CN110752865A - Multi-user MIMO communication secrecy method under relay cooperation network - Google Patents
Multi-user MIMO communication secrecy method under relay cooperation network Download PDFInfo
- Publication number
- CN110752865A CN110752865A CN201910986813.5A CN201910986813A CN110752865A CN 110752865 A CN110752865 A CN 110752865A CN 201910986813 A CN201910986813 A CN 201910986813A CN 110752865 A CN110752865 A CN 110752865A
- Authority
- CN
- China
- Prior art keywords
- relay
- interference
- eavesdropping
- terminal
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0452—Multi-user MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
- H04B7/15564—Relay station antennae loop interference reduction
- H04B7/15585—Relay station antennae loop interference reduction by interference cancellation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
The invention discloses a multi-user MIMO communication security method under a relay cooperative network, which considers a more comprehensive application scene in the relay cooperative network, provides a security communication implementation method under the condition that an eavesdropping terminal is configured with different antennas, utilizes a relay to send artificial noise to interfere the eavesdropping terminal to steal useful signals, and eliminates multi-user interference and artificial noise interference based on a distributed interference alignment algorithm. Compared with other methods of transmitting artificial noise by using a transmitting end and a receiving end, the method has the advantages of reducing implementation complexity of the transmitting and receiving ends, and improving system safety while not reducing transmission rate of a main channel.
Description
Technical Field
The invention relates to an interference alignment technology, in particular to a multi-user MIMO communication secrecy method under a relay cooperation network, and belongs to the technical field of wireless communication.
Background
In modern information society, it is becoming increasingly important to securely exchange encrypted information in wireless networks. In addition to or instead of the upper layer encryption method, the physical layer safely utilizes the characteristics of multipath, reciprocity, space uniqueness and the like of a channel to improve the safety of the wireless communication system at the bottom layer. With the explosive growth of mobile devices and data traffic, interference management becomes a critical issue in modern wireless communications. By combining the physical layer security and the interference alignment technology, the problems of secure communication and user interference when a user is intercepted in a Multiple-Input Multiple-Output (MIMO) network can be solved, and therefore the effectiveness and the reliability of the system are improved.
Physical Layer Security (PLS) technical research is mainly developed from aspects of information theory, transmission optimization, power resource allocation and the like. The information theory mainly researches the privacy capacity theory of the system; the transmission optimization and power resource allocation mainly research Artificial Noise (AN), beamforming, security coding and other physical layer security technologies that utilize channel characteristics. Cooperative communication is used as a key technology of next-generation wireless communication, and spatial diversity and significant performance benefits are achieved by using relay forwarding information in the aspects of link stability, spectrum benefits, system capacity, transmission range and the like.
Most of the conventional interference control methods adopt the channel orthogonalization principle. The Interference Alignment (IA) technique reduces the influence of aggregation interference by aligning information sent by multiple source nodes to a low-dimensional subspace at a receiving end. The closed-form solution to interference alignment is difficult to solve, especially when there are a large number of users in the network. Therefore, several iterative algorithms are provided to solve the interference alignment problem, and the complexity of solving a closed interference alignment solution process is reduced. These iterative algorithms are based primarily on a minimum interference leakage criterion, a minimum mean square error criterion, a maximum signal-to-interference-and-noise ratio criterion, and a maximum total rate criterion.
Chinese patent CN 106059705 a discloses a relay physical layer secure transmission method, which analyzes a scheme of relay sending artificial noise interference interception under the condition of only one group of users, and the relay adopts a decoding-forwarding full duplex mode, and can simultaneously send a mixed signal of an expected signal and artificial noise to a destination node while receiving information from a source node. Chinese patent CN 108429708A introduces a green secret communication method for multi-user interference alignment network, which is based on MIMO interference alignment network to transmit artificial noise at the receiving end and perform energy collection at the same time, but increases the energy consumption at the receiving end to affect the quality of the received signal. "Transactions on Wireless Communications" volume 15, No. 8 "Anti-Eave dropping Schemes for Interference Alignment (IA) -Based Wireless networks" proposes an MIMO network Based on Interference Alignment, and a transmitting end sends artificial noise to interfere with an Eavesdropping user, but the method increases the energy consumption of the transmitting end. In signal processing, volume 28, phase 9, physical layer security technology and security area analysis based on receiver artificial noise, a method for transmitting artificial noise by a receiving end is provided, and a new concept of a security area is provided, wherein traversal security capacity analysis is performed on positions of different eavesdroppers, but only the situation of one group of users is discussed in the document. In Chongqing post and telecommunications university newspaper 26, No. 4, DOF (degree of freedom) analysis of two-user relay auxiliary channel based on actual interference alignment technology, a two-user relay auxiliary interference channel model is discussed, and an interference signal is transmitted by a relay to improve the confidentiality rate. Therefore, it is necessary to solve the problems of network security including eavesdropping end among multiple users, energy consumption reduction at the receiving and transmitting points, and communication quality improvement.
Disclosure of Invention
The invention aims to provide a multi-user MIMO communication secrecy method under a relay cooperation network, which ensures the reliability and effectiveness of communication. Aiming at the situation that only one group of users or two groups of users are discussed in the prior art and the defect of large energy consumption of a transmitting and receiving end, the invention provides a method for simultaneously solving the wireless communication safety problem and the MIMO technology interference problem. The method for the safe communication under the two antenna conditions is provided, one condition is that the number of the antennas of the eavesdropping end is smaller than that of the transmitting end and the relay end, the transmitting end and the eavesdropping end have null space at the moment, the relay end does not need to transmit artificial noise, and only the interference from other users is eliminated at the receiving end by utilizing the interference alignment technology. The other situation is that the number of the antennas of the eavesdropping end is larger than that of the transmitting end and the relay end, no null space exists between the transmitting end and the eavesdropping end, the relay end needs to transmit artificial noise to interfere with the eavesdropping user, and the receiving end needs to eliminate interference from other users and interference of the artificial noise.
