CN106507409A - A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing - Google Patents
A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing Download PDFInfo
- Publication number
- CN106507409A CN106507409A CN201510571764.0A CN201510571764A CN106507409A CN 106507409 A CN106507409 A CN 106507409A CN 201510571764 A CN201510571764 A CN 201510571764A CN 106507409 A CN106507409 A CN 106507409A
- Authority
- CN
- China
- Prior art keywords
- environment
- node
- vibrations
- nash equilibrium
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/10—Scheduling measurement reports ; Arrangements for measurement reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/08—Load balancing or load distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing, comprises the steps:Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect vibrations node relationship maps table;Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;Step 3, the Nash Equilibrium model transmitted based on perception information, build the matrix analyses process of the behavioral strategy for perceiving vibrations node reliability rating;Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object and optimize sensing results.The inventive method is by wireless sense network characteristic, object shockproofness is invaded according to environment, achieve the spontaneous detection behavior of the node being deployed in actual environment, optimize collection message transmitting procedure, on the one hand the autonomous selectivity that vibrations node perceived environment invades object is enhanced, the ability of the optimization information transmission of radio sensing network is on the other hand improve.
Description
Technical field
The invention belongs to the data acquisition and transmission research field under radio sensing network, and in particular to Yi Zhongji
Wireless aware environment invasion object method in Nash Equilibrium grade optimizing.
Background technology
In bad environments or the artificial investigation scene of replacement, can realize that environment enters using wireless sensor node
The process of subject perceptions and information transfer is invaded, but, how accurate recognition is invaded object and selects detection information
Selecting optimized route carries out information transfer, and this process needs to be implemented in radio sensing network, by
This, will certainly cause the problems of energy consumption and group of networks stretching frame of wireless vibration detection node and communication node
The trend of structure random adaptation sexual disorder.In order to alleviate the problems referred to above, by the adaptive spy of Nash Equilibrium
The thought for trusting classification is incorporated into wireless aware environment invasion object domain, while setting up Nash Equilibrium by point
Mathematics betting model, from the layer that environment invades object shockproofness and wireless aware information router path optimization
Close in face, the mutual suppression that can effectively balance environment invasion object solution identification and the quasi- time performance of information transmission
System.
Content of the invention
It is an object of the invention on the one hand strengthen the autonomous selectivity that vibrations node perceived environment invades object,
On the other hand the ability of the optimization information transmission of radio sensing network is improved, by providing based on Nash Equilibrium etc.
The wireless aware environment invasion object method that level optimizes is achieved.
To achieve these goals, the technical solution used in the present invention is:Comprise the steps:
Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect that vibrations node is closed
Connection mapping table;
Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node
Autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;
Step 3, the Nash Equilibrium model transmitted based on perception information, are built and perceive vibrations node reliability rating
The matrix analyses process of behavioral strategy;
Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object optimization and perceive knot
Really.
In described step 1 according to environment invade object shockproofness ss, set ss spans (0,1],
Spatial information, sensitiveness to shock, ID data according to the prior typing of vibration detection sensor node, realizes inspection
Survey the mapping association table of vibrations node and invasion object shockproofness under unknown actual measurement environment.
In described step 2 perceive vibration information transmission Nash Equilibrium model as follows, participate in perceive vibrations with
The participation node set of communication game is P={ source sensing node, route transfer end node 1 ... ..., route
Transfer end node n, terminal sensing node }, the communication expected value based on each intrusion detection link lower node is most
Bigization, chooses the strategy interaction that participant participates in game, and the utility function that tactful game is chosen is designated as
The implementation strategy st of stpi (ct), participant pi under certain communication task ct that specifies.
The matrix for perceiving the behavioral strategy of vibrations node reliability rating in described step 3 sets up process as follows, (1)
Establish the participant Pi participation cooperative behaviors functional vector set that vibrations are perceived and communicatedΨPMatrix for 1 × n dimensions;(2) establish participant Pi and look on cooperative behaviors
Functional vector setΨBMatrix for 1 × n dimensions;(3) participant Pi is established
Participate in integrated contributory factor set under the associated trust level of cooperationF is 1 × n
The matrix of dimension;(4) participant P is establishediLook on integrated contributory factor set under the associated trust level of cooperationF is the matrix of 1 × n dimensions;(5) participant's Pi action-function squares are established
Battle array
The derivation for obtaining environment invasion object optimization perception in described step 4 is as follows, calculates MP eigenvalues
Vectorial λ=[ λ1, λ2... λn], then by ss numerical value and λiAssociation, with λiFor judgment criteria, realize that environment invasion is right
As perceiving and information transfer optimum solution.
Compared with current wireless sensor technology, wireless aware environment of the present invention based on Nash Equilibrium grade optimizing
Invasion object method sets up environment invasion object and detection vibrations node relationship maps table in advance, then sets up sense
Know the Nash Equilibrium model of vibration information transmission, finally realize the behavioral strategy for perceiving vibrations node reliability rating
Matrix derive, obtain environment invasion process identification and information transmission optimize solution.The inventive method
Effectively can balance environment invasion process identification and the quasi- time performance of information transmission mutual suppression relation, one
Aspect, realizes environment invasion process identification process inside radio sensing network in advance;On the other hand in identification
In the middle of process, by the integrated optimization process of Nash Equilibrium reliability rating division methods, detection vibrations letter is realized
Breath route optimal solution.
Description of the drawings
The design of Fig. 1 the inventive method and flowchart.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Referring to Fig. 1, wireless aware environment invasion object method of the present invention based on Nash Equilibrium grade optimizing is concrete
Operation is carried out in the following order:
1. design environment invasion object and detection shake node mapping table:Object shockproofness is invaded according to environment
Ss, set ss spans (0,1], spatial information according to the prior typing of vibration detection sensor node,
Sensitiveness to shock, ID data, realize invading object shockproofness under detection vibrations node and unknown actual measurement environment
Mapping association table.
2. build radio sensing network and realize that perceiving vibration information and the Nash Equilibrium model of transmission set up
Journey:Realize that participating in invasion object information perceives the associated trust level with cooperative transmission using radio sensing network
Lower integrated contributory factor acquisition process, sets up the Nash Equilibrium model towards shock detection node and communication node,
Clearly detection shakes node to the model first, then divides vibration information and perceives with grade of transmission and set up correlation
Action-function.
3. shockproofness detection and information router optimal strategy are obtained:Vibrations nodal information etc. is perceived by building
Level behavioral strategy matrix, solves vibrations node reliability rating behavioral strategy and puts to the proof characteristic equation, by features described above
The eigenvalue association detection shockproofness numerical value of equation, final acquisition shockproofness is detected and information router is optimum
Solution.
Claims (5)
1. a kind of wireless aware environment based on Nash Equilibrium grade optimizing invades object method, it is characterised in that
Comprise the steps:
Step 1, foundation environment invade object shockproofness, divide environment invasion object and detect that vibrations node is closed
Connection mapping table;
Step 2, according to environment invade object with detection vibrations node relationship maps table, realize vibrations sensing node
Autonomous perception and communication behavior, set up perceive vibration information transmission Nash Equilibrium model;
Step 3, the Nash Equilibrium model transmitted based on perception information, are built and perceive vibrations node reliability rating
The matrix analyses process of behavioral strategy;
Step 4, solution grade behavioral strategy matrix equation characteristic solution, obtain environment invasion object optimization and perceive knot
Really.
2. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object
Method, it is characterised in that:Object shockproofness ss is invaded according to environment in described step 1, ss is set and is taken
Value scope (0,1], spatial information, sensitiveness to shock according to the prior typing of vibration detection sensor node, ID
Data, realize the mapping association table of detection vibrations node and invasion object shockproofness under unknown actual measurement environment.
3. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object
Method, it is characterised in that:The Nash Equilibrium model for perceiving vibration information transmission in described step 2 is as follows,
It is that { source sensing node route transfer end node to P=to participate in perceiving vibrations and the participation node set of communication game
1 ..., it route transfer end node n, terminal sensing node }, based on each intrusion detection link lower node
Communication expected value is maximized, and chooses the strategy interaction that participant participates in game, the effectiveness that tactful game is chosen
Function is designated as stpi (ct), implementation strategy sts of the participant pi under certain communication task ct that specifies.
4. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object
Method, it is characterised in that:The matrix of the behavioral strategy of vibrations node reliability rating is perceived in described step 3
Set up that process is as follows, (1) establishes that vibrations are perceived and the participant Pi of communication participates in cooperative behaviors functional vector setΨPMatrix for 1 × n dimensions;(2) establish participant Pi and look on cooperative behaviors
Functional vector setΨBMatrix for 1 × n dimensions;(3) participant Pi is established
Participate in integrated contributory factor set under the associated trust level of cooperationF is 1 × n
The matrix of dimension;(4) participant P is establishediLook on integrated contributory factor set under the associated trust level of cooperationF is the matrix of 1 × n dimensions;(5) participant's Pi action-function squares are established
Battle array
5. the wireless aware environment based on Nash Equilibrium grade optimizing according to claim 1 invades object side
Method, it is characterised in that:The derivation for obtaining environment invasion object optimization perception in described step 4 is as follows, meter
Calculate MP feature value vector λ=[λ1, λ2... λn], then by ss numerical value and λiAssociation, with λiFor judgment criteria, reality
Existing environment invasion subject perceptions and information transfer optimum solution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510571764.0A CN106507409A (en) | 2015-09-04 | 2015-09-04 | A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510571764.0A CN106507409A (en) | 2015-09-04 | 2015-09-04 | A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106507409A true CN106507409A (en) | 2017-03-15 |
Family
ID=58287915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510571764.0A Pending CN106507409A (en) | 2015-09-04 | 2015-09-04 | A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106507409A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107508792A (en) * | 2017-07-13 | 2017-12-22 | 福建师范大学 | A kind of data credible cognitive method in mobile cloud computing |
CN115474162A (en) * | 2021-06-11 | 2022-12-13 | 成都极米科技股份有限公司 | Method, device, equipment, system and storage medium for negotiating broadcast-aware process |
-
2015
- 2015-09-04 CN CN201510571764.0A patent/CN106507409A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107508792A (en) * | 2017-07-13 | 2017-12-22 | 福建师范大学 | A kind of data credible cognitive method in mobile cloud computing |
CN107508792B (en) * | 2017-07-13 | 2020-10-30 | 福建师范大学 | Data credibility perception method in mobile cloud computing |
CN115474162A (en) * | 2021-06-11 | 2022-12-13 | 成都极米科技股份有限公司 | Method, device, equipment, system and storage medium for negotiating broadcast-aware process |
CN115474162B (en) * | 2021-06-11 | 2023-08-15 | 极米科技股份有限公司 | Method, device, equipment, system and storage medium for negotiating broadcast perception process |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Deep cooperative sensing: Cooperative spectrum sensing based on convolutional neural networks | |
CN100581119C (en) | Method for recognizing distributed amalgamation of wireless sensor network | |
Diamant et al. | Cooperative authentication in underwater acoustic sensor networks | |
Paul et al. | MIMO authentication via deliberate fingerprinting at the physical layer | |
Chen et al. | Physical-layer channel authentication for 5G via machine learning algorithm | |
Gao et al. | Toward 5G NR high-precision indoor positioning via channel frequency response: A new paradigm and dataset generation method | |
CN103795479B (en) | A kind of cooperative frequency spectrum sensing method of feature based value | |
CN106054130B (en) | A kind of indoor orientation method and device based on MUSIC algorithm | |
CN105654142A (en) | Natural scene statistics-based non-reference stereo image quality evaluation method | |
CN106507409A (en) | A kind of wireless aware environment invasion object method based on Nash Equilibrium grade optimizing | |
Wang et al. | CSI-based physical layer authentication via deep learning | |
CN105322994B (en) | A kind of methods, devices and systems carrying out 3D beam forming | |
CN104202106A (en) | Collaborative spectrum perception method based on credibility in mobile scene | |
CN101969352A (en) | Fast variable polarization-based spectrum sensing method | |
Palanisamy et al. | Communication trust and energy-aware routing protocol for WSN using DS theory | |
Xie et al. | Lightweight secure localization approach in wireless sensor networks | |
Deng et al. | Radio environment map construction using super-resolution imaging for intelligent transportation systems | |
CN106507275B (en) | A kind of robust Distributed filtering method and apparatus of wireless sensor network | |
Lin et al. | Fast node clustering based on an improved birch algorithm for data collection towards software-defined underwater acoustic sensor networks | |
CN105307185B (en) | A kind of gunz cooperation spectrum sensing method based on data purification | |
CN108271168B (en) | Wireless sensor network coverage optimization method based on Dijkstra algorithm | |
CN109858510A (en) | A kind of detection method for http protocol ETag value covert communications | |
CN106211149A (en) | Channel reciprocity enhancement method based on principal component analysis | |
Banaeizadeh et al. | Pilot contamination attack detection in 5G massive MIMO systems using generative adversarial networks | |
Wang et al. | 3D percolation theory-based exposure-path prevention for optimal power-coverage tradeoff in clustered wireless camera sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170315 |
|
WD01 | Invention patent application deemed withdrawn after publication |