Non-orthogonal multiple access auxiliary semi-unlicensed system safety transmission method
Technical Field
The invention belongs to the technical field of wireless communication networks, in particular to a semi-unlicensed wireless communication network assisted by a non-orthogonal multiple access technology, and belongs to the field of physical layer security.
Background
In the 5G era, the explosive growth of mobile data volume brought by the popularization of intelligent terminals has put higher demands on the speed, time delay, signal coverage rate and the like of wireless communication networks. To date, mobile communication technology has been iterated at high speeds in order to meet ever-increasing social demands. The first generation mobile communication technology is an analog communication technology utilizing analog frequency modulation and frequency division multiple access, mainly based on a cellular networking structure to overcome the problems of low large-area system capacity and limited movable range and realize voice function, in order to improve the channel capacity and anti-interference capability of communication and reduce the communication investment cost, the second generation mobile communication system utilizing time division multiple access technology and narrow-band digital communication technology mainly comprising voice and short message service is proposed, the third generation mobile communication system utilizing code division multiple access technology not only requires large system capacity but also can support the effective transmission of multiple services such as voice, data, image, multimedia and the like, and the fourth generation mobile communication technology is also called broadband intervention and distribution network, and represents mobile multimedia, global mobile solution and integrated wireless and customized service by utilizing orthogonal frequency division multiple access technology. At present, we are in the era of commercial use of the fifth generation mobile communication technology, namely the convenient era of interconnecting everything.
Non-orthogonal multiple access technology, a promising multiple access technology, is widely recognized as a technology for efficient utilization of spectrum resources in 5G wireless networks. The basic idea of the non-orthogonal multiple access technology is that the superposition coding technology is adopted at the transmitting end, the interference information is actively introduced, and the correct demodulation is realized at the receiving end through the serial interference deleting technology. The non-orthogonal multiple access is mainly divided into a power domain non-orthogonal multiple access, a code domain non-orthogonal multiple access and a space domain non-orthogonal multiple access technology. Non-orthogonal multiple access refers hereinafter to power domain non-orthogonal multiple access unless otherwise indicated. Power domain non-orthogonal multiple access refers to a communication technology that superimposes signals on the same time-frequency resource with different powers and performs interference cancellation at the receiving end.
As large-scale devices will access limited spectrum, two major scenarios in the internet of things, ultra-reliable low-latency communications (URLLC) and large-scale machine type communications (mMTC), have more stringent requirements on latency and signaling overhead, i.e., lower latency and signaling overhead.
The semi-unlicensed strategy is a combination of an unlicensed scheme for machine type users with small data packets and delay tolerant traffic and an unlicensed scheme for users with large data packets and delay sensitive traffic, and is an unlicensed user quantity strategy for controlling access to spectrum resources. In order to relieve the conflict of competing resources and obtain large-scale connectivity, the strategy can enable unlicensed users (delay tolerant devices) to share the spectrum resources of the licensed users, does not influence the licensed users to monopolize channels to communicate with the base station, and solves the problem that a large number of users exceed the non-orthogonal multiple access capacity and cannot successfully decode the information of the users.
Physical layer security technology, physical layer security does not need a secret key, and absolute security of information transmission can be realized theoretically by utilizing a time-varying encryption communication system of a wireless channel. As the computing power of the terminal increases gradually, the ability of the eavesdropper to crack the information increases gradually. Traditional cryptography is under increasing pressure in the field of information encryption. Physical layer security is based on information theory, and information security is realized in the physical layer, so that the method is a very promising encryption mode in the field of communication.
A general uplink non-orthogonal multiple access communication network model is shown in fig. 1. In the figure, S is a source node, and U 1 and U 2 are strong and weak users respectively. The method mainly comprises the steps of 1, decoding user information according to user Channel State Information (CSI), namely, decoding user information of a user U 1 (near user) with stronger CSI by a base station, deleting the signal through the serial interference cancellation technology, decoding user information of a user U 2 (far user) with weaker CSI, decoding the received signal and deleting the received signal and decoding the received signal by the base station, and 2, decoding the user information according to user service quality (QoS), namely, decoding the user information and decoding user information of a user U 2 according to user service quality (QoS), wherein U 1 is possibly delay sensitive equipment and has higher priority. This is primarily based on quality of service considerations for the user.
