[go: up one dir, main page]

CN107071886B - An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI - Google Patents

An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI Download PDF

Info

Publication number
CN107071886B
CN107071886B CN201610893300.6A CN201610893300A CN107071886B CN 107071886 B CN107071886 B CN 107071886B CN 201610893300 A CN201610893300 A CN 201610893300A CN 107071886 B CN107071886 B CN 107071886B
Authority
CN
China
Prior art keywords
node
bob
power allocation
relay node
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610893300.6A
Other languages
Chinese (zh)
Other versions
CN107071886A (en
Inventor
姚如贵
徐菲
高岩
徐娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN201610893300.6A priority Critical patent/CN107071886B/en
Publication of CN107071886A publication Critical patent/CN107071886A/en
Application granted granted Critical
Publication of CN107071886B publication Critical patent/CN107071886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/04Transmission power control [TPC]
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/241TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account channel quality metrics, e.g. SIR, SNR, CIR or Eb/lo
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/04Transmission power control [TPC]
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/26TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service]
    • H04W52/267TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service] taking into account the information rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/04Transmission power control [TPC]
    • H04W52/30Transmission power control [TPC] using constraints in the total amount of available transmission power
    • H04W52/34TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading
    • H04W52/346TPC management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading distributing total power among users or channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/04Transmission power control [TPC]
    • H04W52/38TPC being performed in particular situations
    • H04W52/46TPC being performed in particular situations in multi-hop networks, e.g. wireless relay networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种有界CSI下不可信中继网络的最优功率分配方法,首先描述两跳半双工中继网络的通信方案,给出最优功率分配方案,然后得到安全速率的下界,最后分析信道ESR,获取可达的安全速率。本发明给出了传输过程中的最优化功率分配公式来最大化安全速率,进一步分析了在高SNR下的ESR,用来评估可达的平均安全速率。近似的最优化功率分配可以带来比等功率分配更高的安全速率。

The present invention provides an optimal power allocation method for an untrusted relay network under bounded CSI, firstly describing the communication scheme of the two-hop half-duplex relay network, giving the optimal power allocation scheme, and then obtaining the lower bound of the security rate , and finally analyze the channel ESR to obtain the attainable safe rate. The present invention provides the optimal power allocation formula in the transmission process to maximize the safe rate, and further analyzes the ESR under high SNR to evaluate the attainable average safe rate. Approximate optimal power allocation can lead to higher security rates than equal power allocation.

Description

一种有界CSI下不可信中继网络的最优功率分配方法An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI

技术领域technical field

本发明涉及一种在信道估计误差有界条件下的不可信中继网络的最优功率分配方案。The invention relates to an optimal power allocation scheme of an untrustworthy relay network under the condition that the channel estimation error is bounded.

背景技术Background technique

多跳中继被认定为一种能效传输方案,是解决无线通信安全的最优途径。物理层安全传输的方法具有低计算复杂度和节省资源的优势。近几年来,合作多样性技术由于可以提高物理层防窃听的安全性而吸引了很多学者的注意。Multi-hop relay is identified as an energy-efficient transmission scheme, which is the optimal way to solve wireless communication security. The method of physical layer secure transmission has the advantages of low computational complexity and resource saving. In recent years, cooperative diversity technology has attracted the attention of many scholars because it can improve the security of the physical layer against eavesdropping.

在物理层中,用户和干扰源之间存在功率分配的博弈问题。干扰源希望传输具有足够功率的干扰信号来避免窃听者偷听用户的发射信息,而用户也希望传输的信号具有充足的功率保证信号传输的速率。在总功率一定的条件下,如何找到最优的功率分配方案,使安全速率最大化,许多学者已经做出了相应的研究。In the physical layer, there is a game problem of power allocation between users and interference sources. The interference source hopes to transmit an interference signal with sufficient power to prevent eavesdroppers from eavesdropping on the user's transmission information, and the user also hopes that the transmitted signal has sufficient power to ensure the rate of signal transmission. Under the condition of a certain total power, how to find the optimal power allocation scheme to maximize the security rate, many scholars have made corresponding research.

文献1“Xiang He,Aylin Yener.Cooperation with an untrusted relay:Asecrecy perspective[J].IEEE Trans.Inf.Theory,2010,56(8):3807-3827”提出中继节点是不可信的,它可能会窃听、干扰转发的信息,但是,相比于与不使用该类中继节点,利用不可信的中继节点进行协作通信可以提高系统的安全容量。Document 1 "Xiang He, Aylin Yener. Cooperation with an untrusted relay: Asecrecy perspective [J]. IEEE Trans. Inf. Theory, 2010, 56(8): 3807-3827" proposes that the relay node is untrusted, it may It will eavesdrop and interfere with the forwarded information. However, compared with not using such relay nodes, using untrusted relay nodes for cooperative communication can improve the security capacity of the system.

文献2“Li Sun,Taiyi Zhang,Yubo Li and Hao Niu.Performance study oftwo-hop amplify-and-forward systems with untrustworthy relay nodes[J].IEEETrans.Veh.Technol.,2012,61(8):3801-3807”通过基于目的地的干扰技术(Destination-based Jamming,DBJ),获得单个不可信中继的遍历安全容量(Ergodic Secrecy Capacity,ESC)的下界,并将之扩展到多个不可信中继场景,提出一种安全中继选择方案,该方案可最大化可达的系统安全容量,实现不可信放大转发(Amplify Forwaed,AF)中继系统的安全通信,但并没有考虑最优化功率分配,而且文献2是基于完美信道状态信息(Channel StateInformation,CSI)条件下进行研究的,而实际的通信环境并不能获得完美的CSI。Document 2 "Li Sun, Taiyi Zhang, Yubo Li and Hao Niu. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes[J]. IEEETrans.Veh.Technol.,2012,61(8):3801- 3807" Obtain the lower bound of Ergodic Secrecy Capacity (ESC) of a single untrusted relay through Destination-based Jamming (DBJ), and extend it to multiple untrusted relay scenarios , a secure relay selection scheme is proposed, which can maximize the reachable system security capacity and realize the secure communication of untrustworthy Amplify Forwaed (AF) relay system, but it does not consider the optimal power allocation, and Document 2 is based on the perfect channel state information (Channel State Information, CSI) condition, but the actual communication environment cannot obtain perfect CSI.

文献3“Lifeng Wang,Maged Elkashlan,Jing Huang,Nghi H.Tan,et al.Securetransmission with optimal power allocation in untrusted relaynetworks[J].IEEECommun.Lett.,2014,3(3):289-292”将文献2的研究扩展两跳放大转发中继网络,并测试大规模天线阵列的影响。当大规模天线阵列在源节点时,ESC仅取决于中继和目的节点间的信道状态信息;当大规模天线阵列在目的节点时,ESC仅取决于中继和源节点间的信道状态信息。不过,文献3仅仅考虑了最大化安全容量,并没有考虑能量效率,同样所做的研究也是在假设状态信息是完美的条件下进行的。Literature 3 "Lifeng Wang, Maged Elkashlan, Jing Huang, Nghi H.Tan, et al.Securetransmission with optimal power allocation in untrusted relaynetworks[J].IEEECommun.Lett.,2014,3(3):289-292" The study of 2 extends the two-hop amplify-and-forward relay network and tests the impact of large-scale antenna arrays. When the large-scale antenna array is at the source node, ESC only depends on the channel state information between the relay and the destination node; when the large-scale antenna array is at the destination node, ESC only depends on the channel state information between the relay and the source node. However, Document 3 only considers the maximization of the safety capacity, and does not consider the energy efficiency. The same research is carried out under the assumption that the state information is perfect.

上述文献均在完美CSI假设下开展研究,但在真实的通信环境中,完美的CSI基本是不可能实现的。本发明考虑实际的通信模型,在信道估计误差有界条件下,对合作干扰中继通信方案进行研究。在信道估计误差的统计信息可以获得的情况下,提取出最大化安全速率Rs的最优化功率分配因子,并进一步分析安全速率的下界和信道可实现的遍历安全速率(Ergodic Secrecy Rate,ESR)以获取使这两者最大化的最优功率分配因子。The above literatures are all researched under the assumption of perfect CSI, but in a real communication environment, perfect CSI is basically impossible to achieve. The invention considers the actual communication model, and studies the cooperative interference relay communication scheme under the condition that the channel estimation error is bounded. In the case that the statistical information of the channel estimation error is available, the optimal power allocation factor that maximizes the security rate R s is extracted, and the lower bound of the security rate and the achievable ergodic security rate (Ergodic Secrecy Rate, ESR) of the channel are further analyzed to obtain the optimal power allocation factor that maximizes both.

发明内容Contents of the invention

为了克服现有技术的不足,本发明在文献3的基础上提出一种在有界信道估计误差下的改进的最优功率分配方案,考虑中继节点不可信和在总功率受限的条件,在信道估计误差的统计信息可以获得的情况下,提取出最优化功率分配因子αopt,并进一步分析安全速率下界和信道可实现的遍历安全速率(Ergodic Secrecy Rate,ESR)。In order to overcome the deficiencies of the prior art, the present invention proposes an improved optimal power allocation scheme under bounded channel estimation error on the basis of Document 3, considering the condition that the relay node is untrustworthy and the total power is limited, in When the statistical information of the channel estimation error is available, the optimal power allocation factor α opt is extracted, and the lower bound of the security rate and the achievable ergodic security rate (Ergodic Secrecy Rate, ESR) of the channel are further analyzed.

