[go: up one dir, main page]

CN118509103B - Communication system, communication method, device, communication equipment, storage medium and product - Google Patents

Communication system, communication method, device, communication equipment, storage medium and product Download PDF

Info

Publication number
CN118509103B
CN118509103B CN202410917311.8A CN202410917311A CN118509103B CN 118509103 B CN118509103 B CN 118509103B CN 202410917311 A CN202410917311 A CN 202410917311A CN 118509103 B CN118509103 B CN 118509103B
Authority
CN
China
Prior art keywords
signal
target
optimization function
communication system
antenna
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410917311.8A
Other languages
Chinese (zh)
Other versions
CN118509103A (en
Inventor
李思豪
周煌杰
杨刚
金宁
陈晓冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Original Assignee
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Technology Innovation Center, China Telecom Corp Ltd filed Critical China Telecom Technology Innovation Center
Priority to CN202410917311.8A priority Critical patent/CN118509103B/en
Publication of CN118509103A publication Critical patent/CN118509103A/en
Application granted granted Critical
Publication of CN118509103B publication Critical patent/CN118509103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Near-Field Transmission Systems (AREA)
  • Noise Elimination (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

本申请涉及一种通信系统、通信方法、装置、通信设备、存储介质和产品。该通信系统包括信号源、反向散射标签、接收端和窃听端;其中:信号源,用于发送射频信号;反向散射标签,用于发送该射频信号和干扰信号;接收端,用于接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;窃听端,用于接收组合信号。由此可见,本申请实施例提出的通信系统中,通过反向散射标签在发送射频信号的同时人为发送干扰信号,以此来降低窃听端接收到射频信号的信噪比,从而实现保密通信,提高通信系统的防窃听性能。

The present application relates to a communication system, a communication method, an apparatus, a communication device, a storage medium and a product. The communication system includes a signal source, a backscatter tag, a receiving end and an eavesdropping end; wherein: the signal source is used to send a radio frequency signal; the backscatter tag is used to send the radio frequency signal and an interference signal; the receiving end is used to receive a combined signal and identify the radio frequency signal from the combined signal; the combined signal includes a radio frequency signal and an interference signal; the eavesdropping end is used to receive the combined signal. It can be seen that in the communication system proposed in the embodiment of the present application, the interference signal is artificially sent while the radio frequency signal is sent by the backscatter tag, so as to reduce the signal-to-noise ratio of the radio frequency signal received by the eavesdropping end, thereby achieving confidential communication and improving the anti-eavesdropping performance of the communication system.

Description

通信系统、通信方法、装置、通信设备、存储介质和产品Communication system, communication method, device, communication equipment, storage medium and product

技术领域Technical Field

本申请涉及通信技术领域,特别是涉及一种通信系统、通信方法、装置、通信设备、存储介质和产品。The present application relates to the field of communication technology, and in particular to a communication system, communication method, apparatus, communication equipment, storage medium and product.

背景技术Background Art

随着通信技术和物联网技术的发展,无源物联网设备(如无源标签)在物联网通信领域的应用越来越普遍。其中,反向散射技术是无源物联网设备进行通信的核心技术;例如:传统单站反向散射通信、双站反向散射通信(Bistatic Backscatter Communication)、环境反向散射通信(Ambient Backscatter Communications,AmBC)等。With the development of communication technology and Internet of Things technology, the application of passive Internet of Things devices (such as passive tags) in the field of Internet of Things communication is becoming more and more common. Among them, backscatter technology is the core technology for passive Internet of Things devices to communicate; for example: traditional single-station backscatter communication, bistatic backscatter communication, ambient backscatter communication (AmBC), etc.

目前,应用于上述通信技术的通信系统在信息传输过程中,存在非法窃听者对反向散射通信标签发出的消息信号进行窃听的现象,给信息的安全传输带来了极大挑战。At present, in the process of information transmission in the communication system applied to the above communication technology, there is a phenomenon that illegal eavesdroppers eavesdrop on the message signals sent by the backscatter communication tags, which brings great challenges to the secure transmission of information.

因此,如何提高上述通信系统的防窃听性能成为目前亟待解决的技术问题。Therefore, how to improve the anti-eavesdropping performance of the above communication system has become a technical problem that needs to be solved urgently.

发明内容Summary of the invention

基于此,有必要针对上述技术问题,提供一种能够提高基于反射散射的通信系统的防窃听性能的通信系统、通信方法、装置、通信设备、计算机可读存储介质和计算机程序产品。Based on this, it is necessary to provide a communication system, communication method, apparatus, communication equipment, computer-readable storage medium and computer program product that can improve the anti-eavesdropping performance of a communication system based on reflection scattering in order to address the above technical problems.

第一方面,本申请提供了一种通信系统,该通信系统包括:信号源、反向散射标签、接收端和窃听端;其中:In a first aspect, the present application provides a communication system, which includes: a signal source, a backscatter tag, a receiving end, and an eavesdropping end; wherein:

信号源,用于发送射频信号;A signal source, used for sending a radio frequency signal;

反向散射标签,用于发送该射频信号和干扰信号;A backscatter tag for transmitting the radio frequency signal and the interference signal;

接收端,用于接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;A receiving end, used for receiving a combined signal and identifying a radio frequency signal from the combined signal; the combined signal includes a radio frequency signal and an interference signal;

窃听端,用于接收组合信号。The eavesdropping end is used to receive the combined signal.

在其中一个实施例中,反向散射标签上设置有第一天线和第二天线;In one of the embodiments, a first antenna and a second antenna are provided on the backscatter tag;

反向散射标签,用于通过第一天线转发射频信号,以及通过第二天线发送干扰信号。A backscatter tag is used to forward the radio frequency signal through the first antenna and send an interference signal through the second antenna.

在其中一个实施例中,信号源包括载波发生器,且与反向散射标签之间的距离小于预设距离阈值。In one embodiment, the signal source includes a carrier generator, and the distance between the signal source and the backscatter tag is less than a preset distance threshold.

在其中一个实施例中,反向散射标签,还用于将射频信号转换为能量进行供电。In one of the embodiments, the backscatter tag is also used to convert the radio frequency signal into energy for power supply.

在其中一个实施例中,接收端,具体用于接收反向散射标签发送的射频信号和干扰信号,以及接收信号源发送的射频信号。In one of the embodiments, the receiving end is specifically used to receive the radio frequency signal and the interference signal sent by the backscatter tag, and receive the radio frequency signal sent by the signal source.

在其中一个实施例中,窃听端,具体用于接收反向散射标签发送的射频信号和干扰信号,以及接收信号源发送的射频信号。In one of the embodiments, the eavesdropping end is specifically used to receive the radio frequency signal and the interference signal sent by the backscatter tag, and receive the radio frequency signal sent by the signal source.

在其中一个实施例中,该通信系统还包括:控制设备;In one of the embodiments, the communication system further includes: a control device;

控制设备,用于对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;A control device, used to adjust the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters;

其中,目标设备包括信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。The target device includes a signal source and/or a backscatter tag, and the configuration parameters include a signal beam vector of the signal source and/or a power of the backscatter tag.

第二方面,本申请提供了一种通信方法,应用于上述第一方面中的通信系统,该方法包括:In a second aspect, the present application provides a communication method, which is applied to the communication system in the first aspect, and the method includes:

信号源发送射频信号;The signal source sends a radio frequency signal;

反向散射标签发送射频信号和干扰信号;Backscatter tags send RF signals and interference signals;

接收端接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;The receiving end receives the combined signal and identifies the radio frequency signal from the combined signal; the combined signal includes the radio frequency signal and the interference signal;

窃听端接收组合信号。The eavesdropping end receives the combined signal.

第三方面,本申请提供了一种通信方法,应用于上述第一方面中的通信系统,该方法包括:In a third aspect, the present application provides a communication method, which is applied to the communication system in the first aspect, and the method includes:

对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;Adjusting the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters;

其中,目标设备包括信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。The target device includes a signal source and/or a backscatter tag, and the configuration parameters include a signal beam vector of the signal source and/or a power of the backscatter tag.

在其中一个实施例中,对目标设备的配置参数进行调整,包括:In one embodiment, adjusting the configuration parameters of the target device includes:

基于通信系统的保密容量对应的初始优化函数,构建目标优化函数;Based on the initial optimization function corresponding to the confidentiality capacity of the communication system, a target optimization function is constructed;

以目标优化函数为最大原则,通过求解目标优化函数,确定目标配置参数;Taking the target optimization function as the maximum principle, the target configuration parameters are determined by solving the target optimization function;

根据目标配置参数对目标设备的配置参数进行调整。Adjust the configuration parameters of the target device according to the target configuration parameters.

在其中一个实施例中,基于通信系统的保密容量对应的初始优化函数,构建目标优化函数,包括:In one embodiment, constructing a target optimization function based on an initial optimization function corresponding to the confidentiality capacity of the communication system includes:

从通信系统的保密容量对应的初始优化函数中提取对数函数的真数表达式,得到目标真数表达式;Extracting the real number expression of the logarithmic function from the initial optimization function corresponding to the confidentiality capacity of the communication system to obtain the target real number expression;

基于目标真数表达式构建目标优化函数。Construct a target optimization function based on the target true number expression.

在其中一个实施例中,基于目标真数表达式构建目标优化函数,包括:In one embodiment, constructing a target optimization function based on a target true number expression includes:

对目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。The target optimization function is obtained by performing concave-convex transformation on the uncertain fractions in the target real number expression.

在其中一个实施例中,对目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到目标优化函数,包括:In one embodiment, a concave-convex conversion is performed on a fraction with uncertain concave-convexity in a target real number expression to obtain a target optimization function, including:

将目标真数表达式转换为中间优化函数;Convert the target true number expression into an intermediate optimization function;

对中间优化函数中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。The uncertain fractions in the intermediate optimization function are transformed into convex and concave ones to obtain the target optimization function.

在其中一个实施例中,以目标优化函数为最大原则,通过求解目标优化函数,确定目标配置参数,包括:In one embodiment, the target optimization function is taken as the maximum principle, and the target configuration parameters are determined by solving the target optimization function, including:

获取的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率;The obtained distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end;

以目标优化函数为最大原则,信号源的信号波束矢量和反向散射标签的功率为迭代变量,将的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率代入到目标优化函数中进行迭代计算,得到目标配置参数。Taking the target optimization function as the maximum principle, the signal beam vector of the signal source and the power of the backscatter tag as iterative variables, the distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end are substituted into the target optimization function for iterative calculation to obtain the target configuration parameters.

第四方面,本申请还提供了一种通信装置,应用于上述第一方面中的通信系统,该装置包括:In a fourth aspect, the present application further provides a communication device, applied to the communication system in the first aspect, the device comprising:

调整模块,用于对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;An adjustment module, used to adjust the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters;

其中,目标设备包括信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。The target device includes a signal source and/or a backscatter tag, and the configuration parameters include a signal beam vector of the signal source and/or a power of the backscatter tag.

第五方面,本申请还提供了一种通信设备,通信设备包括:存储器,收发机,处理器:In a fifth aspect, the present application further provides a communication device, the communication device comprising: a memory, a transceiver, and a processor:

存储器,用于存储计算机程序;收发机,用于在处理器的控制下收发数据;处理器,用于读取存储器中的计算机程序并执行上述第三方面中的通信方法。A memory for storing a computer program; a transceiver for transmitting and receiving data under the control of a processor; and a processor for reading the computer program in the memory and executing the communication method in the third aspect.

第六方面,本申请还提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述第三方面中的通信方法的步骤。In a sixth aspect, the present application further provides a computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the communication method in the third aspect above.

第七方面,本申请还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现上述第三方面中的通信方法的步骤。In a seventh aspect, the present application further provides a computer program product, comprising a computer program, which, when executed by a processor, implements the steps of the communication method in the third aspect above.

上述通信系统、通信方法、装置、通信设备、存储介质和计算机程序产品,该通信系统包括信号源、反向散射标签、接收端和窃听端;其中:信号源,用于发送射频信号;反向散射标签,用于发送该射频信号和干扰信号;接收端,用于接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;窃听端,用于接收组合信号。由此可见,本申请实施例提出的通信系统中,通过反向散射标签在发送射频信号的同时人为发送干扰信号,以此来降低窃听端接收到射频信号的信噪比,从而实现保密通信,提高通信系统的防窃听性能。The above-mentioned communication system, communication method, apparatus, communication equipment, storage medium and computer program product, the communication system includes a signal source, a backscatter tag, a receiving end and an eavesdropping end; wherein: the signal source is used to send a radio frequency signal; the backscatter tag is used to send the radio frequency signal and an interference signal; the receiving end is used to receive a combined signal and identify the radio frequency signal from the combined signal; the combined signal includes a radio frequency signal and an interference signal; the eavesdropping end is used to receive the combined signal. It can be seen that in the communication system proposed in the embodiment of the present application, the interference signal is artificially sent while the radio frequency signal is sent by the backscatter tag, so as to reduce the signal-to-noise ratio of the radio frequency signal received by the eavesdropping end, thereby achieving confidential communication and improving the anti-eavesdropping performance of the communication system.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本申请实施例或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application or the related technologies, the drawings required for use in the embodiments or the related technical descriptions are briefly introduced below. Obviously, the drawings described below are only some embodiments of the present application. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.

图1为一个实施例中通信系统的结构示意图;FIG1 is a schematic diagram of the structure of a communication system in one embodiment;

图2为一个实施例中反向散射标签的结构示意图;FIG2 is a schematic diagram of the structure of a backscatter tag in one embodiment;

图3为一个实施例中通信方法的流程示意图;FIG3 is a schematic diagram of a flow chart of a communication method in one embodiment;

图4为一个实施例中通信方法的流程示意图;FIG4 is a schematic diagram of a flow chart of a communication method in one embodiment;

图5为一个实施例中通信系统的结构示意图;FIG5 is a schematic diagram of the structure of a communication system in one embodiment;

图6为一个实施例中保密容量优化的流程示意图;FIG6 is a schematic diagram of a process for optimizing confidentiality capacity in one embodiment;

图7为一个实施例中仿真结果示意图;FIG7 is a schematic diagram of simulation results in one embodiment;

图8为一个实施例中通信装置的结构框图。FIG8 is a structural block diagram of a communication device in one embodiment.

具体实施方式DETAILED DESCRIPTION

为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solution and advantages of the present application more clearly understood, the present application is further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application and are not used to limit the present application.

随着通信技术和物联网技术的发展,无源物联网设备(如无源标签)在物联网通信领域的应用越来越普遍。其中,反向散射技术是无源物联网设备进行通信的核心技术;例如:传统单站反向散射通信、双站反向散射通信(Bistatic Backscatter Communication)、环境反向散射通信(Ambient Backscatter Communications,AmBC)等。With the development of communication technology and Internet of Things technology, the application of passive Internet of Things devices (such as passive tags) in the field of Internet of Things communication is becoming more and more common. Among them, backscatter technology is the core technology for passive Internet of Things devices to communicate; for example: traditional single-station backscatter communication, bistatic backscatter communication, ambient backscatter communication (AmBC), etc.

示例性地,双站反向散射通信是一种新兴的通信技术,主要用于物联网(Internetof Things,IoT)网络。这种通信方式因其低成本和低功耗而变得流行,并成为物联网成功的关键技术。双站反向散射通信通过在标签附近设置一个载波发生器,能够有效减少路径损耗,从而扩大了标签与读写器之间的传输范围。For example, bistatic backscatter communication is an emerging communication technology mainly used in Internet of Things (IoT) networks. This communication method has become popular due to its low cost and low power consumption, and has become a key technology for the success of IoT. Bistatic backscatter communication can effectively reduce path loss by setting a carrier generator near the tag, thereby expanding the transmission range between the tag and the reader.

目前,应用于上述通信技术的通信系统在信息传输过程中,存在非法窃听者对反向散射通信标签发出的消息信号进行窃听的现象,给信息的安全传输带来了极大挑战。相关技术中,全双工的合法接收者可以主动发射人工噪声来抑制窃听者的通信性能,但这种方式会对合法接收者产生噪声干扰,且需要合法接收者具备发出人工噪声干扰的性能,才能实现防窃听功能。At present, in the process of information transmission in the communication system applied to the above communication technology, there is a phenomenon that illegal eavesdroppers eavesdrop on the message signals sent by the backscatter communication tags, which brings great challenges to the secure transmission of information. In the related technology, the legal receiver of full-duplex can actively emit artificial noise to suppress the communication performance of the eavesdropper, but this method will cause noise interference to the legal receiver, and the legal receiver needs to have the ability to emit artificial noise interference to achieve the anti-eavesdropping function.

基于此,针对上述反向散射通信窃听问题对通信安全带来的挑战,为了保障信息的安全传输,在已知合法接收者和非法窃听者的信道状态信息(CSI)的情况下,本申请实施例提出了一种保障合法接收者的物理层安全的防窃听通信系统,通过反射标签人为发送干扰信号来提高通信系统的防窃听性能,保障信息的安全传输。Based on this, in response to the challenges brought by the above-mentioned backscatter communication eavesdropping problem to communication security, in order to ensure the secure transmission of information, when the channel state information (CSI) of the legitimate receiver and the illegal eavesdropper is known, the embodiment of the present application proposes an anti-eavesdropping communication system that ensures the physical layer security of the legitimate receiver, and improves the anti-eavesdropping performance of the communication system by artificially sending interference signals through reflective tags, thereby ensuring the secure transmission of information.

另一方面,针对传统的通信系统,在理想场景下,发射端的波束矢量以及标签反射的信号功率是保持不变的,也即该通信系统的保密容量是不可改变的,导致通信系统的传输性能不高;其中,保密容量是指在特定的无线信道环境下,利用保密传输技术理论上能达到的最大保密传输性能界限。On the other hand, for traditional communication systems, in ideal scenarios, the beam vector of the transmitter and the signal power reflected by the tag remain unchanged, that is, the confidentiality capacity of the communication system cannot be changed, resulting in low transmission performance of the communication system; among them, confidentiality capacity refers to the maximum confidentiality transmission performance limit that can be theoretically achieved using confidentiality transmission technology under a specific wireless channel environment.

基于此,本申请实施例还提出了一种反向散射通信系统保密容量最大化的优化方法,能够在保障通信安全的基础上,提高通信系统的保密容量,进而提高通信系统的传输性能。Based on this, the embodiment of the present application also proposes an optimization method for maximizing the confidentiality capacity of a backscatter communication system, which can improve the confidentiality capacity of the communication system while ensuring communication security, thereby improving the transmission performance of the communication system.

下面以具体的实施例对本申请的技术方案以及本申请的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本申请的实施例进行描述。The technical solution of the present application and how the technical solution of the present application solves the above-mentioned technical problems are described in detail below with specific embodiments. The following specific embodiments can be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. The embodiments of the present application will be described below in conjunction with the accompanying drawings.

图1为本申请实施例提供的通信系统的结构示意图。如图1所示,该通信系统包括信号源11、反向散射标签12、接收端13和窃听端14;其中:信号源11,用于发送射频信号;反向散射标签12,用于发送该射频信号和干扰信号;接收端13,用于接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;窃听端14,用于接收组合信号。Fig. 1 is a schematic diagram of the structure of the communication system provided by the embodiment of the present application. As shown in Fig. 1, the communication system includes a signal source 11, a backscatter tag 12, a receiving end 13 and an eavesdropping end 14; wherein: the signal source 11 is used to send a radio frequency signal; the backscatter tag 12 is used to send the radio frequency signal and an interference signal; the receiving end 13 is used to receive a combined signal and identify the radio frequency signal from the combined signal; the combined signal includes a radio frequency signal and an interference signal; the eavesdropping end 14 is used to receive the combined signal.

示例性地,该通信系统可以包括但不限于单站反向散射系统、双站反向散射系统、环境反向散射系统、基于全双工的反向散射系统、全信号反向散射系统等一系列新型反向散射通信系统,本申请实施例对该通信系统的类型不做具体限定。相应地,该信号源11可以根据通信系统的类型进行自适应设置,如在该通信系统为环境反向散射系统的情况下,该信号源11可以为环境信号源;在该通信系统为双站反向散射系统的情况下,该信号源11可以为反向散射标签12附近的载波发生器,也即该信号源11与反向散射标签12之间的距离应小于预设距离阈值。Exemplarily, the communication system may include, but is not limited to, a series of new backscatter communication systems such as a single-station backscatter system, a dual-station backscatter system, an environmental backscatter system, a full-duplex-based backscatter system, and a full-signal backscatter system. The embodiment of the present application does not specifically limit the type of the communication system. Accordingly, the signal source 11 can be adaptively set according to the type of the communication system. For example, when the communication system is an environmental backscatter system, the signal source 11 can be an environmental signal source; when the communication system is a dual-station backscatter system, the signal source 11 can be a carrier generator near the backscatter tag 12, that is, the distance between the signal source 11 and the backscatter tag 12 should be less than the preset distance threshold.

示例性地,信号源11可以用于发送射频信号,该射频信号可以为携带信息的消息信号;反向散射标签12可以接收该射频信号,并对该射频信号进行反射;本实例中,为了避免窃听端对反向散射标签12发出的射频信号进行窃听,反向散射标签12在反射该射频信号的同时,还能发送干扰信号,即通过反向散射标签人为发送干扰信号,来降低非法窃听端接收射频信号的信噪比,实现保密通信。Exemplarily, the signal source 11 can be used to send a radio frequency signal, which can be a message signal carrying information; the backscatter tag 12 can receive the radio frequency signal and reflect the radio frequency signal; in this example, in order to prevent the eavesdropping end from eavesdropping on the radio frequency signal emitted by the backscatter tag 12, the backscatter tag 12 can also send an interference signal while reflecting the radio frequency signal, that is, the interference signal is artificially sent by the backscatter tag to reduce the signal-to-noise ratio of the radio frequency signal received by the illegal eavesdropping end, thereby achieving confidential communication.

示例性地,反向散射标签12在发送该射频信号与干扰信号时,可以将该射频信号与干扰信号进行单独发送,也可以将该射频信号与干扰信号进行信号融合后再进行混合发送。Exemplarily, when sending the radio frequency signal and the interference signal, the backscatter tag 12 may send the radio frequency signal and the interference signal separately, or may fuse the radio frequency signal and the interference signal and then send them mixedly.

在一种可选的实现方式中,参考图2所示,该反向散射标签12上可以设置有第一天线121和第二天线122;反向散射标签12,可以通过第一天线121转发射频信号,以及通过第二天线122发送干扰信号。当然,反向散射标签12,也可以通过第一天线121发送干扰信号,以及通过第二天线122转发射频信号。In an optional implementation, as shown in FIG2 , the backscatter tag 12 may be provided with a first antenna 121 and a second antenna 122; the backscatter tag 12 may forward the radio frequency signal through the first antenna 121, and send the interference signal through the second antenna 122. Of course, the backscatter tag 12 may also send the interference signal through the first antenna 121, and forward the radio frequency signal through the second antenna 122.

在另一种可选的实现方式中,反向散射标签12在接收到射频信号的情况下,还可以自动生成干扰信号,并将接收到的射频信号与该干扰信号进行信号融合,进而,通过反向散射标签12中的天线发送该融合信号。示例性地,针对这种方式,该反向散射标签12可以为单天线标签,也可以为多天线标签;在反向散射标签12为多天线标签的情况下,反向散射标签12可以通过其中任意一个天线发送该融合信号,也可以通过多个天线均发送该混合信号等。In another optional implementation, when the backscatter tag 12 receives a radio frequency signal, it can also automatically generate an interference signal, and fuse the received radio frequency signal with the interference signal, and then send the fused signal through the antenna in the backscatter tag 12. Exemplarily, for this method, the backscatter tag 12 can be a single-antenna tag or a multi-antenna tag; when the backscatter tag 12 is a multi-antenna tag, the backscatter tag 12 can send the fused signal through any one of the antennas, or send the mixed signal through multiple antennas, etc.

另外,需要说明的是,反向散射标签12在生成干扰信号时,可以按照固定信号参数生成同一种干扰信号,也可以按照预设信号规则生成不同种干扰信号,还可以根据射频信号的相关参数生成不同种干扰信号等;也就是说,反向散射标签12在转发不同的射频信号时,同步发送的干扰信号可以是相同的,也可以是不同的;本申请实施例对此不做限定。In addition, it should be noted that when generating an interference signal, the backscatter tag 12 can generate the same interference signal according to fixed signal parameters, or generate different interference signals according to preset signal rules, or generate different interference signals according to relevant parameters of the radio frequency signal, etc.; that is, when the backscatter tag 12 forwards different radio frequency signals, the interference signals sent synchronously can be the same or different; the embodiments of the present application do not limit this.

此外,对于无源标签来说,其可以通过外界发出的射频能量并将其转化为直流电源,从而为标签内的电路供电。在此基础上,本实施例中的反向散射标签12也可以将接收到的射频信号转换为能量进行供电。In addition, for passive tags, they can convert the radio frequency energy emitted by the outside world into a DC power supply to power the circuit inside the tag. On this basis, the backscatter tag 12 in this embodiment can also convert the received radio frequency signal into energy for power supply.

反向散射标签12在发送射频信号和干扰信号之后,对于接收端13而言,其可以接收包括射频信号和干扰信号在内的组合信号;示例性地,在该通信系统中,接收端13可以预先获取干扰信号,在此基础上,在接收到组合信号的情况下,便可以从该组合信号中识别出射频信号,分离出干扰信号,从而获取到信号源传输的有用信息。而对于窃听端14而言,其也可以接收到包含射频信号和干扰信号在内的组合信号,但由于该组合信号的信噪比较低,且窃听端14预先不知道干扰信号,因此,很难从该组合信号中识别出有用的射频信号,能够实现信息的安全传输。After the backscatter tag 12 sends the RF signal and the interference signal, the receiving end 13 can receive a combined signal including the RF signal and the interference signal; illustratively, in the communication system, the receiving end 13 can obtain the interference signal in advance, and on this basis, when the combined signal is received, the RF signal can be identified from the combined signal, and the interference signal can be separated, thereby obtaining useful information transmitted by the signal source. As for the eavesdropping end 14, it can also receive a combined signal including the RF signal and the interference signal, but because the signal-to-noise ratio of the combined signal is low, and the eavesdropping end 14 does not know the interference signal in advance, it is difficult to identify the useful RF signal from the combined signal, so as to achieve safe transmission of information.

上述通信系统,包括信号源、反向散射标签、接收端和窃听端;其中:信号源,用于发送射频信号;反向散射标签,用于发送该射频信号和干扰信号;接收端,用于接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号;窃听端,用于接收组合信号。由此可见,本申请实施例提出的通信系统中,通过反向散射标签在发送射频信号的同时人为发送干扰信号,以此来降低窃听端接收到射频信号的信噪比,从而实现保密通信,提高通信系统的防窃听性能。The above-mentioned communication system includes a signal source, a backscatter tag, a receiving end and an eavesdropping end; wherein: the signal source is used to send a radio frequency signal; the backscatter tag is used to send the radio frequency signal and an interference signal; the receiving end is used to receive a combined signal and identify the radio frequency signal from the combined signal; the combined signal includes a radio frequency signal and an interference signal; the eavesdropping end is used to receive the combined signal. It can be seen that in the communication system proposed in the embodiment of the present application, the backscatter tag artificially sends an interference signal while sending the radio frequency signal, so as to reduce the signal-to-noise ratio of the radio frequency signal received by the eavesdropping end, thereby achieving confidential communication and improving the anti-eavesdropping performance of the communication system.

在一个示例性的实施例中,对于上述接收端13而言,其在接收组合信号时,可以接收来自反向散射标签12发送的射频信号和干扰信号,也可以接收来自信号源11发送的射频信号;也就是说,该组合信号中可以包括反向散射标签12发送的射频信号和干扰信号、以及信号源11发送的射频信号。同样地,对于上述窃听端14而言,其在接收组合信号时,也可以接收来自反向散射标签12发送的射频信号和干扰信号,以及接收来自信号源14发送的射频信号。In an exemplary embodiment, the receiving end 13 may receive the RF signal and the interference signal sent from the backscatter tag 12, and may also receive the RF signal sent from the signal source 11 when receiving the combined signal; that is, the combined signal may include the RF signal and the interference signal sent from the backscatter tag 12, and the RF signal sent from the signal source 11. Similarly, the eavesdropping end 14 may also receive the RF signal and the interference signal sent from the backscatter tag 12, and may also receive the RF signal sent from the signal source 14 when receiving the combined signal.

在一个示例性的实施例中,上述通信系统还可以包括控制设备,该控制设备,可以用于对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;其中,该目标设备可以包括信号源和/或反向散射标签,相应地,配置参数可以包括信号源的信号波束矢量和/或反向散射标签的功率。In an exemplary embodiment, the above-mentioned communication system may further include a control device, which may be used to adjust the configuration parameters of the target device so that the target device transmits signals based on the adjusted configuration parameters; wherein the target device may include a signal source and/or a backscatter tag, and accordingly, the configuration parameters may include a signal beam vector of the signal source and/or the power of the backscatter tag.

也就是说,对于上述通信系统而言,为了实现更大的信号容量,可以仅对该通信系统中信号源的信号波束矢量进行调整,也可以仅对该通信系统中反向散射标签的功率进行调整,还可以既对该通信系统中信号源的信号波束矢量进行调整,也对对该通信系统中反向散射标签的功率进行调整,即同时调整信号源的信号波束矢量和反向散射标签的功率,来实现更大的信号容量,使得通信系统能够以更大的保密传输性能进行信息传输,从而提高通信系统的传输性能。That is to say, for the above-mentioned communication system, in order to achieve a larger signal capacity, only the signal beam vector of the signal source in the communication system may be adjusted, or only the power of the backscatter tag in the communication system may be adjusted, or both the signal beam vector of the signal source in the communication system and the power of the backscatter tag in the communication system may be adjusted, that is, the signal beam vector of the signal source and the power of the backscatter tag may be adjusted at the same time to achieve a larger signal capacity, so that the communication system can transmit information with greater confidentiality transmission performance, thereby improving the transmission performance of the communication system.

示例性地,控制设备可以通过对通信系统的保密容量表达式进行优化,来确定最大保密容量所对应的信号源的信号波束矢量以及反向散射标签的功率,从而,对信号源的信号波束矢量和/或反向散射标签的功率进行动态调整,使得信号源能够以调整后的信号波束矢量发送射频信号,和/或,使得反向散射标签以调整后的功率发送该射频信号和干扰信号。Exemplarily, the control device can determine the signal beam vector of the signal source and the power of the backscatter tag corresponding to the maximum confidentiality capacity by optimizing the confidentiality capacity expression of the communication system, thereby dynamically adjusting the signal beam vector of the signal source and/or the power of the backscatter tag, so that the signal source can send the radio frequency signal with the adjusted signal beam vector, and/or the backscatter tag can send the radio frequency signal and the interference signal with the adjusted power.

示例性地,在反向散射标签包括第一天线和第二天线的情况下,该反向散射标签的功率可以包括第一天线的发送功率和第二天线的发送功率,以便第一天线能够以调整后的发送功率发送射频信号,以及第二天线能够以调整后的发送功率发送干扰信号。需要说明的是,第一天线的发送功率和第二天线的发送功率可以相同,也可以不同。Exemplarily, in the case where the backscatter tag includes a first antenna and a second antenna, the power of the backscatter tag may include the transmit power of the first antenna and the transmit power of the second antenna, so that the first antenna can transmit the radio frequency signal with the adjusted transmit power, and the second antenna can transmit the interference signal with the adjusted transmit power. It should be noted that the transmit power of the first antenna and the transmit power of the second antenna may be the same or different.

本实施例中,可以通过对通信系统中信号源的信号波束矢量和/或反向散射标签的功率进行动态调整,确保通信系统时刻以最大信号容量进行通信,从而能够提高通信系统的传输性能。In this embodiment, the signal beam vector of the signal source in the communication system and/or the power of the backscatter tag can be dynamically adjusted to ensure that the communication system always communicates with the maximum signal capacity, thereby improving the transmission performance of the communication system.

在一个示例性的实施例中,如图3所示,提供了一种通信方法,以该方法应用于上述任一实施例中的通信系统为例进行说明,包括以下步骤,其中:In an exemplary embodiment, as shown in FIG3 , a communication method is provided, which is described by taking the method applied to the communication system in any of the above embodiments as an example, and includes the following steps, wherein:

步骤301,信号源发送射频信号。Step 301: a signal source sends a radio frequency signal.

步骤302,反向散射标签发送射频信号和干扰信号。Step 302: The backscatter tag sends a radio frequency signal and an interference signal.

步骤303,接收端接收组合信号,并从组合信号中识别出射频信号;组合信号包括射频信号和干扰信号。Step 303: The receiving end receives the combined signal and identifies the radio frequency signal from the combined signal; the combined signal includes the radio frequency signal and the interference signal.

步骤304,窃听端接收组合信号。Step 304: the eavesdropping end receives the combined signal.

采用该通信方法,在信号源通过反向散射标签向接收端发送射频信号的过程中,通过反向散射标签人为发送干扰信号,以此来降低非法接收端接收到的射频信号的信噪比,从而实现保密传输,能够提高该通信系统的防窃听性能。By adopting this communication method, when the signal source sends a radio frequency signal to the receiving end through a backscattering tag, an interference signal is artificially sent through the backscattering tag to reduce the signal-to-noise ratio of the radio frequency signal received by the illegal receiving end, thereby achieving confidential transmission and improving the anti-eavesdropping performance of the communication system.

需要说明的是,该通信方法的具体实现方式可以参考上述通信系统的各个实施例中的相关内容描述,在此不再重复赘述。It should be noted that the specific implementation of the communication method can refer to the relevant content description in each embodiment of the above-mentioned communication system, and will not be repeated here.

在一个示例性的实施例中,如图4所示,提供了一种通信方法,以该方法应用于上述任一实施例中的通信系统为例进行说明,例如,可以应用于该通信系统中的控制设备,也可以应用于该通信系统中的其他设备等;包括以下步骤,其中:In an exemplary embodiment, as shown in FIG. 4 , a communication method is provided, which is described by taking the method applied to the communication system in any of the above embodiments as an example, for example, the method can be applied to a control device in the communication system, and can also be applied to other devices in the communication system, etc.; the method includes the following steps, wherein:

步骤401,对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;其中,目标设备包括信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。Step 401, adjust the configuration parameters of the target device so that the target device transmits signals based on the adjusted configuration parameters; wherein the target device includes a signal source and/or a backscatter tag, and the configuration parameters include a signal beam vector of the signal source and/or a power of the backscatter tag.

示例性地,在反向散射标签包括多个天线的情况下,反向散射标签的功率可以包括每个天线的发送功率;例如:对于上述图2所示的反向散射标签结构,该反向散射标签可以包括第一天线和第二天线,相应地,该反向散射标签的功率可以包括第一天线的发送功率和第二天线的发送功率。Exemplarily, in the case where the backscatter tag includes multiple antennas, the power of the backscatter tag may include the transmission power of each antenna; for example: for the backscatter tag structure shown in Figure 2 above, the backscatter tag may include a first antenna and a second antenna, and accordingly, the power of the backscatter tag may include the transmission power of the first antenna and the transmission power of the second antenna.

示例性地,在对目标设备的配置参数进行调整时,可以先确定目标设备的配置参数的参数值,接着,根据确定出的目标设备的配置参数的参数值,对目标设备的配置参数进行参数调整。Exemplarily, when adjusting the configuration parameters of the target device, the parameter values of the configuration parameters of the target device may be determined first, and then the configuration parameters of the target device may be adjusted according to the determined parameter values of the configuration parameters of the target device.

可选地,可以基于通信系统的保密容量对应的初始优化函数,构建目标优化函数;并以该目标优化函数为最大原则,通过求解目标优化函数,确定目标配置参数;进而,根据该目标配置参数对目标设备的配置参数进行调整。其中,保密容量的初始优化函数可以为基于通信系统的相关通信参数以及保密容量的计算表达式确定出的优化函数;目标优化函数可以为对初始优化函数进行变形或转换后得到的优化函数;例如:对初始优化函数的凹凸性进行转换后得到凸优化函数,作为该目标优化函数;又如:将初始优化函数中的部分函数提取出来作为目标优化函数等。Optionally, a target optimization function can be constructed based on the initial optimization function corresponding to the confidentiality capacity of the communication system; and the target optimization function is used as the maximum principle to determine the target configuration parameters by solving the target optimization function; and then, the configuration parameters of the target device are adjusted according to the target configuration parameters. Among them, the initial optimization function of the confidentiality capacity can be an optimization function determined based on the relevant communication parameters of the communication system and the calculation expression of the confidentiality capacity; the target optimization function can be an optimization function obtained by deforming or transforming the initial optimization function; for example: the convexity of the initial optimization function is transformed to obtain a convex optimization function as the target optimization function; for example: some functions in the initial optimization function are extracted as the target optimization function, etc.

需要说明的是,在基于初始优化函数确定目标优化函数时,可以采用至少一个变形和/或转换来得到目标优化函数,本申请实施例对确定目标优化函数的方式不做具体限定。It should be noted that when determining the target optimization function based on the initial optimization function, at least one deformation and/or transformation can be used to obtain the target optimization function. The embodiment of the present application does not specifically limit the method for determining the target optimization function.

上述通信方法中,通过对通信系统中的目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;其中,目标设备包括通信系统中的信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。采用该通信方法,不仅能够通过反向散射标签在发送射频信号的同时人为发送干扰信号,以此来降低窃听端接收到射频信号的信噪比,从而实现保密通信,提高通信系统的防窃听性能;还能通过对通信系统的保密容量进行优化,并通过对通信系统中信号源的信号波束矢量和/或反向散射标签的功率进行动态调整,来确保通信系统时刻以最大信号容量进行通信,从而能够提高通信系统的传输性能。In the above communication method, the configuration parameters of the target device in the communication system are adjusted so that the target device transmits signals based on the adjusted configuration parameters; wherein the target device includes a signal source and/or a backscattering tag in the communication system, and the configuration parameters include a signal beam vector of the signal source and/or the power of the backscattering tag. By adopting this communication method, not only can the backscattering tag artificially send an interference signal while sending a radio frequency signal, so as to reduce the signal-to-noise ratio of the radio frequency signal received by the eavesdropping end, thereby achieving confidential communication and improving the anti-eavesdropping performance of the communication system; but also by optimizing the confidentiality capacity of the communication system and dynamically adjusting the signal beam vector of the signal source and/or the power of the backscattering tag in the communication system, it is ensured that the communication system always communicates with the maximum signal capacity, thereby improving the transmission performance of the communication system.

在一个示例性的实施例中,在保密容量的初始优化函数中包括对数函数的情况下,由于直接求解对数函数较为复杂,而对数函数的内部分式,即对数函数的真数部分与原对数函数满足同增减的函数性质,因此,在对对数函数进行优化时,可以基于对数函数的内部分式构造新的目标优化函数。基于此,上述基于通信系统的保密容量对应的初始优化函数,构建目标优化函数,可以包括:In an exemplary embodiment, when the initial optimization function of the confidentiality capacity includes a logarithmic function, it is relatively complicated to directly solve the logarithmic function, and the internal fraction of the logarithmic function, that is, the real part of the logarithmic function and the original logarithmic function satisfy the function property of increasing and decreasing together. Therefore, when optimizing the logarithmic function, a new target optimization function can be constructed based on the internal fraction of the logarithmic function. Based on this, the above-mentioned construction of the target optimization function based on the initial optimization function corresponding to the confidentiality capacity of the communication system may include:

从通信系统的保密容量对应的初始优化函数中提取对数函数的真数表达式,得到目标真数表达式;基于目标真数表达式构建目标优化函数。The true number expression of the logarithmic function is extracted from the initial optimization function corresponding to the confidentiality capacity of the communication system to obtain the target true number expression; and the target optimization function is constructed based on the target true number expression.

示例性地,在该目标真数表达式为一个非凸问题的情况下,由于非凸问题难以用传统的凸优化解决方法,如牛顿法、梯度下降法等方法对非凸问题加以解决,因此,对于非凸的目标真数表达式,在基于目标真数表达式构建目标优化函数时,还可以对该目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。也就是说,对该目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到该分式对应的转换后的分式;接着,基于转换后的分式和该目标真数表达式中的其他分式构建目标优化函数。Exemplarily, when the target real number expression is a non-convex problem, since non-convex problems are difficult to solve using traditional convex optimization methods, such as Newton's method, gradient descent method, etc., for non-convex target real number expressions, when constructing a target optimization function based on the target real number expression, the fraction with uncertain concavity and convexity in the target real number expression can also be converted into concavity and convexity to obtain the target optimization function. In other words, the fraction with uncertain concavity and convexity in the target real number expression is converted into a concavity and convexity to obtain the converted fraction corresponding to the fraction; then, the target optimization function is constructed based on the converted fraction and other fractions in the target real number expression.

示例性地,在对目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到目标优化函数时,还可以先将目标真数表达式转换为中间优化函数,即将表达式转换为函数形式,接着,再对该中间优化函数中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。例如:可以将该目标真数表达式等于一个未知参数,接着将该等式转换为求解该未知参数的函数形式,即得到中间优化函数。Exemplarily, when performing a concave-convex conversion on the uncertain fraction in the target true number expression to obtain the target optimization function, the target true number expression can also be first converted into an intermediate optimization function, that is, the expression is converted into a function form, and then the uncertain fraction in the intermediate optimization function is further converted into a concave-convex conversion to obtain the target optimization function. For example, the target true number expression can be equal to an unknown parameter, and then the equation can be converted into a function form for solving the unknown parameter, that is, the intermediate optimization function is obtained.

进一步地,上述以目标优化函数为最大原则,通过求解目标优化函数,确定目标配置参数,可以包括:Furthermore, the above-mentioned determination of target configuration parameters by solving the target optimization function with the target optimization function as the maximum principle may include:

获取的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率;以目标优化函数为最大原则,信号源的信号波束矢量和反向散射标签的功率为迭代变量,将的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率代入到目标优化函数中进行迭代计算,得到目标配置参数。The distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end are obtained; taking the target optimization function as the maximum principle, the signal beam vector of the signal source and the power of the backscattering tag are taken as iterative variables, and the distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end are substituted into the target optimization function for iterative calculation to obtain the target configuration parameters.

也就是说,对于该通信系统,可以先获取该通信系统的预设通信参数,该预设通信参数可以包括计算通信系统的保密容量所需的多个参数,如各设备之间的信道增益、接收端的噪声功率以及窃听端的噪声功率;其中,设备间的信道增益可以通过设备间的距离值进行计算得到。需要说明的是,该预设通信参数中不包括需要进行优化的变量参数,即不包括信号源的信号波束矢量和反向散射标签的功率。That is to say, for the communication system, the preset communication parameters of the communication system can be obtained first, and the preset communication parameters can include multiple parameters required for calculating the confidentiality capacity of the communication system, such as the channel gain between each device, the noise power of the receiving end, and the noise power of the eavesdropping end; wherein the channel gain between devices can be calculated by the distance value between the devices. It should be noted that the preset communication parameters do not include variable parameters that need to be optimized, that is, they do not include the signal beam vector of the signal source and the power of the backscatter tag.

接着,将该通信系统的预设通信参数代入到目标优化函数中,可以得到用于计算迭代变量的目标优化函数,进而,以目标优化函数为最大原则,在预设约束条件下对该目标优化函数进行迭代计算,从而得到通信系统的目标配置参数,该目标配置参数包括信号源的信号波束矢量和反向散射标签的功率。Next, the preset communication parameters of the communication system are substituted into the target optimization function to obtain the target optimization function for calculating the iterative variables. Then, taking the target optimization function as the maximum principle, the target optimization function is iteratively calculated under the preset constraints to obtain the target configuration parameters of the communication system. The target configuration parameters include the signal beam vector of the signal source and the power of the backscatter tag.

本实施例中,通过将保密容量的对数函数中的真数表达式提取出来,构建中间优化函数,并通过对该中间优化函数中凹凸性不确定的分式进行凹凸转换,得到保密容量的目标优化函数;接着,将通信系统的预设通信参数代入到目标优化函数中,形成用于求解信号源的信号波束矢量和反向散射标签的功率的目标优化函数,进而以目标优化函数为最大原则进行迭代计算,从而得到最大保密容量对应的信号源的信号波束矢量和反向散射标签的功率,以对该通信系统中信号源的信号波束矢量进行调整,以及对反向散射标签的功率进行调整;进而使得该通信系统时刻以最大保密容量进行通信,提高通信系统的传输性能。In this embodiment, the real number expression in the logarithmic function of the confidentiality capacity is extracted to construct an intermediate optimization function, and the target optimization function of the confidentiality capacity is obtained by performing a concave-convex conversion on the uncertain fraction in the intermediate optimization function; then, the preset communication parameters of the communication system are substituted into the target optimization function to form a target optimization function for solving the signal beam vector of the signal source and the power of the backscatter tag, and then iterative calculation is performed based on the target optimization function as the maximum principle to obtain the signal beam vector of the signal source and the power of the backscatter tag corresponding to the maximum confidentiality capacity, so as to adjust the signal beam vector of the signal source in the communication system and adjust the power of the backscatter tag; thereby, the communication system communicates at the maximum confidentiality capacity at all times, thereby improving the transmission performance of the communication system.

下面以通信系统的信道为瑞丽衰落信道为例,对通信系统的保密容量进行优化介绍。参考图5所示,其示出了一种通信系统的结构模型,该通信系统包括多天线信号源,用以发送射频信号s(n),该射频信号可以为正弦信号;双天线的反向散射标签,用以反射信号源的射频信号,其中,第一天线发送射频信号c(n),第二天线发送干扰信号x(n);单天线的合法接收端,接收来自反向散射标签的射频信号,并能够解调出干扰信号;单天线的非法窃听端,用以窃听反向散射标签反射的射频信号,但无法解调出干扰信号。The following takes the channel of the communication system as the Ruili fading channel as an example to optimize the confidentiality capacity of the communication system. Referring to Figure 5, it shows a structural model of a communication system, which includes a multi-antenna signal source for sending a radio frequency signal s(n), which can be a sinusoidal signal; a dual-antenna backscattering tag for reflecting the radio frequency signal of the signal source, wherein the first antenna sends a radio frequency signal c(n) and the second antenna sends an interference signal x(n); a single-antenna legal receiving end for receiving the radio frequency signal from the backscattering tag and being able to demodulate the interference signal; and a single-antenna illegal eavesdropping end for eavesdropping the radio frequency signal reflected by the backscattering tag, but being unable to demodulate the interference signal.

构建保密容量的初始优化函数时需要用到通信系统中的多个预设通信参数,包括通信系统中各设备间的距离、多天线信号源发送的射频信号s(n)、多天线信号源的最大发射功率Pmax、多天线信号源的发送信号波束矢量w、各信道增益、双天线反向散射标签的最大功率PTmax、双天线反向散射标签中第一天线发送的射频信号c(n);双天线反向散射标签中第一天线发送的射频信号功率PT1、双天线反向散射标签中第二天线发送的干扰信号x(n)、双天线反向散射标签中第二天线发送的干扰信号功率PT2、合法接受端的噪声功率、以及非法窃听端的噪声功率When constructing the initial optimization function of the confidentiality capacity, multiple preset communication parameters in the communication system are required, including the distance between each device in the communication system, the radio frequency signal s(n) sent by the multi-antenna signal source, the maximum transmission power P max of the multi-antenna signal source, the transmission signal beam vector w of the multi-antenna signal source, the gain of each channel, the maximum power P Tmax of the dual-antenna backscattering tag, the radio frequency signal c(n) sent by the first antenna in the dual-antenna backscattering tag; the radio frequency signal power P T1 sent by the first antenna in the dual-antenna backscattering tag, the interference signal x(n) sent by the second antenna in the dual-antenna backscattering tag, the interference signal power P T2 sent by the second antenna in the dual-antenna backscattering tag, and the noise power of the legitimate receiving end. , and the noise power of the illegal eavesdropping end .

其中,各信道增益包括:信号源与反向散射标签的第一天线之间的信道增益hST1;信号源与反向散射标签的第二天线之间的信道增益hST2;信号源与接收端之间的信道增益hSR;信号源与窃听端之间的信道增益hSE;表示反向散射标签的第一天线与接收端之间的信道增益hTR1;反向散射标签的第二天线与接收端之间的信道增益hTR2;反向散射标签的第一天线与窃听端之间的信道增益hTE1;反向散射标签的第二天线与窃听端之间的信道增益hTE2Among them, each channel gain includes: the channel gain h ST1 between the signal source and the first antenna of the backscatter tag; the channel gain h ST2 between the signal source and the second antenna of the backscatter tag; the channel gain h SR between the signal source and the receiving end; the channel gain h SE between the signal source and the eavesdropping end; the channel gain h TR1 between the first antenna of the backscatter tag and the receiving end; the channel gain h TR2 between the second antenna of the backscatter tag and the receiving end; the channel gain h TE1 between the first antenna of the backscatter tag and the eavesdropping end; the channel gain h TE2 between the second antenna of the backscatter tag and the eavesdropping end.

需要说明的是,h表示增益向量,由于信号源为多天线信号源,因此,信号源与其他设备之间的增益包括多个天线与其他设备之间的增益。h表示增益值,即一个天线与其他设备之间的增益。It should be noted that h represents a gain vector. Since the signal source is a multi-antenna signal source, the gain between the signal source and other devices includes the gain between multiple antennas and other devices. h represents a gain value, that is, the gain between one antenna and other devices.

另外,各信道增益可以通过通信系统中各设备之间的距离来确定。示例性地,通信系统中所涉及的衰落信道可以均为独立同分布的瑞利衰落信道,所有涉及到的直射信道的信道增益的路径损耗pl可以通过公式(1)计算得到。In addition, each channel gain can be determined by the distance between each device in the communication system. Exemplarily, the fading channels involved in the communication system can all be independent and identically distributed Rayleigh fading channels, and the path loss pl of the channel gain of all the direct channels involved can be calculated by formula (1).

(1) (1)

其中,k是一个依赖于天线特性和平均信道损耗的常系数,d0为天线远场的参考距离,d为两个设备之间的距离,α为路径损耗指数。Where k is a constant coefficient that depends on the antenna characteristics and the average channel loss, d0 is the reference distance of the antenna far field, d is the distance between the two devices, and α is the path loss exponent.

在确定出两个设备间信道的信道增益的路径损耗pl的情况下,可以基于该路径损耗pl,通过模拟两个设备之间的瑞利衰落信道,便可得到两个设备间信道的信道增益h。When the path loss pl of the channel gain of the channel between the two devices is determined, the channel gain h of the channel between the two devices can be obtained based on the path loss pl by simulating the Rayleigh fading channel between the two devices.

此外,需要说明的是,多天线信号源的发射功率是变化的,为0~Pmax,其中Pmax可以根据实际需求确定;双天线反向散射标签的功率也是变化的,第一天线功率为PT1,第二天线功率为PT2,满足PT1+PT2∈(0~PTmax),其中PTmax也可以根据实际需求确定;单天线接收端的环境噪声为:,其中为合法接收端的噪声功率;单天线非法窃听端的环境噪声为:,其中为非法窃听端的噪声功率。In addition, it should be noted that the transmission power of the multi-antenna signal source is variable, ranging from 0 to P max , where P max can be determined according to actual needs; the power of the dual-antenna backscatter tag is also variable, the power of the first antenna is P T1 , and the power of the second antenna is P T2 , satisfying P T1 +P T2 ∈ (0 to P Tmax ), where P Tmax can also be determined according to actual needs; the environmental noise of the single-antenna receiving end is: ,in is the noise power of the legal receiving end; the environmental noise of the single-antenna illegal eavesdropping end is: ,in is the noise power of the illegal eavesdropping end.

对于该通信系统,射频信号c(n)在合法接收端和非法窃听端均可以解调;干扰信号x(n)在合法接收端可以解调,在非法窃听端不能解调;信号源发送的射频信号s(n) 在合法接收端和非法窃听端均可以解调。For this communication system, the RF signal c(n) can be demodulated at both the legal receiving end and the illegal eavesdropping end; the interference signal x(n) can be demodulated at the legal receiving end but cannot be demodulated at the illegal eavesdropping end; the RF signal s(n) sent by the signal source can be demodulated at both the legal receiving end and the illegal eavesdropping end.

系统优化的参数包括:多天线信号源的发送信号波束矢量w、双天线反向散射标签中第一天线的发送功率PT1、以及第二天线的发送功率PT2The system optimized parameters include: the transmit signal beam vector w of the multi-antenna signal source, the transmit power P T1 of the first antenna in the dual-antenna backscatter tag, and the transmit power P T2 of the second antenna.

参考图6所示,通信系统的保密容量优化可以包括以下步骤:Referring to FIG6 , the confidentiality capacity optimization of the communication system may include the following steps:

步骤S1,根据通信系统给定的既定参数确定通信系统保密容量Cs表达式。Step S1, determining the expression of the confidentiality capacity Cs of the communication system according to the predetermined parameters given by the communication system.

合法接收端的接收信号表达式为:The received signal expression of the legal receiving end is:

(2) (2)

式中zR(n)表示合法接收端的噪声信号。Where z R (n) represents the noise signal at the legitimate receiving end.

将信号源发送的射频信号s(n)进行功率归一化,即令,令,将第一天线发送的射频信号c(n)进行功率归一化,即令,将第二天线发送的干扰信号x(n)进行功率归一化,即令,同时由于,故合法接收端的信干噪比可以表示为:Normalize the power of the RF signal s(n) sent by the signal source, that is, ,make , normalize the power of the RF signal c(n) sent by the first antenna, that is, , normalize the power of the interference signal x(n) sent by the second antenna, that is, , and because , so the signal-to-interference-noise ratio of the legal receiving end can be expressed as:

(3) (3)

非法窃听端的接收信号表达式为:The received signal expression of the illegal eavesdropping end is:

(4) (4)

式中zE(n)表示非法窃听端的噪声信号。同时令,则非法窃听端的信干噪比可以表示为:Where z E (n) represents the noise signal of the illegal eavesdropping end. , then the signal-to-interference-to-noise ratio of the illegal eavesdropping end can be expressed as:

(5) (5)

由香农定理,此时通信系统的保密容量CS为:According to Shannon's theorem, the confidentiality capacity CS of the communication system is:

(6) (6)

步骤S2,由于保密容量Cs的表达式为对数(log)形式,对数的真数表达式,即log内部表达式,与Cs表达式的单调情况相同,故可以基于log内部表达式确定目标优化函数。Step S2, since the expression of the confidentiality capacity Cs is in logarithmic (log) form, the real number expression of the logarithm, that is, the log internal expression, is the same as the monotonicity of the Cs expression, so the target optimization function can be determined based on the log internal expression.

其中,保密容量Cs的对数函数中的真数表达式为:Among them, the true number expression in the logarithmic function of the confidentiality capacity Cs is:

(7) (7)

示例性地,可以采用分式规划的方法对上述公式(7)进行处理,令:For example, the above formula (7) can be processed by using the fractional programming method, and:

(8) (8)

基于该公式(8),可以构造中间优化函数Based on formula (8), the intermediate optimization function can be constructed :

(9) (9)

上述公式(9)中最后一行为常数和线性项,无需处理;上述公式(9)中第2行和第3行,在高信噪比的条件下,项中的噪声功率较小,而的值大于1(即保密容量Cs>1),因此这两项均为负值,所这两项为凹函数。The last line in the above formula (9) is a constant and a linear term, which does not need to be processed; the second and third lines in the above formula (9) are, under the condition of high signal-to-noise ratio, and The noise power in the term is small, and The value of is greater than 1 (that is, the confidentiality capacity Cs>1), so both of these two items are negative values, so these two items are concave functions.

由于中间优化函数中分式的凹凸性不确定,因此,可以对该分式进行凹凸转换;示例性地,可以采用连续凸逼近算法(successive convex approximation,SCA)算法对该分式进行连续凸逼近处理,其中,SCA算法是一种解决非凸优化问题的算法,其基本思想是将一个非凸问题转化为包含多个凸子问题的序列,通过不断的求解凸子问题逼近原问题的最优解。SCA算法的主要优势在于其高效性和精度,能够在相对较短的时间内求解复杂的非凸优化问题。Since the intermediate optimization function Middle division The convexity of is uncertain, so the fraction can be converted to convex; for example, the successive convex approximation (SCA) algorithm can be used to continuously convexly approximate the fraction, where the SCA algorithm is an algorithm for solving non-convex optimization problems. Its basic idea is to transform a non-convex problem into a sequence of multiple convex sub-problems, and to approximate the optimal solution of the original problem by continuously solving convex sub-problems. The main advantage of the SCA algorithm is its high efficiency and accuracy, and it can solve complex non-convex optimization problems in a relatively short time.

采用SCA算法,将上述凹凸性不确定的分式进行一阶泰勒展开,得到变形后的分式为:Using the SCA algorithm, the above uncertain concavity fraction is subjected to first-order Taylor expansion, and the deformed fraction is obtained as follows:

(10) (10)

式中,wt代表每次最优化求解中更新的解。Where wt represents the updated solution in each optimization solution.

经过上述凹凸转换处理,结合公式(9)和(10),可以得到目标优化函数为:After the above-mentioned concave-convex conversion process, combined with formulas (9) and (10), the target optimization function can be obtained: for:

(11) (11)

此时,目标优化函数为凹函数形式,可以使用CVX工具(CVX工具箱是MATLAB一个用于凸优化的建模和求解工具箱),对其进行优化求解;At this time, the target optimization function is in the form of a concave function, and the CVX tool (CVX toolbox is a modeling and solving toolbox for convex optimization in MATLAB) can be used to optimize and solve it;

整理优化问题为:The optimization problem is organized as:

其中,优化约束条件为:s.t. Among them, the optimization constraints are: , .

步骤S3,初始化波束矢量w、初始化反向散射标签的第一天线功率PT1以及第二天线功率PT1,得到初始保密容量Cs,同时,基于该通信系统的通信参数初始化目标优化函数,并设置迭代次数k=0,设置条件阈值 ɛ >0。Step S3, initialize the beam vector w, initialize the first antenna power P T1 and the second antenna power P T1 of the backscatter tag, obtain the initial confidentiality capacity Cs, and at the same time, initialize the target optimization function based on the communication parameters of the communication system , and set the number of iterations k=0, and set the conditional threshold ɛ >0.

步骤S4:根据初始化或迭代求解并更新目标优化函数。Step S4: Solve and update the target optimization function according to initialization or iteration.

步骤S5:对目标优化函数在约束条件下求解最大值,并得到对应新解wtStep S5: Optimize the target function under the constraints Solve for the maximum value and obtain the corresponding new solution w t .

步骤S6:对目标优化函数在约束条件下求解最大值,并得到新解PT1和PT2Step S6: Optimize the target function under the constraints Solve for the maximum value and obtain new solutions P T1 and P T2 .

步骤S7:根据新解wt、PT1、PT2计算新的保密容量Step S7: Calculate the new confidentiality capacity based on the new solution w t , PT1 , PT2 .

步骤S8:判断此时是否满足条件,若满足则跳出循环并返回保密容量,否则进行S9。Step S8: Determine whether the condition is met at this time If satisfied, it will exit the loop and return the confidentiality capacity , otherwise proceed to S9.

需要说明的是,在每次迭代判断时,该判断条件中的CS为上一次迭代计算得到的保密容量。It should be noted that, in each iterative judgment, the CS in the judgment condition is the confidentiality capacity calculated in the previous iterative calculation.

步骤S9:将新的保密容量赋值给CS,wt赋值给w,更新PT1和PT2,令k=k+1,跳转步骤S4。Step S9: Set the new confidential capacity Assign it to C S , assign w t to w, update PT1 and PT2 , set k=k+1, and jump to step S4.

循环结果后,可以得到最后一个迭代计算的保密容量,即为该通信系统的最大保密容量;最后一个迭代计算得到的wt、PT1、PT2即为最大保密容量对应的信号源的信号波束矢量、以及反向散射标签的第一天线的发送功率和第二天线的发送功率。After looping the results, the confidentiality capacity of the last iterative calculation can be obtained, which is the maximum confidentiality capacity of the communication system; w t , PT1 , and PT2 obtained by the last iterative calculation are the signal beam vector of the signal source corresponding to the maximum confidentiality capacity, as well as the transmission power of the first antenna and the transmission power of the second antenna of the backscattering tag.

示例性地,在仿真环境中搭建上述通信系统,可以设置一个四天线的信号源,双天线的反向散射标签,其中第一天线发送射频信号,第二天线发送干扰信号,单天线的合法接收端,单天线的非法窃听端。假设信号源距离反向散射标签100m,距离合法接收端和非法窃听端距离均为105m,合法接收端和非法窃听端距离反向散射标签均为5m。信号源功率和反向散射标签的功率均根据实际需求确定。Exemplarily, the above communication system is built in a simulation environment. A four-antenna signal source, a dual-antenna backscatter tag, where the first antenna sends a radio frequency signal and the second antenna sends an interference signal, a single-antenna legal receiving end, and a single-antenna illegal eavesdropping end can be set. Assume that the signal source is 100m away from the backscatter tag, 105m away from the legal receiving end and the illegal eavesdropping end, and 5m away from the legal receiving end and the illegal eavesdropping end. The power of the signal source and the power of the backscatter tag are determined according to actual needs.

在仿真时随机初始化信号源的波束矢量,初始时平均分配反向散射标签中发送射频信号的功率和干扰信号的功率,得到初始保密容量值。通过上述图6所示的优化流程图,进行MATLAB仿真,可以得到图7的仿真结果。仿真分别比较了未优化(基线算法)、仅优化标签tag功率分配、仅优化波束矢量w以及同时优化tag功率分配和波束矢量w。参考图7所示,可以看出,通信系统初始化保密容量的值为0.23,经过优化后可以得到新的保密容量值为2.00,该通信系统的传输性能提升约9.4dB。同时由仿真结果可知,相较于优化tag的功率分配,信号源波束矢量w的优化对通信系统性能的提升起到了主要作用。由此可见此系统具有一定的工程价值。During the simulation, the beam vector of the signal source is randomly initialized, and the power of the RF signal sent in the backscatter tag and the power of the interference signal are evenly distributed at the beginning to obtain the initial confidentiality capacity value. Through the optimization flowchart shown in Figure 6 above, MATLAB simulation is performed to obtain the simulation results of Figure 7. The simulation compares the unoptimized (baseline algorithm), only optimized tag power allocation, only optimized beam vector w, and simultaneously optimized tag power allocation and beam vector w. Referring to Figure 7, it can be seen that the value of the communication system's initial confidentiality capacity is 0.23. After optimization, the new confidentiality capacity value can be obtained to be 2.00, and the transmission performance of the communication system is improved by about 9.4dB. At the same time, it can be seen from the simulation results that compared with optimizing the power allocation of the tag, the optimization of the signal source beam vector w plays a major role in improving the performance of the communication system. This shows that this system has certain engineering value.

本申请提出的通信方法的贡献在于,对于多天线的反向散射通信系统,在存在窃听者的情况下,一方面,通过在反向散射标签端人为发送干扰信号,降低非法窃听者接收射频信号的信噪比,实现保密通信,即实现了更安全的通信系统,提高了通信系统的防窃听性能;另一方面,通过优化信号源发送信号波束矢量,以及优化反向散射标签的功率分配,根据约束条件,最大化通信系统的保密容量,提高了通信系统的传输性能;另外,对于通信系统的保密容量优化,创新性的将SCA思想和分式规划思想运用到保密容量的优化问题的求解中,以实现一定条件下通信系统的最佳保密容量,能够简化保密容量的优化复杂性,提高保密容量优化效率。The contribution of the communication method proposed in the present application is that, for a multi-antenna backscatter communication system, in the presence of an eavesdropper, on the one hand, by artificially sending an interference signal at the backscatter tag end, the signal-to-noise ratio of the radio frequency signal received by the illegal eavesdropper is reduced, thereby achieving confidential communication, that is, realizing a more secure communication system and improving the anti-eavesdropping performance of the communication system; on the other hand, by optimizing the signal beam vector of the signal source sending the signal, and optimizing the power allocation of the backscatter tag, according to the constraint conditions, the confidentiality capacity of the communication system is maximized, thereby improving the transmission performance of the communication system; in addition, for the optimization of the confidentiality capacity of the communication system, the SCA idea and the fractional programming idea are innovatively applied to the solution of the optimization problem of the confidentiality capacity, so as to achieve the optimal confidentiality capacity of the communication system under certain conditions, which can simplify the optimization complexity of the confidentiality capacity and improve the optimization efficiency of the confidentiality capacity.

应该理解的是,虽然如上所述的各实施例所涉及的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,如上所述的各实施例所涉及的流程图中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that, although the various steps in the flowcharts involved in the above-mentioned embodiments are displayed in sequence according to the indication of the arrows, these steps are not necessarily executed in sequence according to the order indicated by the arrows. Unless there is a clear explanation in this article, the execution of these steps does not have a strict order restriction, and these steps can be executed in other orders. Moreover, at least a part of the steps in the flowcharts involved in the above-mentioned embodiments can include multiple steps or multiple stages, and these steps or stages are not necessarily executed at the same time, but can be executed at different times, and the execution order of these steps or stages is not necessarily to be carried out in sequence, but can be executed in turn or alternately with other steps or at least a part of the steps or stages in other steps.

基于同样的发明构思,本申请实施例还提供了一种用于实现上述所涉及的通信方法的通信装置。该装置所提供的解决问题的实现方案与上述方法中所记载的实现方案相似,故下面所提供的一个或多个通信装置实施例中的具体限定可以参见上文中对于通信方法的限定,在此不再赘述。Based on the same inventive concept, the embodiment of the present application also provides a communication device for implementing the communication method involved above. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the above method, so the specific limitations in one or more communication device embodiments provided below can refer to the limitations on the communication method above, and will not be repeated here.

在一个示例性的实施例中,如图8所示,提供了一种通信装置,包括:调整模块801,其中:In an exemplary embodiment, as shown in FIG8 , a communication device is provided, including: an adjustment module 801, wherein:

调整模块801,用于对目标设备的配置参数进行调整,以使目标设备基于调整后的配置参数进行信号传输;其中,目标设备包括信号源和/或反向散射标签,配置参数包括信号源的信号波束矢量和/或反向散射标签的功率。The adjustment module 801 is used to adjust the configuration parameters of the target device so that the target device transmits signals based on the adjusted configuration parameters; wherein the target device includes a signal source and/or a backscatter tag, and the configuration parameters include a signal beam vector of the signal source and/or the power of the backscatter tag.

在其中一个实施例中,调整模块801,用于基于通信系统的保密容量对应的初始优化函数,构建目标优化函数;以目标优化函数为最大原则,通过求解目标优化函数,确定目标配置参数;根据目标配置参数对目标设备的配置参数进行调整。In one of the embodiments, the adjustment module 801 is used to construct a target optimization function based on an initial optimization function corresponding to the confidentiality capacity of the communication system; determine the target configuration parameters by solving the target optimization function based on the maximum principle; and adjust the configuration parameters of the target device according to the target configuration parameters.

在其中一个实施例中,调整模块801,用于从通信系统的保密容量对应的初始优化函数中提取对数函数的真数表达式,得到目标真数表达式;基于目标真数表达式构建目标优化函数。In one embodiment, the adjustment module 801 is used to extract the real number expression of the logarithmic function from the initial optimization function corresponding to the confidentiality capacity of the communication system to obtain the target real number expression; and construct the target optimization function based on the target real number expression.

在其中一个实施例中,调整模块801,用于对目标真数表达式中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。In one embodiment, the adjustment module 801 is used to perform concave-convex conversion on the fraction with uncertain concave-convexity in the target real number expression to obtain the target optimization function.

在其中一个实施例中,调整模块801,用于将目标真数表达式转换为中间优化函数;对中间优化函数中凹凸性不确定的分式进行凹凸转换,得到目标优化函数。In one embodiment, the adjustment module 801 is used to convert the target real number expression into an intermediate optimization function; perform concave-convex conversion on the uncertain fraction in the intermediate optimization function to obtain the target optimization function.

在其中一个实施例中,调整模块801,用于获取的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率;以目标优化函数为最大原则,信号源的信号波束矢量和反向散射标签的功率为迭代变量,将的通信系统中每两个设备之间的距离值、接收端的噪声功率以及窃听端的噪声功率代入到目标优化函数中进行迭代计算,得到目标配置参数。In one of the embodiments, the adjustment module 801 is used to obtain the distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end; taking the target optimization function as the maximum principle, the signal beam vector of the signal source and the power of the backscatter tag are used as iterative variables, and the distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end are substituted into the target optimization function for iterative calculation to obtain the target configuration parameters.

上述通信装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Each module in the above communication device can be implemented in whole or in part by software, hardware or a combination thereof. Each module can be embedded in or independent of a processor in a computer device in the form of hardware, or can be stored in a memory in a computer device in the form of software, so that the processor can call and execute operations corresponding to each module.

在一个示例性的实施例中,提供了一种通信设备,该通信设备包括:存储器、收发机和处理器;In an exemplary embodiment, a communication device is provided, the communication device comprising: a memory, a transceiver, and a processor;

存储器,用于存储计算机程序;收发机,用于在处理器的控制下收发数据;处理器,用于读取存储器中的计算机程序并执行上述任一实施例中的通信方法的步骤。A memory is used to store a computer program; a transceiver is used to send and receive data under the control of a processor; and a processor is used to read the computer program in the memory and execute the steps of the communication method in any of the above embodiments.

在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现上述任一实施例中的通信方法的步骤。In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored. When the computer program is executed by a processor, the steps of the communication method in any of the above embodiments are implemented.

在一个实施例中,提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现上述任一实施例中的通信方法的步骤。In one embodiment, a computer program product is provided, including a computer program, which implements the steps of the communication method in any of the above embodiments when executed by a processor.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-OnlyMemory,ROM)、磁带、软盘、闪存、光存储器、高密度嵌入式非易失性存储器、阻变存储器(ReRAM)、磁变存储器(Magnetoresistive Random Access Memory,MRAM)、铁电存储器(Ferroelectric Random Access Memory,FRAM)、相变存储器(Phase Change Memory,PCM)、石墨烯存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器等。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic RandomAccess Memory,DRAM)等。本申请所提供的各实施例中所涉及的数据库可包括关系型数据库和非关系型数据库中至少一种。非关系型数据库可包括基于区块链的分布式数据库等,不限于此。本申请所提供的各实施例中所涉及的处理器可为通用处理器、中央处理器、图形处理器、数字信号处理器、可编程逻辑器、基于量子计算的数据处理逻辑器等,不限于此。Those skilled in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be completed by instructing the relevant hardware through a computer program, and the computer program can be stored in a non-volatile computer-readable storage medium. When the computer program is executed, it can include the processes of the embodiments of the above-mentioned methods. Among them, any reference to the memory, database or other medium used in the embodiments provided in this application can include at least one of non-volatile and volatile memory. Non-volatile memory can include read-only memory (ROM), magnetic tape, floppy disk, flash memory, optical memory, high-density embedded non-volatile memory, resistive random access memory (ReRAM), magnetoresistive random access memory (MRAM), ferroelectric random access memory (FRAM), phase change memory (PCM), graphene memory, etc. Volatile memory can include random access memory (RAM) or external cache memory, etc. As an illustration and not limitation, RAM can be in various forms, such as static random access memory (SRAM) or dynamic random access memory (DRAM). The database involved in each embodiment provided in this application may include at least one of a relational database and a non-relational database. Non-relational databases may include distributed databases based on blockchains, etc., but are not limited to this. The processor involved in each embodiment provided in this application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic device, a data processing logic device based on quantum computing, etc., but are not limited to this.

以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments may be combined arbitrarily. To make the description concise, not all possible combinations of the technical features in the above embodiments are described. However, as long as there is no contradiction in the combination of these technical features, they should be considered to be within the scope of this specification.

以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请的保护范围应以所附权利要求为准。The above-described embodiments only express several implementation methods of the present application, and the descriptions thereof are relatively specific and detailed, but they cannot be understood as limiting the scope of the present application. It should be pointed out that, for a person of ordinary skill in the art, several variations and improvements can be made without departing from the concept of the present application, and these all belong to the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the attached claims.

Claims (15)

1.一种通信系统,其特征在于,所述通信系统包括:信号源、反向散射标签、接收端和窃听端;其中:1. A communication system, characterized in that the communication system comprises: a signal source, a backscatter tag, a receiving end and an eavesdropping end; wherein: 所述信号源,用于发送射频信号;The signal source is used to send a radio frequency signal; 所述反向散射标签,用于发送所述射频信号和干扰信号;The backscatter tag is used to send the radio frequency signal and the interference signal; 所述接收端,用于接收组合信号,并从所述组合信号中识别出所述射频信号;所述组合信号包括所述射频信号和所述干扰信号;The receiving end is used to receive a combined signal and identify the radio frequency signal from the combined signal; the combined signal includes the radio frequency signal and the interference signal; 所述窃听端,用于接收所述组合信号;The eavesdropping terminal is used to receive the combined signal; 其中,所述反向散射标签上设置有第一天线和第二天线;Wherein, the backscatter tag is provided with a first antenna and a second antenna; 所述反向散射标签,用于通过所述第一天线转发所述射频信号,以及通过所述第二天线发送所述干扰信号;The backscatter tag is used to forward the radio frequency signal through the first antenna and send the interference signal through the second antenna; 所述系统还包括:控制设备;The system further comprises: a control device; 所述控制设备,用于对目标设备的配置参数进行调整,以使所述目标设备基于调整后的配置参数进行信号传输;其中,所述目标设备包括所述信号源和所述反向散射标签,所述配置参数包括所述信号源的信号波束矢量和所述反向散射标签的功率,所述反向散射标签的功率包括所述第一天线的发送功率和所述第二天线的发送功率;The control device is used to adjust the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters; wherein the target device includes the signal source and the backscatter tag, the configuration parameters include the signal beam vector of the signal source and the power of the backscatter tag, and the power of the backscatter tag includes the transmission power of the first antenna and the transmission power of the second antenna; 其中,所述对目标设备的配置参数进行调整,包括:The step of adjusting the configuration parameters of the target device includes: 基于所述通信系统的保密容量对应的初始优化函数和多个预设通信参数,构建目标优化函数;所述多个预设通信参数包括每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率;所述目标优化函数为对所述初始优化函数的凹凸性进行转换后得到的凸优化函数;Based on the initial optimization function corresponding to the confidentiality capacity of the communication system and a plurality of preset communication parameters, a target optimization function is constructed; the plurality of preset communication parameters include the distance value between each two devices, the noise power of the receiving end, and the noise power of the eavesdropping end; the target optimization function is a convex optimization function obtained by converting the concavity and convexity of the initial optimization function; 以所述目标优化函数为最大原则,通过求解所述目标优化函数,确定目标配置参数;Taking the target optimization function as the maximum principle, determining the target configuration parameters by solving the target optimization function; 根据所述目标配置参数对所述目标设备的配置参数进行调整。The configuration parameters of the target device are adjusted according to the target configuration parameters. 2.根据权利要求1所述的通信系统,其特征在于,所述信号源包括载波发生器,且与所述反向散射标签之间的距离小于预设距离阈值。2 . The communication system according to claim 1 , wherein the signal source comprises a carrier generator, and a distance between the signal source and the backscatter tag is less than a preset distance threshold. 3.根据权利要求1所述的通信系统,其特征在于,所述反向散射标签,还用于将所述射频信号转换为能量进行供电。3. The communication system according to claim 1 is characterized in that the backscatter tag is also used to convert the radio frequency signal into energy for power supply. 4.根据权利要求1所述的通信系统,其特征在于,所述接收端,具体用于接收所述反向散射标签发送的射频信号和干扰信号,以及接收所述信号源发送的射频信号。4. The communication system according to claim 1 is characterized in that the receiving end is specifically used to receive the radio frequency signal and interference signal sent by the backscatter tag, and receive the radio frequency signal sent by the signal source. 5.根据权利要求1所述的通信系统,其特征在于,所述窃听端,具体用于接收所述反向散射标签发送的射频信号和干扰信号,以及接收所述信号源发送的射频信号。5. The communication system according to claim 1 is characterized in that the eavesdropping end is specifically used to receive the radio frequency signal and interference signal sent by the backscatter tag, and receive the radio frequency signal sent by the signal source. 6.一种通信方法,其特征在于,应用于如权利要求1至5中任一项所述的通信系统,所述方法包括:6. A communication method, characterized in that it is applied to the communication system according to any one of claims 1 to 5, and the method comprises: 所述信号源发送射频信号;The signal source sends a radio frequency signal; 所述反向散射标签发送所述射频信号和干扰信号;The backscatter tag sends the radio frequency signal and the interference signal; 所述接收端接收组合信号,并从所述组合信号中识别出所述射频信号;所述组合信号包括所述射频信号和所述干扰信号;The receiving end receives a combined signal and identifies the radio frequency signal from the combined signal; the combined signal includes the radio frequency signal and the interference signal; 所述窃听端接收所述组合信号;The eavesdropping end receives the combined signal; 其中,所述反向散射标签上设置有第一天线和第二天线,通过所述第一天线转发所述射频信号,以及通过所述第二天线发送所述干扰信号;The backscatter tag is provided with a first antenna and a second antenna, the radio frequency signal is forwarded through the first antenna, and the interference signal is sent through the second antenna; 所述控制设备对目标设备的配置参数进行调整,以使所述目标设备基于调整后的配置参数进行信号传输;其中,所述目标设备包括所述信号源和所述反向散射标签,所述配置参数包括所述信号源的信号波束矢量和所述反向散射标签的功率,所述反向散射标签的功率包括所述第一天线的发送功率和所述第二天线的发送功率;The control device adjusts the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters; wherein the target device includes the signal source and the backscatter tag, the configuration parameters include the signal beam vector of the signal source and the power of the backscatter tag, and the power of the backscatter tag includes the transmission power of the first antenna and the transmission power of the second antenna; 其中,所述对目标设备的配置参数进行调整,包括:The step of adjusting the configuration parameters of the target device includes: 基于所述通信系统的保密容量对应的初始优化函数和多个预设通信参数,构建目标优化函数;所述多个预设通信参数包括每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率;所述目标优化函数为对所述初始优化函数的凹凸性进行转换后得到的凸优化函数;Based on the initial optimization function corresponding to the confidentiality capacity of the communication system and a plurality of preset communication parameters, a target optimization function is constructed; the plurality of preset communication parameters include the distance value between each two devices, the noise power of the receiving end, and the noise power of the eavesdropping end; the target optimization function is a convex optimization function obtained by converting the concavity and convexity of the initial optimization function; 以所述目标优化函数为最大原则,通过求解所述目标优化函数,确定目标配置参数;Taking the target optimization function as the maximum principle, determining the target configuration parameters by solving the target optimization function; 根据所述目标配置参数对所述目标设备的配置参数进行调整。The configuration parameters of the target device are adjusted according to the target configuration parameters. 7.一种通信方法,其特征在于,应用于如权利要求1至5中任一项所述的通信系统,所述方法包括:7. A communication method, characterized in that it is applied to the communication system according to any one of claims 1 to 5, and the method comprises: 对目标设备的配置参数进行调整,以使所述目标设备基于调整后的配置参数进行信号传输;Adjusting configuration parameters of a target device so that the target device performs signal transmission based on the adjusted configuration parameters; 其中,所述目标设备包括所述信号源和所述反向散射标签,所述配置参数包括所述信号源的信号波束矢量和所述反向散射标签的功率,所述反向散射标签上设置有第一天线和第二天线,所述反向散射标签的功率包括所述第一天线的发送功率和所述第二天线的发送功率;The target device includes the signal source and the backscatter tag, the configuration parameters include a signal beam vector of the signal source and a power of the backscatter tag, the backscatter tag is provided with a first antenna and a second antenna, and the power of the backscatter tag includes a transmission power of the first antenna and a transmission power of the second antenna; 所述对目标设备的配置参数进行调整,包括:The adjusting of the configuration parameters of the target device includes: 基于所述通信系统的保密容量对应的初始优化函数和多个预设通信参数,构建目标优化函数;所述多个预设通信参数包括每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率;所述目标优化函数为对所述初始优化函数的凹凸性进行转换后得到的凸优化函数;Based on the initial optimization function corresponding to the confidentiality capacity of the communication system and a plurality of preset communication parameters, a target optimization function is constructed; the plurality of preset communication parameters include the distance value between each two devices, the noise power of the receiving end, and the noise power of the eavesdropping end; the target optimization function is a convex optimization function obtained by converting the concavity and convexity of the initial optimization function; 以所述目标优化函数为最大原则,通过求解所述目标优化函数,确定目标配置参数;Taking the target optimization function as the maximum principle, determining the target configuration parameters by solving the target optimization function; 根据所述目标配置参数对所述目标设备的配置参数进行调整。The configuration parameters of the target device are adjusted according to the target configuration parameters. 8.根据权利要求7所述的方法,其特征在于,所述基于所述通信系统的保密容量对应的初始优化函数和多个预设通信参数,构建目标优化函数,包括:8. The method according to claim 7, characterized in that the initial optimization function corresponding to the confidentiality capacity of the communication system and a plurality of preset communication parameters are used to construct a target optimization function, comprising: 从所述通信系统的保密容量对应的初始优化函数中提取对数函数的真数表达式,得到目标真数表达式;Extracting a real number expression of a logarithmic function from an initial optimization function corresponding to the confidentiality capacity of the communication system to obtain a target real number expression; 基于所述目标真数表达式和多个预设通信参数构建目标优化函数。A target optimization function is constructed based on the target true number expression and a plurality of preset communication parameters. 9.根据权利要求8所述的方法,其特征在于,所述基于所述目标真数表达式和多个预设通信参数构建目标优化函数,包括:9. The method according to claim 8, characterized in that the step of constructing a target optimization function based on the target true number expression and a plurality of preset communication parameters comprises: 对所述目标真数表达式中凹凸性不确定的分式进行凹凸转换并结合多个预设通信参数,得到所述目标优化函数。The target optimization function is obtained by performing a concave-convex conversion on the uncertain fraction in the target real number expression and combining it with a plurality of preset communication parameters. 10.根据权利要求9所述的方法,其特征在于,所述对所述目标真数表达式中凹凸性不确定的分式进行凹凸转换并结合多个预设通信参数,得到所述目标优化函数,包括:10. The method according to claim 9, characterized in that the step of performing a concave-convex conversion on the uncertain fraction in the target real number expression and combining a plurality of preset communication parameters to obtain the target optimization function comprises: 将所述目标真数表达式转换为中间优化函数;Converting the target true number expression into an intermediate optimization function; 对所述中间优化函数中凹凸性不确定的分式进行凹凸转换并结合多个预设通信参数,得到所述目标优化函数。The target optimization function is obtained by performing a concave-convex conversion on the uncertain concave-convex fraction in the intermediate optimization function and combining it with a plurality of preset communication parameters. 11.根据权利要求7所述的方法,其特征在于,所述以所述目标优化函数为最大原则,通过求解所述目标优化函数,确定目标配置参数,包括:11. The method according to claim 7, characterized in that the determining of target configuration parameters by solving the target optimization function based on the maximum principle comprises: 获取所述的通信系统中每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率;Obtaining the distance value between every two devices in the communication system, the noise power of the receiving end, and the noise power of the eavesdropping end; 以所述目标优化函数为最大原则,所述信号源的信号波束矢量和所述反向散射标签的功率为迭代变量,将所述的通信系统中每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率代入到所述目标优化函数中进行迭代计算,得到所述目标配置参数。Taking the target optimization function as the maximum principle, the signal beam vector of the signal source and the power of the backscatter tag as iterative variables, the distance value between every two devices in the communication system, the noise power of the receiving end and the noise power of the eavesdropping end are substituted into the target optimization function for iterative calculation to obtain the target configuration parameters. 12.一种通信装置,其特征在于,应用于如权利要求1至5中任一项所述的通信系统,所述装置包括:12. A communication device, characterized in that it is applied to the communication system according to any one of claims 1 to 5, and the device comprises: 调整模块,用于对目标设备的配置参数进行调整,以使所述目标设备基于调整后的配置参数进行信号传输;An adjustment module, used to adjust the configuration parameters of the target device so that the target device performs signal transmission based on the adjusted configuration parameters; 其中,所述目标设备包括所述信号源和所述反向散射标签,所述配置参数包括所述信号源的信号波束矢量和所述反向散射标签的功率,所述反向散射标签上设置有第一天线和第二天线,所述反向散射标签的功率包括所述第一天线的发送功率和所述第二天线的发送功率;The target device includes the signal source and the backscatter tag, the configuration parameters include a signal beam vector of the signal source and a power of the backscatter tag, the backscatter tag is provided with a first antenna and a second antenna, and the power of the backscatter tag includes a transmission power of the first antenna and a transmission power of the second antenna; 所述调整模块,用于基于所述通信系统的保密容量对应的初始优化函数和多个预设通信参数,构建目标优化函数;以所述目标优化函数为最大原则,通过求解所述目标优化函数,确定目标配置参数;根据所述目标配置参数对所述目标设备的配置参数进行调整;所述多个预设通信参数包括每两个设备之间的距离值、所述接收端的噪声功率以及所述窃听端的噪声功率;所述目标优化函数为对所述初始优化函数的凹凸性进行转换后得到的凸优化函数。The adjustment module is used to construct a target optimization function based on an initial optimization function corresponding to the confidentiality capacity of the communication system and multiple preset communication parameters; taking the target optimization function as the maximum principle, determining the target configuration parameters by solving the target optimization function; adjusting the configuration parameters of the target device according to the target configuration parameters; the multiple preset communication parameters include the distance value between every two devices, the noise power of the receiving end, and the noise power of the eavesdropping end; the target optimization function is a convex optimization function obtained by converting the convexity of the initial optimization function. 13.一种通信设备,其特征在于,所述通信设备包括:存储器,收发机,处理器:13. A communication device, characterized in that the communication device comprises: a memory, a transceiver, and a processor: 所述存储器,用于存储计算机程序;所述收发机,用于在所述处理器的控制下收发数据;所述处理器,用于读取所述存储器中的计算机程序并执行如权利要求7至11中任一项所述的方法。The memory is used to store a computer program; the transceiver is used to send and receive data under the control of the processor; and the processor is used to read the computer program in the memory and execute the method as described in any one of claims 7 to 11. 14.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求7至11中任一项所述的方法的步骤。14. A computer-readable storage medium having a computer program stored thereon, wherein when the computer program is executed by a processor, the steps of the method according to any one of claims 7 to 11 are implemented. 15.一种计算机程序产品,包括计算机程序,其特征在于,该计算机程序被处理器执行时实现权利要求7至11中任一项所述的方法的步骤。15. A computer program product, comprising a computer program, characterized in that when the computer program is executed by a processor, the steps of the method according to any one of claims 7 to 11 are implemented.
CN202410917311.8A 2024-07-10 2024-07-10 Communication system, communication method, device, communication equipment, storage medium and product Active CN118509103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410917311.8A CN118509103B (en) 2024-07-10 2024-07-10 Communication system, communication method, device, communication equipment, storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410917311.8A CN118509103B (en) 2024-07-10 2024-07-10 Communication system, communication method, device, communication equipment, storage medium and product

Publications (2)

Publication Number Publication Date
CN118509103A CN118509103A (en) 2024-08-16
CN118509103B true CN118509103B (en) 2024-11-05

Family

ID=92245179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410917311.8A Active CN118509103B (en) 2024-07-10 2024-07-10 Communication system, communication method, device, communication equipment, storage medium and product

Country Status (1)

Country Link
CN (1) CN118509103B (en)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050058292A1 (en) * 2003-09-11 2005-03-17 Impinj, Inc., A Delaware Corporation Secure two-way RFID communications
JP4333449B2 (en) * 2004-04-01 2009-09-16 ソニー株式会社 Wireless transmission system and wireless transmission device
US7741965B2 (en) * 2005-05-19 2010-06-22 Chung Nam Electronics Co., Ltd. Radio frequency identification (RFID) system
TWI363494B (en) * 2008-04-09 2012-05-01 Mstar Semiconductor Inc Radio frequency identification tag and operating method thereof
WO2014036001A1 (en) * 2012-08-27 2014-03-06 University Of Houston System System and method for securing backscatter wireless communication
KR102097229B1 (en) * 2019-01-31 2020-04-03 한국산업기술대학교산학협력단 System for ambient backscatter communication system using artificial noise-aided scheduling for improving physical layer security
CN111355520B (en) * 2020-03-10 2022-03-08 电子科技大学 Design method of intelligent reflection surface assisted terahertz safety communication system
CN111818126B (en) * 2020-06-08 2022-03-11 武汉大学 Internet of things environment parameter self-adaptive inversion method based on RFID multi-feature fusion perception model
US12314803B2 (en) * 2021-02-16 2025-05-27 Qatar University Method and apparatus for physically secure backscatter communications
CN117176242B (en) * 2023-09-01 2024-03-26 东北大学秦皇岛分校 A physical layer security enhancement method for backscattering systems based on multi-antenna relay
CN117353796A (en) * 2023-10-08 2024-01-05 河南新十信息科技有限公司 Cooperative interference method of unmanned aerial vehicle auxiliary environment backscatter communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于带别名的双向认证的RFID安全机制;张诚;微计算机信息;20080915;第24卷(第9-2期);第2.2节 *

Also Published As

Publication number Publication date
CN118509103A (en) 2024-08-16

Similar Documents

Publication Publication Date Title
CN113949427B (en) Multi-user wireless network security energy efficiency optimization design method and system
CN116489662A (en) Hidden communication setting method, device and storage medium based on unmanned aerial vehicle group network
CN116527174B (en) Intelligent reflective surface channel state estimation method, phase adjustment method, system
CN103686610B (en) The broadcasting method and equipment of a kind of radio communication
CN118509103B (en) Communication system, communication method, device, communication equipment, storage medium and product
CN113194036B (en) Routing method, system, device and readable storage medium for multi-label network
Xu et al. Analysis and Prediction of Mobile Industrial Internet of Things (IIoT) Communications Based on FL-GLP-Net
CN118713711A (en) Communication method, apparatus, communication device, readable storage medium and program product
CN118119003B (en) A method and device for allocating multipath signal power
KR20140123723A (en) Method for key establishment using anti-collision algorithm
CN114554527A (en) IoT link optimization method and system combining IRS technology and SR technology
CN118694471A (en) An omnidirectional and passive jamming method and system for randomly configured transmissive and reflective intelligent metasurfaces
Bang et al. Identification of RFID tags in dynamic framed slotted ALOHA
CN118157792A (en) A multi-RIS-assisted communication network resource allocation method and system
Li et al. Towards constant-time cardinality estimation for large-scale RFID systems
Chen et al. An Efficient Scheme for Multiple Access in a RFID System.
CN117177275B (en) SCMA-MEC-based Internet of things equipment calculation rate optimization method
Mikami et al. Fully Integrated Passive UHF RFID Tag for Hash‐Based Mutual Authentication Protocol
Wang et al. Joint Access Points-User Association and Caching Placement Strategy for Cell-Free Massive MIMO Systems Based on Soft Actor-Critic Algorithm
CN117176214B (en) Sum rate optimization method and device for RIS-assisted MIMO system
Mao et al. Data-Driven Learning Based Secrecy Rate Optimization for RIS-Assisted Secure Wireless Networks: A Multi-Armed Bandit Approach
Zhou et al. Outage probability analysis of the symbiotic backscatter-NOMA systems
CN113688644B (en) Active radio frequency identification method and system supporting parallel anti-collision
Gautam Intelligent Reflecting and Refracting Surfaces for SWIPT-Enabled 6G RF-Based Communications
CN119727799A (en) Confidentiality rate optimization method based on distributed active intelligent reflective surface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant