Method of detecting active eavesdropping users in massive mimo system by random symbol method
A random symbol, large-scale technology, applied in the transmission system, radio transmission system, transmission monitoring and other directions, can solve the problems of detection performance dependence, large detection time overhead, detection difficulty, etc., to achieve improved detection performance and high flexibility Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] Embodiment 1. Method for detecting active eavesdropping users in massive MIMO system by random symbol method
[0090] 1. System model
[0091] This method is aimed at the massive MIMO system adopting the time division duplex communication mode, and assumes that the bidirectional communication channel between the user and the base station satisfies reciprocity.
[0092] 1. Massive MIMO system in time division duplex communication mode
[0093] Such as figure 1 As shown, before the communication starts, the legitimate user first sends a pilot symbol to the base station through the uplink channel. When the base station estimates the channel state information between the base station and the legal user, each base station antenna independently estimates the channel state information between the base station antenna and the legal user antenna by using the pilot symbols it receives. Based on the obtained channel state information, the base station recovers and demodulates ...
Embodiment 2
[0200] Embodiment 2. Performance Verification of the Method for Detecting Active Eavesdropping Users in Massive MIMO System Using Random Symbols According to the method described in Embodiment 1, the performance of the method for detecting active eavesdropping users based on random symbols is verified through computer simulation experiments. The performance verification experiment of this embodiment ( Figure 16-21 ), the random symbol set selects the 3PSK symbol set After verification, it can be seen that this set meets the selection criteria of the aforementioned random symbol set. The fusion method of the results of K detection experiments chooses the logical "OR" operation fusion method, that is, as long as there is an active eavesdropping user in the K detection experiment, it is finally determined that there is an active eavesdropping user in the system at this time.
[0201] 1. The detection performance results of the active eavesdropping user detection method using r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