本发明解决其技术问题所采用的技术方案包括以下步骤:The technical solution adopted by the present invention to solve its technical problems comprises the following steps:

步骤一,在一个两跳半双工中继网络中,在第一个时隙,源节点Alice向不可信的中继节点R传输信息xA,同时目的节点Bob向不可信的中继节点R传输信息xB,中继节点R接收到的信号其中,PA和PB分别表示节点Alice和Bob的发射功率,hA-R和hB-R分别为节点Alice和Bob到中继节点R的复信道增益,hB-R=hR-BnR表示中继节点R处的加性高斯白噪声;节点Alice和Bob发送的总功率为P,α∈[0,1]表示功率分配因子,则节点Alice发送的加密信息功率PA=αP,节点Bob发送的加密信息功率PB=(1-α)P,中继节点R处接收的瞬时信干噪比其中,节点Alice和Bob等效信噪比的比值μ=γA-RB-R,节点Alice和Bob到中继节点R的等效信噪比分别表示为γA-R=||hA-R||2P/N0和γB-R=||hB-R||2P/N0,N0=1;Step 1. In a two-hop half-duplex relay network, in the first time slot, the source node Alice transmits information x A to the untrusted relay node R, and at the same time, the destination node Bob sends information x A to the untrusted relay node R Transmit message x B , signal received by relay node R Among them, PA and P B represent the transmit power of nodes Alice and Bob respectively, h AR and h BR are the complex channel gains from nodes Alice and Bob to relay node R respectively, h BR =h RB , n R represents the additive white Gaussian noise at the relay node R; the total power sent by nodes Alice and Bob is P, α∈[0,1] represents the power allocation factor, then the power of encrypted information sent by node Alice P A = αP , the encrypted information power P B sent by node Bob = (1-α)P, the instantaneous signal-to-interference-noise ratio received at relay node R Among them, the ratio of the equivalent signal-to-noise ratio of nodes Alice and Bob μ=γ ARBR , and the equivalent signal-to-noise ratios from nodes Alice and Bob to the relay node R are respectively expressed as γ AR =||h AR || 2 P /N 0 and γ BR =||h BR || 2 P/N 0 , N 0 =1;

步骤二,在第二个时隙,中继节点R将接收到的信号放大后发给目的节点Bob,放大因子为β;从中继节点R发送给节点Bob的信号Step 2, in the second time slot, the relay node R amplifies the received signal and sends it to the destination node Bob, the amplification factor is β; the signal sent from the relay node R to the node Bob

考虑两个时隙均以相同功率P传输信号,将yR归一化为||yR||2=P,得到放大因子 Considering that both time slots transmit signals with the same power P, normalize y R to ||y R || 2 =P to obtain the amplification factor

节点Bob接收到从不信任的中继节点R发出的信号Node Bob receives a signal from an untrusted relay node R

其中,nB是节点Bob接收到的加性高斯白噪声,是不信任中继节点R与节点Bob之间估计的信道增益,he是信道估计误差,hB-R和he满足E[he]=0;Among them, n B is the additive Gaussian white noise received by node Bob, is the estimated channel gain between untrusted relay node R and node Bob, he is the channel estimation error, h BR and he satisfy E[h e ]=0;

假设信道估计误差服从[0,δ]上的均匀分布,通过自干扰消除后,节点Bob接收到的信号 Assuming that the channel estimation error obeys the uniform distribution on [0, δ], after self-interference cancellation, the signal received by node Bob

因此,对于给定的信道增益hA-R和hB-R,在节点Bob得到等价的SINR为Therefore, for given channel gains h AR and h BR , the equivalent SINR obtained at node Bob is

当γB-R≥20dB时,节点Bob的等效SINR近似为 When γ BR ≥ 20dB, the equivalent SINR of node Bob is approximately

步骤三,定义瞬时的安全速率其中,[t]+=max[t,0];首先对做关于α的求导,得到使安全速率Rs(α)最大的最优功率分配因子;Step 3, define the instantaneous safe rate Among them, [t] + = max[t, 0]; first to Do the derivation about α to get the optimal power allocation factor that maximizes the safe rate R s (α);

步骤四,定义安全速率下界Step 4, define the lower bound of the safe rate

其中,Δ1=αμ-α+2;Among them, Δ 1 =αμ-α+2;

分别将精确的功率分配因子和高SNR下的近似功率分配因子代入中,得到精确的最大安全速率下界和高SNR下的近似最大安全速率下界;Substitute the exact power allocation factor and the approximate power allocation factor under high SNR into In , the accurate maximum safe rate lower bound and the approximate maximum safe rate lower bound under high SNR are obtained;

步骤五,定义ESR为在||he||2所有的实现上的可达最大安全速率的数学期望,即关于α求导,得到得Step five, define ESR as the mathematical expectation of the maximum safe rate attainable on all realizations of ||h e || 2 , namely right Regarding the derivative of α, we get .

在γB-R≥20dB条件下,将近似表示为Under the condition of γ BR ≥ 20dB, the Approximately expressed as

在0≤γA-R≤2γB-R的条件下,得到使最大的近似最优功率分配因子为Under the condition of 0≤γ AR ≤2γ BR , we get The largest approximate optimal power allocation factor is

本发明的有益效果是:在信道估计误差有界的条件下,为了降低复杂度,给出了传输过程中的近似最优化功率分配(OPA)公式来最大化安全速率。并进一步分析了安全速率下界和在高SNR下的ESR,用来评估可达的平均安全速率,仿真结果证实了所提方案的有效性。The beneficial effect of the present invention is: under the condition that the channel estimation error is bounded, in order to reduce the complexity, an approximate optimal power allocation (OPA) formula in the transmission process is given to maximize the safe rate. The lower bound of the security rate and the ESR at high SNR are further analyzed to evaluate the attainable average security rate. The simulation results confirm the effectiveness of the proposed scheme.

附图说明Description of drawings

图1是两跳中继网络合作干扰和安全传输示意图;Figure 1 is a schematic diagram of cooperative interference and secure transmission in a two-hop relay network;

图2是在μ=1时,不同α和γB-R下的ESR分布示意图;Figure 2 is a schematic diagram of the ESR distribution under different α and γ BRs when μ=1;

图3是最优功率分配因子下的遍历安全速率、安全速率的上界和下界随γB-R的变化趋势图。Fig. 3 is the change trend diagram of the ergodic security rate, the upper bound and the lower bound of the safe rate with γ BR under the optimal power allocation factor.

具体实施方式Detailed ways

下面结合附图和实施例对本发明进一步说明,本发明包括但不仅限于下述实施例。The present invention will be further described below in conjunction with the accompanying drawings and embodiments, and the present invention includes but not limited to the following embodiments.

本发明所使用的系统模型是具有三个节点的中继网络,其原理如图1所示。该模型由源节点(Alice)、不可信的放大转发中继节点(R)和目的节点(Bob))组成,每个节点使用单天线配置,一个传输过程需要2个时隙完成。假设Alice与Bob之间由于阴影衰落或者距离太远而不存在直接的通信链路,只能通过一个不可信的中继节点R进行通信。在第一个时隙,Alice向不可信中继节点R传输信息xA,同时Bob向不可信中继节点R传输信息xB。在第二个时隙,中继节点R将接收到的信号经过放大器放大后重新发给Bob,其中放大因子为β。进一步,假设所有无线信道是时变的瑞利衰落信道,每个节点接收到的噪声是均值为0,功率谱密度为N0的加性高斯白噪声(AWGN)。The system model used in the present invention is a relay network with three nodes, the principle of which is shown in FIG. 1 . The model consists of a source node (Alice), an untrusted amplify-and-forward relay node (R) and a destination node (Bob). Each node uses a single-antenna configuration, and a transmission process requires 2 time slots to complete. Assuming that there is no direct communication link between Alice and Bob due to shadow fading or too far away, they can only communicate through an untrusted relay node R. In the first time slot, Alice transmits information x A to untrusted relay node R, while Bob transmits information x B to untrusted relay node R. In the second time slot, the relay node R re-sends the received signal to Bob after being amplified by an amplifier, where the amplification factor is β. Further, assuming that all wireless channels are time-varying Rayleigh fading channels, the noise received by each node is additive white Gaussian noise (AWGN) with a mean value of 0 and a power spectral density of N 0 .

本发明首先描述两跳半双工中继网络的通信方案,给出最优功率分配方案,然后得到安全速率的下界,最后分析信道ESR,获取可达的安全速率。The invention firstly describes the communication scheme of the two-hop half-duplex relay network, provides the optimal power distribution scheme, then obtains the lower bound of the safe rate, and finally analyzes the channel ESR to obtain the attainable safe rate.

由图1可以看出,半双工中继网络的通信过程需要两个时隙完成,在第一个时隙,中继节点R接收到的信号可以表示为It can be seen from Figure 1 that the communication process of the half-duplex relay network needs two time slots to complete. In the first time slot, the signal received by the relay node R can be expressed as

其中,PA和PB分别表示节点Alice和Bob的发射功率,hA-R和hB-R分别为Alice和Bob到中继节点R的复信道增益,假定其是均值为0,方差为σ2的复高斯变量。信道满足互易定理,即,hB-R=hR-B,且nR表示中继R处的加性高斯白噪声。假设节点Alice和Bob发送的总功率为P,α∈[0,1]表示功率分配因子,则Alice发送的加密信息功率为PA=αP,Bob发送的功率为PB=(1-α)P。因此,中继节点R处接收的瞬时信干噪比(SINR)γR可以表示为:Among them, PA and P B represent the transmit power of nodes Alice and Bob respectively, h AR and h BR represent the complex channel gain from Alice and Bob to relay node R respectively, assuming that it is a complex channel with mean value 0 and variance σ 2 Gaussian variable. The channel satisfies the reciprocity theorem, that is, h BR =h RB , and n R denotes additive white Gaussian noise at relay R. Assuming that the total power sent by nodes Alice and Bob is P, and α∈[0,1] represents the power allocation factor, then the power of encrypted information sent by Alice is P A = αP, and the power sent by Bob is P B = (1-α) p. Therefore, the instantaneous signal-to-interference-noise ratio (SINR) γ R received at the relay node R can be expressed as:

其中,||hB-R||2(1-α)P表示Alice传输过程中R处接收到Bob发送的干扰信号,节点Alice和Bob到中继节点R的等效信噪比(SNR)可以分别表示为:γA-R=||hA-R||2P/N0,γB-R=||hB-R||2P/N0,μ定义为节点Alice和Bob等效信噪比的比值,即:μ=γA-RB-R。不失一般性,我们假定N0=1,SNR可以通过发射功率进行调整。基于以上的定义,则公式(2)所示的中继节点R处接收的SINR可以简化为:Among them, ||h BR || 2 (1-α)P indicates that the interference signal sent by Bob is received at R during Alice’s transmission, and the equivalent signal-to-noise ratio (SNR) from node Alice and Bob to relay node R can be respectively Expressed as: γ AR =||h AR || 2 P/N 0 , γ BR =||h BR || 2 P/N 0 , μ is defined as the ratio of the equivalent signal-to-noise ratio between nodes Alice and Bob, namely: μ = γ ARBR . Without loss of generality, we assume that N 0 =1, and the SNR can be adjusted by transmitting power. Based on the above definition, the SINR received at the relay node R shown in formula (2) can be simplified as:

在第二个时隙中继节点R将接收到的信号放大β倍后重新发给Bob,从中继节点R发送给节点Bob的信号可表示为In the second time slot, the relay node R amplifies the received signal by β times and resends it to Bob. The signal sent from the relay node R to node Bob can be expressed as

将yR归一化为||yR||2=P,得到放大因子βNormalize y R to ||y R || 2 = P to get the amplification factor β

节点Bob接收到从不信任的中继节点R发出的信号为:Node Bob receives the signal from the untrusted relay node R as:

其中,nB是节点Bob接收到的加性高斯白噪声。由于xB是Bob在上一时隙发送的干扰信号,在节点Bob有完美CSI的条件下,公式(6)中的自干扰项 可以得到精确估计。这里我们考虑一个更实际的应用场景,对节点Bob来说,信道的状态信息(CSI)是不完美的,但关于信道估计错误的统计信息是可以得到的。本发明中,考虑不完美的信道状态信息是已知的,则Among them, n B is the additive white Gaussian noise received by node Bob. Since x B is the interference signal sent by Bob in the previous slot, under the condition that node Bob has perfect CSI, the self-interference term in formula (6) accurate estimates can be obtained. Here we consider a more practical application scenario. For node Bob, the channel state information (CSI) is not perfect, but statistical information about channel estimation errors is available. In the present invention, considering the imperfect channel state information is known, then

其中,是不可信中继节点R与节点Bob之间估计的信道增益,he是信道估计误差,hB-R和he满足E[he]=0。in, is the estimated channel gain between untrusted relay node R and node Bob, he is the channel estimation error, h BR and he satisfy E[h e ]=0.

本发明中假设信道估计误差服从[0,δ]上的均匀分布,则In the present invention, it is assumed that the channel estimation error obeys the uniform distribution on [0, δ], then

||he||2=ε∶ε~unif(0,δ) (8)||h e || 2 =ε:ε~unif(0,δ) (8)

通过自干扰消除后,节点Bob接收到的信号为After self-interference cancellation, the signal received by node Bob is

对于给定的信道增益hA-R和hB-R,在节点Bob处可以得到等效的SINR为For given channel gains h AR and h BR , the equivalent SINR at node Bob can be obtained as

当γB-R≥20dB时,节点B处的等效SINR可近似为When γ BR ≥ 20dB, the equivalent SINR at Node B can be approximated as

基于以上分析,接下来寻求最优化功率分配因子。Based on the above analysis, the next step is to seek to optimize the power allocation factor.

首先基于公式(3)和公式(11),定义瞬时的安全速率First, based on formula (3) and formula (11), define the instantaneous safety rate

其中,前面的因子是因为一个传输是需要2个时隙来完成,[t]+=max[t,0]。Among them, the previous factors It is because a transmission needs 2 time slots to complete, [t] + =max[t, 0].

本发明的目的是,在不完美CSI下,通过优化节点Alice和Bob的功率分配,使安全速率最大化。基于公式(12),最大化功率分配问题以数学形式表示为The purpose of the present invention is to maximize the safe rate by optimizing the power allocation of nodes Alice and Bob under imperfect CSI. Based on formula (12), the problem of maximizing power allocation is expressed mathematically as

s.t.:α∈[0,1]) (13)s.t.: α ∈ [0, 1]) (13)

其中,是单调递增的,由于所以ζ(α)的最大值是存在的。in, is monotonically increasing, since So the maximum value of ζ(α) exists.

一般情况下,为了得到最大值,找到最优化功率分配因子αopt,本发明通过对ζ(α)做关于α的求导操作,并将其等于0。可以得到Generally, in order to obtain the maximum value and find the optimal power allocation factor α opt , the present invention performs a derivation operation on ζ(α) with respect to α, and makes it equal to 0. can get

其中ΔL=γB-RΔ12(1-α)+1,Δ1=αμ-α+2。Where Δ LBR Δ 12 (1−α)+1, Δ 1 =αμ−α+2.

求解公式(14),可得到最优化的功率分配因子αoptSolving formula (14), the optimal power allocation factor α opt can be obtained:

其中,in,

在干扰信号γB-R≥20dB的情况下,公式(15)的最优化功率分配因子αopt可以近似为In the case of interference signal γ BR ≥ 20dB, the optimal power allocation factor α opt of formula (15) can be approximated as

由公式(16)可以看出,在干扰信号γB-R≥20dB时,最优功率分配因子αopt仅由μ决定,即信道估计误差对最优功率分配因子αopt没有影响。It can be seen from formula (16) that when the interference signal γ BR ≥ 20dB, the optimal power allocation factor α opt is only determined by μ, that is, the channel estimation error has no influence on the optimal power allocation factor α opt .

由公式(10)可知,γB(α)随着||he||2单调递减,因此,在||he||2=ε=δ时,可将安全速率下界定义为It can be known from formula (10) that γ B (α) decreases monotonously with ||h e || 2 , therefore, when ||h e || 2 =ε=δ, the lower bound of the safe rate can be defined as

当α=αopt时,将公式(15)带入到(17)中,并令ε=δ,可最大化安全速率下界。特殊地,当γB-R≥20dB时,将公式(16)带入到(17)中,可得近似安全速率下界为When α=α opt , the formula (15) is brought into (17), and ε=δ, the lower bound of the safe rate can be maximized. In particular, when γ BR ≥ 20dB, substituting formula (16) into (17), the lower bound of the approximate safe rate can be obtained as

其中,此外,当节点具有完美的CSI时,可得安全速率的上界,文献3对此进行了详细的说明。in, In addition, when the node has perfect CSI, the upper bound of the security rate can be obtained, which is described in detail in Document 3.

遍历安全速率(Ergodic Secrecy Rate,ESR)表征了平均可达到的最大安全速率。本发明中,ESR定义为在||he||2所有的实现上的可达最大安全速率的数学期望,即Ergodic Secrecy Rate (ESR) represents the average achievable maximum security rate. In the present invention, ESR is defined as the mathematical expectation of the maximum safe rate attainable on all realizations of ||h e || 2 , namely

将公式(3)、(11)和(12)带入到公式(19)中,可得Put formulas (3), (11) and (12) into formula (19), we can get

其中,f(ε)为||he||2的概率密度函数(Probability Density Function,PDF),将其定义为因此,可将公式(20)进一步表示为Among them, f(ε) is the probability density function (Probability Density Function, PDF) of ||h e || 2 , which is defined as Therefore, formula (20) can be further expressed as

其中,Δ1=αμ-α+2。通过对关于α求导,可得。但是,直接求解有难度,当γB-R≥20dB时,可将近似表示为Among them, Δ1=αμ-α+2. by right Regarding the derivative of α, we can get . However, directly solving Difficulty, when γ BR ≥ 20dB, the Approximately expressed as

在0≤γA-R≤2γB-R的条件下,通过求解公式(22),可得Under the condition of 0≤γ AR ≤2γ BR , by solving formula (22), we can get

图1是给出了本发明的系统模型和合作干扰中继网络的传输方式。系统由节点Alice和加点Bob,及其起到放大转发作用的不可信中继节点Alice组成。每个节点都配置的为单天线。FIG. 1 shows the system model of the present invention and the transmission mode of the cooperative interference relay network. The system consists of the node Alice, the point-added Bob, and the untrusted relay node Alice that plays the role of amplification and forwarding. Each node is configured with a single antenna.

图2是在μ=1时,不同α和γB-R下的ESR分布示意图。从图2可以看出,ESR随着α的增大先增大后减小,当γB-R=5dB时,令ESR最大的最优功率分配因子 当γB-R分别为20,25,30dB时,这三种情况下的最优功率分配因子几乎相等,为 Fig. 2 is a schematic diagram of ESR distribution under different α and γ BR when μ=1. It can be seen from Figure 2 that the ESR first increases and then decreases with the increase of α. When γ BR =5dB, the optimal power allocation factor that maximizes the ESR When γ BR is 20, 25, 30dB respectively, the optimal power allocation factors in these three cases are almost equal, as

图3是最优功率分配因子下的遍历安全速率、安全速率的上界和下界随γB-R的变化趋势图。图3中的下界是通过将αopt和δ=10-3代入公式(17)得到的,近似下界是将αopt和δ=10-3代入公式(17)得到。从图3中可以看出,当γB-R较大时,精确的下界和近似下界几乎一致。此外,上界是在精确CSI下的安全速率。通过将||he||2=0代入公式(15),可得这在文献3中被定义为完美CSI下的最优功率分配因子。将公式(23)代入公式(21),可以得到在不同γB-R下的平均可达最大安全速率。由图3可知,在低信噪比条件下,信道估计误差对ESR影响明显,但是当 γB-R≥20dB时,ESR和安全速率上界变化一致。由图3可得,在高信噪比条件下,近似功率分配因子对安全速率下界和平均可达安全速率都有效。而且,可达安全速率总是大于安全速率下界。在高信噪比条件下,信道估计误差的影响可忽略不计,因此,此时可达安全速率和安全速率上界几乎吻合。Fig. 3 is the change trend diagram of the ergodic security rate, the upper bound and the lower bound of the safe rate with γ BR under the optimal power allocation factor. The lower bound in Fig. 3 is obtained by substituting α opt and δ=10 −3 into formula (17), and the approximate lower bound is obtained by substituting α opt and δ=10 −3 into formula (17). It can be seen from Fig. 3 that when γ BR is large, the exact lower bound and the approximate lower bound are almost the same. Furthermore, the upper bound is the safe rate under exact CSI. By substituting ||h e || 2 =0 into formula (15), we can get This is defined in literature 3 as the optimal power allocation factor under perfect CSI. Substituting formula (23) into formula (21), the average achievable maximum safe rate under different γ BR can be obtained. It can be seen from Fig. 3 that under the condition of low signal-to-noise ratio, the channel estimation error has a significant impact on ESR, but when γ BR ≥ 20dB, the change of ESR and the upper bound of the safe rate are consistent. It can be seen from Fig. 3 that under the condition of high signal-to-noise ratio, the approximate power allocation factor is valid for both the lower bound of the safe rate and the average achievable safe rate. Moreover, the achievable safe rate is always greater than the lower bound of the safe rate. Under the condition of high signal-to-noise ratio, the influence of the channel estimation error is negligible, so at this time, the achievable safe rate and the upper bound of the safe rate are almost identical.

Claims (2)

1.一种有界CSI下不可信中继网络的最优功率分配方法,其特征在于包括下述步骤:1. an optimal power distribution method of untrusted relay network under bounded CSI, it is characterized in that comprising the following steps: 步骤一,在一个两跳半双工中继网络中,在第一个时隙,源节点Alice向不可信的中继节点R传输信息xA,同时目的节点Bob向不可信的中继节点R传输信息xB,中继节点R接收到的信号其中,PA和PB分别表示节点Alice和Bob发送的加密信息功率,hA-R和hB-R分别为节点Alice和Bob到中继节点R的复信道增益,hB-R=hR-B其中表示均值为0方差为的复高斯过程;nR表示中继节点R处的加性高斯白噪声;节点Alice和Bob发送的总功率为P,α∈[0,1]表示功率分配因子,则节点Alice发送的加密信息功率PA=αP,节点Bob发送的加密信息功率PB=(1-α)P,中继节点R处接收的瞬时信干噪比其中,节点Alice和Bob等效信噪比的比值μ=γA-RB-R,节点Alice和Bob到中继节点R的等效信噪比分别表示为γA-R=||hA-R||2P/N0和γB-R=||hB-R||2P/N0,N0=1;Step 1: In a two-hop half-duplex relay network, in the first time slot, the source node Alice transmits information x A to the untrusted relay node R, and at the same time, the destination node Bob sends information x A to the untrusted relay node R Transmit message x B , signal received by relay node R Among them, PA and P B represent the encrypted information power sent by nodes Alice and Bob respectively, h AR and h BR are the complex channel gains from nodes Alice and Bob to relay node R respectively, h BR =h RB , in Indicates that the mean is 0 and the variance is The complex Gaussian process of n R represents the additive white Gaussian noise at the relay node R; the total power sent by nodes Alice and Bob is P, and α∈[0,1] represents the power allocation factor, then the encrypted information sent by node Alice Power P A = αP, the encrypted information power P B sent by node Bob = (1-α)P, the instantaneous signal-to-interference-noise ratio received at relay node R Among them, the ratio of the equivalent signal-to-noise ratio of nodes Alice and Bob μ=γ ARBR , and the equivalent signal-to-noise ratios from nodes Alice and Bob to the relay node R are respectively expressed as γ AR =||h AR || 2 P /N 0 and γ BR =||h BR || 2 P/N 0 , N 0 =1; 步骤二,在第二个时隙,中继节点R将接收到的信号放大后发给目的节点Bob,放大因子为β;从中继节点R发送给节点Bob的信号Step 2, in the second time slot, the relay node R amplifies the received signal and sends it to the destination node Bob, the amplification factor is β; the signal sent from the relay node R to the node Bob 考虑两个时隙均以相同功率P传输信号,将yR归一化为||yR||2=P,得到放大因子 Considering that both time slots transmit signals with the same power P, normalize y R to ||y R || 2 =P to obtain the amplification factor 节点Bob接收到从不信任的中继节点R发出的信号Node Bob receives a signal from an untrusted relay node R 其中,nB是节点Bob接收到的加性高斯白噪声, 是不信任中继节点R与节点Bob之间估计的信道增益,he是信道估计误差,hB-R和he满足E[he]=0;Among them, n B is the additive Gaussian white noise received by node Bob, is the estimated channel gain between untrusted relay node R and node Bob, he is the channel estimation error, h BR and he satisfy E[h e ]=0; 假设信道估计误差服从[0,δ]上的均匀分布,通过自干扰消除后,节点Bob接收到的信号 Assuming that the channel estimation error obeys the uniform distribution on [0, δ], after self-interference cancellation, the signal received by node Bob 因此,对于给定的信道增益hA-R和hB-R,在节点Bob得到等价的SINR为Therefore, for given channel gains h AR and h BR , the equivalent SINR obtained at node Bob is 当γB-R≥20dB时,节点Bob的等效SINR近似为 When γ BR ≥ 20dB, the equivalent SINR of node Bob is approximately 步骤三,定义瞬时的安全速率其中,[t]+=max[t,0];首先对做关于α的求导,得到使安全速率Rs(α)最大的最优功率分配因子;Step 3, define the instantaneous safe rate Among them, [t] + = max[t, 0]; first to Do the derivation about α to get the optimal power allocation factor that maximizes the safe rate R s (α); 步骤四,定义安全速率下界Step 4, define the lower bound of the safe rate 其中,Δ1=αμ-α+2;Among them, Δ 1 =αμ-α+2; 分别将精确的功率分配因子和高SNR下的近似功率分配因子代入中,得到精确的最大安全速率下界和高SNR下的近似最大安全速率下界;Substitute the exact power allocation factor and the approximate power allocation factor under high SNR into In , the accurate maximum safe rate lower bound and the approximate maximum safe rate lower bound under high SNR are obtained; 步骤五,定义ESR为在||he||2所有的实现上的可达最大安全速率的数学期望,即关于α求导,得到 Step five, define ESR as the mathematical expectation of the maximum safe rate attainable on all realizations of ||h e || 2 , namely right Regarding the derivative of α, we get 2.根据权利要求1所述的有界CSI下不可信中继网络的最优功率分配方法,其特征在于:所述的步骤五中,在γB-R≥20dB条件下,将近似表示为2. The optimal power allocation method for an untrusted relay network under bounded CSI according to claim 1, characterized in that: in the step five, under the condition of γ BR ≥ 20dB, the Approximately expressed as 在0≤γA-R≤2γB-R的条件下,得到使最大的近似最优功率分配因子为Under the condition of 0≤γ AR ≤2γ BR , we get The largest approximate optimal power allocation factor is
CN201610893300.6A 2016-10-13 2016-10-13 An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI Active CN107071886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610893300.6A CN107071886B (en) 2016-10-13 2016-10-13 An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610893300.6A CN107071886B (en) 2016-10-13 2016-10-13 An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI

Publications (2)

Publication Number Publication Date
CN107071886A CN107071886A (en) 2017-08-18
CN107071886B true CN107071886B (en) 2019-08-09

Family

ID=59616995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610893300.6A Active CN107071886B (en) 2016-10-13 2016-10-13 An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI

Country Status (1)

Country Link
CN (1) CN107071886B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659991B (en) * 2017-10-09 2020-07-03 西北工业大学 Energy distribution method in two-hop energy collection relay network
CN108601019B (en) * 2018-03-27 2021-01-15 西北工业大学 Safe transmission method of untrusted relay bidirectional transmission network based on relay selection
CN108924067B (en) * 2018-07-03 2020-09-22 西北工业大学 Time division method for training sequence and data symbol in interference alignment network
CN111970718B (en) * 2020-07-22 2022-03-11 西北工业大学 Deep learning-based power distribution method in energy collection untrusted relay network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4856243B2 (en) * 2006-05-17 2012-01-18 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Best effort type macro diversity
US8457549B2 (en) * 2008-02-29 2013-06-04 Lingna Holdings Pte., Llc Multi-user MIMO relay protocol with self-interference cancellation
CN103068027B (en) * 2012-12-07 2015-04-01 南京邮电大学 Optimal power distribution method of multiple relays in frequency flat fading channel
CN104093200B (en) * 2014-07-25 2017-06-23 哈尔滨工业大学 For the double jump full duplex DF relay system optimal power allocation methods of individual node power limited

Also Published As

Publication number Publication date
CN107071886A (en) 2017-08-18

Similar Documents

Publication Publication Date Title
CN106059705B (en) A kind of relaying safe transmission method of physical layer
CN106413074B (en) A kind of optimal power allocation method of untrusted junction network under imperfect CSI
CN108809365B (en) A Cooperative Scrambling Secure Transmission Method Based on Optimal User Selection of Relay Links
Yue et al. Outage performance of full/half-duplex user relaying in NOMA systems
CN105392192B (en) Based on the extensive antenna relay system power distribution method of the optimal multi-user of efficiency
CN105246142B (en) Based on the extensive antenna relay system power distribution method of the optimal single user of efficiency
CN107124215B (en) Full-duplex multi-antenna destination node interference transmission method based on optimal antenna selection
CN106376073B (en) A kind of optimal power allocation method in insincere junction network
CN107071886B (en) An Optimal Power Allocation Method for Untrusted Relay Networks with Bounded CSI
CN104283629B (en) A kind of channel safety transmission method
CN102740303B (en) Combined power distribution and sub-carrier matching method of improved type relay system
CN104540124A (en) Multi-relay physical layer safety method based on known eavesdropping end channel information
CN106877919B (en) Relay safety communication method for power distribution energy collection based on optimal user selection
CN109525984B (en) A method for improving the security rate of an untrusted relay energy-carrying communication system
CN106332259B (en) An Optimal Power Allocation Method for Increasing Safe Energy Efficiency in Bidirectional Relay Networks
CN105450274B (en) Based on the extensive multiple antennas relay system number of users optimization method that efficiency is optimal
CN104836609A (en) Anti-eavesdropping double-differential bidirectional relay transmission method
Zhang et al. Performance analysis of relay assisted cooperative non-orthogonal multiple access systems
CN108601019B (en) Safe transmission method of untrusted relay bidirectional transmission network based on relay selection
CN103369624A (en) High-energy-efficiency relay selection method in energy constraint cooperative communication system
CN105873206B (en) A kind of the honeycomb junction network model and power distribution method of extensive MIMO transmission
CN110690913B (en) Power distribution method in cooperative space modulation system based on incomplete channel information
CN106102044B (en) A kind of multi-user's junction network downlink cooperation physical layer method for secret protection
CN106714174B (en) Half-duplex relay network safe transmission method based on time division energy acquisition
CN111315020B (en) Power distribution method based on fairness and optimal spectrum efficiency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant