CN114205048A - Wireless single-input single-output vector synthesis safe transmission method based on RIS - Google Patents

Wireless single-input single-output vector synthesis safe transmission method based on RIS Download PDF

Info

Publication number
CN114205048A
CN114205048A CN202111518867.2A CN202111518867A CN114205048A CN 114205048 A CN114205048 A CN 114205048A CN 202111518867 A CN202111518867 A CN 202111518867A CN 114205048 A CN114205048 A CN 114205048A
Authority
CN
China
Prior art keywords
ris
signal
legal
channel
legal receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111518867.2A
Other languages
Chinese (zh)
Inventor
刘超文
马季
翟鹏宇
万鹏武
刘伯阳
王瑾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN202111518867.2A priority Critical patent/CN114205048A/en
Publication of CN114205048A publication Critical patent/CN114205048A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless single-input single-output vector synthesis safe transmission method based on RIS, which mainly solves the problem of guaranteeing the information safety of the existing RIS auxiliary wireless transmission technology in the physical layer of a single-input single-output system. The method comprises the following steps: the single antenna transmitting terminal transmits a signal to be synthesized, and the signal is designed according to the known channel state information; then, aiming at randomly selecting the RIS array element reflection coefficient, two different RIS reflection signal vector synthesis signal transmission schemes with different implementation complexity are respectively designed to implement the vector synthesis of a legal receiving end to a received signal to obtain a regular received constellation symbol, but the received signal at an eavesdropping end keeps random disturbance and ideal synthesis processing cannot be implemented; and finally, the legal receiving end and the eavesdropping end respectively detect and decode the received signals respectively obtained. The invention can ensure the safety of information transmission, effectively improve the reliability of information transmission and lower the realization cost of RIS control end hardware.

Description

Wireless single-input single-output vector synthesis safe transmission method based on RIS
Technical Field
The invention belongs to the technical field of communication, and further relates to a physical layer information security technology in wireless communication, in particular to a wireless single-input single-output vector synthesis secure transmission method based on a reconfigurable Intelligent surface RIS (reconfigurable Intelligent surface), which can be used for improving the transmission security of a RIS (RIS-enabled single-input single-output) wireless communication system.
Background
In recent years, the development of 5G mobile communication makes people's daily production and life more convenient and faster, but the characteristics of difficult arrangement, large energy consumption and openness of the propagation environment also bring a lot of problems to the update of mobile communication. The proposal of the reconfigurable intelligent surface RIS and the application thereof in the communication technology open up a new idea for the development of the future wireless network, and researchers can be dedicated to solving the problems of low wireless communication frequency spectrum efficiency, low resource utilization rate, incapability of guaranteeing safety and the like by combining the RIS with the prior art.
The RIS is composed of a large number of low-energy-consumption reflecting elements, and a controller connected with the RIS can independently adjust the amplitude and phase of each reflecting unit, so that the reflected beam forming is cooperatively realized. The RIS has the advantages of high controllability, flexible deployment, low cost and the like, and can provide an efficient solution for reliable communication in a future complex electromagnetic environment.
The physical layer security technology is based on the information theory, utilizes the physical characteristics of wireless channels, and seeks to improve the wireless information transmission security by means of the technologies such as multi-antenna signal processing, channel coding and decoding and the like. Similar to physical layer security technology based on multi-antenna signal processing, the RIS auxiliary passive beam management and control can enable the reflected signal waveform to realize energy convergence at a legal receiving end, and meanwhile, the receiving power of a confidential signal of an eavesdropping user is effectively weakened. By flexibly deploying the RIS, the safety of the communication system can be effectively improved. However, when the eavesdropping end is close to the single-antenna transmitting end and the transmission connection with the RIS is interrupted, the prior art cannot guarantee the communication safety of the single-antenna user.
The technical advantages of RIS in facilitating secure communications have gained wide acceptance in the industry. A great deal of research shows that the introduction of the RIS can effectively improve the security of the Communication link, as described in the document "Secrecy Performance Analysis of RIS-air Wireless Communication Systems" published in IEEE Transactions on Vehicular Technology in 10.2020, the phase shift of the RIS reflection signal is designed to maximize the signal-to-noise ratio of the signal received by the legal receiving end, the simulation proves that the security can be further improved along with the increase of the RIS reflection array element, and when an eavesdropper steals a direct path with the transmitting end, the security of the system is reduced, the security strategy aims at that the reflection phase of the single optimized RIS maximizes the signal-to-noise ratio of the legal user, but the signal Secrecy of the transmitting end can be directly stolen, and when the eavesdropper is closer to the transmitting end or can shield the RIS transmitting link, the security Performance can not be guaranteed.
Disclosure of Invention
The invention aims to provide a wireless single-input single-output vector synthesis safe transmission method based on RIS (RIS) aiming at the defects of the prior art, which is used for solving the defects of the prior RIS auxiliary wireless transmission technology in the problem of guaranteeing the information safety of the physical layer of a single-input single-output system. In the invention, the RIS array element reflection coefficient is randomly selected, and a vector synthesis signal transmission scheme is designed, so that the obvious difference exists between the legal received constellation and the intercepted constellation, and the transmission safety of a single-input single-output system is comprehensively and effectively ensured.
The basic idea for realizing the invention is as follows: the single antenna transmitting end transmits the signal to be synthesized, the signal is designed according to the known channel state information, the information transmission is completed through RIS reflection, the legal receiving end receives the signal to be synthesized and can realize vector synthesis to obtain regular receiving constellation symbols, then decoding of the secret information bits is completed, meanwhile, the eavesdropping end eavesdrops on the transmitted synthesized signal to keep random disturbance, synthesis processing cannot be realized, and therefore the information secret transmission is realized. And considering the hardware limit of RIS and the complexity of system implementation, RIS arrayThe element reflection phase shift selects discrete values, i.e. the reflection phase shift value is collected as
Figure BDA0003406977180000021
Where L is the number of quantization levels. When the number M of the RIS reflection array elements is more than or equal to 2, selecting L to 3 as the minimum RIS phase quantization stage number, and selecting the discrete phase shift quantization stage number to obtain the diversity gain to the maximum extent.
In order to achieve the above object, the technical solution of the present invention includes:
1) the method comprises the following steps that a single transmitting antenna is arranged at a transmitting end S in a system, single receiving antennas are respectively arranged at a legal receiving end D and an eavesdropping end Eve, a reconfigurable intelligent surface RIS is provided with M reflecting array elements, M is a non-negative integer power of 2, and the RIS is controlled through a connection controller;
2) the transmitting terminal S sends pilot frequency information to the legal receiving terminal D to obtain the channel vectors from the transmitting terminal S to RIS and from RIS to the legal receiving terminal D
Figure BDA0003406977180000022
And
Figure BDA0003406977180000023
and elements in both channel vectors obey Rayleigh fading; after the pilot information is intercepted by the interception end Eve, the intercepted channel vector from the transmitting end S to the interception end Eve and the reflected channel vector from the RIS to the interception end Eve are respectively obtained
Figure BDA0003406977180000024
And
Figure BDA0003406977180000025
wherein
Figure BDA0003406977180000026
Representing a complex field;
3) constructing a random vector synthesis RVS strategy:
3.1) acquiring a RIS reflection coefficient diagonal matrix:
(3.1.1) let the phase quantization step number L be 3, in which case the reflection coefficient of the mth reflection array element of RIS is discretePhase shift
Figure BDA0003406977180000031
In the collection
Figure BDA0003406977180000032
Wherein M is 1,2,.. M; obtaining discrete random phase shift of all single reflection array elements of the RIS;
(3.1.2) according to the discrete random phase shift of all single reflection array elements of the RIS, obtaining a first diagonal matrix phi consisting of the reflection coefficients of the RIS array elements:
Figure BDA00034069771800000311
wherein diag (g) denotes the diagonalization operator,
Figure BDA0003406977180000033
discrete phase shift vectors of reflection coefficients of each array element of the RIS are obtained;
3.2) the transmitting terminal designs and sends the first signal to be synthesized according to the RIS feedback
Figure BDA0003406977180000034
Figure BDA0003406977180000035
Wherein j represents an imaginary number, j2=-1;
Figure BDA0003406977180000036
Represents a first Phase Shift Keying (PSK) signal, k represents the kth symbol of a PSK symbol set, and
Figure BDA0003406977180000037
Figure BDA0003406977180000038
is the secret signal power; q1Representing the phase, expressed, of the first signal to be synthesizedThe formula is as follows:
Figure BDA0003406977180000039
wherein, κmElements in the channel vector k representing the transmitting end S to the mth reflecting array element of RIS, gmRepresenting the element from the m-th reflection array element of the RIS to the D channel vector g of the legal receiving end;
3.3) the legal receiver D obtains the first legal receiving useful signal Z reflected by the RIS1And carrying out vector synthesis on the signals to obtain a regular first amplitude phase modulation signal
Figure BDA00034069771800000310
Wherein alpha is1Synthesizing signal amplitude gain for a first legal receiving end;
4) constructing a grouping vector synthesis GVS strategy:
4.1) acquiring a RIS reflection coefficient diagonal matrix:
(4.1.1) equally dividing all the reflecting array elements of the RIS into U subsets, each subset then containing a ═ M/U array elements; wherein U is a non-negative integer power of 2, s 1,2, U denoting the s-th subset thereof;
(4.1.2) taking the phase quantization order L as 3, when the discrete phase shift P of the reflection coefficient of the reflection array element in the s-th subsetsIn the collection
Figure BDA0003406977180000041
The medium value is specifically as follows: firstly, selecting the optimal discrete phase shift P of the reflection coefficient of the reflection array element in the subsets *
Figure BDA0003406977180000042
Wherein,
Figure BDA0003406977180000043
is the t array element component in the channel from the s subset of RIS to the legal receiver D,
Figure BDA0003406977180000044
the t-th array element component in the channels from the transmitting terminal S to the S-th subset of the RIS is t 1, 2.
Then, a set is selected
Figure BDA0003406977180000045
Middle distance Ps *Discrete phase shift P with nearest point as reflection coefficient of reflection array element in s-th subsetsIs what is needed
Figure BDA0003406977180000046
Then
Figure BDA0003406977180000047
Otherwise, the reverse is carried out
Figure BDA0003406977180000048
Wherein
Figure BDA0003406977180000049
Respectively represent collections
Figure BDA00034069771800000410
The ith or jth element in (e), i, j ∈ {1,2,3},
Figure BDA00034069771800000411
the method comprises the following steps of (1) indicating that unequal i and j are selected randomly;
(4.1.3) obtaining a second diagonal matrix Lambda composed of the reflection coefficients of the RIS array elements according to the discrete phase shift of the reflection coefficients of the reflection array elements in all the subsets of the RIS:
Λ=diag(p),
wherein
Figure BDA00034069771800000412
Discrete phase-shifted reflection coefficient vectors for respective subsets of the RIS;
4.2) the transmitting terminal designs and sends a second signal to be synthesized according to the RIS feedback
Figure BDA00034069771800000419
Figure BDA00034069771800000413
Wherein,
Figure BDA00034069771800000414
represents a second phase shift keying PSK signal, an
Figure BDA00034069771800000415
Figure BDA00034069771800000416
Is the secret signal power; q2Representing the phase of the second signal to be synthesized, the expression is as follows:
Figure BDA00034069771800000417
4.3) the legal receiver D obtains the second legal receiving useful signal Z reflected by the RIS2And carrying out vector synthesis on the signal to obtain a regular second amplitude phase modulation signal
Figure BDA00034069771800000418
Wherein alpha is2Synthesizing signal amplitude gain for a second legal receiving end;
5) the legal receiving end D and the eavesdropping end Eve respectively acquire respective receiving signals:
the legal receiving end D respectively carries out vector synthesis on the signals to be synthesized according to the random vector synthesis RVS strategy constructed in the step 3) and the grouping vector synthesis GVS strategy constructed in the step 4) to obtain an observation signal y of the first legal receiving endb1And a second legal receiving end observation signal yb2
Figure BDA0003406977180000051
Figure BDA0003406977180000052
Wherein n isbRepresenting a complex Gaussian noise vector at a legal receiving end D;
the eavesdropping end is divided into the following two scenes to eavesdrop the signal to be synthesized, namely a secret signal:
the first method comprises the following steps: when the eavesdropping end has transmission connection with the transmitting end and is blocked from the RIS transmission connection, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receives signals which are respectively expressed as y1 idealAnd y2 ideal
Figure BDA0003406977180000053
Figure BDA0003406977180000054
Wherein n isoRepresenting a complex Gaussian noise vector at an eavesdropping end Eve;
and the second method comprises the following steps: when the eavesdropping end is in transmission connection with the transmitting end and the RIS, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receives signals which are respectively expressed as y1 worstAnd y2 worst
Figure BDA0003406977180000055
Figure BDA0003406977180000056
6) The legal receiving end and the eavesdropping end respectively detect and decode the received signals obtained by the legal receiving end and the eavesdropping end:
a legal receiving end performs optimal detection on the phase modulation symbol based on the maximum likelihood estimation criterion, completes secret information decoding and accurately obtains secret information;
the eavesdropping end decodes the secret information under the interference of the vector synthesis strategy constructed by the transmitting end, and the secret information cannot be accurately acquired.
Compared with the prior art, the invention has the following advantages:
firstly, the transmitting end of the invention transmits a signal to be synthesized, so that a legal receiving end can carry out vector synthesis on a received signal, and an eavesdropping end can not realize information stealing even under the condition of flat fading of a channel, thereby effectively ensuring the transmission safety and simultaneously reducing the complexity of realizing RIS beam control;
secondly, the vector synthesis scheme reasonably groups the RIS reflection array elements, and discretely selects the reflection phase shift coefficients of the set array elements, thereby effectively reducing the realization cost of RIS control end hardware and reducing the complexity of a signal to be synthesized design algorithm on the premise of ensuring information safety transmission;
thirdly, the invention can realize the RIS diversity order to the maximum extent by the minimum phase quantization level number while finishing the information transmission with high efficiency, and reasonably relieves the hardware limitation.
Drawings
FIG. 1 is a schematic diagram of a system model of the present invention;
FIG. 2 is a flow chart of an implementation of the method of the present invention;
FIG. 3 is a diagram showing comparison of simulation results of received signal constellations when a legal receiving end, a eavesdropping end and a RIS have transmission connection or not, respectively using RVS and GVS schemes under fast fading channel conditions; (a) medium SNR-10 dB, (b) medium SNR-0 dB;
wherein a, b and c are received signal constellation diagrams of a legal receiving end, a wiretapping end and RIS without transmission connection and with transmission connection under RVS scheme respectively; d. e and f are received signal constellation diagrams of a legal receiving end, an eavesdropping end and the RIS without transmission connection and the eavesdropping end and the RIS with transmission connection under the GVS scheme.
FIG. 4 is a comparison graph of simulation results of received signal constellations when there is transmission connection between the legal receiving end, the eavesdropping end and the RIS using RVS and GVS schemes respectively under flat fading channel conditions; (a) medium SNR is 0dB, and (b) medium SNR is 10 dB;
wherein a, b and c are received signal constellation diagrams of a legal receiving end, a wiretapping end and RIS without transmission connection and with transmission connection under RVS scheme respectively; d. e and f are received signal constellation diagrams of a legal receiving end, an eavesdropping end and the RIS without transmission connection and the eavesdropping end and the RIS with transmission connection under the GVS scheme.
FIG. 5 shows the BER comparison results of the legal receiving end and the eavesdropping end when the system uses RVS and GVS schemes under fast fading channel conditions and the GVS scheme is at different RIS packet numbers;
Detailed Description
The implementation process of the technical scheme of the invention is described in detail below with reference to the attached drawings:
referring to fig. 1, a schematic diagram of a system model in the present invention, the system model adopted by the method of the present invention specifically includes the following contents: the system comprises a transmitting terminal S, a legal receiving terminal D, an eavesdropping terminal and a reconfigurable intelligent surface RIS. The transmitting end, the legal receiving end and the eavesdropping end are respectively provided with a receiving antenna, and are respectively represented as N by a single receiving antennat、Nr、NeWhile the RIS has M reflecting units and is connected to the controller, M being a non-negative integer power of 2; in this example, N is usedt=1,Nr=1,NeFor example, the BPSK modulation signal is synthesized by 1, M64, S ∈ {2,4,8,16,32,64 }. Each sending time slot transmitting antenna sends a signal to be synthesized as a secret signal, then the RIS reflects and transmits the signal to be synthesized to a legal receiving end, and finally the legal receiving end carries out signal receiving synthesis and detection.
Referring to fig. 2, the invention provides a wireless single-input single-output vector synthesis secure transmission method based on RIS, which comprises the following specific steps:
step 1: a transmitting end S in the system is provided with a single transmitting antenna, a legal receiving end D and an eavesdropping end Eve, and is also respectively provided with a single receiving antenna, a reconfigurable intelligent surface RIS is provided with M reflecting array elements, M is a non-negative integer power of 2, and the RIS is controlled by a connecting controller;
step 2: the transmitting terminal S sends pilot frequency information to the legal receiving terminal D, the pilot frequency information is reflected to the legal receiving terminal D through the RIS, the legal receiving terminal processes the received pilot frequency information and feeds back the scheme of power distribution to the transmitting terminal, when the received power is less than a certain value, the accurate estimation of the channel can be completed according to the information by only inserting a single pilot frequency in the transmission time, and the channel vector from the transmitting terminal S to the RIS and from the RIS to the legal receiving terminal is obtained
Figure BDA0003406977180000071
And
Figure BDA0003406977180000072
and elements in both channel vectors obey Rayleigh fading; after the pilot information is intercepted by the eavesdropping end Eve, the eavesdropping channel vector from the transmitting end to the eavesdropping end and the reflected channel vector from the RIS to the eavesdropping end are respectively obtained
Figure BDA0003406977180000073
And
Figure BDA0003406977180000074
wherein
Figure BDA0003406977180000075
Representing a complex field;
in this embodiment, the channel vectors from the transmitting end S to the RIS and from the RIS to the legal receiving end
Figure BDA0003406977180000076
And
Figure BDA0003406977180000077
obtained as follows: the transmitting terminal S sends pilot frequency information to a legal receiving terminal D, the pilot frequency information is reflected to the legal receiving terminal D through the RIS, the RIS and the legal receiving terminal D estimate a first hopping channel matrix according to the pilot frequency information respectively, then the first hopping channel matrix is used as the input of a deep residual error network, the second hopping channel matrix is used as the output of the deep residual error network, and the channel state is obtained after the network is trainedAnd the transmitting end completes accurate estimation of the channel according to the state information, and the channel vectors from the transmitting end to the RIS and from the RIS to the legal receiving end are obtained. Certainly, the method can also adopt other methods to obtain, the transmitting terminal S is used for sending pilot frequency information to the legal receiving terminal D, the pilot frequency information is reflected to the legal receiving terminal D through the RIS, the legal receiving terminal processes the received pilot frequency information and feeds back the scheme of power distribution to the transmitting terminal, when the received power is less than a certain value, only a single pilot frequency needs to be inserted in the transmission time, the accurate estimation of the channel can be completed according to the information, and the channel vector from the transmitting terminal to the RIS and the channel vector from the RIS to the legal receiving terminal can also be obtained.
And setting the known ideal channel state information of both communication parties of the legal communication, and designing and transmitting the signal to be synthesized by the transmitting terminal S according to the known channel vectors kappa and g and the random reflection coefficient of the RIS array element. Specifically, according to the channel characteristics, the security of the system under the channel conditions, and the complexity of the RIS control link, two different Vector synthesis strategies, namely Random Vector Synthesis (RVS) and Group Vector Synthesis (GVS), are constructed, and the two Vector synthesis schemes can respectively obtain the phases of the signals to be synthesized transmitted by the respective schemes. The channels comprise flat fading channels and fast fading channels; the transmitting terminal transmits the signal to be synthesized according to a random vector synthesis strategy, and the phase shift of a single reflection array element is discretely and randomly valued.
And step 3: constructing a random vector synthesis RVS strategy:
3.1) acquiring a RIS reflection coefficient diagonal matrix:
(3.1.1) let the phase quantization level number L be 3, when the reflection coefficient of the mth reflection array element of RIS is discretely phase-shifted
Figure BDA0003406977180000081
In the collection
Figure BDA0003406977180000082
Wherein M is 1,2,.. M; obtaining discrete random phase shift of all single reflection array elements of the RIS;
(3.1.2) according to the discrete random phase shift of all single reflection array elements of the RIS, obtaining a first diagonal matrix phi consisting of the reflection coefficients of the RIS array elements:
Figure BDA00034069771800000811
wherein diag (g) denotes the diagonalization operator,
Figure BDA0003406977180000083
discrete phase shift vectors of reflection coefficients of each array element of the RIS are obtained;
3.2) the transmitting terminal designs and sends the first signal to be synthesized according to the RIS feedback
Figure BDA0003406977180000084
Figure BDA0003406977180000085
