Anti-eavesdrop optimal secure transmission method based on collaboration interference

A technology of cooperative interference and safe transmission, applied in transmission monitoring, transmission system, interference to communication, etc., can solve problems such as unresolved power allocation optimization scheme, adverse effects of signal safe transmission, and difficulty in obtaining channel state information

Inactive Publication Date: 2018-10-26
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Numerous studies have demonstrated that non-zero secrecy capacity (i.e., the maximum transmission rate that ensures the eavesdropper cannot decode any information) can also be achieved when the average signal-to-noise ratio (SNR) of the legitimate receiver is poor for the eavesdropper, but only if the secrecy capacity is positive It is possible to achieve perfect confidential communication through the security code
[0003] Due to the eavesdropper's random access distance and terrain conditions, the eavesdropper may obtain better channel conditions than the legitimate receiver, but the channel state information (CSI) of the potential eavesdropper is difficult to obtain in real communication scenarios; therefore , it is a challenging task to achieve a stable positive secrecy rate all the time. To solve this problem, techniques such as artificial noise (AN) and cooperative jamming (CJ) have been proposed; The probability is less than a small threshold. When the secrecy capacity is greater than the secure channel capacity (the secure channel capacity refers to the value of the main channel capacity minus the eavesdropping channel capacity), a secrecy interruption occurs. The AN-assisted multi-antenna secure transmission strategy is introduced, and the eavesdropper receives The received noise is omitted, and only the worst-case solution is obtained. On this basis, the received noise of the eavesdropper and the artificially generated noise of the transmitter are considered to obtain the maximum secrecy capacity (also called secrecy rate, SRM ), the CJ technology can greatly improve the security performance by transmitting interference signals to disrupt the reception of eavesdroppers; however, there are channel estimation errors in the current legal channels and cooperative channels, which may be detrimental to the safe transmission of signals influences;
[0004] On this basis, the patent application No. 201610345036.2 provides a "power allocation method in cooperative network based on artificial noise under the condition of non-ideal channel estimation of main channel and cooperative channel". relationship, the transmission source and the cooperative jammer use the channel state information estimated by the non-ideal channel estimation method to design the transmission signal, and the safe transmission rate achieved by the system after passing through the channel with estimation error is used to calculate the safe transmission rate of the system; then calculate the transmission source by The optimal power allocation ratio optimized under ideal channel estimation conditions is the safe transmission rate of the system, and it is compared with the system security rate under ideal channel estimation conditions to verify the importance of considering channel estimation errors, and propose a more Reliable and more practical power allocation scheme; however, this patent is only applicable to special cases where the channel error is extremely small and approaches zero. It does not solve the power allocation optimization scheme of the actual channel when the channel error is large, and does not consider the channel error when it is random. Impact on safety performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-eavesdrop optimal secure transmission method based on collaboration interference
  • Anti-eavesdrop optimal secure transmission method based on collaboration interference
  • Anti-eavesdrop optimal secure transmission method based on collaboration interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0074] Such as figure 1 As shown, an anti-eavesdropping optimal secure transmission method based on cooperative interference includes the following steps:

[0075] S1. With the assistance of the cooperation jammer Oscar, the transmitter Alice sends a confidential message to the legitimate receiver Bob. At the same time, the transmitter Alice and the signal jammer Oscar generate jamming signals to interfere with the single-antenna eavesdropping Eve and establish cooperation Jamming communication model, cooperative jamming communication model such as figure 2 shown;

[0076] S2. According to the cooperative interference communication model, under the condition of satisfying the confidentiality interruption constraint, the optimal power all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-eavesdrop optimal secure transmission method based on collaboration interference, and the method comprises the following steps: S1, a transmitting source end Alice transmits a confidential message to a legal receiving end Bob with the help of a collaboration jammer Oscar, meanwhile, the transmitting source end Alice and a signal jammer Oscar generate interference signals, thus, interference on a single-antenna eavesdropping end Eve is realized, and a collaboration interference communication model is established; S2, according to the collaboration interference communication model, under a condition of satisfying confidentiality interruption constraint, optimal power distribution is realized, and a secure transmission scheme is determined. The invention provides the anti-eavesdrop optimal secure transmission method based on collaboration interference, in a collaboration interference communication process where channel estimation error exists, confidentiality capacity is maximized based on confidentiality interruption probability constraint, and optimization of secure transmission performance is realized.

Description

technical field [0001] The invention relates to the technical field of secure transmission of physical characteristics of wireless communication, in particular to an optimal secure transmission method for anti-eavesdropping based on cooperative interference in wireless secure communication. Background technique [0002] Due to the broadcast characteristics of wireless communication devices, confidentiality becomes the most basic issue in wireless communication. Numerous studies have demonstrated that non-zero secrecy capacity (i.e., the maximum transmission rate that ensures the eavesdropper cannot decode any information) can also be achieved when the average signal-to-noise ratio (SNR) of the legitimate receiver is poor for the eavesdropper, but only if the secrecy capacity is positive It is possible to realize perfect confidential communication through the security code. [0003] Due to the eavesdropper's random access distance and terrain conditions, the eavesdropper may...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04K1/02H04K1/04H04K3/00H04B17/391H04B17/336
CPCH04K1/02H04B17/336H04B17/391H04K1/04H04K3/43
Inventor 张腾月文红宋欢欢廖润发陈松林谢非佚
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products