CN114143791B - Transmission method of Cell-free system based on RSMA - Google Patents
Transmission method of Cell-free system based on RSMA Download PDFInfo
- Publication number
- CN114143791B CN114143791B CN202111497328.5A CN202111497328A CN114143791B CN 114143791 B CN114143791 B CN 114143791B CN 202111497328 A CN202111497328 A CN 202111497328A CN 114143791 B CN114143791 B CN 114143791B
- Authority
- CN
- China
- Prior art keywords
- rate
- eavesdropper
- public
- stream
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 210000004671 cell-free system Anatomy 0.000 title claims abstract description 25
- 230000005540 biological transmission Effects 0.000 title claims abstract description 22
- 238000005457 optimization Methods 0.000 claims abstract description 35
- 230000009977 dual effect Effects 0.000 claims abstract description 5
- 230000014509 gene expression Effects 0.000 claims description 6
- 239000011159 matrix material Substances 0.000 claims description 6
- 239000000654 additive Substances 0.000 claims description 3
- 230000000996 additive effect Effects 0.000 claims description 3
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 claims description 2
- 239000013598 vector Substances 0.000 abstract description 5
- 238000004891 communication Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/22—Traffic simulation tools or models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
- H04W28/22—Negotiating communication rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a transmission scheme of a Cell-free system based on RSMA, which consists of M access points, K legal users and an eavesdropper. An eavesdropper eavesdrops on the signal sent to the legitimate user throughout the data transmission process. And the common message serves a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper, without consuming additional transmission power. The physical layer security and rate of the system are maximized by jointly optimizing the beamforming vector and rate assignment, and then solving the optimization problem using a continuous convex approximation method.
Description
Technical Field
The invention belongs to the field of wireless communication, and particularly relates to a transmission method of a Cell-free system based on RSMA.
Background
Rate-division multiple access (Rate-SPLITTING MULTIPLE ACCESS, RSMA) is a more versatile, powerful multiple access approach for downlink multi-antenna systems that can meet the high throughput, qoS heterogeneity and huge connection requirements of future multi-antenna wireless networks. Rate-division multiple access is suitable for various network loads (underload and overload conditions) and user deployments (with different channel strengths, channel directions) compared to non-orthogonal multiple access. Recently, a Cell-free massive MIMO network has been receiving increasing attention, the wireless network is composed of a large number of Access Points (APs) randomly distributed in a network area, and the APs jointly serve a large number of users. In a Cell-free massive MIMO system, all APs may be interconnected by a Central Processing Unit (CPU) to perform beamforming transmission tasks. Cell-free massive MIMO networks can provide more diversity gain, better coverage and energy efficiency than traditional massive MIMO networks. Therefore, the Cell-free system based on the rate division multiple access is studied, and the future communication system can be better dealt with.
Disclosure of Invention
In order to improve the coverage of wireless communication, the invention discloses a transmission method of a Cell-free system based on RSMA, in particular to a physical layer security and rate maximization method in the Cell-free system based on rate division multiple access, which jointly optimizes beam forming vectors and rate distribution.
The embodiment of the invention provides the following technical scheme:
a method for physical layer security and rate maximization in a Cell-free system based on rate division multiple access, the method comprising:
step A, a Cell-free system model based on rate division multiple access is established, and received signals at legal users and eavesdroppers Eve are solved;
step B, respectively solving a transmission rate expression corresponding to the decoding public stream and the private stream at the legal user U k and the eavesdropper and a physical layer security rate expression which can be realized by the kth user;
and step C, initializing an optimization variable in the iterative algorithm.
And D, substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable.
And E, defining the condition for ending the iterative optimization.
The step A specifically comprises the following steps:
A1, a Cell-free system model based on rate division multiple access is established, and the system model consists of M Access Points (AP), K legal users (U k) and a passive eavesdropper. Where each AP is equipped with N antennas, both legitimate users and eavesdroppers are single antennas. The AP is connected to a CPU through a perfect backhaul network, which provides an error-free and higher capacity connection.
A2, at each AP, messages for U k are split into public and private parts according to the rate splitting principle. All common parts are then combined together and encoded into a common stream s c,sc for decoding by all users. The private parts are each encoded as a private stream s k,sk, which is decoded only by the corresponding user. Stream s= [ s c,s1,...,sK]T ] is linear precoded using precoder p= [ P c,p1,...,pK. The transmit signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at the legitimate user U k and the eavesdropper, respectively.
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K, where R c,k=log2(1+γc,k), K e { 1.. K is the achievable rate of decoding the common stream at U k.
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k.Uk with the signal-to-interference-and-noise ratio: the corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk).
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper. In order for the public message to be considered as artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the common message. It is assumed that an eavesdropper can eavesdrop on all users' private messages.
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And/> The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e).
