CN106374980A - Safe transmission method in MIMO Y eavesdropping network based on real interference alignment - Google Patents
Safe transmission method in MIMO Y eavesdropping network based on real interference alignment Download PDFInfo
- Publication number
- CN106374980A CN106374980A CN201610602799.0A CN201610602799A CN106374980A CN 106374980 A CN106374980 A CN 106374980A CN 201610602799 A CN201610602799 A CN 201610602799A CN 106374980 A CN106374980 A CN 106374980A
- Authority
- CN
- China
- Prior art keywords
- user
- signal
- relay
- signals
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000005540 biological transmission Effects 0.000 title claims abstract description 24
- 239000011159 matrix material Substances 0.000 claims abstract description 80
- 230000006854 communication Effects 0.000 claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 23
- 230000001629 suppression Effects 0.000 claims abstract description 18
- 238000005516 engineering process Methods 0.000 claims abstract description 14
- 239000013598 vector Substances 0.000 claims description 19
- 238000007476 Maximum Likelihood Methods 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 6
- 230000000670 limiting effect Effects 0.000 claims description 6
- 230000003321 amplification Effects 0.000 claims description 4
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 4
- 208000032370 Secondary transmission Diseases 0.000 claims description 3
- 108010049656 goblet cell silencer inhibitor Proteins 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- 230000008030 elimination Effects 0.000 claims description 2
- 238000003379 elimination reaction Methods 0.000 claims description 2
- 208000033126 Colobomatous microphthalmia Diseases 0.000 claims 2
- 208000034367 isolated with coloboma microphthalmia Diseases 0.000 claims 2
- 238000010276 construction Methods 0.000 abstract 2
- 238000010586 diagram Methods 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000005764 inhibitory process Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0037—Inter-user or inter-terminal allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0076—Allocation utility-based
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Radio Relay Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a safe transmission method in an MIMO Y eavesdropping network based on real interference alignment. According to the method, through utilization of a real interference alignment technology and an artificial noise technology, through construction of useful signal precoding matrixes and interference suppression matrixes, inter-user interference signals at legal user positions are located in null spaces of receiving suppression matrixes; and noise signals are completely eliminated through linear combination. Moreover, through construction of a noise signal coding matrix at a relay position, the noise signals are completely aligned to receiving signal spaces of eavesdropping users, so the eavesdropping users cannot eavesdrop the signals and the whole multi-user eavesdropping network can obtain multiple safe communication channels.
Description
Technical Field
The invention belongs to the field of physical layer security in wireless communication, and particularly relates to a secure transmission method in a MIMOY eavesdropping network based on real interference alignment.
Background
In recent years, security issues in wireless communications have become a focus of research. The traditional encryption algorithm is mainly applied to an upper network, and information is encrypted by using a secret key at a transmitting end to convert a plaintext into a ciphertext; at the receiving end, the information is decrypted by using the key, and the ciphertext is converted into the plaintext. An eavesdropper would analyze the plaintext based on the received ciphertext. Therefore, cryptographic algorithms need to be continuously improved and the length of keys increased to cope with the ever increasing computing power of computers. Physical layer security techniques have been gradually applied to wireless networks and ad hoc networks as a complement to encryption techniques. The core idea is to utilize different physical characteristics between the legal channel and the eavesdropping channel to realize secure transmission. At present, many researches are concentrated on physical layer security technology, wiener proves that both legal communication parties can still obtain perfect security communication under the condition of no shared key for the first time, and simultaneously points out that under a discrete memoryless channel model, the security rate is the difference value between the legal channel rate and the eavesdropping channel rate, and a wiener eavesdropping channel model is provided, which lays a foundation for future researches, and the same security rate formula is obtained by popularizing the wiener eavesdropping channel model to a Gaussian channel model and a broadcast channel model by existing documents.
In a multi-user eavesdropping network, the problems of reliability and safety of information transmission exist simultaneously. The transmission process of the system is inevitably affected by the interference between users, thereby reducing the number of data streams, i.e., the degree of freedom (DOF), that the system can transmit. Therefore, in order to attenuate the inter-user interference, the interference alignment technique has attracted a wide attention. The basic principle of interference alignment is to compress the interference vector into a smaller interference space, where the desired signal is independent, and then recover the desired signal by simply forcing zeros so that many users can communicate simultaneously in a low-dimensional signal space. The prior art proposes interference alignment algorithms requiring a small number of antennas, which can achieve the same degree of freedom as the conventional interference alignment algorithms. Notably, we have found that cooperative scrambling techniques are not as mentally desirable as interference alignment techniques. As one of the key technologies in physical layer security, the cooperative scrambling technology generally places a transmitted noise signal in a null space of a channel, so that the transmitted noise signal does not interfere with a useful signal, and only weakens a received signal-to-noise ratio of an eavesdropping end; interference alignment is also desirable to separate the desired signal and the interfering signal at the receiving end. Therefore, researchers have studied to implement secure communication in a multi-user eavesdropping network using interference alignment techniques. As in the prior art, the authors implement the number of non-zero secure data streams, i.e. (privacy degrees of freedom), of K user gaussian interference channels using interference alignment in combination with network coding techniques.