The semi-unlicensed communication technology not only can improve the spectrum efficiency, but also can reduce the signaling overhead, and simultaneously, the collision problem occurring when multiple users contend for the same resource block can be solved by combining the non-orthogonal multiple access technology, and the system performance can be obviously improved. The combination of semi-unlicensed communication with non-orthogonal multiple access techniques may further enhance the performance of non-orthogonal multiple access communication systems. As shown in fig. 2. In the figure, BS is a base station, U B and U k are respectively delay sensitive and delay tolerant users, and under the condition of guaranteeing the service quality of authorized users, whether the power gain of the unauthorized users is larger than a decoding threshold value tau (|g B|2) or not divides all the unauthorized users into two groups, namely, the user channel gain in the group 1 is larger than the threshold value, namely, the base station cannot directly and correctly decode the information of the authorized users, and only can decode the information of the unauthorized users in the first stage of serial interference elimination. The channel gains for all users in group 2 are less than the threshold. The information of the unauthorized users of the group can be decoded in the first stage of the serial interference cancellation as well as in the second stage. By comparing the reachable rates of the unlicensed users in the two phases, the maximum reachable rate can be obtained by decoding the GF user information in the second phase.
Physical layer security is a security theory based on information theory. The method utilizes the time-varying property of the wireless channel, and combines channel coding and encryption technology to ensure that the information is not deciphered by an eavesdropper. In classical literature (see literature [1]:Shannon C E.Communication theory of secrecy systems[J].The Bell System Technical Journal,1949,28(4):656-715.), from The aspect of information theory, it is proved that in order to realize absolute security of messages, a communication process must use a one-time-pad encryption method, that is, one-bit data should have one bit key, which is too severe to be applied in The engineering field, a.wyner builds a noise-containing eavesdropping channel model for The first time on The basis of Shannon research in 1975 (see literature [2]: wyner a d. The wire-TAP CHANNEL [ J ]. The Bell SYSTEM TECHNICAL Journal,1975,54 (8): 1355-1387)), as shown in fig. 3, the eavesdropping model is an improvement of Shannon model, in which, when The channel condition of a main channel is better than that of a listening channel, a coding mode must exist when information transmission is performed by a source and a receiving end, the probability of transmitting information errors is arbitrarily small, any useful information can be obtained by The first time, and The probability that The transmission of The channel is difficult to be expressed by The source and receiving end is a physical interrupt, the system is gradually measured by The fact that The practical threshold value is The practical, the practical threshold value is gradually reached by The ten years, the system is expressed by The fact that The practical threshold value is more than The practical threshold value, and The practical threshold value is gradually reached by The fact that The practical threshold value is reached by The practical layer of The transmission of The system:
Wherein, gamma D and gamma E represent the signal-to-noise ratio of the destination end and the eavesdropping end, R s denotes a safe rate threshold, and F D (x) denotes a cumulative distribution function of the primary channel signal-to-noise ratio. f (γ E) represents the probability density function of γ E.
The uplink communication system constructed based on the combination of non-orthogonal multiple access, semi-unlicensed and physical layer security theory is widely applied to ultra-reliable low-delay communication with low delay, high spectral efficiency and multiple connections and ultra-multiple machine type communication systems.
Disclosure of Invention
Aiming at the system safety problem that an eavesdropper possibly exists in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system in transmission, the invention considers the safety of the system, and simultaneously adopts a given user scheduling strategy (such as the maximum reachable rate of a user) to further promote the safe transmission of the non-orthogonal multiple access system on the basis of guaranteeing the service quality of an authorized user.
The invention is based on physical layer security technology, and considers the security of the unlicensed user in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system. The core of the strategy is based on physical layer security technology, and the selection of users with the maximum reachable rate is specifically comprising the following steps:
step S1, initializing a system, transmitting training series in a plurality of unlicensed users uplink non-orthogonal multiple access systems, and estimating channel state information of each channel by each user through a channel estimation algorithm.
And step S2, the authorized user feeds back the own transmission signal-to-noise ratio, the target rate R B and the channel state information g B to the base station.