B5, the physical layer security rate achievable by the kth user isWherein,Indicating that the public message transmitted to U k can achieve a safe rate, v k indicates the proportion of the kth user's public message that can achieve a safe rate. /(I)The private message transmitted to U k may be indicative of a secure rate.
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initializing toWherein/>Lambda is more than or equal to 0 and less than or equal to 1. Precoder/>, for common stream s c Initializing toWhere p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from U c =u (: 1), where h=usv H.
C2, the auxiliary variable alpha [1],ρ[1],/>β[1],/>Respectively initialize to,/>
The step D specifically comprises the following steps:
And D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm. Wherein the objective function of the convex optimization problem is r, which represents the system physical layer security and rate. Constraints on the convex optimization problem include user private rate constraints, public message is treated as artificial noise public rate constraints, and total power constraints at the AP.
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,k,βk)≤ρk,Ω[n](pk,hm,βk,e)≥ρk,e,1+ρk-Γ[n](αk)≤0,Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,gm,k,βc,k)≥ρc,k,Ω[n](pc,hm,βc,e)≤ρc,e,/>1+Ρ c,e-Γ[n](αc,e) is less than or equal to 0. Wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To obtain optimal values of objective function and optimization variable for eta (m) gradient r*,P*,α*,αc *,ρ*,ρc *,β*,βc *.
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*,α[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
E1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not established.
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n],α*=α[n],ρ*=ρ[n],/>β*=β[n],/>
Compared with the prior art, the technical scheme has the following advantages:
The invention discloses a physical layer security and rate maximization method in a Cell-free system based on RSMA. This scheme considers the use of public messages for dual purposes, as desired messages at legitimate users, as artificial noise at eavesdroppers, without consuming additional transmission power. The rate division multiple access method can flexibly cope with the change of the number of users in wireless communication. Consider the use of a Cell-free system to improve the coverage of a wireless network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a transmission method of a RSMA-based Cell-free system according to an embodiment of the present invention.
Detailed Description
As described in the background section, how to improve the physical layer security in wireless communication, improve the communication quality and reliability of users, and realize secure transmission of data is a problem to be solved by those skilled in the art.
The core idea of the invention is to provide a transmission method of a Cell-free system based on RSMA, in particular to a physical layer security and rate maximization method in the Cell-free system based on rate division multiple access, so as to improve the security of data transmission. By using a method of continuous convex approximation, the physical layer security and rate of the system is maximized by jointly optimizing the beamforming vector and rate allocation.
Referring to fig. 1, the implementation of the present invention provides a physical layer security and rate maximization method in a Cell-free system based on rate division multiple access, the method comprising:
And step A, a Cell-free system model based on rate division multiple access is established, and received signals at legal users and eavesdroppers Eve are solved.
And step B, respectively solving transmission rate expressions corresponding to the decoded public stream and the decoded private stream at the legal user U k and the eavesdropper and physical layer security rate expressions which can be realized by the kth user.
And step C, initializing an optimization variable in the iterative algorithm.
And D, substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable.
And E, defining the condition for ending the iterative optimization.
The step A specifically comprises the following steps:
A1, a Cell-free system model based on rate division multiple access is established, and the system model consists of M Access Points (AP), K legal users (U k) and a passive eavesdropper. Where each AP is equipped with N antennas, both legitimate users and eavesdroppers are single antennas. The AP is connected to a CPU through a perfect backhaul network, which provides an error-free and higher capacity connection.
A2, at each AP, messages for U k are split into public and private parts according to the rate splitting principle. All common parts are then combined together and encoded into a common stream s c,sc for decoding by all users. The private parts are each encoded as a private stream s k,sk, which is decoded only by the corresponding user. Stream s= [ s c,s1,...,sK]T ] is linear precoded using precoder p= [ P c,p1,...,pK. The transmit signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at the legitimate user U k and the eavesdropper, respectively.
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K, where R c,k=log2(1+γc,k), K e { 1.. K is the achievable rate of decoding the common stream at U k.
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k.Uk with the signal-to-interference-and-noise ratio: the corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk).
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper. In order for the public message to be considered as artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the common message. It is assumed that an eavesdropper can eavesdrop on all users' private messages.
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And/> The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e).
B5, the physical layer security rate achievable by the kth user isWherein,Indicating that the public message transmitted to U k can achieve a safe rate, v k indicates the proportion of the kth user's public message that can achieve a safe rate. /(I)The private message transmitted to U k may be indicative of a secure rate.
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initializing toWherein/>Lambda is more than or equal to 0 and less than or equal to 1. Precoder/>, for common stream s c Initializing toWhere p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from U c =u (: 1), where h=usv H.
