[go: up one dir, main page]

CN106131823B - Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene - Google Patents

Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene Download PDF

Info

Publication number
CN106131823B
CN106131823B CN201610394002.2A CN201610394002A CN106131823B CN 106131823 B CN106131823 B CN 106131823B CN 201610394002 A CN201610394002 A CN 201610394002A CN 106131823 B CN106131823 B CN 106131823B
Authority
CN
China
Prior art keywords
eavesdropping
transmission
relay
hop
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610394002.2A
Other languages
Chinese (zh)
Other versions
CN106131823A (en
Inventor
任品毅
许茜
杜清河
孙黎
王熠晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201610394002.2A priority Critical patent/CN106131823B/en
Publication of CN106131823A publication Critical patent/CN106131823A/en
Application granted granted Critical
Publication of CN106131823B publication Critical patent/CN106131823B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the relay transmission methods based on safety of physical layer in a kind of eavesdropping user random distribution scene, it include: 1) to be obtained under the scene of eavesdropping user random distribution based on random geometry theory, after independent eavesdropping coding twice, the security interrupt probability of double bounce relay transmission;2) under conditions of source node and limited relay node total transmission power, the optimization problem for maximizing safe transmission rate is constructed;3) it by the solution to constructed optimization problem, obtains that the maximized relay transmission method of safe transmission rate can be made, this method includes power distribution and code book rated design two parts.The present invention has comprehensively considered the reliability and safety of communication, the maximization to safe transmission rate is realized while meeting security interrupt probability constraints in the case where requiring no knowledge about eavesdropping user specific location.

Description

窃听用户随机分布场景中基于物理层安全的中继传输方法Relay transmission method based on physical layer security in the random distribution scenario of eavesdropping users

技术领域technical field

本发明属于无线通信技术领域,尤其涉及窃听用户随机分布场景中基于物理层安全的中继传输方法。The invention belongs to the technical field of wireless communication, and in particular relates to a relay transmission method based on physical layer security in a scenario where eavesdropping users are randomly distributed.

背景技术Background technique

由于无线信道的广播特性,节点间所传输的私密信息很容易被一些非法节点(窃听用户)所窃听,从而对信息的安全传输带来威胁。传统的高层加密技术,是基于窃听用户的计算能力有限这个假设来保证信息安全的。然而,随着诸如量子计算等高速高效计算技术的发展,窃听用户的计算能力将趋于无穷,高层加密技术将不再能保证信息的绝对安全。与之相对应的,物理层安全技术不依赖于对窃听用户计算能力的限制,可以提供信息论意义上的绝对安全。Due to the broadcast characteristics of wireless channels, the private information transmitted between nodes is easily eavesdropped by some illegal nodes (eavesdropping users), which poses a threat to the safe transmission of information. Traditional high-level encryption technology ensures information security based on the assumption that eavesdropping users have limited computing power. However, with the development of high-speed and efficient computing technologies such as quantum computing, the computing power of eavesdropping users will tend to be infinite, and high-level encryption technology will no longer be able to guarantee the absolute security of information. Correspondingly, the physical layer security technology does not rely on the restriction on the computing power of eavesdropping users, and can provide absolute security in the sense of information theory.

然而,在许多有关物理层安全的研究中,都假设已知窃听用户的信道状态。实际上,这种假设在现实中是很难实现的,因为窃听用户通常保持静默,不发送任何信号,即使是窃听用户的位置分布也难以获得。因此,在不知道窃听用户的位置分布和信道状态的条件下,如何设计传输策略以保证安全通信,是一项具有重要研究意义的工作。However, in many studies on physical layer security, it is assumed that the channel state of the eavesdropping user is known. In fact, this assumption is difficult to realize in reality, because the eavesdropping user usually keeps silent and does not send any signal, even the location distribution of the eavesdropping user is difficult to obtain. Therefore, how to design a transmission strategy to ensure secure communication without knowing the location distribution and channel state of eavesdropping users is a work of great research significance.

发明内容Contents of the invention

针对上述缺陷或不足,本发明的目的在于提供一种无窃听用户随机分布场景中基于物理层安全的中继传输方法,能够最大化安全传输速率。In view of the above defects or deficiencies, the purpose of the present invention is to provide a relay transmission method based on physical layer security in a random distribution scenario of non-eavesdropping users, which can maximize the secure transmission rate.

为达到以上目的,本发明的技术方法为:For achieving above object, technical method of the present invention is:

一种窃听用户随机分布场景中基于物理层安全的中继传输方法,包括以下步骤:A method for relay transmission based on physical layer security in an eavesdropping user random distribution scenario, comprising the following steps:

1)基于随机几何理论,计算出在窃听用户位置随机分布且窃听用户非共谋情况下经两跳中继传输后的安全中断概率,并构建在该安全中断概率约束下最大 化安全传输速率的优化模型P1;1) Based on stochastic geometry theory, calculate the security outage probability after two-hop relay transmission under the condition that the eavesdropping users are randomly distributed and the eavesdropping users are not colluding, and construct the maximum security transmission rate under the constraint of the security outage probability Optimize model P1;

2)将优化模型P1转化成等价的简化模型P2;2) Transform the optimized model P1 into an equivalent simplified model P2;

3)求解模型P2,得到最优传输方法,包括功率分配和码本速率选择。所述3) Solve the model P2 to obtain the optimal transmission method, including power allocation and codebook rate selection. said

