[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109890031B - Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise - Google Patents

Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise Download PDF

Info

Publication number
CN109890031B
CN109890031B CN201910181591.XA CN201910181591A CN109890031B CN 109890031 B CN109890031 B CN 109890031B CN 201910181591 A CN201910181591 A CN 201910181591A CN 109890031 B CN109890031 B CN 109890031B
Authority
CN
China
Prior art keywords
relay
signal
user
relays
noise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910181591.XA
Other languages
Chinese (zh)
Other versions
CN109890031A (en
Inventor
雷宏江
杨子轩
任智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Qingfeng Intelligent Technology Co ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910181591.XA priority Critical patent/CN109890031B/en
Publication of CN109890031A publication Critical patent/CN109890031A/en
Application granted granted Critical
Publication of CN109890031B publication Critical patent/CN109890031B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

本发明提出一种基于人工噪声的多中继非正交多址系统安全传输方案;传输系统包括源节点、两个用户、窃听节点和多个中继节点;本发明中,整个通信过程分为四个阶段:准备阶段、多中继解码阶段、中继选择阶段和用户解码阶段;系统通信分两个时隙完成:第一时隙,信源S将消息广播给所有中继节点,广播时采用消息映射策略,中继接收信号并进行解码;第二时隙,系统进行双中继选择,从可解码中继集合中选出最优中继转发用户信号,从不可解码中继集合中选出最优中继发送人工噪声;中继选择策略可以在保持多中继系统分集增益的同时,有效降低系统的复杂度和安全中断概率;人工噪声加扰可以进一步降低窃听端的信噪比,提高系统安全性能。

Figure 201910181591

The present invention proposes a multi-relay non-orthogonal multiple access system security transmission scheme based on artificial noise; the transmission system includes a source node, two users, an eavesdropping node and multiple relay nodes; in the present invention, the entire communication process is divided into Four stages: preparation stage, multi-relay decoding stage, relay selection stage and user decoding stage; system communication is completed in two time slots: in the first time slot, the source S broadcasts the message to all relay nodes. Using the message mapping strategy, the relay receives the signal and decodes it; in the second time slot, the system performs dual relay selection, selects the optimal relay to forward the user signal from the set of decodable relays, and selects the optimal relay to forward the user signal from the set of non-decodable relays. The optimal relay to send artificial noise; the relay selection strategy can effectively reduce the complexity of the system and the probability of security interruption while maintaining the diversity gain of the multi-relay system; artificial noise scrambling can further reduce the signal-to-noise ratio of the eavesdropping end and improve the System security features.

Figure 201910181591

Description

基于人工噪声的多中继非正交多址接入系统安全传输方法A Secure Transmission Method for Multi-relay Non-Orthogonal Multiple Access System Based on Artificial Noise

技术领域technical field

本发明属于无线通信网络技术领域,尤其涉及采用协作非正交多址接入技术的无线通信网络,本发明属于物理层安全领域。The invention belongs to the technical field of wireless communication networks, in particular to a wireless communication network adopting cooperative non-orthogonal multiple access technology, and belongs to the field of physical layer security.

背景技术Background technique

在过去二十年中,移动通信技术经历了飞跃式发展。同时,智能终端普及带来的移动数据量的爆炸式增长,对无线通信网络的速率、时延、信号覆盖率等提出了更高要求。与传统正交多址接入技术相比,非正交多址接入技术由于其高带宽效率、高用户公平性、超高连接性和兼容性备受业界和学术界的广泛关注。协作通信技术不仅可以提高网络的覆盖率,同时由于接收端采用了分集技术,系统性能也可以得到显著提升。物理层安全无需密钥,利用无线信道的时变性加密通信系统,理论上可以实现信息传输的绝对安全。由于终端计算能力逐步增强,窃听器破解信息的能力也在逐渐提升。传统密码学在信息加密领域面临越来越大的压力。物理层安全以信息论为基础,在物理层实现信息安全,是通信领域非常有前景的加密方式。In the past two decades, mobile communication technology has experienced rapid development. At the same time, the explosive growth of mobile data volume brought about by the popularization of intelligent terminals has put forward higher requirements on the rate, delay, and signal coverage of wireless communication networks. Compared with traditional orthogonal multiple access technology, non-orthogonal multiple access technology has attracted extensive attention in the industry and academia due to its high bandwidth efficiency, high user fairness, ultra-high connectivity and compatibility. The cooperative communication technology can not only improve the coverage of the network, but at the same time, because the receiver adopts the diversity technology, the system performance can also be significantly improved. The security of the physical layer does not require a key, and the time-varying encryption communication system of the wireless channel can theoretically achieve absolute security of information transmission. As the computing power of the terminal is gradually enhanced, the ability of the eavesdropper to decipher the information is also gradually improving. Traditional cryptography is facing increasing pressure in the field of information encryption. The physical layer security is based on information theory and realizes information security in the physical layer, which is a very promising encryption method in the field of communication.

一般下行非正交多址接入通信网络模型如附图1所示。非正交多址接入的主要技术有两个:在发送端采用叠加编码将多个用户信息同时同频发送,在接收端采用串行干扰消除技术来确保在给定资源(例如时间/频率)内可以服务多个用户。串行干扰消除的基本步骤是:1.首先在叠加信号中解出信道条件最差的用户的信号(在非正交多址接入系统中,给该用户发送信号的功率最强);2.从叠加信号中删除该信号;3对于信道条件次差的用户执行同样的步骤,以此方法逐个解出所有用户的信号。A general downlink non-orthogonal multiple access communication network model is shown in FIG. 1 . There are two main technologies of non-orthogonal multiple access: using superposition coding at the transmitting end to transmit multiple user information on the same frequency at the same time, and using serial interference cancellation technology at the receiving end to ensure that the ) can serve multiple users. The basic steps of serial interference cancellation are: 1. First, solve the signal of the user with the worst channel condition in the superimposed signal (in the non-orthogonal multiple access system, the power of the signal sent to the user is the strongest); 2 .Delete the signal from the superimposed signal; 3. Perform the same steps for users with the next worst channel conditions, and solve the signals of all users one by one in this way.

协作通信技术不仅可以提高网络的覆盖率,同时由于接收端采用了分集技术,系统性能也可以得到显著提升。协作通信与非正交多址接入技术的结合可以进一步提升非正交多址接入通信系统的性能。如附图2所示:常见的非正交多址接入协作通信系统主要有两种架构:1.专用中继系统,源节点与目的节点之间由于深度衰落的存在不能直接通信,因此设立专用中继,为两个用户转发基站的消息;2.用户协作,由于强用户需要先解码弱用户信号,因此强用户可通过短距离通信(如蓝牙、WiFi等)将信息转发给弱用户。这种协作方式可以减轻系统冗余度,提高分集增益。常用的中继协议有两种:放大转发协议和解码转发协议。本发明主要针对解码转发中继系统。The cooperative communication technology can not only improve the coverage of the network, but also significantly improve the system performance because the receiver adopts the diversity technology. The combination of cooperative communication and non-orthogonal multiple access technology can further improve the performance of the non-orthogonal multiple access communication system. As shown in Figure 2: The common non-orthogonal multiple access cooperative communication system mainly has two architectures: 1. Dedicated relay system, the source node and the destination node cannot communicate directly due to the existence of deep fading, so set up Dedicated relay, which forwards the message of the base station for two users; 2. User cooperation, since the strong user needs to decode the weak user signal first, the strong user can forward the information to the weak user through short-distance communication (such as Bluetooth, WiFi, etc.). This cooperative approach can reduce system redundancy and improve diversity gain. There are two commonly used relay protocols: amplify-and-forward protocol and decode-and-forward protocol. The present invention is mainly aimed at the decoding and forwarding relay system.

物理层安全是基于信息论的安全理论。它利用无线信道的时变性,结合信道编码和加密技术保证信息不被窃听者破译。C.E.Shannon于1945年在经典文献(参见文献[1]:Shannon C E. Communication theory of secrecy systems[J].The Bell SystemTechnical Journal,1949,28(4): 656-715.)中从信息论的角度证明:要实现消息的绝对安全,通信过程必须使用“一次一密”的加密方法,即一比特数据应有一比特密钥。该条件过于严苛,在工程领域很难应用。A.Wyner 于1975年在Shannon研究的基础上首次建立含噪声的窃听信道模型(参见文献[2]:Wyner A D. The wire-tap channel[J].The Bell SystemTechnical Journal,1975,54(8):1355-1387.),如附图3 所示。Wyner证明:当主信道的信道状况优于窃听信道的信道状况时,信源和合法接收端进行信息传输时,一定存在一种编码方式,可使传递信息错误的概率达到任意小,此时窃听端无法获知任何有用信息,系统达到绝对安全。经过几十年的发展,物理层安全理论逐渐成熟。采用物理层安全实现无线通信系统的安全传输越来越成为学术界和业界研究的热点。系统物理层安全的衡量指标主要有遍历保密容量和安全中断概率等,其中,安全中断概率指系统的瞬时安全容量小于给定门限值的概率,数学表达式为:Physical layer security is a security theory based on information theory. It utilizes the time-varying nature of wireless channels and combines channel coding and encryption technology to ensure that information cannot be deciphered by eavesdroppers. C.E.Shannon in 1945 in the classic literature (see document [1]: Shannon C E. Communication theory of secrecy systems [J]. The Bell SystemTechnical Journal, 1949, 28(4): 656-715.) from the perspective of information theory Proof: To achieve absolute security of the message, the communication process must use the "one-time-one-pad" encryption method, that is, one bit of data should have one bit of key. This condition is too harsh and difficult to apply in the engineering field. A. Wyner first established a noise-containing eavesdropping channel model on the basis of Shannon's research in 1975 (see document [2]: Wyner A D. The wire-tap channel [J]. The Bell SystemTechnical Journal, 1975, 54 (8 ):1355-1387.), as shown in Figure 3. Wyner proved that when the channel condition of the main channel is better than that of the eavesdropping channel, when the source and the legitimate receiver transmit information, there must be a coding method that can make the probability of transmitting information error arbitrarily small. At this time, the eavesdropping end No useful information can be obtained, and the system is completely secure. After decades of development, the physical layer security theory has gradually matured. The use of physical layer security to realize the secure transmission of wireless communication systems has increasingly become a research hotspot in academia and industry. The measurement indicators of the security of the physical layer of the system mainly include traversal security capacity and security interruption probability. Among them, the security interruption probability refers to the probability that the instantaneous security capacity of the system is less than the given threshold value. The mathematical expression is:

Figure GDA0003474699820000021
Figure GDA0003474699820000021

式中,γD和γE表示目的端和窃听端的信噪比,

Figure GDA0003474699820000022
Rs表示安全速率阈值,FD(x)表示主信道信噪比的累积分布函数。f(γE)表示γE的概率密度函数。In the formula, γ D and γ E represent the signal-to-noise ratio of the destination end and the eavesdropping end,
Figure GDA0003474699820000022
R s represents the safe rate threshold, and F D (x) represents the cumulative distribution function of the signal-to-noise ratio of the main channel. f(γ E ) represents the probability density function of γ E.

基于非正交多址接入、协作通信和物理层安全理论结合构建的下行协作通信系统,将在追求高速率、大融合、大连接的5G时代展现出巨大的应用前景。The downlink cooperative communication system based on the combination of non-orthogonal multiple access, cooperative communication and physical layer security theory will show great application prospects in the 5G era that pursues high speed, large integration and large connection.

发明内容SUMMARY OF THE INVENTION

(一)本发明解决的问题(1) Problems solved by the present invention

针对下行协作多中继非正交多址接入系统两跳传输中可能存在窃听者的系统安全问题,本发明提供了一种人工加扰的多中继协作非正交多址接入系统安全传输方案。采用双中继选择策略,在保持多中继通信网络的分集增益的同时,有效降低系统的复杂度;同时有效干扰窃听端,确保非正交多址接入系统的安全传输。Aiming at the system security problem that eavesdroppers may exist in the two-hop transmission of the downlink cooperative multi-relay non-orthogonal multiple access system, the present invention provides an artificially scrambled multi-relay cooperative non-orthogonal multiple access system security transmission scheme. The dual-relay selection strategy is adopted to effectively reduce the complexity of the system while maintaining the diversity gain of the multi-relay communication network; at the same time, it effectively interferes with the eavesdropping terminal to ensure the safe transmission of the non-orthogonal multiple access system.

(二)本发明的技术方案(2) Technical scheme of the present invention

如附图4所示,本发明实施例所述通信系统共包含K+3个节点,其中K为半双工中继节点R的个数,且满足K≥1。此外系统还包含源节点S,两个用户节点U1和U2(其中,U1和U2分别表示强用户和弱用户),窃听节点E。源节点S与两用户U1和U2之间由于深衰落不存在直传链路,通信需要多中继辅助,所有节点均配备单天线。信道功率增益以

Figure GDA0003474699820000031
表示,其中
Figure GDA0003474699820000032
表示发送端,
Figure GDA0003474699820000033
表示接收端。假设所有信道均服从独立同分布的Nakagami-m衰落。因此源节点υ和目的节点l间链路的信道增益的概率密度函数和累积分布函数可表示为:As shown in FIG. 4 , the communication system according to the embodiment of the present invention includes K+3 nodes in total, where K is the number of half-duplex relay nodes R, and K≧1 is satisfied. In addition, the system also includes source node S, two user nodes U 1 and U 2 (wherein U 1 and U 2 represent strong users and weak users, respectively), and eavesdropping node E. There is no direct transmission link between the source node S and the two users U 1 and U 2 due to deep fading, the communication needs multi-relay assistance, and all nodes are equipped with a single antenna. The channel power gain is
Figure GDA0003474699820000031
means that the
Figure GDA0003474699820000032
represents the sender,
Figure GDA0003474699820000033
Indicates the receiver. It is assumed that all channels obey IID Nakagami-m fading. Therefore, the probability density function and cumulative distribution function of the channel gain of the link between the source node v and the destination node l can be expressed as:

Figure GDA0003474699820000034
Figure GDA0003474699820000034

Figure GDA0003474699820000035
Figure GDA0003474699820000035

其中,

Figure GDA0003474699820000036
Γ(·)是伽马函数。
Figure GDA0003474699820000037
表示值为正整数的衰落系数,
Figure GDA0003474699820000038
表示平均信道功率增益。为了简化分析,假定两跳链路均为独立同分布。亦即
Figure GDA0003474699820000039
Figure GDA00034746998200000310
Figure GDA00034746998200000311
in,
Figure GDA0003474699820000036
Γ(·) is the gamma function.
Figure GDA0003474699820000037
represents a fading coefficient whose value is a positive integer,
Figure GDA0003474699820000038
represents the average channel power gain. In order to simplify the analysis, it is assumed that the two-hop links are both independent and identically distributed. that is
Figure GDA0003474699820000039
Figure GDA00034746998200000310
and
Figure GDA00034746998200000311

本发明实施例基于物理层安全技术,考虑多中继下行非正交多址接入系统中两个用户安全容量的相关性。公开了一种人工加扰的多中继协作非正交多址接入系统安全传输策略,该策略的核心是基于物理层安全技术进行的最优安全中继选择,该策略具体实施步骤如下:The embodiments of the present invention are based on the physical layer security technology, and consider the correlation between the security capacities of two users in a multi-relay downlink non-orthogonal multiple access system. An artificially scrambled multi-relay cooperative non-orthogonal multiple access system security transmission strategy is disclosed. The core of the strategy is the optimal security relay selection based on physical layer security technology. The specific implementation steps of the strategy are as follows:

步骤S1:系统初始化。源节点先向下行多中继非正交多址接入系统广播训练序列。本步骤有两个目的:(1)估计主信道的信道状态信息,包括S-Rk,k∈[1:K],Rk-Ui,i∈{1,2}的各路信道状态信息;(2)估计窃听信道的信道状态信息。即Rk-E信道的信道状态信息。各链路信道状态信息的获取可通过监测各端口的传输或采用一些复杂的信道估计算法实现,具体方法(参见相关文献[3]Zou Y,Zhu J,Wang X,et al.Improving physical-layersecurity in wireless communications using diversity techniques[J].IEEENetwork,2015,29(1):42-48.)文中不再赘述。Step S1: System initialization. The source node first broadcasts the training sequence to the downlink multi-relay non-orthogonal multiple access system. This step has two purposes: (1) Estimate the channel state information of the main channel, including the channel state information of SR k ,k∈[1:K], R k -U i ,i∈{1,2}; (2) Estimate the channel state information of the eavesdropping channel. That is, the channel state information of the R k -E channel. The acquisition of the channel state information of each link can be achieved by monitoring the transmission of each port or using some complex channel estimation algorithms. in wireless communications using diversity techniques [J]. IEEE Network, 2015, 29(1): 42-48.) I will not repeat them in this article.

步骤S2:第一时隙,信源S通过消息映射策略(参见文献[4]:Xu P,Yang Z,Ding Z,et al. Optimal relay selection schemes for cooperative非正交多址接入[J].IEEETransactions on Vehicular Technology,2018,67(8):7851-7855.文中从略)将广播信号叠加,叠加信号可以表示为:

Figure GDA0003474699820000041
其中“×”表示笛卡尔乘积,
Figure GDA0003474699820000042
是Wj,j=0,1,2的有限码簿。通过训练序列,所有节点均可解码采用消息映射策略发送的信息。因此第一时隙有R0=R1+R2恒成立,其中Ri为消息Wi,i=0,1,2的数据速率;Step S2: In the first time slot, the source S uses the message mapping strategy (see document [4]: Xu P, Yang Z, Ding Z, et al. Optimal relay selection schemes for cooperative non-orthogonal multiple access [J] .IEEE Transactions on Vehicular Technology, 2018, 67(8):7851-7855. The text is omitted) to superimpose the broadcast signal, and the superimposed signal can be expressed as:
Figure GDA0003474699820000041
where "×" represents the Cartesian product,
Figure GDA0003474699820000042
is a finite codebook of W j , j=0,1,2. Through the training sequence, all nodes can decode the information sent using the message mapping strategy. Therefore, in the first time slot, R 0 =R 1 +R 2 is always established, where R i is the data rate of the message Wi , i =0, 1, 2;

步骤S3:第二时隙,中继接收到信源S的广播信息,第k个中继接收到的信号为:

Figure GDA0003474699820000043
其中,PS是基站功率,s0表示叠加信号的码字,
Figure GDA0003474699820000044
表示方差为δ2的加性高斯白噪声。随后中继采用解码转发协议解码转发信源的广播信息;Step S3: In the second time slot, the relay receives the broadcast information of the source S, and the signal received by the kth relay is:
Figure GDA0003474699820000043
Among them, P S is the base station power, s 0 represents the codeword of the superimposed signal,
Figure GDA0003474699820000044
represents additive white Gaussian noise with variance δ 2 . Then the relay uses the decoding and forwarding protocol to decode and forward the broadcast information of the source;

步骤S4:建立可正解码的中继结合Φ。显然,经历S-Rk的信道衰落后,某些中继可能无法正常解码信息,本步骤从所有K个中继中选择可正常解码的中继集合Φ,数学表达式为:Step S4: Establish a positively decodable relay combination Φ. Obviously, after experiencing the channel fading of SR k , some relays may not be able to decode the information normally. This step selects the relay set Φ that can be decoded normally from all K relays. The mathematical expression is:

Figure GDA0003474699820000045
Figure GDA0003474699820000045

式中

Figure GDA0003474699820000046
是由于系统传输信息需要两个时隙,ρS表示S的发送信噪比,
Figure GDA0003474699820000047
是Ui的数据速率门限。in the formula
Figure GDA0003474699820000046
It is because the system needs two time slots to transmit information, ρ S represents the transmission signal-to-noise ratio of S,
Figure GDA0003474699820000047
is the data rate threshold for U i .

步骤S5:从Φ中选择转发信号的最优中继。现对最优中继选择原理进行详细说明。根据串行干扰消除的基本原理,U1通过串行干扰消除先把其弱信号作为干扰,解出U2的信号,再从混合信号中减去U2的信号,最终解出U1的信号。U2则直接将U1信号作为干扰,解出其信号。两个用户的SINR可分别表示为:

Figure GDA0003474699820000051
式中,
Figure GDA0003474699820000052
αi(i=1,2)表示第k个中继的功率分配因数,α12=1,α1>α2,PR表示第k个中继的发送功率,σ2表示噪声功率,αJ表示人工噪声的功率分配因数。对于第m个中继,定义:Step S5: Select the optimal relay to forward the signal from Φ. The optimal relay selection principle will now be described in detail. According to the basic principle of serial interference cancellation, U 1 first uses its weak signal as interference through serial interference cancellation, solves the signal of U 2 , then subtracts the signal of U 2 from the mixed signal, and finally solves the signal of U 1 . U 2 directly uses the U 1 signal as interference and solves its signal. The SINRs of the two users can be expressed as:
Figure GDA0003474699820000051
In the formula,
Figure GDA0003474699820000052
α i (i=1,2) represents the power distribution factor of the kth relay, α 12 =1, α 12 , PR represents the transmit power of the kth relay, σ 2 represents the noise Power, α J denotes the power distribution factor of the artificial noise. For the mth relay, define:

Figure GDA0003474699820000053
Figure GDA0003474699820000053

式中δ3(x)=l+θ1x,

Figure GDA0003474699820000054
Figure GDA0003474699820000055
为了最大化系统的安全性能,选择中继的标准为
Figure GDA0003474699820000056
即选择Φ中使Xm取值最大的中继。基于以上分析,可知该中继选择策略可以最小化多中继协作非正交多址接入系统的安全中断概率。where δ 3 (x)=l+θ 1 x,
Figure GDA0003474699820000054
Figure GDA0003474699820000055
In order to maximize the security performance of the system, the criteria for selecting relays are
Figure GDA0003474699820000056
That is, select the relay that maximizes the value of X m in Φ. Based on the above analysis, it can be known that the relay selection strategy can minimize the security interruption probability of the multi-relay cooperative non-orthogonal multiple access system.

步骤S6:从

Figure GDA0003474699820000057
中选择发送人工噪声的最优中继。为了进一步增强多中继协作非正交多址接入系统的安全性能,从不能正确解码的中继集合
Figure GDA0003474699820000058
中,选择到窃听节点E的信道增益最大的中继k*发送人工噪声。选择标准表示为
Figure GDA0003474699820000059
其中
Figure GDA00034746998200000510
表示Φ的补集。为了将本发明策略和传统多中继转发策略进行公平比较,所有中继的总功率限制为PR。Step S6: from
Figure GDA0003474699820000057
Select the optimal relay for sending artificial noise. In order to further enhance the security performance of the multi-relay cooperative non-orthogonal multiple access system, the set of relays that cannot be decoded correctly
Figure GDA0003474699820000058
, select the relay k * with the largest channel gain to the eavesdropping node E to send artificial noise. The selection criteria are expressed as
Figure GDA0003474699820000059
in
Figure GDA00034746998200000510
represents the complement of Φ. In order to make a fair comparison between the strategy of the present invention and the traditional multi-relay forwarding strategy, the total power of all the relays is limited to P R .

步骤S7:用户U1和U2接收到中继m*转发的消息并解码,窃听端E同时窃听中继转发的信号,中继k*发送人工噪声干扰窃听端E。假定αJ(0≤αJ<1)为发送人工噪声的功率分配因数。根据以上分析,用户U1、U2和窃听端E的信噪比可分别表示为:

Figure GDA00034746998200000511
其中,
Figure GDA00034746998200000512
表示人工加扰中继的发送信噪比,
Figure GDA00034746998200000513
Step S7: The users U1 and U2 receive and decode the message forwarded by the relay m * , the eavesdropping terminal E simultaneously eavesdrops on the signal forwarded by the relay, and the relay k * sends artificial noise to interfere with the eavesdropping terminal E. It is assumed that α J (0≦α J <1) is a power distribution factor for transmitting artificial noise. According to the above analysis, the signal-to-noise ratios of users U 1 , U 2 and the eavesdropping terminal E can be expressed as:
Figure GDA00034746998200000511
in,
Figure GDA00034746998200000512
represents the transmit signal-to-noise ratio of the artificially scrambled relay,
Figure GDA00034746998200000513

下面分析本发明实施例系统的安全性能。根据安全中断概率的表达式和一些简单的代数运算,可得第m个中继发送信号时U1的安全中断概率为:

Figure GDA00034746998200000514
同理,第m个中继发送信号时,U2的安全中断概率可表示为:The security performance of the system according to the embodiment of the present invention is analyzed below. According to the expression of safe outage probability and some simple algebraic operations, the safe outage probability of U 1 when the mth relay sends a signal can be obtained as:
Figure GDA00034746998200000514
Similarly, when the mth relay sends a signal, the safe interruption probability of U 2 can be expressed as:

Figure GDA0003474699820000061
Figure GDA0003474699820000061

显然,当

Figure GDA0003474699820000062
时,U2将安全中断。根据安全中断概率的定义和一系列数学推导,该策略下系统的安全中断概率表达式为:Obviously, when
Figure GDA0003474699820000062
, U2 will safely interrupt. According to the definition of safe outage probability and a series of mathematical derivations, the safe outage probability expression of the system under this strategy is:

Figure GDA0003474699820000063
Figure GDA0003474699820000063

式中,

Figure GDA0003474699820000064
Figure GDA0003474699820000065
Figure GDA0003474699820000066
Figure GDA0003474699820000067
In the formula,
Figure GDA0003474699820000064
Figure GDA0003474699820000065
Figure GDA0003474699820000066
Figure GDA0003474699820000067

式中,g和h函数是无法求闭式解的复杂积分,可利用高斯切比雪夫展开式近似如下:In the formula, the g and h functions are complex integrals that cannot find closed-form solutions, and can be approximated by the Gaussian Chebyshev expansion as follows:

Figure GDA0003474699820000068
Figure GDA0003474699820000068

Figure GDA0003474699820000069
Figure GDA0003474699820000069

式中,N为展开式项数,Si=ti+1,ti是拉格朗日多项式的第i个零点,wi是高斯权重,

Figure GDA00034746998200000610
In the formula, N is the number of expansion terms, S i =t i +1, t i is the ith zero point of the Lagrangian polynomial, w i is the Gaussian weight,
Figure GDA00034746998200000610

(三)本发明的有益效果(3) Beneficial effects of the present invention

本发明的有益效果主要是:考虑两用户安全容量的相关性,在两用户安全速率阈值不同的情况下,通过双中继选择策略,在保持多中继系统分集增益的同时,有效降低了多中继协作非正交多址接入系统的复杂度和安全中断概率,提高了系统安全性能。The beneficial effects of the present invention are mainly: considering the correlation of the security capacity of the two users, when the security rate thresholds of the two users are different, the dual-relay selection strategy can effectively reduce the multi-relay system diversity gain while maintaining the multi-relay system diversity gain. The complexity and safety interruption probability of relay cooperative non-orthogonal multiple access system improve the safety performance of the system.

本发明的有益效果具体来自以下三个方面:The beneficial effects of the present invention come from the following three aspects:

(1)采用多中继协作通信。由于无线信道的时变特性,信号在传输时的衰减会剧烈变化。协作技术为通信系统提供额外的分集增益,因此可以提升网络的覆盖率。同时,由于接收端采用了分集技术,系统性能也可以得到显著提升。(1) Multi-relay cooperative communication is adopted. Due to the time-varying nature of the wireless channel, the attenuation of the signal changes drastically during transmission. Cooperative techniques provide additional diversity gain to the communication system, thus increasing the coverage of the network. At the same time, because the receiver adopts diversity technology, the system performance can also be significantly improved.

(2)采用中继选择策略。中继选择策略可以在保持多中继通信网络的分集增益的同时,有效降低系统的复杂度。此外,与一般中继选择方案不同,本发明考虑了两个用户安全容量的相关性,完全适用于两用户安全速率阈值不同的情况。不同的安全速率阈值对系统安全中断概率的影响如附图5所示。附图5中的蒙特卡洛仿真结果表明:本发明相比其他转发策略,可以显著增强系统安全性。(2) Adopt relay selection strategy. The relay selection strategy can effectively reduce the complexity of the system while maintaining the diversity gain of the multi-relay communication network. In addition, different from the general relay selection scheme, the present invention considers the correlation of the security capacity of the two users, and is completely applicable to the situation where the security rate thresholds of the two users are different. The influence of different safety rate thresholds on the probability of system safety interruption is shown in Figure 5. The Monte Carlo simulation results in FIG. 5 show that the present invention can significantly enhance system security compared with other forwarding strategies.

(3)采用人工加噪策略。不同于以往的单中继选择策略,本发明提出了一种双中继选择策略。在不能正常解码的中继中选择一个中继发送人工噪声,干扰窃听端。附图6证明了本发明提出的人工加噪策略,与单中继选择策略和传统的多中继转发策略相比增强了系统的安全性能。(3) Adopt artificial noise addition strategy. Different from the previous single-relay selection strategy, the present invention proposes a dual-relay selection strategy. Select one of the relays that cannot be decoded normally to send artificial noise to interfere with the eavesdropping terminal. FIG. 6 proves that the artificial noise addition strategy proposed by the present invention enhances the security performance of the system compared with the single-relay selection strategy and the traditional multi-relay forwarding strategy.

附图说明Description of drawings

附图1:一般非正交多址接入系统的模型。图中S为源节点,D1和D2分别为强弱用户。源节点采用叠加编码,原理是:把两个用户的信号同时同频按照不同功率叠加发送。由于D1为强用户,系统为其分配的功率较小,解码时执行串行干扰消除,先将D1的信号视为干扰,解码D2的信号,从叠加信号中删除D2的信号,再解出自己的信号。D2为非正交多址接入系统中的弱用户,解码时将D1的信号视为干扰,解码D2的信号。Figure 1: Model of a generic non-orthogonal multiple access system. In the figure, S is the source node, and D 1 and D 2 are the strong and weak users, respectively. The source node adopts superposition coding, the principle is: the signals of two users are superimposed and sent at the same frequency and different powers at the same time. Since D 1 is a strong user, the system allocates less power to it, and performs serial interference cancellation during decoding. First, the signal of D 1 is regarded as interference, the signal of D 2 is decoded, and the signal of D 2 is deleted from the superimposed signal. Resolve your own signal. D 2 is a weak user in the non-orthogonal multiple access system. When decoding, the signal of D 1 is regarded as interference, and the signal of D 2 is decoded.

附图2:协作非正交多址接入系统的两种类型。图(a)为专用中继情景,源节点和两个用户之间由于高山或密集建筑物的阻挡,处于深度衰落。此时设立专用中继,接收源节点的信号后,再将叠加消息转发给两个用户。图(b)为用户协作,由于强用户执行串行干扰消除,首先需要解出弱用户的信号。此时强用户可以通过短距离通信(如蓝牙、WiFi等)向弱用户转发信息。用户协作降低了冗余度,提升了系统的分集增益。Figure 2: Two types of cooperative non-orthogonal multiple access systems. Figure (a) is a dedicated relay scenario, where the source node and two users are in deep fading due to the blocking of mountains or dense buildings. At this time, a dedicated relay is set up, and after receiving the signal of the source node, the superimposed message is forwarded to the two users. Figure (b) shows user cooperation. Since the strong user performs serial interference cancellation, the weak user's signal needs to be solved first. At this time, the strong user can forward information to the weak user through short-distance communication (such as Bluetooth, WiFi, etc.). User cooperation reduces redundancy and improves the diversity gain of the system.

附图3:Wyner窃听信道模型。该窃听模型是对Shannon模型的改进,在该模型中Wyner 指出当主信道的信道状况优于窃听信道的信道状况时,信源和合法接收端进行信息传输时,一定存在一种编码方式,可使传递信息错误的概率达到任意小,此时窃听端无法获知任何有用信息,系统达到绝对安全。并从信息论的角度,利用信源熵定义了物理层安全。Figure 3: Wyner eavesdropping channel model. The eavesdropping model is an improvement of the Shannon model. In this model, Wyner pointed out that when the channel condition of the main channel is better than that of the eavesdropping channel, there must be a coding method when the source and the legitimate receiver transmit information, which can make the The probability of transmitting information errors is arbitrarily small, and the eavesdropping terminal cannot obtain any useful information at this time, and the system achieves absolute security. And from the perspective of information theory, the physical layer security is defined by using the source entropy.

附图4:多中继协作非正交多址接入系统模型。本发明考虑多中继下行协作非正交多址接入系统。其中,S表示基站,R1...RK为总个数为K的解码转发、半双工中继,U1和U2分别表示强用户和弱用户,E为窃听端。假设基站与两用户U1和U2之间由于深衰落不存在直传链路,通信需要多中继辅助,所有节点均配备单天线。Figure 4: Multi-relay cooperative non-orthogonal multiple access system model. The present invention considers a multi-relay downlink cooperative non-orthogonal multiple access system. Among them, S represents the base station, R 1 . . . R K are decoding forwarding and half-duplex relays with a total number of K, U 1 and U 2 represent strong users and weak users respectively, and E is the eavesdropping terminal. Assuming that there is no direct transmission link between the base station and the two users U1 and U2 due to deep fading, the communication needs multi - relay assistance, and all nodes are equipped with a single antenna.

附图5:不同的安全速率阈值

Figure GDA0003474699820000081
对协作非正交多址接入系统安全中断概率的影响。参数设置如下:
Figure GDA0003474699820000082
,K=2,mU=mE=mR=2,α1=0.2,αJ=0.5,Ω1=12dB,ΩR=Ω2=10dB,ΩE=-5dB。其中“ODRS”表示本发明中提出的双中继选择策略,“OSRS”代表单中继选择策略(只转发不加噪),“TMRF”代表传统多中继转发策略(所有中继均转发信号,用户和窃听端采用最大比合并策略合并信号),“Sim”表示蒙特卡洛仿真结果,“Analysis”表示理论分析结果。本图以蒙特卡洛仿真证明了理论分析的正确性。显然,提高安全速率门限会使无线通信系统的安全性能恶化。在发送信噪比较大时,本发明提出的双中继选择策略的安全性能明显优于其他两种策略。Figure 5: Different Safe Rate Thresholds
Figure GDA0003474699820000081
Influence on Safe Outage Probability of Cooperative Non-Orthogonal Multiple Access System. The parameter settings are as follows:
Figure GDA0003474699820000082
, K=2, m U = m E = m R =2, α 1 =0.2, α J =0.5, Ω 1 =12dB, Ω R2 =10dB, Ω E =-5dB. "ODRS" represents the dual-relay selection strategy proposed in the present invention, "OSRS" represents the single-relay selection strategy (only forwarding without adding noise), and "TMRF" represents the traditional multi-relay forwarding strategy (all relays forward signals , the user and the eavesdropping terminal use the maximum ratio combining strategy to combine the signals), "Sim" represents the Monte Carlo simulation result, and "Analysis" represents the theoretical analysis result. This figure proves the correctness of the theoretical analysis by Monte Carlo simulation. Obviously, increasing the security rate threshold will deteriorate the security performance of the wireless communication system. When the transmission signal-to-noise ratio is large, the security performance of the dual relay selection strategy proposed by the present invention is obviously better than the other two strategies.

附图6:人工噪声分配参数αJ和中继个数K对系统安全中断概率的影响。参数设置为: R1=0.1nat,R2=0.2nat,ρS=ρR=10dB,mU=mE=mR=m,α1=0.2,Ω1=12dB,ΩR=Ω2=10dB,ΩE=-5dB。其中“ODRS”表示本发明中提出的双中继选择策略,“OSRS”代表单中继选择策略(只转发不加噪),“Sim”表示蒙特卡洛仿真结果,“Analysis”表示理论分析结果。本图以蒙特卡洛仿真证明了理论分析的正确性。显然,增加中继个数可以提升系统的分集增益,进而增强系统的安全性能。此外,仿真结果表明,双中继选择策略相比单中继选择策略,可以进一步提升系统安全性。该性能提升随着中继个数的增加越发明显。Figure 6: Influence of artificial noise allocation parameter α J and relay number K on the probability of system safety interruption. The parameters are set as: R 1 =0.1 nat, R 2 =0.2 nat, ρ SR =10dB, m U =m E =m R =m,α 1 =0.2,Ω 1 =12dB,Ω R2 =10dB, Ω E =-5dB. "ODRS" represents the dual-relay selection strategy proposed in the present invention, "OSRS" represents the single-relay selection strategy (only forwarding without adding noise), "Sim" represents the Monte Carlo simulation result, and "Analysis" represents the theoretical analysis result . This figure proves the correctness of the theoretical analysis by Monte Carlo simulation. Obviously, increasing the number of relays can improve the diversity gain of the system, thereby enhancing the security performance of the system. In addition, the simulation results show that the dual-relay selection strategy can further improve the system security compared with the single-relay selection strategy. The performance improvement becomes more and more obvious as the number of relays increases.

附图7:多中继协作非正交多址系统安全传输方案实施流程。主要分为两个时隙,第一时隙主要包括:基站发送叠加信号和中继接收并解码信号;第二时隙中继决策和用户解码,选择最优中继转发两个用户信号,选择到窃听端信道增益最强的中继发送人工噪声,弱用户将强用户的信号作为干扰解码,强用户基于串行干扰消除解码。Figure 7: The implementation process of the secure transmission scheme of the multi-relay cooperative non-orthogonal multiple access system. It is mainly divided into two time slots. The first time slot mainly includes: the base station sends the superimposed signal and the relay receives and decodes the signal; the second time slot is the relay decision and user decoding, and the optimal relay is selected to forward the two user signals. The relay with the strongest channel gain at the eavesdropping end sends artificial noise, the weak user decodes the signal of the strong user as interference, and the strong user decodes based on serial interference cancellation.

附图8:本发明中的整个通信过程分为四个阶段:准备阶段、多中继解码阶段、中继选择阶段和用户解码阶段。Figure 8: The whole communication process in the present invention is divided into four stages: preparation stage, multi-relay decoding stage, relay selection stage and user decoding stage.

具体实施方式Detailed ways

(一)系统预设(1) System default

本发明实施例所述非正交多址通信系统共包含K+3个节点,其中K为半双工中继节点R 的个数,且满足K≥1。此外系统还包含源节点S,两个用户节点U1和U2(其中,U1和U2分别表示强用户和弱用户),窃听节点E。源节点S与两用户U1和U2之间由于深衰落不存在直传链路,通信需要多中继辅助,所有节点均配备单天线。假设所有信道均服从独立同分布的Nakagami-m衰落。The non-orthogonal multiple access communication system according to the embodiment of the present invention includes K+3 nodes in total, where K is the number of half-duplex relay nodes R, and K≥1 is satisfied. In addition, the system also includes source node S, two user nodes U 1 and U 2 (wherein U 1 and U 2 represent strong users and weak users, respectively), and eavesdropping node E. There is no direct transmission link between the source node S and the two users U 1 and U 2 due to deep fading, the communication needs multi-relay assistance, and all nodes are equipped with a single antenna. It is assumed that all channels obey IID Nakagami-m fading.

(二)实施流程(2) Implementation process

本发明的具体实施流程如附图7所示。本发明实施流程共分为七个步骤:The specific implementation process of the present invention is shown in FIG. 7 . The implementation process of the present invention is divided into seven steps:

步骤S1:系统初始化;在多中继下行协作非正交多址接入系统中发送训练系列,通过信道估计算法估计个各信道的信道状态信息,获得第m个中继到U1、U2和E的信道增益分别为:

Figure GDA0003474699820000091
同时,训练序列使中继和目的节点获知消息映射策略信息;Step S1: System initialization; send a training series in the multi-relay downlink cooperative non-orthogonal multiple access system, estimate the channel state information of each channel through a channel estimation algorithm, and obtain the mth relay to U 1 , U 2 and the channel gains of E are:
Figure GDA0003474699820000091
At the same time, the training sequence enables the relay and the destination node to learn the message mapping policy information;

步骤S2:第一时隙,基站根据非正交多址接入基本原理,基于叠加编码并采用消息映射策略向所有K个中继发送叠加信号;Step S2: in the first time slot, the base station sends a superimposed signal to all K relays based on superposition coding and a message mapping strategy according to the basic principle of non-orthogonal multiple access;

步骤S3:第二时隙,解码转发中继接收信号并解码,此后采用双中继选择向用户端转发消息并加噪;Step S3: in the second time slot, decode and forward the received signal of the relay and decode it, and then use the dual-relay option to forward the message to the user terminal and add noise;

步骤S4:系统根据中继解码情况建立两个集合:可解码中继集合Φ和不能解码的中继集合

Figure GDA0003474699820000092
其中Φ定义为:
Figure GDA0003474699820000093
ρS表示源节点S的发送信噪比,
Figure GDA0003474699820000094
是Ui的安全速率门限;
Figure GDA0003474699820000095
为Φ的补集,为不能正常解码的中继集合。可以正确解码的中继转至步骤S5:不能正确解码的中继转至步骤S6;Step S4: The system establishes two sets according to the relay decoding situation: a set of decodable relays Φ and a set of relays that cannot be decoded
Figure GDA0003474699820000092
where Φ is defined as:
Figure GDA0003474699820000093
ρ S represents the transmission signal-to-noise ratio of the source node S,
Figure GDA0003474699820000094
is the safe rate threshold of U i ;
Figure GDA0003474699820000095
is the complement of Φ, and is the set of relays that cannot be decoded normally. The relay that can be decoded correctly goes to step S5; the relay that cannot be decoded correctly goes to step S6;

步骤S5:在Φ中,针对第m个中继,定义Step S5: In Φ, for the mth relay, define

Figure GDA0003474699820000101
Figure GDA0003474699820000101

选择Φ中使Xm取值最大的中继,即选择

Figure GDA0003474699820000102
其中
Figure GDA0003474699820000103
为第m个中继到 U1和U2的信道增益,δ3(x)=l+θ1x,
Figure GDA0003474699820000104
Figure GDA0003474699820000105
Select the relay that maximizes the value of X m in Φ, that is, select
Figure GDA0003474699820000102
in
Figure GDA0003474699820000103
is the channel gain of the mth relay to U 1 and U 2 , δ 3 (x)=l+θ 1 x,
Figure GDA0003474699820000104
Figure GDA0003474699820000105

步骤S6:在

Figure GDA0003474699820000106
中,选择到窃听端信道增益最大的中继发送人工噪声。即选择
Figure GDA0003474699820000107
Step S6: in
Figure GDA0003474699820000106
, select the relay with the largest channel gain to the eavesdropping end to transmit artificial noise. i.e. choose
Figure GDA0003474699820000107

步骤S7:用户解码,其中强用户U1执行串行干扰消除,优先解码弱用户的信号并从叠加信号中删除,随后再解码自己的信号,弱用户U2直接把U1的信号视为噪声,解码自己的信号。Step S7: User decoding, wherein the strong user U 1 performs serial interference cancellation, preferentially decodes the signal of the weak user and deletes it from the superimposed signal, and then decodes its own signal, and the weak user U 2 directly regards the signal of U 1 as noise. , which decodes its own signal.

Claims (1)

1.一种基于人工噪声的多中继非正交多址接入系统安全传输方法,其特征在于,包括双中继选择和人工加扰策略:即在可解码中继中选择最优中继转发信号,在不可解码中继中选择最优中继发送人工噪声,具体实施流程如下:1. a multi-relay non-orthogonal multiple access system security transmission method based on artificial noise, is characterized in that, comprises double relay selection and artificial scrambling strategy: namely select optimal relay in decodable relay Forward the signal, and select the optimal relay among the non-decodable relays to send artificial noise. The specific implementation process is as follows: 步骤S1:系统初始化;在多中继下行非正交多址接入系统中发送训练系列,通过信道估计算法估计各个信道的信道状态信息,获得第m个中继到U1、U2和E的信道增益分别为:
Figure FDA0003332010820000011
Figure FDA0003332010820000012
同时,训练序列使中继和目的节点获知消息映射策略信息;U1和U2表示两个用户节点,E表示窃听节点;
Step S1: System initialization; send a training series in the multi-relay downlink non-orthogonal multiple access system, estimate the channel state information of each channel through a channel estimation algorithm, and obtain the mth relay to U 1 , U 2 and E The channel gains of are:
Figure FDA0003332010820000011
Figure FDA0003332010820000012
At the same time, the training sequence enables the relay and the destination node to know the message mapping policy information; U 1 and U 2 represent two user nodes, and E represents the eavesdropping node;
步骤S2:第一时隙,基站根据非正交多址接入基本原理,基于叠加编码并采用消息映射策略向所有K个中继发送叠加信号;Step S2: in the first time slot, the base station sends a superimposed signal to all K relays based on superposition coding and a message mapping strategy according to the basic principle of non-orthogonal multiple access; 步骤S3:第二时隙,解码转发中继接收信号并解码,此后采用双中继选择向用户端转发消息并加噪;具体为:中继接收到信源S的广播信息,第k个中继接收到的信号为:
Figure FDA0003332010820000013
其中,PS是基站功率,
Figure FDA0003332010820000014
表示源节点S到第k个中继的信道增益,s0表示叠加信号的码字,
Figure FDA0003332010820000015
表示方差为δ2的加性高斯白噪声;随后中继采用解码转发协议解码转发信源的广播信息;
Step S3: in the second time slot, decode and forward the received signal of the relay and decode it, and then use the dual relay selection to forward the message to the user terminal and add noise; specifically: the relay receives the broadcast information of the source S, and the kth in the Following the received signal is:
Figure FDA0003332010820000013
where P S is the base station power,
Figure FDA0003332010820000014
represents the channel gain from the source node S to the kth relay, s 0 represents the codeword of the superimposed signal,
Figure FDA0003332010820000015
Represents additive white Gaussian noise with a variance of δ 2 ; then the relay uses the decoding and forwarding protocol to decode and forward the broadcast information of the forwarding source;
步骤S4:系统根据中继解码情况建立两个集合:可解码中继集合Φ和不能解码的中继集合
Figure FDA0003332010820000016
其中Φ定义为:
Figure FDA0003332010820000017
ρS表示源节点S的发送信噪比,
Figure FDA0003332010820000018
是Ui的解码速率门限;
Figure FDA0003332010820000019
为Φ的补集,为不能正常解码的中继集合,可以正确解码的中继转至步骤S5,不能正确解码的中继转至步骤S6;
Step S4: The system establishes two sets according to the relay decoding situation: a set of decodable relays Φ and a set of relays that cannot be decoded
Figure FDA0003332010820000016
where Φ is defined as:
Figure FDA0003332010820000017
ρ S represents the transmission signal-to-noise ratio of the source node S,
Figure FDA0003332010820000018
is the decoding rate threshold of U i ;
Figure FDA0003332010820000019
is the complement of Φ, and is the set of relays that cannot be decoded normally, the relays that can be decoded correctly go to step S5, and the relays that cannot be decoded correctly go to step S6;
步骤S5:在Φ中,针对第m个中继,定义Step S5: In Φ, for the mth relay, define
Figure FDA00033320108200000110
Figure FDA00033320108200000110
选择Φ中使Xm取值最大的中继,即选择
Figure FDA00033320108200000111
其中
Figure FDA00033320108200000112
为第m个中继到U1和U2的信道增益,δ3(x)=l+θ1x,
Figure FDA00033320108200000113
Figure FDA00033320108200000114
ρR表示R的发送信噪比,
Figure FDA00033320108200000115
Figure FDA0003332010820000021
表示第i个用户的安全速率门限,αi,i=1,2表示第i个用户的功率分配因数;
Select the relay that maximizes the value of X m in Φ, that is, select
Figure FDA00033320108200000111
in
Figure FDA00033320108200000112
is the channel gain of the mth relay to U 1 and U 2 , δ 3 (x)=l+θ 1 x,
Figure FDA00033320108200000113
Figure FDA00033320108200000114
ρ R represents the transmit signal-to-noise ratio of R,
Figure FDA00033320108200000115
Figure FDA0003332010820000021
represents the security rate threshold of the ith user, α i , i=1, 2 represents the power allocation factor of the ith user;
步骤S6:在
Figure FDA0003332010820000022
中,选择到窃听端信道增益最大的中继发送人工噪声,即选择
Figure FDA0003332010820000023
Step S6: in
Figure FDA0003332010820000022
, select the relay with the largest channel gain to the eavesdropping end to send artificial noise, that is, select
Figure FDA0003332010820000023
步骤S7:用户解码,其中强用户U1执行串行干扰消除,优先解码弱用户的信号并从叠加信号中删除,随后再解码自己的信号,弱用户U2直接把U1的信号视为噪声,解码自己的信号。Step S7: User decoding, wherein the strong user U 1 performs serial interference cancellation, preferentially decodes the signal of the weak user and deletes it from the superimposed signal, and then decodes its own signal, and the weak user U 2 directly regards the signal of U 1 as noise. , which decodes its own signal.
CN201910181591.XA 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise Active CN109890031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910181591.XA CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Publications (2)

Publication Number Publication Date
CN109890031A CN109890031A (en) 2019-06-14
CN109890031B true CN109890031B (en) 2022-03-01

Family

ID=66931718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910181591.XA Active CN109890031B (en) 2019-03-11 2019-03-11 Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise

Country Status (1)

Country Link
CN (1) CN109890031B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446169A (en) * 2019-08-28 2019-11-12 惠州学院 The cooperation broadcast system and broadcasting method continuously relayed based on quantization mapping forwarding
CN110784866A (en) * 2019-09-23 2020-02-11 天津大学 A secure transmission method for untrusted relay network based on blocking fault-tolerant decoding and forwarding
CN110730452B (en) * 2019-10-25 2023-05-02 中国人民解放军陆军工程大学 Performance analysis method for joint relay and interference selection scheme in wireless communication system
CN111245498B (en) * 2020-01-13 2021-07-16 大连理工大学 A relay-assisted non-orthogonal multiple access cooperative network security communication method
CN111510987B (en) * 2020-03-13 2022-09-02 西安电子科技大学 Relay selection method based on safety cooperation NOMA network
CN111510869B (en) * 2020-03-13 2021-04-13 西安电子科技大学 Cooperative Non-Orthogonal Hierarchical Multicast Multiple Access Method
CN111464214A (en) * 2020-04-02 2020-07-28 山东交通学院 Increment selectable decoding forwarding relay method suitable for non-orthogonal multiple access
CN112737656A (en) * 2020-12-16 2021-04-30 中国人民解放军战略支援部队信息工程大学 Relay network green safety transmission method and system based on non-orthogonal multiple access technology
CN112702741B (en) * 2020-12-29 2023-04-18 中国人民解放军空军工程大学 NOMA (non-uniform access memory) safe transmission method and system combining artificial noise and power distribution
CN113115233B (en) * 2021-03-30 2022-07-01 南京邮电大学 Opportunistic NOMA (non-access-point) cooperative multicast relay selection method
CN114024591B (en) * 2021-10-26 2023-09-01 西安邮电大学 A relay cooperative non-orthogonal multiple access system and information transmission method
CN114337877B (en) * 2022-01-10 2024-07-02 中通服中睿科技有限公司 CR-NOMA communication system performance optimization method based on full duplex relay
CN114640388B (en) * 2022-03-24 2023-07-25 重庆邮电大学 Trajectory Design Method for Dual-UAV Fair Scheduling and Multi-User Based on Cognitive Network
CN115134932B (en) * 2022-07-29 2025-01-10 萍乡市萍宣再生资源有限公司 Non-orthogonal multiple access auxiliary semi-unlicensed system safety transmission method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 User Throughput Fair Link Selection Method for Non-Orthogonal Multiple Access Cooperative Networks
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016163721A1 (en) * 2015-04-05 2016-10-13 엘지전자(주) Method and device for transmitting/receiving data in wireless communication system that supports device-to-device communication
CN106454838A (en) * 2016-09-28 2017-02-22 华侨大学 Energy harvesting relay safety transmission method adopting artificial noise precoding
US10492184B2 (en) * 2016-12-09 2019-11-26 Samsung Electronics Co., Ltd. Multiplexing control information in a physical uplink data channel
CN107995615B (en) * 2017-11-15 2020-08-18 中国人民解放军信息工程大学 Heterogeneous network NOMA physical layer safety transmission method
CN108512585B (en) * 2018-04-04 2020-07-24 哈尔滨工业大学 Dynamic cooperative relay transmission method based on power domain non-orthogonal multiple access technology
CN108900263B (en) * 2018-05-25 2021-04-06 宁波大学 Method for obtaining safe unicast rate model for downlink NOMA communication system design

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068002A (en) * 2012-12-27 2013-04-24 重庆邮电大学 Efficient routing method of high rate-wireless personal area network (HR-WPAN) mesh network
CN106900030A (en) * 2017-02-27 2017-06-27 西安交通大学 Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN107105470A (en) * 2017-03-29 2017-08-29 西安电子科技大学 One kind takes can cooperate CR NOMA collaboration modes and relay selection algorithm
CN108667584A (en) * 2018-03-23 2018-10-16 西安电子科技大学 User Throughput Fair Link Selection Method for Non-Orthogonal Multiple Access Cooperative Networks
CN108809365A (en) * 2018-06-13 2018-11-13 华侨大学 A kind of cooperation scrambling safe transmission method based on the selection of repeated link optimal user
CN109450513A (en) * 2018-10-17 2019-03-08 扬州大学 The more relay system transmission methods of cooperation based on non-orthogonal multiple access technology

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks;Yuanwei Liu ect.;《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》;20170110;全文 *
Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques;Yulong Zou ect.;《IEEE Network》;20150126;全文 *
Non-orthogonal Multiple Access and Artificial-Noise Aided Secure Transmission in FD Relay Networks;Youhong Feng ect.;《IEEE》;20180125;全文 *
Optimal Relay Selection Schemes for Cooperative NOMA;Peng Xu ect.;《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》;20180402;全文 *
Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer;Tiep M. Hoang ect.;《IEEE WIRELESS COMMUNICATIONS LETTERS》;20170109;全文 *
空天地通信网络的物理层安全系统模型与关键技术;韩帅,台祥雪,孟维晓;《电信科学》;20180320;全文 *
解码转发中继选择系统的安全性能分析;雷宏江等;《中国科学:信息科学》;20170920;全文 *

Also Published As

Publication number Publication date
CN109890031A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
CN109890031B (en) Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
CN111245498B (en) A relay-assisted non-orthogonal multiple access cooperative network security communication method
CN109451492B (en) A Secure Transmission Method Based on Artificial Noise and Beamforming in Downlink Full-Duplex Relay Networks
CN109743768B (en) Bidirectional relay communication scheme based on non-orthogonal multiple access technology
CN103036647B (en) Wireless communication method of physical layer network coding based on multi-frequency-shift keying (MFSK) modulation mode
CN110149127B (en) NOMA technology-based precoding vector optimization method for D2D communication system
CN106900030A (en) Based on repetition policy selection and resource allocation safe transmission method in relaying OFDM networks
CN110519756A (en) A physical layer security transmission method for full-duplex relay network
CN104780025B (en) For full-duplex cooperative communication system sky when interleaved convolutional codes coding method
CN108521290B (en) A power allocation method in wireless relay cooperative network based on spatial modulation
CN111107547B (en) Secure transmission method of alternate relay network in eavesdropping environment
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
CN106230476B (en) Information secure transmission method based on non-joint man made noise in insincere relay system
CN115278662B (en) A secure transmission method for non-orthogonal multiple access communication systems based on cooperative interference strategy
CN114024591B (en) A relay cooperative non-orthogonal multiple access system and information transmission method
CN105704079B (en) Joint subcarrier in the more relay systems of two-way OFDM based on PLNC inhibits and relay selection method
CN107994934A (en) Safe transmission method of the insincere junction network based on Symbol division and Wave beam forming
CN107529227A (en) A kind of denoising forwards bi-directional relaying slot allocation method
CN110611545B (en) Antenna selection strategy for improving security of radio frequency-laser communication system
CN115134932B (en) Non-orthogonal multiple access auxiliary semi-unlicensed system safety transmission method
Wen et al. Performance evaluation for the cooperative communication systems in decode-and-forward mode with a maximal ratio combining scheme
Bachan Error Rate Analysis of NOMA inspired DF Relay System with Imperfect SIC in IoT Network
Shi et al. Pairwise transmission using superposition coding for relay-assisted downlink communications
CN112911589B (en) Physical layer security transmission method and system for joint relay transmission and relay interference
Liau et al. Physical layer security in two-path successive relaying

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240807

Address after: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Hongyue Enterprise Management Consulting Co.,Ltd.

Country or region after: China

Address before: 400065 No. 2, Chongwen Road, Nan'an District, Chongqing

Patentee before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240814

Address after: Room 1103, 11th Floor, Building B, Tianxin Software Industrial Park, No. 66-68 Xinling Road, Tianxin District, Changsha City, Hunan Province 410000

Patentee after: Hunan Qingfeng Intelligent Technology Co.,Ltd.

Country or region after: China

Address before: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Patentee before: Shenzhen Hongyue Enterprise Management Consulting Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right