CN111756424B - Millimeter wave cloud wireless access network beam design method based on secure transmission - Google Patents
Millimeter wave cloud wireless access network beam design method based on secure transmission Download PDFInfo
- Publication number
- CN111756424B CN111756424B CN202010149997.2A CN202010149997A CN111756424B CN 111756424 B CN111756424 B CN 111756424B CN 202010149997 A CN202010149997 A CN 202010149997A CN 111756424 B CN111756424 B CN 111756424B
- Authority
- CN
- China
- Prior art keywords
- base station
- constraint
- convex
- constraints
- representing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/06—TPC algorithms
- H04W52/14—Separate analysis of uplink or downlink
- H04W52/143—Downlink power control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/18—TPC being performed according to specific parameters
- H04W52/26—TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service]
- H04W52/267—TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service] taking into account the information rate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
- H04W52/32—TPC of broadcast or control channels
- H04W52/327—Power control of multicast channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
- H04W52/34—TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/38—TPC being performed in particular situations
- H04W52/42—TPC being performed in particular situations in systems with time, space, frequency or polarisation diversity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/542—Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the field of network transmission, in particular to a millimeter wave cloud wireless access network beam design method based on safe transmission, which comprises the following steps: establishing a system model, and the second step: analog beam design, and the third step: secret rate transmission problems; through the design of each step, the secret rate of maximizing information transmission is achieved.
Description
Technical Field
The invention relates to the field of network transmission, in particular to a millimeter wave cloud wireless access network beam design method based on safe transmission.
Background
With the rapid rise of mobile internet services, various mobile applications have higher and higher requirements on data rates, and a Cloud radio access network (C-RAN) technology is proposed as an effective solution. In the C-RAN, a Central processing unit (CP) performs resource optimization configuration by using Channel State Information (CSI), so as to improve Spectral Efficiency (SE) of the system. In addition, with the deployment of ultra-dense base stations, interference among the base stations can be effectively solved by using a Coordinated multiple-point (CoMP) technology, that is, adjacent base stations are used to form a base station cluster and are combined to provide services for users. In the C-RAN, a CP transmits data to a base station through a forward link, while a plurality of base stations cooperate to collectively provide a service to a user. At this time, two basic issues need to be considered: forward/access link selection and data sharing schemes. In consideration of the characteristics of different frequency carriers and forward/access links, low-frequency microwaves and high-frequency millimeter waves are respectively adopted as carriers of the forward link and the access link. In addition, for data sharing between the CP and the base station cluster, when multiple base stations cooperatively serve one user, the CP must send information required by the user to all the cooperative base stations, and such point-to-multipoint forward transmission can be implemented by multicast technology. Therefore, the invention combines the forward microwave multicast transmission technology to establish a millimeter wave C-RAN system based on the cooperation of the base station. A Physical Layer Security (PLS) is proposed to enhance security of wireless communication because an Eavesdropper (Eve) may eavesdrop user information due to a broadcasting characteristic of wireless communication, and its core idea is to prevent an illegal user from eavesdropping information by designing a beam using randomness of a wireless channel. Although various designs for PLS exist today, there are still some other challenges, such as hybrid analog/digital Beamforming (BF) design, artificial noise, multicast BF design, etc. In order to solve the challenges, the invention researches the design problem of safe millimeter wave C-RAN safe BF based on microwave multicast forwarding, and aims to invent a combined beam design scheme to maximize the confidentiality rate of information transmission.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and designs a millimeter wave cloud wireless access network beam design method based on safe transmission.
The aim of the invention is achieved by the following measures: a millimeter wave cloud wireless access network beam design method based on secure transmission comprises the following steps:
the first step is as follows: system model building
In the microwave multicast forward link, the forward link channel vector from the CP to the l base station is recorded asThe multicast BF vector sent from CP to base station cluster is recorded asx0Is E { | x0|2The multicast signal of 1, the signal received by the l base station is shown as (1), nlIs satisfied with CN (0, N)0) Independently equally distributed Additive White Gaussian Noise (AWGN),
let the downlink microwave bandwidth be WmcThen the forward rate available to the ith base station is:
since the forward multicast rate is limited by the base station under the worst channel conditions, the CP provides the forward rate as:
wherein L ═ { 1.., L } represents a set of base stations;
in the millimeter wave access link, the received signal of the kth user is:
whereinRepresenting the channel vectors from the L base stations to the k user,representing the channel vectors from the l base station to the k user,representing artificial noise vectors sent by a base station cluster, assuming that q belongs to CN (0, A), A represents an artificial noise covariance matrix to be optimized,and xiRespectively representing the digital BF vector and the signal required by the k-th user, nkIs an AWGN that satisfies the independent same distribution,is a simulated BF, in a specific form as shown in (5), whereinRepresents an analog BF vector designed by the l-th base station, and flAll elements of (a) have the same amplitude but different phases, i.e.M ═ { 1.. M } is the set of antennas for each base station, fl(m) represents flThe mth element of (1);
the achievable rate for the kth user is:
Wmmrepresents a millimeter wave bandwidth;
in this context, a millimeter wave channel model with C scattering clusters is employed, wherein each scattering cluster comprises a propagation path, and thus, a millimeter wave channelCan be expressed as:
whereinThe complex gain of the c-th path is shown,is the azimuth of arrival of the c-th path,the antenna array steering vector is represented, the concrete form is shown as (11), d and lambda respectively represent the distance between antennas and the signal wavelength; further, the channel model expression of Eve is similar to (10).
