Research On Security Transmission Technologies For Integrated Satellite and Terrestrial Networks

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)

Research on Security Transmission Technologies


for Integrated Satellite and Terrestrial Networks

Huang Yao Li Shengnan Yan Yan


China Satellite Maritime Monitoring China Satellite Maritime Monitoring College of Communication
and Control Department and Control Department Engineering, the Army Engineering
Jiangsu, Jiangyin Jiangsu, Jiangyin University of PLA
huangxy958@163.com 18761685289@qq.com Jiangsu, Nanjing

Abstract—The integrated satellite and terrestrial network network. The research idea is to use the same frequency
involves many technologies from the physical layer to the interaction between heterogeneous networks to the
application layer. This paper studies safe transmission interference to the eavesdropper and achieve the goal of safe
technology of the physical layer. Under the constraint of transmission. In view of this, this paper aims at the problem
suburban users achieving secure transmission, a joint security of the safe transmission of the line-of-sight link between the
transmission algorithm of ATC beamforming matrix and satellite and the suburban user. A star-link eavesdropping
artificial noise covariance matrix, which is based on the known model around the suburban users is established based on the
global channel state information is proposed to minimize the known global channel state information. In order to achieve
ATC transmit power. The security performance of the
secure transmission of suburban users, Artificial noise to
algorithm is verified by simulation.
deteriorate the quality of the eavesdropping channel is
Keywords—Integrated Satellite and Terrestrial Network, transmitted while multi-antenna ATC transmits satellite
Secure Transmission, Ancillary Terrestrial Component (ATC), signals for urban users. In order to minimize the ATC
Beamforming, Artificial Noise transmit power, this paper proposes a secure transmission
algorithm for jointly designing ATC beamforming matrix
and artificial noise Artificial Noise covariance matrix under
I. INTRODUCTION the constraint of safe transmission of suburban users
Satellite communication mainly relies on the line-of-sight
transmission. The communication quality will be II. SYSTEM MODEL AND PROBLEM MODELING
deteriorated or even interrupted in some places where the
shadow is severe [1]. Ancillary Terrestrial Component The star-link eavesdropping model is shown in figure 2.
(ATC), which is an important way to realize the integration Assuming that the global channel state information is known,
of satellite and terrestrial wireless communication system, is (1)
the satellites send (forward) signal s to the urban
mainly used for forwarding the satellite signal to assist (2)
indoor users or urban areas with indoor or high-rise buildings user(CU), and signal s to the suburban user (SU).
in receiving signals from the satellite. The common Suburban user has M eavesdroppers(Eve). ATC modeling is
architecture of integrated satellite and terrestrial network is equipped with K antennas and works in half-duplex mode.
shown in figure 1. The ground communication network is a SU, CU and Eve are equipped with single antenna. The
cellular network formed by base station or ground auxiliary CU needs two stages to receive satellite signals. ATC
module ATC, and the ATC of reusing satellite frequency forwards signal for providing service to CU, and sends
band alone or together with the ground base station provides artificial noise to interfere with Eve around SU so as to
services and improves the communication quality in areas realize the safe transmission of SU.
with poor reception of satellite signals, such as indoor or
high-rise urban areas[2]. The second stage communication link
The second stage communication link
The second stage interference link
The second stage eavesdropping link

Satellite overlap
area Satellite
gateway

PSTN/PLMN
PSDN/WWW

ATC Net
ATC SU
SU
Core
network ATC
Satellite
coverage area
 CU
Eve
Base station
Base station controller
Satellite coverage
area
Fig. 1. The model of satellite-ground link
Fig. 2. The satellite-ground link eavesdropping model
Based on cognitive radio technology, Reference [3] and
[4] studied the physical layer security problem in the hybrid In the first stage of signal transmission, the received

978-1-7281-1223-7/19/$31.00 ©2019 IEEE 437 Dalian, China


March 29-31, 2019
signal of ATC is shown in Equation (1).
H
min w Tw + Tr ( ∑ )
w ,∑s0

=yR
(1) (1)
Ps f R s + n R (1) ( 2)
Ps fs
2
1+
H H 2
s.t.
w Sw + γγs ∑ s +s s ≥2
R
In the second stage of signal transmission, there are two ( 2) f 2 (4)
 
signal transmission processes:  Ps e,m 
max 1 +
1) ATC processes the received signals and forwards them m∈  H H 2 
 w G m w + γγ e,m ∑ e,m + e,m 
to CU by means of amplification and forwarding. At the  
same time, in order to achieve the safe transmission of SU, it H
w Cw
uses the remaining power to send artificial noise to >γ
H H 2
w Hw + h ∑ h + s c
deteriorate the quality of the listening channel.
(2)
H
(
w Tk w + Tr E k ∑ ≤ Pk ,∀k ∈  )
2) SU receives the signal s sent (forwarded) by
satellite. Introducing the slack variable, Equation (4) is turned
into Equation (5).
So the rate of CU is shown in Equation (2).

H
1 min w Tw + Tr ( ∑ )
=Rc
2
(
log 2 1 + SINRc ) (2) w ,∑s0

Ps
( 2) fs
2
R
The reachable security rate of SU is shown in Equation s.t. 1+ ≥ r 2
H H 2
w Sw + γγ
s ∑ s +s
s
(3). (5)
Ps
( 2) f e, m
2
1 + max ≤ r,∀m ∈ 
+ m∈ w H G w + γγ
H 2
   ( 2)   ( 2 )   m e, m ∑ e, m + e, m
=Rs  min  I  y s ; s
m∈ 
 − I  ye,m ; s   ,∀m ∈  (3) H
      w Cw

H H 2
w Hw + h ∑ h + s c
Among them, f R ∈ 
K ×1
is the vector channel from H
(
w Tk w + Tr E k ∑ ≤ Pk ,∀k ∈  )
(1)
satellite to ATC, P s
(1)
is the power of s . The energy Solve Equation (5) by using step-by-step optimization
(1)  2 algorithm. Using Semidefinite Relaxation technique,
of s has been normalized, that is   s (1)  = 1 and
  introducing variable W = ww H and removing non-convex
 
(1) ( 2) (1) restriction rank ( W ) = 1 , the slack problem of Equation (5)
s   ( 0,1) . s and Ps are also the same as s
( 2)
and
is obtained.
Ps(1) . n R is an additive white Gaussian noise of multi-
antenna ATC with the average value of 0 and a covariance
P (r ) ( ) ( )
σ 2I
= min Tr TW + Tr ∑
matrix of .At the
R K same time, Wss
0, ∑ 0


I  ys ; s
( 2 )  = log
 2 (1 + SINRs ) I  ye,m ;=
,  ( 2) 
s  (
log 2 1 + SINRe,m ).
s.t. ( ) ( ( )
Tr CW − γ Tr HW + Tr ∑ hh ( H
)) > γs
2
c
(6)
   
( ) ( )
Tr Tk W + Tr E k ∑ ≤ Pk ,∀k ∈ 

fs − ( r  2 − 1) ( Tr ( SW ) + Tr ( ∑ γγ
s s ) ) ≥ ( r  2 − 1)
III. A SECURE TRANSMISSION ALGORITHM FOR MINIMIZE ( ) 2
2 R H R 2
Ps s
TRANSMIT POWER.
fe,m − ( r − 1) ( Tr ( G m W ) + Tr ( ∑ γγ
e,m e,m ) ) ≤ ( r − 1)
( 2) 2 H 2
Under the constraint of the safe transmission limitation Ps e,m,∀m ∈ 
of SU ,the Qos of CU, and the single antenna forwarding
Equation (6) is a convex semidefinite programming,
power PR , k ,this paper jointly designs ATC's forwarding which can be solved through standard optimization package.
beamforming matrix W ∈ 
K ×K
and cooperative jamming Assuming the optimal solution is W  *,
∑ * ,η * , the optimal
( )
artificial noise covariance matrix ∑  0 to minimize the solution of Equation (5) is obtained.
ATC transmit power. The optimization problem is shown in
Equation (4).

438
Step by step optimization algorithm for solving problem (5) 1) For the same reachable security rate, the transmit
Given initial channel conditions power of the ATC when the terrestrial link experiences FHS
begin is greater than ILS.
For the given r , solve problem (6) to obtain the optimal solution
( W ,∑ ) and dual variables (τ , λ ) .
* * 2) When the satellite-ground link goes through FHS, the
satellite signal is seriously attenuated, and ATC needs to
check rank ( W ) whether it is 1 amplify it with a higher power to achieve the purpose of

suppressing eavesdropping. At this time, the performance of


if rank ( W ) = 1

algorithm 1 is superior to algorithm 2.
Decomposition matrix to get w ;
*

or
Obtain an approximate optimal solution w* by using
Gaussian randomization;
end
Update r by using gradient descent;
End output the approximate optimal solution w* .

IV. SIMULATION RESULTS AND ANALYSIS


The effectiveness of the safety transmission algorithm
for QoS of SU was verified by Monte Carlo simulation.
Suppose the departure angle of CU θ c = 0.001o ; the
departure angle of SU θ s = 40o , and the beam Angle is
0.1 ; the departure angle of Eve θ e, m =
−20o ,m ∈  , and Fig. 4. The influence of the number of ATC antennas on the ATC transmit
power
the beam Angle is 0.2 ; Noise variance
ssss
2
= = =
R
2
c
2
s
2
e,m =1,m ∈  , the maximum power of ATC
is Ptot , the maximum power limit of the KTH antenna
is Ptot K ,the number of ATC antennas K = 4 , the number
of eavesdroppers M = 2 . In addition, the channel
parameters of satellite-ground link consider two situations:
Infrequent Light Shadowing (ILS) and Frequent Heavy
Shadowing (FHS). All the simulation results are the average
of 1000 random channel implementations.
Algorithm 1 is a two-layer optimization algorithm which
jointly designs ATC beamforming matrix and artificial noise
covariance matrix. Algorithm 2 is a two-layer optimization
algorithm which only designs the ATC beamforming matrix.
In the following, algorithm 1 and algorithm 2 are compared
and analyzed through simulation, and algorithm 2 is denoted
as noAN . The simulation results are shown in Figure 3. Fig. 5. The influence of the number of ATC antennas on the solvable
probability

Figure 4 and Figure 5 show the influence of the number


of ATC antennas on the ATC transmit power and solvable
probability, which is the approximate optimal solution of the
problem(5). It can be concluded from the figure that whether
the satellite ground link experiences FHS or ILS, the CU
rate increases with the increase of the number of ATC
antennas. the ATC transmit power continues to drop and the
solvable probability to improved. That is to say, the increase
of the number of antennas brings about the increase of space
freedom, which can not only effectively overcome the
eavesdropping, realize the safe transmission of SU, but also
improve the capacity of wireless channel and realize the
increase of CU rate.

Fig. 3. The impact of SU reachable security rate on ATC transmit power V. SUMMARY AND OUTLOOK
This paper establishes a star-link eavesdropping model
Figure 3 shows the variation of the ATC transmit power
for multiple eavesdroppers around suburban users. Under the
when the SU accessible safety rate increases. According to
constraint of SU’s achieving secure transmission, a joint
Figure 3,

439
security transmission algorithm of ATC beamforming matrix [4] Yuan C, Lin M, Ouyang J, et al. Joint Security Beamforming in
and artificial noise covariance matrix is proposed to Cognitive Hybrid Satellite-Terrestrial Networks [C]. 2016 IEEE 83rd
Vehicular Technology Conference (VTC Spring), 2016: 1-5.
minimize the ATC transmit power. The simulation results
[5] Gallinaro G, Tirrò E, Cecca F D, et al. Next generation interactive S-
show that the power efficiency of ATC can be improved by band mobile systems: challenges and solutions [J]. International
using artificial noise rather than only designing the Journal of Satellite Communications and Networking, 2013, 32(4):
beamforming matrix. 247-262.
[6] Parsons G M, Singh R. An ATC primer: The future of
communications[J]. Mobile Satellite Ventures, 2006.
REFERENCES
[7] Dong L, Han Z, Petropulu A P, et al. Secure wireless communications
[1] Liming Chen. Research on wireless resource management methods of via cooperation [C]. 2008 46th Annual Allerton Conference on
integrated satellite and terrestrial network [D]. Harbin Institute of Communication, Control, and Computing, 2008: 1132-1138.
Technology, 2014.
[8] Abdi A, Lau W C, Alouini M S, et al. A new simple model for land
[2] Dani Xiong. Research on the switching mechanism of integrated mobile satellite channels: first- and second-order statistics [J]. IEEE
satellite and terrestrial network[D]. Beijing university of posts and Transactions on Wireless Communications, 2003, 2(3):519-528.
telecommunications, 2015.
[9] Maurer U M. The Strong Secret Key Rate of Discrete Random Triples
[3] An K, Lin M, Liang T, et al. Secure transmission in multi-antenna [M]. Communications and Cryptography. Springer US, 1995: 271-
hybrid satellite-terrestrial relay networks in the presence of 285.
eavesdropper [C]. 2015 IEEE International Conference on Wireless
Communications & Signal Processing (WCSP), 2015: 1-5.

440

You might also like