CN103987065A - Method for predicting behavior model and monitor strategy of relay node - Google Patents
Method for predicting behavior model and monitor strategy of relay node Download PDFInfo
- Publication number
- CN103987065A CN103987065A CN201410202247.1A CN201410202247A CN103987065A CN 103987065 A CN103987065 A CN 103987065A CN 201410202247 A CN201410202247 A CN 201410202247A CN 103987065 A CN103987065 A CN 103987065A
- Authority
- CN
- China
- Prior art keywords
- node
- insincere
- model
- via node
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for predicting a behavior model and a monitor strategy of a relay node and relates to the field of physical layers of the wireless communication. The method includes the following steps of building a communication model, obtaining the secrecy capacity of the communication model, building a game model between the untrusted relay node and a monitor system according to the secrecy channel capacity, calculating Nash equilibrium and obtaining the probabilities Pa and Pb for the two parties to adopt a certain strategy. A prediction model and related algorithms are provided based on the non-zero-sum games. The behavior strategy adopted by the node is predicted, meanwhile, the optimal monitor strategy is provided, influence of selfish and hostile attack behaviors of the node in the cooperative communication is reduced, and the safety transmission of the physical layers is guaranteed.
Description
Technical field
The present invention relates to radio communication physical layer field, relate in particular to a kind of prediction via node behavior model and optimum monitoring policy, to ensure the method for physical layer security performance optimum.
Background technology
The broadcast characteristic of wireless transmission makes nodes easily suffer attack and the eavesdropping of malicious node.And collaboration communication utilize the forwarding of cooperative node become can practical application physical layer safe practice.When node cooperation, if all via nodes are all observed cooperation criterion, can realize stable physical layer security performance.Owing to lacking effective supervision mechanism, there is malice and selfish behavior in system interior nodes, has a strong impact on physical layer security performance.In collaboration communication, the selfishness of node is different also different to system safety influence degree from malice degree.For ensureing the overall security of system, need related algorithm look-ahead facility strategy, and take optimum monitoring policy.
Current in collaboration communication physical layer safety problem, adopt single node model more and all only consider that node is safe node.And nodes ' behavior is changeable in radio communication, and adopt multinode model more.Have not yet to see and can realize by predicting that insincere nodes ' behavior is to ensure the algorithm of physical layer security performance.
Summary of the invention
The invention provides a kind of method of predicting via node behavior model and monitoring policy, to ensure the method for physical layer security performance optimum.In the time that under collaboration communication pattern, via node is insincere node, the present invention adopts nonzero sum game, proposes prediction via node behavior model and optimum monitoring policy, ensures physical layer security performance optimum, described below:
A method of predicting via node behavior model and monitoring policy, said method comprising the steps of:
Set up traffic model; The secrecy capacity of obtaining communication model;
Set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
Calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy
aand P
b.
Described traffic model is specially:
There is n via node, a source node, a destination node, an eavesdropping node; Source node is to insincere via node R
i, insincere via node R
ito destination node, and insincere via node R
ichannel to eavesdropping node is quasistatic flat fading channel;
Interchannel noise n
sD, n
sR, n
rDbe variances sigma
2additive white Gaussian noise CN (0, σ
2i
n), wherein, I
nfor unit diagonally opposing corner matrix; n
sDfor the interchannel noise between source node S and destination node D; n
sRfor source node S and insincere via node R
ibetween interchannel noise; n
rDfor insincere via node R
iand interchannel noise between destination node D.
Described betting model is specially:
Game effectiveness is the poor V of channel capacity
t:
The utility schedule of via node is shown:
The utility schedule of surveillance is shown:
Wherein, η
ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node;
for secrecy capacity;
for taking strategy when channel
time secrecy capacity; D
tkfor the income of the punishment to insincere node and monitoring system;
represent k the strategy of monitoring system b,
represent t the strategy of insincere node a.
The beneficial effect of technical scheme provided by the invention is:
The behavior that 1, may exist for node changes, and the present invention is based on nonzero sum game, proposes forecast model and related algorithm.The present invention has predicted the behavioral strategy that node is taked, and has proposed optimum monitoring policy simultaneously, has reduced the impact of the selfishness of collaboration communication interior nodes and malicious attack behavior, has ensured the safe transmission of physical layer.
2, the present invention characterizes the parameter beta that nodes ' behavior changes, span 0-1 by proposition.Parameter value more malicious attack or the selfish behavior of minor node is more serious.Parameter value is to show that nodes ' behavior is reliable at 1 o'clock, does not have malicious attack or selfish behavior, embodies cooperation behavior.Parameter value is the malicious act of 0 expression node, only to node transmitted noise.
Brief description of the drawings
Fig. 1 is the schematic diagram of many relay node cooperations traffic model;
Fig. 2 is a kind of flow chart of the method for predicting via node behavior model and monitoring policy.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is described further in detail.
101: set up traffic model;
Referring to Fig. 1, in traffic model, there is n via node, a source node S,, there is an eavesdropping node E in a destination node D.Source node S is to insincere via node R
i(1≤i≤N), insincere via node R
ito destination node D, and insincere via node R
ichannel to eavesdropping node E is quasistatic flat fading channel, source node S and insincere via node R
ibetween channel gain index h
sRrepresent; Insincere via node R
iand channel gain index h between destination node D
rDrepresent; Insincere via node R
iand channel gain index h between eavesdropping node E
rErepresent.Interchannel noise n between source node S and destination node D
sDrepresent; Source node S and insincere via node R
ibetween interchannel noise n
sRrepresent; Insincere via node R
iand interchannel noise n between destination node D
rDrepresent, and interchannel noise n
sD, n
sR, n
rDbe variances sigma
2additive white Gaussian noise CN (0, σ
2i
n), wherein, I
nfor unit diagonally opposing corner matrix.
Wherein, the weighted of different insincere via nodes, represents that with w (N node is [w to weight
1..., w
n]).The transmitting power of source node S is P
s, system gross power is P, insincere via node R
ipower be P-P
s, use P
rrepresent.
102: the secrecy capacity of obtaining communication model;
Whole collaboration communication process is divided into two stages, first stage, and source node S sends information x to N insincere via node R, second stage, insincere relay node cooperation forwards the information of receiving to destination node D.First stage is while end, the information y that all insincere via nodes are received
rfor
Wherein h
sRfor
h
sr *for channel gain matrix h
sRconjugate matrices.()
*, ()
tand
the conjugation of representing matrix respectively, transposition and conjugate transpose, black matrix representing matrix.
represent source node S and via node R
1between channel gain,
represent source node S and via node R
2between channel gain,
represent source node S and via node R
nbetween channel gain.X represents the information that source node S is sent.
Second stage, parameter beta
iembody the selfish of insincere via node or malice situation.β
i∈ [0,1], β
ibe worth the harmful degree of less explanation higher.Work as β
ibe 1 o'clock, insincere via node for cooperation (be insincere via node can in cooperation, selfish and malice any one, by parameter beta
idetermine that concrete behavior, how known for those skilled in the art, the embodiment of the present invention does not limit this) work as β
ibe 0 to 1 o'clock, insincere via node is selfish; Work as β
ibe 0 o'clock, insincere via node is malice.Parameter μ
iauxiliary variable during for mathematical computations, works as β
ibe 1 or 0 to 1 o'clock, μ
ibe 0; Work as β
ibe 0 o'clock, μ
ibe 1.The information y that destination node D receives
dfor:
Wherein
represent source node S and via node R
ibetween decline index, diag{.} represents diagonal matrix.
Calculate for convenient, establish:
So y
dbecome:
The information y that eavesdropping node E receives
efor
Calculate for convenient, establish:
Wherein
Cryptochannel capacity C
sfor C
d-C
e, C
dfor source node is to the capacity of the channel of destination node.C
efor source node is to the capacity of the channel of eavesdropping node.
103: set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
In the time of the whole cooperation of insincere via node, secrecy capacity is
when channel is taked strategy
time, secrecy capacity is
Game effectiveness is the poor V of channel capacity
t:
The utility schedule of via node is shown:
Wherein η
ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node.
The utility schedule of surveillance is shown:
Wherein D
tkfor the income of the punishment to insincere node and monitoring system, after the bad behavior of a certain node is monitored to, this node is taked cooperation behavior, secrecy capacity D now
tkrepresent.
represent k the strategy of monitoring system b,
represent t the strategy of insincere node a.
104: calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy
aand P
b.
Calculate after game both sides effectiveness according to (12)-(14), utilize following formula to carry out the calculating of Nash Equilibrium
Maxf(S
a,S
b,U
a,U
b)=p
a(U
a+U
b)p
b-l
1-l
2?(15)
s.t.U
ap
b≤l
1i
1;U
bp
a≤l
2i
2;
i
1 Tp
a=1;i
2 Tp
b=1;
Wherein l
1and l
2for scale, represent to expect maximum return, P
aand P
bfor game both sides take a certain tactful probability.Thereby calculate the most possible insincere behavioral strategy occurring of node, and the monitoring policy of optimizing.
Wherein, u
a, u
b, i
1, i
2, P
aand P
bbe all vector set,
,
for the element in vector set.
Non-zero game model is five yuan of Vector Groups G (Q, S, Z, P, U), wherein:
Q={Q
a, Q
bgame both sides set.
Q
arepresent N insincere relaying, Q
brepresent monitoring system.
S={S
a, S
bit is the set of game strategies.
represent the strategy of insincere via node,
represent the strategy of monitoring system.
it is the set of actions under specific policy.
P={P
a, P
bit is Making by Probability Sets.
U={U
a, U
bit is the utility matrix of insincere node and monitoring system.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (3)
1. a method of predicting via node behavior model and monitoring policy, is characterized in that, said method comprising the steps of:
Set up traffic model; The secrecy capacity of obtaining communication model;
Set up the betting model between insincere via node and monitoring system according to cryptochannel capacity;
Calculate Nash Equilibrium, obtain game both sides and take the probability P of a certain strategy
aand P
b.
2. a kind of method of predicting via node behavior model and monitoring policy according to claim 1, is characterized in that, described traffic model is specially:
There is n via node, a source node, a destination node, an eavesdropping node; Source node is to insincere via node R
i, insincere via node R
ito destination node, and insincere via node R
ichannel to eavesdropping node is quasistatic flat fading channel;
Interchannel noise n
sD, n
sR, n
rDbe variances sigma
2additive white Gaussian noise CN (0, σ
2i
n), wherein, I
nfor unit diagonally opposing corner matrix; n
sDfor the interchannel noise between source node S and destination node D; n
sRfor source node S and insincere via node R
ibetween interchannel noise; n
rDfor insincere via node R
iand interchannel noise between destination node D.
3. a kind of method of predicting via node behavior model and monitoring policy according to claim 1, is characterized in that, described betting model is specially:
Game effectiveness is the poor V of channel capacity
t:
The utility schedule of via node is shown:
The utility schedule of surveillance is shown:
Wherein, η
ibe verification and measurement ratio, represent that monitoring system successfully detects the probability of the insincere behavior of i node;
for secrecy capacity;
for taking strategy when channel
time secrecy capacity; D
tkfor the income of the punishment to insincere node and monitoring system;
represent k the strategy of monitoring system b,
represent t the strategy of insincere node a.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410202247.1A CN103987065B (en) | 2014-05-13 | 2014-05-13 | A kind of method for predicting via node behavior model and monitoring policy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410202247.1A CN103987065B (en) | 2014-05-13 | 2014-05-13 | A kind of method for predicting via node behavior model and monitoring policy |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103987065A true CN103987065A (en) | 2014-08-13 |
CN103987065B CN103987065B (en) | 2017-09-08 |
Family
ID=51278864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410202247.1A Expired - Fee Related CN103987065B (en) | 2014-05-13 | 2014-05-13 | A kind of method for predicting via node behavior model and monitoring policy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103987065B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104994505A (en) * | 2015-07-11 | 2015-10-21 | 中国能源建设集团广东省电力设计研究院有限公司 | Wireless malicious behavior predicting and coping method and data security acquisition system oriented to smart grid |
CN105142174A (en) * | 2015-09-22 | 2015-12-09 | 镇江锐捷信息科技有限公司 | Cognition wireless network interference inhibition method based on game theory |
CN110572872A (en) * | 2019-09-05 | 2019-12-13 | 华北电力大学(保定) | Secret capacity calculation method and optimization method of double-medium untrusted relay system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013069170A1 (en) * | 2011-11-07 | 2013-05-16 | パナソニック株式会社 | Relay station, base station, and band frequency allocation method |
CN103702324A (en) * | 2013-12-26 | 2014-04-02 | 天津大学 | Cooperative communication alliance structure optimizing method for ensuring safety of physical layer |
-
2014
- 2014-05-13 CN CN201410202247.1A patent/CN103987065B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013069170A1 (en) * | 2011-11-07 | 2013-05-16 | パナソニック株式会社 | Relay station, base station, and band frequency allocation method |
CN103702324A (en) * | 2013-12-26 | 2014-04-02 | 天津大学 | Cooperative communication alliance structure optimizing method for ensuring safety of physical layer |
Non-Patent Citations (3)
Title |
---|
FU XIAOMEI ETC: "Secrecy Performance of Untrusted Relay’s Cooperation under Fading Channels", 《TRANSACTIONS OF TIANJIN UNIVERSITY》 * |
RONGQING ZHANG ETC: "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 * |
黄莉: "基于博弈论的无线网络节点行为研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104994505A (en) * | 2015-07-11 | 2015-10-21 | 中国能源建设集团广东省电力设计研究院有限公司 | Wireless malicious behavior predicting and coping method and data security acquisition system oriented to smart grid |
CN104994505B (en) * | 2015-07-11 | 2023-04-07 | 中国能源建设集团广东省电力设计研究院有限公司 | Wireless malicious behavior prediction and coping method for smart grid and data security acquisition system |
CN105142174A (en) * | 2015-09-22 | 2015-12-09 | 镇江锐捷信息科技有限公司 | Cognition wireless network interference inhibition method based on game theory |
CN110572872A (en) * | 2019-09-05 | 2019-12-13 | 华北电力大学(保定) | Secret capacity calculation method and optimization method of double-medium untrusted relay system |
CN110572872B (en) * | 2019-09-05 | 2022-05-17 | 华北电力大学(保定) | Secret capacity calculation method and optimization method of double-medium untrusted relay system |
Also Published As
Publication number | Publication date |
---|---|
CN103987065B (en) | 2017-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks | |
Jana et al. | Trusted collaborative spectrum sensing for mobile cognitive radio networks | |
CN103297956B (en) | A kind of Dynamic Light magnitude method for evaluating trust based on bayesian theory and entropy theory | |
CN101969647B (en) | Trust model-based cooperative communication method in mobile self-organized network | |
CN103139803B (en) | A kind of based on multifactorial wireless sensor network trust administrative model | |
CN104469836A (en) | Method for building multi-dimension trust model in underwater sensor network | |
CN103987065A (en) | Method for predicting behavior model and monitor strategy of relay node | |
CN104113855A (en) | Channel-based routing algorithm of wireless self-organizing network | |
Wei et al. | SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs. | |
CN104202106A (en) | Collaborative spectrum perception method based on credibility in mobile scene | |
Alghorani et al. | Improved S-AF and S-DF relaying schemes using machine learning based power allocation over cascaded Rayleigh fading channels | |
CN102035726A (en) | Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network | |
Abidoye et al. | Lightweight models for detection of denial‐of‐service attack in wireless sensor networks | |
CN111064665A (en) | Wireless body area network low-delay transmission scheduling method based on Markov chain | |
Gao et al. | Sensor selection based on dempster-shafer evidence theory under collaborative spectrum sensing in cognitive radio sensor networks | |
CN105050080A (en) | Adaptive control method for node transmitting power in source position privacy protection protocol | |
CN103166695B (en) | The relay of a kind of capacity and error rate combined optimization | |
Tassi et al. | Secure data offloading strategy for connected and autonomous vehicles | |
Petrenkov et al. | Anomaly Detection in Vehicle Platoon with Third-Order Consensus Control | |
CN109996218B (en) | Resource allocation method for improving wireless transmission safety performance of Internet of vehicles | |
Nimje et al. | A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm | |
Hu et al. | Event triggering in vehicular networked systems with limited bandwidth and deep fading | |
Yin et al. | A novel reputation model for malicious node detection in wireless sensor network | |
CN103746775A (en) | Cache mechanism for improving wireless opportunity network coding gain | |
Bansal et al. | Detecting MAC misbehavior switching attacks in Wireless Mesh Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170908 Termination date: 20210513 |
|
CF01 | Termination of patent right due to non-payment of annual fee |