A Robust Beamforming Design Method for Covert Communications in the Internet of Things
A covert communication and beamforming technology, applied in wireless communication, diversity/multi-antenna systems, space transmit diversity, etc., can solve problems such as eavesdropping channel restrictions, security threats, and raw data exposure of confidential information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In the present invention, the following notation is adopted: bold lowercase letters and uppercase letters represent vectors and matrices respectively. ||·||, Tr(·), Re(·) and Im(·) denote the expectation, Frobenius norm, trace, real part and imaginary part of the parameter, respectively. operator It means that A is positive semi-definite. Expressed as a mean of μ and a variance of σ 2 The complex-valued circularly symmetric Gaussian distribution for .
[0021] Scenarios considered by the present invention are as figure 1 As shown, where Alice (base station) sends the private data stream x b Send to Bob (hidden user). The present invention proposes a robust beamforming design method for covert communication of the Internet of Things, including the following steps:
[0022] Step 1, establishing a covert communication environment;
[0023] Step 2, in the case of imperfect WCSI (Willie's channel state information), carry out covert beamforming design.
[0024] St...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


