摘要
无线通信是开放的自由空间,窃听用户可能在通信过程中对信息进行窃取.针对多用户下行链路的信息泄露问题,提出一种基于时间反演(time reversal, TR)且采用波束赋形(beam forming, BF)技术优化的安全传输方案.该方案以最大化安全容量为多用户通信准则,建立多输入单输出(multiple-input single-output, MISO)窃听信道模型.一方面基站采用BF技术使信号在指定方向上增强,针对期望用户发送需求信号;另一方面由于TR技术对环境是自适应的,基站的信号在发射之前都要经过TR腔,其空时聚焦性使能量聚焦在合法接收方,保密性能更优.理论分析和仿真结果表明:与已有物理层安全方案相比,所提方案安全容量更高,误比特率更低.
Information may be eavesdropped by eavesdropping users in the process of wireless communication which relies on open free space. To solve the information disclosure problem of multi-user downlink, a secure transmission scheme which is optimized by beam forming(BF) technology on the basis of time reversal(TR) technology is proposed in this paper. This scheme takes the maximization of security capacity as the principle of multiuser communication, builds a multiple input single output(MISO) wiretap channel model. On one hand, the base station uses beam forming technology to make the signals enhanced in the specified direction, and transmit the demand signals to the desired users. On the other hand, the signals of the base station need to pass through the time reversal cavities before being transmitted because of the environment adaptive technique-time reversal, and spatial and temporal focusing characteristics of time reversal technology make the energy focused on the legal receiver to make the performance of security better. The theoretical analysis and simulation results show that the proposed scheme has a higher security capacity and a lower bit error probability.
引文
[1] TRAN D D,HA D B,TRAN-HA V,et al.Secrecy Analysis with MRC/SC-based eavesdropper over heterogeneous channels[J].IETE journal of research,2015,61(4):36 3-371.
[2] CSISZAR I,KORNER J.Broadcast channels with confidential messages[J].IEEE transactions on information theory,2003,24(3):339-348.
[3] LIU T,SHAMAI S.A note on the secrecy capacity of the multiple-antenna wiretap channel[J].IEEE transactions on information theory,2009,55(6):2547-2553.
[4] OGGIER F,HASSIBI B.The secrecy capacity of the MIMO wiretap channel[M].IEEE Press,2011.
[5] SHAFIEE S,ULUKUS S.Achievable rates in Gaussian MISO channels with secrecy constraints[C]//IEEE International Symposium on Information Theory,2007:2466-2470.
[6] 尹志伟.多点协作传输中协作波束赋形技术的研究[D].西安:西安科技大学,2012.YIN Z W.Research on coordinated beamforming technique in coordinated multipoint transmission system[D].Xi’an:Xidian University,2012.(in Chinese)
[7] ALVES H,SOUZA R D,DEBBAH M,et al.Performance of transmit antenna selection physical layer security schemes[J].IEEE signal processing letters,2012,19(6):372-375.
[8] JINGRAN L,QIANG L,JINTAI Y.Frequency diverse array beam forming for physical-layer security with directionally-aligned legitimate user and eavesdropper [C]//25th European Signal Processing Conference (EUSIPCO).IEEE,2017:2166-2170.
[9] CHEN Y,WANG B,HAN Y,et al.Why time reversal for future 5G wireless?[J].IEEE signal processing magazine,2016,33(2):17-26.
[10] 王秉中,臧锐,周洪澄.时间反演电磁波应用系统的研究进展[J].微波学报,2013,29(z1):22-28.WANG B Z,ZANG R,ZHOU H C.Progress in the application systems based on time-reversed electromagnetic waves[J].Journal of microwaves,2013,29(z1):22-28.(in Chinese)
[11] FINK M.Time reversal of ultrasonic fields.I.Basic principles[J].IEEE transactions on ultrasonics ferroelectrics & frequency control,1992,39(5):555-66.
[12] XU Q,CHEN Y,LIU K J R.Combating strong-weak spatial-temporal resonances in time-reversal uplinks[J].IEEE transactions on wireless communications,2016,15(1):568-580.
[13] HAN F,YANG Y H,WANG B,et al.Time-reversal division multiple access over multi-path channels[J].IEEE transactions on communications,2012,60(7):1953-1965.
[14] TAN V T,HA D B,TRAN D D.Evaluation of physical layer secrecy in MIMO ultra-wideband system using time-reversal techniques [C]//International Conference on Computing,Management and Telecommunications.IEEE,2014:70-74.
[15] VITERI-MERA C A,TEIXEIRA F L.Equalized time reversal beamforming for frequency-selective indoor MISO channels[J].IEEE access,2017,PP(99):1-1.
[16] SMITH D,HSU M,ACHOUR M,et al.Array-to-array beamforming and iterative time reversal techniques[J].2017.
[17] HOSSIAN M D,SANAGAVARAPU A M.Eigenspace time reversal robust capon beamforming for target localization in continuous random media[J].IEEE antennas & wireless propagation letters,2017,PP(99):1-1.
[18] CHEN Y,HAN F,YANG Y H,et al.Time-Reversal wireless paradigm for green internet of things:an overview[J].IEEE internet of things journal,2014,1(1):81-98.
[19] YANG N,SURAWEERA H A,COLLINGS I B,et al.Physical layer security of TAS/MRC with antenna correlation[J].IEEE transactions on information forensics & security,2013,8(1):254-259.
[20] RAHMANPOUR A,VAKILI V T,RAZAVIZADEH S M.Enhancement of physical layer security using destination artificial noise based on outage probability[J].Wireless personal communications,2017:1-13.DOI:10.1007/s11277-016-3865-9
[21] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE transactions on information theory,2008,54(6):2515-2534.
[22] SIMON M,ALOUINI M.Digital Communication over Fading Channels[C]//Wiley-IEEE Press,2005:758-795.