Multi-cell network secure transmission method based on artificial noise

A technology of artificial noise and network security, applied in security devices, transmission systems, radio transmission systems, etc., can solve problems such as inability to adapt to dynamic changes in wireless networks, limit algorithm applications, etc., achieve a wide range of application scenarios, enhance security performance, and improve reliability sexual effect

Pending Publication Date: 2022-04-05
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme needs to assume the reciprocity of the wireless network, which limits the practical application of the algorithm
There is a scheme based on interference alignment using artificial noise for secure transmission in wireless networks, but this scheme fixes the power allocation between confidential signals and AN signals, and cannot adapt to the dynamic changes of wireless networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-cell network secure transmission method based on artificial noise
  • Multi-cell network secure transmission method based on artificial noise
  • Multi-cell network secure transmission method based on artificial noise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0061] A preferred embodiment of the present invention is as follows:

[0062] Such as figure 1 As shown, it is assumed that there is a base station BS in the cell 1 、BS 2 and BS 3 To 3 legitimate users R in the cell 1 , R 2 and R 3 Send information, user k, k∈{1,2,3} represent user R respectively 1 , R 2 and R 3 ; Among them, the base station BS 3 to user R 3 Send a secure message, the passive eavesdropping node eavesdrops on the message, BS 3 to R 3 While transmitting security messages, artificial noise AN is also transmitted to interfere with eavesdropping nodes; the base stations BS of the other two cells 1 with BS 2 Only useful signals are transmitted and no additional interference is introduced to legal transmissions in the network. Assume that the number of transmitting antennas equipped with three base stations is M 1 , M 2 , M 3 , the number of receiving antennas equipped by three legitimate users is N 1 ,N 2 ,N 3 , while the eavesdropping node has...

specific Embodiment approach

[0069] A specific implementation manner of processing received information using an interference alignment algorithm that minimizes AN alternately is as follows:

[0070] Initialize the transmit beamforming vector v j and artificial noise precoding matrix w 3 , j=1,2,3, set the number of iterations;

[0071] Calculate the receiving interference matrix Q according to the beamforming vector at the transmitting end and the artificial noise precoding matrix k and a set of orthonormal bases C of the received interference subspace k ,satisfy

[0072]

[0073] C k =x l [Q k ],l=1,...,N k -1 and k=1,2,3

[0074] Among them, Q k Represents the receiving interference matrix, H kj Indicates the channel matrix from base station j to user k, H k3 Indicates base station BS 3 channel matrix to user k, v j Denotes the transmit beamforming vector of base station j, w 3 Represents the artificial noise precoding matrix, C k represents an orthonormal basis, x l [Q k ] repres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication, and particularly relates to a multi-cell network secure transmission method based on artificial noise. The method comprises the following steps: a base station sends information to a user side, wherein the information comprises AN information and a security message; the user side processes the received information by adopting an AN alternating minimization interference alignment algorithm to obtain a beam forming vector and a receiving vector of the signal; obtaining a recovery signal according to the output receiving vector and the beam forming vector; according to the interference alignment algorithm disclosed by the invention, the channel quality of the eavesdropping node is reduced by utilizing artificial noise, and extra interference is not introduced to legal transmission of the multi-cell wireless network; the interference matrix and the subspace are alternately iterated at the receiving end, the interference is projected into a low-dimension signal space, and the remaining non-interference signal space is used for transmitting useful signals, so that interference alignment is realized, the safety performance of the system is further enhanced, the safety performance of the system is improved, and the method has a wider application scene.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a multi-cell network security transmission method based on artificial noise. Background technique [0002] Due to the broadcast and open nature of wireless communication, the security of information transmission in wireless networks is a challenging topic, so physical layer security is becoming more and more important. The eavesdropping model and the definition of security capacity have laid the foundation for the future research work on physical layer security. If the reliability of the main channel is higher than that of the eavesdropping channel, the legitimate user can achieve correct decoding, but the eavesdropping node cannot perform correct decoding. [0003] In a multi-cell wireless network, interference will seriously affect the transmission rate of users and reduce the security performance of the system. Different from this traditional view,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/121H04W28/02H04W28/22H04B7/0456H04B7/06H04B7/08
CPCY02D30/70
Inventor 胡林彭俊祥文红谭帅范家兵
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products