Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Codebook design method for resisting passive eavesdropping in MISO system based on weighting Voronoi graph

A design method and codebook technology, applied in transmission systems, radio transmission systems, diversity/multi-antenna systems, etc., can solve the problems of inaccurate beamforming at the transmitting end, leakage of user information, and impact on system security rate.

Active Publication Date: 2016-11-16
XI AN JIAOTONG UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of information brings challenges to the design of the transmitter, especially the imprecise beamforming of the transmitter, which in turn leads to the leakage of more user information
When there are eavesdroppers around, this kind of information can be obtained by eavesdroppers, which will seriously affect the security rate of the system
Generally speaking, whether the quantized information is accurate or not depends on the design method of the codebook. The traditional codebook only considers the single-user channel model, resulting in inevitable user information leakage. Therefore, it is necessary to consider the two-user channel model, namely the wiretapping channel and legal channels, and reasonably design the codeword vectors in the codebook to reduce the legal receiver information leakage caused when the transmitter uses codewords for beamforming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Codebook design method for resisting passive eavesdropping in MISO system based on weighting Voronoi graph
  • Codebook design method for resisting passive eavesdropping in MISO system based on weighting Voronoi graph
  • Codebook design method for resisting passive eavesdropping in MISO system based on weighting Voronoi graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0059] The structural representation of the system model of the present invention is as figure 1 As shown, the present invention is based on a legitimate transceiver pair and an eavesdropper, the transmitter has N t root antenna, both the legitimate receiver and the eavesdropper have a single antenna, and the receiving signal models of the legitimate receiver and the eavesdropper are:

[0060] y L = P Σ L G w s + n L , y E = P Σ E G w s + n E ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a codebook design method for resisting passive eavesdropping in an MISO system based on a weighting Voronoi graph. The method comprises the steps of 1, taking optimum beam forming on theoretical significance and a corresponding traversal safety rate as references for measuring a safety performance loss; 2, calculating the traversal safety rate after adoption of quantified beam forming, and through combination of the traversal safety rate, obtaining a traversal safety rate loss; 3, defining and calculating a traversal nonzero safety rate loss according to the traversal safety rate loss, and carrying out optimization to obtain an upper bound and a corresponding codebook design standard; 4, establishing the weighting Voronoi graph in complex field Grassmann flow pattern space according to the codebook design standard; 5, with a purpose of minimizing the traversal nonzero safety rate loss, establishing an iterative algorithm VQ-WVD through adoption of an iterative offline training mode, and realizing the weighting Voronoi graph in the complex field Grassmann flow pattern space, generating code words, and obtaining a codebook based on the VQ-WVD.

Description

technical field [0001] The invention belongs to the field of wireless communication, and in particular relates to the research on the codebook design mechanism in the limited feedback MISO system oriented to physical layer security, in particular to the codebook design method based on the weighted Voronoi graph against passive eavesdropping in the MISO system. Background technique [0002] With the rapid development of wireless communication technology, security risks are gradually threatening and restricting the application and development of wireless communication technology. The broadcast characteristics of wireless channels can make harmful signal sources eavesdrop on the confidential and private information of other nodes or harm and interfere with the communication links of other normal nodes. At present, the upper-layer password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, but with the devel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B7/04H04B7/06
CPCH04B7/0478H04B7/0482H04B7/0617
Inventor 任品毅徐东阳杜清河孙黎王熠晨
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products