The purpose of the invention is realized by the following technical scheme:
a multi-user MIMO communication security method in a relay cooperation network comprises K sending ends T, a relay end R, K receiving ends R and an eavesdropping end E, wherein the sending ends are provided with M antennas, the relay ends are provided with S antennas, the receiving ends are provided with N antennas, and the eavesdropping end is provided with L antennas. The number of the antennas of all the nodes is not less than one. The relay terminal R adopts a full duplex amplification forwarding mode, and the data stream d sent by the sending terminal T and the artificial noise data stream d sent by the relay terminal RanAre both smaller than the smaller value of the transmitting end antenna M and the receiving end antenna N. The sending end T and the relay end R know the information of the eavesdropping end E so as to judge whether the eavesdropping channel has a null space or not, thereby determining whether artificial noise needs to be sent to interfere the eavesdropping rate or not and ensuring safe communication.
The multi-user MIMO communication secrecy method under the relay cooperation network comprises the following steps:
the method comprises the following steps: initializing a two-hop MIMO relay network with eavesdropping users, wherein the number of antennas of each node is not less than 1.
Step two: and adopting different secret communication methods according to the comparison of the number of the eavesdropping end, the sending end and the relay antenna.
1) When L < M and L < R, the transmitting end T has a null space to the eavesdropping end E, information can be directly transmitted in the null space of the eavesdropping channel, the eavesdropping end E cannot hear a target signal, and the relay end R does not need to transmit artificial noise at the moment.
In the first time slot, a sending end T broadcasts signals, a relay end R and a receiving end R receive the signals, and an eavesdropping end E eavesdrops the signals.
The signal received by the relay terminal R is:
the signal received by the receiving end r is:
the signal received by the eavesdropping terminal E is as follows:
in the formula PiIndicating the transmitting end TiPower of transmission, E [ | x[i](1)||2]=Pi。For the transmitting end TiThe channel coefficients to the relay peer R,for the transmitting end TiThe channel coefficients to the receiving end r,for the transmitting end TiChannel coefficients to the eavesdropping end E. x is the number of[i](1) To representSending terminal TiA target signal transmitted in a first time slot. n is[R],n[r],n[E]The noise vectors of the relay terminal R, the receiving terminal R and the eavesdropping terminal E respectively have a mean value of 0 and a variance ofIndependent and identically distributed complex Gaussian random variables.
2) When L is larger than or equal to M and L is larger than or equal to R, the transmitting end T has no null space to the eavesdropping end E, and the relay end R needs to transmit artificial noise to interfere the eavesdropping of the eavesdropping end E.
In the first time slot, the sending terminal T sends a signal, and the relay terminal R adopts SiThe root antenna receiving the useful signal, SjThe root antenna receives a self-interference signal, SRThe root antenna transmits the artificial noise.
The relay terminal R receives the signal:
in the formulaFor the channel coefficient from relay R to relay R, z[R](1) Indicates the relay terminal R with power PRTransmitted in the first time slot and containing danA target signal of the data stream.
The signals at the receiving end are:
the signal received by the eavesdropping terminal is as follows:
Step three: 1) and when L is less than M and L is less than R, in the second time slot, the sending end T sends the signal again, the relay end R forwards the signal, the receiving end R receives the signal, and the eavesdropping end E eavesdrops the signal.
The signal received by the receiving end r is:
in the formula x[i](2) Indicating the transmitting end TiThe target signal transmitted in the second time slot,for the channel coefficient, P, from the relay R to the receiver RRFor the transmission power of the relay terminal R, x[R](2)=βyR(1) For the signal forwarded by the relay R β is an amplified forwarding factor.
The signal received by the eavesdropping terminal E is:
in the formulaIs the channel coefficient from the relay end R to the eavesdropping end E.
2) And when L is larger than or equal to M and L is larger than or equal to R, the transmitting end T transmits the signal again in the second time slot, the relay end R transmits the secret data stream by adopting d antennas, the rest (s-d) antennas are used for transmitting artificial noise, and the relay end R does not receive the signal at the moment.
The receiving end r receives signals as follows:
where ρ ∈ (0,1) is the power division factor.
The signal received by the eavesdropping terminal E is as follows:
step four: 1) when L < M and L < R, the receiving end can eliminate the interference of other users when the following conditions are satisfied:
in the formulaA unit precoding matrix representing the ith user transmission target signal and satisfyingA unit precoding matrix representing the target signal transmitted by the kth user and satisfyingA unit interference suppression matrix representing the reception target signal of the kth user and satisfyingIs expressed as U [ 2 ]k]The conjugate transpose matrix of (2). Equivalent channel:a channel matrix representing the ith transmitting terminal T to the kth receiving terminal r,represents the channel matrix from the ith sender T to the relay R,representing the channel matrix from the relay terminal R to the kth receiver terminal R.A channel matrix representing the k-th transmitting terminal T to the k-th receiving terminal r,is shown ask transmit terminal T to relay terminal R channel matrices,representing the channel matrix from the relay terminal R to the kth receiver terminal R. And independent equal distribution (i.i.d) is satisfied between each channel. The interference of other users received by the receiving end r can be realized by a distributed interference alignment algorithm based on a minimum interference leakage criterion, the minimum interference leakage criterion is improved by the invention, and the specific implementation method is as follows:
Step2 the iteration starts.
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
in the formulaA transmit-side precoding matrix representing the reverse link,a channel matrix representing the reverse link.
The above formula representsIs equal toD ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step8 reversing the communication direction to order
Step9, continue iteration, update U[k]And calculating the interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending the iteration.
Step10 output V[k],U[k]。
Step11 otherwise, returning to Step 3.
V to be output[k],U[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
in the formula X[k]Containing d indicating the transmission of the Kth user[k]Signal vectors for each data stream.Represents an Additive White Gaussian Noise (AWGN) vector received by the kth user.
The transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the system security rate is:
2) When L is larger than or equal to M and L is larger than or equal to R, the self-interference problem of the relay terminal R can be eliminated by methods such as antenna interference elimination, radio frequency interference elimination and digital interference elimination. When the following conditions are met, the receiving end can eliminate the interference of other users and artificial noise:
in the formulaThe unit precoding matrix representing the artificial noise transmitted by the relay terminal R and meeting the requirementEquivalent channel:other users and artifacts received at the receiver rThe interference can be realized by a distributed interference alignment algorithm based on a minimum interference leakage criterion, the minimum interference leakage criterion is improved by the invention, and the specific implementation method is as follows:
Step2 the iteration starts.
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
in the formula PanSending artificial noise power for relay terminal R and satisfying Pan=(1-ρ)PR。W[R]A precoding matrix representing the relay transmission noise.
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step6 calculating the uplink k user interference covariance matrixIn the formulaCan be obtained by the following equation:
step7 calculating the uplink k-user interference suppression matrixInterference rejection matrix for artificial noise
the above formula represents U[k],Is equal to Q[k],D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step9, continue iteration, update U[k]、And calculating the interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending the iteration.
Step10 output V[k]、U[k]、W[k]。
Step11 otherwise, returning to Step 3.
V to be output[k]、U[k]、W[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
the transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the safe rate of the system is:
The object of the invention can be further achieved by the following technical measures:
the multi-user MIMO communication security method under the relay cooperation network comprises the following parameter ranges in the first step: k1, 2, N1, 2, S1, 2, L1, 2, 1.M+N-(K+1)d≥0。
In the multi-user MIMO communication confidentiality method under the relay cooperative network, the design criterion of the amplification forwarding factor in the third step is to meet the relay transmission power P while maximizing the strength of the transmitted informationRThe constraint of (2):
the multi-user MIMO communication security method in the relay cooperative network comprises the step three that when the eavesdropping channel has no null space, the signal is transmittedThe second time slot relay terminal R of (1) has power rho PRForwarding the signal at the transmitting end with a power (1-P) PRGenerating artificial noise.
In the fourth step, a matrix form of signals received by the eavesdropping terminal under different conditions is given according to the relation between the number of the E antennas of the eavesdropping terminal, the number of users and data streams sent by the sending terminal T.
1) When L < M, L < R, the eavesdropping channel has a null space.
(1) M is more than L and less than or equal to dK-d +1, and R is more than L and less than or equal to dK-d + 1. At this time, the eavesdropping terminal E cannot eliminate the interference of other users.
At this time, the eavesdropping end E receives a signal matrix form:
in the formulaA unit interference suppression matrix for representing the target signal intercepted by the interception end E and satisfiesRepresents U[k]The conjugate transpose matrix of (2). Equivalent channel:a channel matrix representing the kth transmitting end to the eavesdropping end E,representing the channel matrix from the relay peer R to the eavesdropping peer E.And representing the channel matrix from the ith transmitting terminal T to the eavesdropping terminal E.
(2) M + N ═ d (K +1), dK-d + 1. ltoreq.L < M, dK-d + 1. ltoreq.L < R. The eavesdropping end E is provided with at least (dK-d +1) antennas to eliminate other user interference, but the interference of the main channel information data stream still exists.
At this time, the eavesdropping end E receives a signal matrix form:
2) when L is larger than or equal to M and L is larger than or equal to R, no null space exists in the eavesdropping channel.
(1) And L is more than or equal to M and less than dK-d +1, and R is more than or equal to L and less than dK-d +1, so that the eavesdropping end cannot eliminate the interference of other users and artificial noise.
At this time, the eavesdropping end E receives a signal matrix form:
in the formula Z[R]Meaning that the relay R transmitsSignal vectors for each data stream. Equivalent channel
(2) M + N ═ d (K +1), M ≦ dK-d +1 ≦ L, R ≦ dK-d +1 ≦ L, at this time, the eavesdropping user may eliminate the interference of other users, but cannot eliminate the interference between the main channel information data streams and the interference of artificial noise.
At this time, the eavesdropping end E receives a signal matrix form:
in the multi-user MIMO communication security method in the relay cooperative network, self-interference in step four can adopt a Zero Forcing (ZF) precoding cancellation method in digital interference cancellation, and the main idea of Zero Forcing precoding is to select a non-Zero matrix T at a relayiSatisfy HiiTiWhen 0, the residual self-interference is 0. The ZF precoding scheme has the capability of completely eliminating residual self-interference. Precoding matrix TiMust be aZero matrix, otherwise no signal is transmitted. In order to obtain a non-zero precoding matrix, it should be ensured that the total number of transmit antennas is greater than the sum of receive antennas for the desired signal and receive antennas for the self-interference signal, which is expressed by the following formula:
SR>Si+Sj(41)
at this time, the signal received by the relay terminal R is:
under the sufficient condition, a non-zero space HiiSingular Value Decomposition (SVD):
in the formulanii=SR-SiAnd V isiiIf the middle column vectors are orthogonal to each other, the precoding matrix can be represented as:
T[i]=V[ii]A[ii](44)
in the formula AiiIs non-zero niiThe x L zero forcing precoding matrix (L denotes an average transmitted data symbol).
Compared with the prior art, the method has the advantages that the relays are used for sending the artificial noise to interfere the eavesdropping of the useful signals by the eavesdropping end, and compared with a method for sending the artificial noise by the sending end and the receiving end, the method reduces the energy consumption of the sending end and the receiving end and improves the reliability of the system. By adopting the relay-added cooperative communication, the remote communication quality can be improved. Interference among users in the MIMO communication network can be eliminated by utilizing the interference alignment technology. The invention is more practical, considers more comprehensive conditions and provides a method for safe communication under different antenna numbers.
Drawings
Fig. 1 is a system model diagram of a relay cooperative network of the present invention;
FIG. 2 is a flow chart of a multi-user MIMO communication privacy method in a relay cooperative network;
FIG. 3 is a flow chart of a distributed interference alignment algorithm for eavesdropping on channels with nulls;
fig. 4 is a flow chart of a distributed interference alignment algorithm for eavesdropping channels without nulls.
Detailed Description
The invention is further described with reference to the following figures and specific examples.
As shown in fig. 1, the present invention is a system model diagram of a relay cooperative network.
A relay cooperation network comprises K sending ends T, a relay end R, K receiving ends R and an eavesdropping end E, wherein the sending ends are provided with M antennas, the relay end is provided with S antennas, the receiving ends are provided with N antennas, and the eavesdropping end is provided with L antennas. The number of the antennas of all the nodes is not less than one. The relay terminal R adopts a full duplex amplification forwarding mode, and the data stream d sent by the sending terminal T and the artificial noise data stream d sent by the relay terminal RanAre both smaller than the smaller value of the transmitting end antenna M and the receiving end antenna N. The sending end T and the relay end R know the information of the eavesdropping end E so as to judge whether the eavesdropping channel has a null space or not, thereby determining whether artificial noise needs to be sent to interfere the eavesdropping rate or not and ensuring safe communication.
The invention discloses a multi-user MIMO communication secrecy method under a relay cooperation network, which is shown in figure 2:
the method comprises the following steps: initializing a two-hop MIMO relay network with a wiretap user, wherein the number of antennas of each node is not less than 1, and the values of each parameter are as follows: k-5, M-9, N-8, R-10, d-2, dan=1。
Step two: and adopting different secret communication methods according to the comparison of the number of the eavesdropping end, the sending end and the relay antenna.
1) When L < M and L < R, the transmitting end T has a null space to the eavesdropping end E, information can be directly transmitted in the null space of the eavesdropping channel, the eavesdropping end E cannot hear a target signal, and the relay end R does not need to transmit artificial noise at the moment.
In the first time slot, a sending end T broadcasts signals, a relay end R and a receiving end R receive the signals, and an eavesdropping end E eavesdrops the signals.
The signal received by the relay terminal R is:
the signal received by the receiving end r is:
the signal received by the eavesdropping terminal E is as follows:
in the formula PiIndicating the transmitting end TiPower of transmission, E [ | x[i](1)||2]=Pi。For the transmitting end TiThe channel coefficients to the relay peer R,for the transmitting end TiThe channel coefficients to the receiving end r,for the transmitting end TiChannel coefficients to the eavesdropping end E. x is the number of[i](1) Indicating the transmitting end TiA target signal transmitted in a first time slot. n is[R],n[r],n[E]The noise vectors of the relay terminal R, the receiving terminal R and the eavesdropping terminal E respectively have a mean value of 0 and a variance ofIndependent and identically distributed complex Gaussian random variables.
2) When L is larger than or equal to M and L is larger than or equal to R, the transmitting end T has no null space to the eavesdropping end E, and the relay end R needs to transmit artificial noise to interfere the eavesdropping of the eavesdropping end E.
In the first time slot, the sending terminal T sends a signal, and the relay terminal R adopts SiThe root antenna receiving the useful signal, SjThe root antenna receives a self-interference signal, SRThe root antenna transmits the artificial noise.
The relay terminal R receives the signal:
in the formulaFor the channel coefficient from relay R to relay R, z[R](1) Indicates the relay terminal R with power PRTransmitted in the first time slot and containing danA target signal of the data stream.
The signals at the receiving end are:
the signal received by the eavesdropping terminal is as follows:
Step three: 1) and when L is less than M and L is less than R, in the second time slot, the sending end T sends the signal again, the relay end R forwards the signal, the receiving end R receives the signal, and the eavesdropping end E eavesdrops the signal.
The signal received by the receiving end r is:
in the formula x[i](2) Indicating the transmitting end TiThe target signal transmitted in the second time slot,for the channel coefficient, P, from the relay R to the receiver RRFor the transmission power of the relay terminal R, x[R](2)=βyR(1) β is an amplification forwarding factor for the signal forwarded by the relay terminal R, and the design rule of the amplification forwarding factor is to satisfy the relay transmission power P while maximizing the strength of the transmitted informationRThe constraint of (2):
the signal received by the eavesdropping terminal E is:
2) and when L is larger than or equal to M and L is larger than or equal to R, the transmitting end T transmits the signal again in the second time slot, the relay end R transmits the secret data stream by adopting d antennas, the rest (s-d) antennas are used for transmitting artificial noise, and the relay end R does not receive the signal at the moment.
The receiving end r receives signals as follows:
where ρ ∈ (0,1) is the power division factor.
The signal received by the eavesdropping terminal E is as follows:
step four: 1) when L < M and L < R, the receiving end can eliminate the interference of other users when the following conditions are satisfied:
in the formulaA unit precoding matrix representing the ith user transmission target signal and satisfyingA unit precoding matrix representing the target signal transmitted by the kth user and satisfyingA unit interference suppression matrix representing the reception target signal of the kth user and satisfyingRepresents U[k]The conjugate transpose matrix of (2). Equivalent channel:a channel matrix representing the ith transmitting terminal T to the kth receiving terminal r,represents the channel matrix from the ith sender T to the relay R,representing the channel matrix from the relay terminal R to the kth receiver terminal R.A channel matrix representing the k-th transmitting terminal T to the k-th receiving terminal r,represents the channel matrix from the kth sender T to the relay R,representing the channel matrix from the relay terminal R to the kth receiver terminal R. And independent equal distribution (i.i.d) is satisfied between each channel.
The interference of other users can be eliminated at the receiving end by a distributed interference alignment algorithm, and is implemented by adopting an improved minimum interference leakage criterion, and the specific implementation process is shown in fig. 3:
Step2 the iteration starts.
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
in the formulaA transmit-side precoding matrix representing the reverse link,a channel matrix representing the reverse link.
The above formula representsIs equal toD ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step9, continue iteration, update U[k]And calculating the interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending the iteration.
Step10 output V[k],U[k]。
Step11 otherwise, returning to Step 3.
V to be output[k],U[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
in the formula X[k]Containing d indicating the transmission of the Kth user[k]Signal vectors for each data stream.Represents an Additive White Gaussian Noise (AWGN) vector received by the kth user.
And giving a matrix form of signals received by the eavesdropping terminal E under different conditions according to the relationship between the number of the eavesdropping terminal E antennas and the number of users and the data stream transmitted by the transmitting terminal T.
(1) M is more than L and less than or equal to dK-d +1, and R is more than L and less than or equal to dK-d + 1. At this time, the eavesdropping terminal E cannot eliminate the interference of other users.
At this time, the eavesdropping end E receives a signal matrix form:
in the formulaA unit interference suppression matrix for representing the target signal intercepted by the interception end E and satisfiesRepresents U[E]The conjugate transpose matrix of (2). Equivalent channel:a channel matrix representing the kth transmitting end to the eavesdropping end E,representing the channel matrix from the relay peer R to the eavesdropping peer E.And representing the channel matrix from the ith transmitting terminal T to the eavesdropping terminal E.
(2) M + N ═ d (K +1), dK-d + 1. ltoreq.L < M, dK-d + 1. ltoreq.L < R. The eavesdropping end E is provided with at least (dK-d +1) antennas to eliminate other user interference, but the interference of the main channel information data stream still exists.
At this time, the eavesdropping end E receives a signal matrix form:
the transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the system security rate is:
2) When L is larger than or equal to M and L is larger than or equal to R, the self-interference problem of the relay terminal R can be eliminated by methods such as antenna interference elimination, radio frequency interference elimination and digital interference elimination. Taking Zero Forcing (ZF) precoding cancellation method in digital interference cancellation as an example, the main idea of Zero Forcing precoding is to select a non-Zero matrix T at the relayiSatisfy HiiTiWhen 0, the residual self-interference is 0. The ZF precoding scheme has the capability of completely eliminating residual self-interference. Precoding matrix TiA non-zero matrix is necessary, otherwise no signal is transmitted. In order to obtain a non-zero precoding matrix, it should be ensured that the total number of transmit antennas is greater than the sum of receive antennas for the desired signal and receive antennas for the self-interference signal, which is expressed by the following formula:
SR>Si+Sj(25)
at this time, the signal received by the relay terminal R is:
under the sufficient condition, a non-zero space HiiSingular Value Decomposition (SVD):
in the formulanii=SR-SiAnd V isiiIf the middle column vectors are orthogonal to each other, the precoding matrix can be represented as:
T[i]=V[ii]A[ii](28)
in the formula AiiIs non-zero niiThe x L zero forcing precoding matrix (L denotes an average transmitted data symbol).
When the following conditions are met, the receiving end can eliminate the interference of other users and artificial noise:
in the formulaThe unit precoding matrix representing the artificial noise transmitted by the relay terminal R and meeting the requirementEquivalent channel:
the interference of other users and artificial noise can be eliminated at the receiving end by a distributed interference alignment algorithm, and the implementation is realized by adopting an improved minimum interference leakage criterion, and the specific implementation process is shown in fig. 4:
Step2 the iteration starts.
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
in the formula PanSending artificial noise power for relay terminal R and satisfying Pan=(1-ρ)PR。W[R]A precoding matrix representing the relay transmission noise.
Step4 calculation of the downlink k-user interference suppression matrix
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step6 calculating the uplink k user interference covariance matrixIn the formulaCan be obtained by the following equation:
step7 calculating the uplink k-user interference suppression matrixInterference rejection matrix for artificial noise
the above formula represents U[k],Is equal to Q[k],D ofkAnd the characteristic vectors corresponding to the minimum characteristic values form a matrix.
Step9, continue iteration, update U[k]、And calculating the interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending the iteration.
Step10 output V[k]、U[k]、W[k]。
Step11 otherwise, returning to Step 3.
V to be output[k]、U[k]、W[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
and giving a matrix form of signals received by the eavesdropping terminal E under different conditions according to the relation between the eavesdropping terminal E antenna and the number of users and the data stream transmitted by the transmitting terminal T.
(1) L is more than or equal to M and less than dK-d +1, R is more than or equal to L and less than dK-d +1, and the eavesdropping end E cannot eliminate the interference of other users and artificial noise.
At this time, the eavesdropping end E receives a signal matrix form:
in the formula Z[R]Meaning that the relay R transmitsSignal vectors for each data stream. Equivalent channel
(2) M + N ═ d (K +1), M ≦ dK-d +1 ≦ L, R ≦ dK-d +1 ≦ L, and the eavesdropping peer E may eliminate the interference of other users, but cannot eliminate the interference between the main channel information data streams and the interference of artificial noise.
At this time, the eavesdropping end E receives a signal matrix form:
the transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the safe rate of the system is:
In addition to the above embodiments, the present invention may have other embodiments, and any technical solutions formed by equivalent substitutions or equivalent transformations fall within the scope of the claims of the present invention.
Claims (6)
1. A multi-user MIMO communication secrecy method under a relay cooperation network comprises K sending terminals T and a relay terminalR, K receiving terminals R, a wiretap terminal E, a sending terminal equipped with M antennas, a relay terminal equipped with S antennas, a receiving terminal equipped with N antennas, a wiretap terminal equipped with L antennas, the number of antennas of all nodes is not less than one, the relay terminal R adopts a full duplex amplification forwarding mode, a data stream d sent by a sending terminal T and an artificial noise data stream d sent by the relay terminal RanAll be less than the less value in sending end antenna M, the receiving end antenna N, sending end T and relay R are known to eavesdrop end E's information to this judges to eavesdrop the channel and whether have the null space, thereby decides whether to send artificial noise and disturb its eavesdrop rate, guarantees the safety communication, its characterized in that, relay cooperation network following multiuser MIMO communication secret method contains the following step:
the method comprises the following steps: initializing a two-hop MIMO relay network with eavesdropping users, wherein the number of antennas of each node is not less than 1;
step two: adopting different secret communication methods according to the comparison of the number of the eavesdropping end with the number of the sending end and the relay antenna;
1) when L < M and L < R, the transmitting end T has null space to the eavesdropping end E, the information can be directly transmitted in the null space of the eavesdropping channel, the eavesdropping end E can not hear the target signal, and the relay end R does not need to transmit artificial noise,
in the first time slot, the sending terminal T broadcasts signals, the relay terminal R and the receiving terminal R receive the signals, the interception terminal E intercepts the signals,
the signal received by the relay terminal R is:
the signal received by the receiving end r is:
the signal received by the eavesdropping terminal E is as follows:
in the formula PiIndicating the transmitting end TiPower of transmission, E [ | x[i](1)||2]=Pi。For the transmitting end TiThe channel coefficients to the relay peer R,for the transmitting end TiThe channel coefficients to the receiving end r,for the transmitting end TiChannel coefficient, x, to eavesdropping end E[i](1) Indicating the transmitting end TiTarget signal, n, transmitted in a first time slot[R],n[r],n[E]The noise vectors of the relay terminal R, the receiving terminal R and the eavesdropping terminal E respectively have a mean value of 0 and a variance ofIndependent and identically distributed complex Gaussian random variables;
2) when L is more than or equal to M and L is more than or equal to R, the transmitting end T has no null space to the eavesdropping end E, the relay end R needs to transmit artificial noise to interfere the eavesdropping of the eavesdropping end E,
in the first time slot, the sending terminal T sends a signal, and the relay terminal R adopts SiThe root antenna receiving the useful signal, SjThe root antenna receives a self-interference signal, SRThe root antenna transmits the artificial noise and,
the relay terminal R receives the signal:
in the formulaFor the channel coefficient from relay R to relay R, z[R](1) Indicating relayingTerminal R is supplied with power PRTransmitted in the first time slot and containing danThe target signal of the data stream is,
the signals at the receiving end are:
the signal received by the eavesdropping terminal is as follows:
in the formulaThe channel coefficient from the relay terminal R to the eavesdropping terminal E is obtained;
step three: 1) when L < M and L < R, the transmitting end T sends the signal again, the relay end R forwards the signal, the receiving end R receives the signal, the eavesdropping end E eavesdrops the signal,
the signal received by the receiving end r is:
in the formula x[i](2) Indicating the transmitting end TiThe target signal transmitted in the second time slot,for the channel coefficient, P, from the relay R to the receiver RRFor the transmission power of the relay terminal R, x[R](2)=βyR(1) For signals forwarded by the relay peer R, β for an amplified forwarding factor,
the signal received by the eavesdropping terminal E is:
in the formulaThe channel coefficient from the relay terminal R to the eavesdropping terminal E is obtained;
2) when L is larger than or equal to M and L is larger than or equal to R, the transmitting end T transmits signals again in the second time slot, the relay end R adopts d antennas to transmit the secret data stream, the rest s-d antennas are used for transmitting artificial noise, the relay end R does not receive the signals,
the receiving end r receives signals as follows:
where p e (0,1) is the power allocation factor,
the signal received by the eavesdropping terminal E is as follows:
step four: 1) when L < M and L < R, the receiving end can eliminate the interference of other users when the following conditions are satisfied:
in the formulaA unit precoding matrix representing the ith user transmission target signal and satisfyingA unit precoding matrix representing the target signal transmitted by the kth user and satisfyingA unit interference suppression matrix representing the reception target signal of the kth user and satisfyingRepresents U[k]Conjugate transpose matrix of (2), equivalent channel:a channel matrix representing the ith transmitting terminal T to the kth receiving terminal r,represents the channel matrix from the ith sender T to the relay R,representing the channel matrix from the relay terminal R to the kth receiver terminal R,a channel matrix representing the k-th transmitting terminal T to the k-th receiving terminal r,represents the channel matrix from the kth sender T to the relay R,the channel matrix from the relay terminal R to the kth receiving terminal R is represented, and each channel satisfies independent equal distribution (i.i.d), and the interference of other users received by the receiving terminal R can be realized by a distributed interference alignment algorithm based on a minimum interference leakage criterion, and the specific implementation method is as follows:
Step2, starting iteration;
step3 calculation of interference covariance matrix for downlink k users
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkA matrix composed of eigenvectors corresponding to the minimum eigenvalues;
in the formulaA transmit-side precoding matrix representing the reverse link,a channel matrix representing a reverse link;
The above formula representsIs equal toD ofkA matrix composed of eigenvectors corresponding to the minimum eigenvalues;
Step9, continue iteration, update U[k]Calculating an interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending iteration;
step10 output V[k],U[k];
Step11 otherwise return to Step3,
v to be output[k],U[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
in the formula X[k]Containing d indicating the transmission of the Kth user[k]The signal vectors of the individual data streams,representing the additive white gaussian noise vector received by the kth user,
the transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the system security rate is:
2) When L is larger than or equal to M and L is larger than or equal to R, the self-interference problem of the relay terminal R is eliminated by an antenna interference elimination or radio frequency interference elimination or digital interference elimination method, and when the following conditions are met, the receiving terminal can eliminate the interference of other users and artificial noise:
in the formulaThe unit precoding matrix representing the artificial noise transmitted by the relay terminal R and meeting the requirementEquivalent channel:the interference of other users and artificial noise received by the receiving end r can be realized by a distributed interference alignment algorithm based on a minimum interference leakage criterion, and the specific implementation method is as follows:
Step2, starting iteration;
In the formula Q[k](1),Q[k](2) Can be obtained by the following equation:
in the formula PanSending artificial noise power for relay terminal R and satisfying Pan=(1-ρ)PR,W[R]A precoding matrix representing relay transmission noise;
In the formula of U[k](1),U[k](2) Can be obtained by the following formula
The above formula represents U[k]Is equal to Q[k]D ofkA matrix composed of eigenvectors corresponding to the minimum eigenvalues;
Step6 calculating the uplink k user interference covariance matrixIn the formulaCan be obtained by the following equation:
step7 calculating the uplink k-user interference suppression matrixInterference rejection matrix for artificial noise
the above formula represents U[k],Is equal to Q[k],D ofkA matrix composed of eigenvectors corresponding to the minimum eigenvalues;
Step9, continue iteration, update U[k]、Calculating an interference leakage value until the interference leakage value is smaller than a given threshold value, namely converging, and ending iteration;
step10 output V[k]、U[k]、W[k];
Step11 otherwise return to Step3,
v to be output[k]、U[k]、W[k]Substituting:
the objective function for minimizing interference leakage is:
at this time, the matrix form of the received signal at the receiving end r is:
the transmission rate of the kth user is:
the interception rate of the interception end is as follows:
the safe rate of the system is:
3. the method for multi-user MIMO communication security in relay cooperative network as claimed in claim 1, wherein the design criteria of the amplify-and-forward factor in the third step is to satisfy the relay transmission power P while maximizing the transmission information strengthRThe constraint of (2):
4. the method as claimed in claim 1, wherein the relay peer R of the second timeslot of the transmission signal uses power pp when the eavesdropping channel has no null space in the third stepRThe signal of the transmitting terminal T is forwarded with a power (1-rho) PRGenerating artificial noise.
5. The multi-user MIMO communication security method in the relay cooperative network as claimed in claim 1, wherein in the fourth step, according to the relationship between the number of eavesdropping end E antennas, the number of users, and the data stream sent by the sending end T, a matrix form of the eavesdropping end received signal under different conditions is given:
1) when L < M, L < R, there is null space in the eavesdropping channel,
(1) m is more than L and less than or equal to dK-d +1, R is more than L and less than or equal to dK-d +1, at the moment, the eavesdropping end E can not eliminate the interference of other users,
at this time, the eavesdropping end E receives a signal matrix form:
in the formulaA unit interference suppression matrix for representing the target signal intercepted by the interception end E and satisfies Represents U[k]Conjugate transpose matrix of (2), equivalent channel:a channel matrix representing the kth transmitting end to the eavesdropping end E,a channel matrix representing the relay peer R to the eavesdropping peer E,representing a channel matrix from the ith sending terminal T to the eavesdropping terminal E;
(2) m + N ═ d (K +1), dK-d +1 ≦ L < M, dK-d +1 ≦ L < R, the eavesdropping end E is equipped with at least (dK-d +1) antennas to eliminate other user interference, but the interference of the main channel information data stream still exists,
at this time, the eavesdropping end E receives a signal matrix form:
2) when L is more than or equal to M and L is more than or equal to R, no null space exists in the eavesdropping channel,
(1) l is more than or equal to M and less than dK-d +1, R is more than or equal to L and less than dK-d +1, at the moment, the eavesdropping end can not eliminate the interference of other users and artificial noise,
at this time, the eavesdropping end E receives a signal matrix form:
in the formula Z[R]Meaning that the relay R transmitsSignal vectors of individual data streams, equivalent channels
(2) M + N ≦ d (K +1), M ≦ dK-d +1 ≦ L, R ≦ dK-d +1 ≦ L, at this time, the eavesdropping user may eliminate the interference of other users, but cannot eliminate the interference between the main channel information data streams and the interference of artificial noise,
at this time, the eavesdropping end E receives a signal matrix form:
6. the multi-user MIMO communication security method in the relay cooperation network as claimed in claim 1, wherein the self-interference in the fourth step can be zero-forcing precoding cancellation method in digital interference cancellation, and the main idea of zero-forcing precoding is to select a non-zero matrix T at the relayiSatisfy HiiTiWhen 0, the residual self-interference is 0, the ZF precoding scheme has the capability of completely eliminating the residual self-interference, and the precoding matrix TiA non-zero matrix is required, otherwise no signal is transmitted, and in order to obtain a non-zero precoding matrix, the total number of transmitting antennas is ensured to be greater than the sum of receiving antennas of the useful signal and receiving antennas of the self-interference signal, which is expressed by the formula:
SR>Si+Sj(41)
at this time, the signal received by the relay terminal R is:
under the sufficient condition, a non-zero space HiiSingular Value Decomposition (SVD):
in the formulanii=SR-SiAnd V isiiIf the middle column vectors are orthogonal to each other, the precoding matrix can be represented as:
T[i]=V[ii]A[ii](44)
in the formula AiiIs non-zero niiThe x L zero-forcing precoding matrix, L denotes an average transmitted data symbol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910986813.5A CN110752865B (en) | 2019-10-17 | 2019-10-17 | Multi-user MIMO communication confidentiality method under relay cooperative network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910986813.5A CN110752865B (en) | 2019-10-17 | 2019-10-17 | Multi-user MIMO communication confidentiality method under relay cooperative network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110752865A true CN110752865A (en) | 2020-02-04 |
CN110752865B CN110752865B (en) | 2023-07-25 |
Family
ID=69278657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910986813.5A Active CN110752865B (en) | 2019-10-17 | 2019-10-17 | Multi-user MIMO communication confidentiality method under relay cooperative network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110752865B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970035A (en) * | 2020-07-14 | 2020-11-20 | 重庆邮电大学 | Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN112564799A (en) * | 2020-12-01 | 2021-03-26 | 江苏科技大学 | Method for inhibiting peak-to-average power ratio of visible light MIMO-OFDM system |
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN114786213A (en) * | 2022-04-27 | 2022-07-22 | 重庆邮电大学 | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network |
CN115865581A (en) * | 2022-11-02 | 2023-03-28 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107248875A (en) * | 2017-05-12 | 2017-10-13 | 东南大学 | A kind of multiple antennas relay system safety of physical layer design method based on signal to noise ratio |
CN108337023A (en) * | 2018-01-24 | 2018-07-27 | 大连理工大学 | Safety communicating method based on multi-user multi-aerial communication system and secrecy beamforming design |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
-
2019
- 2019-10-17 CN CN201910986813.5A patent/CN110752865B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107248875A (en) * | 2017-05-12 | 2017-10-13 | 东南大学 | A kind of multiple antennas relay system safety of physical layer design method based on signal to noise ratio |
CN108337023A (en) * | 2018-01-24 | 2018-07-27 | 大连理工大学 | Safety communicating method based on multi-user multi-aerial communication system and secrecy beamforming design |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113193952A (en) * | 2020-04-15 | 2021-07-30 | 电子科技大学 | High-security communication method capable of resisting infinite eavesdropping antenna and cooperative eavesdropping |
CN111970035A (en) * | 2020-07-14 | 2020-11-20 | 重庆邮电大学 | Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system |
CN111970035B (en) * | 2020-07-14 | 2022-05-03 | 重庆邮电大学 | Method for optimizing precoding matrix of MIMO full-duplex bidirectional secure communication system |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN112564799A (en) * | 2020-12-01 | 2021-03-26 | 江苏科技大学 | Method for inhibiting peak-to-average power ratio of visible light MIMO-OFDM system |
CN114786213A (en) * | 2022-04-27 | 2022-07-22 | 重庆邮电大学 | Safety transmission method based on artificial noise and dynamic power distribution in multi-user interference network |
CN115865581A (en) * | 2022-11-02 | 2023-03-28 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
CN115865581B (en) * | 2022-11-02 | 2024-04-19 | 电子科技大学 | Artificial noise elimination method based on principal component analysis |
Also Published As
Publication number | Publication date |
---|---|
CN110752865B (en) | 2023-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109743729B (en) | Secret transmission method of wireless energy-carrying cooperative system | |
CN110752865B (en) | Multi-user MIMO communication confidentiality method under relay cooperative network | |
Zheng et al. | Rethinking the role of interference in wireless networks | |
Mobini et al. | Beamforming design and performance analysis of full-duplex cooperative NOMA systems | |
CN110519756B (en) | Physical layer safety transmission method of full duplex relay network | |
Ahmed et al. | Performance analysis of full-duplex-MRC-MIMO with self-interference cancellation using null-space-projection | |
Fang et al. | Massive MIMO for full-duplex cellular two-way relay network: A spectral efficiency study | |
Li et al. | When and how much to neutralize interference? | |
CN108631825B (en) | Physical layer safety transmission method for enhancing bidirectional AF relay cooperation wireless communication system | |
CN108092928B (en) | Aggregation interference-oriented interference management method, hybrid cellular network and wireless local area network | |
Li et al. | Multi-pair two-way massive MIMO relaying with hardware impairments over Rician fading channels | |
CN104202277A (en) | Design method for secondary user network linear transceiver with cognitive relay network | |
Nosrat-Makouei et al. | User admission in MIMO interference alignment networks | |
Lee et al. | Active interference cancellation for full-duplex multiuser networks with or without existence of self-interference | |
Li et al. | Decoding interfering signals with fewer receiving antennas | |
Duarte et al. | Cloud-aided multi-way multiple-antenna relaying with best-user link selection and joint ML detection | |
Qian et al. | Energy-efficient antenna selection in green MIMO relaying communication systems | |
Xu et al. | Optimal Grassmann manifold eavesdropping: A huge security disaster for M-1-2 wiretap channels | |
CN111404588A (en) | Physical layer secure transmission method of full-duplex cognitive eavesdropping network | |
Ha et al. | On the interference alignment designs for secure multiuser MIMO systems | |
Taneja et al. | A reduced hardware complexity algorithm with improved outage probability for 5G communication system | |
Zhang et al. | Decorrelating receiver of interference mitigation in MMwave small cells networks | |
Cai et al. | Joint interference suppression and power allocation techniques for multiuser multiantenna relay broadcast systems | |
Lin et al. | X-structured precoder designs for spatial-multiplexing MIMO and MIMO relay systems | |
Jimenez et al. | Non-linear precoding approaches for non-regenerative multiuser MIMO relay systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |