[go: up one dir, main page]

CN112243252B - Safety transmission enhancement method for relay network of unmanned aerial vehicle - Google Patents

Safety transmission enhancement method for relay network of unmanned aerial vehicle Download PDF

Info

Publication number
CN112243252B
CN112243252B CN202010937439.2A CN202010937439A CN112243252B CN 112243252 B CN112243252 B CN 112243252B CN 202010937439 A CN202010937439 A CN 202010937439A CN 112243252 B CN112243252 B CN 112243252B
Authority
CN
China
Prior art keywords
uav
relay
destination node
interference power
los
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010937439.2A
Other languages
Chinese (zh)
Other versions
CN112243252A (en
Inventor
唐晓
刘娜
张若南
王大伟
翟道森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN202010937439.2A priority Critical patent/CN112243252B/en
Publication of CN112243252A publication Critical patent/CN112243252A/en
Application granted granted Critical
Publication of CN112243252B publication Critical patent/CN112243252B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/382Monitoring; Testing of propagation channels for resource allocation, admission control or handover
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • H04W28/0221Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices power availability or consumption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0226Traffic management, e.g. flow control or congestion control based on location or mobility
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/40Engine management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Quality & Reliability (AREA)
  • Radio Relay Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of unmanned aerial vehicle communication, and discloses a safe transmission enhancing method for an unmanned aerial vehicle relay network, which comprises the steps of establishing a communication system from a ground source node to a destination node by taking an unmanned aerial vehicle as a relay and a channel model, and calculating the private rate of a transmission link from the source node to the destination node according to signals received by the unmanned aerial vehicle and the destination node in two time slots, namely a half-duplex mode; constructing an optimization model which takes the maximum privacy rate as a target function and designs the position constraint condition of the interference power unmanned aerial vehicle; traversing the destination node D under the condition that the position of the unmanned aerial vehicle is fixed, and optimizing an interference power distribution scheme by the coordinate position of the eavesdropper E so as to maximize the privacy rate; and obtaining an optimal position generation data set of the unmanned aerial vehicle by using an exhaustive search method, constructing and training a DNN model, and finding the optimal position of the unmanned aerial vehicle by using the high calculation efficiency of the DNN. The unmanned aerial vehicle is convenient to deploy and is not limited by complex terrains and obstacles; the communication applicability is strong, and the information transmission quality is high.

Description

一种面向无人机中继网络的安全传输增强方法A security transmission enhancement method for UAV relay network

技术领域technical field

本发明属于无人机通信技术领域,尤其涉及一种面向无人机中继网络的安全传输增强方法。The invention belongs to the technical field of unmanned aerial vehicle communication, and in particular relates to a safety transmission enhancement method for an unmanned aerial vehicle relay network.

背景技术Background technique

目前:无线通信技术的飞速发展为人们带来了各种便利。同时,对无线信息安全性的关注也越来越多。无线通信安全问题本质上在于无线传播的广播性质。因此,如何保证来自物理层的无线通信的安全性是解决此问题的关键。物理层安全是在窃听通道模型下制定的,在窃听通道模型与合法通道相比性能低的情况下,该模型在信息理论上实现了完美的保密性。Present: The rapid development of wireless communication technology has brought various conveniences to people. At the same time, more and more attention is paid to wireless information security. The wireless communication security problem is essentially the broadcast nature of wireless communication. Therefore, how to ensure the security of wireless communication from the physical layer is the key to solving this problem. Physical layer security is formulated under the eavesdropping channel model, which achieves perfect secrecy in information theory when the performance of the eavesdropping channel model is low compared to the legitimate channel.

随着5G网络的快速发展和部署,学术界和工业界对无人机(UAV)表现出极大的关注。无人机具有成本低、部署方便等优点具有较高的灵活性和适应性,因此在军事和民用领域都有其广泛的应用。特别是,它可用作无线传感器节点,中继站或移动基站等。无人机通常用于协助复杂多变的环境中的通信。但是,由于飞行环境中的不确定因素可能会降低无人机通信系统的可靠性,从而影响通信质量。因此,提高涉及无人机的网络性能具有重要意义。With the rapid development and deployment of 5G networks, academia and industry have shown great interest in unmanned aerial vehicles (UAVs). UAV has the advantages of low cost, convenient deployment, high flexibility and adaptability, so it has a wide range of applications in military and civilian fields. In particular, it can be used as a wireless sensor node, relay station or mobile base station, etc. Drones are often used to assist communications in complex and changing environments. However, due to the uncertain factors in the flight environment, the reliability of the UAV communication system may be reduced, thereby affecting the communication quality. Therefore, it is of great significance to improve the network performance involving UAVs.

另一方面,深度神经网络(DNN)在推进各种应用的同时也取得了显著的进步。深度学习技术也已应用于无线通信研究中,例如发射功率控制和信道估计,同时带来了显著的性能提升。DNN使我们能够基于数据和知识为通信系统制定有效的策略。此外,使用训练良好的DNN模型可以显著降低实际实现的复杂性。由于DNN的显著优势,深度学习已被广泛应用于无人机通信中,以方便设计和提高性能。On the other hand, deep neural networks (DNNs) have also made significant progress while advancing various applications. Deep learning techniques have also been applied in wireless communication research, such as transmit power control and channel estimation, while bringing significant performance improvements. DNNs enable us to formulate effective policies for communication systems based on data and knowledge. Furthermore, using a well-trained DNN model can significantly reduce the complexity of the actual implementation. Due to the significant advantages of DNNs, deep learning has been widely used in UAV communication to facilitate design and improve performance.

通过上述分析,现有技术存在的问题及缺陷为:Through the above analysis, the existing problems and defects in the prior art are:

(1)无人机通常用于协助复杂多变的环境中的通信。考虑到复杂的室外环境,由于飞行环境中的不确定因素,例如:高层建筑可能会阻挡地面用户与BS之间的LOS通信链路,可能会降低无人机通信系统的可靠性,从而影响通信质量。(1) UAVs are often used to assist communication in complex and changing environments. Considering the complex outdoor environment, due to uncertain factors in the flight environment, such as: high-rise buildings may block the LOS communication link between the ground user and the BS, the reliability of the UAV communication system may be reduced, thereby affecting the communication quality.

(2)现有的物理层安全在传统点对点的信息传输技术中,主要存在的安全问题就是通信收发两端节点被窃听。与传统的点对点信息传输技术相比,协作中继网络中将会面临更严峻的安全问题,因为经过中继节点的多路径传输过程中,信息扩散面的扩大会提高窃听者窃听保密信息的概率。(2) Existing physical layer security In the traditional point-to-point information transmission technology, the main security problem is that the nodes at both ends of the communication are eavesdropped. Compared with the traditional point-to-point information transmission technology, the cooperative relay network will face more severe security problems, because in the process of multi-path transmission through the relay node, the expansion of the information diffusion surface will increase the probability of eavesdroppers to eavesdrop on confidential information. .

(3)现有的安全方案缺乏对实际网络潜在的不确定性的考量。(3) The existing security schemes lack consideration of the potential uncertainty of the actual network.

解决以上问题及缺陷的难度为:现有的安全机制基于密钥体系,物理层安全是全新的解决方案。本发明考虑的场景中,无人机中继网络采用物理层安全机制,需要对合法接收机发射的干扰信号进行合理分配。此外,设计一个深度神经网络模型提升网络性能。The difficulty of solving the above problems and defects is: the existing security mechanism is based on the key system, and the physical layer security is a brand-new solution. In the scenario considered by the present invention, the UAV relay network adopts a physical layer security mechanism, and it is necessary to reasonably allocate the interference signal transmitted by the legitimate receiver. In addition, a deep neural network model is designed to improve network performance.

解决以上问题及缺陷的意义为:本发明采用物理层安全方案,其无需密钥且复杂度较低;考虑以无人机为网络中继,利用无人机中继的放大转发协议研究了合法传输的私密速率;同时,考虑合法的接收机发射一个独立于源信号的干扰信号来对抗窃听。针对这一问题,首先将其分解为两个子问题,分别解决干扰策略和无人机位置部署问题。然后,在有效的二分搜索法的基础上,解决了干扰问题,然后用DNN框架求解无人机部署。最后,给出了仿真结果,验证了所提方案的有效性。The significance of solving the above problems and defects is as follows: the present invention adopts a physical layer security scheme, which does not require a key and has low complexity; The privacy rate of transmission; also, consider legitimate receivers transmitting a jamming signal independent of the source signal to counter eavesdropping. In response to this problem, it is first decomposed into two sub-problems to solve the problem of jamming strategy and UAV position deployment respectively. Then, based on the effective binary search method, the interference problem is solved, and then the UAV deployment is solved with the DNN framework. Finally, the simulation results are given to verify the effectiveness of the proposed scheme.

发明内容SUMMARY OF THE INVENTION

针对现有技术存在的问题,本发明提供了一种面向无人机中继网络的安全传输增强方法。Aiming at the problems existing in the prior art, the present invention provides a security transmission enhancement method for the UAV relay network.

本发明是这样实现的,一种面向无人机中继网络的安全传输增强方法,所述面向无人机中继网络的安全传输增强方法包括:The present invention is implemented in this way, a method for enhancing the safety transmission of the UAV relay network, and the method for enhancing the safety transmission for the UAV relay network includes:

建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;Establish a UAV relay communication system, the goal of which is to jointly optimize the jamming power and the UAV relay position to maximize the privacy rate of the system;

建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;Establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the received signal of the destination node, calculate the source node to The privacy rate of the destination node transmission link;

构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;Build an optimization model with the objective function when the privacy rate reaches the maximum, and design the interference power and UAV position constraints;

在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;Under the condition that the position of the UAV is fixed, traverse the destination node D and the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate;

在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。Under the condition of optimal interference power, use the exhaustive search method to obtain the optimal position of the UAV, generate a data set, build and train the DNN model, apply it to the test set, and use the high computational efficiency of DNN to find the optimal position of the UAV. The best location to maximize the privacy rate and achieve secure transmission.

进一步,所述面向无人机中继网络的安全传输增强方法建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;考虑一个由源节点S,目的节点D,UAV中继R和窃听者E组成的无人机中继通信系统,S向UAV中继发送信号,R将信号放大并转发到D。Further, the UAV relay network-oriented security transmission enhancement method establishes a UAV relay communication system, the goal of which is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system; A UAV relay communication system composed of source node S, destination node D, UAV relay R and eavesdropper E, S sends a signal to the UAV relay, and R amplifies and forwards the signal to D.

进一步,所述面向无人机中继网络的安全传输增强方法建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;地面源节点到目的节点通信系统的信道模型:Further, the security transmission enhancement method for the UAV relay network establishes the channel model of the ground source node to destination node communication system with the UAV as the relay and in the two time slot-half duplex mode, according to The UAV receives the signal and the received signal of the destination node, and calculates the privacy rate of the transmission link from the source node to the destination node; the channel model of the communication system from the ground source node to the destination node:

Figure BDA0002672456210000031
Figure BDA0002672456210000031

其中c是光速,αG是地面通信链路的路径损耗指数,fc是载波频率,deg是窃听者与地面用户之间的距离,σG是信道的阴影衰落变量;where c is the speed of light, α G is the path loss index of the ground communication link, f c is the carrier frequency, d eg is the distance between the eavesdropper and the ground user, and σ G is the shadow fading variable of the channel;

与无人机相关的信道包含视距LoS组和非视距NLoS组,地面用户与无人机之间具有LOS连接的概率:The channels related to the UAV include the line-of-sight LoS group and the non-line-of-sight NLoS group, and the probability of having a LOS connection between the ground user and the UAV is:

Figure BDA0002672456210000041
Figure BDA0002672456210000041

Figure BDA0002672456210000042
Figure BDA0002672456210000042

其中A和B是取决于环境的常数,(xu,yu)表示无人机在水平维度上的位置,h表示无人机的高度,(xg,yg)表示地面用户的位置,NLoS的概率为PNLoS=1-PLoS,LoS和NLoS链路的路径损耗模型分别是:where A and B are constants depending on the environment, (x u , y u ) is the position of the drone in the horizontal dimension, h is the height of the drone, (x g , y g ) is the position of the ground user, The probability of NLoS is P NLoS =1-P LoS , and the path loss models of LoS and NLoS links are:

Figure BDA0002672456210000043
Figure BDA0002672456210000043

Figure BDA0002672456210000044
Figure BDA0002672456210000044

其中d是传输距离,

Figure BDA0002672456210000045
αL和αN是LoS和NLoS信道的路径损耗指数,ηLoS和ηNLoS分别是LoS和NLoS的平均额外损失;概率平均路径损耗是在LoS和NLoS条件下平均得出:where d is the transmission distance,
Figure BDA0002672456210000045
α L and α N are the path loss exponents for LoS and NLoS channels, η LoS and η NLoS are the average additional losses for LoS and NLoS, respectively; the probabilistic average path loss is averaged under LoS and NLoS conditions:

hij=PLoSLLoS+PNLoSLNLoS,i∈{R,D},j∈{R,E,D};h ij =P LoS L LoS +P NLoS L NLoS , i∈{R,D}, j∈{R,E,D};

在第一时隙,S将其信号传输到无人机中继R,该信号也被窃听者E窃听;同时,D发出人为噪声,使窃听者感到困惑;在第二时隙,S处于静默状态,无人机中继将接收到的信号放大并发送到D,D也被窃听者窃听,用zS和zJ表示来自S和D的机密信号和协作干扰信号,zS和zJ均为归一化幂,即|zS|2=1和|zJ|2=1,其中|·|表示绝对值,在第一时隙,UAV和E处接收的信号为:In the first time slot, S transmits its signal to the drone relay R, which is also eavesdropped by the eavesdropper E; at the same time, D emits artificial noise, which confuses the eavesdropper; in the second time slot, S is silent state, the drone relay amplifies the received signal and sends it to D, D is also eavesdropped by eavesdroppers, denoted by z S and z J for confidential signals and cooperative jamming signals from S and D, both z S and z J are normalized powers, ie |z S | 2 =1 and |z J | 2 =1, where |·| represents the absolute value, the signals received at the first time slot, UAV and E are:

Figure BDA0002672456210000046
Figure BDA0002672456210000046

Figure BDA0002672456210000047
Figure BDA0002672456210000047

其中PS和PD分别是来自S和D的发射功率,nR

Figure BDA0002672456210000048
是R和D处的复杂加性白高斯噪声AWGN,遵循均值为零且方差为
Figure BDA0002672456210000049
的复高斯分布;where P S and P D are the transmit powers from S and D, respectively, n R and
Figure BDA0002672456210000048
is the complex additive white Gaussian noise AWGN at R and D, following zero mean and variance
Figure BDA0002672456210000049
The complex Gaussian distribution of ;

在第二时隙,R放大并以放大倍数β将接收到的信号转发到D,PR为R的发射功率,β表示为:In the second time slot, R amplifies and forwards the received signal to D with an amplification factor β, where P R is the transmit power of R, and β is expressed as:

Figure BDA0002672456210000051
Figure BDA0002672456210000051

那么,D、E处接收到的信号为:Then, the signals received at D and E are:

Figure BDA0002672456210000052
Figure BDA0002672456210000052

Figure BDA0002672456210000053
Figure BDA0002672456210000053

其中nD

Figure BDA0002672456210000054
是D和E处的复杂加性高斯白噪声,D有效地去除该项,并且得到D处的接收信号为:where n D and
Figure BDA0002672456210000054
is the complex additive white Gaussian noise at D and E, D effectively removes this term, and the received signal at D is obtained as:

Figure BDA0002672456210000055
Figure BDA0002672456210000055

计算源节点到目的节点传输链路的私密速率,重新定义了信道噪声比:Calculate the privacy rate of the transmission link from the source node to the destination node, and redefine the channel-to-noise ratio:

Figure BDA0002672456210000056
Figure BDA0002672456210000056

第一时隙,窃听链路的信干噪比SINR为:In the first time slot, the SINR of the eavesdropping link is:

Figure BDA0002672456210000057
Figure BDA0002672456210000057

D和E的瞬时SINR为:The instantaneous SINRs of D and E are:

Figure BDA0002672456210000058
Figure BDA0002672456210000058

Figure BDA0002672456210000059
Figure BDA0002672456210000059

窃听者采用最大比例合并MRC方法,窃听节点E处的信干噪比SINR为:The eavesdropper adopts the maximum proportion combined MRC method, and the signal-to-interference-noise ratio SINR at the eavesdropping node E is:

Figure BDA0002672456210000061
Figure BDA0002672456210000061

在基于物理层安全的中继系统中,得到私密速率如下:In the relay system based on physical layer security, the private rate is obtained as follows:

Figure BDA0002672456210000062
Figure BDA0002672456210000062

进一步,所述面向无人机中继网络的安全传输增强方法构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型:Further, the security transmission enhancement method for the UAV relay network constructs an optimization model that takes the privacy rate reaching the maximum as the objective function, and designs the interference power and UAV position constraints:

Figure BDA0002672456210000063
Figure BDA0002672456210000063

其中(xu,yu)表示无人机在考虑区域Α中的水平位置。where (x u , y u ) represents the horizontal position of the UAV in the considered area A.

进一步,所述面向无人机中继网络的安全传输增强方法确定在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率:在固定无人机放置的情况下,干扰功率的优化问题如下:Further, the security transmission enhancement method for the UAV relay network is determined under the condition that the UAV position is fixed, traverse the destination node D, the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme, To maximize privacy rate: In the case of fixed drone placement, the optimization problem of jamming power is as follows:

Figure BDA0002672456210000064
Figure BDA0002672456210000064

进一步,所述面向无人机中继网络的安全传输增强方法利用二分搜索算法求解所得的功率即当前固定无人机位置的功率分配方案,最优干扰功率为

Figure BDA0002672456210000065
Further, the security transmission enhancement method for the UAV relay network uses the binary search algorithm to obtain the power obtained by solving the power distribution scheme of the current fixed UAV position, and the optimal interference power is
Figure BDA0002672456210000065

步骤一:初始化:设置PD的最小值和最大值,给定为Pmin和Pmax,其中Pmin=0;定义足够小的阈值ε;Step 1: Initialization: set the minimum and maximum values of PD , given as P min and P max , where P min =0; define a sufficiently small threshold ε;

步骤二:令

Figure BDA0002672456210000071
RS由第二步给出,如果
Figure BDA0002672456210000072
则Pmax=P*,否则Pmin=P*;Step 2: Order
Figure BDA0002672456210000071
R S is given by the second step, if
Figure BDA0002672456210000072
Then P max =P * , otherwise P min =P * ;

步骤三:若|Pmax-Pmin|<ε,得到最优的干扰功率P*,完成无人机中继通信系统的功率分配策略;否则重复进行步骤二。Step 3: If |P max -P min |<ε, obtain the optimal interference power P * , and complete the power allocation strategy of the UAV relay communication system; otherwise, repeat step 2.

进一步,所述面向无人机中继网络的安全传输增强方法在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输;Further, under the condition of optimal interference power, the security transmission enhancement method for UAV relay network uses an exhaustive search method to obtain the optimal position of UAV, generates a data set, constructs and trains a DNN model, and is applied to. The test set uses the high computing efficiency of DNN to find the best position of the drone to maximize the privacy rate and achieve safe transmission;

获得最优干扰功率,得到了无人机位置部署的优化问题如下:To obtain the optimal jamming power, the optimization problem of UAV position deployment is obtained as follows:

Figure BDA0002672456210000073
Figure BDA0002672456210000073

进一步,所述面向无人机中继网络的安全传输增强方法采用具有多个隐藏层和大量训练数据的神经网络模型学习网络特征,去求解无人机位置部署的优化问题,实现基于DNN的无人机部署方案;构建一个具有一个输入层,两个隐藏层和一个输出层的完全连接的DNN模型,通过训练DNN学习其输入/输出关系,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,使私密速率最大化,实现系统的安全传输,考虑一个位于200米×200米范围内的系统,无人机固定高度h为150米,源节点有固定位置(0,0,0),首先,固定了S,D,E的位置,遍历无人机的水平位置,采用二分搜索算法获得最佳干扰功率P*,在最优干扰功率的条件下,最大私密速率对应无人机的最优位置;然后,通过遍历D和E的坐标位置,找到不同D和E对应的无人机最优位置,构造数据集;Further, the security transmission enhancement method for the UAV relay network uses a neural network model with multiple hidden layers and a large amount of training data to learn network characteristics to solve the optimization problem of the UAV position deployment, and realize the DNN-based wireless network. Human-machine deployment scheme; build a fully connected DNN model with one input layer, two hidden layers and one output layer, learn its input/output relationship by training the DNN, apply it to the test set, take advantage of the high computational efficiency of DNN, find The optimal position of the UAV maximizes the privacy rate and realizes the safe transmission of the system. Consider a system located in the range of 200 meters × 200 meters, the fixed height h of the UAV is 150 meters, and the source node has a fixed position (0 ,0,0), first of all, the positions of S, D, E are fixed, the horizontal position of the UAV is traversed, and the optimal interference power P * is obtained by using the binary search algorithm. Under the condition of the optimal interference power, the maximum privacy rate Corresponding to the optimal position of the UAV; then, by traversing the coordinate positions of D and E, find the optimal position of the UAV corresponding to different D and E, and construct a data set;

在DNN模型的输入层中,将目标节点和窃听者的坐标(xd,yd)和(xe,ye)被重塑成一个4×1的数据样本,表示为

Figure BDA0002672456210000074
无人机最优位置的坐标(xu,yu)作为标签输出,表示为
Figure BDA0002672456210000075
其中i∈{1,2,···,N},把Q=[q1,q2,···,qN]作为DNN的输入,qi中的每一项对应一个输入神经元,取无人机的最优位置U=[u1,u2,···,uN]作为DNN模型的输出,ui中的每一项对应一个输出神经元,最后,将经过良好训练的DNN模型用于测试集,快速有效的找到无人机的最优位置,求解无人机位置优化的问题。In the input layer of the DNN model, the coordinates (x d , y d ) and (x e , y e ) of the target node and the eavesdropper are reshaped into a 4×1 data sample, denoted as
Figure BDA0002672456210000074
The coordinates (x u , y u ) of the optimal position of the UAV are output as labels, which are expressed as
Figure BDA0002672456210000075
where i∈{1,2,...,N}, take Q=[q 1 ,q 2 ,...,q N ] as the input of DNN, each item in q i corresponds to an input neuron, Take the optimal position U=[u 1 , u 2 , . . . , u N ] as the output of the DNN model, each item in ui corresponds to an output neuron, and finally, the well-trained The DNN model is used in the test set to quickly and effectively find the optimal position of the UAV and solve the problem of UAV position optimization.

本发明的另一目的在于提供一种计算机设备,所述计算机设备包括存储器和处理器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行如下步骤:Another object of the present invention is to provide a computer device, the computer device includes a memory and a processor, the memory stores a computer program, and when the computer program is executed by the processor, the processor executes the following step:

建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;Establish a UAV relay communication system, the goal of which is to jointly optimize the jamming power and the UAV relay position to maximize the privacy rate of the system;

建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;Establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the received signal of the destination node, calculate the source node to The privacy rate of the destination node transmission link;

构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;Build an optimization model with the objective function when the privacy rate reaches the maximum, and design the interference power and UAV position constraints;

在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;Under the condition that the position of the UAV is fixed, traverse the destination node D and the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate;

在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。Under the condition of optimal interference power, use the exhaustive search method to obtain the optimal position of the UAV, generate a data set, build and train the DNN model, apply it to the test set, and use the high computational efficiency of DNN to find the optimal position of the UAV. The best location to maximize the privacy rate and achieve secure transmission.

本发明的另一目的在于提供一种实施所述面向无人机中继网络的安全传输增强方法的面向无人机中继网络的安全传输增强系统,所述面向无人机中继网络的安全传输增强系统包括:Another object of the present invention is to provide a UAV relay network-oriented security transmission enhancement system implementing the UAV relay network-oriented security transmission enhancement method. Transmission enhancement systems include:

无人机中继通信系统建立模块,用于建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;The UAV relay communication system establishment module is used to establish the UAV relay communication system, and its goal is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system;

信道模型及时隙建立模块,用于建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;The channel model and slot establishment module are used to establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the purpose The received signal of the node calculates the privacy rate of the transmission link from the source node to the destination node;

目标函数构建模块,用于构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;The objective function building module is used to construct an optimization model that takes the privacy rate reaching the maximum as the objective function, design interference power, and UAV position constraints;

私密速率最大化模块,用于在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;The privacy rate maximization module is used to traverse the coordinate position of the destination node D and the eavesdropper E under the condition that the position of the drone is fixed, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate;

安全传输模块,用于在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。The safe transmission module is used to obtain the optimal position of the UAV using the exhaustive search method under the condition of optimal interference power, generate a data set, build and train a DNN model, apply it to the test set, and utilize the high computational efficiency of DNN, Find the best location for the drone to maximize privacy rates for secure transfers.

结合上述的所有技术方案,本发明所具备的优点及积极效果为:本发明设计的面向无人机中继网络的安全传输增强方法,首先,在无人机位置固定的情况下,对接收机发射的干扰信号进行了功率分配,以实现最大化私密速率;并且针对无人机位置部署问题,在最优干扰功率下构建DNN模型,进行求解,确保了最佳的通信效果﹐从而保证了通信的可靠性;符合实际情况。无人机部署方便,机动灵活,不受复杂地形和障碍物的限制;并且成本低廉、可靠性高;实际通信适用性强、信息传输质量高。Combined with all the above technical solutions, the advantages and positive effects of the present invention are as follows: the security transmission enhancement method for the UAV relay network designed by the present invention, first of all, when the UAV position is fixed, the receiver The power of the transmitted interference signal is allocated to maximize the privacy rate; and for the deployment of the UAV, a DNN model is constructed under the optimal interference power, and the solution is carried out to ensure the best communication effect, thus ensuring communication. reliability; in line with the actual situation. UAVs are easy to deploy, maneuverable, and not restricted by complex terrain and obstacles; they have low cost and high reliability; they have strong practical communication applicability and high information transmission quality.

附图说明Description of drawings

为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例中所需要使用的附图做简单的介绍,显而易见地,下面所描述的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present application more clearly, the following will briefly introduce the drawings that need to be used in the embodiments of the present application. Obviously, the drawings described below are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.

图1是本发明实施例提供的面向无人机中继网络的安全传输增强方法流程图。FIG. 1 is a flowchart of a method for enhancing security transmission for a UAV relay network provided by an embodiment of the present invention.

图2是本发明实施例提供的面向无人机中继网络的安全传输增强系统的结构示意图;2 is a schematic structural diagram of a UAV relay network-oriented security transmission enhancement system provided by an embodiment of the present invention;

图2中:1、无人机中继通信系统建立模块;2、信道模型及时隙建立模块;3、目标函数构建模块;4、私密速率最大化模块;5、安全传输模块。In Figure 2: 1. UAV relay communication system building module; 2. Channel model and time slot building module; 3. Objective function building module; 4. Privacy rate maximization module; 5. Secure transmission module.

图3是本发明实施例提供的无人机中继网络的私密速率与窃听者位置的关系示意图。FIG. 3 is a schematic diagram of the relationship between the privacy rate of the UAV relay network and the position of the eavesdropper according to an embodiment of the present invention.

图4是本发明实施例提供的无人机中继网络的私密速率与中继功率的关系示意图。FIG. 4 is a schematic diagram of the relationship between the privacy rate and the relay power of the UAV relay network according to an embodiment of the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

针对现有技术存在的问题,本发明提供了一种面向无人机中继网络的安全传输增强方法、系统,下面结合附图对本发明作详细的描述。Aiming at the problems existing in the prior art, the present invention provides a method and system for enhancing safety transmission for a UAV relay network. The present invention will be described in detail below with reference to the accompanying drawings.

如图1所示,本发明提供的面向无人机中继网络的安全传输增强方法包括以下步骤:As shown in Figure 1, the security transmission enhancement method for the UAV relay network provided by the present invention includes the following steps:

S101:建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;S101: Establish a UAV relay communication system, the goal of which is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system;

S102:建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;S102: Establish a channel model of the ground source node-to-destination node communication system with the UAV as a relay, and in the two-time-slot-half-duplex mode, calculate the source according to the UAV received signal and the received signal of the destination node The private rate of the transmission link from the node to the destination node;

S103:构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;S103: Construct an optimization model with the objective function when the privacy rate reaches the maximum, design the interference power, and the position constraints of the UAV;

S104:在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;S104: Under the condition that the position of the drone is fixed, traverse the destination node D and the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate;

S105:在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。S105: Under the condition of optimal interference power, use the exhaustive search method to obtain the optimal position of the UAV, generate a data set, build and train a DNN model, apply it to the test set, and use the high computational efficiency of DNN to find the UAV The best location to maximize the privacy rate and achieve secure transmission.

本发明提供的面向无人机中继网络的安全传输增强方法业内的普通技术人员还可以采用其他的步骤实施,图1的本发明提供的面向无人机中继网络的安全传输增强方法仅仅是一个具体实施例而已。The security transmission enhancement method for the UAV relay network provided by the present invention can also be implemented by those skilled in the art by other steps. The security transmission enhancement method for the UAV relay network provided by the present invention in FIG. 1 is only Just a specific example.

如图2所示,本发明提供的面向无人机中继网络的安全传输增强系统包括:As shown in Figure 2, the security transmission enhancement system for the UAV relay network provided by the present invention includes:

无人机中继通信系统建立模块1,用于建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;The UAV relay communication system establishment module 1 is used to establish a UAV relay communication system, the goal of which is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system;

信道模型及时隙建立模块2,用于建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;The channel model and slot establishment module 2 are used to establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two time slot-half duplex mode, according to the UAV received signal and The received signal of the destination node is used to calculate the privacy rate of the transmission link from the source node to the destination node;

目标函数构建模块3,用于构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;Objective function building module 3, which is used to construct an optimization model that takes when the privacy rate reaches the maximum as the objective function, design interference power, and UAV position constraints;

私密速率最大化模块4,用于在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;The privacy rate maximization module 4 is used to traverse the coordinate position of the destination node D and the eavesdropper E under the condition that the position of the drone is fixed, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate;

安全传输模块5,用于在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。The safe transmission module 5 is used to obtain the optimal position of the UAV using the exhaustive search method under the condition of optimal interference power, generate a data set, build and train a DNN model, apply it to the test set, and utilize the high computational efficiency of DNN , to find the best position of the drone to maximize the privacy rate and achieve safe transmission.

下面结合附图对本发明的技术方案作进一步的描述。The technical solutions of the present invention will be further described below with reference to the accompanying drawings.

本发明提供的面向无人机中继网络的安全传输增强方法具体的实现步骤解释如下:The specific implementation steps of the security transmission enhancement method for the UAV relay network provided by the present invention are explained as follows:

第一步:建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;考虑一个由源节点(S),目的节点(D),UAV中继(R)和窃听者(E)组成的无人机中继通信系统。S向UAV中继发送信号,然后R将信号放大并转发到D。为简单起见,本发明考虑到所有网络节点都配备了一个天线。此外,考虑S和D之间没有直接链接的情况,所述无人机中继通信系统的优化目标为通过联合优化干扰功率分配以及无人机位置部署以达到私密速率最大化,实现安全传输。The first step: establish a UAV relay communication system, the goal of which is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system; consider a source node (S), destination node (D), UAV relay communication system composed of UAV relay (R) and eavesdropper (E). S sends a signal to the UAV relay, then R amplifies and forwards the signal to D. For simplicity, the present invention takes into account that all network nodes are equipped with one antenna. In addition, considering that there is no direct link between S and D, the optimization goal of the UAV relay communication system is to maximize the privacy rate and achieve secure transmission by jointly optimizing the interference power distribution and UAV position deployment.

第二步:建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙——半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;地面源节点到目的节点通信系统的信道模型:Step 2: Establish the channel model of the communication system from the ground source node to the destination node with the UAV as the relay and in two time slots - half-duplex mode, according to the UAV received signal and the received signal of the destination node , calculate the privacy rate of the transmission link from the source node to the destination node; the channel model of the communication system from the source node to the destination node on the ground:

Figure BDA0002672456210000121
Figure BDA0002672456210000121

其中c是光速,αG是地面通信链路的路径损耗指数,fc是载波频率,deg是窃听者与地面用户之间的距离,σG是信道的阴影衰落变量;where c is the speed of light, α G is the path loss index of the ground communication link, f c is the carrier frequency, d eg is the distance between the eavesdropper and the ground user, and σ G is the shadow fading variable of the channel;

与无人机相关的信道包含视距(LoS)组和非视距(NLoS)组。地面用户与无人机之间具有LOS连接的概率The channels associated with UAVs include line-of-sight (LoS) groups and non-line-of-sight (NLoS) groups. Probability of LOS connection between ground user and UAV

Figure BDA0002672456210000122
Figure BDA0002672456210000122

Figure BDA0002672456210000123
Figure BDA0002672456210000123

其中A和B是取决于环境的常数,(xu,yu)表示无人机在水平维度上的位置,h表示无人机的高度,(xg,yg)表示地面用户的位置。此外,NLoS的概率为PNLoS=1-PLoS。另外,LoS和NLoS链路的路径损耗模型分别是where A and B are constants depending on the environment, (x u , y u ) is the position of the drone in the horizontal dimension, h is the height of the drone, and (x g , y g ) is the position of the ground user. Also, the probability of NLoS is P NLoS =1-P LoS . In addition, the path loss models for LoS and NLoS links are respectively

Figure BDA0002672456210000124
Figure BDA0002672456210000124

Figure BDA0002672456210000125
Figure BDA0002672456210000125

其中d是传输距离,

Figure BDA0002672456210000126
此外,αL和αN是LoS和NLoS信道的路径损耗指数。ηLoS和ηNLoS分别是LoS和NLoS的平均额外损失。本发明考虑概率平均路径损耗是在LoS和NLoS条件下平均得出的where d is the transmission distance,
Figure BDA0002672456210000126
Furthermore, αL and αN are the path loss indices for LoS and NLoS channels. ηLoS and ηNLoS are the average additional losses of LoS and NLoS , respectively. The present invention considers that the probability-averaged path loss is averaged under LoS and NLoS conditions

hij=PLoSLLoS+PNLoSLNLoS,i∈{R,D},j∈{R,E,D};h ij =P LoS L LoS +P NLoS L NLoS , i∈{R,D}, j∈{R,E,D};

在第一时隙,S将其信号传输到无人机中继(R),该信号也被窃听者(E)窃听。同时,D发出人为噪声,使窃听者感到困惑。在第二时隙,S处于静默状态,无人机中继将接收到的信号放大并发送到D,D也被窃听者窃听。本发明用zS和zJ表示来自S和D的机密信号和协作干扰信号。zS和zJ均为归一化幂,即|zS|2=1和|zJ|2=1,其中|·|表示绝对值。因此,在第一时隙,UAV和E处接收的信号为In the first time slot, S transmits its signal to the drone relay (R), which is also tapped by the eavesdropper (E). At the same time, D emits artificial noise to confuse eavesdroppers. In the second time slot, S is in a silent state, and the drone relay amplifies the received signal and sends it to D, which is also eavesdropped by eavesdroppers. The present invention uses z S and z J to denote the confidential signal and cooperative jamming signal from S and D. Both z S and z J are normalized powers, ie |z S | 2 =1 and |z J | 2 =1, where |·| represents an absolute value. Therefore, in the first time slot, the signals received at UAV and E are

Figure BDA0002672456210000131
Figure BDA0002672456210000131

Figure BDA0002672456210000132
Figure BDA0002672456210000132

其中PS和PD分别是来自S和D的发射功率,nR

Figure BDA0002672456210000133
是R和D处的复杂加性白高斯噪声(AWGN),遵循均值为零且方差为
Figure BDA0002672456210000134
的复高斯分布。where P S and P D are the transmit powers from S and D, respectively, n R and
Figure BDA0002672456210000133
is complex additive white Gaussian noise (AWGN) at R and D, obeying zero mean and variance
Figure BDA0002672456210000134
complex Gaussian distribution.

在第二时隙,R放大并以放大倍数β将接收到的信号转发到D。PR为R的发射功率。因此,β可以表示为In the second time slot, R amplifies and forwards the received signal to D with an amplification factor β. P R is the transmit power of R. Therefore, β can be expressed as

Figure BDA0002672456210000135
Figure BDA0002672456210000135

那么,D、E处接收到的信号为Then, the signals received at D and E are

Figure BDA0002672456210000136
Figure BDA0002672456210000136

Figure BDA0002672456210000137
Figure BDA0002672456210000137

其中nD

Figure BDA0002672456210000138
是D和E处的复杂加性高斯白噪声。由于干扰信号zJ源自D,而D对此有充分的了解。然后,D可以有效地去除该项,并且可以得到D处的接收信号为where n D and
Figure BDA0002672456210000138
are complex additive white Gaussian noise at D and E. Since the interfering signal z J originates from D, D has full knowledge of it. Then, D can effectively remove this term, and the received signal at D can be obtained as

Figure BDA0002672456210000141
Figure BDA0002672456210000141

计算源节点到目的节点传输链路的私密速率:为了简单,本发明重新定义了信道噪声比:Calculate the privacy rate of the transmission link from the source node to the destination node: For simplicity, the present invention redefines the channel-to-noise ratio:

Figure BDA0002672456210000142
Figure BDA0002672456210000142

第一时隙,窃听链路的信干噪比(SINR)为:In the first time slot, the signal-to-interference and noise ratio (SINR) of the eavesdropping link is:

Figure BDA0002672456210000143
Figure BDA0002672456210000143

D和E的瞬时SINR为:The instantaneous SINRs of D and E are:

Figure BDA0002672456210000144
Figure BDA0002672456210000144

Figure BDA0002672456210000145
Figure BDA0002672456210000145

为了获得最佳的窃听性能,窃听者采用最大比例合并(MRC)方法。然后,窃听节点E处的信干噪比(SINR)为In order to obtain the best eavesdropping performance, the eavesdropper adopts the Maximum Ratio Combining (MRC) method. Then, the signal to interference and noise ratio (SINR) at the eavesdropping node E is

Figure BDA0002672456210000146
Figure BDA0002672456210000146

在基于物理层安全的中继系统中,得到可实现的私密速率如下:In the relay system based on physical layer security, the achievable privacy rate is as follows:

Figure BDA0002672456210000147
Figure BDA0002672456210000147

第三步:构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型:Step 3: Build an optimization model with the objective function when the privacy rate reaches the maximum, design the interference power, and the location constraints of the UAV:

Figure BDA0002672456210000151
Figure BDA0002672456210000151

其中RS在第二步给出,(xu,yu)表示无人机在考虑区域Α中的水平位置。虽然这个问题看起来很简单,但是由于目标函数和可行区域的非凸性,因此解决起来相当麻烦。在下面步骤中,将问题分解为两层子问题。外层是无人机位置的部署优化,内层是在固定无人机位置下的干扰功率分配的优化。where R S is given in the second step, (x u , y u ) represents the horizontal position of the UAV in the considered area A. Although this problem seems simple, it is rather cumbersome to solve due to the non-convexity of the objective function and feasible region. In the following steps, the problem is decomposed into two levels of subproblems. The outer layer is the deployment optimization of the UAV position, and the inner layer is the optimization of the interference power distribution under the fixed UAV position.

第四步:确定在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率:在固定无人机放置的情况下,干扰功率的优化问题如下:Step 4: Under the condition that the position of the drone is fixed, traverse the destination node D and the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate: place the drone on a fixed drone. In the case of , the optimization problem of interference power is as follows:

Figure BDA0002672456210000152
Figure BDA0002672456210000152

对于这个问题,有一个基本的权衡,需要仔细处理。如果干扰功率太小,就不能充分干扰窃听者。相反,如果干扰功率太大,则由于中继的总功率有限,它将无法有效地中继源信息,从而也影响通信系统的安全性。因此,为了满足两个方面的需求,我们考虑优化干扰功率。For this problem, there is a fundamental trade-off that needs to be handled carefully. If the jamming power is too small, the eavesdropper cannot be sufficiently disturbed. On the contrary, if the interference power is too large, it will not be able to effectively relay the source information due to the limited total power of the relay, thus also affecting the security of the communication system. Therefore, in order to meet the needs of both aspects, we consider optimizing the interference power.

为了最大限度地提高干扰功率的私密速率,我们首先分析了私密速率的性质。对于上述优化问题,本发明利用二分搜索算法求解所得的功率即当前固定无人机位置的功率分配方案,最优干扰功率为

Figure BDA0002672456210000153
To maximize the privacy rate of interference power, we first analyze the nature of the privacy rate. For the above optimization problem, the present invention uses the binary search algorithm to solve the obtained power, that is, the power distribution scheme of the current fixed UAV position, and the optimal interference power is
Figure BDA0002672456210000153

二分搜索算法binary search algorithm

步骤一:初始化:设置PD的最小值和最大值,给定为Pmin和Pmax,其中Pmin=0;定义足够小的阈值ε;Step 1: Initialization: set the minimum and maximum values of PD , given as P min and P max , where P min =0; define a sufficiently small threshold ε;

步骤二:令

Figure BDA0002672456210000154
RS由第二步给出,如果
Figure BDA0002672456210000155
则Pmax=P*,否则Pmin=P*;Step 2: Order
Figure BDA0002672456210000154
R S is given by the second step, if
Figure BDA0002672456210000155
Then P max =P * , otherwise P min =P * ;

步骤三:若|Pmax-Pmin|<ε,得到最优的干扰功率P*,完成所述无人机中继通信系统的功率分配策略;否则重复进行步骤二。此外,也可以通过引入代价因子,将该问题的分数形式的目标函数转化为以功率为代价的减式,将问题转化为凸优化问题,采用Dinkelbach算法对转化后的问题进行循环迭代,求得原功率优化问题的最优解。Step 3: If |P max -P min |<ε, obtain the optimal interference power P * , and complete the power allocation strategy of the UAV relay communication system; otherwise, repeat step 2. In addition, by introducing a cost factor, the objective function in fractional form of the problem can be transformed into a subtraction at the cost of power, and the problem can be transformed into a convex optimization problem. The Dinkelbach algorithm is used to cyclically iterate the transformed problem to obtain The optimal solution of the original power optimization problem.

第五步:在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输。Step 5: Under the condition of optimal interference power, use the exhaustive search method to obtain the optimal position of the UAV, generate a data set, build and train the DNN model, apply it to the test set, and use the high computational efficiency of DNN to find the unmanned aerial vehicle. The best position of the man and the machine to maximize the privacy rate and achieve secure transmission.

在第四步的基础上,获得了最优干扰功率,得到了无人机位置部署的优化问题如下:On the basis of the fourth step, the optimal interference power is obtained, and the optimization problem of UAV position deployment is obtained as follows:

Figure BDA0002672456210000161
Figure BDA0002672456210000161

其中优化问题中的干扰功率约束是通过对第四步的优化问题求解得到的,即在最优干扰功率的条件下,求解上述无人机位置的优化问题。由于解决上述问题存在一定的困难,且当前没有可用的计算效率高的方案,因此,在这一部分中,本发明采用具有多个隐藏层和大量训练数据的神经网络模型学习网络特征,然后去求解无人机位置部署的优化问题,实现一种基于DNN的无人机部署方案。构建一个具有一个输入层,两个隐藏层和一个输出层的完全连接的DNN模型,通过训练DNN学习其输入/输出关系,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,使私密速率最大化,实现系统的安全传输。考虑一个位于200米×200米范围内的系统。无人机固定高度h为150米,源节点有固定位置(0,0,0)。首先,固定了S,D,E的位置,遍历无人机的水平位置,采用二分搜索算法获得最佳干扰功率P*,在最优干扰功率的条件下,最大私密速率对应无人机的最优位置。然后,通过遍历D和E的坐标位置,找到不同D和E对应的无人机最优位置,从而构造数据集。由于第四步中的二分搜索算法可以有效地实现,因此可以方便地进行数据收集。在DNN模型的输入层中,将目标节点和窃听者的坐标(xd,yd)和(xe,ye)被重塑成一个4×1的数据样本,可以表示为

Figure BDA0002672456210000171
无人机最优位置的坐标(xu,yu)作为标签输出,可以表示为
Figure BDA0002672456210000172
其中i∈{1,2,···,N}。把Q=[q1,q2,···,qN]作为DNN的输入,qi中的每一项对应一个输入神经元。取无人机的最优位置U=[u1,u2,···,uN]作为DNN模型的输出,ui中的每一项对应一个输出神经元。最后,将经过良好训练的DNN模型用于测试集,快速有效的找到无人机的最优位置,求解无人机位置优化的问题,以实现最高的私密速率。此外,还可以在最优干扰功率的情况下,使用连续凸近似(SCA)的方法求解无人机位置部署问题,连续凸近似法是一种求解非凸优化问题的方法,它可以将原非凸表达式进行全局近似,通过将其非凸的目标函数和约束条件进行松弛和一阶泰勒展开,将非凸问题转化为凸优化问题,然后该过程在连续凸逼近算法框架下可求解出位置优化的最优解,找到无人机的最优位置。The interference power constraint in the optimization problem is obtained by solving the optimization problem in the fourth step, that is, under the condition of the optimal interference power, the optimization problem of the above-mentioned UAV position is solved. Since there are certain difficulties in solving the above problems, and there is currently no available solution with high computational efficiency, therefore, in this part, the present invention adopts a neural network model with multiple hidden layers and a large amount of training data to learn network features, and then solves the problem. The optimization problem of UAV position deployment, realizes a DNN-based UAV deployment scheme. Build a fully connected DNN model with one input layer, two hidden layers, and one output layer, learn its input/output relationship by training the DNN, apply it to the test set, and take advantage of the high computational efficiency of the DNN to find the best UAV. The best location to maximize the privacy rate and realize the secure transmission of the system. Consider a system located within a range of 200 meters by 200 meters. The fixed height h of the UAV is 150 meters, and the source node has a fixed position (0, 0, 0). First, the positions of S, D, and E are fixed, the horizontal position of the UAV is traversed, and the optimal jamming power P * is obtained by using the binary search algorithm. Under the condition of the optimal jamming power, the maximum privacy rate corresponds to the maximum privacy rate of the UAV. Excellent location. Then, by traversing the coordinate positions of D and E, the optimal position of the UAV corresponding to different D and E is found to construct the data set. Since the binary search algorithm in the fourth step can be implemented efficiently, data collection can be facilitated. In the input layer of the DNN model, the coordinates (x d , y d ) and (x e , y e ) of the target node and the eavesdropper are reshaped into a 4×1 data sample, which can be expressed as
Figure BDA0002672456210000171
The coordinates (x u , y u ) of the optimal position of the drone are output as labels, which can be expressed as
Figure BDA0002672456210000172
where i∈{1,2,...,N}. Take Q=[q 1 , q 2 , . . . , q N ] as the input of DNN, and each item in q i corresponds to an input neuron. Take the optimal position U=[u 1 , u 2 , . . . , u N ] as the output of the DNN model, and each item in u i corresponds to an output neuron. Finally, the well-trained DNN model is used for the test set to quickly and effectively find the optimal position of the drone, and solve the problem of the optimization of the drone position to achieve the highest privacy rate. In addition, in the case of optimal interference power, the continuous convex approximation (SCA) method can be used to solve the UAV position deployment problem. The continuous convex approximation method is a method for solving non-convex optimization problems. The convex expression is globally approximated, and the non-convex problem is transformed into a convex optimization problem by relaxing and first-order Taylor expansion of its non-convex objective function and constraints, and then the process can be solved under the framework of the continuous convex approximation algorithm. Optimize the optimal solution to find the optimal position of the UAV.

下面结合实验对本发明的技术效果作详细的描述。The technical effects of the present invention will be described in detail below in conjunction with experiments.

图3给出了无人机中继网络通信系统的安全性能与窃听者所在位置的关系示意图,从图3中可以看到,本发明的方案在不同的窃听者位置条件下,由于满足干扰条件,系统的私密速率随位置的变化而变化,随着位置的变化先增大后减小。相比之下,没有中继的直接传输与没有干扰两种方案下,私密速率在靠近窃听者时减小,远离窃听者时增大。从数值上看,所提方案的私密速率比没有中继的直接传输和没有干扰两种方案最高高出1.7dB,严格保证网络的安全传输。Figure 3 shows a schematic diagram of the relationship between the safety performance of the UAV relay network communication system and the location of the eavesdropper. As can be seen from Figure 3, the solution of the present invention is under different eavesdropper location conditions, because the interference conditions are met. , the privacy rate of the system changes with the change of location, first increases and then decreases with the change of location. In contrast, under the two schemes of direct transmission without relay and without interference, the privacy rate decreases when it is close to the eavesdropper and increases when it is far away from the eavesdropper. From the numerical point of view, the privacy rate of the proposed scheme is up to 1.7dB higher than the two schemes of direct transmission without relay and without interference, which strictly guarantees the secure transmission of the network.

图4给出了无人机中继网络通信系统的安全性能与中继功率的关系示意图,从图4中可以看到,由于满足窃听者位置固定条件,本发明的方案下系统的私密速率相比没有干扰的方案有所增大,而从数值上看,没有干扰的方案的私密速率会比本发明的方案的结果低出最大0.8dB。而没有中继的直接传输方案中,由于没有中继功率,私密速率为0.35dB,保持不变。综合上述结果可以看到,本发明提出的方案在安全性能方面与基准相比具有明显的优势,增强了现有的无人机中继网络的安全传输。Figure 4 shows a schematic diagram of the relationship between the safety performance of the UAV relay network communication system and the relay power. It can be seen from Figure 4 that, since the eavesdropper's position fixation condition is met, the privacy rate of the system under the scheme of the present invention is relatively different. This is an increase over the scheme without interference, and numerically, the privacy rate of the scheme without interference will be a maximum of 0.8 dB lower than the result of the scheme of the present invention. In the direct transmission scheme without relay, since there is no relay power, the privacy rate is 0.35dB, which remains unchanged. From the above results, it can be seen that the scheme proposed by the present invention has obvious advantages compared with the benchmark in terms of safety performance, and enhances the safe transmission of the existing UAV relay network.

应当注意,本发明的实施方式可以通过硬件、软件或者软件和硬件的结合来实现。硬件部分可以利用专用逻辑来实现;软件部分可以存储在存储器中,由适当的指令执行系统,例如微处理器或者专用设计硬件来执行。本领域的普通技术人员可以理解上述的设备和方法可以使用计算机可执行指令和/或包含在处理器控制代码中来实现,例如在诸如磁盘、CD或DVD-ROM的载体介质、诸如只读存储器(固件)的可编程的存储器或者诸如光学或电子信号载体的数据载体上提供了这样的代码。本发明的设备及其模块可以由诸如超大规模集成电路或门阵列、诸如逻辑芯片、晶体管等的半导体、或者诸如现场可编程门阵列、可编程逻辑设备等的可编程硬件设备的硬件电路实现,也可以用由各种类型的处理器执行的软件实现,也可以由上述硬件电路和软件的结合例如固件来实现。It should be noted that the embodiments of the present invention may be implemented by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using special purpose logic; the software portion may be stored in memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those of ordinary skill in the art will appreciate that the apparatus and methods described above may be implemented using computer-executable instructions and/or embodied in processor control code, for example on a carrier medium such as a disk, CD or DVD-ROM, such as a read-only memory Such code is provided on a programmable memory (firmware) or a data carrier such as an optical or electronic signal carrier. The device and its modules of the present invention can be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., It can also be implemented by software executed by various types of processors, or by a combination of the above-mentioned hardware circuits and software, such as firmware.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,都应涵盖在本发明的保护范围之内。The above are only specific embodiments of the present invention, but the protection scope of the present invention is not limited to this. Any person skilled in the art is within the technical scope disclosed by the present invention, and all within the spirit and principle of the present invention Any modifications, equivalent replacements and improvements made within the scope of the present invention should be included within the protection scope of the present invention.

Claims (6)

1.一种面向无人机中继网络的安全传输增强方法,其特征在于,所述面向无人机中继网络的安全传输增强方法包括:1. a security transmission enhancement method oriented to the UAV relay network, is characterized in that, the described security transmission enhancement method oriented to the UAV relay network comprises: 建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;Establish a UAV relay communication system, the goal of which is to jointly optimize the jamming power and the UAV relay position to maximize the privacy rate of the system; 建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;Establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the received signal of the destination node, calculate the source node to The privacy rate of the destination node transmission link; 构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;Build an optimization model with the objective function when the privacy rate reaches the maximum, and design the interference power and UAV position constraints; 在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;Under the condition that the position of the UAV is fixed, traverse the destination node D and the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate; 在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输;Under the condition of optimal interference power, use the exhaustive search method to obtain the optimal position of the UAV, generate a data set, build and train the DNN model, apply it to the test set, and use the high computational efficiency of DNN to find the optimal position of the UAV. The best location to maximize the privacy rate and achieve secure transmission; 所述面向无人机中继网络的安全传输增强方法建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;地面源节点到目的节点通信系统的信道模型:The security transmission enhancement method for the UAV relay network establishes the channel model of the ground source node to destination node communication system with the UAV as the relay, and in the two-time-slot-half-duplex mode, according to the unmanned aerial vehicle. Calculate the privacy rate of the transmission link from the source node to the destination node; the channel model of the communication system from the source node to the destination node on the ground:
Figure FDA0003702033710000011
Figure FDA0003702033710000011
其中c是光速,αG是地面通信链路的路径损耗指数,fc是载波频率,deg是窃听者与地面用户之间的距离,σG是信道的阴影衰落变量;where c is the speed of light, α G is the path loss index of the ground communication link, f c is the carrier frequency, d eg is the distance between the eavesdropper and the ground user, and σ G is the shadow fading variable of the channel; 与无人机相关的信道包含视距LoS组和非视距NLoS组,地面用户与无人机之间具有LOS连接的概率:The channels related to the UAV include the line-of-sight LoS group and the non-line-of-sight NLoS group, and the probability of having a LOS connection between the ground user and the UAV is:
Figure FDA0003702033710000021
Figure FDA0003702033710000021
Figure FDA0003702033710000022
Figure FDA0003702033710000022
其中A和B是取决于环境的常数,(xu,yu)表示无人机在水平维度上的位置,h表示无人机的高度,(xg,yg)表示地面用户的位置,NLoS的概率为PNLoS=1-PLoS,LoS和NLoS链路的路径损耗模型分别是:where A and B are constants depending on the environment, (x u , y u ) is the position of the drone in the horizontal dimension, h is the height of the drone, (x g , y g ) is the position of the ground user, The probability of NLoS is P NLoS =1-P LoS , and the path loss models of LoS and NLoS links are:
Figure FDA0003702033710000023
Figure FDA0003702033710000023
Figure FDA0003702033710000024
Figure FDA0003702033710000024
其中d是传输距离,
Figure FDA0003702033710000025
αL和αN是LoS和NLoS信道的路径损耗指数,ηLoS和ηNLoS分别是LoS和NLoS的平均额外损失;概率平均路径损耗是在LoS和NLoS条件下平均得出:
where d is the transmission distance,
Figure FDA0003702033710000025
α L and α N are the path loss exponents for LoS and NLoS channels, η LoS and η NLoS are the average additional losses for LoS and NLoS, respectively; the probabilistic average path loss is averaged under LoS and NLoS conditions:
hij=PLoSLLoS+PNLoSLNLoS,i∈{R,D},j∈{R,E,D};h ij =P LoS L LoS +P NLoS L NLoS , i∈{R,D}, j∈{R,E,D}; 在第一时隙,S将其信号传输到无人机中继R,该信号也被窃听者E窃听;同时,D发出人为噪声,使窃听者感到困惑;在第二时隙,S处于静默状态,无人机中继将接收到的信号放大并发送到D,D也被窃听者窃听,用zS和zJ表示来自S和D的机密信号和协作干扰信号,zS和zJ均为归一化幂,即|zS|2=1和|zJ|2=1,其中|·|表示绝对值,在第一时隙,UAV和E处接收的信号为:In the first time slot, S transmits its signal to the drone relay R, which is also eavesdropped by the eavesdropper E; at the same time, D emits artificial noise, which confuses the eavesdropper; in the second time slot, S is silent state, the drone relay amplifies the received signal and sends it to D, D is also eavesdropped by eavesdroppers, denoted by z S and z J for confidential signals and cooperative jamming signals from S and D, both z S and z J are normalized powers, ie |z S | 2 =1 and |z J | 2 =1, where |·| represents the absolute value, the signals received at the first time slot, UAV and E are:
Figure FDA0003702033710000026
Figure FDA0003702033710000026
Figure FDA0003702033710000027
Figure FDA0003702033710000027
其中PS和PD分别是来自S和D的发射功率,nR
Figure FDA0003702033710000028
是R和D处的复杂加性白高斯噪声AWGN,遵循均值为零且方差为
Figure FDA0003702033710000029
的复高斯分布;
where P S and P D are the transmit powers from S and D, respectively, n R and
Figure FDA0003702033710000028
is the complex additive white Gaussian noise AWGN at R and D, following zero mean and variance
Figure FDA0003702033710000029
The complex Gaussian distribution of ;
在第二时隙,R放大并以放大倍数β将接收到的信号转发到D,PR为R的发射功率,β表示为:In the second time slot, R amplifies and forwards the received signal to D with an amplification factor β, where P R is the transmit power of R, and β is expressed as:
Figure FDA0003702033710000031
Figure FDA0003702033710000031
那么,D、E处接收到的信号为:Then, the signals received at D and E are:
Figure FDA0003702033710000032
Figure FDA0003702033710000032
Figure FDA0003702033710000033
Figure FDA0003702033710000033
其中nD
Figure FDA0003702033710000034
是D和E处的复杂加性高斯白噪声,D有效地去除干扰信号项,并且得到D处的接收信号为:
where n D and
Figure FDA0003702033710000034
is the complex additive white Gaussian noise at D and E, D effectively removes the interfering signal term, and the received signal at D is obtained as:
Figure FDA0003702033710000035
Figure FDA0003702033710000035
计算源节点到目的节点传输链路的私密速率,重新定义了信道噪声比:Calculate the privacy rate of the transmission link from the source node to the destination node, and redefine the channel-to-noise ratio:
Figure FDA0003702033710000036
Figure FDA0003702033710000036
第一时隙,窃听链路的信干噪比SINR为:In the first time slot, the SINR of the eavesdropping link is:
Figure FDA0003702033710000037
Figure FDA0003702033710000037
D和E的瞬时SINR为:The instantaneous SINRs of D and E are:
Figure FDA0003702033710000038
Figure FDA0003702033710000038
Figure FDA0003702033710000039
Figure FDA0003702033710000039
窃听者采用最大比例合并MRC方法,窃听节点E处的信干噪比SINR为:The eavesdropper adopts the maximum proportion combined MRC method, and the signal-to-interference-noise ratio SINR at the eavesdropping node E is:
Figure FDA0003702033710000041
Figure FDA0003702033710000041
在基于物理层安全的中继系统中,得到私密速率如下:In the relay system based on physical layer security, the private rate is obtained as follows:
Figure FDA0003702033710000042
Figure FDA0003702033710000042
所述面向无人机中继网络的安全传输增强方法构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型:The security transmission enhancement method for the UAV relay network constructs an optimization model that takes the privacy rate reaching the maximum as the objective function, and designs the interference power and UAV position constraints:
Figure FDA0003702033710000043
Figure FDA0003702033710000043
Figure FDA0003702033710000044
Figure FDA0003702033710000044
(xu,yu)∈Α;(x u , y u )∈Α; 其中(xu,yu)表示无人机在考虑区域Α中的水平位置;where (x u , y u ) represents the horizontal position of the UAV in the considered area A; 所述面向无人机中继网络的安全传输增强方法确定在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率:在固定无人机放置的情况下,干扰功率的优化问题如下:The security transmission enhancement method for the UAV relay network determines that under the condition that the UAV position is fixed, traverse the coordinate position of the destination node D and the eavesdropper E, and use the binary search algorithm to optimize the interference power distribution scheme to maximize the interference power distribution scheme. Optimizing the privacy rate: In the case of fixed UAV placement, the optimization problem of jamming power is as follows:
Figure FDA0003702033710000045
Figure FDA0003702033710000045
Figure FDA0003702033710000046
Figure FDA0003702033710000046
所述面向无人机中继网络的安全传输增强方法利用二分搜索算法求解所得的功率即当前固定无人机位置的功率分配方案,最优干扰功率为
Figure FDA0003702033710000047
The security transmission enhancement method for the UAV relay network uses the binary search algorithm to obtain the power obtained by solving the power distribution scheme of the current fixed UAV position, and the optimal interference power is
Figure FDA0003702033710000047
步骤一:初始化:设置PD的最小值和最大值,给定为Pmin和Pmax,其中Pmin=0;定义足够小的阈值ε;Step 1: Initialization: set the minimum and maximum values of PD , given as P min and P max , where P min =0; define a sufficiently small threshold ε; 步骤二:令
Figure FDA0003702033710000051
RS由第二步给出,如果
Figure FDA0003702033710000052
则Pmax=P*,否则Pmin=P*
Step 2: Order
Figure FDA0003702033710000051
R S is given by the second step, if
Figure FDA0003702033710000052
Then P max =P * , otherwise P min =P * ;
步骤三:若|Pmax-Pmin|<ε,得到最优的干扰功率P*,完成无人机中继通信系统的功率分配策略;否则重复进行步骤二。Step 3: If |P max -P min |<ε, obtain the optimal interference power P * , and complete the power allocation strategy of the UAV relay communication system; otherwise, repeat step 2.
2.如权利要求1所述的面向无人机中继网络的安全传输增强方法,其特征在于,所述面向无人机中继网络的安全传输增强方法建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;考虑一个由源节点S,目的节点D,UAV中继R和窃听者E组成的无人机中继通信系统,S向UAV中继发送信号,R将信号放大并转发到D。2. The safety transmission enhancement method for UAV relay network as claimed in claim 1, is characterized in that, the described safety transmission enhancement method for UAV relay network establishes a UAV relay communication system, which The goal is to jointly optimize the interference power and UAV relay position to maximize the privacy rate of the system; consider a UAV relay communication system composed of source node S, destination node D, UAV relay R and eavesdropper E, S sends a signal to the UAV relay, R amplifies and forwards the signal to D. 3.如权利要求1所述的面向无人机中继网络的安全传输增强方法,其特征在于,所述面向无人机中继网络的安全传输增强方法在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输;3. the safe transmission enhancement method for UAV relay network as claimed in claim 1 is characterized in that, under the condition of optimal interference power, the described safe transmission enhancement method for UAV relay network uses The exhaustive search method obtains the optimal position of the drone, generates a data set, constructs and trains the DNN model, applies it to the test set, and uses the high computational efficiency of DNN to find the best position of the drone to maximize the privacy rate and achieve secure transmission; 获得最优干扰功率,得到了无人机位置部署的优化问题如下:To obtain the optimal jamming power, the optimization problem of UAV position deployment is obtained as follows:
Figure FDA0003702033710000053
Figure FDA0003702033710000053
s.t.(xu,yu)∈Αst(x u , y u )∈Α
Figure FDA0003702033710000054
Figure FDA0003702033710000054
4.如权利要求3所述的面向无人机中继网络的安全传输增强方法,其特征在于,所述面向无人机中继网络的安全传输增强方法采用具有多个隐藏层和大量训练数据的神经网络模型学习网络特征,去求解无人机位置部署的优化问题,实现基于DNN的无人机部署方案;构建一个具有一个输入层,两个隐藏层和一个输出层的完全连接的DNN模型,通过训练DNN学习其输入/输出关系,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,使私密速率最大化,实现系统的安全传输,考虑一个位于200米×200米范围内的系统,无人机固定高度h为150米,源节点有固定位置(0,0,0),首先,固定了S,D,E的位置,遍历无人机的水平位置,采用二分搜索算法获得最佳干扰功率P*,在最优干扰功率的条件下,最大私密速率对应无人机的最优位置;然后,通过遍历D和E的坐标位置,找到不同D和E对应的无人机最优位置,构造数据集;4. The safety transmission enhancement method for UAV relay network as claimed in claim 3 is characterized in that, the safety transmission enhancement method for UAV relay network adopts a plurality of hidden layers and a large amount of training data The neural network model learns network features to solve the optimization problem of UAV position deployment, and realizes the UAV deployment scheme based on DNN; constructs a fully connected DNN model with one input layer, two hidden layers and one output layer , learn its input/output relationship by training DNN, apply it to the test set, use the high computational efficiency of DNN to find the best position of the drone, maximize the privacy rate, and realize the safe transmission of the system, consider a location at 200 meters × For a system within a range of 200 meters, the fixed height h of the UAV is 150 meters, and the source node has a fixed position (0, 0, 0). First, the positions of S, D, and E are fixed, and the horizontal position of the UAV is traversed. The optimal interference power P * is obtained by using the binary search algorithm. Under the condition of the optimal interference power, the maximum privacy rate corresponds to the optimal position of the UAV; The optimal position of the UAV to construct a data set; 在DNN模型的输入层中,将目标节点和窃听者的坐标(xd,yd)和(xe,ye)被重塑成一个4×1的数据样本,表示为
Figure FDA0003702033710000061
无人机最优位置的坐标(xu,yu)作为标签输出,表示为
Figure FDA0003702033710000062
其中i∈{1,2,…,N},把Q=[q1,q2,…,qN]作为DNN的输入,qi中的每一项对应一个输入神经元,取无人机的最优位置U=[u1,u2,…,uN]作为DNN模型的输出,ui中的每一项对应一个输出神经元,最后,将经过良好训练的DNN模型用于测试集,快速有效的找到无人机的最优位置,求解无人机位置优化的问题。
In the input layer of the DNN model, the coordinates (x d , y d ) and (x e , y e ) of the target node and the eavesdropper are reshaped into a 4×1 data sample, denoted as
Figure FDA0003702033710000061
The coordinates (x u , y u ) of the optimal position of the UAV are output as labels, which are expressed as
Figure FDA0003702033710000062
where i∈{1,2,...,N}, take Q=[q 1 ,q 2 ,...,q N ] as the input of DNN, each item in q i corresponds to an input neuron, take the UAV The optimal position of U=[u 1 , u 2 ,...,u N ] is used as the output of the DNN model, each item in u i corresponds to an output neuron, and finally, the well-trained DNN model is used for the test set , quickly and effectively find the optimal position of the UAV, and solve the problem of UAV position optimization.
5.一种计算机设备,其特征在于,所述计算机设备包括存储器和处理器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行权利要求1~4任意一项所述的面向无人机中继网络的安全传输增强方法。5. A computer device, characterized in that the computer device comprises a memory and a processor, the memory stores a computer program, and when the computer program is executed by the processor, the processor is made to execute claim 1 The security transmission enhancement method for a UAV relay network according to any one of ~4. 6.一种实施权利要求1~4任意一项所述面向无人机中继网络的安全传输增强方法的面向无人机中继网络的安全传输增强系统,其特征在于,所述面向无人机中继网络的安全传输增强系统包括:6 . A safety transmission enhancement system for a UAV relay network implementing the method for enhancing safety transmission for a UAV relay network according to any one of claims 1 to 4 , wherein the unmanned aircraft-oriented The security transmission enhancement system of the machine relay network includes: 无人机中继通信系统建立模块,用于建立无人机中继通信系统,其目标为联合优化干扰功率与无人机中继位置使系统的私密速率达到最大;The UAV relay communication system establishment module is used to establish the UAV relay communication system, and its goal is to jointly optimize the interference power and the UAV relay position to maximize the privacy rate of the system; 信道模型及时隙建立模块,用于建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;The channel model and slot establishment module are used to establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the purpose The received signal of the node calculates the privacy rate of the transmission link from the source node to the destination node; 目标函数构建模块,用于构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型;The objective function building module is used to construct an optimization model that takes the privacy rate reaching the maximum as the objective function, design interference power, and UAV position constraints; 私密速率最大化模块,用于在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率;The privacy rate maximization module is used to traverse the coordinate position of the destination node D and the eavesdropper E under the condition that the position of the drone is fixed, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate; 安全传输模块,用于在最优干扰功率的条件下,使用穷举搜索法得到无人机最优位置,生成数据集,构建并训练DNN模型,应用于测试集,利用DNN的高计算效率,找到无人机的最佳位置,以最大化私密速率,实现安全传输;The safe transmission module is used to obtain the optimal position of the UAV using the exhaustive search method under the condition of optimal interference power, generate a data set, build and train a DNN model, apply it to the test set, and utilize the high computational efficiency of DNN, Find the best position of the drone to maximize the privacy rate and achieve safe transmission; 建立以无人机为中继的地面源节点到目的节点通信系统的信道模型以及在两个时隙-半双工模式下,根据无人机接收信号以及目的节点的接收信号,计算源节点到目的节点传输链路的私密速率;地面源节点到目的节点通信系统的信道模型:Establish the channel model of the ground source node-to-destination node communication system with the UAV as the relay, and in the two-slot-half-duplex mode, according to the UAV received signal and the received signal of the destination node, calculate the source node to The privacy rate of the destination node transmission link; the channel model of the ground source node to destination node communication system:
Figure FDA0003702033710000071
Figure FDA0003702033710000071
其中c是光速,αG是地面通信链路的路径损耗指数,fc是载波频率,deg是窃听者与地面用户之间的距离,σG是信道的阴影衰落变量;where c is the speed of light, α G is the path loss index of the ground communication link, f c is the carrier frequency, d eg is the distance between the eavesdropper and the ground user, and σ G is the shadow fading variable of the channel; 与无人机相关的信道包含视距LoS组和非视距NLoS组,地面用户与无人机之间具有LOS连接的概率:The channels related to the UAV include the line-of-sight LoS group and the non-line-of-sight NLoS group, and the probability of having a LOS connection between the ground user and the UAV is:
Figure FDA0003702033710000072
Figure FDA0003702033710000072
Figure FDA0003702033710000073
Figure FDA0003702033710000073
其中A和B是取决于环境的常数,(xu,yu)表示无人机在水平维度上的位置,h表示无人机的高度,(xg,yg)表示地面用户的位置,NLoS的概率为PNLoS=1-PLoS,LoS和NLoS链路的路径损耗模型分别是:where A and B are constants depending on the environment, (x u , y u ) is the position of the drone in the horizontal dimension, h is the height of the drone, (x g , y g ) is the position of the ground user, The probability of NLoS is P NLoS =1-P LoS , and the path loss models of LoS and NLoS links are:
Figure FDA0003702033710000074
Figure FDA0003702033710000074
Figure FDA0003702033710000075
Figure FDA0003702033710000075
其中d是传输距离,
Figure FDA0003702033710000081
αL和αN是LoS和NLoS信道的路径损耗指数,ηLoS和ηNLoS分别是LoS和NLoS的平均额外损失;概率平均路径损耗是在LoS和NLoS条件下平均得出:
where d is the transmission distance,
Figure FDA0003702033710000081
α L and α N are the path loss exponents for LoS and NLoS channels, η LoS and η NLoS are the average additional losses for LoS and NLoS, respectively; the probabilistic average path loss is averaged under LoS and NLoS conditions:
hij=PLoSLLoS+PNLoSLNLoS,i∈{R,D},j∈{R,E,D};h ij =P LoS L LoS +P NLoS L NLoS , i∈{R,D}, j∈{R,E,D}; 在第一时隙,S将其信号传输到无人机中继R,该信号也被窃听者E窃听;同时,D发出人为噪声,使窃听者感到困惑;在第二时隙,S处于静默状态,无人机中继将接收到的信号放大并发送到D,D也被窃听者窃听,用zS和zJ表示来自S和D的机密信号和协作干扰信号,zS和zJ均为归一化幂,即|zS|2=1和|zJ|2=1,其中|·|表示绝对值,在第一时隙,UAV和E处接收的信号为:In the first time slot, S transmits its signal to the drone relay R, which is also eavesdropped by the eavesdropper E; at the same time, D emits artificial noise, which confuses the eavesdropper; in the second time slot, S is silent state, the drone relay amplifies the received signal and sends it to D, D is also eavesdropped by eavesdroppers, denoted by z S and z J for confidential signals and cooperative jamming signals from S and D, both z S and z J are normalized powers, ie |z S | 2 =1 and |z J | 2 =1, where |·| represents the absolute value, the signals received at the first time slot, UAV and E are:
Figure FDA0003702033710000082
Figure FDA0003702033710000082
Figure FDA0003702033710000083
Figure FDA0003702033710000083
其中PS和PD分别是来自S和D的发射功率,nR
Figure FDA0003702033710000084
是R和D处的复杂加性白高斯噪声AWGN,遵循均值为零且方差为
Figure FDA0003702033710000085
的复高斯分布;
where P S and P D are the transmit powers from S and D, respectively, n R and
Figure FDA0003702033710000084
is the complex additive white Gaussian noise AWGN at R and D, following zero mean and variance
Figure FDA0003702033710000085
The complex Gaussian distribution of ;
在第二时隙,R放大并以放大倍数β将接收到的信号转发到D,PR为R的发射功率,β表示为:In the second time slot, R amplifies and forwards the received signal to D with an amplification factor β, where P R is the transmit power of R, and β is expressed as:
Figure FDA0003702033710000086
Figure FDA0003702033710000086
那么,D、E处接收到的信号为:Then, the signals received at D and E are:
Figure FDA0003702033710000087
Figure FDA0003702033710000087
Figure FDA0003702033710000088
Figure FDA0003702033710000088
其中nD
Figure FDA0003702033710000091
是D和E处的复杂加性高斯白噪声,D有效地去除项,并且得到D处的接收信号为:
where n D and
Figure FDA0003702033710000091
is the complex additive white Gaussian noise at D and E, D effectively removes the term, and the received signal at D is obtained as:
Figure FDA0003702033710000092
Figure FDA0003702033710000092
计算源节点到目的节点传输链路的私密速率,重新定义了信道噪声比:Calculate the privacy rate of the transmission link from the source node to the destination node, and redefine the channel-to-noise ratio:
Figure FDA0003702033710000093
Figure FDA0003702033710000093
第一时隙,窃听链路的信干噪比SINR为:In the first time slot, the SINR of the eavesdropping link is:
Figure FDA0003702033710000094
Figure FDA0003702033710000094
D和E的瞬时SINR为:The instantaneous SINRs of D and E are:
Figure FDA0003702033710000095
Figure FDA0003702033710000095
Figure FDA0003702033710000096
Figure FDA0003702033710000096
窃听者采用最大比例合并MRC方法,窃听节点E处的信干噪比SINR为:The eavesdropper adopts the maximum proportion combined MRC method, and the signal-to-interference-noise ratio SINR at the eavesdropping node E is:
Figure FDA0003702033710000097
Figure FDA0003702033710000097
在基于物理层安全的中继系统中,得到私密速率如下:In the relay system based on physical layer security, the private rate is obtained as follows:
Figure FDA0003702033710000098
Figure FDA0003702033710000098
构建以私密速率达到最大时为目标函数,设计干扰功率,无人机位置约束条件的优化模型:Construct an optimization model with the objective function when the privacy rate reaches the maximum, and design the interference power and UAV position constraints:
Figure FDA0003702033710000101
Figure FDA0003702033710000101
Figure FDA0003702033710000102
Figure FDA0003702033710000102
(xu,yu)∈Α;(x u , y u )∈Α; 其中(xu,yu)表示无人机在考虑区域Α中的水平位置;where (x u , y u ) represents the horizontal position of the UAV in the considered area A; 确定在无人机位置固定的条件下,遍历目的节点D,窃听者E的坐标位置,利用二分搜索算法,优化干扰功率分配方案,以最大化私密速率:在固定无人机放置的情况下,干扰功率的优化问题如下:Determine the location of the drone, traverse the destination node D, the coordinate position of the eavesdropper E, and use the binary search algorithm to optimize the interference power allocation scheme to maximize the privacy rate: in the case of fixed drone placement, The optimization problem of interference power is as follows:
Figure FDA0003702033710000103
Figure FDA0003702033710000103
Figure FDA0003702033710000104
Figure FDA0003702033710000104
利用二分搜索算法求解所得的功率即当前固定无人机位置的功率分配方案,最优干扰功率为
Figure FDA0003702033710000105
The power obtained by solving the binary search algorithm is the power allocation scheme of the current fixed UAV position, and the optimal interference power is
Figure FDA0003702033710000105
步骤一:初始化:设置PD的最小值和最大值,给定为Pmin和Pmax,其中Pmin=0;定义足够小的阈值ε;Step 1: Initialization: set the minimum and maximum values of PD , given as P min and P max , where P min =0; define a sufficiently small threshold ε; 步骤二:令
Figure FDA0003702033710000106
RS由第二步给出,如果
Figure FDA0003702033710000107
则Pmax=P*,否则Pmin=P*
Step 2: Order
Figure FDA0003702033710000106
R S is given by the second step, if
Figure FDA0003702033710000107
Then P max =P * , otherwise P min =P * ;
步骤三:若|Pmax-Pmin|<ε,得到最优的干扰功率P*,完成无人机中继通信系统的功率分配策略;否则重复进行步骤二。Step 3: If |P max -P min |<ε, obtain the optimal interference power P * , and complete the power allocation strategy of the UAV relay communication system; otherwise, repeat step 2.
CN202010937439.2A 2020-09-08 2020-09-08 Safety transmission enhancement method for relay network of unmanned aerial vehicle Expired - Fee Related CN112243252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010937439.2A CN112243252B (en) 2020-09-08 2020-09-08 Safety transmission enhancement method for relay network of unmanned aerial vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010937439.2A CN112243252B (en) 2020-09-08 2020-09-08 Safety transmission enhancement method for relay network of unmanned aerial vehicle