步骤1)具体为:Step 1) is specifically:

a、源节点和目的节点均配备单天线,中继配备NR根天线,每个窃听用户配备NE根天线,使用Ej代表第j个窃听用户,使用ΦE,1表示在第一跳(从源节点S传输到中继R)传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第一跳时合法链路的信道容量CM,1和窃听链路的信道容量CE,1,计算公式分别为:a. Both the source node and the destination node are equipped with a single antenna, the relay is equipped with N R antennas, and each eavesdropping user is equipped with N E antennas. Use E j to represent the j-th eavesdropping user, and use Φ E,1 to indicate that at the first hop (Transmission from source node S to relay R) During the transmission process, the set of eavesdropping users distributed on the entire two-dimensional plane is used to calculate the channel capacity C M,1 of the legal link at the first hop and the eavesdropping link Channel capacity C E,1 , the calculation formulas are:

其中,ρ1代表第一跳发射节点(源节点S)的发射信噪比,||hSR||2代表源节点S和中继R之间合法链路的小尺度衰落增益,dSR代表源节点S和中继R之间的距离, 代表源节点S和窃听用户Ej之间窃听链路的小尺度衰落增益,代表源节点S和窃听用户Ej之间的距离,α为路径损耗因子;Among them, ρ 1 represents the transmit signal-to-noise ratio of the first-hop transmitting node (source node S), ||h SR || 2 represents the small-scale fading gain of the legitimate link between source node S and relay R, and d SR represents the distance between the source node S and the relay R, represents the small-scale fading gain of the eavesdropping link between the source node S and the eavesdropping user Ej , Represents the distance between the source node S and the eavesdropping user E j , α is the path loss factor;

b、使用Ej代表第j个窃听用户,使用ΦE,2表示在第二跳(从中继R传输到目的节点D)传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第二跳时合法链路的信道容量CM,2和窃听链路的信道容量CE,2,计算公式分别为:b. Use E j to represent the jth eavesdropping user, and use Φ E,2 to represent the set of eavesdropping users distributed on the entire two-dimensional plane during the transmission process of the second hop (transmission from relay R to destination node D) , calculate the channel capacity C M,2 of the legitimate link and the channel capacity CE,2 of the eavesdropping link at the second hop, and the calculation formulas are:

其中,ρ2代表第二跳发射节点(中继R)的发射信噪比,||hRD||2代表中继R和目的节点D之间合法链路的小尺度衰落增益,dRD代表中继R和目的节点D之间的距离,代表中继R和窃听用户Ej之间窃听链路的小尺度衰落增益,代表中继R和窃听用户Ej之间的距离;Among them, ρ 2 represents the transmit signal-to-noise ratio of the second-hop transmitting node (relay R), ||h RD || 2 represents the small-scale fading gain of the legitimate link between relay R and destination node D, and d RD represents The distance between relay R and destination node D, represents the small-scale fading gain of the eavesdropping link between relay R and eavesdropping user Ej , Represents the distance between relay R and eavesdropping user E j ;

c、对于给定所需达到的私密信息编码速率RS,用Psec,1表示第一跳传输的安全中断概率,其具体计算公式为:c. For a given private information encoding rate R S , use P sec,1 to represent the security interruption probability of the first hop transmission, and the specific calculation formula is:

其中,γ(NE,cj)为不完全伽马函数;Among them, γ(N E ,c j ) is an incomplete gamma function;

d、对于给定所需达到的私密信息编码速率RS,用Psec,2表示第二跳传输的安全中断概率,其具体计算公式为:d. For a given private information coding rate R S that needs to be achieved, use P sec,2 to represent the security interruption probability of the second hop transmission, and the specific calculation formula is:

e、结合公式(5)和公式(6)得到经两跳中继传输后的安全中断概率,其 具体表达式如下:e. Combining formula (5) and formula (6) to obtain the safety interruption probability after two-hop relay transmission, its specific expression is as follows:

其中,为变量代换。in, Substitute for variables.

所述步骤2)具体为:Described step 2) specifically is:

a、定义安全传输速率Ts,其表达式为:a. Define the safe transmission rate T s , whose expression is:

其中,Rs为每跳所用码本的私密信息编码速率(两跳的Rs一样);Among them, R s is the private information encoding rate of the codebook used in each hop (the R s of the two hops are the same);

b、用Rt,i表示第i跳所用码本的码字传输速率,则构建如下所示的安全传输速率最大化优化模型P1:b. Use R t,i to represent the codeword transmission rate of the codebook used in the i-th hop, then construct the optimization model P1 for maximizing the safe transmission rate as shown below:

其中,安全中断概率Pout的表达式已在公式(7)中给出,ε为预先设定的所能容忍的安全中断概率的门限值。Wherein, the expression of the safe outage probability P out has been given in the formula (7), and ε is the threshold value of the pre-set tolerable safe outage probability.

所述步骤3)具体为:The step 3) is specifically:

a、由于安全传输速率在发射功率全部用完时才能最大化,因此可将模型P1中最后一个关于总功率的不等式约束条件ρ12≤ρ01≥0,ρ2≥0转化总功率ρ0全部用完时对功率分配因子η的约束即0≤η≤1,在该功率分配因子下有ρ1=ηρ0和ρ2=(1-η)ρ0,则与模型P1相对应的简化优化模型P2为:a. Since the safe transmission rate can only be maximized when the transmission power is completely used up, the last inequality constraint on the total power in model P1 can be ρ 1 + ρ 2 ≤ ρ 0 , ρ 1 ≥ 0, ρ 2 ≥ 0 When the total conversion power ρ 0 is used up, the constraint on the power allocation factor η is 0≤η≤1. Under this power allocation factor, there are ρ 1 =ηρ 0 and ρ 2 =(1-η)ρ 0 , and the model The simplified optimization model P2 corresponding to P1 is:

其中,公式的表达式为:Among them, the formula The expression is:

b、求解模型P2,得到在给定合法链路信道状态h=(||hSR||2,||hRD||2)下最优传输方法如下:b. Solve the model P2 to obtain the optimal transmission method under the given legal link channel state h=(||h SR || 2 ,||h RD || 2 ) as follows:

1)若合法链路信道状态未落于发射条件集合中即则不进行传输,发射条件集合H的表达式如下:1) If the channel state of the legal link does not fall in the set of transmission conditions, then Then no transmission is performed, and the expression of the launch condition set H is as follows:

2)若合法链路信道状态落于发射条件集合中即h∈H,则进行传输,最优功率分配因子η*(h)和最大的私密信息编码速率为如下的二元方程组的根:2) If the channel state of the legal link falls in the set of transmission conditions, i.e. h∈H, then transmit, the optimal power allocation factor η * (h) and the maximum private information encoding rate are the roots of the following system of binary equations:

则最大安全传输速率为:The maximum safe transmission rate for:

同时,第i跳(i=1,2)所用码本的最优码字传输速率分别为:At the same time, the optimal codeword transmission rate of the codebook used by the i-th hop (i=1,2) They are:

与现有技术比较,本发明的有益效果为:Compared with prior art, the beneficial effects of the present invention are:

本发明公开了一种窃听用户随机分布场景中基于物理层安全的中继传输方法,所提出的最优传输方法在满足安全中断概率约束和总发射功率约束的条件下,可以最大化安全传输速率;所提出的方法不依赖于窃听用户的位置和信道状态信息,在实际系统中更容易实施;仿真实验表明,我们所提出的方法(最优解/最优功率分配)可以最大化安全传输速率,并且在高信噪比下可以用较简单的次优方法——信噪比均衡功率分配来近似。The invention discloses a relay transmission method based on physical layer security in the random distribution scene of eavesdropping users. The proposed optimal transmission method can maximize the security transmission rate under the condition of satisfying the security interruption probability constraint and the total transmission power constraint ; The proposed method does not depend on eavesdropping on the user's location and channel state information, and is easier to implement in practical systems; Simulation experiments show that our proposed method (optimal solution/optimal power allocation) can maximize the safe transmission rate , and can be approximated by a simpler suboptimal method—SNR equalized power allocation—at high SNR.

附图说明Description of drawings

图1是本发明的系统模型图;Fig. 1 is a system model diagram of the present invention;

图2是对本发明中安全中断概率表达式(11)的仿真验证;Fig. 2 is the emulation verification to safe interruption probability expression (11) in the present invention;

图3是本发明中在不同路径损耗因子下,安全传输速率随功率分配因子的变化曲线;Fig. 3 is under different path loss factors in the present invention, the change curve of safe transmission rate with power allocation factor;

图4是本发明中在不同窃听用户分布密度下,安全传输速率随功率分配因子的变化曲线;Fig. 4 is under different eavesdropping user distribution densities in the present invention, the change curve of secure transmission rate with power allocation factor;

图5是本发明中在不同总发射信噪比下,安全传输速率随功率分配因子的变化曲线;Fig. 5 is the change curve of the safe transmission rate with the power allocation factor under different total transmission signal-to-noise ratios in the present invention;

图6是本发明中在不同天线数目配置情况下采用最优传输方法所达到的安全吞吐量;Fig. 6 shows the security throughput achieved by adopting the optimal transmission method under different configurations of the number of antennas in the present invention;

图7是本发明中采用不同传输方法所达到的安全吞吐量。Fig. 7 shows the security throughput achieved by using different transmission methods in the present invention.

具体实施方式Detailed ways

下面结合附图对本发明做详细描述。The present invention will be described in detail below in conjunction with the accompanying drawings.

本发明考察存在位置随机分布窃听用户的中继传输系统,如图1所示。源节点S要把私密信息传输到目的节点D,由于直传链路的缺失,中继R被选定来对 该私密信息进行转发。源节点和目的节点均配备单根天线,中继节点配备NR根天线。因此,完整的传输过程包含两跳(两个阶段),第一跳从源节点S到中继R,第二跳从中继R到目的节点D。网络中存在位置随机分布的窃听用户,每个窃听用户均配备NE根天线。假设窃听用户在这两跳的位置分布是相互独立的,并且均服从密度为λE的均匀泊松点过程(PPP分布)。The present invention investigates a relay transmission system with randomly distributed eavesdropping users, as shown in FIG. 1 . The source node S wants to transmit the private information to the destination node D. Due to the lack of direct transmission link, the relay R is selected to forward the private information. Both the source node and the destination node are equipped with a single antenna, and the relay node is equipped with NR antennas. Therefore, the complete transmission process includes two hops (two stages), the first hop is from the source node S to the relay R, and the second hop is from the relay R to the destination node D. There are randomly distributed eavesdropping users in the network, and each eavesdropping user is equipped with N E antennas. Assume that the location distribution of eavesdropping users in these two hops is independent of each other, and they all obey a uniform Poisson point process (PPP distribution) with a density of λE .

为避免窃听用户采用最大比合并提高解码信息的能力,我们采用RF中继转发策略,这样只需保证每一跳的安全传输,则最终的信息就是安全的。In order to prevent eavesdropping users from using maximum ratio combining to improve the ability to decode information, we adopt the RF relay forwarding strategy, so that only need to ensure the safe transmission of each hop, the final information is safe.

