CN104918238A - Cooperation interference excitation method for realizing physical layer safety - Google Patents

Cooperation interference excitation method for realizing physical layer safety Download PDF

Info

Publication number
CN104918238A
CN104918238A CN201410096566.9A CN201410096566A CN104918238A CN 104918238 A CN104918238 A CN 104918238A CN 201410096566 A CN201410096566 A CN 201410096566A CN 104918238 A CN104918238 A CN 104918238A
Authority
CN
China
Prior art keywords
node
cooperation
service
source node
cooperative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410096566.9A
Other languages
Chinese (zh)
Other versions
CN104918238B (en
Inventor
王莉
都晨辉
宋梅
马跃
刘洋
滕颖蕾
张勇
满毅
刘宁宁
吴华清
张卢克
孙天晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201410096566.9A priority Critical patent/CN104918238B/en
Publication of CN104918238A publication Critical patent/CN104918238A/en
Application granted granted Critical
Publication of CN104918238B publication Critical patent/CN104918238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a cooperation interference excitation method for realizing physical layer safety in the mobile communication technical field. The invention provides an excitation measure based on paid cooperation interference service according to energy finiteness and selfishness of cooperation nodes. The method comprises the steps: collecting channel state information of each cooperation node and selecting an appropriate node to carry out cooperation interference; a legal communication source node giving initial service total compensation m according to the service need of itself; carrying out gaming of the service total compensation m between the source node and the cooperation nodes by utilizing a Stackelberg gaming method; and carrying out gaming of each obtained compensation mi between the cooperation nodes by utilizing the Stackelberg gaming method. Through double gaming processes, the source node is allowed to obtain the cooperation interference service, of which the cost performance is optimal; and meanwhile, optimum allocation of cooperation power and compensation of each cooperation node is realized.

Description

A kind of motivational techniques realizing the cooperation interference of safety of physical layer
Technical field
The present invention relates to mobile communication technology field, be specifically related to a kind of motivational techniques realizing the cooperation interference of safety of physical layer.
Background technology
Along with the develop rapidly of wireless communication technology, and the application of wireless communication technology is more and more general, and wireless communication technology has infiltrated through the every aspect of common people's life, for we bring more own and convenient.But some problems that himself exists also day by day highlight, and the deficiency especially in the safe and reliable guarantee of information, receives all the more the concern of people.Particularly in recent years, in order to realize the network coverage widely and message transmission rate faster, the cooperating relay communication technology is suggested and is widely used.Also just due to the introducing of more cooperative relay network interior joint, make network configuration complicated all the more, opening is also stronger, and therefore, the communication information is more easily ravesdropping, intercept and capture, and the safety of the communication information faces larger threat and challenge.
Within 1975, American scholar Wyner is according to the concept of extending secrecy capacity in the theory of Shannon secure communication, proposes the concept of safety of physical layer communication first.Subsequently, the technology of safety of physical layer is applied to cooperative relay system by the people such as Dabora, Dong, and proposes the multiple cooperative strategies such as amplification forwarding, decoding forwarding and cooperation interference to improve system safety performance.
The current research for safety of physical layer technology in relay cooperative network, more that research is under the prerequisite having certain energy constraint to transmission node, carry out the optimization process of optimum sensor selection problem and cooperation transmission signal, to reach the object maximizing inter-node link safe capacity.But in considered relay cooperative network, the node in network is generally the passive bus of finite energy.Therefore each node is in order to the optimal utilization of the maximum respective energy, and other nodes of active assistance of being reluctant carry out safety of physical layer communication.For this, the cooperation security service that the scholars such as Han propose cooperative node and provide is paid service, utilizes game theoretic method to encourage playing an active part in of cooperative node.Han for amplification forwarding, decoding forwards and multiple cooperative scene such as cooperation interference etc. is all discussed and analyzes, but the multiple legitimate correspondence user of the scene Main Analysis disturbed for cooperating competes single cooperation interfering nodes and two scenes disturbing cooperative node to serve a legitimate correspondence user.But the incentive mechanism of existing security cooperation interference, require higher for communication quality between cooperative node limited energy and legitimate correspondence user, need multiple cooperative node jointly to provide the scene of interference service, do not provide definite solution.
Summary of the invention
(1) technical problem solved
For the deficiencies in the prior art, the invention provides a kind of motivational techniques realizing the cooperation interference of safety of physical layer, require higher for communication quality between cooperative node limited energy and legitimate correspondence user, multiple cooperative node is needed jointly to provide the scene of interference service, provide effective incentives strategy, meeting between legitimate correspondence user while safe capacity requirement, the every a energy of cooperative node collection is made all to obtain maximized income and the most reasonably utilize.
(2) technical scheme
In order to reach above object, the present invention is achieved by the following technical programs:
Realize motivational techniques for the cooperation interference of safety of physical layer, the method comprises:
S1: source node collects the channel condition information of destination node and eavesdropping node;
S2: source node, according to the improvement effect of each cooperative node to the safe capacity of source node, selects the cooperative node that can realize secure communication as alternative cooperative node;
S3: source node according to the business demand of self, its total recompense m of service that can pay of initialization, and determine that it passes through cooperation interfering process obtainable benefit U s;
S4: utilize Stackelberg game method, carries out game to the total recompense m of service, and determines the optimum total recompense of service according to source node benefit function between source node and cooperative node collection;
S5: utilize Stackelberg game method, carries out apportionment games to the total recompense of optimal service, and determines the getable optimum benefit of each cooperative node between each cooperative node, and tries to achieve respective service recompense m iand separately needed for the cooperation interference power P that provides i.
Preferably, the channel condition information of described destination node and eavesdropping node comprises: source node is respectively G to the channel condition information of destination node and eavesdropping node sdand G se; And each cooperation interfering nodes is respectively G to destination node and the channel condition information of eavesdropping node idand G ie.
Preferably, the computing formula of described each cooperative node to the improvement effect of the safe capacity of source node is:
C s_i=(C sd_i-C se_i) +
Wherein:
C s_ifor source node provides the safe capacity disturbed under service at a certain cooperative node to destination node;
C sd_ifor source node is to the channel capacity of destination node, expression formula is:
C sd _ i = log 2 ( 1 + P s G sd σ 2 + P i G id )
C se_ifor source node is to the channel capacity of eavesdropping node, expression formula is:
C se _ i = log 2 ( 1 + P s G se σ 2 + P i G ie )
Wherein, P sand P ibe respectively the transmitting power that source node adopts with cooperation interfering nodes, and σ 2then represent the thermal noise power at eavesdropping node and destination node.
Preferably, the safe capacity C of source node realization at destination node place can be assisted s_ibe greater than the cooperative node of 0, alternative cooperative node will be chosen as.
Preferably, described source node is by the income U of cooperation interference acquired by service process s, depend on the size of the recompense of the safe capacity that obtains of source node and required payment in cooperation interference service process, its concrete expression formula is:
U s = ( log 2 ( 1 + A 1 + Σ j ∈ ψ u j P j ) - log 2 ( 1 + A ) ) - ( log 2 ( 1 + B 1 + Σ j ∈ ψ v j P j ) - log 2 ( 1 + B ) ) - m
Wherein:
A = Δ P s G sd σ 2
B = Δ P s G se σ 2
u i = Δ P i G id σ 2
v i = Δ G ie σ 2
Wherein, P jrepresent the transmitting power that in cooperation interfering nodes collection ψ, cooperative node j adopts.
Preferably, whole cooperation interfering process, selects multiple cooperation interfering nodes to form cooperation interference collection and jointly provides service in cooperative node, and the obtainable recompense m of each cooperative node i, depend on that the interference service provided separately is to the improvement degree of main channel safe capacity, is specifically expressed as:
m i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G jd ) .
Preferably, each cooperative node is by providing cooperation interference service, and obtainable benefit is expressed as:
U i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G je ) - a P i
Wherein, a is the gain corresponding to per unit of power.
Preferably, in each cooperative node power one timing, the optimum benefit of source node depends on the size of the total recompense m of paid service.For described benefit function U sbe independent variable with m, ask first derivative, namely
∂ U s * ∂ m = 0
U is obtained by above formula sabout the extreme point m of independent variable m *, and U ssecond dervative about independent variable m is less than 0, and function U is described sbe the concave function about m, namely obtain maximum at obtained extreme point place.
Preferably, in total recompense one timing of system, the optimum benefit of each cooperative node depends on its interference power P provided isize.For described U ithink P iindependent variable, asks first derivative, namely
∂ U i ∂ P i = 0
U is obtained by above formula iabout independent variable P iextreme point P i *, and U iabout independent variable P isecond dervative be less than 0, function U is described iabout P iconcave function, namely obtain maximum at obtained extreme point place.
Preferably, the method also comprises: by the cooperation interference power P of each cooperative node of step 5 gained isubstitute in the benefit function of source node in step S4, so circulate, finally try to achieve total service recompense value m that the overall situation is uniquely stable, and the interference power P of corresponding each cooperative node i, this equilibrium point is the Nash Equilibrium Solution of Stackelberg game.
(3) beneficial effect
The present invention has following beneficial effect at least:
Present invention is directed at communication quality requirement between cooperative node limited energy and legitimate correspondence user higher, multiple cooperative node is needed jointly to provide the scene of interference service, propose to utilize the method for Stackelberg game effectively to encourage many cooperative nodes to carry out cooperation interference service, simultaneously by the strategy of double-deck game, make while source node obtains optimum safe capacity with rational recompense, make every part that provides power of each cooperation interfering nodes obtain maximum value.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these figure.
Fig. 1 is a kind of flow chart realizing the motivational techniques of the cooperation interference of safety of physical layer in the embodiment of the present invention;
Fig. 2 is the structure chart of the multi-node collaboration interference model in the embodiment of the present invention;
Fig. 3 shows the safe capacity of Stackelberg game strategies and uniform distribution strategy and the contrast of observable index;
Fig. 4 shows the average interference power contrast in different cooperation interfering nodes participation situation;
When Fig. 5 shows different cooperation interfering nodes participation, the obtainable maximum safe capacity of source node;
Fig. 6 shows cooperation interfering nodes number when being 8, the power division of each cooperation interfering nodes.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, be the motivational techniques realizing the cooperation interference of safety of physical layer a kind of in the embodiment of the present invention, the method comprises the following steps:
S1: source node collects the channel condition information of destination node and eavesdropping node;
S2: source node, according to the improvement effect of each cooperative node to the safe capacity of source node, selects the cooperative node that can realize secure communication as alternative cooperative node;
S3: source node according to the business demand of self, its total recompense m of service that can pay of initialization, and determine that it passes through cooperation interfering process obtainable benefit U s;
S4: utilize Stackelberg (Stackelberg) game method, carries out game to the total recompense m of service, and determines the optimum total recompense of service according to source node benefit function between source node and cooperative node collection;
S5: utilize Stackelberg game method, carries out apportionment games to the total recompense of optimal service, and determines the getable optimum benefit of each cooperative node between each cooperative node, and tries to achieve respective service recompense m iand separately needed for the cooperation interference power P that provides i.
And the cooperative communication network model that the embodiment of the present invention is considered as shown in Figure 2, the system considered comprises a source node S, destination node D, an eavesdropping node E and N number of cooperation interfering nodes J i, i ∈ N, N={1,2 ... n}.Here mentioned node all adopts single antenna and works in semiduplex pattern, and namely each node can not carry out the receipts of data simultaneously and send out operation.Eavesdropping node attempts the information that eavesdropping source node sends all the time.When being weaker than source to the main channel quality of object from source node to the internodal tapping channel quality of eavesdropping, the both sides of legitimate correspondence can ensure securely communicate with the speed of non-zero and be not ravesdropping.The speed of the maximum safe transmission that this can reach by we from source node to destination node is called safe capacity.Safe rate is then the justifiable rate lower than safe capacity.When main channel is second-rate and when being weaker than tapping channel, in order to ensure the fail safe of destination node received information, just need the assistance resorting to interfering nodes, send artificial interference signal to destroy the quality of tapping channel by interfering nodes, thus build the environment that can securely communicate.
Be directed to the communication scenes of interfering nodes cooperation, whole communication process comprises two parts: Part I, and source node S is with power P ssignal is sent to destination node D, and this information also will be ravesdropping node and eavesdropped simultaneously, now G sdand G sebe respectively link S → D, the channel gain on S → E.Part II, interfering nodes J iwith power P ithe artificial interference signal of external transmission, now link J i→ D and J ithe channel gain of → E is respectively G idand G ie.Here suppose that source node can obtain the transient channel information of every bar communication channel, and every bar channel all obeys the Rayleigh fading of Flat quasistatic, in path loss model, path loss coefficient is set to α, is represented as σ at the thermal noise power of eavesdropping node and destination node 2.
Be directed to the scene that between cooperative node limited energy or legitimate correspondence user, channel quality is poor, in order to ensure the secure communication quality between legitimate correspondence user, need multiple cooperation interfering nodes to form cooperation interference collection and carry out associating interference, now destination node and the obtainable channel capacity of eavesdropping node are expressed as C sdand C se,
C sd = log 2 ( 1 + P s G sd σ 2 + Σ i ∈ N P i G id ) - - - ( 1 )
C se = log 2 ( 1 + P s G se σ 2 + Σ i ∈ N P i G ie ) - - - ( 2 )
In order to ensure that data that source node sends are not ravesdropping node and intercept and capture, source node should with C ssafe capacity carry out transfer of data:
C s=(C sd-C se) +(3)
Wherein can find out due to cooperative node send the impact of interference, C sdand C seall reduced accordingly, how to select the power of interfering nodes and distribution interfering nodes will finally affect acquired C seffect.And the safe capacity C of source node realization at destination node place can be assisted sbe greater than the cooperative node of 0, participate in be chosen as alternative cooperative node in follow-up cooperation interference service process.
Cooperation is participated in the secure communication demand meeting validated user in order to encourage more node, guarantee that recompense and power used distribute efficiently between many cooperative nodes, Stackelberg game is used and analyzes its impact promoted for system safety performance simultaneously.
In designed game scene, source node S is expected by from cooperative node J ithe safe capacity of oneself is optimized in the interference " service " that place buys.Therefore its utility function U sbe represented as:
maxU s=max(C s-m) +(4)
Wherein m be source node S pay total recompense of all cooperation interfering nodes.
Corresponding cooperation interfering nodes J ithe source node being then responsible for demand provides paid interference service, and it is by asking for recompense to acquire an advantage from source node, therefore its utility function U iobtain by its difference between recompense and the cost paid:
maxU i=max(m i-aP i) +(5)
Wherein a is the gain corresponding to per unit of power, and m ithen cooperation interfering nodes J ithe recompense obtained, it depends on that this node is for the contribution improving main channel safe capacity.
m i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G jd ) - - - ( 6 )
In formula, territory ψ is all node set participating in cooperation interference, and P jit is then the interference power that in the ψ of territory, each cooperation interfering nodes adopts.
Be easy to find from publicity (4) and (5), only have when source node and cooperative node can be made a profit from this gambling process, it is just ready to participate in this gambling process.We utilize the method for Stackelberg game to carry out the design and optimization of game strategies, therefore source node is the buyer in gambling process, and cooperative node is then the auctioneer in gambling process.
Source node end is sentence optimum price from cooperative node to buy interference service as much as possible to improve the safe capacity desired by it as its target of buyer.Therefore its utility function specifically can be expressed as:
U s = ( log 2 ( 1 + A 1 + Σ j ∈ ψ u j P j ) - log 2 ( 1 + A ) ) - ( log 2 ( 1 + B 1 + Σ j ∈ ψ v j P j ) - log 2 ( 1 + B ) ) - m - - - ( 7 )
Wherein
A = Δ P s G sd σ 2 - - - ( 8 )
B = Δ P s G se σ 2 - - - ( 9 )
u i = Δ P i G id σ 2 - - - ( 10 )
v i = Δ G ie σ 2 - - - ( 11 )
Suppose P iim, then for formula (7), the benefit that it obtains when cooperative node is fixed is relevant with the total recompense paid, and asks local derviation to obtain formula (7) for m
∂ U s ∂ m = B Σ j ∈ ψ v j P j ln 2 ( 1 + B + Σ j ∈ ψ v j P j m ) ( 1 + Σ j ∈ ψ v j P j m ) - A Σ j ∈ ψ u j P j ln 2 ( 1 + A + Σ j ∈ ψ u j P j m ) ( 1 + Σ j ∈ ψ u j P j m ) - 1 - - - ( 12 )
Formula (12) be solved to closed solutions, the solution procedure of its closed solutions is too complicated, in order to reduce system complexity, we are by System Model Reduction: by the preliminary treatment for interference signal, make interference signal only impact eavesdropping Nodes and can not reduce the channel quality at destination node place, thus the utility function at source node place is changed to:
U s = ( log 2 ( 1 + B ) - log 2 ( 1 + B 1 + Σ j ∈ ψ v j P j ) ) - m - - - ( 13 )
For source node, it only has when formula (13) equals 0 about the local derviation of m, the benefit extreme value that it obtains:
∂ U s * ∂ m = B Σ j ∈ ψ v j ρ j ln 2 ( 1 + B + Σ j ∈ ψ v j ρ j m ) ( 1 + Σ j ∈ ψ v j ρ j m ) - 1 = 0 - - - ( 14 )
Rearrange formula (14) can obtain
m 2 + ( B + 2 ) m Σ j ∈ ψ v j ρ j + 1 + B - B Σ j ∈ ψ v j ρ j / ln 2 ( Σ j ∈ ψ v j ρ j ) 2 = 0 - - - ( 15 )
Therefore the closed solutions for formula (15) is
m * = - B + 2 2 K + ( B + 2 ) 2 4 K 2 - ( 1 + B - BK / ln 2 ) K 2 - - - ( 16 )
Wherein K=∑ j ∈ Jv jρ j, consider the actual physics implication of m, m should be greater than 0 value, when m≤0, show that source node cannot obtain benefit by the help of cooperative node.
∂ 2 U s * ∂ m 2 = - B ( Σ j ∈ ψ v j ρ j ) 2 ln 2 ( 1 + B + Σ j ∈ ψ v j ρ j m ) 2 ( 1 + Σ j ∈ ψ v j ρ j m ) - B ( Σ j ∈ ψ v j ρ j ) 2 ln 2 ( 1 + B + Σ j ∈ ψ v j ρ j m ) ( 1 + Σ j ∈ ψ v j ρ j m ) 2 - - - ( 17 )
Known according to formula (17), U ssecond dervative about m is minus, is the concave function about m.Therefore make U sthe first derivative m value that equals 0 be in cooperative node power P iwhen fixing, source node is made to obtain the point of greatest benefit.
According to formula (5) and (6), can find that the recompense that cooperative node can obtain is how many relevant with the total recompense given by the power that it is paid and source node, its utility function specifically can be expressed as:
U i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G jd ) - a P i - - - ( 18 )
In order to reach paid power and obtain optimal proportion between recompense, our hypothesis, when total recompense m is certain, asks U iwith P ibetween relation.P is asked to formula (18) ilocal derviation be:
∂ U i ∂ P i = m G ie Σ j ∈ ψ P j G je - m P i G ie 2 ( Σ j ∈ ψ P j G je ) 2 - a - - - ( 19 )
When formula (19) equals 0 time, can in the hope of under the total recompense m fixing situation of system, power when making cooperative node obtain optimum benefit.
P i * = m G ie Σ j ∈ ψ P j G je / a - Σ j ≠ i P j G je G ie - - - ( 20 )
The present invention is poor mainly for channel quality between cooperative node limited energy or legitimate correspondence user, needs multiple cooperation interfering nodes to carry out the scene of associating interference.When the nodes participating in cooperation interference is greater than 2, there is Nash Equilibrium in designed whole gambling process.
According to the definition of Nash Equilibrium, in order to reach Nash Equilibrium, each cooperation interfering nodes J iall select the interference power of its optimum responsively.Otherwise interference cooperative node will be had and expect that its strategy of adjustment is to obtain better income.
Therefore, carry out distortion to formula (20) can obtain
P i * = C ( m G ie - aC ) m G ie 2 - - - ( 21 )
Wherein C=∑ j ∈ ψp jg je.
Combine the optimal response considering each cooperative node, therefore to all P i *g iecarry out suing for peace and just equal C, still can obtain P i *new expression formula,
P i * = m ( n - 1 ) ( E G ie - n + 1 ) a G ie 2 E 2 = m ρ i E = Σ j ∈ ψ 1 G ie - - - ( 22 )
Wherein n is the quantity of the interfering nodes participating in cooperation.Can find out that the program is only applicable to multiple node and carries out the scene disturbed that cooperates, i.e. n >=2 simultaneously by formula (22).
∂ 2 U i ∂ P 2 i = 2 P i G ie 3 m ( Σ j ∈ ψ P j G je ) 2 - 2 m G ie 2 ( Σ j ∈ ψ P j G je ) 2 - - - ( 23 )
Can find about P from formula (23) isecond dervative be less than 0, therefore U iabout P iconcave function.Can be found again to only have and work as by formula (22) time, cooperation interfering nodes just can be selected to carry out providing interference service.Otherwise work as time, required P i *for negative value, in this case, this interference cooperative node then keeps silent status externally not carry out the transmission of interference signal.
According to the definition of Nash Equilibrium, when optimal response function be on the occasion of, dull, during easily extensible, the Nash Equilibrium of gambling process exists and unique.Obviously, P can be proved easily from formula (20) and (22) i *meet above requirement, therefore the Nash Equilibrium of this gambling process existence anduniquess.
Present invention is directed at communication quality requirement between cooperative node limited energy and legitimate correspondence user higher, multiple cooperative node is needed jointly to provide the scene of interference service, propose to utilize the method for Stackelberg game effectively to encourage many cooperative nodes to carry out cooperation interference service, simultaneously by the strategy of double-deck game, make while source node obtains optimum safe capacity with rational recompense, make every part that provides power of each cooperation interfering nodes obtain maximum value.
Simulation analysis is carried out to the method mentioned in the embodiment of the present invention below, in order to verify the proposed excitation of interference cooperative node based on Stackelberg game and the performance of power distribution strategies, algorithm that the present invention carries will be analyzed with average power allocation strategy.In the communication scenes considered, comprise a source node, a destination node and an eavesdropping node, their their positions lay respectively at (0,0), (0,100), (50,50).In order to contrast the allocative efficiency of designed Stackelberg game playing algorithm for node power and recompense, we also discuss disturbance cooperative node participate under systematic function, wherein discussed cooperation interfering nodes number is as shown in table 1.For simplicity, selected cooperation interfering nodes all at eavesdropping near nodal, and then makes produced interference signal very little for the impact of destination node, even can ignore in computational process.Other parameters required in simulation process are as shown in table 1.According to above known to middle formula, the optimal power that gain corresponding to per unit of power calculates for system and system benefit have vital impact, therefore in simulation process, the value of a carries out dynamic change from 100 to 1000, to analyze the impact of different a for systematic function.
Table 1 cooperates EVAC (Evacuation Network Computer Model) parameter
Parameter Value
Source node transmitting power P s 0.02W
Path loss index α 3
Noise power σ 2 10 -8W
Cooperative node number N 2,3,4,5,6,7,8
In order to verify the high efficiency of designed Stackelberg game for many cooperation interfering nodes power division, first we contrast with even power allocation strategy, as shown in Figure 3, no matter is at N j=2 or N jwhen=8, designed strategy can obtain higher safe capacity and always disturb power dissipation ratio, and namely proposed scheme can consume less power consumption and realize the effect of same safe capacity lifting.When Fig. 4 and Fig. 5 respectively show designed Stackelberg game strategies corresponding to different cooperation interfering nodes participation, the interference power of the required consumption of average each cooperative node and the obtainable maximum safe capacity of source node.From the angle of ensemble average, when there being multiple node to cooperate, each cooperation interfering nodes can adopt less power that source node can be made to obtain higher safe capacity.
But due to the difference of each nodal distance eavesdropping node location, its interference signal is also different for the impact of eavesdropping node, therefore can obviously find from Fig. 6, have 8 nodes cooperate simultaneously interference time, utilize Stackelberg game, for the game competition that gained recompense is carried out between different node, thus impel each node to adopt the most rational power to cooperate, thus realize the optimum safe capacity at source node place acquired in Fig. 5.
Above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that; It still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. realize motivational techniques for the cooperation interference of safety of physical layer, it is characterized in that, the method comprises:
S1: source node collects the channel condition information of destination node and eavesdropping node;
S2: source node, according to the improvement effect of each cooperative node to the safe capacity of source node, selects the cooperative node that can realize secure communication as alternative cooperative node;
S3: source node according to the business demand of self, its total recompense m of service that can pay of initialization, and determine that it passes through cooperation interfering process obtainable benefit U s;
S4: utilize Stackelberg game method, carries out game to the total recompense m of service, and determines the optimum total recompense of service according to source node benefit function between source node and cooperative node collection;
S5: utilize Stackelberg game method, carries out apportionment games to the total recompense of optimal service, and determines the getable optimum benefit of each cooperative node between each cooperative node, and tries to achieve respective service recompense m iand separately needed for the cooperation interference power P that provides i.
2. motivational techniques according to claim 1, is characterized in that, the channel condition information of described destination node and eavesdropping node comprises: source node is respectively G to the channel condition information of destination node and eavesdropping node sdand G se; And each cooperation interfering nodes is respectively G to destination node and the channel condition information of eavesdropping node idand G ie.
3. motivational techniques according to claim 1, is characterized in that, the computing formula of described each cooperative node to the improvement effect of the safe capacity of source node is:
C s_i=(C sd_i-C se_i) +
Wherein:
C s_ifor source node provides the safe capacity disturbed under service at a certain cooperative node to destination node;
C sd_ifor source node is to the channel capacity of destination node, expression formula is:
C sd _ i = log 2 ( 1 + P s G sd σ 2 + P i G id )
C se_ifor source node is to the channel capacity of eavesdropping node, expression formula is:
C se _ i = log 2 ( 1 + P s G se σ 2 + P i G ie )
Wherein, P sand P ibe respectively the transmitting power that source node adopts with cooperation interfering nodes, and σ 2then represent the thermal noise power at eavesdropping node and destination node.
4. motivational techniques according to claim 3, is characterized in that, can assist the safe capacity C of source node realization at destination node place s_ibe greater than the cooperative node of 0, alternative cooperative node will be chosen as.
5. motivational techniques according to claim 1, is characterized in that, described source node is by the income U of cooperation interference acquired by service process s, depend on the size of the recompense of the safe capacity that obtains of source node and required payment in cooperation interference service process, its concrete expression formula is:
U s = ( log 2 ( 1 + A 1 + Σ j ∈ ψ u j P j ) - log 2 ( 1 + A ) ) - ( log 2 ( 1 + B 1 + Σ j ∈ ψ v j P j ) - log 2 ( 1 + B ) ) - m
Wherein:
A = Δ P s G sd σ 2
B = Δ P s G se σ 2
u i = Δ P i G id σ 2
v i = Δ G ie σ 2
Wherein, P jrepresent the transmitting power that in cooperation interfering nodes collection ψ, cooperative node j adopts.
6. motivational techniques according to claim 1, is characterized in that, whole cooperation interfering process, select multiple cooperation interfering nodes to form cooperation interference collection and jointly provide service in cooperative node, and the obtainable recompense m of each cooperative node i, depend on that the interference service provided separately is to the improvement degree of main channel safe capacity, is specifically expressed as:
m i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G jd ) .
7. motivational techniques according to claim 1, is characterized in that, each cooperative node is by providing cooperation interference service, and obtainable benefit is expressed as:
U i = m ( P i G ie - P i G id Σ j ∈ ψ P j G je - P j G je ) - a P i
Wherein, a is the gain corresponding to per unit of power.
8. motivational techniques according to claim 5, is characterized in that, in each cooperative node power one timing, the optimum benefit of source node depends on the size of the total recompense m of paid service.For described benefit function U sbe independent variable with m, ask first derivative, namely
∂ U s * ∂ m = 0
U is obtained by above formula sabout the extreme point m of independent variable m *, and U ssecond dervative about independent variable m is less than 0, and function U is described sbe the concave function about m, namely obtain maximum at obtained extreme point place.
9. motivational techniques according to claim 7, is characterized in that, in total recompense one timing of system, the optimum benefit of each cooperative node depends on its interference power P provided isize.For described U ithink P iindependent variable, asks first derivative, namely
∂ U i ∂ P i = 0
U is obtained by above formula iabout independent variable P iextreme point P i *, and U iabout independent variable P isecond dervative be less than 0, function U is described iabout P iconcave function, namely obtain maximum at obtained extreme point place.
10., according to the said motivational techniques of claim 1, it is characterized in that, the method also comprises:
By the cooperation interference power P of each cooperative node of step 5 gained isubstitute in the benefit function of source node in step S4, so circulate, finally try to achieve the interference power P of the uniquely stable total service recompense value m of the overall situation and corresponding each cooperative node i, this equilibrium point is the Nash Equilibrium Solution of Stackelberg game.
CN201410096566.9A 2014-03-14 2014-03-14 A kind of motivational techniques for the cooperation interference for realizing safety of physical layer Active CN104918238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410096566.9A CN104918238B (en) 2014-03-14 2014-03-14 A kind of motivational techniques for the cooperation interference for realizing safety of physical layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410096566.9A CN104918238B (en) 2014-03-14 2014-03-14 A kind of motivational techniques for the cooperation interference for realizing safety of physical layer

Publications (2)

Publication Number Publication Date
CN104918238A true CN104918238A (en) 2015-09-16
CN104918238B CN104918238B (en) 2018-04-24

Family

ID=54086850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410096566.9A Active CN104918238B (en) 2014-03-14 2014-03-14 A kind of motivational techniques for the cooperation interference for realizing safety of physical layer

Country Status (1)

Country Link
CN (1) CN104918238B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657700A (en) * 2016-03-10 2016-06-08 南京邮电大学 Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN105916197A (en) * 2016-06-06 2016-08-31 西安交通大学 Power adaptive method of social credit driving in D2D network
CN106162646A (en) * 2016-07-14 2016-11-23 北京邮电大学 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device
CN108924797A (en) * 2018-06-11 2018-11-30 西安交通大学 A kind of D2D network security transmission method with social awareness
CN108989115A (en) * 2018-07-25 2018-12-11 湖北民族学院 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN111555836A (en) * 2020-04-27 2020-08-18 西安交通大学 Wireless covert communication model and method based on multi-node cooperative interference blocking
CN111669760A (en) * 2020-07-06 2020-09-15 中南大学 Safe transmission scheme based on cooperative interference in cognitive radio network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101868030A (en) * 2010-05-25 2010-10-20 华南理工大学 Distributed wireless network wireless resource distribution method
CN102438235A (en) * 2011-08-22 2012-05-02 北京邮电大学 Method for selecting optimal distributed type interference source in mobile collaborative network
CN102752080A (en) * 2012-07-03 2012-10-24 西安交通大学 Anti-eavesdrop coding method based on physical layer
CN103227997A (en) * 2013-04-02 2013-07-31 北京邮电大学 Joint optimization method of safety capacity and energy consumption in wireless relay network
CN103249129A (en) * 2013-04-17 2013-08-14 南京邮电大学 Optimal relay cooperation motivating method for wireless heterogeneous network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101868030A (en) * 2010-05-25 2010-10-20 华南理工大学 Distributed wireless network wireless resource distribution method
CN102438235A (en) * 2011-08-22 2012-05-02 北京邮电大学 Method for selecting optimal distributed type interference source in mobile collaborative network
CN102752080A (en) * 2012-07-03 2012-10-24 西安交通大学 Anti-eavesdrop coding method based on physical layer
CN103227997A (en) * 2013-04-02 2013-07-31 北京邮电大学 Joint optimization method of safety capacity and energy consumption in wireless relay network
CN103249129A (en) * 2013-04-17 2013-08-14 南京邮电大学 Optimal relay cooperation motivating method for wireless heterogeneous network

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657700A (en) * 2016-03-10 2016-06-08 南京邮电大学 Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN105657700B (en) * 2016-03-10 2019-05-17 南京邮电大学 Wireless anti-eavesdrop communication means based on the cooperation of multiple source nodes
CN105916197A (en) * 2016-06-06 2016-08-31 西安交通大学 Power adaptive method of social credit driving in D2D network
CN105916197B (en) * 2016-06-06 2019-01-18 西安交通大学 The power adaptive method that social credibility drives in D2D network
CN106162646A (en) * 2016-07-14 2016-11-23 北京邮电大学 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN110248306B (en) * 2018-03-08 2020-05-08 北京邮电大学 Method and device for determining cooperative node of source node, electronic equipment and medium
CN108924797A (en) * 2018-06-11 2018-11-30 西安交通大学 A kind of D2D network security transmission method with social awareness
CN108924797B (en) * 2018-06-11 2020-08-18 西安交通大学 D2D network security transmission method with social awareness
CN108989115A (en) * 2018-07-25 2018-12-11 湖北民族学院 Application method of the virtual beams co-interfere in heterogeneous wireless network safety of physical layer
CN111555836A (en) * 2020-04-27 2020-08-18 西安交通大学 Wireless covert communication model and method based on multi-node cooperative interference blocking
CN111555836B (en) * 2020-04-27 2021-12-28 西安交通大学 Wireless covert communication model and method based on multi-node cooperative interference blocking
CN111669760A (en) * 2020-07-06 2020-09-15 中南大学 Safe transmission scheme based on cooperative interference in cognitive radio network
CN111669760B (en) * 2020-07-06 2022-09-23 中南大学 Safe transmission scheme based on cooperative interference in cognitive radio network

Also Published As

Publication number Publication date
CN104918238B (en) 2018-04-24

Similar Documents

Publication Publication Date Title
CN104918238A (en) Cooperation interference excitation method for realizing physical layer safety
Ning et al. Social-oriented adaptive transmission in opportunistic Internet of smartphones
Feng et al. Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: A deep reinforcement learning approach
He et al. Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications
CN103139803B (en) A kind of based on multifactorial wireless sensor network trust administrative model
CN101594657A (en) In the radio sensing network based on the election of cluster head method of soft-threshold
Wan et al. AHP based relay selection strategy for energy harvesting wireless sensor networks
Xu et al. Deep reinforcement learning assisted edge-terminal collaborative offloading algorithm of blockchain computing tasks for energy Internet
Fang et al. An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks
CN103249062A (en) Repeated game-based converged ubiquitous network multi-terminal cooperation trust mechanism
Ge et al. Survey of consensus algorithms for proof of stake in blockchain
Ovalle-Martínez et al. Finding minimum transmission radii for preserving connectivity and constructing minimal spanning trees in ad hoc and sensor networks
Liu et al. Blockchain based offloading strategy: Incentive, effectiveness and security
Okajima et al. A dynamic mechanism for LQG power networks with random type parameters and pricing delay
Xing et al. Uavs-aided delay-tolerant blockchain secure offline transactions in post-disaster vehicular networks
Zuo et al. Delay-limited computation offloading for MEC-assisted mobile blockchain networks
CN114339733A (en) Model training method and related equipment
Korenda et al. A hierarchical stackelberg-coalition formation game theoretic framework for cooperative spectrum leasing
CN113689295B (en) Distributed energy transaction method and system among multiple participating subjects
Xue et al. Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing
Luan et al. Cooperative power consumption in the smart grid based on coalition formation game
He et al. Dynamic task offloading for mobile edge computing in urban rail transit
CN106162646A (en) The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device
CN106851673B (en) Method and device for acquiring non-overlapping stable forwarding alliance structure
CN104735796A (en) Cooperation relay strategy of multisource and single relay system in wireless communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant