Codebook design method based on weighted voronoi graph against passive eavesdropping in MISO system
A codebook and passive technology, applied in transmission systems, radio transmission systems, diversity/multi-antenna systems, etc., can solve problems such as inaccurate beamforming at the transmitter, affecting system security rate, and leaking user information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.
[0059] The structural representation of the system model of the present invention is as figure 1 As shown, the present invention is based on a legitimate transceiver pair and an eavesdropper, the transmitter has N t root antenna, both the legitimate receiver and the eavesdropper have a single antenna, and the receiving signal models of the legitimate receiver and the eavesdropper are:
[0060]
[0061] in, and are the channels from the transmitter to the legitimate receiver and the eavesdropper respectively, and the elements of the channel all obey the circular symmetric complex Gaussian distribution with mean 0 and variance 1; Σ L =[1 0],Σ E =[0 1]; s is legal receiver information, obeying the circular symmetric complex Gaussian distribution with mean value 0 and variance 1; n L ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


