CN106162646A - The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device - Google Patents

The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device Download PDF

Info

Publication number
CN106162646A
CN106162646A CN201610554434.5A CN201610554434A CN106162646A CN 106162646 A CN106162646 A CN 106162646A CN 201610554434 A CN201610554434 A CN 201610554434A CN 106162646 A CN106162646 A CN 106162646A
Authority
CN
China
Prior art keywords
node
cooperative
data sending
theta
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610554434.5A
Other languages
Chinese (zh)
Inventor
王莉
满毅
宋梅
李蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201610554434.5A priority Critical patent/CN106162646A/en
Publication of CN106162646A publication Critical patent/CN106162646A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0226Traffic management, e.g. flow control or congestion control based on location or mobility
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1215Wireless traffic scheduling for collaboration of different radio technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/30Resource management for broadcast services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种实现物理层安全的协作干扰的激励方法及装置,包括:获得目标节点以及窃听节点的位置信息、及数据发送节点至目标节点以及至窃听节点的信道功率增益;选择协作节点的备选位置,备选位置需满足协作节点对所述数据发送节点的安全容量的改善效果,以实现安全通信;并将备选位置进行等级划分;针对对应的位置等级,根据自身业务需求、位置信息、效益函数以及位置对应的等级,利用契约论方法,确定所述协作节点处于所述位置对应等级时所能得到的服务报酬及需要提供的协作干扰功率;将所得到的结果进行广播,供协作节点选择。应用本发明实施例可以解决发送节点在无法获得协作节点具体位置信息的情况下,给出有效的激励策略。

The embodiment of the present invention discloses an excitation method and device for realizing cooperative interference of physical layer security, including: obtaining the position information of the target node and the eavesdropping node, and the channel power gain from the data sending node to the target node and to the eavesdropping node; selecting Alternative positions of the coordination nodes, the alternative positions need to meet the improvement effect of the coordination nodes on the security capacity of the data sending node to achieve secure communication; and classify the alternative positions; for the corresponding position levels, according to their own business Demand, location information, benefit function and the level corresponding to the location, using the method of contract theory, determine the service remuneration and the cooperative interference power that can be obtained when the cooperative node is at the corresponding level of the location; the obtained results are carried out Broadcast for selection by coordinating nodes. The application of the embodiment of the present invention can solve the problem of providing an effective incentive strategy for the sending node when the specific location information of the coordinating node cannot be obtained.

Description

一种实现物理层安全的协作干扰的激励方法及装置An incentive method and device for realizing coordinated interference of physical layer security

技术领域technical field

本发明涉及移动通信技术领域,特别涉及一种实现物理层安全的协作干扰的激励方法及装置。The invention relates to the technical field of mobile communication, in particular to an excitation method and device for realizing coordinated interference of physical layer security.

背景技术Background technique

随着无线通信技术的发展,对信息通信的安全和保障方面提出了更高的要求,特别是近年来,为了实现更广泛的网络覆盖和更快的数据传输速率,协作中继通信被提出并被广泛应用。由于协作节点的引入,使得网络结构开放性更强、结构更加复杂,通信安全面临更大的威胁和挑战。With the development of wireless communication technology, higher requirements have been put forward for the safety and security of information communication. Especially in recent years, in order to achieve wider network coverage and faster data transmission rate, cooperative relay communication has been proposed and adopted. is widely used. Due to the introduction of collaborative nodes, the network structure is more open and complex, and communication security faces greater threats and challenges.

当前中继网络中,网络内的节点为能量有限、具有自私性的无源节点,因此各节点为了各自能源的最优利用,并不愿意主动协作其他节点进行物理层安全通信,基于此,有文献利用博弈论分析了多用户共享单一协作节点时的系统性能。另有学者提出利用斯塔克尔伯格博弈来激励多个协作节点同时为同一源节点提供安全协作服务,采用双层博弈策略,以最大化包括源节点在内的每个节点自身效用。通常,将接受协作服务的节点称之为数据发送节点,接收数据发送节点服务请求的节点称之为目标节点。现有技术中,提出了一个或多个协作节点服务于一个合法数据发送节点的情形,这些均以用户知晓协作节点的具体位置信息为基础,而对于协作节点位置信息不确定的场景并未给出具体解决方案。In the current relay network, the nodes in the network are passive nodes with limited energy and selfishness. Therefore, for the optimal utilization of their own energy, each node is unwilling to actively cooperate with other nodes for physical layer security communication. Based on this, there is The literature uses game theory to analyze the system performance when multiple users share a single collaborative node. Another scholar proposes to use the Stackelberg game to encourage multiple cooperative nodes to provide secure collaborative services for the same source node at the same time, and adopts a two-layer game strategy to maximize the utility of each node including the source node. Usually, the node receiving the cooperation service is called the data sending node, and the node receiving the service request of the data sending node is called the target node. In the prior art, a scenario where one or more coordinating nodes serve a legitimate data sending node is proposed, which is based on the user knowing the specific location information of the coordinating nodes, and the scenario where the coordinating node’s location information is uncertain is not given. specific solutions.

而在实际的通信情形下,无论是窃听节点还是协作节点,由于节点本身的隐私性与其自身的能量限制,其所处的地理位置并不是实时更新的,因此出现用户并不能实时获得协作节点或窃听节点的具体位置信息,会造成协作节点和数据发送节点的信息不对称性的问题。特别是协作节点的位置,对协作干扰服务能否实现有着极其重要的影响,但是现有的协作干扰激励并未将此考虑在内。In the actual communication situation, whether it is an eavesdropping node or a coordinating node, due to the privacy of the node itself and its own energy constraints, its geographic location is not updated in real time, so users cannot obtain the coordinating node or coordinating node in real time. Eavesdropping on the specific location information of nodes will cause the problem of information asymmetry between coordinating nodes and data sending nodes. Especially the location of the cooperative node has an extremely important impact on whether the cooperative jamming service can be realized, but the existing cooperative jamming incentives do not take this into consideration.

发明内容Contents of the invention

本发明实施例的目的在于提供一种实现物理层安全的协作干扰的激励方法及装置,以解决发送节点在无法获得协作节点具体位置信息的情况下,给出有效的激励策略,在满足合法通信用户间安全容量要求的同时,使得协作节点在不同位置都能获得最大化的收益。The purpose of the embodiments of the present invention is to provide an incentive method and device for realizing physical layer security cooperative interference, so as to solve the problem that the sending node can provide an effective incentive strategy when the specific location information of the cooperative node cannot be obtained, and meet the legal communication requirements. While satisfying the security capacity requirements among users, the cooperative nodes can obtain the maximum benefit in different locations.

为达到上述目的,本发明实施例公开了一种实现物理层安全的协作干扰的激励方法,应用于数据发送节点,所述方法包括:In order to achieve the above purpose, the embodiment of the present invention discloses an incentive method for realizing physical layer security cooperative interference, which is applied to a data sending node, and the method includes:

获得目标节点以及窃听节点的位置信息、所述数据发送节点至所述目标节点的第一信道功率增益、所述数据发送节点至所述窃听节点的第二信道功率增益;Obtaining the location information of the target node and the eavesdropping node, the first channel power gain from the data sending node to the target node, and the second channel power gain from the data sending node to the eavesdropping node;

获得协作节点可能处于的M个位置;Obtain the possible M positions of the coordinating nodes;

针对所述M个位置中的每一位置,根据所述第一信道功率增益、所述第二信道功率增益、处于所述位置的协作节点至所述目标节点的第三信道功率增益、处于所述位置的协作节点至所述窃听节点的第四信道功率增益、以及处于所述位置的协作节点对所述数据发送节点的安全容量的改善效果,判断所述协作节点处于所述位置时是否能够实现安全通信;For each position in the M positions, according to the first channel power gain, the second channel power gain, the third channel power gain from the coordinating node at the position to the target node, at the The fourth channel power gain from the coordinating node at the above position to the eavesdropping node, and the improvement effect of the coordinating node at the position on the security capacity of the data sending node, determine whether the coordinating node can be at the position enable secure communications;

如果是,将所述位置确定为所述协作节点的备选位置;If so, determining the location as a candidate location for the coordinating node;

将所确定的备选位置,根据所述第四信道功率增益进行等级划分;classifying the determined candidate positions according to the fourth channel power gain;

针对每一位置对应的等级,根据自身业务需求、所述位置信息、效益函数以及所述位置对应的等级,利用契约论方法,确定所述协作节点处于所述等级时所能得到的服务报酬以及需要提供的协作干扰功率;For the level corresponding to each position, according to its own business needs, the position information, the benefit function and the level corresponding to the position, use the contract theory method to determine the service remuneration that the coordination node can get when it is at the level and Cooperative interference power to be provided;

广播所确定的每一等级对应的服务报酬以及需要提供的协作干扰功率,以使接收到所述每一等级对应的服务报酬以及需要提供的协作干扰功率的协作节点以与自身位置对应等级的协作干扰功率发送干扰信号。Broadcast the determined service remuneration corresponding to each level and the cooperative interference power that needs to be provided, so that the coordinating node that receives the service remuneration corresponding to each level and the cooperative interference power that needs to be provided can cooperate with the corresponding level of its own position Jamming power sends jamming signals.

优选的,所述针对所述M个位置中的每一位置,根据所述第一信道功率增益、所述第二信道功率增益、处于所述位置的协作节点至所述目标节点的第三信道功率增益、处于所述位置的协作节点至所述窃听节点的第四信道功率增益、以及处于所述位置对应等级的协作节点对所述数据发送节点的安全容量的改善效果,判断所述协作节点处于所述位置时是否能够实现安全通信,包括:Preferably, for each of the M positions, according to the first channel power gain, the second channel power gain, and the third channel from the coordinating node at the position to the target node The power gain, the fourth channel power gain from the coordinating node at the position to the eavesdropping node, and the improvement effect of the coordinating node at the level corresponding to the position on the security capacity of the data sending node, determine the coordinating node Whether secure communications are possible while in the described location, including:

判断所述协作节点处于所述位置时协助所述数据发送节点实现在所述目标节点处的安全容量增量Cs_i是否大于零;如果是,表示所述协作节点处于所述位置时能够实现安全通信;其中,Judging whether the safety capacity increment C s_i that assists the data sending node in realizing the safety capacity at the target node is greater than zero when the coordinating node is in the position; communication; among them,

CC sthe s __ ii == (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii ≠≠ 00 -- (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii == 00

Csd为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ PP ii hh ii dd ))

Cse为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se is the channel capacity from the data sending node to the eavesdropping node, and the expression is:

CC sthe s ee == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ PP ii hh ii ee ))

hsd、hse、hid、hie分别为所述第一信道功率增益、所述第二信道功率增益、所述第三信道功率增益、所述第四信道功率增益,Ps为所述数据发送节点到所述目标节点的信号发射功率,Pi为所述协作节点对外的预设协作干扰功率,σ2为信道中的高斯白噪声功率。h sd , h se , h id , and h ie are the first channel power gain, the second channel power gain, the third channel power gain, and the fourth channel power gain respectively, and P s is the The signal transmission power from the data sending node to the target node, P i is the external preset cooperative interference power of the cooperative node, and σ 2 is the Gaussian white noise power in the channel.

优选的,所述效益函数的具体表达为:Preferably, the specific expression of the benefit function is:

RR == ΣΣ ii == 11 NN ββ ii ·&Center Dot; (( ωω ·&Center Dot; CC sthe s __ θθ ii -- TT θθ ii ))

Cs_θi的具体表达式为:The specific expression of C s_θi is:

CC sthe s __ θθ ii == (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii ≠≠ 00 -- (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii == 00

Csd_i为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd_i is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ QQ θθ ii hh ii dd ))

Cse_i为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se_i is the channel capacity from the data sending node to the eavesdropping node, the expression is:

CC sthe s ee __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ QQ θθ ii hh ii ee ))

其中,R为所述数据发送节点的效益;θi为处于第i个备选位置的协作节点对应的等级,Tθi为等级为θi的备选位置的协作节点所能得到的服务报酬,Qθi为等级为θi的备选位置的协作节点对外提供的协作干扰功率,N为所述协作节点的备选位置的个数,βi为协作节点处于第i个备选位置的概率,且对全部所述协作节点的备选位置,存在ω表示每单位安全容量的增加所对应的增益,Cs_θi为所述数据发送节点在等级为θi的备选位置的协作节点激励下,获得的安全容量。Among them, R is the benefit of the data sending node; θi is the level corresponding to the coordinating node at the i-th candidate position, T θi is the service reward that the coordinating node at the candidate position with the level of θi can get, Q θi is the cooperative interference power provided externally by the coordinating node at the candidate position of θi, N is the number of candidate positions of the coordinating node, β i is the probability that the coordinating node is in the i-th candidate position, and for all Alternative locations for the coordinating nodes exist ω represents the gain corresponding to the increase of the security capacity per unit, and C s_θi is the security capacity obtained by the data sending node under the encouragement of the coordinating node at the candidate position of level θi.

优选的,所述协作节点的效益的函数具体表达为:Preferably, the benefit function of the collaboration node is specifically expressed as:

U(θi)=Tθi-fθi·Qθi U(θi)=T θi -f θi Q θi

其中,U(θi)为处于等级为θi的备选位置的协作节点的效益,Qθi为处于等级为θi的备选位置的协作节点对外的协作干扰功率,fθi为处于等级为θi的备选位置的协作节点每单位功率消耗所对应的效益的降低。Among them, U(θi) is the benefit of the cooperative node at the candidate position of θi, Q θi is the cooperative interference power of the cooperative node at the candidate position of θi, f θi is the backup power of the candidate position of θi The decrease in benefit per unit power consumption of the coordinating nodes at selected positions.

为达到上述目的,本发明实施例还公开了一种实现物理层安全的协作干扰的激励装置,应用于数据发送节点,所述装置包括:In order to achieve the above purpose, the embodiment of the present invention also discloses an incentive device for realizing coordinated interference of physical layer security, which is applied to a data sending node, and the device includes:

第一获得模块,用于获得目标节点以及窃听节点的位置信息、所述数据发送节点至所述目标节点的第一信道功率增益、所述数据发送节点至所述窃听节点的第二信道功率增益;A first obtaining module, configured to obtain location information of a target node and an eavesdropping node, a first channel power gain from the data sending node to the target node, and a second channel power gain from the data sending node to the eavesdropping node ;

第二获得模块,用于获得协作节点可能处于的M个位置;The second obtaining module is used to obtain the possible M positions of the coordination node;

第一判断模块,用于针对所述M个位置中的每一位置,根据所述第一信道功率增益、所述第二信道功率增益、处于所述位置的协作节点至所述目标节点的第三信道功率增益、处于所述位置的协作节点至所述窃听节点的第四信道功率增益、以及处于所述位置的协作节点对所述数据发送节点的安全容量的改善效果,判断所述协作节点处于所述位置时是否能够实现安全通信;The first judging module is configured to, for each of the M positions, according to the first channel power gain, the second channel power gain, and the first distance from the coordinating node at the position to the target node Three channel power gains, the fourth channel power gain from the coordinating node at the position to the eavesdropping node, and the improvement effect of the coordinating node at the position on the security capacity of the data sending node, determine the coordinating node whether secure communications are possible while in the stated location;

第一确定模块,用于所述第一判断模块判断结果为是的情况下,将所述位置确定为所述协作节点的备选位置;The first determination module is configured to determine the position as the candidate position of the coordination node when the determination result of the first determination module is yes;

等级划分模块,用于将所确定的备选位置,根据所述第四信道功率增益进行等级划分;A ranking module, configured to classify the determined candidate positions according to the fourth channel power gain;

第二确定模块,用于针对每一位置对应的等级,根据自身业务需求、所述位置信息、效益函数以及所述位置对应的等级,利用契约论方法,确定所述协作节点处于所述等级时所能得到的服务报酬以及需要提供的协作干扰功率;The second determination module is used to determine the level corresponding to each position, according to its own business needs, the position information, the benefit function and the level corresponding to the position, using the method of contract theory to determine when the coordination node is at the level The service payment that can be obtained and the cooperative interference power that needs to be provided;

广播模块,用于广播所确定的每一等级对应的服务报酬以及需要提供的协作干扰功率,以使接收到所述每一等级对应的服务报酬以及需要提供的协作干扰功率的协作节点以与自身位置对应等级的协作干扰功率发送干扰信号。The broadcast module is used to broadcast the determined service remuneration corresponding to each level and the cooperative interference power that needs to be provided, so that the coordinated nodes that receive the service remuneration corresponding to each level and the cooperative interference power that needs to be provided can communicate with themselves The position corresponds to the level of cooperative interference power to transmit the interference signal.

优选的,所述第一判断模块包括:第二判断模块和表示模块,Preferably, the first judging module includes: a second judging module and a representation module,

所述第二判断模块,用于判断所述协作节点处于所述位置时协助所述数据发送节点实现在所述目标节点处的安全容量增量Cs_i是否大于零;The second judging module is used to judge whether the safety capacity increment C s_i that assists the data sending node to realize at the target node when the coordinating node is in the position is greater than zero;

所述表示模块,用于在所述第一判断模块判断结果为是的情况下,表示所述协作节点处于所述位置时能够实现安全通信;The indicating module is configured to indicate that the coordinated node can realize secure communication when the coordinated node is at the position when the first determining module determines that the result is yes;

其中,in,

CC sthe s __ ii == (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii ≠≠ 00 -- (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii == 00

Cd为所述数据发送节点到所述目标节点的信道容量,表达式为:C is the channel capacity from the data sending node to the target node, and the expression is:

CC sthe s dd == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ PP ii hh ii dd ))

Cse为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se is the channel capacity from the data sending node to the eavesdropping node, and the expression is:

CC sthe s ee == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ PP ii hh ii ee ))

hsd、hse、hid、hie分别为所述第一信道功率增益、所述第二信道功率增益、所述第三信道功率增益、所述第四信道功率增益,Ps为所述数据发送节点到所述目标节点的信号发射功率,Pi为所述协作节点对外的预设协作干扰功率,σ2为信道中的高斯白噪声功率。h sd , h se , h id , and h ie are the first channel power gain, the second channel power gain, the third channel power gain, and the fourth channel power gain respectively, and P s is the The signal transmission power from the data sending node to the target node, P i is the external preset cooperative interference power of the cooperative node, and σ 2 is the Gaussian white noise power in the channel.

优选的,所述效益函数的具体表达为:Preferably, the specific expression of the benefit function is:

RR == ΣΣ ii == 11 NN ββ ii ·&Center Dot; (( ωω ·&Center Dot; CC sthe s __ θθ ii -- TT θθ ii ))

Cs_θi的具体表达式为:The specific expression of C s_θi is:

CC sthe s __ θθ ii == (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii ≠≠ 00 -- (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii == 00

Csd_i为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd_i is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ QQ θθ ii hh ii dd ))

Cse_i为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se_i is the channel capacity from the data sending node to the eavesdropping node, the expression is:

CC sthe s ee __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ QQ θθ ii hh ii ee ))

其中,R为所述数据发送节点的效益;θi为处于第i个备选位置的协作节点对应的等级,Tθi为等级为θi的备选位置的协作节点所能得到的服务报酬,Qθi为等级为θi的备选位置的协作节点对外提供的协作干扰功率,N为所述协作节点的备选位置的个数,βi为协作节点处于第i个备选位置的概率,且对全部所述协作节点的备选位置,存在ω表示每单位安全容量的增加所对应的增益,Cs_θi为所述数据发送节点在等级为θi的备选位置的协作节点激励下,获得的安全容量。Among them, R is the benefit of the data sending node; θi is the level corresponding to the coordinating node at the i-th candidate position, T θi is the service reward that the coordinating node at the candidate position with the level of θi can get, Q θi is the cooperative interference power provided externally by the coordinating node at the candidate position of θi, N is the number of candidate positions of the coordinating node, β i is the probability that the coordinating node is in the i-th candidate position, and for all Alternative locations for the coordinating nodes exist ω represents the gain corresponding to the increase of the security capacity per unit, and C s_θi is the security capacity obtained by the data sending node under the encouragement of the coordinating node at the candidate position of level θi.

优选的,所述协作节点的效益的函数具体表达为:Preferably, the benefit function of the collaboration node is specifically expressed as:

U(θi)=Tθi-fθi·Qθi U(θi)=T θi -f θi Q θi

其中,U(θi)为处于等级为θi的备选位置的协作节点的效益,Qθi为处于等级为θi的备选位置的协作节点对外的协作干扰功率,fθi为处于等级为θi的备选位置的协作节点每单位功率消耗所对应的效益的降低。Among them, U(θi) is the benefit of the cooperative node at the candidate position of θi, Q θi is the cooperative interference power of the cooperative node at the candidate position of θi, f θi is the backup power of the candidate position of θi The decrease in benefit per unit power consumption of the coordinating nodes at selected positions.

由上述的技术方案可见,本发明实施例提供的实现物理层安全的协作干扰的激励方法及装置,应用于数据发送节点,获得目标节点以及窃听节点的位置信息、数据发送节点至所述目标节点的第一信道功率增益、数据发送节点至窃听节点的第二信道功率增益;获得协作节点可能处于的M个位置;针对M个位置中的每一位置,根据第一信道功率增益、第二信道功率增益、处于所述位置的协作节点至目标节点的第三信道功率增益、处于所述位置的协作节点至窃听节点的第四信道功率增益、以及处于所述位置的协作节点对数据发送节点的安全容量的改善效果,判断协作节点处于所述位置时是否能够实现安全通信;如果是,将所述位置确定为协作节点的备选位置;将所确定的备选位置,根据第四信道功率增益进行等级划分;针对每一位置对应的等级,根据自身业务需求、所述位置信息、效益函数以及所述位置对应的等级,利用契约论方法,确定所述协作节点处于所述等级时所能得到的服务报酬以及需要提供的协作干扰功率;广播所确定的每一等级对应的服务报酬以及需要提供的协作干扰功率,以使接收到所述每一等级对应的服务报酬以及需要提供的协作干扰功率的协作节点以与自身位置对应等级的协作干扰功率发送干扰信号。It can be seen from the above technical solutions that the incentive method and device for realizing physical layer security cooperative interference provided by the embodiments of the present invention are applied to the data sending node to obtain the location information of the target node and the eavesdropping node, and the data sending node to the target node The first channel power gain of the data sending node to the second channel power gain of the eavesdropping node; obtain the M positions that the cooperative node may be in; for each position in the M positions, according to the first channel power gain, the second channel power gain Power gain, the third channel power gain from the coordinating node at the position to the target node, the fourth channel power gain from the coordinating node at the position to the eavesdropping node, and the coordinating node at the position to the data sending node The improvement effect of security capacity is to judge whether the coordinating node can realize secure communication when it is in the position; if so, determine the position as the candidate position of the coordinating node; determine the candidate position according to the fourth channel power gain Carry out grade division; for the grade corresponding to each location, according to its own business needs, the location information, the benefit function and the grade corresponding to the location, use the method of contract theory to determine what the collaborative node can get when it is at the grade The service reward and the cooperative interference power that need to be provided; broadcast the determined service reward and the cooperative interference power that need to be provided for each level, so that the service reward corresponding to each level and the cooperative interference power that needs to be provided can be received The coordinating nodes of are sending interference signals with the level of cooperating interference power corresponding to their own positions.

应用本发明实施例提供的技术方案,可以解决发送节点在无法获得协作节点具体位置信息的情况下,给出有效的激励策略,在满足合法通信用户间安全容量要求的同时,使得协作节点在不同位置都能获得最大化的收益。Applying the technical solution provided by the embodiment of the present invention can solve the problem that the sending node can provide an effective incentive strategy when the specific location information of the coordinating node cannot be obtained, and make the coordinating node in different locations while meeting the security capacity requirements among legal communication users. position to maximize revenue.

当然,实施本发明的任一方法或装置必不一定需要同时达到以上所述的所有优点。Of course, implementing any method or device of the present invention does not necessarily need to achieve all the above-mentioned advantages at the same time.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

图1为本发明实施例提供的实现物理层安全的协作干扰的激励方法的一种流程示意图;FIG. 1 is a schematic flow diagram of an incentive method for realizing coordinated interference of physical layer security provided by an embodiment of the present invention;

图2为本发明实施例提供的实现物理层安全的协作干扰的激励装置的一种结构示意图;FIG. 2 is a schematic structural diagram of an incentive device for realizing coordinated interference of physical layer security provided by an embodiment of the present invention;

图3为本发明实施例提供的协作节点在不同等级位置时与协作干扰功率对应的曲线图;Fig. 3 is a graph corresponding to cooperative interference power when the coordinated nodes are at different positions provided by an embodiment of the present invention;

图4为本发明实施例提供的协作节点在不同等级位置时与服务报酬对应的曲线图;Fig. 4 is a graph corresponding to the service reward when the coordinating nodes are at different levels of positions provided by the embodiment of the present invention;

图5为本发明实施例提供的同一协作节点在不同等级位置时获得的效益对应的曲线图;FIG. 5 is a graph corresponding to the benefits obtained by the same coordination node at different levels of positions provided by the embodiment of the present invention;

图6为本发明实施例提供的数据发送节点在处于不同等级位置的协作节点的协作激励下获得的效益对应的曲线图;FIG. 6 is a graph corresponding to the benefit obtained by the data sending node under the cooperation incentive of the cooperation nodes at different positions provided by the embodiment of the present invention;

图7为本发明实施例提供的处于不同等级位置的的协作节点获得的协作节点效益与不同等级的服务报酬和协作干扰功率对应的曲线图。Fig. 7 is a curve diagram corresponding to the service remuneration and cooperative interference power of different levels obtained by coordinating node benefits obtained by coordinating nodes at different levels according to an embodiment of the present invention.

具体实施方式detailed description

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

为解决现有技术问题,本发明实施例提供了一种实现物理层安全的协作干扰的激励方法及装置,适用于数据发送节点,以下分别进行详细说明。In order to solve the problems in the prior art, the embodiments of the present invention provide an incentive method and device for realizing coordinated interference of physical layer security, which are suitable for data sending nodes, and will be described in detail below.

需要说明的是,本发明实施例是针对协作节点与数据发送节点之间的信息不对称特性,利用信号甄别模型,设计最大化数据发送节点效益的激励机制。It should be noted that, the embodiment of the present invention aims at information asymmetry between the coordinating node and the data sending node, and uses a signal discrimination model to design an incentive mechanism that maximizes the benefit of the data sending node.

本领域技术人员可以理解的是,将数据发送节点、目标节点、窃听节点和协作节点对应通信模型,数据发送节点可以理解为需要进行通信的用户,目标节点理解为基站,窃听节点为窃听者,协作节点作为移动中继;协作节点协助数据发送节点提高频谱资源和提供干扰功率以降低窃听节点的信噪比。本发明实施例,重点在介绍通过协作节点提高数据发送节点的频谱资源,提高数据发送节点和目标节点的通信质量。Those skilled in the art can understand that the data sending node, the target node, the eavesdropping node and the cooperative node correspond to the communication model, the data sending node can be understood as a user who needs to communicate, the target node can be understood as a base station, and the eavesdropping node is an eavesdropper. Cooperating nodes act as mobile relays; coordinating nodes assist data sending nodes to increase spectrum resources and provide interference power to reduce the signal-to-noise ratio of eavesdropping nodes. The embodiment of the present invention focuses on improving the frequency spectrum resource of the data sending node through the cooperative node, and improving the communication quality between the data sending node and the target node.

图1为本发明实施例提供的实现物理层安全的协作干扰的激励方法的一种流程示意图,包括如下步骤:Fig. 1 is a schematic flow diagram of an incentive method for realizing coordinated interference of physical layer security provided by an embodiment of the present invention, including the following steps:

S101,获得目标节点以及窃听节点的位置信息、所述数据发送节点至所述目标节点的第一信道功率增益、所述数据发送节点至所述窃听节点的第二信道功率增益。S101. Obtain location information of a target node and an eavesdropping node, a first channel power gain from the data sending node to the target node, and a second channel power gain from the data sending node to the eavesdropping node.

需要说明的是,数据发送节点在需要获得协助激励的情况下,首先获得目标节点和到窃听节点的位置消息。本领域技术人员可以理解的是,数据发送节点到目标节点以及数据发送节点到窃听节点的信道功率增益与其对应的链路距离有关,所以在获得上述位置消息的情况下,即可得到各自链路的信道功率增益,获得链路的信道功率增益为现有技术,本发明实施例在此不对其进行赘述。It should be noted that the data sending node first obtains the target node and the location information to the eavesdropping node when it needs to obtain assistance incentives. Those skilled in the art can understand that the channel power gains from the data sending node to the target node and from the data sending node to the eavesdropping node are related to their corresponding link distances, so when the above position information is obtained, the respective link distances can be obtained Obtaining the channel power gain of the link is a prior art, and will not be described in detail here in the embodiment of the present invention.

S102,获得协作节点可能处于的M个位置。S102. Obtain M possible positions of the coordination node.

实际应用中,在数据发送节点并不知道协作节点的具体位置的情况下,选择M个协作节点可能处于的位置,由于M个位置比较具有随机性,可能存在的位置无法满足协作节点对数据发送节点的安全容量的改善效果,即不能满足数据发送节点安全通信的要求,仍需进一步的选择处理。In practical applications, when the data sending node does not know the specific location of the cooperating node, select the possible positions of M coordinating nodes. Since the M positions are relatively random, the possible positions cannot meet the requirements of the coordinating node for data transmission. The improvement effect of the node's security capacity, that is, it cannot meet the requirements of the data sending node's secure communication, still needs further selection processing.

S103,针对所述M个位置中的每一位置,根据所述第一信道功率增益、所述第二信道功率增益、处于所述位置的协作节点至所述目标节点的第三信道功率增益、处于所述位置的协作节点至所述窃听节点的第四信道功率增益、以及处于所述位置的协作节点对所述数据发送节点的安全容量的改善效果,判断所述协作节点处于所述位置时是否能够实现安全通信。S103. For each of the M positions, according to the first channel power gain, the second channel power gain, the third channel power gain from the coordination node at the position to the target node, The fourth channel power gain from the coordinating node at the position to the eavesdropping node, and the improvement effect of the coordinating node at the position on the security capacity of the data sending node, when judging that the coordinating node is at the position Whether secure communication can be achieved.

具体的,包括:Specifically, including:

判断所述协作节点处于所述位置时协助所述数据发送节点实现在所述目标节点处的安全容量增量Cs_i是否大于零;judging whether the safety capacity increment C s_i that assists the data sending node to realize at the target node when the coordinating node is in the position is greater than zero;

如果是,表示所述协作节点处于所述位置时能够实现安全通信。If yes, it means that the coordinating node can realize secure communication when it is in the position.

其中,in,

CC sthe s __ ii == (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii ≠≠ 00 -- (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii == 00

Csd为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ PP ii hh ii dd ))

Cse为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se is the channel capacity from the data sending node to the eavesdropping node, and the expression is:

CC sthe s ee == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ PP ii hh ii ee ))

hsd、hse、hid、hie分别为所述第一信道功率增益、所述第二信道功率增益、所述第三信道功率增益、所述第四信道功率增益,Ps为所述数据发送节点到所述目标节点的信号发射功率,Pi为所述协作节点对外的预设协作干扰功率,σ2为信道中的高斯白噪声功率。h sd , h se , h id , and h ie are the first channel power gain, the second channel power gain, the third channel power gain, and the fourth channel power gain respectively, and P s is the The signal transmission power from the data sending node to the target node, P i is the external preset cooperative interference power of the cooperative node, and σ 2 is the Gaussian white noise power in the channel.

需要说明的是,在本发明实施例出现的公式中含有“()+”的,表示:将括号内的值与0比较,并选取最大的作为()+的值,()+的值是非负的。以(Csd-Cse)+为例,在Csd-Cse的值为小于0时,(Csd-Cse)+=0;在Csd-Cse的值为大于0时,(Csd-Cse)+=Csd-CseIt should be noted that the formulas that appear in the embodiments of the present invention contain "() + ", which means: compare the value in the brackets with 0, and select the largest value as the value of () + , and the value of () + is non- minus. Taking (C sd -C se ) + as an example, when the value of C sd -C se is less than 0, (C sd -C se ) + =0; when the value of C sd -C se is greater than 0, ( C sd −C se ) + =C sd −C se .

本领域技术人员可以理解的是,在上述M个可能位置中,存在能够使得数据发送节点实现安全通信的位置,条件是协作节点在该位置时,满足协作节点到数据发送节点的安全容量的改善效果大于0,即数据发送节点本身的安全容量增量大于0。Those skilled in the art can understand that, among the above M possible positions, there is a position that enables the data sending node to realize secure communication, provided that when the coordinating node is in this position, the improvement of the security capacity from the coordinating node to the data sending node is satisfied The effect is greater than 0, that is, the security capacity increment of the data sending node itself is greater than 0.

具体实现方式为:确定其中一个位置,即协作节点的位置信息固定,可以得到协作节点到目标节点以及协作节点到窃听节点的链路距离,即得到这两条链路的信道功率增益。从数据发送节点的安全容量的改善效果对应的公式可以得出,当hsd、hse、hid、hie确定、数据发送节点到所述目标节点的信号发射功率Ps为数据发送节点的已知信息、信道中的高斯白噪声功率σ2具有统计特性,在通信系统中有具体计算公式,该改善效果还与协作节点的协作干扰功率Pi相关,此处将Pi作为一个预设的协作干扰功率进行计算,即可得到计算结果。需要说明的是,此处只要Pi大于0即可。示例性的,将Pi设为10dBm,本发明实施例不做具体限制。The specific implementation method is: determine one of the positions, that is, the position information of the coordinating node is fixed, and the link distances from the coordinating node to the target node and from the coordinating node to the eavesdropping node can be obtained, that is, the channel power gains of the two links can be obtained. From the formula corresponding to the improvement effect of the safety capacity of the data sending node, it can be obtained that when h sd , h se , h id , and h ie are determined, the signal transmission power P s from the data sending node to the target node is Known information, the Gaussian white noise power σ 2 in the channel has statistical characteristics, and there are specific calculation formulas in the communication system. The improvement effect is also related to the cooperative interference power P i of the cooperative node. Here, P i is taken as a preset Calculate the cooperative interference power of , and the calculation result can be obtained. It should be noted that, here, it is sufficient as long as Pi is greater than 0. Exemplarily, P i is set to 10dBm, which is not specifically limited in this embodiment of the present invention.

S104,将所述位置确定为所述协作节点的备选位置。S104. Determine the location as a candidate location of the coordination node.

示例性的,在M个可能位置中存在一个位置,至目标节点距离为500m,至窃听节点的距离为300m,可得到信道功率增益,即信道功率增益矩阵中的每个值,在Pi设为10dBm,高斯白噪声的功率σ2为-180dBm时,得到安全容量的改善效果大于0,即可将该点作为协作节点的备选位置。依次进行位置的选择和确认,直到选取满足设置的数目N后即可。Exemplarily, there is a position among M possible positions, the distance to the target node is 500m, and the distance to the eavesdropping node is 300m, and the channel power gain can be obtained, that is, each value in the channel power gain matrix is set at P i When the power σ 2 of Gaussian white noise is -180dBm, the improvement effect of the safety capacity is greater than 0, and this point can be used as the candidate position of the cooperative node. Select and confirm the positions in turn until the number N that satisfies the setting is selected.

S105,将所确定的备选位置,根据所述第四信道功率增益进行等级划分。S105. Classify the determined candidate positions according to the fourth channel power gain.

需要说明的是,第四信道功率增益为协作节点至所述窃听节点,对于N个备选位置中的每个位置而言,均能得到一个与之对应的信道功率增益hie,即可得到N个hie值。用该N个hie值来表示等级的大小,用θi表示备选位置对应的等级,并进行等级划分,通常,N个hie值即对应N个等级,假设N=20,即存在20个等级。It should be noted that the fourth channel power gain is from the coordinating node to the eavesdropping node. For each of the N candidate positions, a corresponding channel power gain h ie can be obtained, that is, N h ie values. Use the N h ie values to represent the size of the grade, use θi to represent the grade corresponding to the candidate position, and divide the grades. Usually, N h ie values correspond to N grades. Assuming N=20, there are 20 grade.

本领域技术人员可以理解的是,在距离目标节点距离相同的情况下,距离窃听节点越近的位置,其等级越高,反之也成立。Those skilled in the art can understand that, in the case of the same distance from the target node, the closer the location to the eavesdropping node, the higher its level, and vice versa.

S106,针对每一位置对应的等级,根据自身业务需求、所述位置信息、效益函数以及所述位置对应的等级,利用契约论方法,确定所述协作节点处于所述等级时所能得到的服务报酬以及需要提供的协作干扰功率。S106, for the level corresponding to each location, according to its own business needs, the location information, the benefit function, and the level corresponding to the location, use the method of contract theory to determine the service that the coordination node can obtain when it is at the level Remuneration and the cooperative interference power that needs to be provided.

需要说明的是,数据发送节点根据自身的业务需求,将一对协作干扰功率Qθi和对应的服务报酬Tθi视为一个集合,初始化主要是根据N值将对应数目的的协作干扰功率Qθi和对应的服务报酬Tθi归零化,并且确定这些数值的数量级大小,该部分为初始化时进行的设置,为现有技术,本发明不做赘述。It should be noted that the data sending node regards a pair of cooperative interference power Q θi and the corresponding service reward T θi as a set according to its own business requirements, and the initialization is mainly to set the corresponding number of cooperative interference power Q θi according to the value of N And the corresponding service reward T θi is zeroed, and the order of magnitude of these values is determined. This part is the setting performed during initialization, which is a prior art, and will not be described in detail in the present invention.

本领域技术人员可以理解的是,数据发送节点在无法得到协作节点的具体位置的情况下,依据数据发送节点以往的统计数据分析可以得到协作节点的概率分布信息,或者可以依据实际需要进行设定其概率分布,本发明实施例在此不做具体限定。对于所有可能的位置分布而言,具有概率之和为1,假设协作节点就处于设定的N个位置中。假设,当协作节点的位置服从均匀分布时,每个位置的概率信息为1/N。Those skilled in the art can understand that, when the data sending node cannot obtain the specific location of the cooperating node, the probability distribution information of the coordinating node can be obtained according to the past statistical data analysis of the data sending node, or can be set according to actual needs The probability distribution is not specifically limited in this embodiment of the present invention. For all possible position distributions, the sum of the probabilities is 1, assuming that the coordinating nodes are in the set N positions. Assume that when the positions of the cooperative nodes obey the uniform distribution, the probability information of each position is 1/N.

具体的,所述效益函数的具体表达为:Specifically, the specific expression of the benefit function is:

RR == ΣΣ ii == 11 NN ββ ii ·· (( ωω ·· CC sthe s __ θθ ii -- TT θθ ii ))

Cs_θi的具体表达式为:The specific expression of C s_θi is:

CC sthe s __ θθ ii == (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii ≠≠ 00 -- (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ θθ ii == 00

Csd_i为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd_i is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s dd σσ 22 ++ QQ θθ ii hh ii dd ))

Cse_i为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se_i is the channel capacity from the data sending node to the eavesdropping node, the expression is:

CC sthe s ee __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s ee σσ 22 ++ QQ θθ ii hh ii ee ))

其中,R为所述数据发送节点的效益;θi为处于第i个备选位置的协作节点对应的等级,Tθi为等级为θi的备选位置的协作节点所能得到的服务报酬,Qθi为等级为θi的备选位置的协作节点对外提供的协作干扰功率,N为所述协作节点的备选位置的个数,βi为协作节点处于第i个备选位置的概率,且对全部所述协作节点的备选位置,存在ω表示每单位安全容量的增加所对应的增益,Cs_θi为所述数据发送节点在等级为θi的备选位置的协作节点激励下,获得的安全容量。Among them, R is the benefit of the data sending node; θi is the level corresponding to the coordinating node at the i-th candidate position, T θi is the service reward that the coordinating node at the candidate position with the level of θi can get, Q θi is the cooperative interference power provided externally by the coordinating node at the candidate position of θi, N is the number of candidate positions of the coordinating node, β i is the probability that the coordinating node is in the i-th candidate position, and for all Alternative locations for the coordinating nodes exist ω represents the gain corresponding to the increase of the security capacity per unit, and C s_θi is the security capacity obtained by the data sending node under the encouragement of the coordinating node at the candidate position of level θi.

实际应用中,数据发送节点的效益与协作节点对数据发送节点的安全容量的改善与有关,具体的,与协作节点的协作干扰功率和协作节点对应的服务报酬有关,协作节点的服务报酬即为数据发送节点为得到对应的协作干扰功率的付出。In practical applications, the benefit of the data sending node is related to the improvement of the security capacity of the data sending node by the cooperative node. Specifically, it is related to the cooperative interference power of the cooperative node and the corresponding service reward of the cooperative node. The service reward of the cooperative node is The data sending node pays for obtaining the corresponding cooperative interference power.

具体的,所述协作节点的效益的函数具体表达为:Specifically, the benefit function of the collaboration node is specifically expressed as:

U(θi)=Tθi-fθi·Qθi U(θi)=T θi -f θi Q θi

其中,U(θi)为处于等级为θi的备选位置的协作节点的效益,Qθi为处于等级为θi的备选位置的协作节点对外的协作干扰功率,fθi为处于等级为θi的备选位置的协作节点每单位功率消耗所对应的效益的降低。Among them, U(θi) is the benefit of the cooperative node at the candidate position of θi, Q θi is the cooperative interference power of the cooperative node at the candidate position of θi, f θi is the backup power of the candidate position of θi The decrease in benefit per unit power consumption of the coordinating nodes at selected positions.

实际应用中,协作节点所得到的效益必不能为负值,否则失去了协作的意义,则协作节点的效益函数U(θi)需要遵从的限制条件为:效益不小于0,依据数据发送节点的效益函数,得到:In practical applications, the benefit obtained by the cooperative node must not be negative, otherwise the meaning of cooperation will be lost, then the benefit function U(θi) of the cooperative node needs to comply with the constraints: the benefit is not less than 0, according to the data sending node Benefit function, get:

U(θi)=Tθi-fθi·Qθi≥0U(θi)=T θi -f θi ·Q θi ≥0

对于协作节点而言,需满足具有任意等级θi的协作节点都应该具有选择符合其自身等级的(Tθi,Qθi)的足够理由,即选择符合自身等级的(Tθi,Qθi)获得的效益U(θi)必然大于选择其他等级所获得的效益,称为激励相容,表达为:For cooperative nodes, it is necessary to meet the requirement that a cooperative node with any level θi should have sufficient reasons to choose (T θi , Q θi ) that conforms to its own level, that is, to choose (T θi , Q θi ) that conforms to its own level to obtain The benefit U(θi) must be greater than the benefits obtained by choosing other levels, which is called incentive compatibility, expressed as:

Tθi-fθi·Qθi≥Tθj-fθi·Qθj T θi -f θi Q θi ≥T θj -f θi Q θj

对于协作节点的等级θi而言,本实施例中假设所有备选位置均具有不同的等级θi,对于实际应用中,若有相同等级的存在依然可以使用本方案,可以将等级相同的节点进行合并处理,然后将其概率相加得到新的概率,本方案对此不做具体限定。对于越高等级的协作节点来说,所需要发送的协作干扰功率Qθi越大,相应的,得到的报酬Tθi也越大,报酬关系表达为:For the level θi of the cooperative node, it is assumed in this embodiment that all candidate positions have different levels θi. In practical applications, if there is the existence of the same level, this solution can still be used, and the nodes with the same level can be merged process, and then add their probabilities to obtain a new probability, which is not specifically limited in this scheme. For the higher-level cooperative nodes, the larger the cooperative interference power Q θi that needs to be sent, and correspondingly, the larger the reward T θi is, and the reward relationship is expressed as:

Qθ0≤Qθ1≤…Qθi-1≤Qθi≤…QθN Q θ0 ≤Q θ1 ≤…Q θi-1 ≤Q θi ≤…Q θN

首先等级θi越高,所对应的最优(Tθi,Qθi)中,协作节点所需要提供的协作干扰功率Qθi以及其能够获得的服务报酬Tθi都越高。我们将利用协作节点效益不小于0以及激励相容条件进行证明。假设存在两个不同的等级θi和θj,i,j∈{1,2,3,...,N},通过变形激励相容的公式,可以得到:Firstly, the higher the level θi is, the higher the cooperative interference power Q θi that the cooperative node needs to provide and the service reward T θi it can obtain in the corresponding optimal (T θi , Q θi ). We will use the cooperative node benefit not less than 0 and incentive compatibility conditions to prove it. Assuming that there are two different levels θi and θj, i,j∈{1,2,3,...,N}, through the formula of deformation excitation compatibility, we can get:

Tθi-Tθj≥fθi·(Qθi-Qθj)T θi -T θj ≥f θi ·(Q θi -Q θj )

因为fθi是恒正的,当Tθi>Tθj时,Qθi>Qθj.Because f θi is constant positive, when T θi >T θj , Q θi >Q θj .

由激励相容的条件可以得到:According to the condition of incentive compatibility, we can get:

TT θθ ii -- ff θθ ii ·· QQ θθ ii ≥&Greater Equal; TT θθ jj -- ff θθ ii ·· QQ θθ jj TT θθ jj -- ff θθ jj ·· QQ θθ jj ≥&Greater Equal; TT θθ ii -- ff θθ jj ·· QQ θθ ii

将这两个不等式相加,可以得到:Adding these two inequalities gives:

(fθi-fθj).(Qθi-Qθj)≥0(f θi -f θj ). (Q θi -Q θj )≥0

fθi是θi的单调递减函数,结合上述得到的公式,如果θi≥θj,则有fθi≥fθj,进一步可以推导出Qθi≥Qθj。同理可得当θi≤θj时的大小情况,因此可以得到以下结论:f θi is a monotonically decreasing function of θi, combined with the formula obtained above, if θi≥θj, then there is f θi ≥f θj , and Q θi ≥Q θj can be deduced further. In the same way, the size of θi≤θj can be obtained, so the following conclusions can be obtained:

对等级来说,θi-1<θi时,有Tθ0≤Tθ1≤…Tθi-1≤Tθi≤…TθN和Qθ0≤Qθ1≤…Qθi-1≤Qθi≤…QθNFor the level, when θi-1<θi, there are T θ0 ≤T θ1 ≤...T θi-1 ≤T θi ≤...T θN and Q θ0 ≤Q θ1 ≤...Q θi-1 ≤Q θi ≤...Q θN .

对于函数R为了求得最优值,需将其化解为一个等式,当θi>1时由协作节点效益不小于0以及激励相容,可得到:In order to obtain the optimal value of the function R, it needs to be resolved into an equation. When θi>1, the benefit of the cooperative node is not less than 0 and the incentives are compatible, and it can be obtained:

Tθi-fθi·Qθi≥Tθ1-fθi·Qθ1≥Tθ1-fθi·Qθ1 T θi -f θi Q θi ≥T θ1 -f θi Q θ1 ≥T θ1 -f θi Q θ1

即:which is:

Tθi-fθi·Qθi≥Tθ1-fθ1·Qθ1 T θi -f θi Q θi ≥ T θ1 -f θ1 Q θ1

i∈{2,3,...,N}时,满足该条件,同理,可求得其他等级,得到When i∈{2,3,...,N}, this condition is satisfied, similarly, other levels can be obtained, and

Uθi≥Uθi-1 U θi ≥ U θi-1

考虑三个不同的相邻等级,θi-1,θi,θi+1,根据激励相容的条件可以得到:Considering three different adjacent levels, θi-1, θi , θi+1, according to the condition of excitation compatibility, we can get:

TT &theta;&theta; ii ++ 11 -- ff &theta;&theta; ii ++ 11 &CenterDot;&CenterDot; QQ &theta;&theta; ii ++ 11 &GreaterEqual;&Greater Equal; TT &theta;&theta; ii -- ff &theta;&theta; ii ++ 11 &CenterDot;&CenterDot; QQ &theta;&theta; ii TT &theta;&theta; ii -- ff &theta;&theta; ii &CenterDot;&Center Dot; QQ &theta;&theta; ii &GreaterEqual;&Greater Equal; TT &theta;&theta; ii -- 11 -- ff &theta;&theta; ii &CenterDot;&Center Dot; QQ &theta;&theta; ii -- 11 ..

根据单调性的条件有,According to the monotonicity condition,

Tθi-Tθi-1≥fθi·(Qθi-Qθi-1)≥fθi+1·(Qθi-Qθi-1)T θi -T θi-1 ≥f θi ·(Q θi -Q θi-1 )≥f θi+1 ·(Q θi -Q θi-1 )

再由激励相容条件可以得到,From the incentive compatibility condition, we can get,

Tθi-fθi·Qθi≥Tθi-1-fθi·Qθi-1 T θi -f θi Q θi ≥T θi-1 -f θi Q θi-1

Tθi-1-fθi-1·Qθi-1≥Tθi-fθi-1·Qθi T θi-1 -f θi-1 Q θi-1 ≥T θi -f θi-1 Q θi

其中,i,j∈{2,…,N},i≠j,通过这个过程,可以将原本不等式数量为N*(N-1)的激励相容条件,精简到2*(N-1)个,其中又分为N-1个上述两个不等式。对上述两个不等式进行变形,得到:Among them, i, j∈{2,...,N}, i≠j, through this process, the incentive compatibility condition with the original number of inequalities of N*(N-1) can be reduced to 2*(N-1) , which is further divided into N-1 above two inequalities. Transforming the above two inequalities, we get:

Tθi-1+fθi·(Qθi-Qθi-1)≤Tθi≤Tθi-1+fθi-1·(Qθi-Qθi-1)T θi-1 +f θi ·(Q θi -Q θi-1 )≤T θi ≤T θi-1 +f θi-1 ·(Q θi -Q θi-1 )

上述不等式展示了数据发送节点向协作节点支付报酬Tθi所受到的约束,假设Tθi-1,Qθi和Qθi-1都是已知的,从经济学的角度出发,数据发送节点必然是尽力减少支付给协作节点的报酬以最大化其自身的效用,因此这里关于Tθi的约束必然是取下限才能使数据发送节点的效用达到最大,有The above inequality shows the constraint that the data sending node pays T θi to the cooperative node. Assuming that T θi-1 , Q θi and Q θi-1 are all known, from an economic point of view, the data sending node must be Try to reduce the remuneration paid to the cooperative node to maximize its own utility, so the constraint on T θi here must be to take the lower limit to maximize the utility of the data sending node.

Tθi-1+fθi·(Qθi-Qθi-1)=Tθi T θi-1 +f θi ·(Q θi -Q θi-1 )=T θi

由激励相容条件可以得到,对于等级θi,为使数据发送节点效益函数达到最大值,It can be obtained from the incentive compatibility condition that, for the level θi, in order to maximize the benefit function of the data sending node,

Tθi-fθi·Qθi=0T θi -f θi ·Q θi =0

通过以上化简过程可以得到,在(Tθi,Qθi)得到最优时候数据发送节点的效益最大,得到:Through the above simplification process, it can be obtained that the benefit of the data sending node is the greatest when (T θi , Q θi ) is optimal, and it is obtained:

Tθi-fθi·Qθi=Tθi-1-fθi·Qθi-1 T θi -f θi ·Q θi =T θi-1 -f θi ·Q θi-1

将数据发送节点的效益函数作为拉格朗日函数,在i,j∈{1,…,N},i≠j,为使数据发送节点效益函数达到最大值、在(Tθi,Qθi)得到最优时候数据发送节点的效益最大的限制条件下,进行求导,λi为拉格朗日乘子,可得到:Take the benefit function of the data sending node as a Lagrangian function, at i, j∈{1,…,N}, i≠j, in order to make the data sending node benefit function reach the maximum value, at (T θi ,Q θi ) Under the constraint condition that the maximum benefit of the data sending node is obtained at the optimal time, derivation is performed, and λ i is the Lagrangian multiplier, which can be obtained:

LL (( QQ &theta;&theta; ii ,, TT &theta;&theta; ii )) == &Sigma;&Sigma; ii == 11 NN &lsqb;&lsqb; &beta;&beta; ii &CenterDot;&Center Dot; (( &omega;&omega; &CenterDot;&Center Dot; CC sthe s __ &theta;&theta; ii -- TT &theta;&theta; ii )) ++ &lambda;&lambda; ii &CenterDot;&CenterDot; (( TT &theta;&theta; ii -- ff &theta;&theta; ii &CenterDot;&Center Dot; QQ &theta;&theta; ii -- TT &theta;&theta; ii -- 11 ++ ff &theta;&theta; ii &CenterDot;&Center Dot; QQ &theta;&theta; ii -- 11 )) &rsqb;&rsqb;

令L(Qθi,Tθi)分别对λi、Tθi和Qθi求导,并且令其为0,得到方程组如下:Let L(Q θi , T θi ) take derivatives for λ i , T θi and Q θi respectively, and let them be 0, the equations are as follows:

&part;&part; LL &part;&part; &lambda;&lambda; ii == TT &theta;&theta; ii -- ff &theta;&theta; ii &CenterDot;&CenterDot; QQ &theta;&theta; ii -- TT &theta;&theta; ii -- 11 ++ ff &theta;&theta; ii &CenterDot;&Center Dot; QQ &theta;&theta; ii -- 11 == 00

利用得到的方程组,在已知等级分布情况βi的情况下,可以求得λN,然后再利用第二个等式,结合βi与λi+1,利用递归的思想,求得剩下的i∈{2,3,...,N}的λi值,因此求解的顺序是λN,λN-1,…,λ2,λ1,是一种逆序的求解过程。在求出所有拉格朗日乘子的值之后,再利用公式求出所有(Tθi,Qθi)中最优协作干扰功率Qθi的值。最后,利用得到的Qθi的值,结合公式便可求出支付报酬Tθi的值。至此,所有最优(Tθi,Qθi)便完全求出了。Using the obtained equations, λ N can be obtained when the grade distribution β i is known, and then using the second equation, combining β i and λ i+1 , using the idea of recursion, to obtain the remaining The λ i value of i∈{2,3,...,N} below, so the order of solving is λ N , λ N-1 ,..., λ 2 , λ 1 , which is a reverse order solving process. After calculating the values of all Lagrangian multipliers, the formula is used to calculate the value of the optimal cooperative interference power Q θi among all (T θi , Q θi ). Finally, the value of payment T θi can be obtained by combining the obtained value of Q θi with the formula. So far, all optimal (T θi , Q θi ) have been completely obtained.

示例性的,N=20,均匀分布,即对应等级也有20个,数据发送节点发射功率Ps为20dBm,路损指数α为3,噪声功率谱密度N0为-180dBm,频谱宽度为10MHz,由噪声功率谱密度和频谱宽度可获得对应的噪声功率σ2=N0*B,单位安全容量增益ω为10-6,单位功率效用减益函数fθi为50/θi 0.05Exemplary, N=20, evenly distributed, namely There are also 20 corresponding levels. The transmit power P s of the data sending node is 20dBm, the path loss index α is 3, the noise power spectral density N 0 is -180dBm, and the spectral width is 10MHz. The corresponding Noise power σ 2 =N 0 *B, unit safety capacity gain ω is 10 -6 , and unit power utility loss function f θi is 50/θ i 0.05 .

协作节点在不同等级位置时与协作干扰功率的对应仿真结果如图3所示;协作节点在不同等级位置时与服务报酬的对应仿真结果如图4所示;同一协作节点在不同等级位置时获得的效益的对应仿真结果如图5所示;数据发送节点在处于不同等级位置的协作节点的协作激励下获得的效益的对应仿真结果如图6所示;处于不同等级位置的协作节点获得的协作节点效益与不同等级的服务报酬和协作干扰功率的对应仿真结果如图7所示。Figure 3 shows the corresponding simulation results of cooperative nodes at different positions and cooperative interference power; Figure 4 shows the corresponding simulation results of cooperative nodes at different positions and service rewards; the same cooperative node at different positions obtains The corresponding simulation results of the benefits of the data are shown in Figure 5; the corresponding simulation results of the benefits obtained by the data sending node under the cooperation incentives of the cooperative nodes at different positions are shown in Figure 6; the cooperative nodes at different positions obtained the corresponding simulation results The corresponding simulation results of node benefits and different levels of service rewards and cooperative interference power are shown in Figure 7.

S107,广播所确定的每一等级对应的服务报酬以及需要提供的协作干扰功率,以使接收到所述每一等级对应的服务报酬以及需要提供的协作干扰功率的协作节点以与自身位置对应等级的协作干扰功率发送干扰信号。S107. Broadcast the determined service remuneration corresponding to each level and the cooperative interference power that needs to be provided, so that the coordinating node that receives the service remuneration corresponding to each level and the cooperative interference power that needs to be provided can use the level corresponding to its own position The cooperative interference power of the transmitted interference signal.

数据发送节点在计算得到协作节点备选位置的每一等级对应的服务报酬以及需要提供的协作干扰功率后,通过广播形式将其发散出去,协作阶段收到后选取能使自己效益最优的服务报酬和协作干扰功率,进行协作干扰激励。After the data sending node calculates the service reward corresponding to each level of the candidate position of the cooperative node and the cooperative interference power that needs to be provided, it spreads it out in the form of broadcast, and selects the service that can optimize its own benefits after receiving it in the cooperative stage Compensation and cooperative jamming power for cooperative jamming incentives.

应用本发明图1所示的实施例,可以解决发送节点在无法获得协作节点具体位置信息的情况下,给出有效的激励策略,在满足合法通信用户间安全容量要求的同时,使得协作节点在不同位置都能获得最大化的收益。Applying the embodiment shown in Fig. 1 of the present invention can solve the problem that the sending node can provide an effective incentive strategy when the specific location information of the coordinating node cannot be obtained, so that the coordinating node can be in the Different positions can get the maximum benefit.

图2为本发明实施例提供的实现物理层安全的协作干扰的激励装置的一种结构示意图,可以包括第一获得模块201、第二获得模块202、第一判断模块203、第一确定模块204、等级划分模块205、第二确定模块206、广播模块207。Fig. 2 is a schematic structural diagram of an incentive device for realizing physical layer security cooperative interference provided by an embodiment of the present invention, which may include a first obtaining module 201, a second obtaining module 202, a first judging module 203, and a first determining module 204 , a class division module 205 , a second determination module 206 , and a broadcast module 207 .

第一获得模块201,用于获得目标节点以及窃听节点的位置信息、所述数据发送节点至所述目标节点的第一信道功率增益、所述数据发送节点至所述窃听节点的第二信道功率增益;The first obtaining module 201 is configured to obtain the location information of the target node and the eavesdropping node, the first channel power gain from the data sending node to the target node, and the second channel power from the data sending node to the eavesdropping node gain;

第二获得模块202,用于获得协作节点可能处于的M个位置;The second obtaining module 202 is used to obtain M possible positions of the coordination node;

第一判断模块203,用于针对所述M个位置中的每一位置,根据所述第一信道功率增益、所述第二信道功率增益、处于所述位置的协作节点至所述目标节点的第三信道功率增益、处于所述位置的协作节点至所述窃听节点的第四信道功率增益、以及处于所述位置的协作节点对所述数据发送节点的安全容量的改善效果,判断所述协作节点处于所述位置时是否能够实现安全通信;The first judging module 203 is configured to, for each of the M positions, according to the first channel power gain, the second channel power gain, and the distance from the coordinating node at the position to the target node The third channel power gain, the fourth channel power gain from the coordinating node at the position to the eavesdropping node, and the improvement effect of the coordinating node at the position on the security capacity of the data sending node, determine the coordinating Whether secure communication is possible when the node is in said location;

具体的,实际应用中,第一判断模块203可以包括:第二判断模块和表示模块(图中未标出);Specifically, in practical applications, the first judging module 203 may include: a second judging module and a representation module (not shown in the figure);

所述第二判断模块,用于判断所述协作节点处于所述位置时协助所述数据发送节点实现在所述目标节点处的安全容量增量Cs_i是否大于零;The second judging module is used to judge whether the safety capacity increment C s_i that assists the data sending node to realize at the target node when the coordinating node is in the position is greater than zero;

所述表示模块,用于在所述第一判断模块判断结果为是的情况下,表示所述协作节点处于所述位置时能够实现安全通信;The indicating module is configured to indicate that the coordinated node can realize secure communication when the coordinated node is at the position when the first determining module determines that the result is yes;

其中,in,

CC sthe s __ ii == (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii &NotEqual;&NotEqual; 00 -- (( CC sthe s dd -- CC sthe s ee )) ++ || PP ii == 00

Csd为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd == loglog 22 (( 11 ++ PP sthe s hh sthe s dd &sigma;&sigma; 22 ++ PP ii hh ii dd ))

Cse为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se is the channel capacity from the data sending node to the eavesdropping node, and the expression is:

CC sthe s ee == loglog 22 (( 11 ++ PP sthe s hh sthe s ee &sigma;&sigma; 22 ++ PP ii hh ii ee ))

hsd、hse、hid、hie分别为所述第一信道功率增益、所述第二信道功率增益、所述第三信道功率增益、所述第四信道功率增益,Ps为所述数据发送节点到所述目标节点的信号发射功率,Pi为所述协作节点对外的预设协作干扰功率,σ2为信道中的高斯白噪声功率。h sd , h se , h id , and h ie are the first channel power gain, the second channel power gain, the third channel power gain, and the fourth channel power gain respectively, and P s is the The signal transmission power from the data sending node to the target node, P i is the external preset cooperative interference power of the cooperative node, and σ 2 is the Gaussian white noise power in the channel.

第一确定模块204,用于所述第一判断模块判断结果为是的情况下,将所述位置确定为所述协作节点的备选位置;The first determination module 204 is configured to determine the position as the candidate position of the coordination node when the determination result of the first determination module is yes;

等级划分模块205,用于将所确定的备选位置,根据所述第四信道功率增益进行等级划分;A class division module 205, configured to classify the determined candidate positions according to the fourth channel power gain;

第二确定模块206,用于针对每一位置对应的等级,根据自身业务需求、所述位置信息、效益函数以及所述位置对应的等级,利用契约论方法,确定所述协作节点处于所述等级时所能得到的服务报酬以及需要提供的协作干扰功率;The second determination module 206 is used to determine the level corresponding to each location, according to its own business needs, the location information, the benefit function, and the level corresponding to the location, using the contract theory method to determine that the coordination node is at the level The service remuneration that can be obtained and the cooperative interference power that needs to be provided;

具体的,实际应用中,所述效益函数的具体表达为:Specifically, in practical applications, the specific expression of the benefit function is:

RR == &Sigma;&Sigma; ii == 11 NN &beta;&beta; ii &CenterDot;&CenterDot; (( &omega;&omega; &CenterDot;&CenterDot; CC sthe s __ &theta;&theta; ii -- TT &theta;&theta; ii ))

Cs_θi的具体表达式为:The specific expression of C s_θi is:

CC sthe s __ &theta;&theta; ii == (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ &theta;&theta; ii &NotEqual;&NotEqual; 00 -- (( CC sthe s dd __ ii -- CC sthe s ee __ ii )) ++ || QQ &theta;&theta; ii == 00

Csd_i为所述数据发送节点到所述目标节点的信道容量,表达式为:C sd_i is the channel capacity from the data sending node to the target node, the expression is:

CC sthe s dd __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s dd &sigma;&sigma; 22 ++ QQ &theta;&theta; ii hh ii dd ))

Cse_i为所述数据发送节点到所述窃听节点的信道容量,表达式为:C se_i is the channel capacity from the data sending node to the eavesdropping node, the expression is:

CC sthe s ee __ ii == loglog 22 (( 11 ++ PP sthe s hh sthe s ee &sigma;&sigma; 22 ++ QQ &theta;&theta; ii hh ii ee ))

其中,R为所述数据发送节点的效益;θi为处于第i个备选位置的协作节点对应的等级,Tθi为等级为θi的备选位置的协作节点所能得到的服务报酬,Qθi为等级为θi的备选位置的协作节点对外提供的协作干扰功率,N为所述协作节点的备选位置的个数,βi为协作节点处于第i个备选位置的概率,且对全部所述协作节点的备选位置,存在ω表示每单位安全容量的增加所对应的增益,Cs_θi为所述数据发送节点在等级为θi的备选位置的协作节点激励下,获得的安全容量增。Among them, R is the benefit of the data sending node; θi is the level corresponding to the coordinating node at the i-th candidate position, T θi is the service reward that the coordinating node at the candidate position with the level of θi can get, Q θi is the cooperative interference power provided externally by the coordinating node at the candidate position of θi, N is the number of candidate positions of the coordinating node, β i is the probability that the coordinating node is in the i-th candidate position, and for all Alternative locations for the coordinating nodes exist ω represents the gain corresponding to the increase of the safety capacity per unit, and C s_θi is the increase in the safety capacity obtained by the data sending node under the encouragement of the coordinating node at the candidate position of level θi.

具体的,实际应用中,所述协作节点的效益的函数具体表达为:Specifically, in practical applications, the benefit function of the collaboration node is specifically expressed as:

U(θi)=Tθi-fθi·Qθi U(θi)=T θi -f θi Q θi

其中,U(θi)为处于等级为θi的备选位置的协作节点的效益,Qθi为处于等级为θi的备选位置的协作节点对外的协作干扰功率,fθi为处于等级为θi的备选位置的协作节点每单位功率消耗所对应的效益的降低。Among them, U(θi) is the benefit of the cooperative node at the candidate position of θi, Q θi is the cooperative interference power of the cooperative node at the candidate position of θi, f θi is the backup power of the candidate position of θi The decrease in benefit per unit power consumption of the coordinating nodes at selected positions.

广播模块207,用于广播所确定的每一等级对应的服务报酬以及需要提供的协作干扰功率,以使接收到所述每一等级对应的服务报酬以及需要提供的协作干扰功率的协作节点以与自身位置对应等级的协作干扰功率发送干扰信号。The broadcast module 207 is configured to broadcast the determined service remuneration corresponding to each level and the cooperative interference power that needs to be provided, so that the coordinated nodes that receive the service remuneration corresponding to each level and the cooperative interference power that needs to be provided can communicate with The cooperative interference power of the level corresponding to its own position sends an interference signal.

应用本发明图2的所示实施例,可以解决发送节点在无法获得协作节点具体位置信息的情况下,给出有效的激励策略,在满足合法通信用户间安全容量要求的同时,使得协作节点在不同位置都能获得最大化的收益。Applying the embodiment shown in FIG. 2 of the present invention can solve the problem that the sending node can provide an effective incentive strategy when the specific location information of the coordinating node cannot be obtained, so that the coordinating node can be in the same time as meeting the security capacity requirements among legal communication users. Different positions can get the maximum benefit.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that there is a relationship between these entities or operations. There is no such actual relationship or order between them. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.

本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a related manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.

本领域普通技术人员可以理解实现上述方法实施方式中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,所述的程序可以存储于计算机可读取存储介质中,这里所称得的存储介质,如:ROM/RAM、磁碟、光盘等。Those of ordinary skill in the art can understand that all or part of the steps in the implementation of the above method can be completed by instructing related hardware through a program, and the program can be stored in a computer-readable storage medium, referred to herein as Storage media, such as: ROM/RAM, disk, CD, etc.

以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本发明的保护范围内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present invention are included in the protection scope of the present invention.

Claims (8)

1. A method for stimulating cooperative interference for realizing physical layer security is applied to a data transmitting node, and the method comprises the following steps:
obtaining position information of a target node and an eavesdropping node, a first channel power gain from the data sending node to the target node, and a second channel power gain from the data sending node to the eavesdropping node;
obtaining M positions where the cooperative node can be located;
for each position in the M positions, judging whether the cooperative node can realize safe communication when in the position according to the first channel power gain, the second channel power gain, a third channel power gain from the cooperative node in the position to the target node, a fourth channel power gain from the cooperative node in the position to the eavesdropping node and the improvement effect of the cooperative node in the position on the safety capacity of the data sending node;
if so, determining the position as an alternative position of the cooperative node;
grading the determined alternative positions according to the power gain of the fourth channel;
aiming at the grade corresponding to each position, determining the service remuneration obtained when the cooperative node is in the grade and the cooperative interference power required to be provided by utilizing a contractual theory method according to the self service requirement, the position information, the benefit function and the grade corresponding to the position;
broadcasting the determined service reward corresponding to each level and the cooperative interference power required to be provided, so that the cooperative node receiving the service reward corresponding to each level and the cooperative interference power required to be provided sends an interference signal with the cooperative interference power of the level corresponding to the position of the cooperative node.
2. The method according to claim 1, wherein said determining, for each of the M locations, whether the cooperative node can achieve secure communication when in the location according to the first channel power gain, the second channel power gain, the third channel power gain from the cooperative node in the location to the target node, the fourth channel power gain from the cooperative node in the location to the eavesdropping node, and the effect of the cooperative node in the level corresponding to the location on improving the security capacity of the data transmitting node, comprises:
assisting the data sending node to achieve a safe capacity increment C at the target node when the cooperative node is judged to be at the positions_iWhether it is greater than zero; if yes, the cooperative node is shown to be capable of realizing safe communication when being at the position; wherein,
C s _ i = ( C s d - C s e ) + | P i &NotEqual; 0 - ( C s d - C s e ) + | P i = 0
Csdfor the channel capacity from the data sending node to the target node, the expression is:
C s d = log 2 ( 1 + P s h s d &sigma; 2 + P i h i d )
Csefor the channel capacity from the data sending node to the eavesdropping node, the expression is as follows:
C s e = log 2 ( 1 + P s h s e &sigma; 2 + P i h i e )
hsd、hse、hid、hiethe first channel power gain, the second channel power gain, the third channel power gain and the fourth channel power gain are respectivelyRate gain, PsSignal transmission power, P, for the data transmitting node to the target nodeiA preset cooperative interference power, sigma, for the cooperative node to the outside2Is the gaussian white noise power in the channel.
3. The method of claim 2, wherein the benefit function is embodied as:
R = &Sigma; i = 1 N &beta; i &CenterDot; ( &omega; &CenterDot; C s _ &theta; i - T &theta; i )
Cs_θithe specific expression of (A) is as follows:
C s _ &theta; i = ( C s d _ i - C s e _ i ) + | Q &theta; i &NotEqual; 0 - ( C s d _ i - C s e _ i ) + | Q &theta; i = 0
Csd_ifor the channel capacity from the data sending node to the target node, the expression is:
C s d _ i = log 2 ( 1 + P s h s d &sigma; 2 + Q &theta; i h i d )
Cse_ifor the channel capacity from the data sending node to the eavesdropping node, the expression is as follows:
C s e _ i = log 2 ( 1 + P s h s e &sigma; 2 + Q &theta; i h i e )
wherein R is the benefit of the data sending node; θ i is the grade corresponding to the cooperative node at the ith candidate position, TθiRemuneration for services available to collaboration nodes at alternate locations of level θ i, QθiCooperative interference power externally provided for cooperative nodes with candidate positions of the level theta i, wherein N is the number of the candidate positions of the cooperative nodes, βiIs the probability that the cooperative node is at the ith alternative position, and is applied to all the cooperative nodesAlternative location, existenceω represents the gain per unit increase in safety capacity, Cs_θiAnd obtaining the safety capacity of the data sending node under the excitation of the cooperative node at the candidate position with the grade of theta i.
4. The method of claim 3, wherein the function of the benefit of the cooperative node is embodied as:
U(θi)=Tθi-fθi·Qθi
where U (θ i) is the benefit of the cooperative node at the candidate position of the level θ i, QθiFor the cooperative interference power to the outside of the cooperative node at the alternative position with the grade of thetai, fθiA reduction in the benefit per unit power consumption for the cooperative node at the candidate position of the rank θ i.
5. An apparatus for incentivizing cooperative interference for physical layer security, applied to a data transmitting node, the apparatus comprising:
the first acquisition module is used for acquiring position information of a target node and an eavesdropping node, a first channel power gain from the data sending node to the target node and a second channel power gain from the data sending node to the eavesdropping node;
a second obtaining module, configured to obtain M positions where the cooperative node may be located;
a first judging module, configured to judge, for each of the M positions, whether secure communication can be achieved when the cooperative node is in the position according to the first channel power gain, the second channel power gain, a third channel power gain from the cooperative node in the position to the target node, a fourth channel power gain from the cooperative node in the position to the eavesdropping node, and an improvement effect of the cooperative node in the position on a security capacity of the data sending node;
a first determining module, configured to determine the location as an alternative location of the cooperative node when the first determining module determines that the location is the alternative location of the cooperative node;
a grade division module, configured to perform grade division on the determined candidate position according to the fourth channel power gain;
a second determining module, configured to determine, according to a level corresponding to each location, a service reward obtained when the cooperative node is in the level and a cooperative interference power that needs to be provided, by using a contractual theory method according to a self service requirement, the location information, a benefit function, and the level corresponding to the location;
and the broadcasting module is used for broadcasting the determined service remuneration corresponding to each grade and the cooperative interference power required to be provided so that the cooperative node receiving the service remuneration corresponding to each grade and the cooperative interference power required to be provided sends an interference signal by the cooperative interference power of the grade corresponding to the position of the cooperative node.
6. The apparatus of claim 5, wherein the first determining module comprises: a second judging module and a representing module,
the second judging module is configured to judge that the cooperative node is located at the position, and assist the data sending node to achieve a safe capacity increment C at the target nodes_iWhether it is greater than zero;
the representing module is configured to represent that secure communication can be achieved when the cooperative node is located at the position when the determination result of the first determining module is yes;
wherein,
C s _ i = ( C s d - C s e ) + | P i &NotEqual; 0 - ( C s d - C s e ) + | P i = 0
Csdfor the channel capacity from the data sending node to the target node, the expression is:
C s d = log 2 ( 1 + P s h s d &sigma; 2 + P i h i d )
Csefor the channel capacity from the data sending node to the eavesdropping node, the expression is as follows:
C s e = log 2 ( 1 + P s h s e &sigma; 2 + P i h i e )
hsd、hse、hid、hiethe first channel power gain, the second channel power gain, the third channel power gain, the fourth channel power gain, P, respectivelysSignal transmission power, P, for the data transmitting node to the target nodeiA preset cooperative interference power, sigma, for the cooperative node to the outside2Is the gaussian white noise power in the channel.
7. The apparatus of claim 6, wherein the benefit function is embodied as:
R = &Sigma; i = 1 N &beta; i &CenterDot; ( &omega; &CenterDot; C s _ &theta; i - T &theta; i )
Cs_θithe specific expression of (A) is as follows:
C s _ &theta; i = ( C s d _ i - C s e _ i ) + | Q &theta; i &NotEqual; 0 - ( C s d _ i - C s e _ i ) + | Q &theta; i = 0
Csd_ifor the channel capacity from the data sending node to the target node, the expression is:
C s d _ i = log 2 ( 1 + P s h s d &sigma; 2 + Q &theta; i h i d )
Cse_ifor the channel capacity from the data sending node to the eavesdropping node, the expression is as follows:
C s e _ i = log 2 ( 1 + P s h s e &sigma; 2 + Q &theta; i h i e )
wherein R is the benefit of the data sending node; θ i is the grade corresponding to the cooperative node at the ith candidate position, TθiRemuneration for services available to collaboration nodes at alternate locations of level θ i, QθiCooperative interference power externally provided for cooperative nodes with candidate positions of the level theta i, wherein N is the number of the candidate positions of the cooperative nodes, βiIs the probability that the cooperative node is at the ith candidate position, and for all the candidate positions of the cooperative node, the existenceω represents the gain per unit increase in safety capacity, Cs_θiAnd obtaining the safety capacity of the data sending node under the excitation of the cooperative node at the candidate position with the grade of theta i.
8. The apparatus of claim 7, wherein the function of the benefit of the cooperative node is embodied as:
U(θi)=Tθi-fθi·Qθi
where U (θ i) is the benefit of the cooperative node at the candidate position of the level θ i, QθiFor the cooperative interference power to the outside of the cooperative node at the alternative position with the grade of thetai, fθiA reduction in the benefit per unit power consumption for the cooperative node at the candidate position of the rank θ i.
CN201610554434.5A 2016-07-14 2016-07-14 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device Pending CN106162646A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610554434.5A CN106162646A (en) 2016-07-14 2016-07-14 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610554434.5A CN106162646A (en) 2016-07-14 2016-07-14 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device

Publications (1)

Publication Number Publication Date
CN106162646A true CN106162646A (en) 2016-11-23

Family

ID=58062763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610554434.5A Pending CN106162646A (en) 2016-07-14 2016-07-14 The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device

Country Status (1)

Country Link
CN (1) CN106162646A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018527A (en) * 2017-04-21 2017-08-04 湖北工业大学 Multi-user Cooperation communication motivational techniques under a kind of double-point information asymmetrical network environment
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN110572826A (en) * 2019-07-10 2019-12-13 西安电子科技大学 Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918238A (en) * 2014-03-14 2015-09-16 北京邮电大学 Cooperation interference excitation method for realizing physical layer safety

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
康凯: "协作通信系统中继节点选择策略研究", 《中国优秀硕士学位论文全文数据库》 *
陈国利: "基于激励的机会网络协作传输机制", 《中国优秀硕士学位论文全文数据库》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018527A (en) * 2017-04-21 2017-08-04 湖北工业大学 Multi-user Cooperation communication motivational techniques under a kind of double-point information asymmetrical network environment
CN107018527B (en) * 2017-04-21 2019-11-08 湖北工业大学 An Incentive Method for Multi-User Collaborative Communication in Dual-Information Asymmetric Network Environment
CN110248306A (en) * 2018-03-08 2019-09-17 北京邮电大学 A kind of cooperative node of source node determines method, apparatus, electronic equipment and medium
CN110248306B (en) * 2018-03-08 2020-05-08 北京邮电大学 A method, apparatus, electronic device and medium for determining a cooperative node of a source node
CN110572826A (en) * 2019-07-10 2019-12-13 西安电子科技大学 Cooperative Physical Layer Security Implementation Method Based on Optimal Layout of Interfering Nodes
CN110572826B (en) * 2019-07-10 2021-05-18 西安电子科技大学 Implementation method of cooperative physical layer security based on optimal layout of interfering nodes

Similar Documents

Publication Publication Date Title
Huang et al. Resource allocation for multicell device-to-device communications underlaying 5G networks: A game-theoretic mechanism with incomplete information
Han et al. Game theory for next generation wireless and communication networks: Modeling, analysis, and design
CN106230973B (en) A kind of file sharing method based on social networks
Ghosh et al. Energy and spectrum optimization for 5G massive MIMO cognitive femtocell based mobile network using auction game theory
CN107846690B (en) Collaborative communication dynamic contract excitation method under independent asymmetric information
Chen et al. Optimal user‐centric relay assisted device‐to‐device communications: an auction approach
Wang et al. Device-to-device users clustering based on physical and social characteristics
Zhang et al. Contract Theory for Wireless Networks
WO2022143356A1 (en) Blockchain node and method for facilitating spectrum sharing
CN106162646A (en) The motivational techniques of a kind of cooperation interference realizing safety of physical layer and device
CN107517479A (en) A Design Method of Dynamic Incentive Mechanism for Wireless Relay Network Based on Contract Theory
CN110225572B (en) D2D communication user pairing method based on social community
Dai et al. Decoupled uplink-downlink association in full-duplex cellular networks: A contract-theory approach
Mach et al. Incentive-based D2D relaying in cellular networks
Noreen et al. Discount interference pricing mechanism for data offloading in D2D communications
Zhang et al. Game theoretic multihop d2d content sharing: Joint participants selection, routing, and pricing
Zuo et al. Blockchain storage, computation offloading, and user association for heterogeneous cellular networks
Selmi et al. Energy and spectral efficient relay selection and resource allocation in mobile multi‐hop device to device communications: Energy and spectral efficient multi‐hop D2D communications
Feng et al. A game approach for cooperative spectrum sharing in cognitive radio networks
Boabang et al. Network‐Assisted Distributed Fairness‐Aware Interference Coordination for Device‐to‐Device Communication Underlaid Cellular Networks
Zhou et al. Joint peer discovery and resource allocation for social-aware D2D communications: A matching approach
Aditya et al. Beyond the VCG mechanism: truthful reverse auctions for relay selection with high data rates, high base station utility and low interference in D2D networks
Lu et al. Improving physical layer security and efficiency in D2D underlay communication
He et al. Cooperative spectrum sharing based on contract theory with optimal bandwidth and power allocation
Hamouda et al. New coalition formation game for spectrum sharing in cognitive radio networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123

RJ01 Rejection of invention patent application after publication