×

Unconditional secure communication method based on beam-forming and security code

  • US 9,985,986 B2
  • Filed: 06/26/2015
  • Issued: 05/29/2018
  • Est. Priority Date: 06/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. An unconditional secure communication method based on beam-forming and security code, comprising steps of:

  • S1;

    a legitimate receiver sending a pilot sequence Reference Signal (RS) to a legitimate transmitter, the RS going through a legitimate channel and an eavesdropping channel respectively, the legitimate transmitter and a passive eavesdropper receiving the RS, where a legitimate channel matrix is H1 and an eavesdropper'"'"'s channel matrix is H2;

    S2;

    the legitimate transmitter receiving a pilot sequence YRS which is transmitted by the legitimate receiver, where the pilot sequence YRS is obtained by the pilot sequence RS which is Rayleigh decayed through the legitimate channel, that is;


    YRS=H1*RS+n



    (1)applying Least Square (LS) algorithm to get uplink channel estimation value H_esti;


    H_esti=YRS*RS

    1




    (2)then transposing the H_esti, that is (H_esti)T=H1esti;

    S3;

    modulating a plurality of bits X′

    _bits which is sent by transmitter, and getting the complex modulated symbols X′

    ;

    S4;

    extracting Channel State Information (CSI) from H1esti, that is do Singular Value Decomposition (SVD) with H1esti;


    H1esti=UDVH



    (3)then getting the V as the vector corresponding to the largest singular value getting the pre-coding matrix W;

    S5;

    doing SVD pre-coding processing for X′

    , then getting W*X′

    , and sending out a pre-coded signal W*X′

    ;

    S6;

    a pre-coded signal going through the legitimate channel and eavesdropping channel, and it is received by the legitimate receiver and the eavesdropping receiver respectively, in which the legitimate receiver receives signal as Y1′

    ;


    Y1

    =H
    1*WX′

    +n
    1 



    (4)the eavesdropper receiving signal as Y2;


    Y2

    =H
    2*WX′

    +n
    2 



    (5)S7;

    the legitimate receiver and the eavesdropper to recover the secret bit through signal decision and decoding respectively;

    in receiving side, the legitimate receiver doing MMSE decoding on Y1′

    by multiply matrix He=H1*W;


    X1′

    =(He

    1
    He+I*σ

    2)

    1
    He

    1
    *Y1′





    (6)then doing decision and demodulated on X1′

    , getting bits streams X′

    _bits1, then computing the bit error rate BER1′

    according to X′

    _bits;

    in receiving side, eavesdropper also doing Minimum Mean Square Error (MMSE) decoding on Y2′

    by multiply matrix HE=H2*W;


    X2′

    =(HE

    1
    HE+I*σ



    2
    )

    1
    HE

    1
    *Y2′





    (7)then doing decision and demodulated on X2′

    , getting bits streams X′

    _bits2, then computing the bit error rate BER2′

    according to X′

    _bits ;

    S8;

    getting the parameters of secret code and choose the proper codes based on BER2′

    ;

    S9;

    the transmitter encoding the secret bits X_bits by the secure code, then modulating and getting the complex signal X, and sending W*X signal which is pre-coded by transmitter;

    S10;

    after the legitimate transmitter sending out the preprocessed signal, the preprocessed signal going through a legitimate channel and a eavesdropping channel, and which is received by the legitimate receiver and eavesdropping receiver, in which the legitimate receiver getting the signal Y1;


    Y1=H1*WX+n3 



    (8)and the eavesdropper receiver get signal Y2;


    Y2=H2*WX+n4 



    (9)S11;

    in receiving side, the legitimate receiver and eavesdropper to recovery the secret bits through signal decision and decoding, respectively;

    legitimate receiver doing MMSE decoding on Y1 by multiply matrix He=H1*W;


    X1=(He

    1
    He+I*σ

    2)

    1
    He

    1
    *Y1 



    (10)then doing decision and demodulated on X1, getting bits stream X_bits1, doing secure decoding on X_bits1, getting the secret bits;

    eavesdropper also doing MMSE decoding on Y2 by multiply matrix HE=H2*W;


    X2=(HE

    1
    HE+I*σ

    2)

    1
    HE

    1
    *Y2 



    (11)Finally, the eavesdropper doing decision and demodulated on X2, getting bits stream X_bits2, then do secure decoding on X_bits2, get the eavesdropping secret bits;

    the n, n1, n2, n3, n4 are Gaussian white noise, I is unit matrix, and σ

    is the variance of Gaussian white noise;

    the eavesdropper are unknown the channel information on H1, the bit error rate will be high after processing the received pre-coded signal.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×