CN106507409A - A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing - Google Patents

A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing Download PDF

Info

Publication number
CN106507409A
CN106507409A CN201510571764.0A CN201510571764A CN106507409A CN 106507409 A CN106507409 A CN 106507409A CN 201510571764 A CN201510571764 A CN 201510571764A CN 106507409 A CN106507409 A CN 106507409A
Authority
CN
China
Prior art keywords
environment
node
vibrations
nash equilibrium
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510571764.0A
Other languages
Chinese (zh)
Inventor
尹皓天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510571764.0A priority Critical patent/CN106507409A/en
Publication of CN106507409A publication Critical patent/CN106507409A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing, comprises the steps:Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect vibrations node relationship maps table;Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;Step 3, the Nash Equilibrium model transmitted based on perception information, build the matrix analyses process of the behavioral strategy for perceiving vibrations node reliability rating;Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object and optimize sensing results.The inventive method is by wireless sense network characteristic, object shockproofness is invaded according to environment, achieve the spontaneous detection behavior of the node being deployed in actual environment, optimize collection message transmitting procedure, on the one hand the autonomous selectivity that vibrations node perceived environment invades object is enhanced, the ability of the optimization information transmission of radio sensing network is on the other hand improve.

Description

A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing
Technical field
The invention belongs to the data acquisition and transmission research field under radio sensing network, and in particular to Yi Zhongji Wireless aware environment invasion object method in Nash Equilibrium grade optimizing.
Background technology
In bad environments or the artificial investigation scene of replacement, can realize that environment enters using wireless sensor node The process of subject perceptions and information transfer is invaded, but, how accurate recognition is invaded object and selects detection information Selecting optimized route carries out information transfer, and this process needs to be implemented in radio sensing network, by This, will certainly cause the problems of energy consumption and group of networks stretching frame of wireless vibration detection node and communication node The trend of structure random adaptation sexual disorder.In order to alleviate the problems referred to above, by the adaptive spy of Nash Equilibrium The thought for trusting classification is incorporated into wireless aware environment invasion object domain, while setting up Nash Equilibrium by point Mathematics betting model, from the layer that environment invades object shockproofness and wireless aware information router path optimization Close in face, the mutual suppression that can effectively balance environment invasion object solution identification and the quasi- time performance of information transmission System.
Content of the invention
It is an object of the invention on the one hand strengthen the autonomous selectivity that vibrations node perceived environment invades object, On the other hand the ability of the optimization information transmission of radio sensing network is improved, by providing based on Nash Equilibrium etc. The wireless aware environment invasion object method that level optimizes is achieved.
To achieve these goals, the technical solution used in the present invention is:Comprise the steps:
Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect that vibrations node is closed Connection mapping table;
Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node Autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;
Step 3, the Nash Equilibrium model transmitted based on perception information, are built and perceive vibrations node reliability rating The matrix analyses process of behavioral strategy;
Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object optimization and perceive knot Really.
In described step 1 according to environment invade object shockproofness ss, set ss spans (0,1], Spatial information, sensitiveness to shock, ID data according to the prior typing of vibration detection sensor node, realizes inspection Survey the mapping association table of vibrations node and invasion object shockproofness under unknown actual measurement environment.
In described step 2 perceive vibration information transmission Nash Equilibrium model as follows, participate in perceive vibrations with The participation node set of communication game is P={ source sensing node, route transfer end node 1 ... ..., route Transfer end node n, terminal sensing node }, the communication expected value based on each intrusion detection link lower node is most Bigization, chooses the strategy interaction that participant participates in game, and the utility function that tactful game is chosen is designated as The implementation strategy st of stpi (ct), participant pi under certain communication task ct that specifies.
The matrix for perceiving the behavioral strategy of vibrations node reliability rating in described step 3 sets up process as follows, (1) Establish the participant Pi participation cooperative behaviors functional vector set that vibrations are perceived and communicatedΨPMatrix for 1 × n dimensions;(2) establish participant Pi and look on cooperative behaviors Functional vector setΨBMatrix for 1 × n dimensions;(3) participant Pi is established Participate in integrated contributory factor set under the associated trust level of cooperationF is 1 × n The matrix of dimension;(4) participant P is establishediLook on integrated contributory factor set under the associated trust level of cooperationF is the matrix of 1 × n dimensions;(5) participant's Pi action-function squares are established Battle array
The derivation for obtaining environment invasion object optimization perception in described step 4 is as follows, calculates MP eigenvalues Vectorial λ=[ λ1, λ2... λn], then by ss numerical value and λiAssociation, with λiFor judgment criteria, realize that environment invasion is right As perceiving and information transfer optimum solution.
Compared with current wireless sensor technology, wireless aware environment of the present invention based on Nash Equilibrium grade optimizing Invasion object method sets up environment invasion object and detection vibrations node relationship maps table in advance, then sets up sense Know the Nash Equilibrium model of vibration information transmission, finally realize the behavioral strategy for perceiving vibrations node reliability rating Matrix derive, obtain environment invasion process identification and information transmission optimize solution.The inventive method Effectively can balance environment invasion process identification and the quasi- time performance of information transmission mutual suppression relation, one Aspect, realizes environment invasion process identification process inside radio sensing network in advance;On the other hand in identification In the middle of process, by the integrated optimization process of Nash Equilibrium reliability rating division methods, detection vibrations letter is realized Breath route optimal solution.
Description of the drawings
The design of Fig. 1 the inventive method and flowchart.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Referring to Fig. 1, wireless aware environment invasion object method of the present invention based on Nash Equilibrium grade optimizing is concrete Operation is carried out in the following order:
1. design environment invasion object and detection shake node mapping table:Object shockproofness is invaded according to environment Ss, set ss spans (0,1], spatial information according to the prior typing of vibration detection sensor node, Sensitiveness to shock, ID data, realize invading object shockproofness under detection vibrations node and unknown actual measurement environment Mapping association table.
2. build radio sensing network and realize that perceiving vibration information and the Nash Equilibrium model of transmission set up Journey:Realize that participating in invasion object information perceives the associated trust level with cooperative transmission using radio sensing network Lower integrated contributory factor acquisition process, sets up the Nash Equilibrium model towards shock detection node and communication node, Clearly detection shakes node to the model first, then divides vibration information and perceives with grade of transmission and set up correlation Action-function.
3. shockproofness detection and information router optimal strategy are obtained:Vibrations nodal information etc. is perceived by building Level behavioral strategy matrix, solves vibrations node reliability rating behavioral strategy and puts to the proof characteristic equation, by features described above The eigenvalue association detection shockproofness numerical value of equation, final acquisition shockproofness is detected and information router is optimum Solution.

Claims (5)

1. a kind of wireless aware environment based on Nash Equilibrium grade optimizing invades object method, it is characterised in that Comprise the steps:
Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect that vibrations node is closed Connection mapping table;
Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node Autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;
Step 3, the Nash Equilibrium model transmitted based on perception information, are built and perceive vibrations node reliability rating The matrix analyses process of behavioral strategy;
Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object optimization and perceive knot Really.
2. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object Method, it is characterised in that:Object shockproofness ss is invaded according to environment in described step 1, ss is set and is taken Value scope (0,1], spatial information, sensitiveness to shock according to the prior typing of vibration detection sensor node, ID Data, realize the mapping association table of detection vibrations node and invasion object shockproofness under unknown actual measurement environment.
3. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object Method, it is characterised in that:The Nash Equilibrium model for perceiving vibration information transmission in described step 2 is as follows, It is that { source sensing node route transfer end node to P=to participate in perceiving vibrations and the participation node set of communication game 1 ..., it route transfer end node n, terminal sensing node }, based on each intrusion detection link lower node Communication expected value is maximized, and chooses the strategy interaction that participant participates in game, the effectiveness that tactful game is chosen Function is designated as stpi (ct), implementation strategy sts of the participant pi under certain communication task ct that specifies.
4. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object Method, it is characterised in that:The matrix of the behavioral strategy of vibrations node reliability rating is perceived in described step 3 Set up that process is as follows, (1) establishes that vibrations are perceived and the participant Pi of communication participates in cooperative behaviors functional vector setΨPMatrix for 1 × n dimensions;(2) establish participant Pi and look on cooperative behaviors Functional vector setΨBMatrix for 1 × n dimensions;(3) participant Pi is established Participate in integrated contributory factor set under the associated trust level of cooperationF is 1 × n The matrix of dimension;(4) participant P is establishediLook on integrated contributory factor set under the associated trust level of cooperationF is the matrix of 1 × n dimensions;(5) participant's Pi action-function squares are established Battle array M P = F P T Ψ P + F B T Ψ B .
5. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object side Method, it is characterised in that:The derivation for obtaining environment invasion object optimization perception in described step 4 is as follows, meter Calculate MP feature value vector λ=[λ1, λ2... λn], then by ss numerical value and λiAssociation, with λiFor judgment criteria, reality Existing environment invasion subject perceptions and information transfer optimum solution.
CN201510571764.0A 2015-09-04 2015-09-04 A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing Pending CN106507409A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510571764.0A CN106507409A (en) 2015-09-04 2015-09-04 A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510571764.0A CN106507409A (en) 2015-09-04 2015-09-04 A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing

Publications (1)

Publication Number Publication Date
CN106507409A true CN106507409A (en) 2017-03-15

Family

ID=58287915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510571764.0A Pending CN106507409A (en) 2015-09-04 2015-09-04 A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing

Country Status (1)

Country Link
CN (1) CN106507409A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107508792A (en) * 2017-07-13 2017-12-22 福建师范大学 A kind of data credible cognitive method in mobile cloud computing
CN115474162A (en) * 2021-06-11 2022-12-13 成都极米科技股份有限公司 Method, device, equipment, system and storage medium for negotiating broadcast-aware process

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107508792A (en) * 2017-07-13 2017-12-22 福建师范大学 A kind of data credible cognitive method in mobile cloud computing
CN107508792B (en) * 2017-07-13 2020-10-30 福建师范大学 Data credibility perception method in mobile cloud computing
CN115474162A (en) * 2021-06-11 2022-12-13 成都极米科技股份有限公司 Method, device, equipment, system and storage medium for negotiating broadcast-aware process
CN115474162B (en) * 2021-06-11 2023-08-15 极米科技股份有限公司 Method, device, equipment, system and storage medium for negotiating broadcast perception process

Similar Documents

Publication Publication Date Title
Lee et al. Deep cooperative sensing: Cooperative spectrum sensing based on convolutional neural networks
CN100581119C (en) Method for recognizing distributed amalgamation of wireless sensor network
Diamant et al. Cooperative authentication in underwater acoustic sensor networks
Paul et al. MIMO authentication via deliberate fingerprinting at the physical layer
Chen et al. Physical-layer channel authentication for 5G via machine learning algorithm
Gao et al. Toward 5G NR high-precision indoor positioning via channel frequency response: A new paradigm and dataset generation method
CN103795479B (en) A kind of cooperative frequency spectrum sensing method of feature based value
CN106054130B (en) A kind of indoor orientation method and device based on MUSIC algorithm
CN105654142A (en) Natural scene statistics-based non-reference stereo image quality evaluation method
CN106507409A (en) A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing
Wang et al. CSI-based physical layer authentication via deep learning
CN105322994B (en) A kind of methods, devices and systems carrying out 3D beam forming
CN104202106A (en) Collaborative spectrum perception method based on credibility in mobile scene
CN101969352A (en) Fast variable polarization-based spectrum sensing method
Palanisamy et al. Communication trust and energy-aware routing protocol for WSN using DS theory
Xie et al. Lightweight secure localization approach in wireless sensor networks
Deng et al. Radio environment map construction using super-resolution imaging for intelligent transportation systems
CN106507275B (en) A kind of robust Distributed filtering method and apparatus of wireless sensor network
Lin et al. Fast node clustering based on an improved birch algorithm for data collection towards software-defined underwater acoustic sensor networks
CN105307185B (en) A kind of gunz cooperation spectrum sensing method based on data purification
CN108271168B (en) Wireless sensor network coverage optimization method based on Dijkstra algorithm
CN109858510A (en) A kind of detection method for http protocol ETag value covert communications
CN106211149A (en) Channel reciprocity enhancement method based on principal component analysis
Banaeizadeh et al. Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks
Wang et al. 3D percolation theory-based exposure-path prevention for optimal power-coverage tradeoff in clustered wireless camera sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170315

WD01 Invention patent application deemed withdrawn after publication