The second step is that: analog beam design
In practice only quantized phase can be achieved, so we assume that a B-bit quantization phase shifter is used and that the non-zero elements of F should belong to
According to (5), analog BF must be designed for L base stations, respectively, and for the k-th user,the array can thus be re-maximized by appropriate selection of the best quantization phase from (12)For example, the analog BF vector f of the l-th base stationlIs shown as (13), where & (·) represents the angle:
thus, f can be obtainedl(m) As shown in (14):
in order to ensure fairness of users, the BF designed for L base stations should not only maximize array gain of a single user, but also allocate at least one base station to each user to maximize array gain thereof;
the third step: secret rate transmission problem
Firstly, a Secret Rate Maximization (SRM) problem is formulated under the constraint of total base station transmitting power and CP transmitting power, then a convex approximation technology and Semi-definite programming (SDP) relaxation are adopted to convert the problem, an iterative algorithm is adopted to carry out joint optimization, and an original solution and a dual optimal solution of the SDP relaxation problem are utilized to construct a solution of the original problem.
Preferably, in the first step of system modeling, Eve tries to eavesdrop the information of the kth user, and the signal received by the z-th Eve is:
whereinShowing the channel vectors from the lth base station to the z-th Eve,representing the channel vectors from the l base station to the z-th Eve;
the interception capacity of the kth user intercepted by the z-th Eve is as follows:
finally, the privacy rate that the kth user can achieve is:
Preferably, in the third step of secret rate transmission, the iterative SRM algorithm involved comprises the following specific steps:
the method comprises the following steps: problem planning under total base station transmit power constraint
After designing the analog BF, the equivalent channel of the kth user can be obtainedThe z-th Eve equivalent channel isAssuming that the multicast forward transmission time frame includes K time slots, and each time slot is used for transmitting a message of a single user from the CP to the L cooperative base stations, it is assumed that the frame length and the K-th time slot length are 1 and t, respectivelyk,Then, according to certain constraints, the achievable capacity of the kth user must be smaller than the capacity provided by the CP for the kth userThe transfer capacity, and therefore (15),representing a set of users:
from (15), a constraint (16) can be derived:
finally, the design problem of combining BF and artificial noise variance of the maximized secret keeping rate is provided;
wherein (17b) represents the fronthaul capacity constraint, (17c) is the total transmit power constraint of the L cooperative base stations, and (17d) represents the CP transmit power constraint, but the direct solution (17) is difficult due to the non-convexity of the objective function (17a) and the constraint (17 b);
step two: transformation and solution of problem (17)
First, the objective function (17a) is converted into the form (18):
then define BF matrixAndrestating the problem (17) as a problem (20), wherein||Fvk||2=Tr(FHFVk)=Tr(Vk);
However, due to the non-convexity of (20a), (20b), (20c), (20f) and (20h), the problem (20) is difficult to solve, the transformation (20b) is first transformed into a convex constraint, by introducing the auxiliary variable { εkThe following transformations can be obtained:
it is thus possible to convert (21a) into a convex constraint (23):
it can be seen that (24a) is a convex constraint, for (24b), the quadratic term is developed by a first order Taylor seriesMay be (25):
the nonlinear constraint (24c) may be converted to a convex Linear Matrix Inequality (LMI) constraint (27):
finally, by introducing an auxiliary variable { τ }kThe } and ω can transform the problem (20) into an optimization problem (28), whereη=Wmc/Wmm:
(20d)-(20g),(21b),(23),(24a),(26),(27) (28e)
Due to log (1+ beta)k) Andsince the objective function (28a) is a convex function, the objective function is composed of a Difference of convexity problem (DC), and the DC process is usually solved by using a Constrained concave-convex process (CCCP), so that the actual DC process is realizedIndeed, the main idea of CCCP is to solve the convex problem by converting (28a) to a convex function and then iteratively until the result converges; based on this, consider toUsing a first order Taylor approximation, as shown in (29), whereinTo representThe nth iteration:
the objective function may then be converted to a convex function (30):
constraint (28d) is also a DC program, which can similarly be converted to convex constraint (31):
by introducing an auxiliary variable thetakAnd { lambda } andk}, (28b) may be decomposed into constraints (32):
according to (25), (26), (27), the non-convex constraints (32b) and (32c) can be transformed into convex constraints (33) and (34), whereinIs λkThe nth iteration:
finally, the SRM problem can be translated into the following problem:
s.t.(20d)-(20g),(21b),(23),(24a),(26),(27),(28c),(32a),(33),(34) (35b)
in (35), only the rank constraint (20f) is non-convex, by SDP relaxation (i.e. removing the rank-one constraint), (35) will become a convex optimization problem, which can be solved by standard convex optimization techniques, and finally, to obtain a solution (17) to the optimization problem, the solution (35) must be iteratively solved, specifically, a feasible solution is initialized firstThe optimal solution (35) can be obtained by a classical convex optimization algorithm and then updated according to the solution obtained in the previous iteration Until the result converges or the iteration index reaches its maximum value; in addition, due to(35) without rank constraint is a convex optimization problem, so iteratively updating all variables will increase or at least maintain the value of the objective function in (35); given a limited transmit power, the value of the objective function should be a monotonically non-decreasing sequence with an upper bound that converges to an at least locally optimal fixed solution;
step three: problem calculation and solution under constraint of transmitting power of each base station
In the foregoing, the total transmit power constraint of L base stations is considered, and although this allows more flexible allocation of power to base stations under the total transmit power constraint, each base station has a high power transmit power limit for practical purposes. Therefore, considering the transmit power constraint of each base station more realistic, the definition of B is as shown in (36):
the power constraint (20d) for each base station can be written in the form of (37), whereRepresents the ith base station maximum transmission power:
then, under the transmit power constraint of each base station, the SRM problem is formulated (38):
s.t.(17b)-(17d),(37) (38b)
finally, the convex optimization problem described above can be solved iteratively using the algorithm in step two to obtain a solution to the original problem (38).
The invention has the beneficial effects that: firstly, the method comprises the following steps: a C-RAN based on base station cooperative transmission in the microwave multicast forward direction is provided, wherein adjacent base stations form a cooperative cluster and serve users together by means of millimeter wave carriers, and the base stations receive forward data from a CP through microwave multicast. Secondly, the method comprises the following steps: a safe millimeter wave cloud wireless access network downlink safe BF design method based on microwave multicast forwarding is researched, and an advanced analog BF design scheme is provided. Thirdly, the method comprises the following steps: the multicast BF, the digital BF and the artificial noise covariance are jointly optimized, and the information transmission secret rate is maximized under the constraint of the total base station and the transmitting power of each base station. Fourthly: the ideal CSI of the Eve connection is replaced by the imperfect CSI, and the SRM problem under the worst condition is considered, so that the method is more practical and meaningful.
Drawings
FIG. 1 is a diagram of a model of a system contemplated by the present invention;
FIG. 2 is a flow chart of an analog beam design algorithm for L cooperative base stations of the present invention;
FIG. 3 is a flow chart of an iterative algorithm proposed using the present invention;
FIG. 4 is a graph of the effectiveness of the privacy ratio versus the number of iterations obtained using the present invention;
FIG. 5 is a graph of the effect of secret keeping rate versus total allowed transmit power for L base stations obtained using the present invention;
FIG. 6 is a graph of the effect of secret ratio versus allowable transmit power of a CP obtained using the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1: as shown in fig. 1-6, the design of the present invention is under a C-RAN downlink system depending on a central CP, the system diagram is as shown in fig. 1, the system is composed of L cooperative base stations to form a base station cluster, wherein all the base stations provide services for K single-antenna users together through cooperative millimeter wave BF, and we assume that Eve with Z single antennas may eavesdrop the user's message. The CP equipped with N antennas first transmits the user-required information to base stations, each equipped with a single RA and M TAs, over a microwave multicast forward link. Assume that one RF serves M TAs through a set of phase shifters. The method comprises the following specific steps:
the first step is as follows: system model building
In the microwave multicast forward link, the forward link channel vector from the CP to the l base station is recorded asThe multicast BF vector sent from CP to base station cluster is recorded asx0Is E { | x0|2The multicast signal of 1, the signal received by the l base station is shown as (1), nlIs satisfied with CN (0, N)0) Independently equally distributed Additive White Gaussian Noise (AWGN),
let the downlink microwave bandwidth be WmcThen the forward rate available to the ith base station is:
since the forward multicast rate is limited by the base station under the worst channel conditions, the CP provides the forward rate as:
wherein L ═ { 1.., L } represents a set of base stations;
in the millimeter wave access link, the received signal of the kth user is:
whereinRepresenting the channel vectors from the L base stations to the k user,representing the channel vectors from the l base station to the k user,representing artificial noise vectors sent by a base station cluster, assuming that q is equal to CN (0, Λ), and Λ represents an artificial noise covariance matrix to be optimized,and xiRespectively representing the digital BF vector and the signal required by the k-th user, nkIs an AWGN that satisfies the independent same distribution,is a simulated BF, in a specific form as shown in (5), whereinRepresents an analog BF vector designed by the l-th base station, and flAll elements of (a) have the same amplitude but different phases, i.e.M ═ { 1.. M } is the set of antennas for each base station, fl(m) represents flThe mth element of (1);
the achievable rate for the kth user is:
Wmmrepresents a millimeter wave bandwidth;
on the other hand, Eve tries to eavesdrop on the information of the kth user, and the signal received by the z-th Eve is:
whereinShowing the channel vectors from the lth base station to the z-th Eve,representing the channel vectors from the l base station to the z-th Eve;
the interception capacity of the kth user intercepted by the z-th Eve is as follows:
finally, the privacy rate that the kth user can achieve is:
In this context, a millimeter wave channel model with C scattering clusters is employed, wherein each scattering cluster comprises a propagation path, and thus, a millimeter wave channelCan be expressed as:
whereinThe complex gain of the c-th path is shown,is the azimuth of arrival of the c-th path,the antenna array steering vector is represented, the concrete form is shown as (11), d and lambda respectively represent the distance between antennas and the signal wavelength; further, the channel model expression of Eve is similar to (10).
The second step is that: analog beam design
In practice only quantized phase can be achieved, so we assume that a B-bit quantization phase shifter is used and that the non-zero elements of F should belong to
According to (5), analog BF must be designed for L base stations, respectively, and for the k-th user,therefore we can again maximize the array by appropriately selecting the best quantization phase from (12)For example, the simulated BF of the l-th base stationQuantity flIs shown as (13), where & (·) represents the angle:
thus, f can be obtainedl(m) As shown in (14):
the specific design scheme of the analog BF is shown in fig. 2, in order to ensure fairness of users, the BF designed for L base stations should not only maximize array gain of a single user, but also allocate at least one base station to each user to maximize array gain thereof;
the third step: secret rate transmission problem
Firstly, a Secret Rate Maximization (SRM) problem is formulated under the constraint of total base station transmitting power and CP transmitting power, then a convex approximation technology and Semi-definite programming (SDP) relaxation are adopted to convert the problem, an iterative algorithm is adopted to carry out joint optimization, and an original solution and a dual optimal solution of the SDP relaxation problem are utilized to construct a solution of the original problem. Finally, considering the transmission power constraint of each base station, an effective iterative SRM algorithm is designed, and the specific steps are as follows:
the method comprises the following steps: problem planning under total base station transmit power constraint
After designing the analog BF, the equivalent channel of the kth user can be obtainedThe z-th Eve equivalent channel isAssuming that the multicast forward transmission time frame includes K time slots, and each time slot is used for transmitting a message of a single user from the CP to L cooperative base stations, assuming a frame length and a K-th timeGap lengths of 1 and t, respectivelyk,Then, according to certain constraints, the achievable capacity of the kth user must be smaller than the forwarding capacity provided by the CP for the kth user, and therefore (15) is available,representing a set of users:
from (15), a constraint (16) can be derived:
finally, the design problem of combining BF and artificial noise variance of the maximized secret keeping rate is provided;
wherein (17b) represents the fronthaul capacity constraint, (17c) is the total transmit power constraint of the L cooperative base stations, and (17d) represents the CP transmit power constraint, but the direct solution (17) is difficult due to the non-convexity of the objective function (17a) and the constraint (17 b);
step two: transformation and solution of problem (17)
First, the objective function (17a) is converted into the form (18):
then define BF matrixAndrestating the problem (17) as a problem (20), wherein||Fvk||2=Tr(FHFVk)=Tr(Vk);
However, the problem (20) is difficult to solve due to the non-convexity of (20a), (20b), (20c), (20f) and (20h), and to solve this problem, the transform (20b) is first transformed into a convex constraint by introducing an auxiliary variable { ε }kThe following transformations can be obtained:
it is thus possible to convert (21a) into a convex constraint (23):
it can be seen that (24a) is a convex constraint, for (24b), the quadratic term is developed by a first order Taylor seriesMay be (25):
the nonlinear constraint (24c) may be converted to a convex Linear Matrix Inequality (LMI) constraint (27):
finally, by introducing an auxiliary variable { τ }kThe } and ω can transform the problem (20) into an optimization problem (28), whereη=Wmc/Wmm:
(20d)-(20g),(21b),(23),(24a),(26),(27) (28e)
Due to log (1+ beta)k) Andis a convex function, so the objective function (28a) consists of a Difference of convexity problem (DC), the DC process is usually solved using a Constrained concave-convex process (CCCP), in fact, the main idea of CCCP is to solve the convex problem by converting (28a) into a convex function and then iteratively until the result converges; based on this, consider toUsing a first order Taylor approximation, as shown in (29), whereinTo representThe nth iteration:
the objective function may then be converted to a convex function (30):
constraint (28d) is also a DC program, which can similarly be converted to convex constraint (31):
by introducing an auxiliary variable thetakAnd { lambda } andk}, (28b) may be decomposed into constraints (32):
according to (25), (26), (27), the non-convex constraints (32b) and (32c) can be transformed into convex constraints (33) and (34), whereinIs λkThe nth iteration:
finally, the SRM problem can be translated into the following problem:
s.t.(20d)-(20g),(21b),(23),(24a),(26),(27),(28c),(32a),(33),(34) (35b)
in (35), only the rank constraint (20f) is non-convex, by SDP relaxation (i.e. removing the rank-one constraint), (35) will become a convex optimization problem, which can be solved by standard convex optimization techniques, and finally, to obtain a solution (17) to the optimization problem, the solution (35) must be iteratively solved, specifically, a feasible solution is initialized firstThe optimal solution (35) can be obtained by a classical convex optimization algorithm and then updated according to the solution obtained in the previous iteration Until the result converges or the iteration index reaches its maximum value; in addition, since (35) without rank constraint is a convex optimization problem, iteratively updating all variables will increase or at least maintain the value of the objective function in (35); given a finite transmit power, the value of the objective function should be a monotonically non-decreasing sequence with an upper bound that converges to an at least locally optimal fixed solution, and the specific iteration flow is shown in fig. 3;
step three: problem calculation and solution under constraint of transmitting power of each base station
In the foregoing, the total transmit power constraint of L base stations is considered, and although this allows more flexible allocation of power to base stations under the total transmit power constraint, each base station has a high power transmit power limit for practical purposes. Therefore, considering the transmit power constraint of each base station more realistic, the definition of B is as shown in (36):
the power constraint (20d) for each base station can be written in the form of (37), whereRepresents the ith base station maximum transmission power:
then, under the transmit power constraint of each base station, the SRM problem is formulated (38):
s.t.(17b)-(17d),(37) (38b)
finally, the convex optimization problem described above can be solved iteratively using the algorithm in step two to obtain a solution to the original problem (38).
As shown in fig. 4, is providedAndthe privacy rate under the total base station transmit power constraint is slightly lower than the privacy rate under the individual base station transmit power constraint. This is because the tolerable transmit power of each base station is fixed and limited under each base station transmit power constraint. However, the present invention can flexibly allocate power among base stations according to CSI, thereby improving the privacy ratio under the constraint of the total base station transmission power.
As shown in fig. 5, is providedThe privacy rate increases with increasing total base station transmit power, but the rate provided by the fronthaul link is limited due to the limited transmit power of the CP. Thus, even though the access link could potentially provide higher rates, the privacy rate would be limited by the fronthaul link. Furthermore, when the transmission power is low, the secret ratio under the constraint of the total base station transmission power is higher than that under the constraint of the transmission power of each base station, and when the total base station allowed transmission power is high, they are almost the same.
As shown in fig. 6, is providedFor all schemes, the secret ratio increases with increasing CP transmit power, and moreover, the secret ratio is the same under the constraints of total and individual base station transmit power. This is because whenAndthe rate provided by the fronthaul link is still lower than the rate of the access link.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.
Claims (2)
1. A millimeter wave cloud wireless access network beam design method based on secure transmission is characterized in that: the method comprises the following steps:
the first step is as follows: system model building
In the microwave multicast forward link, the forward link channel vector from the central processor CP to the l base station is recorded asN represents the number of CP antennas, the multicast beam forming sent from CP to base station cluster, BF vector is recordedx0Is E { | x0|2The multicast signal of 1, the signal received by the l base station is shown as (1), nlIs satisfied with CN (0, N)0) Independently identically distributed additive white Gaussian noise, CN (0, N)0) Mean 0 and variance N0Gaussian distribution of (a):
let the downlink microwave bandwidth be WmcThen the first base stationThe forward rates that can be achieved are:
since the forward multicast rate is limited by the base station under the worst channel conditions, the CP provides the forward rate as:
wherein L ═ { 1.., L } represents a set of base stations;
in the millimeter wave access link, the received signal of the kth user is:
whereinRepresenting the channel vectors from the lth base station to the kth user,representing the channel vectors from the l base station to the k user,representing AN artificial noise vector AN sent by a base station cluster, assuming that q is equal to CN (0, Λ), and Λ represents AN artificial noise covariance matrix to be optimized,and xkRespectively representing the digital BF vector from the lth base station to the kth user and the signal required by the kth user,and xiRespectively representing the digital BF vector sum signals from other base stations except the target base station L to the k-th user, nkIs an AWGN that satisfies the independent same distribution,is a simulated BF, in a specific form as shown in (5), whereinRepresents an analog BF vector designed by the l-th base station, and flAll elements of (a) have the same amplitude but different phases, i.e.Where M ∈ M, M ═ { 1.. M } is the set of antennas for each base station, fl(m) represents flThe mth element of (1);
the insecure rate for the kth user is:
Wmmrepresents a millimeter wave bandwidth;
a millimeter wave channel model is used having C scattering clusters, each of which includes a propagation path, so that a millimeter wave channelCan be expressed as:
whereinThe complex gain of the c-th path is shown,is the azimuth of arrival of the c-th path,the antenna array steering vector is represented, the concrete form is shown as (11), d and lambda respectively represent the distance between antennas and the signal wavelength;
the second step is that: analog beam design
In practice only quantized phases can be achieved, so it is assumed that a B-bit quantization phase shifter is used and that the non-zero elements of F should belong to
Where φ represents a phase; according to (5), analog BF must be designed for L base stations, respectively, and for the k-th user,the array can thus be re-maximized by appropriate selection of the best quantization phase from (12)Analog BF vector f of the l base stationlIs shown as (13), where & (·) represents the angle:
thus, we can get fl(m) As shown in (14):
the third step: secret rate transmission problem
Firstly, formulating a privacy ratio maximization problem SRM under the constraint of total base station transmitting power and CP transmitting power, then adopting a convex approximation technology and semi-definite programming relaxation to convert the problem, adopting an iterative algorithm to carry out joint optimization, and constructing a solution of an original problem by utilizing an original and dual optimal solution of a semi-definite programming SDP relaxation problem;
in the third step of secret rate transmission, the involved iterative SRM algorithm comprises the following specific steps:
the method comprises the following steps: problem planning under total base station transmit power constraint
After designing the analog BF, the equivalent channel of the kth user can be obtainedThe equivalent channel of the z-th eavesdropper Eve is Representing the channel gain from the K-th user to Eve, assuming that the multicast forward transmission time frame includes K slots, and each slot is used for transmitting a message of a single user from the CP to the L cooperative base stations, assuming that the frame length and the K-th slot length are 1 and t, respectivelyk,Then, according to certain constraints, the achievable capacity of the kth user must be smaller than the forwarding capacity provided by the CP for the kth user, and thus (15), R, is obtainedFHRepresenting the forward rate provided by the CP under worst-case channel conditions,representing a set of users:
from (15), constraints (16) can be derived, whereinRepresents the forward rate available to the ith base station:
finally, the design problem of combining BF and artificial noise variance of the maximized secret keeping rate is provided;
whereinIndicates that there is moreMaximum eavesdropping rate for user k at an eavesdropper, s.t. represents a constraint, (17b) represents a fronthaul capacity constraint, (17c) is a total transmit power constraint for the L cooperative base stations,represents the base station maximum transmit power, (17d) represents the CP transmit power constraint,represents the CP maximum transmit power;
step two: transformation and solution of problem (17)
First, the objective function (17a) is converted into the form (18):
then define BF matrixAndrestating the problem (17) as a problem (20), the problem (17) comprising an objective function (17a) and constraint conditions (17b) (17c) (17d), passingThe simplification translates to a problem (20), the problem (20) including an objective function (20a) and constraint conditions (20b) - (20h), wherein||Fvk||2=Tr(FHFVk)=Tr(Vk);
However, since (20a)The non-convexity of (20b), (20c), (20f) and (20h), the problem (20) is difficult to solve, the transformation (20b) is first transformed into a convex constraint, by introducing an auxiliary variable { epsilon ∈kThe following transformations can be obtained:
it is thus possible to convert (21a) into a convex constraint (23):
it can be seen that (24a) is a convex constraint, for (24b), the quadratic term is developed by a first order Taylor seriesCan be expressed as:
thus (24b) can be converted into a convex constraint (26) in whichTo representOf the nth iteration z [ n ]]Represents the nth iteration of z:
the nonlinear constraint (24c) may be converted to a convex linear matrix inequality constraint (27):
finally, by introducing an auxiliary variable { τ }k} and ω may beThe problem (20) is transformed into an optimization problem (28), whereinη=Wmc/Wmm,glRepresenting the forward link channel vector, W, from the CP to the ith base stationmcAnd the bandwidth of a downlink microwave link channel is represented as follows:
(20d)-(20g),(21b),(23),(24a),(26),(27) (28e)
since the constraints of the problem are excessive, and most of the conditions have been explained previously, the constraints (20d) - (20g), (21b), (23), (24a), (26), (27), log (1+ β) are denoted by (28e) for the sake of simplifying the expressionk) Andis a convex function, so the objective function (28a) consists of a convex difference problem DC, the DC process is usually solved using a constrained concave-convex process CCCP, in practice, the main idea of CCCP is to solve the convex problem by converting (28a) into a convex function and then iterating until the result converges; based on this principle, consider the pairUsing a first order Taylor approximation, as shown in (29), whereinTo representThe nth iteration:
the objective function may then be converted to a convex function (30):
constraint (28d) is also a DC program, which can similarly be converted to convex constraint (31):
whereinRepresenting auxiliary variables τkThe nth iteration of (1); by introducing an auxiliary variable thetakAnd { lambda } andk}, (28b) may be decomposed into constraints (32):
according to (25), (26), (27), the non-convex constraints (32b) and (32c) can be transformed into convex constraints (33) and (34), whereinIs λkThe nth iteration:
finally, the SRM problem can be translated into the following problem:
s.t.(20d)-(20g),(21b),(23),(24a),(26),(27),(28c),(32a),(33),(34) (35b)
since the constraints are excessive and most of the conditions have been explained before, for the sake of simplifying the expression, the problem (35) is an optimization problem consisting of an objective function (35a) and constraint conditions (35b), the constraints (20d) - (20g), (21b), (23), (24a), (26), (27), (28c), (32a), (33), (34) are denoted by (35b), in (35) only the rank constraint (20f) is non-convex, by semi-deterministic programming SDP relaxation, (35) will become a convex optimization problem, which can be solved by standard convex optimization techniques, and finally, to obtain a solution to the optimization problem (17), the solution (35) must be iteratively solved, in particular, a feasible solution is initialized firstThe optimal solution (35) can be obtained by a classical convex optimization algorithm and then updated according to the solution obtained in the previous iteration Until the result converges or the iteration index reaches its maximum value; in addition, since (35) without rank constraint is a convex optimization problem, iteratively updating all variables will increase or at least maintain the value of the objective function in (35); given a limited transmit power, the value of the objective function should be a monotonically non-decreasing sequence with an upper bound that converges to an at least locally optimal fixed solution;
step three: problem calculation and solution under constraint of transmitting power of each base station
The transmit power constraint for each base station is more realistic, and B is defined as shown in (36):
the power constraint (20d) for each base station can be written in the form of (37), whereRepresents the ith base station maximum transmission power:
then, under the transmit power constraint of each base station, the SRM problem is formulated (38):
s.t.(17b)-(17d),(37) (38b)
since the constraints of the problem are excessive and most of the conditions have been explained in the foregoing, for the sake of simplifying the expression, the constraints (17b) - (17d), (37) are denoted by (38b), and finally, the above-mentioned convex optimization problem, i.e., the solution of the problem (38) obtained by the convex optimization algorithm, can be iteratively solved using the algorithm in step two, and the problem (38) refers to the optimization problem composed of the objective function (38a) and the constraints (38 b).
2. The method for designing beams of the millimeter wave cloud wireless access network based on the secure transmission according to claim 1, wherein the method comprises the following steps: in the first step of system model establishment, an eavesdropper Eve tries to eavesdrop the information of the kth user, and the signal received by the z th Eve is as follows:
whereinShowing the channel vectors from the lth base station to the z-th Eve,representing the channel vectors from the l base station to the z-th Eve;
the interception rate of the kth user intercepted by the z-th Eve is as follows:
finally, the privacy rate that the kth user can achieve is:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010149997.2A CN111756424B (en) | 2020-03-06 | 2020-03-06 | Millimeter wave cloud wireless access network beam design method based on secure transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010149997.2A CN111756424B (en) | 2020-03-06 | 2020-03-06 | Millimeter wave cloud wireless access network beam design method based on secure transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111756424A CN111756424A (en) | 2020-10-09 |
CN111756424B true CN111756424B (en) | 2021-07-02 |
Family
ID=72673028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010149997.2A Active CN111756424B (en) | 2020-03-06 | 2020-03-06 | Millimeter wave cloud wireless access network beam design method based on secure transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111756424B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112492678B (en) * | 2020-12-21 | 2022-08-26 | 郑州大学产业技术研究院有限公司 | NOMA downlink safety transmission method based on short packet communication |
CN112929068B (en) * | 2021-02-04 | 2022-06-10 | 重庆邮电大学 | SDR-based IRS-NOMA system beam forming optimization method |
CN113067610B (en) * | 2021-03-17 | 2022-09-09 | 郑州航空工业管理学院 | Millimeter wave NOMA system safe energy efficiency maximization power distribution method based on SWIPT |
CN113411115B (en) * | 2021-06-15 | 2023-01-31 | 河南科技大学 | Intelligent reflection surface assisted millimeter wave physical layer security communication joint optimization method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050030077A (en) * | 2003-09-24 | 2005-03-29 | 삼성전자주식회사 | Apparatus and method for assigning the forward link beam in the smart antenna system |
WO2007127929A1 (en) * | 2006-04-27 | 2007-11-08 | Unniversity Of Florida Research Foundation, Inc | Method and system for flexible beampattern design using waveform diversity |
CN101212820A (en) * | 2007-12-24 | 2008-07-02 | 葫芦岛联博电子技术有限公司 | Multiple crossing communication device |
US8068844B2 (en) * | 2008-12-31 | 2011-11-29 | Intel Corporation | Arrangements for beam refinement in a wireless network |
CN109889247B (en) * | 2019-02-13 | 2022-07-05 | 中国人民解放军陆军工程大学 | Low-overhead dynamic feedback safe transmission method and system suitable for narrow-band Internet of things |
CN110492996B (en) * | 2019-08-08 | 2020-08-11 | 东南大学 | Key generation method applied to multi-user large-scale MIMO system |
CN110518947B (en) * | 2019-09-27 | 2021-05-28 | 苏州大学 | Millimeter wave communication-based beam forming optimization method under active eavesdropping environment |
-
2020
- 2020-03-06 CN CN202010149997.2A patent/CN111756424B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN111756424A (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111756424B (en) | Millimeter wave cloud wireless access network beam design method based on secure transmission | |
Zuo et al. | Intelligent reflecting surface enhanced millimeter-wave NOMA systems | |
Cheng et al. | Orbital-angular-momentum embedded massive MIMO: Achieving multiplicative spectrum-efficiency for mmWave communications | |
Zeng et al. | Energy-efficient power allocation in uplink mmWave massive MIMO with NOMA | |
CN112290995B (en) | Beam design method based on safety energy efficiency in satellite-ground integrated network | |
CN112235026B (en) | Mixed beam design method of MIMO-OFDMA terahertz communication system | |
Liu et al. | Fairness-oriented hybrid precoding for massive MIMO maritime downlink systems with large-scale CSIT | |
CN113497649B (en) | Terahertz wireless communication network resource control method based on intelligent reflection plane | |
CN111726156A (en) | NOMA-based resource allocation method and device | |
CN113824478B (en) | Broadband millimeter wave multi-user large-scale MIMO uplink spectrum efficiency optimization method assisted by discrete lens antenna array | |
CN111371482A (en) | Millimeter wave MIMO-NOMA method of downlink broadcast link based on beam aggregation | |
Khan et al. | Rate splitting multiple access for cognitive radio GEO-LEO co-existing satellite networks | |
CN111726151A (en) | Resource allocation method and device based on wireless energy-carrying communication | |
Hao et al. | Secure millimeter wave cloud radio access networks relying on microwave multicast fronthaul | |
Kassam et al. | Distributed hybrid equalization for cooperative millimeter-wave cell-free massive MIMO | |
CN114513237B (en) | Subarray structure design method for large-scale array communication | |
Kim et al. | Cell-free mmWave massive MIMO systems with low-capacity fronthaul links and low-resolution ADC/DACs | |
Kai et al. | Max-min fairness in IRS-aided MISO broadcast channel via joint transmit and reflective beamforming | |
CN110933716B (en) | Safe low-delay millimeter wave transmission method based on edge cache | |
CN111740766A (en) | Codebook-based beam design method and device | |
Peng et al. | Energy efficiency optimization for uplink traffic offloading in the integrated satellite-terrestrial network | |
Kang et al. | Multi-user energy beamforming for different energy requests | |
Lin et al. | Stacked intelligent metasurface enabled LEO satellite communications relying on statistical CSI | |
CN113922849A (en) | User grouping and power distribution method under millimeter wave MIMO-NOMA system | |
Vazquez et al. | Phase-only transmit beamforming for spectrum sharing microwave systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |