Two Robust Beamforming Methods for MISO Eavesdropping Channels Based on Outage Probability Constraints

A probabilistic and instantaneous channel technology, applied in the field of communication, can solve problems that do not consider beamforming design

Active Publication Date: 2021-01-19
XI AN JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, they only optimized the power distribution of useful signals and artificial noise, without considering the beamforming design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two Robust Beamforming Methods for MISO Eavesdropping Channels Based on Outage Probability Constraints
  • Two Robust Beamforming Methods for MISO Eavesdropping Channels Based on Outage Probability Constraints
  • Two Robust Beamforming Methods for MISO Eavesdropping Channels Based on Outage Probability Constraints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and embodiments. Apparently, the described embodiments are only a part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0115] Such as figure 1 The MISO eavesdropping channel model targeted by the present invention includes a transmitter Alice, a legal user Bob, and K eavesdropping users Eve1,...,Eve K. Transmitter ConfigurationN t The root antenna, the legitimate user and the eavesdropping user configure a single antenna. Assuming that the channel is flat Rayleigh fading, the signals received by the legitimate user and the kth eavesdropping user are expressed as

[0116]

[0117] in, is the sending ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses two robust beam forming methods for an MISO wiretap channel based on interruption probability constraints. Two robust beam forming schemes for the MISO wiretap channel are provided, a method of bisection, semidefinite relaxation and a Bernstein-type inequality are utilized to transform a nonconvex problem with the interruption probability constraints into a series of semidefinite programming problems in the absence of artificial noise assistance, so that the optimal robust beam forming design is obtained; the total transmitting power is divided into two parts of a useful signal and artificial noise in the presence of artificial noise assistance, through transforming the nonconvex problem with the interruption probability constraints into the semidefinite programming problems, the optimal design of robust beam forming of the useful signal and a covariance matrix of the artificial noise is obtained; the secrecy rate of a communication system is effectively improved, the wiretapping capability of a user is reduced and the security of the communication system is improved.

Description

technical field [0001] The invention belongs to the field of communication, relates to the technical field of physical layer security in wireless communication, and specifically relates to two MISO wiretapping channel robust beamforming methods based on interruption probability constraints. Background technique [0002] In recent years, the continuous development of wireless communication technology has enabled people to access communication networks anytime and anywhere. However, the broadcast nature of wireless communication means that all nodes within the transmission range can receive the signal sent by the source, and the information of legitimate users is easily obtained by eavesdropping users. Therefore, it is particularly important to ensure the secure transmission of wireless communication [1]. Compared with traditional encryption methods, physical layer security aims to use the physical layer characteristics of wireless communication, such as noise, fading, etc., ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/0413H04B7/0408H04B7/0456H04B7/06
CPCH04B7/0408H04B7/0413H04B7/046H04B7/0617
Inventor 徐静许思文孙黎任品毅
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products