CN106656405B - A method of minimizing system secrecy outage probability using energy station - Google Patents

A method of minimizing system secrecy outage probability using energy station Download PDF

Info

Publication number
CN106656405B
CN106656405B CN201610908280.5A CN201610908280A CN106656405B CN 106656405 B CN106656405 B CN 106656405B CN 201610908280 A CN201610908280 A CN 201610908280A CN 106656405 B CN106656405 B CN 106656405B
Authority
CN
China
Prior art keywords
node
energy station
energy
legitimate receipt
source node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610908280.5A
Other languages
Chinese (zh)
Other versions
CN106656405A (en
Inventor
钟财军
姜鑫
张朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN201610908280.5A priority Critical patent/CN106656405B/en
Publication of CN106656405A publication Critical patent/CN106656405A/en
Application granted granted Critical
Publication of CN106656405B publication Critical patent/CN106656405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of methods minimizing system secrecy outage probability using energy station, including:1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate a time slot;2) energy station estimates the channel state information in communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node;3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2;4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node eavesdrops the wireless signal, while energy station uses beamformer w2Wireless interference signal is transmitted to legitimate receipt node and eavesdropping receiving node, to minimize the secrecy outage probability of system.This method promotes safety of physical layer performance using energy station, to which the secret and safe performance of entire communication system be substantially improved.

Description

A method of minimizing system secrecy outage probability using energy station
Technical field
The present invention relates to the communications fields, and in particular to a kind of side minimizing system secrecy outage probability using energy station Method.
Background technology
With the rapid development of wireless communication technique, various wireless telecom equipments sharply increase, thing followed channel radio Letter safety issue is also on the rise.Traditional secure wireless communication mechanism is mainly the associated encryption skill based on cryptography Art, but with the rapid promotion of Computing ability, the secrecy basis of this technology becomes no longer firm, safety of physical layer skill Art is come into being.
Wirelessly communicate angle of the safety of physical layer technology from information theory, the uniqueness using physical channel and reciprocity Property, to realize that information is encrypted, identification validated user etc., it is intended to realize unconditional security.Chinese invention patent publication number (CN103986545A) a kind of safe transmission method of physical layer for SIMO wireless communication systems is disclosed, it is expected to receive first Fang Fanxiang emits random reference signal, then launch party using the reference signal that receives to symbol to be transmitted into sending out after line shuffle It penetrates, finally it is expected that recipient is demodulated using the known reference signal docking collection of letters number to obtain the information of launch party's transmission.Value It obtains, it is noted that the patent of invention, which only discloses launch party, perfect to receive the reversed random reference signal of desired recipient Situation does not account for the scene of limited channel status information feedback.
On the other hand, the cruise duration of continuing to bring out with emerging wireless traffic, mobile communication equipment is increasingly becoming shadow Ring the key factor of user experience.Under the constantly ripe background of wireless energy transmission technology, researcher, which proposes, to be communicated Fixed supply station is disposed in network, and energy is provided for the mobile device in network using wireless energy transmission technology.Currently, to the greatest extent The novel wireless communication network architecture that pipe introduces supply station has caused international extensive concern, but correlative study work is still in Starting stage is limited only to the application of supply station to provide energy for mobile device, not yet fully excavates the potential of supply station.
Invention content
In view of the above-mentioned deficiencies in the prior art, it is an object of the present invention to provide a kind of utilize in energy station minimum system secrecy The method of disconnected probability promotes safety of physical layer performance using energy station.
In order to solve the above technical problems, technical solution provided by the present invention is:
A method of using energy station minimize system secrecy outage probability, the communication system include source node, Legitimate receipt node, eavesdropping receiving node and energy station;The energy station is configured with NJRoot antenna, NJ≥1;The source section Point is configured with NSRoot antenna, NS≥1;The legitimate receipt node and eavesdropping receiving node configure single antenna, specifically include as Lower step:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node In channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to institute The wireless signal stated is eavesdropped, while energy station uses beamformer w2It is passed to legitimate receipt node and eavesdropping receiving node Defeated wireless interference signal, to minimize the secrecy outage probability of system.
The secrecy is interrupted:When the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
The communication system carries out energy transmission respectively according to time distribution factor θ in a time slot T and information passes It is defeated;In preceding θ T times, energy station transmits wireless energy to source node;In rear (1- θ) T time, source node is to legitimate receipt Node-node transmission wireless signal, eavesdropping receiving node eavesdrops the wireless signal, while energy station is to legitimate receipt section Point and eavesdropping receiving node emit wireless interference signal.
The energy station and source node constitute wireless energy transfer subsystem;The source node, legitimate receipt node Wireless signal transmission subsystem is constituted with eavesdropping receiving node;Energy station, legitimate receipt node and the eavesdropping receiving node Constitute wireless interference signal transmission subsystem.
Channel state information includes in the step 2):Energy station and source node, source node and legitimate receipt node, source The channel status of node and eavesdropping receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node is believed Breath.
Optimum beam figuration device w in the step 3)2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η is indicated Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are indicated respectively Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station With the channel state information of eavesdropping receiving node;T and ' indicate transposition and conjugate operation symbol respectively.
The best launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding Conversion utilizes It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into as follows Form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
Using Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2It is established rules by solving following convex half The method for drawing optimization problem combination linear search obtains;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z It arrives.
Compared with the existing technology, beneficial effects of the present invention are embodied in:
(1) present invention provides a kind of method minimizing system secrecy outage probability using energy station, is carried using energy station Safety of physical layer performance is risen, wireless energy transmission technology is introduced in original tapping channel classical model, passes through energy station Device end into system provides energy, establishes the model that a kind of application range is wider, more practical, avoids traditional mould Type is merely able to the constraint suitable for low power consumption wireless device terminal, effectively improves the cruising ability of device end.
(2) energy station can also be used as an interference source transmitting interference while providing energy for terminal in the present invention Signal.The channel state information obtained using estimation, energy station are adjusted and obtain corresponding optimum beam figuration device w2So that Interference signal generates smaller influence while generating larger interference to eavesdropping receiving node on legal receiving node, to substantially Promote the secret and safe performance of entire communication system.
Description of the drawings
Fig. 1 is the schematic diagram of the communication system in embodiment;
Fig. 2 is the method flow diagram for minimizing system secrecy outage probability in embodiment using energy station;
Fig. 3 is the relation curve that the secrecy Outage probability of distributed antenna after optimizing in embodiment changes with main channel average signal-to-noise ratio Figure.
Specific implementation mode
The present invention is further described with reference to embodiment and Figure of description.
Embodiment
As shown in Figure 1, communication system include a source node, a legitimate receipt node, one eavesdropping receiving node and One energy station that can emit interference;The energy utilization efficiency of source node is 80%, and time distribution factor is 0.5, energy station Multiple antennas number is 4, and the multiple antennas number of source node is 2.Legitimate receipt node and eavesdropping receiving node configure single antenna.Its In, energy station and source node constitute wireless energy transfer subsystem;Source node, legitimate receipt node and eavesdropping receiving node are constituted Wireless signal transmission subsystem;Energy station, legitimate receipt node and eavesdropping receiving node constitute wireless interference signal and transmit subsystem System.
As shown in Fig. 2, the method for minimizing system secrecy outage probability using energy station, specifically comprises the following steps:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate One time slot;
2) energy station estimates communication system by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node In channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to institute The wireless signal stated is eavesdropped, while energy station uses beamformer w2To legitimate receipt node and eavesdropping receiving node Wireless interference signal is transmitted, to minimize the secrecy outage probability of system.
Communication system carries out energy transmission respectively according to time distribution factor θ in a time slot T and information is transmitted;Preceding In θ T times, energy station transmits wireless energy to source node;In rear (1- θ) T time, source node is to legitimate receipt node-node transmission Wireless signal, eavesdropping receiving node eavesdrops the wireless signal, while energy station is to legitimate receipt node and eavesdropping Receiving node emits wireless interference signal, and when the secrecy capacity of system is less than the given rate of information throughput, secrecy is interrupted.
Channel state information includes in the step 2):Energy station and source node, source node and legitimate receipt node, source The channel status of node and eavesdropping receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node is believed Breath.
Optimum beam figuration device w in the step 3)2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η is indicated Radio frequency signal energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source are indicated respectively Node, source node and legitimate receipt node, source node and eavesdropping receiving node, energy station and legitimate receipt node and energy station With the channel state information of eavesdropping receiving node;T and ' indicate transposition and conjugate operation symbol respectively.
The best launching beam figuration device w2Its object function is carried out with constraints by the method for semidefinite decoding Conversion utilizes It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into as follows Form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
Using Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2It is established rules by solving following convex half The method for drawing optimization problem combination linear search obtains;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal Solution Z is the matrix that order is 1, and is metThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z It arrives.
Performance evaluation
To prove that the performance change of system in embodiment, the present embodiment are divided using secrecy Outage probability of distributed antenna parameter Analysis.Fig. 3 is the graph of relation that the secrecy Outage probability of distributed antenna after optimizing in the present embodiment changes with main channel average signal-to-noise ratio.
Here, we use other two kinds of basic schemes as reference:With reference to one i.e. transmission antenna selection strategy, institute is utilized The channel state information of acquisition selects an antenna transmission wireless interference signal minimum to the interference of legal receiving node;Reference Two i.e. high specific sending strategy, utilizes obtained channel state information, and antenna alignment eavesdropping receiving node transmitting is wireless dry Signal is disturbed, to cause larger interference to it.
By comparison it can be found that the best performance under optimum beam figuration device strategy, has thus confirmed the design method Validity.Simultaneously from figure 3, it can be seen that with main channel average signal-to-noise ratio increase, the secrecy outage probability of system is not Disconnected to reduce, i.e. the performance of system is constantly promoted.
The foregoing is merely the preferred embodiment of the present invention, are not intended to limit the invention, all spirit in the present invention Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (5)

1. a kind of method minimizing system secrecy outage probability using energy station, communication system include source node, legal connect Receive node, eavesdropping receiving node and energy station;The energy station is configured with NJRoot antenna, NJ≥1;The source node configuration There is NSRoot antenna, NS≥1;The legitimate receipt node and eavesdropping receiving node configures single antenna, which is characterized in that specific Include the following steps:
1) energy station in preceding θ T times to source node transmit wireless energy, 0<θ<1 indicates that time distribution factor, T indicate one Time slot;
2) energy station is estimated by intercepting source node, legitimate receipt node and the pilot tone for eavesdropping receiving node in communication system Channel state information;
3) channel state information that energy station is obtained using estimation, designs corresponding optimum beam figuration device w2
The optimum beam figuration device w2Its object function is expressed as with constraints:
s.t.||w2| |=1
Wherein, PSAnd N0The noise power of the maximum transmission power and legitimate receipt node of energy station is indicated respectively;η indicates wireless Radio frequency energy is converted into the energy conversion efficiency of electric energy;HJS, hSD, hSE, hJDAnd hJEEnergy station and source node are indicated respectively, Source node and legitimate receipt node, source node and eavesdropping receiving node, energy station is with legitimate receipt node and energy station and surreptitiously Listen the channel state information of receiving node;T and ' indicate transposition and conjugate operation symbol respectively;
4) in rear (1- θ) T time, source node is to legitimate receipt node-node transmission wireless signal, and eavesdropping receiving node is to described Wireless signal is eavesdropped, while energy station uses beamformer w2Nothing is transmitted to legitimate receipt node and eavesdropping receiving node Line interference signal, to minimize the secrecy outage probability of system.
2. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute The energy station and source node stated constitute wireless energy transfer subsystem;Source node, legitimate receipt node and the eavesdropping receives Node constitutes wireless signal transmission subsystem;Energy station, legitimate receipt node and the eavesdropping receiving node constitutes wireless dry Disturb signal transmission subsystem.
3. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute Channel state information includes in the step 2) stated:Energy station and source node, source node and legitimate receipt node, source node and eavesdropping The channel state information of receiving node, energy station and legitimate receipt node and energy station and eavesdropping receiving node.
4. the method according to claim 1 for minimizing system secrecy outage probability using energy station, which is characterized in that institute The best launching beam figuration device w stated2Its object function is converted with constraints by the method for semidefinite decoding, is utilized It indicates conjugate transposition oeprator, while omitting the constraints that W orders are 1, be converted into following form:
S.t.tr (W)=1
W≥0
Wherein, mark oeprator is sought in tr () representatives.
5. the method according to claim 4 for minimizing system secrecy outage probability using energy station, which is characterized in that profit With Charnes-Cooper Transformation Theorems, obtained optimum beam figuration device w2By solving following convex Semidefinite Programming optimization problem It is obtained in conjunction with the method for linear search;
Wherein, linear search is following problem:
Wherein, F (y) is the solution of following convex Semidefinite Programming optimization problem:
S.t.s > 0
Tr (Z)=s
Z >=0,
The convex Semidefinite Programming optimization problem is solved by the CVX kits in MATLAB softwares;Wherein, optimal solution Z It is the matrix that order is 1, and meetsThat is optimum beam figuration device w2It is obtained by carrying out singular value decomposition to Z.
CN201610908280.5A 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station Active CN106656405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908280.5A CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Publications (2)

Publication Number Publication Date
CN106656405A CN106656405A (en) 2017-05-10
CN106656405B true CN106656405B (en) 2018-11-06

Family

ID=58856803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908280.5A Active CN106656405B (en) 2016-10-19 2016-10-19 A method of minimizing system secrecy outage probability using energy station

Country Status (1)

Country Link
CN (1) CN106656405B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108966222B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on self-adaptive covert protocol
CN108966223B (en) * 2018-04-28 2021-03-09 深圳大学 Physical layer authentication method and system based on single-bit covert protocol
CN109039412B (en) * 2018-07-23 2020-07-28 西安交通大学 Physical layer safe transmission method based on random beam forming
CN109361486B (en) * 2018-09-26 2019-08-16 南京邮电大学 A kind of wireless frequency spectrum shared system safety of physical layer method for optimizing based on energy acquisition power supply
CN112153674B (en) * 2020-08-17 2022-02-11 西安交通大学 Communication system power distribution method, device, terminal and readable storage medium
CN113055063A (en) * 2021-03-10 2021-06-29 浙江大学 Low interception relay communication system based on spatial field digital modulation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd Method and device for analyzing ieee1394 bus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001313655A (en) * 2000-04-28 2001-11-09 Fujitsu Ltd Method and device for analyzing ieee1394 bus
CN104811313A (en) * 2015-04-03 2015-07-29 浙江大学 Wireless power transfer-based optimal beam and time distribution design method
CN105744516A (en) * 2016-04-07 2016-07-06 浙江大学 Communication system and method for improving security performance of physical layer by energy station

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
power beacon assisted wiretap channels with jamming;xin jiang等;《IEEE transactions on wireless communication》;20160227;第15卷(第12期);全文 *
secrecy performance of wirelessly powered wiretap channels;Caijun zhong等;《IEEE transactions on communications》;20160718;第64卷(第9期);全文 *

Also Published As

Publication number Publication date
CN106656405A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106656405B (en) A method of minimizing system secrecy outage probability using energy station
Hu et al. Covert transmission with a self-sustained relay
CN105744516B (en) A kind of communication system and method promoting safety of physical layer performance using energy station
CN104320826B (en) The opportunistic relay system of selection of cooperative communication network under a kind of eavesdropping environment
CN108712199B (en) Interruption probability constraint-based two-dimensional robust beamforming method under MISO eavesdropping channel
CN104883741B (en) A kind of resource allocation algorithm of cognitive radio networks
CN105491563B (en) Method and system for improving security rate of MISO security communication system by utilizing artificial noise
CN110299934A (en) A kind of security transmission method for wirelessly taking energy full duplex relaying system
CN105933894B (en) The method for carrying out cipher key-extraction using the stochastic behaviour that recipient receives signal
CN109150855A (en) A kind of robustness secure wireless communication transmission method optimizing power resource
CN102801522B (en) Method for generating asymmetric channel communication key for wireless cooperative communication network
CN109195169A (en) A kind of cognition eavesdropping networked physics layer safe transmission method based on energy acquisition technology
Zhu et al. Secure precise transmission with multi-relay-aided directional modulation
CN102752080A (en) Anti-eavesdrop coding method based on physical layer
CN105813081A (en) Method for selecting relay nodes capable of enhancing security performance of cognitive relay network
CN205610681U (en) Wireless relay transmission system based on physical layer safety
CN106507345A (en) A kind of wireless relay communication method based on game theoretic safety of physical layer
CN105743926A (en) Wireless relay transmission system based on physical layer security
Liu et al. Joint decode-and-forward and jamming for wireless physical layer security with destination assistance
Xu et al. Probabilistic robust secure beamforming in MISO channels with imperfect LCSI and statistical ECSI
CN114024591B (en) Relay cooperation non-orthogonal multiple access system and information transmission method
CN102223628A (en) Frequency domain encryption method and device for random subcarrier weight
Alanazi Physical layer security of cooperative wireless networks with RF energy harvesting
CN106604274A (en) Safety communication method based on information theory and cryptography in wireless sensor network
CN106792899B (en) Cognition wireless network safe transmission method of physical layer based on secondary user selection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant