CN106376020A - Method for recognizing user type in encrypted MANET (Mobile Ad Hoc Network) - Google Patents

Method for recognizing user type in encrypted MANET (Mobile Ad Hoc Network) Download PDF

Info

Publication number
CN106376020A
CN106376020A CN201610788603.1A CN201610788603A CN106376020A CN 106376020 A CN106376020 A CN 106376020A CN 201610788603 A CN201610788603 A CN 201610788603A CN 106376020 A CN106376020 A CN 106376020A
Authority
CN
China
Prior art keywords
user
manet
type
encryption
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610788603.1A
Other languages
Chinese (zh)
Other versions
CN106376020B (en
Inventor
牛钊
单洪
马涛
李志�
马春来
叶春明
黄郡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610788603.1A priority Critical patent/CN106376020B/en
Publication of CN106376020A publication Critical patent/CN106376020A/en
Application granted granted Critical
Publication of CN106376020B publication Critical patent/CN106376020B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for recognizing a user type in an encrypted MANET (Mobile Ad Hoc Network). The method comprises the following steps: firstly, sorting sub-networks in an MANET network; distinguishing nodes in the network by using radio positioning according to a sub-network sorting result; recognizing a relay forwarding node on the basis that the network nodes are distinguished; recognizing an encrypted MANET service type based on traffic measurement; and recognizing the user type specific to a service type recognition result. Through adoption of the recognition method, the problems that an existing user type recognition method needs a large amount of historical data, is relatively low in recognition speed and cannot be applied to the encrypted MANET are solved.

Description

The recognition methodss of user type in a kind of encryption manet
Technical field
The present invention relates to radio network technique field, the identification side of the user type in more particularly, to a kind of encryption manet Method.
Background technology
Manet (mobile ad hoc network), the multi-hop network without center being made up of one group of wireless mobile node, Node can freely and dynamically form arbitrarily provisional network structure, has very strong anti-blast phase and from group property, application Extensively.
Identification for user type is mainly by being monitored analysis, Jin Ertong for a long time to the flow in network Cross certain method and realize the identification to user type.Identification currently for user type is focused mainly on the Internet, is applied to Personalized recommendation, including search engine and ecommerce etc..The technology recommended mainly includes recommendation based on correlation rule, is based on The recommendation of content and the recommendation based on collaborative filtering, the index being mainly used in matching degree measurement mainly includes vectorial angle cosine Value, maximum entropy, ratio of gains etc..Generally by methods such as data mining and machine learning, bulk information is processed, will There is the information that the user of similar background liked with it or commodity are realized associate, and then structure user model, in recommendation process In the user vector that formed by user history information to be identified carry out matching degree calculating with the user vector having built in model, User type to be measured is judged to the user type in matching degree highest model, and then corresponding information or commodity are entered to user Row is recommended, and improves the accuracy of recommendation.
Although said method more effectively can be identified to user type, however it is necessary that substantial amounts of historical data, Recognition speed is slower, and cannot realize encrypting the identification of user type in manet.
Content of the invention
In view of above-mentioned analysis, the present invention is intended to provide in a kind of encryption manet user type recognition methodss, in order to solve Certainly existing user type recognition methodss need substantial amounts of historical data, and recognition speed is slower, and cannot be applied to encrypt manet's Problem.
The purpose of the present invention is mainly achieved through the following technical solutions:
A kind of recognition methodss of user type in encryption manet are provided, comprise the following steps:
S1. the subnet in manet network is sorted;
S2. nodes are made a distinction using radio position finding radio directional bearing according to subnet separation results;
S3. on the basis of network node is distinguished, relaying forward node is identified;
S4. the identification of manet type of service is encrypted based on flow measurement;
S5. for type of service recognition result, user type is identified.
Wherein, described step s1 further includes:
Using broadband receiver, signal in working frequency range is received;
The signal receiving is carried out with signal detection and pretreatment, rejects garbage signal therein;
Obtain signal chirp rate, modulation system by signal analysis;
By parameter extraction, subnet is made a distinction.
Described step s2 further includes: using compound angle localization method or digital method in same subnet Different nodes makes a distinction.
Described step s3 further includes: realizes flow of information tracking according to flowing tracer technique end to end, realizes to information The identification of the relay forwarding node in transmitting procedure.
Described step s4 further includes: asks for network node convergence factor average;Recognition rule using type of service The type of service of transmission information in encryption manet is identified.
Described step s5 further includes:
S5.1. structuring user's sequence;
S5.2. carry out sequence conversion for user's sequence and generate symbol sebolic addressing;
S5.3. it is directed to the Frequent episodes collection that symbol sebolic addressing excavates unique user;
S5.4. it is directed to the Frequent episodes collection of multiple users, ask for the public frequent sequence sets of dissimilar user;
That s5.5. asks for user's Frequent episodes set pair characteristic sequence collection to be measured comprises rate;
S5.6 determines the type of user according to comprising rate.
Described step s5.1 further includes: extracts all data of same id first, carries out according to time order and function order Arrangement;After removing object id and time information, construct the packet sequence being made up of user behavior type and type of service.
Described step s5.3 further includes: excavates frequency therein using aprioriall algorithm and is more than the frequent of threshold value Sequence, constructs Frequent episodes set by Frequent episodes.
Described step s5.4 further includes: by setting the threshold value of frequent degree, asks for public frequent sequence sets.
Described step s5.6 further includes: the bag of communicating pair x and y Frequent episodes set pair main users characteristic sequence collection It is ir containing ratexAnd iryIf, irx> iryThen x is judged to main users, user y is judged to secondary user, otherwise judges x For secondary user, user y is judged to main users.
The present invention has the beneficial effect that: provides a kind of recognition methodss of user type in encryption manet, to user type The accuracy rate of identification is high, and need not historical data in a large number, improve recognition speed, can effectively realize user class in encryption manet The identification of type.
Other features and advantages of the present invention will illustrate in the following description, and, partial becoming from description Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write In book, claims and accompanying drawing, specifically noted structure is realizing and to obtain.
Brief description
Accompanying drawing is only used for illustrating the purpose of specific embodiment, and is not considered as limitation of the present invention, in whole accompanying drawing In, identical reference markss represent identical part.
Fig. 1 is the flow chart for encryption manet user type identification;
Fig. 2 is the manet simulated environment schematic diagram for user type identification.
Specific embodiment
To specifically describe the preferred embodiments of the present invention below in conjunction with the accompanying drawings, wherein, accompanying drawing constitutes the application part, and It is used for together with embodiments of the present invention explaining the principle of the present invention.
The specific embodiment of the invention discloses a kind of recognition methodss of user type in encryption manet, such as Fig. 1, concrete bag Include following steps:
S1: the subnet in manet network is sorted;Specifically,
Using broadband receiver, signal in working frequency range is received;
The signal receiving is carried out with signal detection and pretreatment, rejects garbage signal therein, such as noise etc.;
Obtain the parameters such as signal chirp rate, modulation system by signal analysis;
Different methods are taken to realize sub-network division by signal analysis, for synchronized orthogonal network and asynchronous network, tool Body is clustered by transient response method or k-means algorithm, realizes the differentiation to subnet.
Wherein, for synchronized orthogonal network, in the whole network synchronizing process, different sub-network adopts synchronizing frequency presence poor Different, and there is very strong relatedness in the synchronizing frequency adopting inside same subnet, completed (to each jump by transient response method The discrete wavelet coefficient of frequency period transient state response carries out denoising) sorting to subnet.
For asynchronous network, after networking, the hop period of same network is identical it is possible to according to cycle-skipping The difference of phase is clustered using k-means algorithm and then is completed the differentiation of heterogeneous networks.
S2: using radio position finding radio directional bearing, nodes are made a distinction according to subnet separation results;Specifically,
Using compound angle localization method or digital method;
Wherein, compound angle localization method is based on direction-finding station and works, by multiple radio monitoring websites to same Individual signal carries out direction finding, and the intersection using direction finding ray (angle) is positioned;
Digital method then reaches the time of monitoring station based on signal, carries out intersection by time gap conversion fixed Position;
And then different nodes in same subnet is made a distinction.
S3: on the basis of network node is distinguished, relaying forward node is identified;
Specifically, due to having more obvious time succession relation, recipient in manet between Frame and response frame Confirmation or response frame can be sent as early as possible after receiving the data issuing oneself, therefore can be continued using frame and be formed in time Incidence relation to communicating pair realize judge.Because in manet, the time delay of information transfer is equal with the maximum hop count that can pass through There is certain restriction, there is specific threshold value;Realize flow of information tracking according to flowing tracer technique end to end, realize information is passed The identification of relay forwarding node during defeated.
S4: the identification of manet type of service is encrypted based on flow measurement;Specifically, including following sub-step:
S4.1 asks for network node convergence factor average;
First node data is processed, generate multi-hop signal sequence, use for the multi-hop signal sequence generating Lpvg networking, and then ask for the average of all-network node rendezvous coefficient.
S4.2: carry out type of service identification using recognition rule;
The recognition rule of type of service is used to transmission information in encryption manet according to the node rendezvous Coefficient Mean asked for Type of service be identified, the recognition rule of business information is as shown in table 1.
Type of service Judgment threshold 1 Judgment threshold 2
Type of service 1 n/a (0.8011,0.8601)
Type of service 3 >0.8325 <0.8011
Type of service 2 n/a >0.8601
Table 1 traffic identification rule
S5: user type is identified for type of service recognition result;Specifically, including following sub-step:
S5.1: structuring user's (ubt, bus_t) sequence.
Based on the premise of identifying relay forwarding node, only considering communicating pair, then only remaining in user behavior type Send and receive.Each Transaction Information includes four attributes: object id, user behavior, type of service, when sending or receiving Carve, extract all data of same id in data processing first, arranged according to time order and function order, due in reality Only consider the priority problem in relevant information sequential during the analysis of border, do not consider the concrete time, so in relevant issues data After sequencing sequence, time attribute is removed.For user's data within a certain period of time, in removal object id with the case of the moment The packet sequence that structuring user's behavior type (ubt) and type of service (bus_t) form.
S5.2: carry out sequence conversion for user (ubt, bus_t) sequence and generate symbol sebolic addressing.
Packet is indicated complete sequence conversion using specific character, transformational rule is as follows: For receipt Other
S5.3: excavate the Frequent episodes collection of unique user for symbol sebolic addressing.
Aprioriall algorithm is used to excavate the Frequent episodes that frequency therein is more than certain threshold value for symbol sebolic addressing, will Frequent episodes construct Frequent episodes set.
If given threshold takes 10 times for example in mining process, then if sequence occurrence frequency is big in mining process Assert that this sequence is Frequent episodes in 10 times, and then the Frequent episodes of the unique user excavated are constructed Frequent episodes collection Close.
S5.4: the public frequent sequence sets of dissimilar user asked for by the Frequent episodes collection for multiple users.
Set the threshold value of frequent degree, ask for the public frequent sequence sets that multiple user's Frequent episodes are concentrated, i.e. characteristic sequence Collection (feature sequence set, fss)
Wherein, the sequence sets that take place frequently for the multiple user of same type are excavated, given threshold (threshold value can take 10), Ask in multiple users all occurring and number of times is more than the sequence of threshold value, and then will be dissimilar for the Frequent episodes excavated construction The corresponding public frequent sequence sets of user.
S5.5: that asks for user's Frequent episodes set pair characteristic sequence collection to be measured comprises rate.
Asking for characteristic sequence concentrates sequence to comprise rate ir in user's Frequent episodes concentration,Wherein numirFor d1 Middle sequence and d2The equal quantity of middle sequence, num is d1Middle sequence sum.
S5.6: the type that rate determines user is comprised to particular type of user characteristic sequence collection for user to be measured.
Communicating pair x and y Frequent episodes set pair main users characteristic sequence collection is calculated in user type judge process Comprise rate irxAnd iryIf, irx> iryThen x is judged to main users, user y is judged to secondary user, otherwise judges x For secondary user, user y is judged to main users.
In encryption manet of the present invention, the technique effect of the recognition methodss of user type is taken by using exata software Build the method that simulated environment as shown in Figure 2 tested to be verified:
Step 1. builds scene: builds the manet of layering using exata software.
Step 2. builds experimental situation: using the interaction of business software finishing service information.Scene is main in running With the addition of random function for node deployment position, that the network building every time is all existed is certain due to the change of position Difference.
Step 3. basic parameter configures: in simulated environment, simulating area size is 30 × 45km2, using itm model (irregular terrain model) calculates to path loss, using the decline of lognormal model computational shadowgraph.Imitative The parameter setting of true environment interior joint is as shown in table 2.
Parameter Parameter value
phy-model phy-abstract
data-rate 1.2kbps
tx power 5w
rx sensitivity -80db
The basic parameter setting of table 2 node
Step 4. generates experimental data: experiment is carried out 30 times, and wherein bus1 business is generally transmitted to subordinate by main users and uses Family, secondary user periodicity transmits bus2 business to main users.
Step 5. analysis of experimental data: the sequence sets that user to be measured is produced are processed, and calculate it to characteristic sequence collection Comprise rate, and then user type is judged, under the premise of information service type identification is accurate, user type is identified Rate of accuracy reached to 90%.
In sum, a kind of recognition methodss of user type in encryption manet are embodiments provided, to user class The accuracy rate of type identification is high, need not historical data in a large number, improve recognition speed.
It will be understood by those skilled in the art that realizing all or part of flow process of above-described embodiment method, can be by meter Calculation machine program to complete come the hardware to instruct correlation, and described program can be stored in computer-readable recording medium.Wherein, institute Stating computer-readable recording medium is disk, CD, read-only memory or random access memory etc..
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto, Any those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in, All should be included within the scope of the present invention.

Claims (10)

1. in a kind of encryption manet user type recognition methodss it is characterised in that include step:
S1. the subnet in manet network is sorted;
S2. nodes are made a distinction using radio position finding radio directional bearing according to subnet separation results;
S3. on the basis of network node is distinguished, relaying forward node is identified;
S4. the identification of manet type of service is encrypted based on flow measurement;
S5. for type of service recognition result, user type is identified.
2. in encryption manet according to claim 1 the recognition methodss of user type it is characterised in that described step s1 Further include:
Using broadband receiver, signal in working frequency range is received;
The signal receiving is carried out with signal detection and pretreatment, rejects garbage signal therein;
Obtain signal chirp rate, modulation system by signal analysis;
Transient response method and k-means algorithm is taken to be clustered respectively for synchronized orthogonal network and asynchronous network, to distinguish Subnet.
3. in encryption manet according to claim 1 the recognition methodss of user type it is characterised in that described step s2 Further include: area is carried out to different nodes in same subnet using compound angle localization method or digital method Point.
4. in encryption manet according to claim 1 the recognition methodss of user type it is characterised in that described step s3 Further include: realize flow of information tracking according to flowing tracer technique end to end, realize the relaying in message transmitting procedure is turned Send out the identification of node.
5. in encryption manet according to claim 1 the recognition methodss of user type it is characterised in that described step s4 Further include:
Ask for network node convergence factor average;
Recognition rule using type of service is identified to the type of service of transmission information in encryption manet.
6. in encryption manet according to claim 1 the recognition methodss of user type it is characterised in that described step s5 Further include:
S5.1. structuring user's sequence;
S5.2. carry out sequence conversion for user's sequence and generate symbol sebolic addressing;
S5.3. it is directed to the Frequent episodes collection that symbol sebolic addressing excavates unique user;
S5.4. it is directed to the Frequent episodes collection of multiple users, ask for the public frequent sequence sets of dissimilar user;
That s5.5. asks for user's Frequent episodes set pair characteristic sequence collection to be measured comprises rate;
S5.6 determines the type of user according to comprising rate.
7. in encryption manet according to claim 6 the recognition methodss of user type it is characterised in that described step S5.1 further includes: extracts all data of same id first, is arranged according to time order and function order;Removing object id After time information, construct the packet sequence being made up of user behavior type and type of service.
8. in encryption manet according to claim 6 the recognition methodss of user type it is characterised in that described step S5.3 further includes: excavates, using aprioriall algorithm, the Frequent episodes that frequency therein is more than threshold value, by Frequent episodes Construction Frequent episodes set.
9. in encryption manet according to claim 6 the recognition methodss of user type it is characterised in that described step S5.4 further includes: by setting the threshold value of frequent degree, asks for public frequent sequence sets.
10. in encryption manet according to claim 6 the recognition methodss of user type it is characterised in that described step S5.6 further includes: what communicating pair x and y Frequent episodes set pair main users characteristic sequence integrated comprises rate as irxAnd iry, such as Fruit irx> iryThen x is judged to main users, user y is judged to secondary user, otherwise x is judged to secondary user, user y It is judged to main users.
CN201610788603.1A 2016-08-30 2016-08-30 A kind of recognition methods encrypting user type in MANET Expired - Fee Related CN106376020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610788603.1A CN106376020B (en) 2016-08-30 2016-08-30 A kind of recognition methods encrypting user type in MANET

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610788603.1A CN106376020B (en) 2016-08-30 2016-08-30 A kind of recognition methods encrypting user type in MANET

Publications (2)

Publication Number Publication Date
CN106376020A true CN106376020A (en) 2017-02-01
CN106376020B CN106376020B (en) 2019-05-14

Family

ID=57899010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610788603.1A Expired - Fee Related CN106376020B (en) 2016-08-30 2016-08-30 A kind of recognition methods encrypting user type in MANET

Country Status (1)

Country Link
CN (1) CN106376020B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767437A (en) * 2019-01-09 2019-05-17 电子科技大学 Thermal-induced imagery defect characteristic extracting method based on k mean value dynamic multi-objective

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1657854A1 (en) * 2003-08-19 2006-05-17 Keio University Radio communication device, ad hoc system, and communication system
CN101867988A (en) * 2010-06-07 2010-10-20 北京邮电大学 Centralized self-adaptation network manager node selection algorithm in Ad Hoc network
CN103210676A (en) * 2010-11-15 2013-07-17 高通股份有限公司 Geo-location aided sensing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1657854A1 (en) * 2003-08-19 2006-05-17 Keio University Radio communication device, ad hoc system, and communication system
CN101867988A (en) * 2010-06-07 2010-10-20 北京邮电大学 Centralized self-adaptation network manager node selection algorithm in Ad Hoc network
CN103210676A (en) * 2010-11-15 2013-07-17 高通股份有限公司 Geo-location aided sensing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
叶春明: "基于节点行为特征分析的网络流量分类方法", 《电子与信息学报》 *
常慧君: "基于分段、聚类和时序关联分析的用户行为分析", 《计算机应用研究》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767437A (en) * 2019-01-09 2019-05-17 电子科技大学 Thermal-induced imagery defect characteristic extracting method based on k mean value dynamic multi-objective
CN109767437B (en) * 2019-01-09 2021-03-12 电子科技大学 Infrared thermal image defect feature extraction method based on k-means dynamic multi-target

Also Published As

Publication number Publication date
CN106376020B (en) 2019-05-14

Similar Documents

Publication Publication Date Title
Huang et al. A power-efficient routing protocol for underwater wireless sensor networks
Lin et al. A scheme for delay-sensitive spatiotemporal routing in SDN-enabled underwater acoustic sensor networks
Beghdad et al. Boundary and holes recognition in wireless sensor networks
CN101252538B (en) Method of distributed real time detecting wireless self-grouping network topological structure
Bhalaji Reliable data transmission with heightened confidentiality and integrity in IOT empowered mobile networks
CN101510841B (en) Method and system for recognizing end-to-end flux
CN102299863B (en) Method and equipment for clustering network flow
Wen et al. Energy-efficient and delay-aware distributed routing with cooperative transmission for Internet of Things
Bendjima et al. Wormhole attack detection in wireless sensor networks
Kamruzzaman et al. Acoustic sensor networks in the Internet of Things applications
Zhou et al. A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
Anower et al. A node estimation technique in underwater wireless sensor network
CN101483935A (en) Topology drawing algorithm for wireless Ad-Hoc network
CN106376020A (en) Method for recognizing user type in encrypted MANET (Mobile Ad Hoc Network)
Sagduyu et al. Navigating a mobile social network
CN103974276B (en) A kind of wireless-sensor network distribution type signal characteristic parameter extracting method
Natarajan et al. Adaptive Time Difference of Time of Arrival in Wireless Sensor Network Routing for Enhancing Quality of Service.
Paul et al. Performance analysis of received signal power-based Sybil detection in MANET using spline curve
CN102111298A (en) Wireless communication tree networking method based on signal strength
CN106211139A (en) A kind of recognition methods encrypting MANET interior joint type
Wang et al. SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs
Parwekar et al. Localization of sensors by base station in wireless sensor networks
CN106231625B (en) A kind of user type identifying system encrypted in MANET
CN104348559B (en) Periodical quick positioning method of underwater communication network based on centralized topology structure
Wang et al. RSSI-based node selection using neural network parameterised by particle swarm optimisation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190514

Termination date: 20210830

CF01 Termination of patent right due to non-payment of annual fee