C2, the auxiliary variable alpha [1],ρ[1],/>β[1],/>Respectively initialize to,/>
The step D specifically comprises the following steps:
And D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm. Wherein the objective function of the convex optimization problem is r, which represents the system physical layer security and rate. Constraints on the convex optimization problem include user private rate constraints, public message is treated as artificial noise public rate constraints, and total power constraints at the AP.
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,k,βk)≤ρk,Ω[n](pk,hm,βk,e)≥ρk,e,1+ρk-Γ[n](αk)≤0,/>Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,hm,βc,e)≤ρc,e,/>1+Ρ c,e-Γ[n](αc,e) is less than or equal to 0. Wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To an optimal value r *,P*,α*,/>, for the η (m) gradient, to obtain the objective function and the optimization variablesρ*,/>β*,/>
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*,α[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
E1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not established.
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n],α*=α[n],ρ*=ρ[n],/>β*=β[n],/>
Compared with the prior art, the technical scheme has the following advantages:
The present invention considers a transmission scheme of an RSMA-based Cell-free system in which a common message is used as a desired message at a legitimate user and as artificial noise at an eavesdropper without consuming additional transmission power. Under the constraints of common information as noise constraint, total power constraint of a transmitting end and the like, physical layer security and rate of a user are maximized through joint optimization of active beam forming vector and rate distribution.
The invention discloses a physical layer security and rate maximization method in a Cell-free system based on RSMA. The method considers the introduction of the rate division multiple access technology into the Cell-free system for the first time to improve the coverage of wireless signals, and proposes a method for jointly optimizing the active beam forming vector and the rate distribution under the constraint that a common message is used as noise constraint, the total power constraint of a transmitting end and the like.
The invention provides a Cell-free system based on RSMA, which considers the problem of physical layer safety and rate maximization in the system, sequentially solves a series of convex problems by using a continuous convex approximation method, and carries out iterative optimization on an optimization variable so as to obtain an optimal solution of the optimization variable, thereby maximizing the physical layer safety and rate in the system.
In the present description, each part is described in a progressive manner, and each part is mainly described as different from other parts, and identical and similar parts between the parts are mutually referred.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (1)
1. The transmission method of the Cell-free system based on RSMA is characterized by comprising the following steps:
Step A, a Cell-free system model based on a rate division multiple access technology RSMA is established, and received signals at legal users and eavesdroppers Eve are solved;
step B, respectively solving a transmission rate expression corresponding to the decoding public stream and the private stream at the legal user U k and the eavesdropper and a physical layer security rate expression which can be realized by the kth user;
step C, initializing an optimization variable in an iterative algorithm;
Substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable;
Step E, defining the condition for ending the iterative optimization;
The step A specifically comprises the following steps:
A1, establishing a Cell-free system model based on rate division multiple access, wherein the system model consists of M Access Points (APs), K legal users U k and a passive eavesdropper, each AP is provided with N antennas, the legal users and the eavesdropper are single antennas, and the APs are connected to a CPU through a perfect backhaul network, so that an error-free and higher-capacity connection is provided;
a2, at each AP, the message for U k is split into public and private parts according to the rate splitting principle, then all public parts are combined together and encoded into a public stream s c,sc to be decoded by all users, the private parts are each encoded into a private stream s k,sk to be decoded by only the corresponding users, the stream s= [ s c,s1,...,sK]T ] is linearly precoded using a precoder p= [ P c,p1,...,pK ], and the transmitted signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And/> Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at legal user U k and eavesdropper, respectively;
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K }, where R c,k=log2(1+γc,k), K e {1,., K } is the achievable rate of decoding the common stream at U k;
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k,Uk with the signal-to-interference-and-noise ratio: The corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk);
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as an artificial noise at the eavesdropper, in order for the public message to be considered as an artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the public message, assuming that the eavesdropper can eavesdrop on all users' private messages;
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e);
b5, the physical layer security rate achievable by the kth user is Wherein/>Indicating that the public message transmitted to U k can realize the safe rate, v k indicates the proportion of the public message of the kth user to realize the safe rate,/>Indicating that the private message transmitted to U k may achieve a secure rate;
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initialized to/>Wherein/>Precoder/>, for common stream s c Initialized to/>Where p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from uc=u (: 1), where h=usv H;
C2, auxiliary variables Respectively initialize to,/>
The step D specifically comprises the following steps:
D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm, wherein an objective function of the convex optimization problem is r, r represents the security and the speed of a physical layer of a system, constraint conditions of the convex optimization problem comprise private speed constraint of a user, public information is regarded as public speed constraint of artificial noise, and total power constraint at an AP (access point);
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,k,βk)≤ρk,Ω[n](pk,hm,βk,e)≥ρk,e,1+ρk-Γ[n](αk)≤0,Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,gm,k,βc,k)≥ρc,k,Ω[n](pc,hm,βc,e)≤ρc,e,/>1+Ρ c,e-Γ[n](αc,e) is less than or equal to 0; wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To obtain optimal values of objective function and optimization variable for eta (m) gradient r*,P*,α*,αc *,ρ*,ρc *,β*,/>
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*,α[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
e1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not satisfied;
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n],α*=α[n], ρ*=ρ[n],/>β*=β[n],/>
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111497328.5A CN114143791B (en) | 2021-12-09 | 2021-12-09 | Transmission method of Cell-free system based on RSMA |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111497328.5A CN114143791B (en) | 2021-12-09 | 2021-12-09 | Transmission method of Cell-free system based on RSMA |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114143791A CN114143791A (en) | 2022-03-04 |
CN114143791B true CN114143791B (en) | 2024-04-26 |
Family
ID=80385079
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111497328.5A Active CN114143791B (en) | 2021-12-09 | 2021-12-09 | Transmission method of Cell-free system based on RSMA |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114143791B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114786182A (en) * | 2022-04-21 | 2022-07-22 | 哈尔滨工业大学 | Pre-coding optimization safety transmission method based on rate division multiple access |
CN115276744B (en) * | 2022-06-23 | 2024-12-03 | 河北中创盈和通信科技有限公司 | Millimeter wave system transmission method based on rate division multiple access technology |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314932A (en) * | 2020-01-17 | 2020-06-19 | 山东师范大学 | Generalized rate division multiple access method for multi-cell system |
CN113411165A (en) * | 2021-06-18 | 2021-09-17 | 东南大学 | Precoding and public message rate allocation method based on rate split transmission |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112714470B (en) * | 2017-01-04 | 2022-09-02 | 华为技术有限公司 | Communication method, terminal equipment and network equipment thereof |
US10917919B2 (en) * | 2018-05-31 | 2021-02-09 | Qualcomm Incorporated | Reference signal design for medium access in cellular V2X communication |
-
2021
- 2021-12-09 CN CN202111497328.5A patent/CN114143791B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314932A (en) * | 2020-01-17 | 2020-06-19 | 山东师范大学 | Generalized rate division multiple access method for multi-cell system |
CN113411165A (en) * | 2021-06-18 | 2021-09-17 | 东南大学 | Precoding and public message rate allocation method based on rate split transmission |
Non-Patent Citations (1)
Title |
---|
"基于在线支持张量机分类算法的中性点接地方式研究(英文)";冉静学;《机床与液压》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114143791A (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112290995B (en) | Safety and energy efficiency based beam design method in satellite-ground integrated network | |
Park et al. | Joint design of fronthaul and access links for C-RAN with wireless fronthauling | |
CN114143791B (en) | Transmission method of Cell-free system based on RSMA | |
CN113067610B (en) | Millimeter wave NOMA system safe energy efficiency maximization power distribution method based on SWIPT | |
CN108736943B (en) | Hybrid precoding method suitable for large-scale MIMO system | |
CN106953671B (en) | Multi-address access method and device for signal in mobile communication | |
CN111756424B (en) | A beam design method for mmWave cloud wireless access network based on secure transmission | |
CN114124171B (en) | A method for physical layer security and rate maximization | |
Dai et al. | Partially active message passing receiver for MIMO-SCMA systems | |
CN111030779B (en) | A rateless code degree distribution optimization method for cloud access network compression transmission | |
CN113660051B (en) | Method and system for maximizing energy efficiency of millimeter wave communication system | |
Ahmad et al. | Interference mitigation via rate-splitting in cloud radio access networks | |
Ahmad et al. | Rate splitting multiple access in C-RAN | |
Zhou et al. | Physical-layer security for cache-enabled C-RANs via rate splitting | |
Kai et al. | Max-min fairness in IRS-aided MISO broadcast channel via joint transmit and reflective beamforming | |
CN114501580B (en) | Cooperative rate-splitting network secure transmission method with untrusted relay threat | |
Kim et al. | Minimum rate maximization for wireless powered cloud radio access networks | |
CN114448479B (en) | Massive MIMO (multiple input multiple output) safe transmission optimization method based on antenna selection | |
Jo et al. | Joint precoding and fronthaul compression for cell-free MIMO downlink with radio stripes | |
CN112073965A (en) | A kind of physical layer key generation method, electronic device and storage medium | |
Xu et al. | Max-min fairness for uplink rate-splitting multiple access with finite blocklength | |
CN110933716A (en) | A secure and low-latency mmWave transmission method based on edge caching | |
CN113922849B (en) | A method for user grouping and power allocation in mmWave MIMO-NOMA system | |
Cheng et al. | Generalized signal-space alignment based physical-layer network coding for distributed MIMO systems | |
Xia et al. | Joint optimization of fronthaul compression and bandwidth allocation in heterogeneous CRAN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |