subscriber node Alice and eavesdropping node Eve, for eavesdropping node Eve is at the reception noise of safe transmission second stage.
2. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, when proceeding to the transmit stage of next secret signal, automatically repeating the process in step 1 to step 5.
3. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, M >=3.
4. in a kind of 5G communication system according to claim 1 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, in step 5, base-station node Bob utilizes maximum likelihood detection method, from y bin estimate secret signal s exactly.
5. in 5G communication system based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, comprise the following steps:
First, in the first stage of safe transmission, multi-antenna base station end utilizes beam-forming technology to send Human disturbance and man made noise's signal on the uplink simultaneously;
Then, single-antenna subscriber end completes the reception transmitted to base station end, and transmits on the signal scrambling received to secret signal pending to form mixing;
Secondly, in the second stage of safe transmission, single-antenna subscriber end is broadcasted this mixing and is transmitted;
Finally, upstream multi-antenna communication base station end completes mixing the reception transmitted.
6. in a kind of 5G communication system according to claim 5 based on the up safe transmission method that downstream feedback is auxiliary, it is characterized in that, multi-antenna communication base station utilizes maximum likelihood detection method, from mixing transmits, estimate secret signal exactly.
CN201510309682.9A 2015-06-05 2015-06-05 Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system Active CN105007578B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510309682.9A CN105007578B (en) 2015-06-05 2015-06-05 Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510309682.9A CN105007578B (en) 2015-06-05 2015-06-05 Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system

Publications (2)

Publication Number Publication Date
CN105007578A true CN105007578A (en) 2015-10-28
CN105007578B CN105007578B (en) 2019-02-05

Family

ID=54380057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510309682.9A Active CN105007578B (en) 2015-06-05 2015-06-05 Uplink safe transmission method based on downstream feedback auxiliary in 5G communication system

Country Status (1)

Country Link
CN (1) CN105007578B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847010A (en) * 2016-03-18 2016-08-10 西安交通大学 CSI deception prevention method in multi-user MIMO uplink transmission
CN106131823A (en) * 2016-06-06 2016-11-16 西安交通大学 Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene
CN106211301A (en) * 2015-12-09 2016-12-07 厦门大学 A kind of full duplex communication system realizes the method for safety of physical layer and power optimization
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN107026684A (en) * 2017-03-31 2017-08-08 南京邮电大学 A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise
CN108494995A (en) * 2018-04-10 2018-09-04 ***联合参谋部第五十五研究所 A kind of passive filter device
CN109194378A (en) * 2018-08-06 2019-01-11 重庆邮电大学 Safety of physical layer beam form-endowing method based on linear neural network
CN110071748A (en) * 2019-04-30 2019-07-30 西安交通大学 A kind of artifact power's distribution method of multiple illuminators and single receiver system
CN110177350A (en) * 2019-05-27 2019-08-27 清华大学 Distributed anti-eavesdrop sparse signal detection method and device
CN110278537A (en) * 2019-07-11 2019-09-24 北京邮电大学 A kind of incoherent transmission plan of safety for move vehicle system
CN110880950A (en) * 2019-11-13 2020-03-13 电子科技大学 Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system
WO2020151383A1 (en) * 2019-01-25 2020-07-30 伍仁勇 Multi-antenna two-dimensional vector transmission method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103986545A (en) * 2014-05-09 2014-08-13 西安交通大学 Physical layer safety transmission method used for SIMO wireless communication system
CN104378757A (en) * 2014-12-10 2015-02-25 山东大学 Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103986545A (en) * 2014-05-09 2014-08-13 西安交通大学 Physical layer safety transmission method used for SIMO wireless communication system
CN104378757A (en) * 2014-12-10 2015-02-25 山东大学 Method for guaranteeing physical layer security in multi-relay multi-interference wiretapping network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BIN YANG ET AL.: "Secret Wireless Communication with Public Feedback by Common Randomness", 《IEEE WIRELESS COMMUNICATIONS LETTERS》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106211301A (en) * 2015-12-09 2016-12-07 厦门大学 A kind of full duplex communication system realizes the method for safety of physical layer and power optimization
CN106211301B (en) * 2015-12-09 2019-10-25 厦门大学 A kind of method that full duplex communication system realizes safety of physical layer and power optimization
CN105847010A (en) * 2016-03-18 2016-08-10 西安交通大学 CSI deception prevention method in multi-user MIMO uplink transmission
CN105847010B (en) * 2016-03-18 2019-01-18 西安交通大学 CSI in multiuser MIMO uplink cheats prevention method
CN106131823B (en) * 2016-06-06 2019-08-23 西安交通大学 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene
CN106131823A (en) * 2016-06-06 2016-11-16 西安交通大学 Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN106685639B (en) * 2016-12-15 2019-12-24 西安交通大学 Sequence cipher encryption safe transmission method based on artificial noise addition in 5G communication system
CN107026684A (en) * 2017-03-31 2017-08-08 南京邮电大学 A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise
CN107026684B (en) * 2017-03-31 2020-05-12 南京邮电大学 Cognitive communication physical layer safety energy efficiency optimization method based on artificial noise
CN108494995A (en) * 2018-04-10 2018-09-04 ***联合参谋部第五十五研究所 A kind of passive filter device
CN108494995B (en) * 2018-04-10 2019-07-19 ***联合参谋部第五十五研究所 A kind of passive filter device
CN109194378A (en) * 2018-08-06 2019-01-11 重庆邮电大学 Safety of physical layer beam form-endowing method based on linear neural network
CN109194378B (en) * 2018-08-06 2021-07-13 重庆邮电大学 Physical layer safety wave beam shaping method based on linear neural network
WO2020151383A1 (en) * 2019-01-25 2020-07-30 伍仁勇 Multi-antenna two-dimensional vector transmission method and system
CN110071748A (en) * 2019-04-30 2019-07-30 西安交通大学 A kind of artifact power's distribution method of multiple illuminators and single receiver system
CN110177350A (en) * 2019-05-27 2019-08-27 清华大学 Distributed anti-eavesdrop sparse signal detection method and device
CN110177350B (en) * 2019-05-27 2020-10-27 清华大学 Distributed anti-eavesdrop sparse signal detection method and device
CN110278537A (en) * 2019-07-11 2019-09-24 北京邮电大学 A kind of incoherent transmission plan of safety for move vehicle system
CN110880950A (en) * 2019-11-13 2020-03-13 电子科技大学 Safe transmission method for artificial noise auxiliary vector disturbance precoding in MIMO system

Also Published As

Publication number Publication date
CN105007578B (en) 2019-02-05

Similar Documents

Publication Publication Date Title
CN105007578A (en) Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system
Feng et al. Beamforming design and power allocation for secure transmission with NOMA
Wang et al. Artificial noise assisted secure transmission under training and feedback
Pan et al. On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI
Nguyen et al. A new design paradigm for secure full-duplex multiuser systems
Liu et al. Secrecy wireless information and power transfer with MISO beamforming
CN102664669B (en) Method for improving channel capacity of indoor distributed multi-input and multi-output system
CN107888270A (en) Recognize the safe transmission method of physical layer in satellite ground UNE
Dhok et al. Rate-splitting multiple access with STAR RIS over spatially-correlated channels
CN101515917A (en) Multi-user wireless communication system based on both-way trunk and method thereof
CN106533516A (en) Physical layer security transmission method for multi-antenna multi-relay cognitive wiretapping network
CN105657698B (en) Safe transmission method based on cooperation interference in multicell network
CN105375956B (en) Queue in safety of physical layer communication caches relay transmission method
Lam et al. System-level analysis of SWIPT MIMO cellular networks
CN105933040A (en) Secure transmission method adopting information source and relay-combined transmitting antenna selection
CN110048751A (en) A kind of optimization method based on multicast frequency control battle array direction modulation
CN110519756A (en) Physical layer safety transmission method of full duplex relay network
CN105744516A (en) Communication system and method for improving security performance of physical layer by energy station
Yang et al. Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise
CN107070520A (en) A kind of D2D Communication Jamming alignment schemes based on cascade precoding and ESINR criterions
CN105007248B (en) A kind of downlink precoding method of MIMO Full-duplex cellular systems
CN102394682B (en) Multi-user multi-input and multi-output cooperative relay system information processing method
US10236958B2 (en) Method for signal transmission to multiple user equipments utilizing reciprocity of wireless channel
Lin et al. Security-reliability trade-off analysis of RIS-aided multiuser communications
CN103269242A (en) Uplink collaboration relaying beam forming method based on convex optimization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant