Method for detecting active eavesdropping users in large-scale MIMO system by using random signal method
A random symbol and large-scale technology, which is applied in the field of wireless communication, physical layer security mechanism, and large-scale antenna system, can solve the problems of large detection time overhead, difficult detection, and limited performance, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] Embodiment 1. Method for detecting active eavesdropping users in massive MIMO system by random symbol method
[0090] 1. System model
[0091] This method is aimed at the massive MIMO system adopting the time division duplex communication mode, and assumes that the bidirectional communication channel between the user and the base station satisfies reciprocity.
[0092] 1. Massive MIMO system in time division duplex communication mode
[0093] Such as figure 1 As shown, before the communication starts, the legitimate user first sends a pilot symbol to the base station through the uplink channel. When the base station estimates the channel state information between the base station and the legal user, each base station antenna independently estimates the channel state information between the base station antenna and the legal user antenna by using the pilot symbols it receives. Based on the obtained channel state information, the base station recovers and demodulates ...
Embodiment 2
[0200] Embodiment 2. Performance Verification of the Method for Detecting Active Eavesdropping Users in Massive MIMO System Using Random Symbols According to the method described in Embodiment 1, the performance of the method for detecting active eavesdropping users based on random symbols is verified through computer simulation experiments. The performance verification experiment of this embodiment ( Figure 16-21 ), the random symbol set selects the 3PSK symbol set After verification, it can be seen that this set meets the selection criteria of the aforementioned random symbol set. The fusion method of the results of K detection experiments chooses the logical "OR" operation fusion method, that is, as long as there is an active eavesdropping user in the K detection experiment, it is finally determined that there is an active eavesdropping user in the system at this time.
[0201] 1. The detection performance results of the active eavesdropping user detection method using r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