For multi-user eavesdropping networks with relays, it is indicated that interference alignment techniques can be used to achieve secure communication throughout the system. X.he and a.yener investigated the problem of privacy freedom in a two-hop eavesdropping network with unreliable relays. However, at present, the study on the security degree of freedom of the multi-path relay eavesdropping network is still lacked. A typical K-user multi-hop relay eavesdropping network is a MIMO Y eavesdropping channel, in which all users are multi-antenna nodes, each user desires to communicate with all other users through a relay, and since its communication model is shaped like the letter "Y" and its communication mode is in a one-to-many manner, it is named "Y model". The communication process mainly comprises a Multiple Access (MAC) stage and a Broadcast (BC) stage. In the MAC stage, each user sends K-1 signals to the relay, and simultaneously, signal alignment is carried out at the relay; in the BC stage, the relay broadcasts the aligned K (K-1)/2 signals to all users, and each user can obtain a desired signal through self-interference cancellation. In the invention, a safe communication scheme based on a real interference alignment technology is provided, and the safe communication of a multi-user eavesdropping system with relays is realized by designing a pre-coding matrix, an interference suppression matrix and an artificial noise coding matrix.
Disclosure of Invention
The invention aims to overcome the defects and provide a secure transmission method in a MIMO Y eavesdropping network based on real interference alignment.
In order to achieve the above object, the present invention comprises the steps of:
before starting to transmit signals, each user needs to select a useful signal from a PAM constellation, and a noise signal sent by a relay is also taken from one PAM constellation;
step two, according to the known global channel state information, each sending user designs a relevant pre-coding matrix according to the interference alignment condition;
step three, assuming that all users and nodes are in a full duplex mode, all users send coded signals to the relay, and the relay sends first artificial noise signals;
step four, the relay broadcasts the artificial noise and the amplified useful signal to all users at the same time;
and step five, after each user receives the signals twice, eliminating artificial noise signals sent by the relay through linear combination, and demodulating useful signals by using a receiving suppression matrix meeting certain limiting conditions, so that the whole system obtains a certain communication rate.
The specific method of the first step is as follows:
all channels are real channel matrix using real interference alignment technique, and user U is assumediTo user UjSignal s ofijTaken from the PAM constellation C (a) defined belowU,QU) I.e. by
C(aU,QU)=aU{-QU,-QU+1,...,QU-1,QU}
In the formula:
QU-a number of users K and a transmission power per user PiThe associated positive values, for > 0,
aU-real numbers such that the transmit signal of each user satisfies the transmit power limit, for γ > 0,
in the above description, each user UiTransmitted signal si=[si1,si2,...,siK]T∈R(K-1)×1Is subject to a precoding matrix Vi∈RM×(K-1)Encoded signal Xi∈RM×1I.e. bySo that the transmission power is limited toThus, QUAnd in the expressionUGamma in the expression takes any one of a plurality of groups of values which meet the power limiting condition;
relaying the transmitted interference noise b in the MBWC MIMO Y modeli∈RK(K-1)×1Contains K (K-1) symbols, which are taken from another PAM constellation C (a)R,QR) I.e. by
C(aR,QR)=aR{-QR,-QR+1,...,QR-1,QR}
In the formula:
QR-a positive value relating to the number K of users and the secondary transmission power P, for > 0,
aRa real number such that the transmitted signal at the relay satisfies the transmit power limit, for γ > 0,
in sending biIt needs to be coded before, and the coding matrix is Ti∈RN×K(K-1)(ii) a Thus, the artificial noise transmitted by the relay isLimit of transmitted signal powerTo be E [ tr (zz)H)]β P is less than or equal to, therefore, QRAnd in the expressionRγ in the expression takes any one of a plurality of sets of values that satisfy the power limitation condition.
The specific method of the second step is as follows:
in order to eliminate the interference between users generated when K users communicate with each other and demodulate the signals from other K-1 users, a precoding matrix V needs to be designed for each useri,Which consists of K-1 precoding vectors v of dimension M × 1ijComposition of each precoding vector vijWill be for each signal sjiPerforming linear precoding, i.e. vijsij(ii) a When the dimension of the space opened by N antennas at the relay is less than K (K-1) symbol numbers, part of signals are subjected to aliasing at the relay, in order to avoid the situation, an interference alignment technology is adopted, and when the number of antennas at each node meets the requirementWhen all paired signals are like sijAnd sjiAligned to the same dimension of the relay, in which case K (K-1) useful signals can be included in the relayIn dimensional space, i.e. the following equation needs to be satisfied:
wherein, the equivalent vector of the same dimension after passing through the channel is marked as Ui,j,K is user U ═ 1,2iTo the relay, to the user UiThe real channel matrix of (a); at this point, no aliasing will occur between the signals at the relay;
at the relay, to ensure that the desired legitimate signal can not be eavesdropped, when the GCSI is known, the precoding matrix T of the artificial noise signal is designediSo that it satisfiesNamely, it is
Wherein,i 1,2, K denotes a real channel matrix between the eavesdropping peer and the user, and between the eavesdropping peer and the relay, respectively, GiEquivalent vectors of the same dimensionality after the channel is intercepted; the encoded artificial noise signal is represented as
The concrete method of the third step is as follows:
all users will encode the signal XiAnd sending the signals to the relay node, wherein the signals received by the relay are as follows:
in the formula:
nrlocal white gaussian noise at the relay;
when all users send to the relayWhen transmitting signal, the relay broadcasts the artificial noise with power of β P to the user and the eavesdropping end at the same time, at this time, the signal received by the user at this stage is
In the formula:
beta-the artificial noise power distribution coefficient at the relay.
-user UjLocal white Gaussian noise at MAC stage with a noise variance of
The concrete method of the fourth step is as follows:
after K (K-1) signals are received in a relay way, the signals are amplified and forwarded to all users, and the forwarded signals are Xr=αYrWhere α is the amplification factor at the relay, the power limit for transmitting the desired signal isAt the same time, the artificial noise signal is transmitted again, which is the same as the MAC stage, and the received signal of each user at this stage is
In the formula:
-user UjLocal white Gaussian noise in BC stage with noise variance of
The concrete method of the step five is as follows:
firstly, weighting and combining the signals received twice by the legal receiving end and the eavesdropping end to obtain combined signals:
note that:thus, YjThe method does not contain artificial noise z, so that a legal user cannot be influenced by an artificial noise interference signal;
after alignment by said disturbances Y is alignedjRe-expressed as a superimposed version of two sets of paired signals:
in the formula:
-an interference alignment matrix;
the dimension relays the pair of signals to the dimension,
for user UjIn which the received signal is divided into two parts, the desired useful signalInterfering signals with other users
Secondly, designing a receiving suppression matrix of each user; after spatial signal alignment, user UjIt is further required to use (K-1) × M dimension reception rejection matrix Fi=[f1if2i...fi-1,ifi+1,i...fKi]TFor YjPerform interference zero forcing, and receive effective signal, i.e. using FjLeft times Yj,
In the formula:
a dimension equivalent reception rejection matrix;
equivalent reception rejection matrix PjIs selected according to the principle that
Wherein Null { A } represents the Null space of matrix A; the two formulas represent PjIs taken fromAnd is a null space ofjIs out of positionIn the null space of (a);
in order to select a matrix P that meets the above-mentioned criteriajFirst, it is necessary to make explicit whether such a matrix exists; assuming that each legitimate node knows CSI, the above equation is equivalent toTo satisfy this condition, the number of antennas at the relay must be satisfiedWhich is already included in the feasibility of disturbing the alignment, i.e.Therefore, it must be true when the interference alignment condition is satisfied; in order to ensure that there is a presence,is shown inAn N × N- (K-1) -dimensional null space exists in the matrix, denoted as Q, and Q is assumed to be composed of a series of N × 1 order null vectors Q, i.e., Q isPjWriting in the form of column vectors, Pj=[pj,1pj,2...pj,K-1](ii) a At this time, if and only if the matrix a exists, it is such that a ═ p is satisfiedj,1pj,2...pj,K-1qj]When rank (a) is K, this indicates that P is selectedjIs independent of null space, i.e.In summary, the reception suppression matrix P at the user isjOr FjAlways present;
therefore, in any case, the reception suppression matrix meeting the conditions is selected, and then self-interference elimination is carried out, so that the user UjDemodulate the received signal, i.e.
In the formula:
-user UjLegally receiving the signal;
-user UjA precoding matrix of the legitimate signal of (a);
the third step: detecting a signal using a maximum likelihood detection scheme;
at user UjRecord the estimated signal asWhen the received signal is knownUsing maximum likelihood detection method to obtainThe estimated signal is obtained and used as the estimation signal,
wherein,
chi is-is SjThe obtained set has (2Q)U+1)K-1Seed growing;
argmin||A||2the minimum of the two norms of the matrix a.
Compared with the prior art, the method utilizes the real interference alignment technology and the artificial noise technology, and realizes that the interference signals among the users are positioned at the zero space of the receiving inhibition matrix at the legal user by constructing the useful signal pre-coding matrix and the interference inhibition matrix, and the noise signals are linearly combined and completely eliminated; in addition, a noise signal coding matrix is constructed at the relay, and noise signals are completely aligned to a receiving signal space of an eavesdropping user, so that the purpose that the eavesdropping user cannot eavesdrop the signals is achieved, and the whole multi-user eavesdropping network can obtain a plurality of secure communication channels.
Drawings
FIG. 1 is a diagram illustrating the MAC stage of the eavesdropping model according to the present invention;
FIG. 2 is a diagram illustrating a BC stage of the eavesdropping model according to the present invention;
FIG. 3 is a block flow diagram of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention provides a physical layer security scheme adopting a real interference alignment technology and cooperative scrambling, which adopts an amplification forwarding protocol, carries out precoding at a user based on a multi-user-relay-multi-user physical channel, sends artificial noise at a relay, and the noise interferes with an external eavesdropping node under the condition of not interfering the user, and obtains all secure communication channels under the condition of limiting the power of each user node.
The invention considers a MIMO Y eavesdropping model, there are K users totally, each user has M antennas, there are N antennas in the relay, realize the intercommunication among a plurality of users through an AF relay, the system contains an eavesdropping node, the power that each user sends the signal is PiThe sum of the transmission power of all users is P, the power of the artificial noise signal transmitted by the relay is β P, the power of the retransmission legal signal is (1- β) P, wherein β is the power distribution coefficient of the relay, and 0 < β < 1. the whole transmission process is described as follows:
as shown in fig. 1, fig. 2 and fig. 3, the present invention provides a physical layer secure transmission method in a K-user MIMO Y eavesdropping system based on a real interference alignment technique and a cooperative interference technique, including the following steps:
1) before starting to transmit signals, each user needs to select a useful signal from a PAM constellation, and a noise signal sent by a relay is also taken from one PAM constellation;
in the following analysis, to employ a real interference alignment technique, all channels are real channel matrices, and it is assumed that user UiTo user UjSignal s ofijTaken from the PAM constellation C (a) defined belowU,QU) I.e. by
C(aU,QU)=aU{-QU,-QU+1,...,QU-1,QU}
In the formula:
QU-a number of users K and a transmission power per user PiThe associated positive values, for > 0,
aU-real numbers such that the transmit signal of each user satisfies the transmit power limit, for γ > 0,in the above description, each user UiTransmitted signal si=[si1,si2,...,siK]T∈R(K-1)×1Is subject to a precoding matrix Vi∈RM×(K-1)Encoded signal Xi∈RM×1I.e. bySo that the transmission power is limited toThus, QUAnd in the expressionUγ in the expression may take any one of a plurality of sets of values that satisfy the power limitation condition.
Relaying the transmitted interference noise b in the MBWC MIMO Y modeli∈RK(K-1)×1Contains K (K-1) symbols, which are taken from another PAM constellation C (a)R,QR) I.e. by
C(aR,QR)=aR{-QR,-QR+1,...,QR-1,QR}
In the formula:
QR-a positive value relating to the number K of users and the secondary transmission power P, for > 0,
aRa real number such that the transmitted signal at the relay satisfies the transmit power limit, for γ > 0,in sending biIt needs to be coded before, and the coding matrix is Ti∈RN×K(K-1)Later we need to do with TiAnd (5) designing. Thus, the artificial noise transmitted by the relay isIts transmit signal power is limited to E tr (zz)H)]β P. ltoreq. therefore, QRAnd in the expressionRγ in the expression may take any one of a plurality of sets of values that satisfy the power limitation condition.
2) According to the known global channel state information, each sending user needs to design a relevant precoding matrix according to the interference alignment condition; an artificial noise coding matrix also needs to be designed at the relay, and the specific method is as follows:
in order to eliminate the interference between users generated when K users communicate with each other and demodulate the signals from other K-1 users, a precoding matrix V needs to be designed for each useri,Which consists of K-1 precoding vectors v of dimension M × 1ijComposition of each precoding vector vijWill be for each signal sjiPerforming linear precoding, i.e. vijsij. When the dimension of a space opened by N antennas at a relay is smaller than K (K-1) symbol numbers, aliasing occurs to partial signals at the relay, and in order to avoid the situation, an interference alignment technology is adopted, and when the number of antennas at each node meets the requirementWhen all paired signals are like sijAnd sjiAligned to the same dimension of the relay, in which case K (K-1) useful signals can be included in the relayIn dimensional space, i.e. the following equation needs to be satisfied
Wherein, the equivalent vector of the same dimension after passing through the channel is marked as Ui,j,K is user U ═ 1,2iTo the relay, to the user UiThe real channel matrix of (a). At this point, no aliasing will occur between the signals at the relay.
At the relay, to ensure that the desired legitimate signal can not be eavesdropped, when the GCSI is known, we design the precoding matrix T of the artificial noise signaliSo that it satisfiesNamely, it is
Wherein,i 1,2, K denotes a real channel matrix between the eavesdropping peer and the user, and between the eavesdropping peer and the relay, respectively, GiIs an equivalent vector of the same dimension after the channel is intercepted. The encoded artificial noise signal is represented as
3) Assuming that all users and nodes are in a full duplex mode, in the first stage, all users send coded signals to a relay, and the relay sends artificial noise signals for the first time; in the second stage, the relay broadcasts the artificial noise and the amplified useful signal to all users simultaneously;
the specific communication process is divided into the following steps:
step 1(MAC stage): all users will encode the signal XiAnd sending the signals to the relay node, wherein the signals received by the relay are as follows:
in the formula:
nrlocal white gaussian noise at the relay.
When all users send signals to the relay, the relay simultaneously broadcasts the artificial noise z-direction user with power of β P and the eavesdropping terminal, and at the moment, the signals received by the users at the stage are
In the formula:
-user UjLocal white Gaussian noise at MAC stage with a noise variance of
Step 2(BC stage): when relayingAfter receiving K (K-1) signals, amplifying and transmitting the signals to all users, wherein the transmitted signals are Xr=αYrWhere α is the amplification factor at the relay, the power limit for transmitting the desired signal isAt the same time, the artificial noise signal is transmitted again, which is the same as the MAC stage, and the received signal of each user at this stage is
In the formula:
-user UjLocal white Gaussian noise in BC stage with noise variance of
4) After each user receives the signals twice, artificial noise signals sent by the relay are eliminated through linear combination, and useful signals are demodulated by using a receiving suppression matrix meeting a certain limiting condition, so that the whole system obtains a certain communication rate. The method comprises the following specific steps:
step 1: the signals received twice by the legal receiving end and the eavesdropping end are weighted and combined, and the combined signals are obtained as follows:
note that:thus, YjThe legal user is not influenced by the artificial noise interference signal because the artificial noise z is not contained in the system.
After alignment by said disturbances Y can be alignedjRe-expressed as a superimposed version of two sets of paired signals:
in the formula:
-an interference alignment matrix;
the dimension relays the pair of signals to the dimension,
for user UjIn which the received signal is divided into two parts, the desired useful signalInterfering signals with other users
Step 2: and designing a receiving suppression matrix of each user. After spatial signal alignment, user UjIt is further required to use (K-1) × M dimension reception rejection matrix Fi=[f1if2i...fi-1,ifi+1,i...fKi]TFor YjPerform interference zero forcing to receive effective signal, i.e. using FjLeft times Yj,
In the formula:
- (K-1) × N-dimensional equivalent reception suppression matrix.
Equivalent reception rejection matrix PjIs selected according to the principle that
Where Null { A } represents the Null space of matrix A. The two formulas represent PjIs taken fromAnd is a null space ofjIs out of positionIn the null space of (a).
In order to select a matrix P that meets the above-mentioned criteriajFirst it needs to be made clear whether such a matrix is present or not. Assuming that each legitimate node knows CSI, the above equation is equivalent toTo satisfy this condition, the number of antennas at the relay must be satisfiedWhich is already included in the feasibility of disturbing the alignment, i.e.Therefore, the interference alignment condition is necessarily satisfied. To ensure presence, we note thatThis is shown inThere exists a null space of dimension N × N- (K-1), denoted Q, in the matrix, assuming Q is made up of a series of null vectors Q of order N × 1, i.e., Q is thePjCan be written in the form of a column vector, Pj=[pj,1pj,2...pj,K-1]. At this time, if and only if the matrix a exists, it is such that a ═ p is satisfiedj,1pj,2...pj,K-1qj]When rank (a) is K, this indicates that P is selectedjIs independent of null space, i.e.In summary, the reception suppression matrix P at the user isjOr FjWill always be present.
Therefore, in any case, we can select the reception suppression matrix meeting the condition, and then eliminate by self-interference, the user UjCan demodulate the received signal, i.e.
In the formula:
-user UjA signal is legally received.
-user UjOf the legitimate signal.
And step 3: the signal is detected using a maximum likelihood detection scheme.
At user UjRecord the estimated signal asWhen the received signal is knownThen, the estimated signal is obtained by utilizing a maximum likelihood detection method,
wherein,
chi is-is SjThe obtained set has (2Q)U+1)K-1Seed growing;
argmin||A||2the minimum of the two norms of the matrix a.
In summary, the whole multi-user relay eavesdropping network can realize the secure communication.
5) In order to verify the performance of the present invention, we will analyze the number of secure data streams that can be obtained by the system under this scheme from the viewpoint of information theory, i.e. derive the security freedom of the whole system. When the number of secure data streams is greater than zero, the entire system is securely communicable. The method comprises the following specific steps:
step 1: the number of data streams communicated by a legitimate user is first derived. The information rate obtained by each user is:
in the formula:
i (A, B) -mutual information of two random variables A and B;
h (-) -information entropy.
Wherein, due to SjThe K-1 symbols in (A) are equally likely to be from the PAM constellation C (a)U,QU) Thus H (S)j)=log(2QU+1)K-1. In addition, we use Markov chainsRestricted by the Ferno inequalityThe upper bound of the error probability is:
in the formula ηγ-and PiAn irrelevant positive value. Herein, we assume PiP/K, so the sum rate of legitimate users is expressed asNamely, it is
Rsum≥K log(2QU+1)K-1-K-K PrU(e)log(2QU+1)K-1
We are right to RsumThe value of (A) is limited under the condition of high signal-to-noise ratio, namely the legal data flow number of the whole system can be obtained,
this means that when each user transmits K-1 data, the legal number of data streams for K users of the entire system is K (K-1).
Step 2: and analyzing the number of data streams which can be overheard by the eavesdropping end. The signal received twice by the eavesdropping peer is first analyzed. In the MAC phase, the signal received by the eavesdropping peer is:
wherein:
-local noise at the eavesdropping end when the signal is received for the first time, the variance of the noise being
In the BC phase, the signal received by the eavesdropping terminal for the second time is:
wherein:
-local noise at the eavesdropping end on the second reception of the signal, with a noise variance of
For the eavesdropping end, we cannot know the eavesdropping method used by the eavesdropping end, so in the invention, the eavesdropping end is assumed to adopt a method which is most beneficial to eavesdropping, namely, the eavesdropping end linearly combines the received two signals. Assuming that an eavesdropper can utilize the receiving matrixCombining the two eavesdropped signals to obtain the maximum eavesdropped signal-to-noise ratio, i.e.The demodulated signal of the eavesdropping terminal is represented as
In the formula:
Si-the transmission signal of each user,
Nethe eavesdropping-side equivalent local noise, i.e.
When in useWhen the signal received by the eavesdropping terminal can be re-expressed as
The first term in the above equation represents the effect of the interfering signal on each user signal. We align the signal and the interference to one dimension, so that the eavesdropping end cannot distinguish the useful signal and cannot eavesdrop. At this time, the wiretap information rate is
When W is1≠0,W2≠0,Can be expressed as
At this time:
for eavesdropping end, orderThe number of eavesdropping channels is equivalently expressed as:
this means that the eavesdropping end can eavesdrop at mostA data stream of symbolsIndicating a rounding down.
And step 3: and the intercepted data stream is removed from the legal data stream, the rest data stream is the number of the safe and confidential data streams, and when the safe data stream exists in the whole system, the whole system can carry out safe communication. Thus, the minimum value of the number of secure data streams for the K-user MBWC model is
This indicates that when the number of users is greater than three, the system can obtain a minimum number of data streamsWherein the symbolsIndicating rounding up. The data flow number is always positive value, namely the data flow of the safety communication exists in the whole system, and the safety of the system is ensured.
The scheme of the safe communication based on the real interference alignment technology and the cooperative scrambling technology in the K user MIMO Y eavesdropping channel provided by the invention has the following advantages:
the scheme is suitable for the multi-user multi-directional relay eavesdropping network, the safety communication of the whole system is realized by designing the pre-coding matrix, the noise coding matrix and the receiving inhibiting matrix aiming at different users and designing the sending method under the full-duplex communication mode, and the system safety vacancy in the relay network is made up.
From the above proof of performance, the number of secure channels obtained by this method is always greater than zero, which also indicates that the entire system can always achieve secure communication.
Claims (6)
1. A secure transmission method in a MIMO Y-eavesdropping network based on real interference alignment is characterized by comprising the following steps:
before starting to transmit signals, each user needs to select a useful signal from a PAM constellation, and a noise signal sent by a relay is also taken from one PAM constellation;
step two, according to the known global channel state information, each sending user designs a relevant pre-coding matrix according to the interference alignment condition;
step three, assuming that all users and nodes are in a full duplex mode, all users send coded signals to the relay, and the relay sends first artificial noise signals;
step four, the relay broadcasts the artificial noise and the amplified useful signal to all users at the same time;
and step five, after each user receives the signals twice, eliminating artificial noise signals sent by the relay through linear combination, and demodulating useful signals by using a receiving suppression matrix meeting certain limiting conditions, so that the whole system obtains a certain communication rate.
2. The method for secure transmission in a MIMO Y eavesdropping network based on real interference alignment according to claim 1, wherein the specific method of the first step is as follows:
all channels are real channel matrix using real interference alignment technique, and user U is assumediTo user UjSignal s ofijTaken from the PAM constellation C (a) defined belowU,QU) I.e. by
C(aU,QU)=aU{-QU,-QU+1,...,QU-1,QU}
In the formula:
QU-a number of users K and a transmission power per user PiThe associated positive values, for > 0,
aU-real numbers such that the transmit signal of each user satisfies the transmit power limit, for γ > 0,
in the above description, each user UiTransmitted signal si=[si1,si2,...,siK]T∈R(K-1)×1Is subject to a precoding matrix Vi∈RM×(K-1)Encoded signal Xi∈RM×1I.e. bySo that the transmission power is limited toThus, QUAnd in the expressionUGamma in the expression takes any one of a plurality of groups of values which meet the power limiting condition;
relaying the transmitted interference noise b in the MBWC MIMO Y modeli∈RK(K-1)×1Contains K (K-1) symbols, which are taken from another PAM constellation C (a)R,QR) I.e. by
C(aR,QR)=aR{-QR,-QR+1,...,QR-1,QR}
In the formula:
QR-a positive value relating to the number K of users and the secondary transmission power P, for > 0,
aRa real number such that the transmitted signal at the relay satisfies the transmit power limit, for γ > 0,
in sending biIt needs to be coded before, and the coding matrix is Ti∈RN×K(K-1)(ii) a Thus, the artificial noise transmitted by the relay isIts transmit signal power is limited to E tr (zz)H)]β P is less than or equal to, therefore, QRAnd in the expressionRγ in the expression takes any one of a plurality of sets of values that satisfy the power limitation condition.
3. The method for secure transmission in a MIMO Y eavesdropping network based on real interference alignment according to claim 1, wherein the specific method in the second step is as follows:
in order to eliminate the interference between users generated when K users communicate with each other and demodulate the signals from other K-1 users, a precoding matrix V needs to be designed for each useri,Which consists of K-1 precoding vectors v of dimension M × 1ijComposition of each precoding vector vijWill be for each signal sjiPerforming linear precoding, i.e. vijsij(ii) a When the dimension of the space opened by N antennas at the relay is less than K (K-1) symbol numbers, part of signals are subjected to aliasing at the relay, in order to avoid the situation, an interference alignment technology is adopted, and when the number of antennas at each node meets the requirementWhen M is more than or equal to K-1 and 2M is more than N, all paired signals are like sijAnd sjiAligned to the same dimension of the relay, in which case K (K-1) useful signals can be included in the relayIn dimensional space, i.e. the following equation needs to be satisfied:
wherein, the equivalent vector of the same dimension after passing through the channel is marked as Ui,j,K is user U ═ 1,2iTo the relay, to the user UiThe real channel matrix of (a); at this point, no aliasing will occur between the signals at the relay;
at the relay, to ensure that the desired legitimate signal can not be eavesdropped, when the GCSI is known, the precoding matrix T of the artificial noise signal is designediSo that it satisfiesNamely, it is
Wherein,i 1,2, K denotes a real channel matrix between the eavesdropping peer and the user, and between the eavesdropping peer and the relay, respectively, GiFor passing eavesdroppingEquivalent vectors of the same dimensionality behind the track; the encoded artificial noise signal is represented as
4. The method for secure transmission in a MIMO Y eavesdropping network based on real interference alignment according to claim 1, wherein the specific method in the third step is as follows:
all users will encode the signal XiAnd sending the signals to the relay node, wherein the signals received by the relay are as follows:
in the formula:
nrlocal white gaussian noise at the relay;
when all users send signals to the relay, the relay simultaneously broadcasts the artificial noise z-direction user with power of β P and the eavesdropping terminal, and at the moment, the signals received by the users at the stage are
In the formula:
beta-the artificial noise power distribution coefficient at the relay.
-user UjLocal white Gaussian noise at MAC stage with a noise variance of
5. The method for secure transmission in a MIMO Y eavesdropping network based on real interference alignment according to claim 1, wherein the fourth step is as follows:
after K (K-1) signals are received in a relay way, the signals are amplified and forwarded to all users, and the forwarded signals are xr=αYrWhere α is the amplification factor at the relay, the power limit for transmitting the desired signal isAt the same time, the artificial noise signal is transmitted again, which is the same as the MAC stage, and the received signal of each user at this stage is
In the formula:
-user UjLocal white Gaussian noise in BC stage with noise variance of
6. The method for secure transmission in a MIMO Y eavesdropping network based on real interference alignment according to claim 1, wherein the concrete method of the fifth step is as follows:
firstly, weighting and combining the signals received twice by the legal receiving end and the eavesdropping end to obtain combined signals:
note that:thus, YjThe method does not contain artificial noise z, so that a legal user cannot be influenced by an artificial noise interference signal;
after alignment by said disturbances Y is alignedjRe-expressed as a superimposed version of two sets of paired signals:
in the formula:
-an interference alignment matrix;
the dimension relays the pair of signals to the dimension,
for user UjIn which the received signal is divided into two parts, the desired useful signalInterfering signals with other users
Secondly, designing a receiving suppression matrix of each user; after spatial signal alignment, user UjFurther use of (K-1)) × M dimension reception suppression matrix Fi=[f1if2i... fi-1,ifi+1,i... fKi]TFor YjPerform interference zero forcing, and receive effective signal, i.e. using FjLeft times Yj,
In the formula:
- (K-1) × N-dimensional equivalent reception suppression matrix;
equivalent reception rejection matrix PjIs selected according to the principle that
Wherein Null { A } represents the Null space of matrix A; the two formulas represent PjIs taken fromAnd is a null space ofjIs out of positionIn the null space of (a);
in order to select a matrix P that meets the above-mentioned criteriajFirst, it is necessary to make explicit whether such a matrix exists; assuming that each legitimate node knows CSI, the above equation is equivalent toTo satisfy this condition, the number of antennas at the relay must be satisfiedWhich is already included in the feasibility of disturbing the alignment, i.e.Therefore, it must be true when the interference alignment condition is satisfied; in order to ensure that there is a presence,is shown inAn N × N- (K-1) -dimensional null space exists in the matrix, denoted as Q, and Q is assumed to be composed of a series of N × 1 order null vectors Q, i.e., Q isPjWriting in the form of column vectors, Pj=[pj,1pj,2... pj,K-1](ii) a At this time, if and only if the matrix a exists, it is such that a ═ p is satisfiedj,1pj,2... pj,K-1qj]When rank (a) is K, this indicates that P is selectedjIs independent of null space, i.e.In summary, the reception suppression matrix P at the user isjOr FjAlways present;
therefore, in any case, the reception suppression matrix meeting the conditions is selected, and then self-interference elimination is carried out, so that the user UjDemodulate the received signal, i.e.
In the formula:
-user UjLegally receiving the signal;
-user UjA precoding matrix of the legitimate signal of (a);
the third step: detecting a signal using a maximum likelihood detection scheme;
at user UjRecord the estimated signal asWhen the received signal is knownThen, the estimated signal is obtained by utilizing a maximum likelihood detection method,
wherein,
chi is-is SjThe obtained set has (2Q)U+1)K-1Seed growing;
argmin||A||2the minimum of the two norms of the matrix a.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602799.0A CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602799.0A CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106374980A true CN106374980A (en) | 2017-02-01 |
Family
ID=57879153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610602799.0A Pending CN106374980A (en) | 2016-07-27 | 2016-07-27 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106374980A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972912A (en) * | 2017-03-06 | 2017-07-21 | 东华大学 | Secret communication method based on feedback under a kind of MIMO tapping channels |
CN107994934A (en) * | 2017-11-14 | 2018-05-04 | 西北工业大学 | Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
CN109348503A (en) * | 2018-11-20 | 2019-02-15 | 广东工业大学 | A kind of monitor method of wireless communication link, device, equipment and system |
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
CN109526014A (en) * | 2017-09-19 | 2019-03-26 | 株式会社东芝 | Wireless communication device and wireless communications method |
CN110430566A (en) * | 2019-07-26 | 2019-11-08 | 西北工业大学 | A kind of more junction network safe transmission methods of double bounce based on collection of energy |
CN111669206A (en) * | 2020-05-21 | 2020-09-15 | 中国联合网络通信集团有限公司 | Signal detection method and device |
CN111817758A (en) * | 2020-07-21 | 2020-10-23 | 上海交通大学 | Discrete modulation signal MIMO transmission method |
CN111934863A (en) * | 2020-08-11 | 2020-11-13 | 南方电网科学研究院有限责任公司 | Secret key sharing method based on artificial noise and safety coding in edge calculation |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN113595675A (en) * | 2021-06-09 | 2021-11-02 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN114286336A (en) * | 2021-12-30 | 2022-04-05 | 重庆邮电大学 | Multi-cell network secure transmission method based on artificial noise |
CN114679786A (en) * | 2022-03-18 | 2022-06-28 | 重庆邮电大学 | Wireless interference network safe transmission method based on interference alignment and artificial noise |
CN114710231A (en) * | 2022-04-18 | 2022-07-05 | 电子科技大学 | Safety communication method based on artificial noise |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420679A (en) * | 2011-09-30 | 2012-04-18 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
-
2016
- 2016-07-27 CN CN201610602799.0A patent/CN106374980A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420679A (en) * | 2011-09-30 | 2012-04-18 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN102420679B (en) * | 2011-09-30 | 2014-11-19 | 北京邮电大学 | Relay collaborative precoding-based multi-user two-way communication method |
CN103248414A (en) * | 2013-04-17 | 2013-08-14 | 重庆邮电大学 | Method for multi-relay two-hop transmission based on interference alignment and beamforming |
Non-Patent Citations (2)
Title |
---|
YE FAN 等: "Physical Layer Security Based on Real Interference Alignment in K-User MIMO Y Wiretap Channels", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 * |
朱茂娟 等: "基于实干扰对齐技术的两用户中继辅助信道的安全自由度分析", 《重庆邮电大学学报(自然科学版)》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972912A (en) * | 2017-03-06 | 2017-07-21 | 东华大学 | Secret communication method based on feedback under a kind of MIMO tapping channels |
CN106972912B (en) * | 2017-03-06 | 2020-05-26 | 东华大学 | Secret communication method based on feedback under MIMO interception channel |
CN109526014A (en) * | 2017-09-19 | 2019-03-26 | 株式会社东芝 | Wireless communication device and wireless communications method |
CN107994934B (en) * | 2017-11-14 | 2020-10-27 | 西北工业大学 | Safe transmission method of untrusted relay network based on symbol separation and beam forming |
CN107994934A (en) * | 2017-11-14 | 2018-05-04 | 西北工业大学 | Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming |
CN108429708A (en) * | 2018-03-19 | 2018-08-21 | 江苏科技大学 | Multi-user interference is aligned network green secret communication method |
CN109348503B (en) * | 2018-11-20 | 2021-11-26 | 广东工业大学 | Monitoring method, device, equipment and system for wireless communication link |
CN109348503A (en) * | 2018-11-20 | 2019-02-15 | 广东工业大学 | A kind of monitor method of wireless communication link, device, equipment and system |
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
CN109450507B (en) * | 2018-12-03 | 2021-05-11 | 华侨大学 | Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method |
CN110430566A (en) * | 2019-07-26 | 2019-11-08 | 西北工业大学 | A kind of more junction network safe transmission methods of double bounce based on collection of energy |
CN111669206A (en) * | 2020-05-21 | 2020-09-15 | 中国联合网络通信集团有限公司 | Signal detection method and device |
CN111817758A (en) * | 2020-07-21 | 2020-10-23 | 上海交通大学 | Discrete modulation signal MIMO transmission method |
CN111934863A (en) * | 2020-08-11 | 2020-11-13 | 南方电网科学研究院有限责任公司 | Secret key sharing method based on artificial noise and safety coding in edge calculation |
CN111934863B (en) * | 2020-08-11 | 2024-01-09 | 南方电网科学研究院有限责任公司 | Key sharing method based on artificial noise and security coding in edge calculation |
CN112533197A (en) * | 2020-11-19 | 2021-03-19 | 哈尔滨工业大学 | Artificial noise assisted physical layer security method based on interference management |
CN113595675A (en) * | 2021-06-09 | 2021-11-02 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN113595675B (en) * | 2021-06-09 | 2024-01-23 | 西安电子科技大学 | Interference management method and system for maximizing safe data transmission rate |
CN114286336A (en) * | 2021-12-30 | 2022-04-05 | 重庆邮电大学 | Multi-cell network secure transmission method based on artificial noise |
CN114286336B (en) * | 2021-12-30 | 2023-10-13 | 重庆邮电大学 | Multi-cell network safe transmission method based on artificial noise |
CN114679786A (en) * | 2022-03-18 | 2022-06-28 | 重庆邮电大学 | Wireless interference network safe transmission method based on interference alignment and artificial noise |
CN114710231A (en) * | 2022-04-18 | 2022-07-05 | 电子科技大学 | Safety communication method based on artificial noise |
CN114710231B (en) * | 2022-04-18 | 2023-09-19 | 电子科技大学 | Safety communication method based on artificial noise |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106374980A (en) | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment | |
Ding et al. | A general relaying transmission protocol for MIMO secrecy communications | |
CN104540124B (en) | A kind of more relaying safety of physical layer methods of known eavesdropping end channel information | |
He et al. | Two-hop secure communication using an untrusted relay | |
Bassily et al. | Ergodic secret alignment | |
Liu et al. | Unshared secret key cryptography | |
Fakoorian et al. | Secure space-time block coding via artificial noise alignment | |
Kong et al. | The security network coding system with physical layer key generation in two-way relay networks | |
Banawan et al. | MIMO wiretap channel under receiver-side power constraints with applications to wireless power transfer and cognitive radio | |
CN105813081A (en) | Method for selecting relay nodes capable of enhancing security performance of cognitive relay network | |
CN105812037A (en) | Noise-eliminating safe transmission method based on receiving end spatial modulation | |
Abd El-Malek et al. | MIMO cognitive relay networks with correlated antennas over Rayleigh fading channels | |
Karpuk et al. | Perfect secrecy in physical-layer network coding systems from structured interference | |
Kim et al. | A relay can increase degrees of freedom in bursty interference networks | |
Wang et al. | Secure degrees of freedom of the asymmetric Gaussian MIMO interference channel | |
Chiang et al. | Optimal cooperative jamming for security | |
Xie et al. | Sum secure degrees of freedom of two-unicast layered wireless networks | |
Tang et al. | Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI | |
Yan et al. | Distributed precoding for OFDM in two-way relaying communications | |
Tian et al. | Relay-aided interference alignment for the X channel with limited CSI | |
Din et al. | Multiple antenna physical layer security against passive eavesdroppers: A tutorial | |
Wicaksana et al. | On the diversity-multiplexing tradeoff of amplify-and-forward half-duplex relaying | |
Cao et al. | Full-duplex relay assisted secure transmission for NOMA networks | |
Forutan et al. | On the security of lattice-based physical-layer network coding against wiretap attacks | |
Marcum et al. | Quantized distributed relay network for physical layer network coding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170201 |
|
WD01 | Invention patent application deemed withdrawn after publication |