Wherein j represents an imaginary number, j2=-1;
Figure BDA0003406977180000086
Represents a first Phase Shift Keying (PSK) signal, k represents the kth symbol of a PSK symbol set, and
Figure BDA0003406977180000087
Figure BDA0003406977180000088
is the secret signal power; q1Representing the phase of the first signal to be synthesized, the expression is as follows:
Figure BDA0003406977180000089
wherein, κmElements in the channel vector k representing the transmitting end S to the mth reflecting array element of RIS, gmRepresenting the element from the m-th reflection array element of the RIS to the D channel vector g of the legal receiving end;
3.3) acquisition of the RIS-reflected by the legal receiver DFirst legally received useful signal Z1And carrying out vector synthesis on the signals to obtain a regular first amplitude phase modulation signal
Figure BDA00034069771800000810
Wherein alpha is1Synthesizing signal amplitude gain for a first legal receiving end;
in this embodiment, the first legally received useful signal Z1And the first legal receiving end synthesizes the signal amplitude gain alpha1Obtained according to the following formula:
Figure BDA0003406977180000091
Figure BDA0003406977180000092
and 4, step 4: constructing a grouping vector synthesis GVS strategy:
4.1) acquiring a RIS reflection coefficient diagonal matrix:
(4.1.1) equally dividing all the reflecting array elements of the RIS into U subsets, each subset then containing a ═ M/U array elements; wherein U is a non-negative integer power of 2, s 1,2, U denoting the s-th subset thereof;
(4.1.2) taking the phase quantization order L as 3, when the discrete phase shift P of the reflection coefficient of the reflection array element in the s-th subsetsIn the collection
Figure BDA0003406977180000093
The medium value is specifically as follows: firstly, selecting the optimal discrete phase shift P of the reflection coefficient of the reflection array element in the subsets *
Figure BDA0003406977180000094
Wherein,
Figure BDA0003406977180000095
as the s-th subset of the RISThe t-th element component in the channel to the legitimate receiver D,
Figure BDA0003406977180000096
the t-th array element component in the channels from the transmitting terminal S to the S-th subset of the RIS is t 1, 2.
Then, a set is selected
Figure BDA0003406977180000097
Middle distance Ps *Discrete phase shift P with nearest point as reflection coefficient of reflection array element in s-th subsetsIs what is needed
Figure BDA0003406977180000098
Then
Figure BDA0003406977180000099
Otherwise, the reverse is carried out
Figure BDA00034069771800000910
Wherein
Figure BDA00034069771800000911
Respectively represent collections
Figure BDA00034069771800000912
The ith or jth element in (e), i, j ∈ {1,2,3},
Figure BDA00034069771800000913
the method comprises the following steps of (1) indicating that unequal i and j are selected randomly;
(4.1.3) obtaining a second diagonal matrix Lambda composed of the reflection coefficients of the RIS array elements according to the discrete phase shift of the reflection coefficients of the reflection array elements in all the subsets of the RIS:
Λ=diag(p),
wherein
Figure BDA00034069771800000914
Discrete phase-shifted reflection coefficient vectors for respective subsets of the RIS;
4.2) the transmitting terminal designs and sends a second signal to be synthesized according to the RIS feedback
Figure BDA00034069771800000915
Figure BDA0003406977180000101
Wherein,
Figure BDA0003406977180000102
represents a second phase shift keying PSK signal, an
Figure BDA0003406977180000103
Figure BDA0003406977180000104
Is the secret signal power; q2Representing the phase of the second signal to be synthesized, the expression is as follows:
Figure BDA0003406977180000105
4.3) the legal receiver D obtains the second legal receiving useful signal Z reflected by the RIS2And carrying out vector synthesis on the signal to obtain a regular second amplitude phase modulation signal
Figure BDA0003406977180000106
Wherein alpha is2Synthesizing signal amplitude gain for a second legal receiving end;
in this embodiment, the second legally received useful signal Z2And the amplitude gain alpha of the combined signal of the second legal receiving end2Obtained according to the following formula:
Figure BDA0003406977180000107
Figure BDA0003406977180000108
and 5: the legal receiving end D and the eavesdropping end Eve respectively acquire respective receiving signals:
the legal receiving end D respectively carries out vector synthesis on the signals to be synthesized according to the random vector synthesis RVS strategy constructed in the step 3) and the grouping vector synthesis GVS strategy constructed in the step 4) to obtain an observation signal y of the first legal receiving endb1And a second legal receiving end observation signal yb2
Figure BDA0003406977180000109
Figure BDA00034069771800001010
Wherein n isbRepresenting a complex Gaussian noise vector at a legal receiving end D;
the eavesdropping end is divided into the following two scenes to eavesdrop the signal to be synthesized, namely a secret signal:
the first method comprises the following steps: when the eavesdropping end has transmission connection with the transmitting end and is blocked from the RIS transmission connection, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receives signals which are respectively expressed as y1 idealAnd y2 ideal
Figure BDA00034069771800001011
Figure BDA0003406977180000111
Wherein n isoRepresenting a complex Gaussian noise vector at an eavesdropping end Eve;
and the second method comprises the following steps: when the eavesdropping end is connected with the transmitting end and the RIS in a transmission way, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receives the signal componentsIs denoted by y1 worstAnd y2 worst
Figure BDA0003406977180000112
Figure BDA0003406977180000113
Step 6: the legal receiving end and the eavesdropping end respectively detect and decode the received signals obtained by the legal receiving end and the eavesdropping end:
a legal receiving end performs optimal detection on the phase modulation symbol based on the maximum likelihood estimation criterion, completes secret information decoding and accurately obtains secret information;
the eavesdropping end decodes the secret information under the interference of the vector synthesis strategy constructed by the transmitting end, the detection performance is limited, and the secret information cannot be accurately known.
In this embodiment, it is assumed that a legal receiving end can obtain the state information of the ideal fading channel, and the legal receiving end performs maximum likelihood detection expressions based on the maximum likelihood estimation criterion under two vector synthesis schemes, respectively, where c belongs to {1,2}, and represents the c-th policy:
Figure BDA0003406977180000114
the vector synthesis signal of the eavesdropping end is a random disturbance signal, the signal detection performance of the eavesdropping end is limited, and an accurate phase modulation symbol cannot be synthesized like a legal receiving end. Specifically, under two vector synthesis schemes, the maximum likelihood detection of the eavesdropping-end received signal can be implemented as follows corresponding to two scenes respectively:
A. the eavesdropping end is connected with the transmitting end in a transmission way, and when the eavesdropping end is blocked from the RIS transmission connection: the eavesdropping end receives the estimated signal and expresses the estimated signal as the ideal fading channel state information
Figure BDA0003406977180000115
The corresponding maximum likelihood detection expression is as follows:
Figure BDA0003406977180000116
B. when the eavesdropping end is connected with the transmitting end and the RIS in a transmission way: the eavesdropping end receives the estimated signal and expresses the estimated signal as the ideal fading channel state information
Figure BDA0003406977180000117
The RIS reflection interference signal and the receiving noise are taken as color noise to be processed, and the maximum likelihood detection is carried out on the eavesdropping signal after the noise whitening as follows:
Figure BDA0003406977180000121
referring to fig. 3, N is depicted under fast fading channel conditionst=1、NrWhen the SNR is-10 dB, two schemes receive signal constellations under different eavesdropping scenes, a, b, c are respectively a received signal constellation of a sink server system (RVS) scheme lower legal receiving end, an eavesdropping end and an RIS non-transmission connection and a received signal constellation of a eavesdropping end and an RIS transmission connection, d, e, f are respectively a received signal constellation of a GVS scheme lower legal receiving end, an eavesdropping end and an RIS non-transmission connection and a received signal constellation of an eavesdropping end and an RIS transmission connection; fig. 3 (b) shows the above case where the SNR is 0 dB.
As can be seen from the constellation diagrams a and d in fig. 3 (a) and (b), compared with the RVS scheme, the GVS scheme can synthesize a constellation symbol with better aggregation effect at a legal receiving end; further comparing a, b, and c in (a) and (b) in fig. 3, it can be seen that a legal receiving end has a better aggregation function under the RVS scheme than the receiving situation of the constellation symbol at the eavesdropping end under the same condition, which indicates that the RVS scheme also ensures the security of signal transmission while reducing the complexity of the RIS control link. Further comparing (a) and (b) in fig. 3, after the signal-to-noise ratio is improved, the effect of synthesizing and separating the received signal of the legal receiving end is obviously enhanced, and the eavesdropping end still cannot separate the signal.
Referring to fig. 4, N is depicted under flat fading channel conditionst=1、NrWhen the SNR is 0dB, the two schemes receive signal constellations in different eavesdropping scenes, a, b, c are respectively a received signal constellation diagram of a legal receiving end under the RVS scheme, a connection between the eavesdropping end and the RIS without transmission, and a connection between the eavesdropping end and the RIS with transmission, d, e, f are respectively a received signal constellation diagram of a legal receiving end under the GVS scheme, a connection between the eavesdropping end and the RIS without transmission, and a connection between the eavesdropping end and the RIS with transmission; fig. 4 (b) shows the above case where the SNR is 10 dB.
As can be seen from the constellations a and d (a) and (b) in fig. 4, the GVS scheme can obtain a reception constellation with better separation effect than the RVS scheme under the flat fading channel condition; comparing d, e, and f in (a) and (b) in fig. 4, it can be known that, under the condition of flat fading channel, the eavesdropping end can synthesize a rotated constellation diagram under the condition of high signal-to-noise ratio of the GVS scheme, and the legal receiving end can synthesize regular constellation symbols. In addition, comparing the receiving constellation of the RVS and GVS schemes in fig. 4, the RVS scheme still synthesizes a randomly scrambled constellation at the eavesdropping end under high signal-to-noise ratio, further illustrating that the scheme of the present invention can achieve better security performance even under flat fading channel.
Referring to fig. 5, the bit error rate performance of the legal receiving end and the eavesdropping end compared to the RVS scheme synthesized by random vectors in the case of the GVS scheme synthesized by packet vectors with the number of packets S E {2,4,8,16,32,64} is depicted under fast fading channel conditions; it can be seen from the figure that with the increasing of SNR, the BER performance of the legal receiving end under the two schemes is continuously improved, while the bit error rate performance of the eavesdropping end is maintained at about 0.5, and simultaneously the performance of the legal receiving end is gradually improved with the increasing of the number of packets under the GVS scheme, which indicates that the scheme selects the discrete phase coefficient after the RIS packet reduces the hardware limit of the RIS system, and simultaneously reasonably selects the packets to obtain the lower bit error rate performance; and further comparing the two vector synthesis schemes, the RIS array element phase coefficient in the RVS scheme randomly takes values in a discrete set, the GVS scheme randomly takes values in the discrete set after the optimal phase of the packet is calculated, and the complexity of a signal algorithm to be synthesized based on the RVS scheme is lower.
The effect of the present invention is further explained by combining simulation experiments as follows:
A. simulation conditions
Using matlab simulation tool to simulate, assuming that the information is under rayleigh fading channel, the transmitter obtains all channel state information, and the specific simulation parameters are set as follows:
simulation 1: setting Nt=1,Nr=1,Ne=1,M=64,SNR∈{-10,0};
Simulation 2: setting Nt=1,Nr=1,Ne=1,M=64,SNR∈{0,10};
Simulation 3: setting Nt=1,Nr=1,Ne=1,M=64,S∈{2,4,8,16,32,64}
B. Emulated content
Simulation 1: in order to use the method of the invention under the fast fading channel condition with different signal to noise ratios, RVS scheme and GVS scheme, the two-dimensional constellation simulation result comparison chart of legal receiving end and eavesdropping end, the simulation result is shown in figure 3;
simulation 2: in order to use the method of the invention under the condition of different signal-to-noise ratios of flat fading channels, RVS scheme and GVS scheme are used, the comparison graph of the two-dimensional constellation simulation results of legal receiving end and interception end is shown in figure 4;
simulation 3: comparing the BER of the system under the condition of fast fading channel and the use of the GVS scheme and the RVS scheme under the condition of different RIS packet numbers, a legal receiving end and a wiretapping end, and the simulation result is shown in figure 5;
C. simulation result
As can be seen from fig. 3, a legal receiving end can better separate the transmitted signals under different vector synthesis schemes, the surface scheme has better confidential transmission performance, the larger the signal-to-noise ratio is, the higher the constellation separation degree is, and under the same condition, the GVS scheme has a better synthetic signal constellation convergence effect than the RVS scheme.
As can be seen from fig. 4, the RVS scheme performs better than the GVS scheme in terms of eavesdropping resistance under flat fading channel conditions. Under the high signal-to-noise ratio, the GVS scheme is used, and when the eavesdropping end is in transmission connection with the RIS, signal separation can be realized, but only the rotating constellation symbol can be solved, and the constellation diagram of the eavesdropping end under the RVS scheme is still dispersed, thereby verifying the technical advantages of the invention in the aspect of comprehensively guaranteeing single-input single-output safe transmission.
As can be seen from fig. 5, with the increasing of the signal-to-noise ratio, the transmission reliability of the legal receiving end under the two schemes is obviously improved, and the eavesdropping end is interfered by the vector synthesis signal and cannot correctly decode the signal regardless of the existence of the transmission connection with the RIS, which indicates the high security of the scheme of the present invention.
The simulation analysis proves the correctness and the effectiveness of the method provided by the invention.
The invention has not been described in detail in part of the common general knowledge of those skilled in the art.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (6)

1. A wireless single-input single-output vector synthesis safe transmission method based on a reconfigurable intelligent surface RIS is characterized by comprising the following steps:
1) the method comprises the following steps that a single transmitting antenna is arranged at a transmitting end S in a system, single receiving antennas are respectively arranged at a legal receiving end D and an eavesdropping end Eve, a reconfigurable intelligent surface RIS is provided with M reflecting array elements, M is a non-negative integer power of 2, and the RIS is controlled through a connection controller;
2) the transmitting terminal S sends pilot frequency information to the legal receiving terminal D to obtain the channel vectors from the transmitting terminal S to RIS and from RIS to the legal receiving terminal D
Figure FDA0003406977170000011
And
Figure FDA0003406977170000012
and elements in both channel vectors obey Rayleigh fading; after the pilot information is intercepted by the interception end Eve, the intercepted channel vector from the transmitting end S to the interception end Eve and the reflected channel vector from the RIS to the interception end Eve are respectively obtained
Figure FDA0003406977170000013
And
Figure FDA0003406977170000014
wherein
Figure FDA0003406977170000015
Representing a complex field;
3) constructing a random vector synthesis RVS strategy:
3.1) acquiring a RIS reflection coefficient diagonal matrix:
(3.1.1) let the phase quantization level number L be 3, when the reflection coefficient of the mth reflection array element of RIS is discretely phase-shifted
Figure FDA0003406977170000016
In the collection
Figure FDA0003406977170000017
Wherein M is 1,2,.. M; obtaining discrete random phase shift of all single reflection array elements of the RIS;
(3.1.2) according to the discrete random phase shift of all single reflection array elements of the RIS, obtaining a first diagonal matrix phi consisting of the reflection coefficients of the RIS array elements:
Figure FDA0003406977170000018
wherein diag (·) represents the diagonalization operator,
Figure FDA0003406977170000019
discrete phase shift vectors of reflection coefficients of each array element of the RIS are obtained;
3.2) the transmitting terminal designs and sends the first signal to be synthesized according to the RIS feedback
Figure FDA00034069771700000110
Figure FDA00034069771700000111
Wherein j represents an imaginary number, j2=-1;
Figure FDA00034069771700000112
Represents a first Phase Shift Keying (PSK) signal, k represents the kth symbol of a PSK symbol set, and
Figure FDA0003406977170000021
Figure FDA0003406977170000022
is the secret signal power; q1Representing the phase of the first signal to be synthesized, the expression is as follows:
Figure FDA0003406977170000023
wherein, κmElements in the channel vector k representing the transmitting end S to the mth reflecting array element of RIS, gmRepresenting the element from the m-th reflection array element of the RIS to the D channel vector g of the legal receiving end;
3.3) the legal receiver D obtains the first legal receiving useful signal Z reflected by the RIS1And carrying out vector synthesis on the signals to obtain a regular first amplitude phase modulation signal
Figure FDA0003406977170000024
Wherein alpha is1Synthesizing signal amplitude gain for a first legal receiving end;
4) constructing a grouping vector synthesis GVS strategy:
4.1) acquiring a RIS reflection coefficient diagonal matrix:
(4.1.1) equally dividing all the reflecting array elements of the RIS into U subsets, each subset then containing a ═ M/U array elements; wherein U is a non-negative integer power of 2, s 1,2, U denoting the s-th subset thereof;
(4.1.2) taking the phase quantization order L as 3, when the discrete phase shift P of the reflection coefficient of the reflection array element in the s-th subsetsIn the collection
Figure FDA0003406977170000025
The medium value is specifically as follows: firstly, selecting the optimal discrete phase shift of the reflection coefficient of the reflection array element in the subset
Figure FDA0003406977170000026
Figure FDA0003406977170000027
Wherein,
Figure FDA0003406977170000028
is the t array element component in the channel from the s subset of RIS to the legal receiver D,
Figure FDA0003406977170000029
the t-th array element component in the channels from the transmitting terminal S to the S-th subset of the RIS is t 1, 2.
Then, a set is selected
Figure FDA00034069771700000210
Middle distance
Figure FDA00034069771700000211
Nearest point as the s-th subset reflectionDiscrete phase shift P of array element reflection coefficientsIs what is needed
Figure FDA00034069771700000212
Then
Figure FDA00034069771700000213
Otherwise, the reverse is carried out
Figure FDA00034069771700000214
Wherein
Figure FDA00034069771700000215
Respectively represent collections
Figure FDA00034069771700000216
The ith or jth element in (e), i, j ∈ {1,2,3},
Figure FDA00034069771700000217
the method comprises the following steps of (1) indicating that unequal i and j are selected randomly;
(4.1.3) obtaining a second diagonal matrix Lambda composed of the reflection coefficients of the RIS array elements according to the discrete phase shift of the reflection coefficients of the reflection array elements in all the subsets of the RIS:
Λ=diag(p),
wherein
Figure FDA0003406977170000031
Discrete phase-shifted reflection coefficient vectors for respective subsets of the RIS;
4.2) the transmitting terminal designs and sends a second signal to be synthesized according to the RIS feedback
Figure FDA0003406977170000032
Figure FDA0003406977170000033
Wherein,
Figure FDA0003406977170000034
represents a second phase shift keying PSK signal, an
Figure FDA0003406977170000035
Figure FDA0003406977170000036
Is the secret signal power; q2Representing the phase of the second signal to be synthesized, the expression is as follows:
Figure FDA0003406977170000037
4.3) the legal receiver D obtains the second legal receiving useful signal Z reflected by the RIS2And carrying out vector synthesis on the signal to obtain a regular second amplitude phase modulation signal
Figure FDA0003406977170000038
Wherein alpha is2Synthesizing signal amplitude gain for a second legal receiving end;
5) the legal receiving end D and the eavesdropping end Eve respectively acquire respective receiving signals:
the legal receiving end D respectively carries out vector synthesis on the signals to be synthesized according to the random vector synthesis RVS strategy constructed in the step 3) and the grouping vector synthesis GVS strategy constructed in the step 4) to obtain an observation signal y of the first legal receiving endb1And a second legal receiving end observation signal yb2
Figure FDA0003406977170000039
Figure FDA00034069771700000310
Wherein n isbRepresenting complex Gaussian noise vectors at the legitimate receiver DAn amount;
the eavesdropping end is divided into the following two scenes to eavesdrop the signal to be synthesized, namely a secret signal:
the first method comprises the following steps: when the eavesdropping end has transmission connection with the transmitting end and is blocked from the RIS transmission connection, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receives signals which are respectively expressed as
Figure FDA00034069771700000311
And
Figure FDA00034069771700000312
Figure FDA00034069771700000313
Figure FDA0003406977170000041
wherein n isoRepresenting a complex Gaussian noise vector at an eavesdropping end Eve;
and the second method comprises the following steps: when the eavesdropping end is in transmission connection with the transmitting end and the RIS, under the random vector synthesis RVS strategy constructed in the step 3) and the packet vector synthesis GVS strategy constructed in the step 4), the eavesdropping end receiving signals are respectively expressed as
Figure FDA0003406977170000042
And
Figure FDA0003406977170000043
Figure FDA0003406977170000044
Figure FDA0003406977170000045
6) the legal receiving end and the eavesdropping end respectively detect and decode the received signals obtained by the legal receiving end and the eavesdropping end:
a legal receiving end performs optimal detection on the phase modulation symbol based on the maximum likelihood estimation criterion, completes secret information decoding and accurately obtains secret information;
the eavesdropping end decodes the secret information under the interference of the vector synthesis strategy constructed by the transmitting end, and the secret information cannot be accurately acquired.
2. The method of claim 1, wherein: channel vectors from transmitting terminal S to RIS and from RIS to legal receiving terminal in step 2)
Figure FDA0003406977170000046
And
Figure FDA0003406977170000047
obtained as follows: the transmitting terminal S sends pilot frequency information to the legal receiving terminal D, the pilot frequency information is reflected to the legal receiving terminal D through the RIS, the RIS and the legal receiving terminal D estimate a first channel hopping matrix according to the pilot frequency information, then the first channel hopping matrix is used as the input of the deep residual error network, the second channel hopping matrix is used as the output of the deep residual error network, the network is trained to obtain channel state information, the transmitting terminal completes the accurate estimation of the channel according to the information, and the channel vector from the transmitting terminal to the RIS and the channel vector from the RIS to the legal receiving terminal are obtained.
3. The method of claim 1, wherein: the random vector synthesis RVS strategy in the step 3) and the packet vector synthesis GVS strategy in the step 4) are both constructed according to the channel characteristics, the security of the system under the channel condition and the complexity of the RIS control link, wherein the channel comprises a flat fading channel and a fast fading channel.
4. The method of claim 1The method of (2), characterized by: first legal reception of useful signal Z in step 3.3)1And the first legal receiving end synthesizes the signal amplitude gain alpha1Obtained according to the following formula:
Figure FDA0003406977170000051
Figure FDA0003406977170000052
5. the method of claim 1, wherein: second legal reception of useful signal Z in step 4.3)2And the amplitude gain alpha of the combined signal of the second legal receiving end2Obtained according to the following formula:
Figure FDA0003406977170000053
Figure FDA0003406977170000054
6. the method of claim 1, wherein: in step 6), the eavesdropping end limits the detection of the signal under the interference of the vector synthesis strategy constructed by the transmitting end, and the detection is specifically divided into the following two conditions:
A. the eavesdropping end has transmission connection with the user end, and when the transmission connection with the RIS is blocked: the eavesdropping end has limited signal detection performance according to the obtained ideal fading channel state information, and cannot synthesize an accurate phase modulation symbol like a legal receiving end;
B. when the eavesdropping end is in transmission connection with the user side and the RIS: and the interception end processes the RIS reflection interference signal and the received noise as color noise according to the obtained ideal fading channel state information, and performs maximum likelihood detection on the intercepted signal after the noise whitening to obtain a decoded signal.
CN202111518867.2A 2021-12-13 2021-12-13 Wireless single-input single-output vector synthesis safe transmission method based on RIS Pending CN114205048A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111518867.2A CN114205048A (en) 2021-12-13 2021-12-13 Wireless single-input single-output vector synthesis safe transmission method based on RIS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111518867.2A CN114205048A (en) 2021-12-13 2021-12-13 Wireless single-input single-output vector synthesis safe transmission method based on RIS

Publications (1)

Publication Number Publication Date
CN114205048A true CN114205048A (en) 2022-03-18

Family

ID=80653057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111518867.2A Pending CN114205048A (en) 2021-12-13 2021-12-13 Wireless single-input single-output vector synthesis safe transmission method based on RIS

Country Status (1)

Country Link
CN (1) CN114205048A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115189789A (en) * 2022-06-14 2022-10-14 北京理工大学长三角研究院(嘉兴) Low-complexity intelligent super-surface phase control method for physical layer security communication
CN115694662A (en) * 2022-10-21 2023-02-03 桂林电子科技大学 Intelligent reflector assisted VLC and RF hybrid network secure transmission method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049399A (en) * 2015-05-20 2015-11-11 南京邮电大学 Directional modulation signal design method based on spatial Fourier transformation
CN106330382A (en) * 2016-10-14 2017-01-11 西安交通大学 Safe transmission method based on multipath fading frequency selection characteristics in wireless network
JP2018137702A (en) * 2017-02-24 2018-08-30 学校法人同志社 Radio transmission method
CN110243436A (en) * 2019-07-08 2019-09-17 智驰华芯(无锡)传感科技有限公司 A kind of short distance interference signal cancellation system for radar levelmeter
CN111355520A (en) * 2020-03-10 2020-06-30 电子科技大学 Design method of intelligent reflection surface assisted terahertz safety communication system
CN112367106A (en) * 2020-10-10 2021-02-12 西安电子科技大学 6G RIS-assisted optimization method for physical layer safety combination in NOMA system
CN112954690A (en) * 2021-01-22 2021-06-11 西北工业大学 Anti-interference method and system based on space-based reconfigurable intelligent surface
CN113411115A (en) * 2021-06-15 2021-09-17 河南科技大学 Intelligent reflection surface assisted millimeter wave physical layer security communication joint optimization method
WO2021207748A2 (en) * 2020-08-13 2021-10-14 Futurewei Technologies, Inc. Methods and apparatus for channel reconstruction in intelligent surface aided communications

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049399A (en) * 2015-05-20 2015-11-11 南京邮电大学 Directional modulation signal design method based on spatial Fourier transformation
CN106330382A (en) * 2016-10-14 2017-01-11 西安交通大学 Safe transmission method based on multipath fading frequency selection characteristics in wireless network
JP2018137702A (en) * 2017-02-24 2018-08-30 学校法人同志社 Radio transmission method
CN110243436A (en) * 2019-07-08 2019-09-17 智驰华芯(无锡)传感科技有限公司 A kind of short distance interference signal cancellation system for radar levelmeter
CN111355520A (en) * 2020-03-10 2020-06-30 电子科技大学 Design method of intelligent reflection surface assisted terahertz safety communication system
WO2021207748A2 (en) * 2020-08-13 2021-10-14 Futurewei Technologies, Inc. Methods and apparatus for channel reconstruction in intelligent surface aided communications
CN112367106A (en) * 2020-10-10 2021-02-12 西安电子科技大学 6G RIS-assisted optimization method for physical layer safety combination in NOMA system
CN112954690A (en) * 2021-01-22 2021-06-11 西北工业大学 Anti-interference method and system based on space-based reconfigurable intelligent surface
CN113411115A (en) * 2021-06-15 2021-09-17 河南科技大学 Intelligent reflection surface assisted millimeter wave physical layer security communication joint optimization method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115189789A (en) * 2022-06-14 2022-10-14 北京理工大学长三角研究院(嘉兴) Low-complexity intelligent super-surface phase control method for physical layer security communication
CN115189789B (en) * 2022-06-14 2023-10-31 北京理工大学长三角研究院(嘉兴) Low-complexity intelligent super-surface phase control method for physical layer safety communication
CN115694662A (en) * 2022-10-21 2023-02-03 桂林电子科技大学 Intelligent reflector assisted VLC and RF hybrid network secure transmission method
CN115694662B (en) * 2022-10-21 2023-09-05 桂林电子科技大学 VLC and RF hybrid network safe transmission method assisted by intelligent reflecting surface

Similar Documents

Publication Publication Date Title
Pham et al. A generalized probabilistic data association detector for multiple antenna systems
Jeganathan et al. Generalized space shift keying modulation for MIMO channels
CN113965234B (en) RIS-enabled uplink random disturbance alignment pre-coding spatial modulation method
CN109714087B (en) Artificial noise generation method based on maximized eavesdropper bit error rate
CN114205048A (en) Wireless single-input single-output vector synthesis safe transmission method based on RIS
Gao et al. Joint antenna selection and power allocation for secure co-time co-frequency full-duplex massive MIMO systems
CN100559740C (en) A kind of low complex degree multi-input and multi-output detection method near the Maximum Likelihood Detection performance
CN112398556A (en) Method for detecting pilot interference in intelligent reflector communication system
CN108988923A (en) Antenna selecting method based on signal leakage in the modulating system of safe space
Huang et al. Parallel quadrature spatial modulation for massive MIMO systems with ICI avoidance
CN116318311A (en) Transmission method based on reconfigurable intelligent surface anti-phase index modulation
CN112702732B (en) Generalized spatial modulation secure transmission method based on low-complexity additive noise
CN110062384B (en) Wireless monitoring method based on signal rotation
Zhang et al. Distance-angle beamforming for covert communications via frequency diverse array: Toward two-dimensional covertness
CN108306840B (en) Phase jitter-based single carrier radar communication integrated signal implementation device
CN108337023B (en) Secure communication method based on multi-user multi-antenna communication system and secret beam forming design
Yang et al. Optimal beamforming in cooperative cognitive backscatter networks for wireless-powered IoT
CN109818663A (en) A kind of low complex degree difference quadrature spatial modulation detection method
CN111585621B (en) Communication method based on antenna selection of maximized artificial noise power
Liu et al. Eavesdropping against artificial noise: hyperplane clustering
CN109802903B (en) Physical layer safety transmission method based on full duplex signal cancellation
CN110719126B (en) Covert communication method suitable for MIMO communication system
CN111263363A (en) High-strength safe transmission method
CN106792899B (en) Cognition wireless network safe transmission method of physical layer based on secondary user selection
Dong et al. Quadrature joint transmitter-receiver spatial modulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination