CN103987065A - Method for predicting behavior model and monitor strategy of relay node - Google Patents

Method for predicting behavior model and monitor strategy of relay node Download PDF

Info

Publication number
CN103987065A
CN103987065A CN201410202247.1A CN201410202247A CN103987065A CN 103987065 A CN103987065 A CN 103987065A CN 201410202247 A CN201410202247 A CN 201410202247A CN 103987065 A CN103987065 A CN 103987065A
Authority
CN
China
Prior art keywords
node
insincere
model
via node
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410202247.1A
Other languages
Chinese (zh)
Other versions
CN103987065B (en
Inventor
付晓梅
吴晓
王鼎宇
张成凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201410202247.1A priority Critical patent/CN103987065B/en
Publication of CN103987065A publication Critical patent/CN103987065A/en
Application granted granted Critical
Publication of CN103987065B publication Critical patent/CN103987065B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for predicting a behavior model and a monitor strategy of a relay node and relates to the field of physical layers of the wireless communication. The method includes the following steps of building a communication model, obtaining the secrecy capacity of the communication model, building a game model between the untrusted relay node and a monitor system according to the secrecy channel capacity, calculating Nash equilibrium and obtaining the probabilities Pa and Pb for the two parties to adopt a certain strategy. A prediction model and related algorithms are provided based on the non-zero-sum games. The behavior strategy adopted by the node is predicted, meanwhile, the optimal monitor strategy is provided, influence of selfish and hostile attack behaviors of the node in the cooperative communication is reduced, and the safety transmission of the physical layers is guaranteed.

Description

A kind of method of predicting via node behavior model and monitoring policy
Technical field
The present invention relates to radio communication physical layer field, relate in particular to a kind of prediction via node behavior model and optimum monitoring policy, to ensure the method for physical layer security performance optimum.
Background technology
The broadcast characteristic of wireless transmission makes nodes easily suffer attack and the eavesdropping of malicious node.And collaboration communication utilize the forwarding of cooperative node become can practical application physical layer safe practice.When node cooperation, if all via nodes are all observed cooperation criterion, can realize stable physical layer security performance.Owing to lacking effective supervision mechanism, there is malice and selfish behavior in system interior nodes, has a strong impact on physical layer security performance.In collaboration communication, the selfishness of node is different also different to system safety influence degree from malice degree.For ensureing the overall security of system, need related algorithm look-ahead facility strategy, and take optimum monitoring policy.
Current in collaboration communication physical layer safety problem, adopt single node model more and all only consider that node is safe node.And nodes ' behavior is changeable in radio communication, and adopt multinode model more.Have not yet to see and can realize by predicting that insincere nodes ' behavior is to ensure the algorithm of physical layer security performance.
Summary of the invention
The invention provides a kind of method of predicting via node behavior model and monitoring policy, to ensure the method for physical layer security performance optimum.In the time that under collaboration communication pattern, via node is insincere node, the present invention adopts nonzero sum game, proposes prediction via node behavior model and optimum monitoring policy, ensures physical layer security performance optimum, described below:
A method of predicting via node behavior model and monitoring policy, said method comprising the steps of:
Set up traffic model; The secrecy capacity of obtaining communication model;
Set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
Calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy aand P b.
Described traffic model is specially:
There is n via node, a source node, a destination node, an eavesdropping node; Source node is to insincere via node R i, insincere via node R ito destination node, and insincere via node R ichannel to eavesdropping node is quasistatic flat fading channel;
Interchannel noise n sD, n sR, n rDbe variances sigma 2additive white Gaussian noise CN (0, σ 2i n), wherein, I nfor unit diagonally opposing corner matrix; n sDfor the interchannel noise between source node S and destination node D; n sRfor source node S and insincere via node R ibetween interchannel noise; n rDfor insincere via node R iand interchannel noise between destination node D.
Described betting model is specially:
Game effectiveness is the poor V of channel capacity t:
V t = C ~ s - C s ( s a t )
The utility schedule of via node is shown:
u a ( s a t , s b k ) = V t η i D tk
The utility schedule of surveillance is shown:
u b ( s a t , s b k ) = η i D tk C s ( s a t )
Wherein, η ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node; for secrecy capacity; for taking strategy when channel time secrecy capacity; D tkfor the income of the punishment to insincere node and monitoring system; represent k the strategy of monitoring system b, represent t the strategy of insincere node a.
The beneficial effect of technical scheme provided by the invention is:
The behavior that 1, may exist for node changes, and the present invention is based on nonzero sum game, proposes forecast model and related algorithm.The present invention has predicted the behavioral strategy that node is taked, and has proposed optimum monitoring policy simultaneously, has reduced the impact of the selfishness of collaboration communication interior nodes and malicious attack behavior, has ensured the safe transmission of physical layer.
2, the present invention characterizes the parameter beta that nodes ' behavior changes, span 0-1 by proposition.Parameter value more malicious attack or the selfish behavior of minor node is more serious.Parameter value is to show that nodes ' behavior is reliable at 1 o'clock, does not have malicious attack or selfish behavior, embodies cooperation behavior.Parameter value is the malicious act of 0 expression node, only to node transmitted noise.
Brief description of the drawings
Fig. 1 is the schematic diagram of many relay node cooperations traffic model;
Fig. 2 is a kind of flow chart of the method for predicting via node behavior model and monitoring policy.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is described further in detail.
101: set up traffic model;
Referring to Fig. 1, in traffic model, there is n via node, a source node S,, there is an eavesdropping node E in a destination node D.Source node S is to insincere via node R i(1≤i≤N), insincere via node R ito destination node D, and insincere via node R ichannel to eavesdropping node E is quasistatic flat fading channel, source node S and insincere via node R ibetween channel gain index h sRrepresent; Insincere via node R iand channel gain index h between destination node D rDrepresent; Insincere via node R iand channel gain index h between eavesdropping node E rErepresent.Interchannel noise n between source node S and destination node D sDrepresent; Source node S and insincere via node R ibetween interchannel noise n sRrepresent; Insincere via node R iand interchannel noise n between destination node D rDrepresent, and interchannel noise n sD, n sR, n rDbe variances sigma 2additive white Gaussian noise CN (0, σ 2i n), wherein, I nfor unit diagonally opposing corner matrix.
Wherein, the weighted of different insincere via nodes, represents that with w (N node is [w to weight 1..., w n]).The transmitting power of source node S is P s, system gross power is P, insincere via node R ipower be P-P s, use P rrepresent.
102: the secrecy capacity of obtaining communication model;
Whole collaboration communication process is divided into two stages, first stage, and source node S sends information x to N insincere via node R, second stage, insincere relay node cooperation forwards the information of receiving to destination node D.First stage is while end, the information y that all insincere via nodes are received rfor
y r = P s h SR * x + n SR
Wherein h sRfor h sr *for channel gain matrix h sRconjugate matrices.() *, () tand the conjugation of representing matrix respectively, transposition and conjugate transpose, black matrix representing matrix. represent source node S and via node R 1between channel gain, represent source node S and via node R 2between channel gain, represent source node S and via node R nbetween channel gain.X represents the information that source node S is sent.
Second stage, parameter beta iembody the selfish of insincere via node or malice situation.β i∈ [0,1], β ibe worth the harmful degree of less explanation higher.Work as β ibe 1 o'clock, insincere via node for cooperation (be insincere via node can in cooperation, selfish and malice any one, by parameter beta idetermine that concrete behavior, how known for those skilled in the art, the embodiment of the present invention does not limit this) work as β ibe 0 to 1 o'clock, insincere via node is selfish; Work as β ibe 0 o'clock, insincere via node is malice.Parameter μ iauxiliary variable during for mathematical computations, works as β ibe 1 or 0 to 1 o'clock, μ ibe 0; Work as β ibe 0 o'clock, μ ibe 1.The information y that destination node D receives dfor:
Wherein Ω i = β i P R P s | h SR i | 2 + σ 2 , λ i = μ i P R P s | h SR i | 2 + σ 2
represent source node S and via node R ibetween decline index, diag{.} represents diagonal matrix.
Calculate for convenient, establish:
A = P S diag { Ω * } diag { h SR } h RD - - - ( 3 )
B = diag { h RD * } diag { Ω } - - - ( 4 )
O = P S diag { λ * } diag { h SR } h RD - - - ( 5 )
So y dbecome:
The information y that eavesdropping node E receives efor
Calculate for convenient, establish:
G = P S diag { Ω * } diag { h SR } h RE - - - ( 8 )
H = diag { h RE * } diag { Ω } - - - ( 9 )
1 = P S diag { λ * } diag { h SR } h RE - - - ( 10 )
Wherein
Cryptochannel capacity C sfor C d-C e, C dfor source node is to the capacity of the channel of destination node.C efor source node is to the capacity of the channel of eavesdropping node.
103: set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
In the time of the whole cooperation of insincere via node, secrecy capacity is when channel is taked strategy time, secrecy capacity is
Game effectiveness is the poor V of channel capacity t:
V t = C ~ S - C S ( s a t ) - - - ( 12 )
The utility schedule of via node is shown:
u a ( s a t , s b k ) = V t - η i D tk - - - ( 13 )
Wherein η ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node.
The utility schedule of surveillance is shown:
u b ( s a t , s b k ) = η i D tk C s ( s a t ) - - - ( 14 )
Wherein D tkfor the income of the punishment to insincere node and monitoring system, after the bad behavior of a certain node is monitored to, this node is taked cooperation behavior, secrecy capacity D now tkrepresent. represent k the strategy of monitoring system b, represent t the strategy of insincere node a.
104: calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy aand P b.
Calculate after game both sides effectiveness according to (12)-(14), utilize following formula to carry out the calculating of Nash Equilibrium
Maxf(S a,S b,U a,U b)=p a(U a+U b)p b-l 1-l 2?(15)
s.t.U ap b≤l 1i 1;U bp a≤l 2i 2
i 1 Tp a=1;i 2 Tp b=1;
0 < p a t < 1 ; 0 < p b k < 1 ;
Wherein l 1and l 2for scale, represent to expect maximum return, P aand P bfor game both sides take a certain tactful probability.Thereby calculate the most possible insincere behavioral strategy occurring of node, and the monitoring policy of optimizing.
Wherein, u a, u b, i 1, i 2, P aand P bbe all vector set, , for the element in vector set.
Non-zero game model is five yuan of Vector Groups G (Q, S, Z, P, U), wherein:
Q={Q a, Q bgame both sides set.
Q arepresent N insincere relaying, Q brepresent monitoring system.
S={S a, S bit is the set of game strategies.
represent the strategy of insincere via node, represent the strategy of monitoring system.
it is the set of actions under specific policy.
Z a t = { [ z a i ] i = 1 , . . . , N | s a t } , Z b k = { [ z b i ] i = 1 , . . . , N | s b k } .
P={P a, P bit is Making by Probability Sets.
P a = [ p a t ] t = 1 , . . . , M , P b = [ p b k ] t = 1 , . . . , M represent that insincere node takes the probability of strategy, expression monitoring system is taked the probability of strategy.
U={U a, U bit is the utility matrix of insincere node and monitoring system.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (3)

1. a method of predicting via node behavior model and monitoring policy, is characterized in that, said method comprising the steps of:
Set up traffic model; The secrecy capacity of obtaining communication model;
Set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
Calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy aand P b.
2. a kind of method of predicting via node behavior model and monitoring policy according to claim 1, is characterized in that, described traffic model is specially:
There is n via node, a source node, a destination node, an eavesdropping node; Source node is to insincere via node R i, insincere via node R ito destination node, and insincere via node R ichannel to eavesdropping node is quasistatic flat fading channel;
Interchannel noise n sD, n sR, n rDbe variances sigma 2additive white Gaussian noise CN (0, σ 2i n), wherein, I nfor unit diagonally opposing corner matrix; n sDfor the interchannel noise between source node S and destination node D; n sRfor source node S and insincere via node R ibetween interchannel noise; n rDfor insincere via node R iand interchannel noise between destination node D.
3. a kind of method of predicting via node behavior model and monitoring policy according to claim 1, is characterized in that, described betting model is specially:
Game effectiveness is the poor V of channel capacity t:
V t = C ~ s - C s ( s a t )
The utility schedule of via node is shown:
u a ( s a t , s b k ) = V t &eta; i D tk
The utility schedule of surveillance is shown:
u b ( s a t , s b k ) = &eta; i D tk C s ( s a t )
Wherein, η ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node; for secrecy capacity; for taking strategy when channel time secrecy capacity; D tkfor the income of the punishment to insincere node and monitoring system; represent k the strategy of monitoring system b, represent t the strategy of insincere node a.
CN201410202247.1A 2014-05-13 2014-05-13 A kind of method for predicting via node behavior model and monitoring policy Expired - Fee Related CN103987065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410202247.1A CN103987065B (en) 2014-05-13 2014-05-13 A kind of method for predicting via node behavior model and monitoring policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410202247.1A CN103987065B (en) 2014-05-13 2014-05-13 A kind of method for predicting via node behavior model and monitoring policy

Publications (2)

Publication Number Publication Date
CN103987065A true CN103987065A (en) 2014-08-13
CN103987065B CN103987065B (en) 2017-09-08

Family

ID=51278864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410202247.1A Expired - Fee Related CN103987065B (en) 2014-05-13 2014-05-13 A kind of method for predicting via node behavior model and monitoring policy

Country Status (1)

Country Link
CN (1) CN103987065B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994505A (en) * 2015-07-11 2015-10-21 中国能源建设集团广东省电力设计研究院有限公司 Wireless malicious behavior predicting and coping method and data security acquisition system oriented to smart grid
CN105142174A (en) * 2015-09-22 2015-12-09 镇江锐捷信息科技有限公司 Cognition wireless network interference inhibition method based on game theory
CN110572872A (en) * 2019-09-05 2019-12-13 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013069170A1 (en) * 2011-11-07 2013-05-16 パナソニック株式会社 Relay station, base station, and band frequency allocation method
CN103702324A (en) * 2013-12-26 2014-04-02 天津大学 Cooperative communication alliance structure optimizing method for ensuring safety of physical layer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013069170A1 (en) * 2011-11-07 2013-05-16 パナソニック株式会社 Relay station, base station, and band frequency allocation method
CN103702324A (en) * 2013-12-26 2014-04-02 天津大学 Cooperative communication alliance structure optimizing method for ensuring safety of physical layer

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FU XIAOMEI ETC: "Secrecy Performance of Untrusted Relay’s Cooperation under Fading Channels", 《TRANSACTIONS OF TIANJIN UNIVERSITY》 *
RONGQING ZHANG ETC: "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *
黄莉: "基于博弈论的无线网络节点行为研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994505A (en) * 2015-07-11 2015-10-21 中国能源建设集团广东省电力设计研究院有限公司 Wireless malicious behavior predicting and coping method and data security acquisition system oriented to smart grid
CN104994505B (en) * 2015-07-11 2023-04-07 中国能源建设集团广东省电力设计研究院有限公司 Wireless malicious behavior prediction and coping method for smart grid and data security acquisition system
CN105142174A (en) * 2015-09-22 2015-12-09 镇江锐捷信息科技有限公司 Cognition wireless network interference inhibition method based on game theory
CN110572872A (en) * 2019-09-05 2019-12-13 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system
CN110572872B (en) * 2019-09-05 2022-05-17 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system

Also Published As

Publication number Publication date
CN103987065B (en) 2017-09-08

Similar Documents

Publication Publication Date Title
Li et al. A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks
Jana et al. Trusted collaborative spectrum sensing for mobile cognitive radio networks
CN103297956B (en) A kind of Dynamic Light magnitude method for evaluating trust based on bayesian theory and entropy theory
CN101969647B (en) Trust model-based cooperative communication method in mobile self-organized network
CN103139803B (en) A kind of based on multifactorial wireless sensor network trust administrative model
CN104469836A (en) Method for building multi-dimension trust model in underwater sensor network
CN103987065A (en) Method for predicting behavior model and monitor strategy of relay node
CN104113855A (en) Channel-based routing algorithm of wireless self-organizing network
Wei et al. SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
CN104202106A (en) Collaborative spectrum perception method based on credibility in mobile scene
Alghorani et al. Improved S-AF and S-DF relaying schemes using machine learning based power allocation over cascaded Rayleigh fading channels
CN102035726A (en) Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network
Abidoye et al. Lightweight models for detection of denial‐of‐service attack in wireless sensor networks
CN111064665A (en) Wireless body area network low-delay transmission scheduling method based on Markov chain
Gao et al. Sensor selection based on dempster-shafer evidence theory under collaborative spectrum sensing in cognitive radio sensor networks
CN105050080A (en) Adaptive control method for node transmitting power in source position privacy protection protocol
CN103166695B (en) The relay of a kind of capacity and error rate combined optimization
Tassi et al. Secure data offloading strategy for connected and autonomous vehicles
Petrenkov et al. Anomaly Detection in Vehicle Platoon with Third-Order Consensus Control
CN109996218B (en) Resource allocation method for improving wireless transmission safety performance of Internet of vehicles
Nimje et al. A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm
Hu et al. Event triggering in vehicular networked systems with limited bandwidth and deep fading
Yin et al. A novel reputation model for malicious node detection in wireless sensor network
CN103746775A (en) Cache mechanism for improving wireless opportunity network coding gain
Bansal et al. Detecting MAC misbehavior switching attacks in Wireless Mesh Networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170908

Termination date: 20210513

CF01 Termination of patent right due to non-payment of annual fee