CN105915472A - Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition - Google Patents

Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition Download PDF

Info

Publication number
CN105915472A
CN105915472A CN201610345036.2A CN201610345036A CN105915472A CN 105915472 A CN105915472 A CN 105915472A CN 201610345036 A CN201610345036 A CN 201610345036A CN 105915472 A CN105915472 A CN 105915472A
Authority
CN
China
Prior art keywords
channel
phi
signal
estimation
gamma
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610345036.2A
Other languages
Chinese (zh)
Other versions
CN105915472B (en
Inventor
章露萍
文红
张金玲
潘绯
廖润发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610345036.2A priority Critical patent/CN105915472B/en
Publication of CN105915472A publication Critical patent/CN105915472A/en
Application granted granted Critical
Publication of CN105915472B publication Critical patent/CN105915472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/02Resource partitioning among network components, e.g. reuse partitioning
    • H04W16/10Dynamic resource partitioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0204Channel estimation of multiple channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03178Arrangements involving sequence estimation techniques
    • H04L25/03248Arrangements for operating in conjunction with other apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an artificial noise-based cooperative network power allocation method for a main channel and a cooperative channel under a non ideal channel estimation condition. After a transmitting end uses legal communication main channel information obtained in a non ideal channel estimation method, a transmitting signal is designed, power allocation between a useful signal and an artificial noise signal is carried out, on the basis of ensuring the security performance, and useful secrecy messages are transmitted to a legal receiver as much as possible. In addition, in order to improve the security of the secrecy messages, a cooperative jammer (CJ) is added, the CJ uses cooperative channel information obtained in the non ideal channel estimation method to design a transmitting signal to jam an eavesdropping node Eva. Under the condition of only knowing the statistical channel information of an eavesdropping channel at the transmitting end, the system security transmission rate is maximized through optimizing power allocation for the transmitting signal at the transmitting end, and the most effective security transmission of the secrecy messages in the cooperative network is realized.