Step S3, the base station calculates the decoding threshold of the authorized userWherein τ (|g B|2) is defined byThe result is that P F is the transmit power of the unlicensed user, P B is the transmit power of the licensed user, R B is the rate threshold and |h k|2 represents the channel gain of the unlicensed user, and the effective received signal-to-noise ratios P B|gB|2 and τ (|g B|2) of the licensed user are broadcast.
And S4, the unlicensed users calculate own transmission rate, and all unlicensed users are divided into two groups according to the maximum achievable rate scheduling algorithm and whether the power gain of the unlicensed users is larger than a decoding threshold value tau (|g B|2).
Step S5, obtaining the maximum reachable rate of the user k according to the step S4Wherein the method comprises the steps ofAndThe signal rates of the unlicensed users are respectively indicated by the base station in the first stage and the second stage of the serial interference elimination, and S 1 indicates the group that the power gain of the unlicensed users is smaller than the decoding threshold value.
Step S6, the unauthorized user with the maximum reachable rate is accessed into the resource block of the authorized user in a distributed competition mode.
The invention has the advantages that the correlation of the channel gains of a plurality of unauthorized users is considered, the probability of successfully decoding the users is increased through a user scheduling strategy under the condition of ensuring the service quality of the authorized users, the safe interruption probability and the signaling cost of a non-orthogonal multiple access auxiliary semi-unauthorized system are effectively reduced, and the safety performance of the system is improved.
The beneficial effects of the invention come from the following three aspects:
(1) Communication is performed using a semi-unlicensed-non-orthogonal multiple access technique. Since the authorized users generate high signaling overhead in the process of authorization and the unauthorized technology can cause the unauthorized users to collide when competing for the same resource block, in order to solve the two problems, a semi-unauthorized-non-orthogonal multiple access technology is generated, the non-orthogonal multiple access technology can accommodate a plurality of users in the same resource block, but the capacity of the non-orthogonal multiple access technology can overflow in a large number of equipment access networks. The semi-unlicensed technology adopts a distributed contention manner (see related document [5]Z.Ding,R.Schober,P.Fan,and H.V.Poor,"Simple semi-grant-free transmission strategies assisted by non-orthogonal multiple access,"IEEE Trans.Commun.,vol.67,no.6,pp.4464-4478,Jun.2019., which is not repeated herein), which can solve both the high signaling overhead generated and the capacity overflow problem occurring in the non-orthogonal multiple access technology. Thus, the technique can result in both lower signaling overhead and improved spectral efficiency and system performance.
(2) A user scheduling policy is employed. The user scheduling strategy can ensure lower signaling overhead and improve spectrum efficiency. In addition, unlike semi-unlicensed-non-orthogonal multiple access technology, which does not employ a policy of user scheduling, the present invention considers that unlicensed users schedule unlicensed users having a maximum reachable rate through a distributed contention resource manner under the condition of guaranteeing the quality of service of licensed users. The impact of the number of face authorized users on system security is shown in figure 5. This strategy not only prevents users accessing the same resource block from overflowing the capacity of the non-orthogonal multiple access technology, but also enhances the security of the system.
(3) Impact of rate on. The rate consisting of the interrupt rate threshold and the safety rate threshold has a great influence on the safety of the system, and whether the product of the rate and the rate is larger than 1 has influence on the safety interrupt probability of the system is shown in fig. 6. The Monte Carlo simulation results in FIG. 6 show that system security can be significantly enhanced when the rate-to-rate product is less than 1.
Drawings
Fig. 1 is a model of a generic uplink non-orthogonal multiple access system;
fig. 2 is a non-orthogonal multiple access assisted semi-unlicensed system model;
FIG. 3 is a Wyner eavesdropping channel model;
fig. 4 is a non-orthogonal multiple access assisted security system model;
fig. 5 is an illustration of the effect of the number of unlicensed users on the probability of system security outage for non-orthogonal multiple access assistance;
FIG. 6 is a graph of the impact of rate on the probability of system outage;
Fig. 7 is a flow diagram of implementation of a non-orthogonal multiple access assisted semi-unlicensed system security transmission scheme.
Detailed Description
As shown in fig. 4, the present invention considers the security of a non-orthogonal multiple access assisted system, where BS represents a base station, U B and U k are delay sensitive and delay tolerant users, respectively, and E is an eavesdropping end. The communication system of the embodiment of the invention comprises a base station BS, an authorized user U B, a eavesdropping node E and K unauthorized users U F, and the base station and all users are provided with single antennas. The channel power gain of the authorized user is represented by |g B|2, the channel power gain of the unauthorized user is represented by |g k|2, and the channel power gain of the unauthorized user is sequenced to be |h 1 2≤…≤|hK|2, whereinAndIt is assumed that all channels are subject to independent co-distributed rayleigh fading. The probability density function and cumulative distribution function of the channel ordered |h i|2 and |h j|2 (1. Ltoreq.i < j. Ltoreq.K) can therefore be expressed as:
Wherein, Phi 2 = K-j + n +1 and phi 3 = m + j-i-n. i, j respectively represent the ith user and the jth user, m, n respectively represent the (m+1) th user and the (n+1) th user, x, y respectively represent the lower and upper bounds of the channel gain variable |h| 2, and |h i|2,|hj|2 respectively represent the channel gains of the user i and the user j.
The embodiment of the invention is based on a physical layer security technology, and considers the security of the unlicensed user in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system. A security transmission scheduling strategy for non-orthogonal multiple access assisted semi-unlicensed system is disclosed, the core of which is based on physical layer security technology, selection of users with maximum achievable rate. The specific implementation flow of the invention is shown in figure 7, and mainly comprises three stages, wherein the first stage mainly comprises a base station transmitting a training sequence, each user estimating own channel state information, an authorized user feeding back own transmitting signal-to-noise ratio, a rate threshold and channel state information to the base station, the base station calculating and broadcasting a decoding threshold and an effective receiving power gain of the authorized user, the second stage grouping unauthorized users according to the decoding threshold of the authorized user, and the third stage mainly comprises the steps of scheduling the unauthorized users meeting the requirements according to a scheduling strategy to access the resource blocks of the authorized users. The specific implementation flow is divided into six steps:
Step S1, the base station broadcasts a training sequence. The step has two purposes of (1) estimating channel state information of authorized users and unauthorized users, namely, each channel state information of BS-U B and BS-U k, and k E [1:K ], and (2) estimating channel state information of eavesdropping channels. I.e., channel state information of the BS-E channel. The acquisition of the channel state information of each link may be achieved by monitoring the transmission of each port or by using some complex channel estimation algorithm (see document [3]Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].IEEE Network,2015,29(1):42-48.) for details).
Step S2, the authorized user feeds back the own transmission signal-to-noise ratio, target rate R B and channel state information g B to the base station (see literature) [4]:Z.Ding,R.Schober,and H.V.Poor,"A new QoS-guarantee strategy for NOMA assisted semi-grant-free Transmission,"IEEE Trans.Commun,vol.69,no.11,pp.7489-7503,Nov 2021.).
Step S3, the base station calculates the decoding threshold of the authorized userWherein the method comprises the steps ofThe result, P F is the transmit power of the unlicensed user, P B,RB and |h k|2 represent the transmit power of the licensed user, the rate threshold and the channel gain of the unlicensed user, respectively, and the effective receive power gains P B|gB|2 and τ (|g B|2) of the licensed user are broadcast.
Step S4, the unlicensed users calculate own transmission rate, and divide all unlicensed users into two groups according to the maximum achievable rate scheduling algorithm and whether the power gain of the unlicensed users is greater than a decoding threshold value tau (|g B|2), wherein the user channel gain in group 1 is greater than the threshold value, namely P F|hm|2>τ(|gB|2), and P F is the transmission power of the unlicensed users, so that the method comprises the following steps ofThat is, the base station cannot directly and correctly decode the information of the authorized user, and can only decode the information of the unauthorized user in the first stage of the serial interference elimination. The channel gains for all users in group 2 are less than the threshold, P F|hk|2<τ(|gB|2). The information of the unauthorized users of the group can be decoded in the first stage of the serial interference cancellation as well as in the second stage. The achievable rate when decoded in the first stage isThe achievable rate at the second stage decoding is log 2(1+PF|hk|2). Obviously, the maximum achievable rate can be obtained by decoding the information of GF users in the second phase;
Step S5, according to the step S4, the maximum achievable rate obtained by the user K is Wherein the method comprises the steps ofAndThe group when the channel gain of the unlicensed user is smaller than the decoding threshold value is represented by S 1, under the condition that the service quality of the licensed user is ensured, all unlicensed users are decoded in the first stage by S 1 =k, all unlicensed users are decoded in the second stage by S 1 =0, and the unlicensed users can be decoded in the first stage and the second stage by S 1 =k.
Step S6, the unauthorized user with the maximum rate is accessed into the resource block of the authorized user in a distributed competition mode. The expression of the signal received by the base station is thatWherein P i and g i, i E { B, F } respectively represent the transmission power and channel gain of user U i, x i is the unit power signal sent by U i, i.eN represents additive white gaussian noise with a mean of 0 and a variance of σ 2.
The safety performance of the system of the embodiment of the present invention is analyzed as follows. Deducing a probability density function and a cumulative distribution function of related variables by utilizing probability theory and sequencing theory on the basis of the step S5, deducing the safe interruption probability of the system, and obtaining the safe interruption probability of the kth unlicensed user U k when transmitting signals according to the expression of the safe interruption probability and some algebraic operations, wherein the safe interruption probability is as follows:
wherein R th represents a safe rate threshold value, εB=θB-1, AndThe safe reachable rates of the unauthorized user in group 1, group 2 and both group 1 and group 2 are respectively represented, P out,1 represents the safe outage probability of the unauthorized user U k when the authorized user is interrupted, and the other three represent the safe outage probability of the unauthorized user U k when the authorized user is not interrupted.
The closed expression of the safe interrupt probability is as follows:
when the product of the interrupt rate threshold and the safe interrupt threshold rate is less than 1:
When the product of the interrupt rate threshold and the safe interrupt threshold rate is greater than 1:
Wherein the following a, b, c correspond to the variables of the corresponding functions in the above formula, respectively. As a function of the integral of the index, ε1=αBθth,ε4=ε3+(iPBαth+1)αB,εB=θB-1,εth=θth-1,λ1=PBθth,λ2=PBαth+1,λ3=θth+1,η1=KPBθth,η2=KPBαth+1,η3=Kθth+1,η4=C0PBθth, A0=m+1,B0=K-k-n-1,C0=n+1,W0=K-k, ξ2=Wiθth+1,u1=WiPBθth,v1=u1PFε1,l1=u1ε1+PFξ3ε1+ξ2,ξ5=(Bi+Wi)θth+1,v2=u1PFε1,l2=u1ε1+ξ6PFε1+ξ5, ζ2=qjθth+1,ζ5=(bj+qj)θth+1,u2=qjPBθth,v3=u2PFε1,v4=u2PFε1,l3=u2ε1+ζ3PFε1+ζ2,l4=u2ε1+ζ6PFε1+ζ5.
Fig. 5 is an illustration of the effect of the number of unlicensed users on the probability of system security outage for non-orthogonal multiple access assistance. The parameter settings are such that R th =0.1 and R B =0.9 represent a safe rate threshold and a non-safe rate threshold, respectively. Wherein "K" represents the number of unauthorized users proposed in the present invention, "Sim" represents the monte carlo simulation result, and "Analysis" represents the theoretical Analysis result. The figure demonstrates the correctness of theoretical analysis by Monte Carlo simulation. Obviously, increasing the safe rate threshold may deteriorate the security performance of the wireless communication system. When the transmitting power of the unauthorized user is relatively high, the invention provides the user scheduling strategy which can obviously enhance the safety of the system. Fig. 6 is an effect of rate on the probability of system safe outage. The parameter is set such that k=4 represents the number of unauthorized users. Where R th=0.1,RB=0.9,Rth=0.1,RB =1.5 and R th=0.9,RB =1.5 represent rate-to-rate products less than 1 and greater than 1, respectively, while the impact of each rate on the system can be compared. "Sim" represents the monte carlo simulation result, and "Analysis" represents the theoretical Analysis result. The figure demonstrates the correctness of theoretical analysis by Monte Carlo simulation. Clearly, a rate-to-product of less than 1 can enhance the security performance of the system. In addition, simulation results show that in the case that the product of the rate and the rate is smaller than 1, the smaller the unsafe rate is, the smaller the SOP is, namely, the unsafe rate is reduced, and the better the safety of the system is.