针对以上系统模型,本发明的主要步骤包括:For the above system model, the main steps of the present invention include:

1)基于随机几何理论,计算出在窃听用户位置随机分布且窃听用户非共谋情况下经两跳中继传输后的安全中断概率,并构建在该安全中断概率约束下最大化安全传输速率的优化模型P1;1) Based on stochastic geometry theory, calculate the security outage probability after two-hop relay transmission under the condition that the eavesdropping users are randomly distributed and the eavesdropping users are not colluding, and construct the maximum security transmission rate under the constraint of the security outage probability Optimize model P1;

2)将优化模型P1转化成等价的简化模型P2;2) Transform the optimized model P1 into an equivalent simplified model P2;

3)求解模型P2,得到最优传输方法,包括功率分配和码本速率选择。所述3) Solve the model P2 to obtain the optimal transmission method, including power allocation and codebook rate selection. said

步骤1)具体为:Step 1) is specifically:

a、使用Ej代表第j个窃听用户,使用ΦE,1表示在第一跳(从源节点S传输到中继R)传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第一跳时合法链路的信道容量CM,1和窃听链路的信道容量CE,1,计算公式分别为:a. Use E j to represent the jth eavesdropping user, and use Φ E,1 to represent the eavesdropping users distributed on the entire two-dimensional plane during the transmission process of the first hop (transmission from the source node S to the relay R). Set, calculate the channel capacity C M,1 of the legal link and the channel capacity C E,1 of the eavesdropping link at the first hop, and the calculation formulas are:

其中,ρ1代表第一跳发射节点(源节点S)的发射信噪比,||hSR||2代表源节点S和中继R之间合法链路的小尺度衰落增益,dSR代表源节点S和中继R之间的距离, 代表源节点S和窃听用户Ej之间窃听链路的小尺度衰落增益,代表源节点S和窃听用户Ej之间的距离,α为路径损耗因子;Among them, ρ 1 represents the transmit signal-to-noise ratio of the first-hop transmitting node (source node S), ||h SR || 2 represents the small-scale fading gain of the legitimate link between source node S and relay R, and d SR represents the distance between the source node S and the relay R, represents the small-scale fading gain of the eavesdropping link between the source node S and the eavesdropping user Ej , Represents the distance between the source node S and the eavesdropping user E j , α is the path loss factor;

b、使用Ej代表第j个窃听用户,使用ΦE,2表示在第二跳(从中继R传输到目的节点D)传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第二跳时合法链路的信道容量CM,2和窃听链路的信道容量CE,2,计算公式分别为:b. Use E j to represent the jth eavesdropping user, and use Φ E,2 to represent the set of eavesdropping users distributed on the entire two-dimensional plane during the transmission process of the second hop (transmission from relay R to destination node D) , calculate the channel capacity C M,2 of the legitimate link and the channel capacity CE,2 of the eavesdropping link at the second hop, and the calculation formulas are:

其中,ρ2代表第二跳发射节点(中继R)的发射信噪比,||hRD||2代表中继R和目的节点D之间合法链路的小尺度衰落增益,dRD代表中继R和目的节点D之间的距离,代表中继R和窃听用户Ej之间窃听链路的小尺度衰落增益,代表中继R和窃听用户Ej之间的距离;Among them, ρ 2 represents the transmit signal-to-noise ratio of the second-hop transmitting node (relay R), ||h RD || 2 represents the small-scale fading gain of the legitimate link between relay R and destination node D, and d RD represents The distance between relay R and destination node D, represents the small-scale fading gain of the eavesdropping link between relay R and eavesdropping user Ej , Represents the distance between relay R and eavesdropping user E j ;

c、对于给定所需达到的私密信息编码速率RS,用Psec,1表示第一跳传输的安全中断概率,其具体计算公式为:c. For a given private information encoding rate R S , use P sec,1 to represent the security interruption probability of the first hop transmission, and the specific calculation formula is:

其中,γ(NE,cj)为不完全伽马函数;Among them, γ(N E ,c j ) is an incomplete gamma function;

d、对于给定所需达到的私密信息编码速率RS,用Psec,2表示第二跳传输的安全中断概率,其具体计算公式为:d. For a given private information coding rate R S that needs to be achieved, use P sec,2 to represent the security interruption probability of the second hop transmission, and the specific calculation formula is:

e、结合公式(5)和公式(6)得到经两跳中继传输后的安全中断概率,其具体表达式如下:e, combine formula (5) and formula (6) to obtain the safety interruption probability after two-hop relay transmission, and its concrete expression is as follows:

其中,为变量代换。in, Substitute for variables.

所述步骤2)具体为:Described step 2) specifically is:

a、定义安全传输速率Ts,其表达式为:a. Define the safe transmission rate T s , whose expression is:

其中,Rs为每跳所用码本的私密信息编码速率(两跳的Rs一样);Among them, R s is the private information encoding rate of the codebook used in each hop (the R s of the two hops are the same);

b、用Rt,i表示第i跳所用码本的码字传输速率,则构建如下所示的安全传输速率最大化优化模型P1:b. Use R t,i to represent the codeword transmission rate of the codebook used in the i-th hop, then construct the optimization model P1 for maximizing the safe transmission rate as shown below:

其中,安全中断概率Pout的表达式已在公式(7)中给出,ε为预先设定的所能容忍的安全中断概率的门限值。Wherein, the expression of the safe outage probability P out has been given in the formula (7), and ε is the threshold value of the pre-set tolerable safe outage probability.

所述步骤3)具体为:The step 3) is specifically:

a、由于安全传输速率在发射功率全部用完时才能最大化,因此可将模型P1中最后一个关于总功率的不等式约束条件ρ12≤ρ01≥0,ρ2≥0转化总功率ρ0全部用完时对功率分配因子η的约束即0≤η≤1,在该功率分配因子下有ρ1=ηρ0和ρ2=(1-η)ρ0,则与模型P1相对应的简化优化模型P2为:a. Since the safe transmission rate can only be maximized when the transmission power is completely used up, the last inequality constraint on the total power in model P1 can be ρ 1 + ρ 2 ≤ ρ 0 , ρ 1 ≥ 0, ρ 2 ≥ 0 When the total conversion power ρ 0 is used up, the constraint on the power allocation factor η is 0≤η≤1. Under this power allocation factor, there are ρ 1 =ηρ 0 and ρ 2 =(1-η)ρ 0 , and the model The simplified optimization model P2 corresponding to P1 is:

其中,公式的表达式为:Among them, the formula The expression is:

b、求解模型P2,得到在给定合法链路信道状态h=(||hSR||2,||hRD||2)下最优传输方法如下:b. Solve the model P2 to obtain the optimal transmission method under the given legal link channel state h=(||h SR || 2 ,||h RD || 2 ) as follows:

1)若合法链路信道状态未落于发射条件集合中即则不进行传输,发射条件集合H的表达式如下:1) If the channel state of the legal link does not fall in the set of transmission conditions, then Then no transmission is performed, and the expression of the launch condition set H is as follows:

2)若合法链路信道状态落于发射条件集合中即h∈H,则进行传输,最优功率分配因子η*(h)和最大的私密信息编码速率为如下的二元方程组的根:2) If the channel state of the legal link falls in the set of transmission conditions, i.e. h∈H, then transmit, the optimal power allocation factor η * (h) and the maximum private information encoding rate are the roots of the following system of binary equations:

则最大安全传输速率为:The maximum safe transmission rate for:

同时,第i跳(i=1,2)所用码本的最优码字传输速率分别为:At the same time, the optimal codeword transmission rate of the codebook used by the i-th hop (i=1,2) They are:

图2为对本发明中安全中断概率表达式(11)的仿真验证。我们采用蒙特卡洛仿真来验证表达式(11)。仿真场景为以源节点S为圆心的半径为2000m的圆形区域。功率分配因子预先设定为η=0.5,路径损耗因子为α=3,总发射信噪比为ρ0=30dB,窃听用户密度为λE=10-3个/每平方米。观察此图可以发现,所推导的安全中断概率(11)与蒙特卡洛仿真结果相吻合。FIG. 2 is a simulation verification of the safety outage probability expression (11) in the present invention. We use Monte Carlo simulation to verify expression (11). The simulation scene is a circular area with a radius of 2000m centered on the source node S. The power allocation factor is preset as η=0.5, the path loss factor is α=3, the total transmission signal-to-noise ratio is ρ 0 =30dB, and the eavesdropping user density is λ E =10 -3 per square meter. Looking at this figure, it can be found that the derived safety outage probability (11) is in good agreement with the Monte Carlo simulation results.

图3为本发明中在不同路径损耗因子下,安全传输速率随功率分配因子的变 化曲线。星号为采用本发明所提出最优传输方法所能达到的最优解(η*(h),Ts *(h))。观察此图可以发现,本发明所提方法可以最大化安全传输速率,并且随着路径损耗因子的增大,最大传输速率下降。Fig. 3 is a curve of safe transmission rate changing with power allocation factor under different path loss factors in the present invention. The asterisk is the optimal solution (η * (h), T s * (h)) that can be achieved by using the optimal transmission method proposed by the present invention. Observing this figure, it can be found that the method proposed in the present invention can maximize the safe transmission rate, and as the path loss factor increases, the maximum transmission rate decreases.

图4为本发明中在不同窃听用户分布密度下,安全传输速率随功率分配因子的变化曲线。星号为采用本发明所提出最优传输方法所能达到的最优解。观察此图可以发现,本发明所提方法可以最大化安全传输速率,并且随着窃听用户密度的增大,最大传输速率下降。Fig. 4 is a curve of safe transmission rate changing with power allocation factor under different eavesdropping user distribution densities in the present invention. The asterisks are the optimal solutions that can be achieved by adopting the optimal transmission method proposed by the present invention. Observing this figure, it can be found that the method proposed in the present invention can maximize the secure transmission rate, and as the density of eavesdropping users increases, the maximum transmission rate decreases.

图5为本发明中在不同天线数目配置情况下采用最优传输方法所达到的安全吞吐量。星号为采用本发明所提出最优传输方法所能达到的最优解。观察此图可以发现,本发明所提方法可以最大化安全传输速率,并且随着总传输信噪比的增大,最大传输速率增加并趋于定值。FIG. 5 shows the security throughput achieved by adopting the optimal transmission method under different antenna number configurations in the present invention. The asterisks are the optimal solutions that can be achieved by adopting the optimal transmission method proposed by the present invention. Observing this figure, it can be found that the method proposed in the present invention can maximize the safe transmission rate, and as the total transmission signal-to-noise ratio increases, the maximum transmission rate increases and tends to a constant value.

图6为本发明中在不同天线数目配置情况下采用最优传输方法所达到的安全吞吐量。观察此图可以发现,当NR>NE时,安全速率较大,当NR<NE时,安全速率极低。在NR=NE的情况下,随着天线数目的增加,安全传输速率增加并趋于定值。FIG. 6 shows the security throughput achieved by adopting the optimal transmission method under different configurations of the number of antennas in the present invention. Observing this figure, it can be found that when N R > NE , the security rate is large, and when N R < NE , the security rate is extremely low. In the case of NR = NE, as the number of antennas increases, the safe transmission rate increases and tends to a constant value.

图7为本发明中采用不同传输方法所达到的安全吞吐量。等功率分配即ηeql=0.5,信噪比均衡功率分配即观察此图可以发现,本发明所提出的方法(最优功率分配)优于其余两个对比方法。并且,在高信噪比的条件下,本发明所提出的方法可以用信噪比均衡功率分配来近似。Fig. 7 shows the security throughput achieved by using different transmission methods in the present invention. Equal power distribution is η eql = 0.5, SNR balanced power distribution is Observing this figure, it can be found that the method proposed by the present invention (optimal power allocation) is superior to the other two comparative methods. Moreover, under the condition of high SNR, the method proposed by the present invention can be approximated by SNR equalized power allocation.

Claims (3)

1.窃听用户随机分布场景中基于物理层安全的中继传输方法,其特征在于,包括以下步骤:1. The relay transmission method based on physical layer security in the randomly distributed scene of eavesdropping users is characterized in that, comprising the following steps: 1)基于随机几何理论,计算出在窃听用户位置随机分布且窃听用户非共谋情况下经两跳中继传输后的安全中断概率,并构建在该安全中断概率约束下最大化安全传输速率的优化模型P1;1) Based on stochastic geometry theory, calculate the security outage probability after two-hop relay transmission under the condition that the eavesdropping users are randomly distributed and the eavesdropping users are not colluding, and construct the maximum security transmission rate under the constraint of the security outage probability Optimize model P1; 2)将优化模型P1转化成等价的简化模型P2;2) Transform the optimized model P1 into an equivalent simplified model P2; 具体方法如下:The specific method is as follows: a、定义安全传输速率Ts,其表达式为:a. Define the safe transmission rate T s , whose expression is: 其中,Rs为每跳所用码本的私密信息编码速率,两跳的Rs一样;Among them, R s is the private information encoding rate of the codebook used in each hop, and the R s of the two hops are the same; b、用Rt,i表示第i跳所用码本的码字传输速率,则构建如下所示的安全传输速率最大化优化模型P1:b. Use R t,i to represent the codeword transmission rate of the codebook used in the i-th hop, then construct the optimization model P1 for maximizing the safe transmission rate as shown below: 其中,安全中断概率Pout的表达式已在公式(7)中给出,ε为预先设定的所能容忍的安全中断概率的门限值;Among them, the expression of the safety outage probability P out has been given in the formula (7), and ε is the threshold value of the safety outage probability that can be tolerated in advance; 3)求解模型P2,得到最优传输方法,包括功率分配和码本速率选择。3) Solve the model P2 to obtain the optimal transmission method, including power allocation and codebook rate selection. 2.根据权利要求1所述的窃听用户随机分布场景中基于物理层安全的中继传输方法,其特征在于,所述步骤1)的具体方法如下:2. the relay transmission method based on physical layer security in the eavesdropping user random distribution scene according to claim 1, is characterized in that, the specific method of described step 1) is as follows: a、源节点和目的节点均配备单天线,中继配备NR根天线,每个窃听用户配备NE根天线,使用Ej代表第j个窃听用户,使用ΦE,1表示在第一跳即从源节点S传输到中继R传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第一跳时合法链路的信道容量CM,1和窃听链路的信道容量CE,1,计算公式分别为:a. Both the source node and the destination node are equipped with a single antenna, the relay is equipped with N R antennas, and each eavesdropping user is equipped with N E antennas. Use E j to represent the j-th eavesdropping user, and use Φ E,1 to indicate that at the first hop That is, during the transmission process from the source node S to the relay R, a set of eavesdropping users distributed on the entire two-dimensional plane is formed, and the channel capacity C M,1 of the legal link at the first hop and the channel capacity of the eavesdropping link are calculated Capacity C E,1 , the calculation formulas are: 其中,ρ1代表第一跳发射节点即源节点S的发射信噪比,||hSR||2代表源节点S和中继R之间合法链路的小尺度衰落增益,dSR代表源节点S和中继R之间的距离,代表源节点S和窃听用户Ej之间窃听链路的小尺度衰落增益,代表源节点S和窃听用户Ej之间的距离,α为路径损耗因子;Among them, ρ 1 represents the transmit signal-to-noise ratio of the first-hop transmitting node, that is, the source node S, ||h SR || 2 represents the small-scale fading gain of the legal link between the source node S and the relay R, and d SR represents the source the distance between node S and relay R, represents the small-scale fading gain of the eavesdropping link between the source node S and the eavesdropping user Ej , Represents the distance between the source node S and the eavesdropping user E j , α is the path loss factor; b、使用Ej代表第j个窃听用户,使用ΦE,2表示在第二跳,从中继R传输到目的节点D传输过程中,分布在整个二维平面上的窃听用户所构成的集合,计算第二跳时合法链路的信道容量CM,2和窃听链路的信道容量CE,2,计算公式分别为:b. Use E j to represent the jth eavesdropping user, and use Φ E,2 to represent the set of eavesdropping users distributed on the entire two-dimensional plane during the second hop, during transmission from relay R to destination node D, Calculate the channel capacity C M,2 of the legal link and the channel capacity C E,2 of the eavesdropping link at the second hop, and the calculation formulas are: 其中,ρ2代表第二跳发射节点即中继R的发射信噪比,||hRD||2代表中继R和目的节点D之间合法链路的小尺度衰落增益,dRD代表中继R和目的节点D之间的距离,代表中继R和窃听用户Ej之间窃听链路的小尺度衰落增益,代表中继R和窃听用户Ej之间的距离;Among them, ρ 2 represents the transmitting signal-to-noise ratio of the second-hop transmitting node, that is, the relay R, ||h RD || 2 represents the small-scale fading gain of the legal link between the relay R and the destination node D, and d RD represents the medium Following the distance between R and destination node D, represents the small-scale fading gain of the eavesdropping link between relay R and eavesdropping user Ej , Represents the distance between relay R and eavesdropping user E j ; C、对于给定所需达到的私密信息编码速率RS,用Psec,1表示第一跳传输的安全中断概率,其具体计算公式为:C. For a given private information encoding rate R S , use P sec,1 to represent the security interruption probability of the first hop transmission, and the specific calculation formula is: 其中,γ(NE,cj)为不完全伽马函数;Among them, γ(N E ,c j ) is an incomplete gamma function; d、对于给定所需达到的私密信息编码速率RS,用Psec,2表示第二跳传输的安全中断概率,其具体计算公式为:d. For a given private information coding rate R S that needs to be achieved, use P sec,2 to represent the security interruption probability of the second hop transmission, and the specific calculation formula is: e、结合公式(5)和公式(6)得到经两跳中继传输后的安全中断概率,其具体表达式如下:e, combine formula (5) and formula (6) to obtain the safety interruption probability after two-hop relay transmission, and its concrete expression is as follows: 其中,为变量代换。in, Substitute for variables. 3.根据权利要求1所述的窃听用户随机分布场景中基于物理层安全的中继传输方法,其特征在于,所述步骤3)的具体方法如下:3. the relay transmission method based on physical layer security in the randomly distributed scene of eavesdropping users according to claim 1, is characterized in that, the concrete method of described step 3) is as follows: a、由于安全传输速率在发射功率全部用完时才能最大化,因此将模型P1中最后一个关于总功率的不等式约束条件ρ12≤ρ01≥0,ρ2≥0转化总功率ρ0全部用完时对功率分配因子η的约束即0≤η≤1,在该功率分配因子下有ρ1=ηρ0和ρ2=(1-η)ρ0,则与模型P1相对应的简化优化模型P2为:a. Since the safe transmission rate can only be maximized when the transmission power is completely used up, the last inequality constraint on the total power in model P1 is transformed into ρ 12 ≤ρ 01 ≥0,ρ 2 ≥0 When the total power ρ 0 is all used up, the constraint on the power allocation factor η is 0≤η≤1. Under this power allocation factor, there are ρ 1 =ηρ 0 and ρ 2 =(1-η)ρ 0 , and the model P1 The corresponding simplified optimization model P2 is: 其中,公式的表达式为:Among them, the formula The expression is: b、求解模型P2,得到在给定合法链路信道状态h=(||hSR||2,||hRD||2)下最优传输方法如下:b. Solve the model P2 to obtain the optimal transmission method under the given legal link channel state h=(||h SR || 2 ,||h RD || 2 ) as follows: 1)若合法链路信道状态未落于发射条件集合中即则不进行传输,发射条件集合的表达式如下:1) If the channel state of the legal link does not fall in the set of transmission conditions, then Then no transmission is performed, and the emission condition set The expression of is as follows: 2)若合法链路信道状态落于发射条件集合中即则进行传输,最优功率分配因子η*(h)和最大的私密信息编码速率为如下的二元方程组的根:2) If the channel state of the legal link falls in the set of transmission conditions, then Then transmit, the optimal power allocation factor η * (h) and the maximum private information encoding rate are the roots of the following system of binary equations: 则最大安全传输速率为:The maximum safe transmission rate for: 同时,第i跳(i=1,2)所用码本的最优码字传输速率分别为:At the same time, the optimal codeword transmission rate of the codebook used by the i-th hop (i=1,2) They are:
CN201610394002.2A 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene Expired - Fee Related CN106131823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610394002.2A CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610394002.2A CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Publications (2)

Publication Number Publication Date
CN106131823A CN106131823A (en) 2016-11-16
CN106131823B true CN106131823B (en) 2019-08-23

Family

ID=57270178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610394002.2A Expired - Fee Related CN106131823B (en) 2016-06-06 2016-06-06 Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene

Country Status (1)

Country Link
CN (1) CN106131823B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571875B (en) * 2016-11-17 2018-12-14 东南大学 A kind of VLC secret signalling launching technique maximizing safe transmission rate
CN106877919B (en) * 2017-01-03 2020-06-09 华侨大学 Relay safety communication method for power distribution energy collection based on optimal user selection
CN107231683B (en) * 2017-05-27 2020-06-05 西安电子科技大学 Power allocation method for relay system based on physical layer security
CN107396346B (en) * 2017-08-15 2019-11-12 广州大学 A method and system for caching cellular network physical layer secure data transmission
CN108494447B (en) * 2018-02-01 2020-09-22 华南理工大学 Resource allocation method in physical layer security communication
CN109068345B (en) * 2018-09-28 2020-06-26 西北工业大学 A Stochastic Cooperative Communication Method Based on Geometric Probabilistic Method
CN109495881B (en) * 2018-12-11 2022-04-01 中国人民解放军军事科学院国防科技创新研究院 Wireless relay network safety transmission method using cooperative interference
CN109819479B (en) * 2019-01-30 2023-03-03 天津工业大学 TS relay rate optimization method
CN109861783B (en) * 2019-03-26 2022-04-12 哈尔滨工业大学 Physical layer security method based on artificial noise power distribution
CN110213793B (en) * 2019-04-15 2020-06-16 浙江大学 A rate control-based method for optimizing safe throughput of relay systems
CN110381561B (en) * 2019-06-24 2021-06-29 西安交通大学 A secure transmission method based on energy efficiency in a cache-assisted multi-relay transmission system
CN111132259B (en) * 2019-12-27 2023-12-22 深圳市兴海物联科技有限公司 Combined power optimization and routing method for physical layer security
CN111866861B (en) * 2020-06-09 2024-01-23 珠海高凌信息科技股份有限公司 Wireless sensor network secure transmission method and device based on cooperation
CN111935798B (en) * 2020-07-08 2022-09-02 西北工业大学 Fair matching method based on maximum weight matching
CN111988797B (en) * 2020-08-10 2022-09-06 国网能源研究院有限公司 Method and system for analyzing performance of two-hop multi-relay network driven by wireless energy transmission
CN112312431B (en) * 2020-09-21 2024-12-20 国网能源研究院有限公司 A method and system for evaluating performance of an outdoor wireless energy harvesting driving network
CN112272183B (en) * 2020-10-29 2022-04-01 桂林电子科技大学 RIS-assisted NOMA (unified messaging architecture) method for enabling VLC (visible light communication)/RF (radio frequency) hybrid network secure transmission
CN113473566B (en) * 2021-06-24 2022-11-25 河南大学 Robust wireless energy-carrying relay cooperation safety communication method
CN114339731B (en) * 2021-11-18 2023-11-14 国网辽宁省电力有限公司 Space interruption probability analysis method, device and electronic equipment
CN117255386B (en) * 2023-10-17 2024-07-02 辽宁工业大学 Physical layer safety connection method of wireless relay network based on MF protocol
CN118381594B (en) * 2024-02-23 2025-09-19 西北工业大学 High-spectral-efficiency safe transmission implementation method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533166B1 (en) * 2010-08-20 2013-09-10 Brevity Ventures LLC Methods and systems for encoding/decoding files and transmission thereof
CN103475441A (en) * 2013-07-26 2013-12-25 北京邮电大学 Cooperative interference transmission method based on clusters in wireless multi-hop network
CN104301098A (en) * 2014-09-01 2015-01-21 北京航空航天大学 An Opportunistic Quantum Network Coding Method
US9100405B2 (en) * 2007-10-17 2015-08-04 Dispersive Networks Inc. Apparatus, systems and methods utilizing dispersive networking
CN105007578A (en) * 2015-06-05 2015-10-28 西安交通大学 Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9100405B2 (en) * 2007-10-17 2015-08-04 Dispersive Networks Inc. Apparatus, systems and methods utilizing dispersive networking
US8533166B1 (en) * 2010-08-20 2013-09-10 Brevity Ventures LLC Methods and systems for encoding/decoding files and transmission thereof
CN103475441A (en) * 2013-07-26 2013-12-25 北京邮电大学 Cooperative interference transmission method based on clusters in wireless multi-hop network
CN104301098A (en) * 2014-09-01 2015-01-21 北京航空航天大学 An Opportunistic Quantum Network Coding Method
CN105007578A (en) * 2015-06-05 2015-10-28 西安交通大学 Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system

Also Published As

Publication number Publication date
CN106131823A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106131823B (en) Relay transmission method based on safety of physical layer in eavesdropping user random distribution scene
CN104469755B (en) To relaying the safe transmission method of physical layer maintained secrecy with interfering nodes selection result
CN109890031B (en) Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
CN103702322B (en) A kind of safe transmission method of physical layer resisting the eavesdropping of unreliable via node
Sun et al. Fountain-coding-based secure communications exploiting outage prediction and limited feedback
CN104320826A (en) Chance relay-selection method for cooperative communication network under tapping environment
CN102833736A (en) Communication key generation method and secure channel selection method for cognitive radio system
Chen et al. Joint relay and jammer selection for secure decode-and-forward two-way relay communications
CN104486754B (en) Cooperation communication system relay selection method based on safety of physical layer technology
CN107359929A (en) Based on the encryption method of eating dishes without rice or wine that constellation is overlapping in a kind of bidirectional relay system
Wang et al. The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception
KR102054715B1 (en) Physical layer security method and system for cooperative multihop routing in ad-hoc wireless network
CN105813081A (en) Method for selecting relay nodes capable of enhancing security performance of cognitive relay network
CN104093143B (en) A kind of adaptive cooperation method in safety of physical layer communication
Dermany et al. Effect of various topology control mechanisms on maximum information flow in wireless sensor networks
Sadig et al. Encryption-aided physical layer security via cooperative jamming: Beyond secrecy capacity with noisy ciphertext
CN105873166B (en) A Routing Method Based on Physical Layer Security in Multi-hop Wireless Networks
Shomorony et al. On the role of deterministic models in K× K× K wireless networks
Kim Modify-and-forward for securing cooperative relay communications
Liu et al. Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection
CN111246460A (en) A low-complexity and low-latency secure transmission method
Jameel et al. On physical layer security of two way energy harvesting relays
Rajalingham et al. Random linear network coding for converge-cast smart grid wireless networks
Tomasin Routing over multi-hop fading wiretap networks with secrecy outage probability constraint
He et al. Secrecy when the eavesdropper controls its channel states

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190823