Publications (2)

Publication Number Publication Date
CN112243252A CN112243252A (en) 2021-01-19
CN112243252B true CN112243252B (en) 2022-10-11

Family

ID=74170813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010937439.2A Expired - Fee Related CN112243252B (en) 2020-09-08 2020-09-08 Safety transmission enhancement method for relay network of unmanned aerial vehicle

Country Status (1)

Country Link
CN (1) CN112243252B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112954690B (en) * 2021-01-22 2022-11-22 西北工业大学 Anti-interference method and system based on space-based reconfigurable intelligent surface
CN112929977B (en) * 2021-02-10 2022-05-31 山西大学 Deep learning amplification forwarding cooperative network energy efficiency resource allocation method
CN113194443B (en) * 2021-03-11 2023-03-24 西北工业大学深圳研究院 Unmanned aerial vehicle relay Internet of vehicles safety transmission method based on non-orthogonal multiple access
CN113141205B (en) * 2021-04-09 2022-04-29 西北工业大学 A method and system for unloading services between cells based on UAV relay
CN113556769B (en) * 2021-07-21 2022-04-22 湖南人文科技学院 A computer data transmission communication method and system based on interference control
CN114006645B (en) * 2021-09-07 2024-09-06 西北工业大学 Relay-assisted safe transmission method and system for cognitive unmanned aerial vehicle
CN114143852B (en) * 2021-11-06 2024-11-19 中国电子科技集团公司第五十四研究所 An anti-interference communication link selection method for unmanned aerial vehicle clusters
CN114189872B (en) * 2021-12-08 2022-11-29 香港中文大学(深圳) Method and device for determining relay service position of unmanned aerial vehicle
CN114302490B (en) * 2021-12-31 2024-04-02 杭州电子科技大学 Relay power setting method to ensure information transmission security considering relay trust
CN114157345B (en) * 2022-02-08 2022-05-06 南京信息工程大学 A data-aided anti-jamming method for unmanned aerial vehicle swarm cooperative airspace
CN114615672B (en) * 2022-03-07 2023-07-25 西北工业大学 A Cooperative Physical Layer Security Enhancement Method Based on Statistical Information
CN115173891B (en) * 2022-06-08 2025-07-25 国网北京市电力公司 Method and device for determining maximum sum rate of collaborative rate division multiple access system
CN115276766B (en) * 2022-07-19 2024-05-31 西安电子科技大学 Optimization method for auxiliary interference power and trajectory combination of cooperative Unmanned Aerial Vehicle (UAV)
CN115988500B (en) * 2022-10-11 2025-07-11 南京邮电大学 A physical layer security-assisted lawful monitoring method for suspicious self-organizing communications
CN116782335B (en) * 2023-08-23 2023-11-07 陕西通信规划设计研究院有限公司 Signal processing method and device of mobile terminal
CN117479195B (en) * 2023-12-27 2024-03-19 北京航空航天大学杭州创新研究院 Physical layer safety protection method, system, architecture and medium for multi-hop sensor network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587684A (en) * 2019-01-11 2019-04-05 中国人民解放军陆军炮兵防空兵学院 Enhance the low latitude mobile base station dynamic deployment method of wireless network safety of physical layer
CN109640257A (en) * 2019-01-23 2019-04-16 中国人民解放军陆军工程大学 IOT network secure transmission method based on unmanned aerial vehicle
CN110213762A (en) * 2019-05-29 2019-09-06 华侨大学 Untrusted junction network safe transmission method is acquired based on opportunistic wireless energy

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7676194B2 (en) * 2003-08-22 2010-03-09 Rappaport Theodore S Broadband repeater with security for ultrawideband technologies

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587684A (en) * 2019-01-11 2019-04-05 中国人民解放军陆军炮兵防空兵学院 Enhance the low latitude mobile base station dynamic deployment method of wireless network safety of physical layer
CN109640257A (en) * 2019-01-23 2019-04-16 中国人民解放军陆军工程大学 IOT network secure transmission method based on unmanned aerial vehicle
CN110213762A (en) * 2019-05-29 2019-09-06 华侨大学 Untrusted junction network safe transmission method is acquired based on opportunistic wireless energy

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Xiaoli Sun,Weiwei Yang,etc..Physical Layer Security in Millimeter Wave SWIPT UAV-Based Relay Networks.《IEEE Access ( Volume: 7)》.2019, *
Yixin He,Daosen Zhai,etc..Relay Selection for UAV-Assisted Urban Vehicular Ad Hoc Networks.《IEEE Wireless Communications Letters ( Volume: 9, Issue: 9, Sept. 2020)》.2020, *
任品毅 ; 唐晓.面向5G的物理层安全技术综述.《CNKI 北京邮电大学学报》.2018, *

Also Published As

Publication number Publication date
CN112243252A (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN112243252B (en) Safety transmission enhancement method for relay network of unmanned aerial vehicle
Singh et al. On UAV selection and position-based throughput maximization in multi-UAV relaying networks
CN113573293B (en) An Intelligent Emergency Communication System Based on RIS
Park et al. Joint trajectory and resource optimization of MEC-assisted UAVs in sub-THz networks: A resources-based multi-agent proximal policy optimization DRL with attention mechanism
CN114006645B (en) Relay-assisted safe transmission method and system for cognitive unmanned aerial vehicle
Han et al. Secrecy capacity maximization for a UAV-assisted MEC system
CN117858015A (en) Air edge calculation data safe transmission and resource allocation method based on deep reinforcement learning
CN111866901A (en) Relay selection and resource information optimization method, system, computer equipment and application
CN114615672A (en) A Statistical Information-Based Collaborative Physical Layer Security Enhancement Method
Tang et al. Deep learning-assisted secure UAV-relaying networks with channel uncertainties
Li et al. Flying ad-hoc network covert communications with deep reinforcement learning
Wu et al. Trajectory optimization and power allocation for cell-free satellite-UAV Internet of Things
Li et al. Development of an effective relay communication technique for multi-UAV wireless network
Zhao et al. Intelligent beamforming for UAV-assisted IIoT based on hypergraph inspired explainable deep learning
Wang et al. Toward communication optimization for future underwater networking: A survey of reinforcement learning-based approaches
CN114745771B (en) Safe wireless energy supply communication method and system based on unmanned aerial vehicle
Yang et al. Optimal resource allocation for uav-relay-assisted mobile crowdsensing
Sobhi-Givi et al. Efficient Optimization in RIS-Assisted UAV System Using Deep Reinforcement Learning for mmWave-NOMA 6G Communications
Wang et al. Simulation of vehicle network communication security based on random geometry and data mining
CN118139013A (en) Secure offloading method for dual-UAV edge computing system based on multi-agent reinforcement learning
CN116390056B (en) STAR-RIS-assisted link optimization method for SR system in Internet of Vehicles
CN115276766B (en) Optimization method for auxiliary interference power and trajectory combination of cooperative Unmanned Aerial Vehicle (UAV)
Li et al. IRS-assisted UAV wireless powered communication network for sustainable federated learning
CN114698123B (en) Resource allocation optimization method of wireless power supply covert communication system
CN116684852A (en) A joint optimization method for communication resources and positioning of unmanned aerial vehicle in mountainous forest environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20221011

CF01 Termination of patent right due to non-payment of annual fee