Description

Main channel and association based on man made noise under the conditions of the channel imperfect channel estimation that cooperates Make power distribution method in network
Technical field
The invention belongs to information technology security fields, particularly relate to a kind of main channel and the channel imperfect channel estimation that cooperates Under the conditions of power distribution method in collaborative network based on man made noise.
Background technology
Along with the development of wireless communication technology, information security technology based on physical layer resources has become radio communication and letter The study hotspot in two fields of breath safety.The multiformity of wireless communication system physical layer resource is the research of safety of physical layer technology Provide wide space, also leave many problem demanding prompt solutions.Over nearly 10 years, the physical-layer techniques in radio communication is fluffy The exhibition of breaking out, new technique emerges in an endless stream, and therefore, develops uniqueness and the confidentiality of physical layer resources the most fully, and physical layer is pacified The research of full technology has carried out deep exploration to it.
Currently, the basic research thinking of safety of physical layer technology has both direction.One, with under various tapping channel models Secrecy capacity analyze based on, main thought is if main channel is than the better reliability of tapping channel, it is possible to guarantee Reliable communication on one constant bit rate.This type of study in frequently with system performance index be secrecy capacity (Secrecy And secrecy interruption rate (Secrecy outage probability) Capacity). its two, in conjunction with traditional encryption thought, profit Produce, manage and distribute key by the feature of wireless channel, thus improve the safety of key management.This class research is to pass System information security technology research extension on a physical layer.
Cooperation interference (Cooperative jamming, CJ) technology is based on above-mentioned first research direction, in physical layer The branch that safe practice occurs after rising, its basic thought is by sending artificial noise and interference signal so that it is right The infringement of eavesdropping node is more than the impact on legitimate receiver, thus reaches to promote the purpose of security of system (as promoted secrecy Capacity or the interruption rate of eavesdropping node).The secrecy capacity of Gauss tapping channel is expressed as source node (Alice) destination node (Bob) mutual information eavesdrops the difference of the mutual information of node (Eve) with source node (Alice).Therefore, eavesdropping node is reduced Receptivity be also a kind of method promoting security of system.Such as " Outage Constrained Secrecy Rate Maximization Using Artificial-Noise Aided Beamforming and Cooperative Jamming " have studied on the basis of tapping channel model, introduce the 4th node and i.e. cooperate the model of interfering nodes, this joint Point is by sending artificial interference, and simultaneously in transmitting terminal transmitting portion man-made noise, reduces the reception Signal to Interference plus Noise Ratio of listener-in, Thus reach to promote the purpose of security of system in physical layer.But, current safe transmission design is based primarily upon and can obtain The hypothesis of the perfect channel estimation of channel condition information.But in actual application, this hypothesis is the most unreasonable.
It is all the situation of imperfect channel estimation for main channel and cooperation channel, estimates channel and the actual channel obtained Certainly existing error, therefore man made noise's vector sum of the emission source channel condition information design to estimate cooperates jammer to estimate The interference signal of the channel condition information design of meter is inevitable all can be impacted legitimate receiver, reduces the letter of legitimate receiver Dry ratio of making an uproar.Therefore, considering that main channel and cooperation channel study useful signal and people in the case of being all imperfect channel estimation Between work noise signal, reasonable power divides pair system physical security can have important impact.
Summary of the invention
It is an object of the invention to overcome the deficiencies in the prior art, it is provided that a kind of main channel and the channel non-ideal communication channel that cooperates Power distribution method in collaborative network based on man made noise under the conditions of estimation, sends interference letter by adding cooperation interference unit machine Number setting up cooperation relation, emission source and cooperation jammer utilizes imperfect channel estimation method to estimate the channel condition information obtained Signal, the safe transmission speed that system reaches after the channel that there is estimation difference are launched in design, and the safety calculating system passes Defeated speed;Calculating emission source again by optimizing the optimal power allocation obtained under the conditions of perfect channel estimation than design transmitting signal is The safe transmission speed of this system, and by its with perfect channel estimation under the conditions of security of system speed compare, checking considers The importance of channel estimation errors, proposes more reliable, actual power allocation scheme.
It is an object of the invention to be achieved through the following technical solutions: main channel and the channel imperfect channel estimation that cooperates Under the conditions of power distribution method in collaborative network based on man made noise, it comprises the following steps:
S1: legitimate receipt end sends pilot frequency sequence, described pilot frequency sequence to emission source transmitting terminal and cooperation jammer simultaneously Actual channel through transmitting terminal to legitimate receipt endSimultaneously through the actual channel of cooperation jammer to legitimate receipt end
S2: transmitting terminal and cooperation jammer receive pilot frequency sequence respectively and do imperfect channel estimation and obtain hb、hbc, the most in fact Error is there is in border channel with estimation channel,NoteWhereinRepresent the covariance matrix of random vector;
S3: transmitting terminal and cooperation jammer are utilized respectively estimation channel matrix hb、hbcDesign respective transmitting signal s, sc
Signal launched by S4: transmitting terminal and cooperation jammer simultaneously, and legitimate receipt end receives from actual channel's s、sc, eavesdropping end is eavesdropped from tapping channel he、hecS, sc
The termination collection of letters number of S5: legitimate receipt is ybAnd calculate Signal to Interference plus Noise Ratio, it is expressed as γb(φ), according to launching setting of signal Meter principle understandsSimplified expression, the reception signal of legitimate receipt end is expressed as
y b = ( b b ′ ) H s + ( h b c ′ ) H s c + n b = ( h b - δ b ) H s + h b c H s c + n b = h b H s - δ b H s + h b c H s c + n b = h b H s - δ b H s + n b
Wherein, nb,ne~CN (0,1) represents noise respectively on legal receiving terminal and the impact of eavesdropping end;Transmitting terminal launches letter Man made noise's signal section reply legitimate receipt end in number s does not has any impact, therefore meets:
s = P a φ v x + P a ( 1 - φ ) N a - 1 N v n
Wherein, PaRepresent the transmit power constraint of transmitting terminal;φ ∈ [0,1] represents PaPower-division ratios;X~CN (0,1) WithRepresent data signal and the Gaussian noise vector of Gauss code book respectively, and be separate;Equation The right Section 1 represents the axial signal of information, whereinSection 2 represents man made noise's vector, whereinColumn vector constituteThe orthonormal basis of kernel;
Jammer end launches signal scReply legitimate receiver does not has any impact, i.e. yetSo scIt is expressed as
s c = P c N c - 1 W z
Wherein PcRepresent the transmit power constraint of CJ;The column vector of W definesThe orthonormal basis of kernel;Represent a Gaussian noise vector;
The letter of legitimate receipt end is dried and can be expressed as than SINR
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 | δ b H N v b | 2 + P c N c - 1 | | δ b c H W b c | | 2
KnownAndColumn vector constituteZero empty Between orthonormal basis, WbcColumn vector defineThe orthonormal basis of kernel, thus obtain Therefore:
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 = γ c ( φ ) φ
γ c ( φ ) = P a | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2
Only know that due to system the statistical information of tapping channel, the reception signal of eavesdropping end and Signal to Interference plus Noise Ratio are still preferable letter Result under the conditions of road estimation, is respectively as follows:
y e = h e H s + h e c H s c + n e ;
γ e ( φ ) = P a φ | | h e H v | | 2 1 + P a ( 1 - φ ) N a - 1 | h e H N v | 2 + P c N c - 1 | | h e c H W | | 2 ;
Security interrupt maximum capacity to be realized, this optimization problem can be equivalent to a power distribution problems, describes such as Under:
max 0 ≤ φ ≤ 1 R s = log 2 ( 1 + γ φ 1 + μ ) s . t . Pr ( γ e ( φ ) > μ ) = ϵ , 0 ≤ R s ≤ C b .
Wherein γ=Pa||hb||2, RsRepresenting safe transmission speed, ε represents security interrupt probability constraints, Cb=log2(1+ γb(φ) channel capacity of main channel) is represented,Represent the threshold value relevant with outage probability;
Solving security interrupt probability constraints is:
l n ( 1 ϵ ) = ω P a + l n [ 1 + ( 1 - φ ) ω ] + 3 l n ( 1 + ω d )
WhereinWithFound out that ω is an implicit function about φ by above formula, and obviously ω (φ) > 0, then the formula of power distribution problems means that into:
R s = log 2 ( 1 + φγ c ( φ ) 1 + φ ω ( φ ) ) ;
S6: calculate optimum allocation when maximum safe transmission speed under the conditions of perfect channel estimation, i.e. use numerical analysis side Method solution formulaOptimal power allocation during optimization is than φ * and maximum safe transmission speed Rs *
S7: Optimal Ratio φ * under the conditions of perfect channel estimation is substituted into last formula in step S4 and obtains Rs'= Rs(φ *), observes and press the transmitting signal process and modelled signal that optimal power allocation designs than φ * under the conditions of perfect channel estimation Safe transmission speed R that when channel information used exists the channel of estimation difference, system can reachs';
Under the conditions of the estimation of S8: more satisfactory channel, optimal power allocation is than system energy after the channel that there is estimation difference Safe transmission speed R reacheds' with maximum safe transmission speed R that ideally can reachs *, it was therefore concluded that.
The invention has the beneficial effects as follows: the invention provides a kind of main channel and the channel imperfect channel estimation condition that cooperates Under power distribution method in collaborative network based on man made noise, emission source and cooperation jammer have all taken into full account channel estimation There is the situation of estimation difference, emission source and cooperation jammer utilizes imperfect channel estimation method to estimate the channel status obtained Information design launches signal, takes into full account estimation difference during design, weakens interference signal and emission source that cooperation jammer is launched Launch the interference to legitimate receiver of the man made noise's vector in signal, reduce the Signal to Interference plus Noise Ratio that listener-in receives, thus improve The security performance of system.
Accompanying drawing explanation
Fig. 1 is the mode under the conditions of perfect channel estimation in collaborative network.
Fig. 2 is that in collaborative network, between Alice and CJ to Bob, channel all exists the mode of estimation difference.
Fig. 3 is the safety speed that between Alice and CJ to Bob, channel all exists error estimation and complete perfect channel estimation model The comparison of rate.
Detailed description of the invention
Technical scheme is described in further detail below in conjunction with the accompanying drawings:
Main channel and transmitting power in collaborative network based on man made noise under the conditions of the channel imperfect channel estimation that cooperates Distribution method, as shown in Figure 1, it is assumed that emission source Alice, to legitimate receiver Bob transmission security message, exists one in system This message is eavesdropped by passive eavesdropping node Eve, and another node CJ launches signal to eavesdropping joint as cooperation jammer Point Eve interferes.Emission source Alice launch be combined with imperfect channel estimation obtain legitimate correspondence channel (Alice with Communication channel between Bob, also known as main channel) information divides carrying out optimal power between useful signal and man made noise's AN signal Joining signal, wherein man made noise disturbs Eve thus reduces the signal to noise ratio that Eve end receives, and as much as possible to legitimate receiver Bob sends useful private message, and CJ combines cooperation channel (channel between CJ and the Bob) information of imperfect channel estimation simultaneously Design interference signal, with all strength interference Eve and on Bob without impact, make security of system transfer rate reach maximum, it is achieved that wireless network The maximally effective safe transmission of private message in network.
Hypothesized model is multiple input single output model, and Alice is furnished with NaRoot antenna, CJ is furnished with NcRoot antenna number, andWith Eve is only furnished with single antenna, if main channel is usedRepresenting, cooperation channel is usedRepresent;Assume that Alice and CJ is only Knowing the statistical information of tapping channel, wherein the tapping channel of Alice and CJ to Eve is expressed asWherein heAnd hecSeparate and all obedience zero-mean Cyclic Symmetries answer Gauss distribution;When Alice wants When Bob sends a data stream, in order to stop Eve to intercept useful information, transmission signal power is distributed to useful by Alice Signal and man made noise's signal, CJ launches interference signal simultaneously.
First, it is considered to the when maximum safe transmission speed of the optimal power allocation under the conditions of perfect channel estimation.Alice pair Main channel is done perfect channel estimation and is obtained estimating channel information hb, and design transmitting signal beCooperation channel is done by CJ Perfect channel estimation obtains estimating channel information hbcAnd design transmitting signal beThe reception signal of Bob and Eve is respectively It is expressed as
y b = h b H s + h b c H s c + n b - - - ( 1 )
y e = h e H s + h e c H s c + n e - - - ( 2 )
Wherein, nb,ne~CN (0,1) represents the interchannel noise in the signal that Bob and Eve receives respectively.Alice design Launch the man made noise's signal section in signal s and Bob do not had any impact, therefore meet:
s = P a φ v x + P a ( 1 - φ ) N a - 1 N v n - - - ( 3 )
Wherein, PaRepresent the transmit power constraint of transmitting terminal Alice;φ ∈ [0,1] represents PaPower-division ratios;X~CN (0,1) andRepresent data signal and the Gaussian noise vector of separate Gauss code book respectively.Equation is right Limit Section 1 represents the axial signal of information, i.e. the useful information that Alice sends to Bob, whereinOn the right of equation Binomial represents man made noise's vector, whereinColumn vector constituteThe orthonormal basis of kernel.
The transmitting signal s of CJ end designcReply Bob does not results in interference, i.e. yetSo scIt is expressed as
s c = P c N c - 1 W z - - - ( 4 )
Wherein PcRepresent the transmit power constraint of CJ;The column vector of W definesThe orthonormal basis of kernel;Represent a Gaussian noise vector.
Under conditions of perfect channel estimation, the letter of Bob and Eve is dried ratio and can be expressed as
γb(φ)=Paφ||hb||2 (5)
γ e ( φ ) = P a φ | | h e H v | | 2 1 + P a ( 1 - φ ) N a - 1 | h e H N v | 2 + P c N c - 1 | | h e c H W | | 2 - - - ( 6 )
Security interrupt maximum capacity to be realized, this optimization problem can be equivalent to a power distribution problems, describes such as Under:
max 0 ≤ φ ≤ 1 R s = log 2 ( 1 + γ φ 1 + μ ) s . t . Pr ( γ e ( φ ) > μ ) = ϵ , 0 ≤ R s ≤ C b . - - - ( 7 )
Wherein γ=Pa||hb||2, RsRepresenting safe transmission speed, ε represents security interrupt probability constraints, Cb=log2(1+ γb(φ) channel capacity of main channel) is represented,Represent the threshold value relevant with outage probability.
Solving security interrupt probability constraints is
l n ( 1 ϵ ) = ω P a + l n [ 1 + ( 1 - φ ) ω ] + 3 l n ( 1 + ω d ) - - - ( 8 )
WhereinWithBe can be seen that ω is an implicit function about φ by formula (8), and aobvious So ω (φ) > 0.Then formula (7) just can be expressed as
R s ( φ ) = log 2 ( 1 + φ γ 1 + φ ω ( φ ) ) - - - ( 9 )
Owing to ω (φ) can not be expressed as closed form, we will divide with the optimal power of numerical analysis method solution formula (9) Proportioning φ * and maximum safe transmission speed Rs *
The present invention comprises the steps:
S1: legitimate receiver Bob simultaneously sends pilot frequency sequence to emission source Alice and CJ, pilot frequency sequence respectively through The actual main channel of Alice to BobActual cooperation channel with CJ to Bob
S2:Alice and CJ receives pilot frequency sequence respectively and does imperfect channel estimation and obtain hb、hbc, i.e. actual channel with Estimate that channel exists error,NoteWherein Represent the covariance matrix of random vector.
S3:Alice and CJ is utilized respectively estimation channel matrix hb、hbcDesign respective transmitting signal s, sc
S4:Alice and CJ launches signal simultaneously, and Bob receives from actual channelS, sc, Eve eavesdropping from Tapping channel he、hecS, sc
S5:Bob receives message yb, calculate Signal to Interference plus Noise Ratio SINR, be expressed as γb(φ), former according to the design launching signal Then understandSimplified expression, Bob receives signal and is expressed as
y b = h ~ b H s + h ~ b c H s c + n b = ( h b + δ b ) H s + ( h b c + δ b c ) H s c + n b = h b H s + δ b H s + h b c H s c + δ b c H s c + n b = h b H s + δ b H s + δ b c H s c + n b - - - ( 10 )
The letter of Bob is dried and is expressed as than SINR
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 | δ b H N v b | 2 + P c N c - 1 | | δ b c H W b c | | 2 - - - ( 11 )
KnownAndColumn vector constituteZero empty Between orthonormal basis, WbcColumn vector defineThe orthonormal basis of kernel, thus obtain Therefore
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 = γ c ( φ ) φ - - - ( 12 )
γ c ( φ ) = P a | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 - - - ( 13 )
Due to, this system only knows the statistical information of tapping channel, the tapped signal of Eve still with perfect channel estimation condition Under the method for expressing of tapped signal the same, be still formula (2), therefore the SINR of Eve is the most constant, is expressed as formula (6).Safety Outage probability constraint is only the most relevant to tapping channel, therefore security interrupt constraints is constant, then under security interrupt probability constraints be System safe rate is represented by about the relation of the power-division ratios launching signal
R s = log 2 ( 1 + φγ c ( φ ) 1 + φ ω ( φ ) ) - - - ( 14 )
S6: calculate optimum allocation when maximum safe transmission speed under the conditions of perfect channel estimation, i.e. use numerical analysis side Optimal power allocation during method solution formula (9) optimization is than φ * and maximum safe transmission speed Rs *
S7: Optimal Ratio φ * under the conditions of perfect channel estimation is substituted into formula (14) and obtains Rs'=Rs(φ *), permissible Observe optimal power allocation under the conditions of pressing perfect channel estimation and launch signal through the letter used with modelled signal than what φ * designed Safe transmission speed R that when road information exists the channel of estimation difference, system can reachs'。
Under the conditions of the estimation of S8: more satisfactory channel, optimal power allocation is than system energy after the channel that there is estimation difference Safe transmission speed R reacheds' with maximum safe transmission speed R that ideally can reachs *, it was therefore concluded that.
The estimation used with modelled signal in view of the actual legitimate channel launching signal process in described step S5 There is estimation difference in channel, then the reception signal of Bob has change.Bob receives message yb, calculate Signal to Interference plus Noise Ratio SINR, be expressed as γb(φ), according to the design principle launching signalSimplified expression, Bob receives signal and is expressed as
y b = h ~ b H s + h ~ b c H s c + n b = ( h b + δ b ) H s + ( h b c + δ b c ) H s c + n b = h b H s + δ b H s + h b c H s c + δ b c H s c + n b = h b H s + δ b H s + δ b c H s c + n b - - - ( 10 )
The letter of Bob is dried and is expressed as than SINR
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 | δ b H N v b | 2 + P c N c - 1 | | δ b c H W b c | | 2 - - - ( 11 )
KnownAndColumn vector constituteZero empty Between orthonormal basis, WbcColumn vector defineThe orthonormal basis of kernel, thus obtain Therefore
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 = γ c ( φ ) φ - - - ( 12 )
γ c ( φ ) = P a | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 - - - ( 13 )
Due to, this system only knows the statistical information of tapping channel, the tapped signal of Eve still with perfect channel estimation condition Under the method for expressing of tapped signal the same, be still formula (2), therefore the SINR of Eve is the most constant, is expressed as formula (6).Safety Outage probability constraint is only the most relevant to tapping channel, therefore security interrupt constraints is constant, then under security interrupt probability constraints be System safe rate is represented by about the relation of the power-division ratios launching signal
R s = log 2 ( 1 + φγ c ( φ ) 1 + φ ω ( φ ) ) - - - ( 14 )
Setting antenna parameter Na=2, Nc=4, ε=0.1, | | hb||2=1, the estimation difference taked is σ12=0.1, And consider P respectivelyc=0dB and PcTwo kinds of situations of=10dB.Find optimal solution by MATLAB emulation and contrast mapping, as Shown in Fig. 3, present in figure is under different condition, security of system speed and total pass launched between power of emission source Alice System, it can be clearly seen that channel hb、hbcWhen all there is estimation difference, the impact on the safe rate of system is channel hb、hbcRespectively When only one of which exists estimation difference affect security of system speed is comprehensive.The peace of system under conditions of perfect channel estimation Full rate increases with the increase launching power;And the safe rate of system is with launching merit under conditions of imperfect channel estimation The increase first increases and then decreases of rate, it is hereby achieved that the maximum of a safe rate.Analyze concrete data to understand:
(1) when the transmitting power of CJ end is 10dB, the change that the safe rate of system launches power with Alice end presents Going out the change of obvious first increases and then decreases, when the transmitting power of transmitting terminal is 13dB, safe rate reaches to be about 1.135bpcu (bit/channel uses).
(2) when the transmitting power of CJ end is 0dB, the change that the safe rate of system launches power with Alice end is failed to understand Aobvious, when the transmitting power of transmitting terminal is 14dB, safe rate reaches to be about 0.274bpcu (bit/channel uses).
The invention provides a kind of main channel and association based on man made noise under the conditions of the channel imperfect channel estimation that cooperates Make transmitting power division method in network, emission source and cooperation jammer and all taken into full account that channel is estimated to there is estimation difference Letter is launched in the channel condition information design that situation, emission source and cooperation jammer utilize imperfect channel estimation method to estimate to obtain Number, taking into full account estimation difference during design, the interference signal and the emission source that weaken cooperation jammer transmitting launch the people in signal The interference to legitimate receiver of the work noise vector, reduces the Signal to Interference plus Noise Ratio that listener-in receives, thus improves the security performance of system.
Emission source launches signal, Jing Guocun by optimizing the optimal power allocation obtained under the conditions of perfect channel estimation than design The safe transmission speed that system reaches after the channel of estimation difference, compares this safe transmission speed and perfect channel estimation condition The gap of lower security of system speed, checking considers the importance of channel estimation errors.Main channel and cooperation channel are taken into full account Channel estimation methods there is the situation of estimation difference, it is proposed that the actual power allocation scheme realizing security of system so that The security system set up can be applied in actual scene.

Claims (1)

1. main channel and power distribution side in collaborative network based on man made noise under the conditions of the channel imperfect channel estimation that cooperates Method, it is characterised in that: it comprises the following steps:
S1: legitimate receipt end sends pilot frequency sequence to emission source transmitting terminal and cooperation jammer simultaneously, and described pilot frequency sequence passes through Transmitting terminal is to the actual channel of legitimate receipt endSimultaneously through the actual channel of cooperation jammer to legitimate receipt end
S2: transmitting terminal and cooperation jammer receive pilot frequency sequence respectively and do imperfect channel estimation and obtain hb、hbc, Error is there is in i.e. actual channel with estimation channel,NoteWhereinRepresent the covariance matrix of random vector;
S3: transmitting terminal and cooperation jammer are utilized respectively estimation channel matrix hb、hbcDesign respective transmitting signal s, sc
Signal launched by S4: transmitting terminal and cooperation jammer simultaneously, and legitimate receipt end receives from actual channelS, sc, Eavesdropping end is eavesdropped from tapping channel he、hecS, sc
The termination collection of letters number of S5: legitimate receipt is ybAnd calculate Signal to Interference plus Noise Ratio, it is expressed as γb(φ), former according to the design launching signal Then understandSimplified expression, the reception signal of legitimate receipt end is expressed as
y b = ( h b ′ ) H s + ( h b c ′ ) H s c + n b = ( h b - δ b ) H s + h b c H s c + n b = h b H s - δ b H s + h b c H s c + n b = h b H s - δ b H s + n b
Wherein, nb,ne~CN (0,1) represents noise respectively on legal receiving terminal and the impact of eavesdropping end;Transmitting terminal launches signal s In man made noise's signal section reply legitimate receipt end there is no any impact, therefore meet:
s = P a φ v x + P a ( 1 - φ ) N a - 1 N v n
Wherein, PaRepresent the transmit power constraint of transmitting terminal;φ ∈ [0,1] represents PaPower-division ratios;X~CN (0,1) andRepresent data signal and the Gaussian noise vector of Gauss code book respectively, and be separate;Equation is right Limit Section 1 represents the axial signal of information, whereinSection 2 represents man made noise's vector, whereinColumn vector constituteThe orthonormal basis of kernel;
Jammer end launches signal scReply legitimate receiver does not has any impact, i.e. yetSo scIt is expressed as
s c = P c N c - 1 W z
Wherein PcRepresent the transmit power constraint of CJ;The column vector of W definesThe orthonormal basis of kernel;Represent a Gaussian noise vector;
The letter of legitimate receipt end is dried and can be expressed as than SINR
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 | δ b H N v b | 2 + P c N c - 1 | | δ b c H W b c | | 2
KnownAndColumn vector constituteKernel Orthonormal basis, WbcColumn vector defineThe orthonormal basis of kernel, thus obtain Therefore:
γ b ( φ ) = P a φ | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2 = γ c ( φ ) φ
γ c ( φ ) = P a | | h b | | 2 1 + P a ( 1 - φ ) N a - 1 σ 1 + P c N c - 1 σ 2
Only know the statistical information of tapping channel due to system, reception signal and the Signal to Interference plus Noise Ratio of eavesdropping end are still estimated for ideal communication channel Result under the conditions of meter, is respectively as follows:
y e = h e H s + h e c H s c + n e ;
γ e ( φ ) = P a φ | h e H v | 2 1 + P a ( 1 - φ ) N a - 1 | h e H N v | 2 + P c N c - 1 | | h e c H W | | 2 ;
Security interrupt maximum capacity to be realized, this optimization problem can be equivalent to a power distribution problems, be described as follows:
m a x 0 ≤ φ ≤ 1 R s = log 2 ( 1 + γ φ 1 + μ )
s.t. Pr(γe(φ) > μ)=ε,
0≤Rs≤Cb.
Wherein γ=Pa||hb||2, RsRepresenting safe transmission speed, ε represents security interrupt probability constraints, Cb=log2(1+γb (φ) channel capacity of main channel) is represented,Represent the threshold value relevant with outage probability;
Solving security interrupt probability constraints is:
l n ( 1 ϵ ) = ω P a + l n [ 1 + ( 1 - φ ) ω ] + 3 l n ( 1 + ω d )
WhereinWithFound out that ω is an implicit function about φ by above formula, and obviously ω (φ) > 0, Then the formula of power distribution problems means that into:
R s = log 2 ( 1 + φγ c ( φ ) 1 + φ ω ( φ ) ) ;
S6: calculate optimum allocation when maximum safe transmission speed under the conditions of perfect channel estimation, i.e. ask with numerical analysis method Solution formulaOptimal power allocation during optimization is than φ * and maximum safe transmission speed Rs *
S7: Optimal Ratio φ * under the conditions of perfect channel estimation is substituted into last formula in step S4 and obtains Rs'=Rs (φ *), observes the transmitting signal process designed than φ * by optimal power allocation under the conditions of perfect channel estimation and makes with modelled signal Channel information safe transmission speed R that system can reach when there is the channel of estimation differences';
Under the conditions of S8: more satisfactory channel is estimated, optimal power allocation can reach than system after the channel that there is estimation difference Safe transmission speed Rs' with maximum safe transmission speed R that ideally can reachs *, it was therefore concluded that.
CN201610345036.2A 2016-05-20 2016-05-20 Power distribution method in collaborative network based on man made noise Active CN105915472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610345036.2A CN105915472B (en) 2016-05-20 2016-05-20 Power distribution method in collaborative network based on man made noise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610345036.2A CN105915472B (en) 2016-05-20 2016-05-20 Power distribution method in collaborative network based on man made noise

Publications (2)

Publication Number Publication Date
CN105915472A true CN105915472A (en) 2016-08-31
CN105915472B CN105915472B (en) 2019-02-26

Family

ID=56749550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610345036.2A Active CN105915472B (en) 2016-05-20 2016-05-20 Power distribution method in collaborative network based on man made noise

Country Status (1)

Country Link
CN (1) CN105915472B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507464A (en) * 2016-12-14 2017-03-15 西安交通大学 Optimal power allocation method based on effective and safe capacity
WO2018119898A1 (en) * 2016-12-29 2018-07-05 深圳天珑无线科技有限公司 Blocking signal configuration method and device suitable for use in multi-antenna system
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN108964782A (en) * 2018-07-31 2018-12-07 深圳大学 A kind of safety of physical layer Enhancement Method of free space optical-fiber network
CN109005551A (en) * 2018-07-10 2018-12-14 南京邮电大学 A kind of multi-user's NOMA downlink power distributing method of imperfect channel state information
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN111224779A (en) * 2020-01-02 2020-06-02 同济大学 Physical layer key generation method and device based on codebook, storage medium and terminal
CN111262644A (en) * 2020-01-16 2020-06-09 电子科技大学 Transmission method for improving safety performance of edge computing system
CN111555787A (en) * 2020-04-24 2020-08-18 西安交通大学 Artificial noise weight iterative correction and low bit feedback method for multi-transmitting single-receiving system
CN111885546A (en) * 2020-07-28 2020-11-03 桂林理工大学 Vehicle-mounted physical layer safe transmission method based on cooperative interference and artificial noise
CN112383380A (en) * 2020-10-21 2021-02-19 西安交通大学 Covert vehicle communication method based on non-orthogonal multiple access technology
CN114301567A (en) * 2021-12-28 2022-04-08 绿盟科技集团股份有限公司 Communication method and device based on artificial noise

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581960A (en) * 2015-01-26 2015-04-29 西安交通大学 Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
CN105515717A (en) * 2015-11-30 2016-04-20 华侨大学 Cooperative relay security transmission method based on artificial noise interference

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581960A (en) * 2015-01-26 2015-04-29 西安交通大学 Multi-user collaboration jamming power distribution method under restraint of confidentiality interrupt probability
CN105515717A (en) * 2015-11-30 2016-04-20 华侨大学 Cooperative relay security transmission method based on artificial noise interference

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BOWANG: ""Secrecy Rate Maximization With Artifial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint"", 《IEEE》 *
JINGHUANG: ""Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization"", 《IEEE》 *
申少君: ""非理想条件下的物理层安全技术研究"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507464A (en) * 2016-12-14 2017-03-15 西安交通大学 Optimal power allocation method based on effective and safe capacity
CN106507464B (en) * 2016-12-14 2019-11-08 西安交通大学 Optimal power allocation method based on effective and safe capacity
WO2018119898A1 (en) * 2016-12-29 2018-07-05 深圳天珑无线科技有限公司 Blocking signal configuration method and device suitable for use in multi-antenna system
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN110248306B (en) * 2018-03-08 2020-05-08 北京邮电大学 Method and device for determining cooperative node of source node, electronic equipment and medium
CN108712228A (en) * 2018-05-03 2018-10-26 电子科技大学 A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference
CN109005551A (en) * 2018-07-10 2018-12-14 南京邮电大学 A kind of multi-user's NOMA downlink power distributing method of imperfect channel state information
CN109005551B (en) * 2018-07-10 2021-05-04 南京邮电大学 Multi-user NOMA downlink power distribution method of non-ideal channel state information
CN108964782A (en) * 2018-07-31 2018-12-07 深圳大学 A kind of safety of physical layer Enhancement Method of free space optical-fiber network
CN110166096A (en) * 2019-04-09 2019-08-23 西安电子科技大学 A kind of safety of physical layer transmission for the interference that assists and cooperate based on man made noise
CN111224779A (en) * 2020-01-02 2020-06-02 同济大学 Physical layer key generation method and device based on codebook, storage medium and terminal
CN111262644A (en) * 2020-01-16 2020-06-09 电子科技大学 Transmission method for improving safety performance of edge computing system
CN111555787A (en) * 2020-04-24 2020-08-18 西安交通大学 Artificial noise weight iterative correction and low bit feedback method for multi-transmitting single-receiving system
CN111555787B (en) * 2020-04-24 2022-02-11 西安交通大学 Artificial noise weight iterative correction and low bit feedback method for multi-transmitting single-receiving system
CN111885546A (en) * 2020-07-28 2020-11-03 桂林理工大学 Vehicle-mounted physical layer safe transmission method based on cooperative interference and artificial noise
CN111885546B (en) * 2020-07-28 2023-03-14 桂林理工大学 Vehicle-mounted physical layer safe transmission method based on cooperative interference and artificial noise
CN112383380A (en) * 2020-10-21 2021-02-19 西安交通大学 Covert vehicle communication method based on non-orthogonal multiple access technology
CN114301567A (en) * 2021-12-28 2022-04-08 绿盟科技集团股份有限公司 Communication method and device based on artificial noise
CN114301567B (en) * 2021-12-28 2023-07-28 绿盟科技集团股份有限公司 Communication method and device based on artificial noise

Also Published As

Publication number Publication date
CN105915472B (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN105915472A (en) Artificial noise-based cooperative network power allocation method for main channel and cooperative channel under non ideal channel estimation condition
CN106131941A (en) Power distribution method in collaborative network based on man made noise under the conditions of cooperation channel imperfect channel estimation
CN106068032A (en) Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN110492996B (en) Key generation method applied to multi-user large-scale MIMO system
CN104320826A (en) Chance relay-selection method for cooperative communication network under tapping environment
CN105657698A (en) Security transmission method based on cooperation interferences in multi-cell network
CN109640320A (en) A kind of safe discharging method of the mobile edge calculations system-computed task based on mixing NOMA
CN105744516B (en) A kind of communication system and method promoting safety of physical layer performance using energy station
CN107359929B (en) Air interface encryption method based on constellation overlapping in bidirectional relay system
CN109150855A (en) A kind of robustness secure wireless communication transmission method optimizing power resource
CN102752080B (en) A kind of anti-eavesdrop coded method based on physical layer
CN106656405A (en) Method for minimizing system confidentiality interruption probability using energy station
CN104283629A (en) Channel safety transmission method
CN105657700A (en) Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN105120453A (en) Secret key generation method
CN110798282B (en) Artificial noise implementation method of software radio MISO system
Jaiswal et al. Physical Layer Security Performance of NOMA-Aided Vehicular Communications Over Nakagami-$ m $ Time-Selective Fading Channels With Channel Estimation Errors
Xu et al. Threshold based signal detection and the average symbol error probability for downlink NOMA systems with M-ary QAM
CN103987065A (en) Method for predicting behavior model and monitor strategy of relay node
Wu et al. IRS-Assisted Covert Communication with Equal and Unequal Transmit Prior Probabilities
Kotwal et al. Transmitter selection for secrecy in frequency-selective fading with multiple eavesdroppers and wireless backhaul links
CN106685554A (en) Method and system for improving safety rate of communication system and secure communication system
Lyu et al. NOMA-assisted small-packet transmissions in mission-critical MTCs for industrial automation
Khan et al. Random linear network coding based physical layer security for relay‐aided device‐to‐device communication
CN105916138A (en) Secure transmission method based on Key assistance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant