CN106788643A - A kind of safe method for precoding of multi-user to end-to-end relay system - Google Patents

A kind of safe method for precoding of multi-user to end-to-end relay system Download PDF

Info

Publication number
CN106788643A
CN106788643A CN201611241689.2A CN201611241689A CN106788643A CN 106788643 A CN106788643 A CN 106788643A CN 201611241689 A CN201611241689 A CN 201611241689A CN 106788643 A CN106788643 A CN 106788643A
Authority
CN
China
Prior art keywords
node
antenna
matrix
eavesdropping
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611241689.2A
Other languages
Chinese (zh)
Other versions
CN106788643B (en
Inventor
蔡跃明
曹阔
杨炜伟
杨文东
吴丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA University of Science and Technology
Original Assignee
PLA University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA University of Science and Technology filed Critical PLA University of Science and Technology
Priority to CN201611241689.2A priority Critical patent/CN106788643B/en
Publication of CN106788643A publication Critical patent/CN106788643A/en
Application granted granted Critical
Publication of CN106788643B publication Critical patent/CN106788643B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Multi-user is used for the Precoding Design method of safety of physical layer to end-to-end relay system, via node is using the otherness between channel, multi-user interference is eliminated at corresponding destination node by precoded signal treatment technology, ZF treatment is carried out in eavesdropping node direction simultaneously again, safe information transmission is realized.On the one hand, this method is eliminated and multi-user interference and prevents information leakage, the detection complexity for reducing destination node receiver and the safe transmission that ensure that information.On the other hand, this method concentrates on fixation means relaying major complexity, simplifies the hardware requirement to mobile subscriber, and this method relates only to the via node docking collection of letters number and does simple addition and multiplication operation, and hardware realization is simple, and practicality is stronger.

Description

A kind of safe method for precoding of multi-user to end-to-end relay system
Technical field
Multi-user couple is directed to the present invention relates to a kind of Precoding Design method for improving safety of physical layer, more particularly to one kind The recoding processing method of via node in end-to-end relay system, the method can be prevented while multiuser interference is eliminated Only information leakage.
Background technology
The extensive utilization of radio communication, although bring huge facility to people's lives, but the broadcast of radio communication is special The opening of property and wireless media, causes information security threats increasingly to highlight seriously, particularly the field such as ecommerce, and this is caused Information security issue is increasingly subject to extensive concern.The method for traditionally solving this safety problem is the high level more than physical layer In take encryption key system, distributed by carrying out to validated user key and realize authentication and secure communication.However, with Number of users abruptly increase, the complexity and key length of key distribution turn into encryption mechanism two big challenges urgently to be resolved hurrily.Based on letter Breath opinion, the safety of physical layer technology approach new for communication security is opened.Therefore, with reference to existing encryption mechanism, safety of physical layer Technology can provide more solid safety guarantee for communication security.
The main thought of safety of physical layer is to utilize channel diversity, and primary link is increased by various signal processing technologies The channel capacity of (channel between source node and destination node), and deteriorate eavesdropping link (source node and eavesdropping node as far as possible simultaneously Between channel) channel capacity.A.D.Wyner " The wire-tap channel.Bell Syst.Tech.J., Show in the texts of Jan.1975, pp.1355-1387. ":As long as the channel capacity of primary link is more than the channel capacity of eavesdropping link, The safe transmission of information can just be realized.Therefore, the research of safety of physical layer provides new approach for safe information transmission.It is many Antenna technology can be overcome in a single aerial system when tapping channel quality is better than main channel by introducing multidimensional processiug, Safe capacity is zero limitation, again can exponentially lifting system transmission rate.Therefore, multi-antenna technology is improving physical layer Safely, ensure information security and played an important role on transmitting.Multidimensional processiug mode mainly includes line in multi-antenna technology Property precoding technique and artificial plus two kinds of technology of making an uproar.Linear Precoding is mainly carried out at linear change by transmission signal Reason, is received with reaching enhancing destination node, reduces the information content for being leaked to eavesdrop node, so as to expand primary link with eavesdropping link Between channel capacity difference.In addition, the artificial plus technology of making an uproar is also that multi-antenna technology improves the important hand of safety of physical layer One of section.Under conditions of destination node normal received signal is not influenceed, manually made an uproar by being added in the kernel of primary link Sound deteriorates eavesdropping node receptivity to reach, so as to realize improving the purpose of safety of physical layer performance.
Relay system not only has and overcomes the advantages such as telecommunication, and via node is by using precoding technique The income of safety of physical layer improvement can be obtained.Because relay system concentrates on via node in fact signal precoding treatment It is existing, greatly simplifie the hardware configuration requirement to source node and destination node transceiver.Accordingly, with respect to relay system precoding The research of technology is increasingly subject to widely studied.Particularly, multi-user is to relay communications system (Multiuser Peer-to-Peer Relay Network) in Precoding Design problem:How to design efficient pre-coding scheme can either be while support multigroup use To multiplex data stream parallel transmission, can efficiently solve again interfere problem between multi-user and safe information transmission is asked at family Topic.For this safe Precoding Design problem, X.Gong et al. is in " Secure communication design for multi-user peer-to-peer wireless relay networks.IET Commun.Jan.2016,pp.770- 777. " solved from following thinking in a text:On the premise of ensureing validated user to secure communication, multi-user couple is maximized In minimum safe transmission rate, so as to by safe precoding problem be converted into " minimum safe transmission rate " be optimization aim Semi definite programming problem, and effectively solved using interior point method.However, this solution mode is merely capable of obtaining one closely As suboptimal solution, and calculating process is extremely cumbersome.And, this settling mode is, it is necessary to what joint-detection institute active node sent Source information can determine the private information transmitted by source node, and the signal detection complexity of destination node is big, and cannot have Effect ground suppresses influence of the multi-user interference to destination node.
During multi-user is to end-to-end relay system, can all enter in transmitting procedure per the signal of antenna all the way in contract network Row superposition.If carrying out linear predictive coding treatment to combined channel, big dimension data is introduced, increase spatial gain, i.e. in relaying Linear Precoding is taken at node, due to the increase of spatial gain, this mode can eliminate the same of multi-user interference When prevent information leakage.Meanwhile, linear predictive coding treatment can also simplify destination node receiver structure, reduce its detection again The miscellaneous availability of frequency spectrum that system is obviously improved while spend.But correlative study is but seldom seen in report.
The content of the invention
Technical problem:The technical problems to be solved by the invention are:For multi-user proposes one kind to end-to-end relay system For the Precoding Design scheme of safety of physical layer.On the one hand this method can prevent information leakage, realize safe information transmission, On the other hand multiuser interference can be eliminated, is simplified destination node receiver structure and is reduced its detection complexity.
Technical scheme:For by a via node R, K source node S1,S2,...,Sk,...,SK, K destination node D1,D2,...,Dk,...,DKWith J eavesdropping node E1,E2,...,Ej,...,EJThe multi-user of composition is to end-to-end relay system (source node is consistent with the number of destination node in system, and a source node and a corresponding destination node constitute one group of user It is right) in system, K source node and K destination node realize telecommunication under the assistance of relaying R, each source node Sk K-th corresponding destination node D of differencekOne group of user is constituted to { Sk,Dk, K group users are constituted altogether to { S1,D1},{S2, D2},...,{Sk,Dk},...,{SK,DK}.K groups user's centering, each destination node DkOnly want to obtain source node Sk The private information of transmission, and the transmission information of other source nodes is considered as interference.The K groups user couple and J eavesdropping node are equal It is the legal mobile subscriber (such as mobile phone) in cellular network, due to the limitation of mobile device size, it is assumed that it is equipped with single antenna; And via node R is fixation means, comprising N root antennas R1,R2,...,Rn,...,RN, the radical antenna N is for positive integer and expires Sufficient N >=K+J, wherein, the user is positive integer to number K and eavesdropping node number J, and k is any whole in the range of [1, K] Number, represents each group of user to { Sk,DkNumbering;J is any integer in the range of [1, J], represent it is described each steal Listen node EjNumbering;N is any integer in the range of [1, N], represents each antenna RnNumbering.It is above-mentioned to solve Technical problem, the pre-coding scheme that the present invention is used is as follows:
The first step:Channel estimation:The via node R receives whole users to { S first1,D1},{S2,D2},...,{Sk, Dk},...,{SK,DKAnd all eavesdrop node E1,E2,...,Ek,...,EJThe positional information of feedback;Then according to the position Information calculates described each source node S of user's centering respectivelykThe each antenna R in the via nodenChannel gainEach antenna R in the via nodenTo each destination node of user's centering DkChannel gainAnd Each antenna R in the via nodenTo each eavesdropping node EjChannel gainAgain will described each source Node SkTo each antenna RnChannel gainIt is combined as source node channel gain vectors By each antenna RnTo each destination node DkChannel gainIt is combined as destination node channel gain vectorsBy each antenna RnTo each eavesdropping node EjChannel gainCombination It is eavesdropping node channel gain vectorWherein, described source node channel gain vectorsDestination node channel gain vectorsWith eavesdropping node Channel gain vectorsIt is the vector of N × 1 dimension.
Second step:Receive broadcast message:The user is to { S1,D1},{S2,D2},...,{Sk,Dk},...,{SK,DKIn Each source node SkRespectively by via node to its corresponding destination node DkSend private information xk, then section is relayed Every antenna R in pointnThe signal for receiving isWherein, PkRepresent described each source node SkThe power of private information is sent,Represent n-th antenna R in the via nodenThe additive white Gaussian noise at place;Then will Each antenna R in the via nodenThe signal for receiving is combined as antenna and receives signal phasorWhereinIt is antenna additive Gaussian white noise Acoustic vector.Wherein, antenna receives signal phasor yRWith antenna additive white Gaussian noise vector vRN × 1 n dimensional vector n is,
3rd step:Precoding processing:The via node docking collection of letters numberEach element carry out Linear superposition computing, and it is combined into new precoding vectors signal ByRIt is sent on transmitting antenna.Wherein, B prelists for N × N-dimensional Code matrix, pre-coding matrix B pth row q column elements are designated as B (l, q), and wherein l and q is the integer in the range of [1, N], and note is pre- Coding vector b is Ns of the pre-coding matrix B as obtained by row storehouse2× 1 dimensional vector, the generation step of the precoding vector b is such as Under:
Step 301:Calculate each destination node Dk(the K-1) × N at place2Tie up equivalent interference matrix Fk=[f1,k,f2,k,..., fk-1,k,fk+1,k,...,fK,k]T, wherein, except k-th source node SkEach source node S in additioniTo k-th destination node Dk Equivalent disturbance regime be expressed as source node SiTo k-th destination node DkEquivalent interference vector Table Show that right Kronecker (Kronecker) accumulates computing, i ∈ [1, K], i ≠ k.Now, k-th destination node DkThe equivalent interference at place Link isFor k-th destination node Dk, it is only needed to from k-th source node SkThe information of transmitting, and other sources are saved Point SiThe information of (wherein i ≠ k) transmitting, to k-th destination node DkFor be accordingly to be regarded as interference signal.Therefore, k-th section of mesh Point DkThe equivalent interfering link at place is except source node SkOutside institute's active node to destination node DkEquivalent periodic line set, note It is FkB, wherein Fk=[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TIt is (K-1) × N2Dimension matrix.
Step 302:Calculate each eavesdropping node EjThe equivalent eavesdropping matrix G at placej=[g1,j,g2,j,...,gK,j]T, wherein, Each source node SkTo j-th eavesdropping node EjEquivalent eavesdropping situation be expressed as source node SkTo j-th eavesdropping node Ej's Equivalent eavesdropping vectorNow, j-th eavesdropping node EjPlace equivalent eavesdropping link beTherefore, J eavesdropping node EjThe equivalent eavesdropping link at place is institute's active node to eavesdropping node EjEquivalent periodic line set, be designated as GjB, its Middle Gj=[g1,j,g2,j,...,gK,j]TIt is K × N2Dimension matrix.
Step 303, calculates the kernel T of equivalent interference matrix and equivalent eavesdropping matrix:By all equivalent interference matrix Fk =[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TWith equivalent eavesdropping matrix Gj=[g1,j,g2,j,...,gK,j]TMerge into Dimension is (K+J-1) K × N2Interference eavesdropping matrixAnd to interference eavesdropping matrix Φ carries out singular value decompositionWherein, dimension is N2×N2Matrix VΦIt is the right feature of interference eavesdropping matrix Φ Vector matrix;Dimension is (K+J-1) K × N2Matrix ΣΦIt is the eigenvalue matrix of interference eavesdropping matrix Φ, dimension is (K+J- 1) matrix U of K × (K+J-1) KΦIt is the left eigenvector matrix of interference eavesdropping matrix Φ;The kernel T of matrix is eavesdropped in then interference It is by right eigenvectors matrix VΦN2The column elements of-K (K+J-1)+1 are to N2The N that column element is constituted2×(N2-K2- KJ+K) dimension square Battle array, is represented by:T=VΦ(:,[N2-K(K+J-1)+1:N2]);
Step 304, precoded signal treatment eliminates multi-user interference and information leakage:Precoding is calculated according to the following equation VectorWherein PRIt is the maximum of repeating device power;For N × N-dimensional matrix, represents the covariance of via node received signal power, wherein PkIt is k-th source node SkSend private information Power,It is source node channel gain vectorsConjugate matrices,It is source node channel gain vectorsTurn Put matrix, INIt is N × N-dimensional unit matrix, σ2It is the variance of additive white Gaussian noise;(N2-K2- KJ+K) × 1 equivalent the wave beam forming of dimension Vectorial p is all purposes node receiving power covariance matrixThe corresponding unit character vector of eigenvalue of maximum, Wherein, described each source node S of user's centeringkTo corresponding destination node DkThe equivalent situation of direct transferring be expressed as source node SkTo corresponding destination node DkThe equivalent vector that direct transfers·HRepresent associate matrix fortune Calculate,TIt is transposed matrix computing.Pre-coding matrix B is entered according to B (l, q)=b (qN-N+l) according to precoding vector b finally Row assignment;
4th step:Forward signal:Each antenna R in the via node RnAccording toTurn Hair precoding vectors signal.
By k-th destination node DkSignal is received to be designated asIt is represented by: WhereinRepresent destination node DkThe additive white Gaussian noise at place, it is that zero, variance is σ to obey average2Multiple Gauss distribution.Receive SignalIn multi-user interference be eliminated, only include user DkDesired private information xkWith noise two parts.Therefore, user DkCan be according to reception signalCarry out independent detection private information xk, without to institute's active node sending signal joint-detection, Oneself desired information is extracted again.
On the other hand, by j-th eavesdropping node EjThe signal of reception is designated asIt is represented by: WhereinRepresent eavesdropping node EjThe additive white Gaussian noise at place, it is that zero, variance is σ to obey average2Multiple Gauss distribution.Due to Eavesdropping node only includes noise in receiving signal, therefore, all eavesdropping nodes do not get any private information, multi-user couple Secure communication between end-to-end is effectively ensured.
Further, in the above method, using the channel estimation mode meter based on least mean-square error in the first step Calculate the source node channel gain vectorsDestination node channel gain vectorsWith eavesdropping node channel gain vectorDue to K groups User couple and J eavesdropping node are legal mobile subscribers in cellular network, and these user nodes are anti-to via node in real time Present the positional information of itself.Therefore, via node estimates their letters and via node between from their feedback information Channel state information, for example, using the channel estimation mode based on least mean-square error, its detailed process is referring to " Georgios B.Giannakis.Signal Processing Advances in Wireless and Mobile Communications Volume 1:Trend in Channel Estimation and Equalization.Beijing:Post& Telecommunications Press,2002,11.”.Focus of the present invention assumes that channel estimation is not in channel estimation Accurately.
Further, in the above method, source node channel gain vectors described in the first step Destination node channel gain vectors described in the first stepNode is eavesdropped described in the first step Channel gain vectorsAntenna described in second step receives signal phasorAnd the vector of antenna additive white Gaussian noise described in second stepIn element arranged from small to large according to antenna number.
Further, in methods described, it is that zero, variance is σ that additive white Gaussian noise obeys average2Multiple Gauss point Cloth.
The present invention also provide simultaneously it is a kind of with the multi-user to being used for the pre- of safety of physical layer in end-to-end relay system The corresponding pre-coding apparatus of coding method, including N root reception antennas R1,R2,...,Rn,...,RNWith N root transmitting antennas R1', R2',...,Rn',...,RN', it is characterised in that the N roots reception antenna R1,R2,...,Rn,...,RNWith N root transmitting antennas R1',R2',...,Rn',...,RN' between be provided with N group signal samplings unit, N × N number of multiplying module and N number of superposition Module:The N roots reception antenna R1,R2,...,Rn,...,RNFor reception antenna data, each reception antenna it is defeated Go out input of the end respectively with one group of signal sampling unit to be connected, the output end of each group of signal sampling unit is respectively It is connected with the first input end of N number of multiplying module simultaneously, the second input of the N × N number of multiplying module is successively An element in precoding vector b is received, the output end of the N × N number of multiplying module presses reception antenna data respectively Multiplication result numbering, the multiplication result of reception antenna data is exported to corresponding superposition module respectively Input, described each superposition module is calculated and relays signal all the way, described each superposition module Output end connect a transmitting antenna, the transmitting antenna R respectively1',R2',...,Rn',...,RN' for forward it is described in After signal.
By taking n-th reception antenna as an example, n-th reception antenna after n-th group signal sampling unit sampling by obtaining dataThe output end of n-th group signal sampling unit first input end simultaneously with n-th × N-N+1 to n-th × N multiplying modules Connection, the second input of the n-th × N-N+1 to n-th × N multiplying modules receives precoding vector b in order successively In n-th × N-N+1 to n-th × N element, the output end of the n-th × N-N+1 to n-th × N number of multiplying module connects successively (other inputs of the 1st to N superposition module receive it respectively to connect the n-th input of the 1st to N superposition module The data of the multiplying module corresponding to his reception antenna), the described 1st to N superpositions module respectively by superposition Result export to the 1st to N transmitting antennas that (the relaying signal that now, n-th transmitting antenna is forwarded isWherein, m is the integer between 1 to N).
Beneficial effect
1st, have a safety feature, the present invention is applied to many eavesdropping node scenes using precoding technique.As long as meet condition N >= K+J, i.e. via node antenna number is not less than destination node and eavesdropping node number sum, it becomes possible to ensure relaying precoding Matrix dimensionality is sufficiently large, the kernel that there is equivalent interfering link and equivalent eavesdropping link, so as to secret signal is concentrated on It is transmitted in this kernel.This method is used, as long as via node number of antennas is enough, it is possible to ensure the exhausted of transmission information To safety.
2nd, multiuser interference is eliminated.The present invention when the design of pre-coding matrix B is carried out, by introduce it is equivalent disturb to AmountConstitute equivalent interference matrix Fk=[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TSo that prelist Precoding vector b and equivalent interference vector corresponding to code matrix BIt is orthogonal, thus eliminate it is equivalent disturb to AmountInfluence to receiving signal end at destination node, eliminates the multiuser interference at destination node.By This, destination node only needs to the source information needed for detecting itself, and carries out joint-detection without to institute's active node sending signal. This greatly reduces the detection complexity of destination node receiver.
3rd, information leakage is prevented.The present invention is vectorial by introducing equivalent eavesdropping when the design of pre-coding matrix B is carried outThe equivalent eavesdropping matrix G of compositionj=[g1,j,g2,j,...,gK,j]TSo that it is pre- corresponding to pre-coding matrix B Coding vector b and equivalent eavesdropping vectorIt is orthogonal, so as to eliminate eavesdropping node EjThe private information that place receives xk, prevent source node private information from revealing.
4th, realize simple.The present invention uses the Linear Precoding, mainly the reception signal to via node to carry out letter Single addition and multiplying.Only in conjunction with existing channel estimation technique, corresponding precoding vector b is generated, then to N group signals Sampling unit, N × N number of multiplying module and N number of superposition module are attached according to computing requirement, you can realize this hair Bright described precoding computing.Hardware realizes that simply practicality is stronger.
Brief description of the drawings
Fig. 1 is multi-user of the present invention to end-to-end relaying secure communication schematic diagram of a scenario;
Fig. 2 is signal processing flow figure of the present invention for safety of physical layer precoding;
Fig. 3 is relaying precoded signal processing structure exemplary plot.
Fig. 4 be the present invention carry safe pre-coding scheme relay antenna number be 4, eavesdropping interstitial content be 1 and 2 group of use In the case of family pair, system take input signal respectively BPSK, QPSK, 8PSK and 16PSK when resulting and safe transmission Speed is with signal to noise ratio situation of change;
Fig. 5 is that the present invention carries safe pre-coding scheme in QPSK inputs and relay antenna number in the case of 7,2 groups User is to the resulting and safe transmission speed when eavesdropping interstitial content is respectively 1,2,3 with signal to noise ratio situation of change.
Specific embodiment
Technical scheme implementation process is as follows:
Multi-user shown in Fig. 1 is to end-to-end relay communications system, including a via node R, K source node S1, S2,...,Sk,...,SK, K destination node D1,D2,...,Dk,...,DKWith J eavesdropping section E1,E2,...,Ej,...,EJConstitute Multi-user to end-to-end relay system, in system, K source node and K destination node realize long distance under the assistance of relaying R From communication, each source node SkK-th corresponding destination node D of differencekOne group of user is constituted to { Sk,Dk, constitute altogether K group users are to { S1,D1},{S2,D2},...,{Sk,Dk},...,{SK,DK}.K groups user's centering, each destination node DkOnly want to obtain source node SkThe private information of transmission, and the transmission information of other source nodes is considered as interference.The K groups are used Family pair and J eavesdropping node are legal mobile subscribers (such as mobile phone) in cellular network, due to the limitation of mobile device size, Assuming that it is equipped with single antenna;And via node R is fixation means, comprising N root antennas R1,R2,...,Rn,...,RN, the day Line radical N is for positive integer and meets N >=K+J, wherein, the user is positive integer to number K and eavesdropping node number J, and k is Any integer in the range of [1, K], represents each group of user to { Sk,DkNumbering;J is any whole in the range of [1, J] Number, represents each eavesdropping node EjNumbering;N is any integer in the range of [1, N], represents each antenna RnNumbering.
Fig. 2 show multi-user to end-to-end trunking traffic flow chart, including the reception of channel estimation, signal, signal transacting With signal forwarding etc. process.
The first step:Channel estimation:The via node R receives whole users to { S first1,D1},{S2,D2},...,{Sk, Dk},...,{SK,DKAnd all eavesdrop node E1,E2,...,Ek,...,EJThe positional information of feedback;Then according to the position Information calculates described each source node S of user's centering respectivelykThe each antenna R in the via nodenChannel gainEach antenna R in the via nodenTo each destination node of user's centering DkChannel gainAnd Each antenna R in the via nodenTo each eavesdropping node EjChannel gainAgain will it is described each Source node SkTo each antenna RnChannel gainIt is combined as source node channel gain vectorsBy each antenna RnTo each destination node DkChannel gainIt is combined as mesh Node channel gain vectorBy each antenna RnTo each eavesdropping node Ej's Channel gainIt is combined as eavesdropping node channel gain vectorWherein, described source node Channel gain vectorsDestination node channel gain vectors With eavesdropping node channel gain vectorIt is the vector of N × 1 dimension.
Second step:Receive broadcast message:The user is to { S1,D1},{S2,D2},...,{Sk,Dk},...,{SK,DKIn Each source node SkRespectively by via node to its corresponding destination node DkSend private information xk, then section is relayed Every antenna R in pointnThe signal for receiving isWherein, PkRepresent described each source node SkThe power of private information is sent,Represent n-th antenna R in the via nodenThe additive white Gaussian noise at place;Then will Each antenna R in the via nodenThe signal for receiving is combined as antenna and receives signal phasorWhereinIt is antenna additive Gaussian white noise Acoustic vector.Wherein, antenna receives signal phasor yRWith antenna additive white Gaussian noise vector vRN × 1 n dimensional vector n is,
3rd step:Precoding processing:The via node docking collection of letters numberEach element carry out Linear superposition computing, and it is combined into new precoding vectors signal ByRIt is sent on transmitting antenna.Wherein, B prelists for N × N-dimensional Code matrix, pre-coding matrix B l row q column elements are designated as B (l, q), and wherein l and q is the integer in the range of [1, N], and note is pre- Coding vector b is Ns of the pre-coding matrix B as obtained by row storehouse2× 1 dimensional vector, the generation step of the precoding vector b is such as Under:
Step 301:Calculate each destination node Dk(the K-1) × N at place2Tie up equivalent interference matrix Fk=[f1,k,f2,k,..., fk-1,k,fk+1,k,...,fK,k]T, wherein, except k-th source node SkEach source node S in additioniTo k-th destination node Dk Equivalent disturbance regime be expressed as source node SiTo k-th destination node DkEquivalent interference vector Table Show right Kronecker (Kronecker) accumulate computing, i ∈ [1, K [, i ≠ k.Now, k-th destination node DkThe equivalent interference at place Link isFor k-th destination node Dk, it is only needed to from k-th source node SkThe information of transmitting, and other sources are saved Point SiThe information of (wherein i ≠ k) transmitting, to k-th destination node DkFor be accordingly to be regarded as interference signal.Therefore, k-th section of mesh Point DkThe equivalent interfering link at place is except source node SkOutside institute's active node to destination node DkEquivalent periodic line set, note It is FkB, wherein Fk=[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TIt is (K-1) × N2Dimension matrix.
Step 302:Calculate each eavesdropping node EjThe equivalent eavesdropping matrix G at placej=[g1,j,g2,j,...,gK,j]T, wherein, Each source node SkTo j-th eavesdropping node EjEquivalent eavesdropping situation be expressed as source node SkTo j-th eavesdropping node Ej's Equivalent eavesdropping vectorNow, j-th eavesdropping node EjPlace equivalent eavesdropping link beTherefore, J eavesdropping node EjThe equivalent eavesdropping link at place is institute's active node to eavesdropping node EjEquivalent periodic line set, be designated as GjB, its Middle Gj=[g1,j,g2,j,...,gK,j]TIt is K × N2Dimension matrix.
Step 303, calculates the kernel T of equivalent interference matrix and equivalent eavesdropping matrix:By all equivalent interference matrix Fk =[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TWith equivalent eavesdropping matrix Gj=[g1,j,g2,j,...,gK,j]TMerge into Dimension is (K+J-1) K × N2Interference eavesdropping matrixAnd matrix Φ is carried out very Different value is decomposedWherein, dimension is N2×N2Matrix VΦIt is the right characteristic vector square of interference eavesdropping matrix Φ Battle array;Dimension is (K+J-1) K × N2Matrix ΣΦIt is the eigenvalue matrix of interference eavesdropping matrix Φ, dimension is (K+J-1) K × (K + J-1) K matrix UΦIt is the left eigenvector matrix of interference eavesdropping matrix Φ;Then the kernel T of interference eavesdropping matrix is by the right side Eigenvectors matrix VΦN2The column elements of-K (K+J-1)+1 are to N2The N that column element is constituted2×(N2-K2- KJ+K) dimension matrix, can table It is shown as:T=VΦ(:,[N2-K(K+J-1)+1:N2])。
Step 304, precoded signal treatment eliminates multi-user interference and information leakage:Setting precoding vector isWherein PRIt is the maximum of repeating device power; It is N × N-dimensional matrix, represents the covariance of via node received signal power;INIt is N × N-dimensional unit matrix;(N2-K2-KJ+K)×1 Equivalent wave beam forming vector p is tieed up for all purposes node receiving power covariance matrixEigenvalue of maximum correspondence Unit character vector, wherein, described each source node S of user's centeringkTo corresponding destination node DkThe equivalent shape that direct transfers Condition is expressed as source node SkTo corresponding destination node DkThe equivalent vector that direct transfers·HRepresent altogether Yoke transposed matrix computing,TIt is transposed matrix computing.Then pre-coding matrix B is assigned according to B (l, q)=b (qN-N+l) Value.
4th step:Forward signal:Each antenna R in the via node RnAccording toTurn Hair precoding vectors signal.
By k-th destination node DkSignal is received to be designated asIt is represented by WhereinRepresent destination node DkThe additive white Gaussian noise at place, it is that zero, variance is σ to obey average2Multiple Gauss distribution.Receive SignalIn multi-user interference be eliminated, only include user DkDesired private information xkWith noise two parts.Therefore, user DkCan be according to reception signalCarry out independent detection private information xk, without to institute's active node sending signal joint-detection, Oneself desired information is extracted again.
On the other hand, by j-th eavesdropping node EjThe signal of reception is designated asIt is represented by: WhereinRepresent eavesdropping node EjThe additive white Gaussian noise at place, it is that zero, variance is σ to obey average2Multiple Gauss distribution.Due to Eavesdropping node only includes noise in receiving signal, therefore, all eavesdropping nodes do not get any private information, multi-user couple Secure communication between end-to-end is effectively ensured.
Fig. 4 and Fig. 5 sets forth Precoding Design method of the institute of the present invention drawings in safety of physical layer in different inputs The graph of a relation of under the conditions of signal and different eavesdropping interstitial contents and safe transmission speed and signal to noise ratio.As shown in Figure 4, the present invention Method is directed to different limited character input signals, ensure that safe transmission speed is issued to its capacity in high s/n ratio Boundary.Fig. 5 shows that the inventive method can guarantee that the safe transmission of information in the case of different eavesdropping interstitial contents.

Claims (5)

1. a kind of multi-user in end-to-end relay system be used for safety of physical layer method for precoding, the system include one Via node (R), K source node (S1,S2,...,Sk,...,SK), K destination node (D1,D2,...,Dk,...,DK) and J Eavesdropping node (E1,E2,...,Ej,...,EJ), each source node (Sk) k-th corresponding destination node of difference (Dk) one group of user is constituted to ({ Sk,Dk), K group users are constituted altogether to ({ S1,D1},{S2,D2},...,{Sk,Dk},...,{SK, DK), the via node (R) includes N root antennas (R1,R2,...,Rn,...,RN), the radical antenna N is positive integer and expires Sufficient N >=K+J, wherein, the user is positive integer to number K and eavesdropping node number J, and k is any whole in the range of [1, K] Number, represents each group of user to ({ Sk,Dk) numbering;J is any integer in the range of [1, J], represent it is described each Eavesdropping node (Ej) numbering;N is any integer in the range of [1, N], represents each antenna (Rn) numbering, it is special Levy and be, precoding step is as follows:
The first step, channel estimation:The via node (R) receives whole users couple first
({S1,D1},{S2,D2},...,{Sk,Dk},...,{SK,DK) and all eavesdrop node (E1,E2,...,Ek,...,EJ) The positional information of feedback;Then each source node of user's centering (S is calculated according to the positional information respectivelyk) described in Each antenna (R in via noden) channel gainEach antenna (R in the via noden) arrive the user Each destination node of centering (Dk) channel gainAnd each antenna (R in the via noden) to it is described each Eavesdropping node (Ej) channel gainAgain will each source node (Sk) arrive each antenna (Rn) channel gainIt is combined as source node channel gain vectorsBy each antenna (Rn) arrive each Individual destination node (Dk) channel gainIt is combined as destination node channel gain vectors By each antenna (Rn) eavesdrop node (E to eachj) channel gainIt is combined as eavesdropping node channel gain arrow Amount
h RE j = [ h R 1 E j , h R 2 E j , ... , h R N E j ] T ;
Second step:Receive broadcast message:The user couple
({S1,D1},{S2,D2},...,{Sk,Dk},...,{SK,DK) in each source node (Sk) respectively by relaying Node is to its corresponding destination node (Dk) send private information xk, then every antenna (R in via node is rememberedn) letter that receives Number it isBy each antenna (R in the via noden) signal that receives is combined as antenna and receives signal phasor
3rd step:Precoding processing:Via node receives signal phasor to antennaCarry out precoding Computing, obtains precoding vectors signal ByR, wherein B is N × N-dimensional pre-coding matrix, pre-coding matrix B l row q column elements B (l, q) is designated as, wherein l and q is the integer in the range of [1, N], and note precoding vector b presses row storehouse institute for pre-coding matrix B The N for obtaining2× 1 dimensional vector, the generation step of the precoding vector b is as follows:
Step 301:Calculate each destination node (Dk) place equivalent interference matrix
Fk=[f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]T, wherein, the i-th source node (Si) to k-th destination node (Dk) Equivalent interference vectori∈[1,K],i≠k;
Step 302:Calculate each eavesdropping node (Ej) place equivalent eavesdropping matrix
Gj=[g1,j,g2,j,...,gK,j]T, wherein, kth source node (Sk) eavesdrop node (E to j-thj) equivalent eavesdropping vector
Step 303:The kernel T of equivalent interference matrix and equivalent eavesdropping matrix is calculated, by all equivalent interference matrix Fk= [f1,k,f2,k,...,fk-1,k,fk+1,k,...,fK,k]TWith equivalent eavesdropping matrix Gj=[g1,j,g2,j,...,gK,j]TMerge into dry Disturb eavesdropping matrixSingular value decomposition is carried out to interference eavesdropping matrix ΦThe then kernel of equivalent interference matrix and equivalent eavesdropping matrix
T=VΦ(:,[N2-K(K+J-1)+1:N2]);
Step 304:Precoded signal treatment eliminates multi-user interference and information leakage:Precoding vector is calculated according to the following equationWherein PRIt is the maximum of repeating device power;N × N-dimensional matrix Q is via node The covariance matrix of received signal power,
Wherein PkIt is k-th source node (Sk) send private information power,For source is saved Point channel gain vectorsConjugate matrices,It is source node channel gain vectorsTransposed matrix;INIt is N × N-dimensional Unit matrix;σ2It is the variance of additive white Gaussian noise;
(N2-K2- KJ+K) × 1 equivalent wave beam forming vector the p of dimension is all purposes node receiving power covariance matrixThe corresponding unit character vector of eigenvalue of maximum, wherein, source node (Sk) arrive corresponding destination node (Dk) The equivalent vector that direct transfersPre-coding matrix B (l, q)=b is finally obtained according to precoding vector b (qN-N+l)。
4th step:Forward signal:Each antenna (R in the via node (R)n) according toTurn Hair precoding vectors signal.
2. multi-user as claimed in claim 1 in end-to-end relay system be used for safety of physical layer method for precoding, its It is characterised by, the source node channel gain is calculated using the channel estimation mode based on least mean-square error in the first step VectorDestination node channel gain vectorsAnd eavesdropping Node channel gain vector
3. multi-user as claimed in claim 2 in end-to-end relay system be used for safety of physical layer method for precoding, its It is characterised by, source node channel gain vectors described in the first stepMesh described in the first step Node channel gain vectorNode channel gain vector is eavesdropped described in the first stepAntenna described in second step receives signal phasor And the vector of antenna additive white Gaussian noise described in second stepIn element according to antenna compile Number arrange from small to large.
4. multi-user as claimed in claim 1 in end-to-end relay system be used for safety of physical layer method for precoding, its It is that zero, variance is σ to be characterised by that the additive white Gaussian noise obeys average2Multiple Gauss distribution.
5. a kind of and multi-user described in claim 1 is to the method for precoding pair in end-to-end relay system for safety of physical layer The pre-coding apparatus answered, including N root reception antennas (R1,R2,...,Rn,...,RN) and N root transmitting antennas (R1′,R2′,..., Rn′,...,RN'), it is characterised in that the N roots reception antenna (R1,R2,...,Rn,...,RN) and N root transmitting antennas (R1′, R2′,...,Rn′,...,RN') between be provided with N group signal samplings unit, N × N number of multiplying module and N number of superposition mould Block:
The N roots reception antenna (R1,R2,...,Rn,...,RN) be used for reception antenna data, each reception antenna it is defeated Go out input of the end respectively with one group of signal sampling unit to be connected, the output end of each group of signal sampling unit is respectively It is connected with the first input end of N number of multiplying module simultaneously, the second input of the N × N number of multiplying module is successively An element in precoding vector b is received, the output end of the N × N number of multiplying module presses reception antenna data respectively Multiplication result numbering, the multiplication result of reception antenna data is exported to corresponding superposition module respectively Input, described each superposition module is calculated and relays signal all the way, described each superposition module Output end connect a transmitting antenna, the transmitting antenna (R respectively1′,R2′,...,Rn′,...,RN') described for forwarding Relaying signal.
CN201611241689.2A 2016-12-29 2016-12-29 Safety pre-coding method for multi-user to end-to-end relay system Active CN106788643B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611241689.2A CN106788643B (en) 2016-12-29 2016-12-29 Safety pre-coding method for multi-user to end-to-end relay system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611241689.2A CN106788643B (en) 2016-12-29 2016-12-29 Safety pre-coding method for multi-user to end-to-end relay system

Publications (2)

Publication Number Publication Date
CN106788643A true CN106788643A (en) 2017-05-31
CN106788643B CN106788643B (en) 2020-01-07

Family

ID=58923555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611241689.2A Active CN106788643B (en) 2016-12-29 2016-12-29 Safety pre-coding method for multi-user to end-to-end relay system

Country Status (1)

Country Link
CN (1) CN106788643B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107994934A (en) * 2017-11-14 2018-05-04 西北工业大学 Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
CN108696913A (en) * 2018-05-25 2018-10-23 中国人民解放军陆军工程大学 ARQ wireless network information safety transmission method
CN109286426A (en) * 2018-09-25 2019-01-29 中国计量大学 A kind of transmission method for wirelessly taking the precoding spatial modulation system that can cooperate
CN109361440A (en) * 2018-11-26 2019-02-19 中国人民解放军陆军工程大学 Physical layer security pre-coding method and decoding method for downlink network of Internet of things
CN110572871A (en) * 2019-09-10 2019-12-13 青岛大学 Wireless energy-carrying relay system with multiple eavesdropping nodes and resource allocation method thereof
CN113132086A (en) * 2019-12-27 2021-07-16 电子科技大学 Method for simultaneously realizing key distribution of physical layer in communication process

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120214403A1 (en) * 2011-02-22 2012-08-23 Celeno Communications (Israel) Ltd. Time-varying phy-level wireless security
CN102655492A (en) * 2012-05-23 2012-09-05 西安电子科技大学 Cooperative OFDMA (Orthogonal Frequency Division Modulation) system subcarrier distribution method based on physical layer safety
CN103354463A (en) * 2013-06-20 2013-10-16 西安电子科技大学 Cooperative wave beam formation method capable of improving physical layer security based on null space
CN104270227A (en) * 2014-10-16 2015-01-07 中国人民解放军理工大学 Null-shift-keying-based physical layer safety transmission method in multi-input single-output system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120214403A1 (en) * 2011-02-22 2012-08-23 Celeno Communications (Israel) Ltd. Time-varying phy-level wireless security
CN102655492A (en) * 2012-05-23 2012-09-05 西安电子科技大学 Cooperative OFDMA (Orthogonal Frequency Division Modulation) system subcarrier distribution method based on physical layer safety
CN103354463A (en) * 2013-06-20 2013-10-16 西安电子科技大学 Cooperative wave beam formation method capable of improving physical layer security based on null space
CN104270227A (en) * 2014-10-16 2015-01-07 中国人民解放军理工大学 Null-shift-keying-based physical layer safety transmission method in multi-input single-output system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIANGWU GONG,HANG LONG,FEIHONG DONG,HAO YIN: ""Secure communication design for multi-user peer to peer wireless relay networks"", 《IEEE》 *
王磊,管新荣,林志,杨文东,杨炜炜: ""无线网络物理层安全技术研究现状与展望"", 《军事通信技术》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107994934A (en) * 2017-11-14 2018-05-04 西北工业大学 Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
CN107994934B (en) * 2017-11-14 2020-10-27 西北工业大学 Safe transmission method of untrusted relay network based on symbol separation and beam forming
CN108696913A (en) * 2018-05-25 2018-10-23 中国人民解放军陆军工程大学 ARQ wireless network information safety transmission method
CN109286426A (en) * 2018-09-25 2019-01-29 中国计量大学 A kind of transmission method for wirelessly taking the precoding spatial modulation system that can cooperate
CN109286426B (en) * 2018-09-25 2021-06-15 中国计量大学 Transmission method of wireless energy-carrying cooperative precoding spatial modulation system
CN109361440A (en) * 2018-11-26 2019-02-19 中国人民解放军陆军工程大学 Physical layer security pre-coding method and decoding method for downlink network of Internet of things
CN109361440B (en) * 2018-11-26 2020-11-27 中国人民解放军陆军工程大学 Physical layer security pre-coding method and decoding method for downlink network of Internet of things
CN110572871A (en) * 2019-09-10 2019-12-13 青岛大学 Wireless energy-carrying relay system with multiple eavesdropping nodes and resource allocation method thereof
CN110572871B (en) * 2019-09-10 2022-05-06 青岛大学 Wireless energy-carrying relay system with multiple eavesdropping nodes and resource allocation method thereof
CN113132086A (en) * 2019-12-27 2021-07-16 电子科技大学 Method for simultaneously realizing key distribution of physical layer in communication process

Also Published As

Publication number Publication date
CN106788643B (en) 2020-01-07

Similar Documents

Publication Publication Date Title
Zhu et al. Analysis and design of secure massive MIMO systems in the presence of hardware impairments
Wu et al. Secure transmission with large numbers of antennas and finite alphabet inputs
Nayebi et al. Precoding and power optimization in cell-free massive MIMO systems
Zhu et al. Linear precoding of data and artificial noise in secure massive MIMO systems
CN106788643A (en) A kind of safe method for precoding of multi-user to end-to-end relay system
Hoydis et al. Massive MIMO in the UL/DL of cellular networks: How many antennas do we need?
Asaad et al. Optimal transmit antenna selection for massive MIMO wiretap channels
Wang et al. Artificial noise assisted secure transmission for distributed antenna systems
Yan et al. Secret channel training to enhance physical layer security with a full-duplex receiver
Wang et al. Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
Xu et al. Secure massive MIMO communication with low-resolution DACs
Yang et al. Adaptive SM-MIMO for mmWave communications with reduced RF chains
Castanheira et al. Retrospective interference alignment: Degrees of freedom scaling with distributed transmitters
Wu et al. Low-complexity MIMO precoding for finite-alphabet signals
Jing et al. A simple channel independent beamforming scheme with parallel uniform circular array
Feng et al. Large intelligent surface aided physical layer security transmission
Bereyhi et al. On robustness of massive MIMO systems against passive eavesdropping under antenna selection
Mirza et al. On the performance of multiuser MIMO systems relying on full-duplex CSI acquisition
Chen et al. Robust MMSE precoding for massive MIMO transmission with hardware mismatch
Li et al. Robust Tomlinson–Harashima precoding with Gaussian uncertainties for SWIPT in MIMO broadcast channels
Liu et al. Multipair two-way relay networks with very large antenna arrays
Zhang et al. Secure transmission in multi-pair AF relaying massive MIMO networks against active pilot spoofing attacks
Miridakis et al. Zero forcing uplink detection through large-scale RIS: System performance and phase shift design
Mo et al. Secure beamforming for MIMO two-way transmission with an untrusted relay
Fu et al. Robust secure resource allocation for downlink two-user MISO rate-splitting systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant