CN110933679A - Robust D2D power control method under active eavesdropping according to probability - Google Patents

Robust D2D power control method under active eavesdropping according to probability Download PDF

Info

Publication number
CN110933679A
CN110933679A CN201911267451.0A CN201911267451A CN110933679A CN 110933679 A CN110933679 A CN 110933679A CN 201911267451 A CN201911267451 A CN 201911267451A CN 110933679 A CN110933679 A CN 110933679A
Authority
CN
China
Prior art keywords
user
power
active
ith
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911267451.0A
Other languages
Chinese (zh)
Other versions
CN110933679B (en
Inventor
王金龙
罗屹洁
杨旸
龚玉萍
崔丽
童晓兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Army Engineering University of PLA
Original Assignee
Army Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Army Engineering University of PLA filed Critical Army Engineering University of PLA
Priority to CN201911267451.0A priority Critical patent/CN110933679B/en
Publication of CN110933679A publication Critical patent/CN110933679A/en
Application granted granted Critical
Publication of CN110933679B publication Critical patent/CN110933679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/243TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A robust D2D power control method for resisting probabilistic active eavesdropping based on random learning comprises S1, initializing system parameters; s2, inner layer circulation: updating the power selection probability of the next time slot by each D2D user according to a random learning method, and selecting a discrete power value from the discrete power set according to the power selection probability; s3, outer layer circulation: the base station randomly selects an interference cost factor, switches to inner layer circulation, and then updates the selection of the interference cost factor of the next time slot according to a better strategy; ending the circulation until the outer circulation meets the convergence condition; and D2D user controls power according to the power selection probability output by the inner loop at the current moment. The robust D2D power control method based on random learning improves the security performance of a cellular network physical layer, considers the data transmission requirements of D2D users, and considers the influence of the attack probability of an active eavesdropper on the total security reachable rate of the system.

Description

Robust D2D power control method under active eavesdropping according to probability
Technical Field
The invention belongs to the technical field of power control in wireless communication, in particular to a D2D steady power control method based on random learning under active eavesdropping according to probability, and particularly relates to a method for improving the safety performance of a D2D cellular network physical layer by adopting a power updating strategy based on a random learning automaton and a better response.
Background
The D2D communication is a direct communication in which cellular users in the mobile communication system do not pass through base station forwarding. Due to the openness of the wireless channel and the size and hardware limitations of the D2D devices, communications between D2D devices are more susceptible to eavesdropping. According to the theory of information theory, when the channel gain between the legal transceivers is better than the channel gain between the legal transmitter and the eavesdropper, the safety of the transmitted information can be perfectly ensured, and the information cannot be intercepted and decoded by the eavesdropper. For a cellular mobile communication network, the mutual interference of a D2D user and a cellular user can be reasonably utilized to improve the overall physical layer safety performance of the system. Meanwhile, the communication requirement of the D2D user can be considered while the security performance of the physical layer of the cellular user is ensured.
Considering that an attacker existing in the system no longer passively eavesdrops on information sent by a legal user like a traditional passive eavesdropper, but can passively eavesdrop or actively interfere with a probabilistic active eavesdropper, and randomly selects an attack strategy of the attacker with a certain probability, the aggressivity and the destructiveness brought by the attacker are greater, and great challenges are brought to power control of D2D communication in the mobile cellular network.
Disclosure of Invention
The invention provides a steady D2D power control method based on random learning aiming at the condition that an active eavesdropper attacked according to probability exists in a cellular network, improves the security performance of the physical layer of the cellular network, considers the data transmission requirements of a D2D user, and considers the influence of the attack probability of the active eavesdropper on the total security reachable rate of a system.
The technical solution of the purpose of the invention is as follows:
the technical scheme of the invention is as follows:
the invention provides a robust D2D power control method for resisting probability-dependent active eavesdropping and based on random learning, which comprises the following steps:
s1, initializing system parameters: setting the iteration times of the outer layer loop and the iteration times of the inner layer loop; the probability of each D2D user selecting each transmission power value in the discrete power set, and the set of interference cost factors; the base station randomly selects one from the interference cost factor set and broadcasts the selected one to all D2D users;
s2, inner-layer loop iteration is carried out: updating the power selection probability of the next time slot by each D2D user according to a random learning method, and selecting a discrete power value from the discrete power set according to the power selection probability;
s3, outer loop iteration is carried out: the base station randomly selects an interference cost factor, switches to inner layer circulation, and then updates the selection of the interference cost factor of the next time slot according to a better strategy; ending the circulation until the outer circulation meets the convergence condition; and D2D user controls power according to the power selection probability output by the inner loop at the current moment.
Further, step S1 is specifically: initializing system parameters: setting the iteration number of the outer loop as k, setting the initial value k as 0, and setting k' as k +1 during iteration; setting the iteration number of the inner layer loop as t, setting the initial value t as 0, and setting the iteration time t as t + 1;
the probability that each D2D user selects the ith transmission power value, namely the ith discrete power level, in the discrete power set is set as
Figure BDA0002313262190000021
i represents the number of D2D users, N represents the total number of D2D users; l denotes the number of transmission power values, i.e. the level of the transmission power values, L denotes the amount of power in the discrete power set of D2D user i: setting interference cost factor set, the base station isOne of the set of interference cost factors is randomly selected and broadcast to all D2D users.
Further, step S2 is specifically:
s2-a, each D2D user i observes the attack mode selection of the active eavesdropper A and reports the attack mode selection to the base station;
s2-b, if it is observed that the active eavesdropper A chooses passive eavesdropping, calculating D2D user data transmission rate Ri
Figure BDA0002313262190000022
Wherein: i. j represents the number of D2D users; pBAnd PiRepresenting the transmit power, N, of the base station and the ith D2D user, respectively0Additive white gaussian noise representing the background; h isBi,hjiAnd hiiIndicating the channel gains between the base station and the ith D2D user, between the jth D2D user and the ith D2D user, and between the ith D2D user transceivers;
if it is observed that the active eavesdropper A selects active interference, the data transmission rate R of the D2D user is calculatediJ
Figure BDA0002313262190000023
Wherein: pARepresenting the interference power, h, at which the active eavesdropper A selects active interferenceAiRepresenting the channel gain between the active eavesdropper a to the ith D2D user;
s2-c, and establishing utility function U for each D2D user iiThe utility function is expressed as a compromise between the total average reachable rate of all D2D users and the interference cost of the corresponding ith D2D to the cellular user and its own power consumption:
Figure BDA0002313262190000031
wherein:
Figure BDA0002313262190000032
e represents eavesdropping, J represents external interference, a ═ E represents that an attacker adopts an eavesdropping attack mode, a ═ J represents that the attacker adopts an interference attack mode, and I represents internal interference; rIRepresenting the internal interference cost factor, h, determined by the base stationiCRepresents the channel gain between the ith D2D user to cellular user C; c denotes cellular subscribers, CDRepresents the specific power consumption factor of the D2D user;
S2-D, each D2D user updates the probability of each selecting the ith discrete power level according to the following two equations:
Figure BDA0002313262190000033
wherein: b represents the learning rate of D2D for each user i,
Figure BDA0002313262190000034
utility function, U, representing the normalization of the ith D2D user in the t-th time slot, i.e., the current time slotimin(t) and Uimax(t) minimum and maximum utility function values, U, that can be achieved by the ith D2D user at the tth time slot, respectivelyi(t) is the currently obtained real-time utility function value, ai(t) represents the discrete power level selected by the ith D2D user at the tth time slot;
s2-e, selecting the transmission power value of the corresponding user from the discrete power set according to the updated power selection probability; repeating the steps S2-a to S2-D until all D2D users meet the convergence condition, stopping iteration of the inner loop, and turning to the step S3; the convergence condition is as follows: if the power selection probability vector is greater than | | | p (t) |/| p (t) | < ε, where p (t) represents the power selection probability vector for the D2D user at the t-th slot.
Further, in step S2-e, the convergence condition is: the iteration of the inner loop reaches the preset number of times, or the probability that each D2D user selects the ith discrete power level at the current moment is consistent with the probability at the last moment.
Further, the probability and the probability of the last moment tend to be consistent and satisfy: if p (t) is less than s, where p (t) represents the power selection probability vector of all D2D users at the t-th time slot, e ═ 0.01; the preset number of times is 1000.
Further, step S3 is specifically:
s3-a, if the active eavesdropper A selects the attack mode of passive eavesdropping, calculating the safe reachable rate R of the cellular user according to the following formulaCS
RCS=max(RC-RA,0) (5)
Wherein:
Figure BDA0002313262190000041
indicating the achievable rate of the cellular user C under passive eavesdropping,
Figure BDA0002313262190000042
indicating the eavesdropping rate of the active eavesdropper A; h isBCAnd hjCRespectively, the channel gains h between the base station B and the cellular user C and the jth D2D user and the cellular user CBAAnd hjARespectively representing the channel gains between the base station B and the active eavesdropper A and between the jth D2D user and the active eavesdropper A;
if the active eavesdropper selects the attack mode of the active interference, the reachable rate R of the cellular user is calculated according to the following formulaCJ
Figure BDA0002313262190000043
Wherein: h isACRepresenting the channel gain between the active eavesdropper a and the cellular subscriber C;
s3-b, establishing a utility function of the cellular user C:
Figure BDA0002313262190000044
wherein:
Figure BDA0002313262190000045
the utility function of a cellular user is expressed as its safe achievable rate and the interference of all D2D to the cellular userThe sum of the interference costs;
s3-c, the base station randomly selects another interference cost factor R from the interference cost factor setI' the selection of the interference cost factor is updated according to the following formula, and jumps to the inner loop S2,
Figure BDA0002313262190000046
s3-d, randomly selecting an interference cost factor from the interference cost factor set; steps S3-a through S3-c are repeated until the outer loop iterations reach a preset number of times.
Further, in step S3-c, the convergence condition is: the outer loop iteration reaches the preset times, or the interference cost factor selected by the cellular user at the current time is consistent with that at the previous time, and the preset times are 1000 times.
The invention has the beneficial effects that:
the robust D2D power control method based on random learning improves the security performance of a cellular network physical layer, considers the data transmission requirements of D2D users, and considers the influence of the attack probability of an active eavesdropper on the total security reachable rate of the system.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent by describing in more detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts throughout.
Fig. 1 is a general block diagram of a D2D robust power control system model.
Fig. 2 is a power selection probability convergence curve for a certain D2D user.
Fig. 3 is a power selection strategy convergence curve for all D2D users.
Fig. 4 is a plot of the total utility of D2D users as a function of their number.
Fig. 5 is a graph of the total utility of a legitimate user as a function of the probability of an active eavesdropper attack.
Detailed Description
Preferred embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein.
The system block diagram of the invention is shown in fig. 1, the Matlab simulation is adopted for system simulation, and the parameter setting does not influence the generality. Consider a cell, where there is a base station, located in the center of the cell; a cellular subscriber, 3D 2D communication pairs and an active eavesdropper were randomly distributed in a square region with a side length of 1km x 1km, and the distance between the D2D transmitter and receiver was set to 20 m. The transmission power of the base station and the interference power of the active eavesdropper are set to be PE=PA1W, the discrete power value set for each D2D user is
Figure BDA0002313262190000051
Interference cost factor combining for base stations
Figure BDA0002313262190000052
Modeling the large-scale path loss of the channel by using a transmission loss model, setting a loss factor to be 3, and setting a background Gaussian additive white noise power level to be N0=10-10W。
The specific implementation steps are as follows:
1) initializing system parameters: k is 0, t is 0 and
Figure BDA0002313262190000053
represents the probability that the ith D2D user selects the ith transmission power value in the discrete power set;
2) adding 1 to the iteration number of the outer loop: k is k +1
3) The base station randomly selects one from the interference price factor set and broadcasts the selected one to all D2D users;
4) adding 1 to the number of iteration times of the inner loop: t +1
5) In the first placeFrom the discrete power value set, each D2D user selects a probability according to their power in t cycles
Figure BDA0002313262190000061
Selecting discrete power value;
6) each D2D user updates the power selection probability of the next slot according to the random learning algorithm, which specifically operates as follows:
a) observing attack mode selection of an active eavesdropper and reporting the attack mode selection to a base station;
b) if it is observed that the active eavesdropper chooses passive eavesdropping, the data transmission rate of the ith D2D user is calculated
Figure BDA0002313262190000062
Wherein: i. j represents the number of D2D users; pBAnd PiRepresenting the transmit power, N, of the base station and the ith D2D user, respectively0Additive white gaussian noise representing the background; h isBi,hjiAnd hiiIndicating the channel gains between the base station and the ith D2D user, between the jth D2D user and the ith D2D user, and between the ith D2D user transceivers; if it is observed that the active eavesdropper A selects active interference, the data transmission rate R of the D2D user is calculatediJ
c) If active interference selected by an active eavesdropper is observed, the data transmission rate of the ith D2D user is calculated
Figure BDA0002313262190000063
Wherein, PARepresenting the interference power, h, at which the active eavesdropper A selects active interferenceAiRepresenting the channel gain between the active eavesdropper a to the ith D2D user;
d) designing utility function of ith D2D user
Figure BDA0002313262190000064
Wherein:
Figure BDA0002313262190000065
the utility function of D2D users is expressed as a compromise between the total average achievable rate of all D2D users and the interference cost of the ith D2D to the cellular users and its own power consumption,
e represents eavesdropping, J represents external interference, a ═ E represents that an attacker adopts an eavesdropping attack mode, a ═ J represents that the attacker adopts an interference attack mode, and I represents internal interference; rIRepresenting the internal interference cost factor, h, determined by the base stationiCRepresents the channel gain between the ith D2D user to cellular user C; c denotes cellular subscribers, CDRepresenting the specific power consumption factor of the D2D user.
e) All D2D users monitored the attack pattern of the active eavesdropper, estimated the respective utility function, and updated the probability that the ith D2D user selected the ith discrete power level according to the following two equations:
Figure BDA0002313262190000071
wherein: b represents the learning rate of D2D for each user i,
Figure BDA0002313262190000072
utility function, U, representing the normalization of the ith D2D user in the t-th time slot, i.e., the current time slotimin(t) and Uimax(t) minimum and maximum utility function values, U, that can be achieved by the ith D2D user at the tth time slot, respectivelyi(t) is the currently obtained real-time utility function value, ai(t) represents the discrete power level selected by the ith D2D user at the tth time slot; .
7) The inner loop is performed until the convergence condition | | | p (t)/p (t-1) | |/| p (t) | < epsilon, wherein p (t) represents the power selection probability vectors of all D2D users at the t-th time slot, and epsilon is 0.01 or reaches the preset loop time number 1000 times.
8) In the external circulation, the base station calculates the safe reachable rate of the cellular user according to the active eavesdropper attack mode reported by the D2D user;
9) if the active eavesdropper selects the attack mode of passive eavesdropping, the safe reachable rate of the cellular user is calculated according to the following formula
RCS=max(RC-RA,0) (5)
Wherein:
Figure BDA0002313262190000073
indicating the achievable rate of a cellular user under passive eavesdropping,
Figure BDA0002313262190000074
indicating the eavesdropping rate of an active eavesdropper, hBCAnd hjCRespectively, the channel gains h between the base station B and the cellular user C and the jth D2D user and the cellular user CBAAnd hjARespectively, the channel gains between the base station B and the active eavesdropper a, and between the jth D2D user and the active eavesdropper a.
10) If the active eavesdropper selects the attack mode of the active interference, the reachable rate of the cellular user is calculated according to the following formula
Figure BDA0002313262190000075
Wherein the channel gain between the active eavesdropper and the cellular user is given by hACAnd (4) showing.
11) Cellular user computing its utility function
Figure BDA0002313262190000081
Wherein:
Figure BDA0002313262190000082
the utility function of a cellular user is expressed as the sum of its safe achievable rate and the interference cost of all D2D to the cellular user.
12) Base station combining from interference cost factors
Figure BDA0002313262190000083
In the random selection of another interference cost factor R'IAnd jumps to inner loop 4) and then updates its selection probability of the interference cost factor according to the following equation
Figure BDA0002313262190000084
12) And turning to the step 2) until the preset cycle times are reached for 1000 times.
Fig. 2-5 are simulation curves of the present invention. Wherein fig. 2-3 are the convergence curves of one of the D2D user power selection probabilities and all D2D user power selection strategies in a simulation. It can be seen from the figure that under the discrete power selection algorithm based on random learning proposed by the present invention, the probability vector of one D2D user power selection reaches convergence around 500 times, and all D2D user power selection strategies reach convergence around 800 times. FIGS. 4 and 5 show the simulation results 105Average of the sub-independent experiments, wherein fig. 4 is a comparison curve of the total utility of D2D users with the number of D2D users under the discrete power control algorithm based on random learning proposed herein, and the selfish power accounting control and random power selection algorithm that maximize the respective utility of each D2D user, fig. 5 is a comparison curve of the total utility function of all users in the system with the probability of active eavesdropper attack under the above three algorithms. As can be seen from both fig. 4 and fig. 5, the random learning based D2D power control algorithm proposed by the present invention is superior to the other two algorithms, and the total utility of D2D users increases with the increase of the number of D2D users, while the total utility function of legitimate users decreases with the increase of the active eavesdropper's selection of active interference probability.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.

Claims (8)

1. A robust D2D power control method based on random learning against probabilistic active eavesdropping, comprising the steps of:
s1, initializing system parameters: setting the iteration times of the outer layer loop and the iteration times of the inner layer loop; the probability of each D2D user selecting each transmission power value in the discrete power set, and the set of interference cost factors; the base station randomly selects one from the interference cost factor set and broadcasts the selected one to all D2D users;
s2, inner-layer loop iteration is carried out: updating the power selection probability of the next time slot by each D2D user according to a random learning method, and selecting a discrete power value from the discrete power set according to the power selection probability;
s3, outer loop iteration is carried out: the base station randomly selects an interference cost factor, switches to inner layer circulation, and then updates the selection of the interference cost factor of the next time slot according to a better strategy; ending the circulation until the outer circulation meets the convergence condition; and D2D user controls power according to the power selection probability output by the inner loop at the current moment.
2. The robust random learning-based D2D power control method against probabilistic active eavesdropping as claimed in claim 1, wherein the step S1 is specifically: initializing system parameters: setting the iteration number of the outer loop as k, setting the initial value k as 0, and setting k' as k +1 during iteration; setting the iteration number of the inner layer loop as t, setting the initial value t as 0, and setting the iteration time t as t + 1;
the probability that each D2D user selects the ith transmission power value, namely the ith discrete power level, in the discrete power set is set as
Figure FDA0002313262180000011
i represents the number of D2D users, N represents the total number of D2D users; l denotes the number of transmission power values, i.e. the level of the transmission power values, L denotes the amount of power in the discrete power set of D2D user i: and setting an interference cost factor set, and randomly selecting one from the interference cost factor set by the base station and broadcasting the selected one to all D2D users.
3. The robust random learning-based D2D power control method against probabilistic active eavesdropping as claimed in claim 1, wherein the step S2 is specifically:
s2-a, each D2D user i observes the attack mode selection of the active eavesdropper A and reports the attack mode selection to the base station;
s2-b, if it is observed that the active eavesdropper A chooses passive eavesdropping, calculating D2D user data transmission rate Ri
Figure FDA0002313262180000012
Wherein: i. j represents the number of D2D users; pBAnd PiRepresenting the transmit power, N, of the base station and the ith D2D user, respectively0Additive white gaussian noise representing the background; h isBi,hjiAnd hiiIndicating the channel gains between the base station and the ith D2D user, between the jth D2D user and the ith D2D user, and between the ith D2D user transceivers;
if it is observed that the active eavesdropper A selects active interference, the data transmission rate R of the D2D user is calculatediJ
Figure FDA0002313262180000021
Wherein: pARepresenting the interference power, h, at which the active eavesdropper A selects active interferenceAiRepresenting the channel gain between the active eavesdropper a to the ith D2D user;
s2-c, and establishing utility function U for each D2D user iiThe utility function is expressed as a compromise between the total average reachable rate of all D2D users and the interference cost of the corresponding ith D2D to the cellular user and its own power consumption:
Figure FDA0002313262180000022
wherein:
Figure FDA0002313262180000023
e represents eavesdropping, J represents external interference, a ═ E represents that an attacker adopts an eavesdropping attack mode, a ═ J represents that the attacker adopts an interference attack mode, and I represents internal interference; rIRepresenting the internal interference cost factor, h, determined by the base stationiCRepresents the channel gain between the ith D2D user to cellular user C; c denotes cellular subscribers, CDRepresents the specific power consumption factor of the D2D user;
S2-D, each D2D user updates the probability of each selecting the ith discrete power level according to the following two equations:
Figure FDA0002313262180000024
wherein: b represents the learning rate of D2D for each user i,
Figure FDA0002313262180000025
utility function, U, representing the normalization of the ith D2D user in the t-th time slot, i.e., the current time slotimin(t) and Uimax(t) minimum and maximum utility function values, U, that can be achieved by the ith D2D user at the tth time slot, respectivelyi(t) is the currently obtained real-time utility function value, ai(t) represents the discrete power level selected by the ith D2D user at the tth time slot;
s2-e, selecting the transmission power value of the corresponding user from the discrete power set according to the updated power selection probability; repeating the steps S2-a to S2-D until all D2D users meet the convergence condition, stopping iteration of the inner loop, and turning to the step S3; the convergence condition is as follows: if the power selection probability vector is greater than | | | p (t) |/| p (t) | < ε, where p (t) represents the power selection probability vector for the D2D user at the t-th slot.
4. The robust random learning based D2D power control method against probabilistic active eavesdropping as claimed in claim 3, wherein in step S2-e, the convergence condition is: the iteration of the inner loop reaches the preset number of times, or the probability that each D2D user selects the ith discrete power level at the current moment is consistent with the probability at the last moment.
5. The robust random learning based D2D power control method against probabilistic active eavesdropping according to claim 4, wherein the probability and the probability of the last moment tend to agree with the following: if p (t) is less than s, p (t-1) |/| p (t) is less than s, where p (t) represents the power selection probability vector for all D2D users in the t-th slot, e ═ 0.01.
6. The robust random learning based D2D power control method against probabilistic active eavesdropping according to claim 4, wherein the predetermined number of times is 1000.
7. The robust random learning-based D2D power control method against probabilistic active eavesdropping as claimed in claim 1, wherein the step S3 is specifically:
s3-a, if the active eavesdropper A selects the attack mode of passive eavesdropping, calculating the safe reachable rate R of the cellular user according to the following formulaCS
RCS=max(RC-RA,0) (5)
Wherein:
Figure FDA0002313262180000031
indicating the achievable rate of the cellular user C under passive eavesdropping,
Figure FDA0002313262180000032
indicating the eavesdropping rate of the active eavesdropper A; h isBCAnd hjCRespectively, the channel gains h between the base station B and the cellular user C and the jth D2D user and the cellular user CBAAnd hjARespectively representing the channel gains between the base station B and the active eavesdropper A and between the jth D2D user and the active eavesdropper A;
if the active eavesdropper selects the attack mode of the active interference, according to the followingCalculating the achievable rate R of a cellular userCJ
Figure FDA0002313262180000033
Wherein: h isACRepresenting the channel gain between the active eavesdropper a and the cellular subscriber C;
s3-b, establishing a utility function of the cellular user C:
Figure FDA0002313262180000034
wherein:
Figure FDA0002313262180000035
the utility function of the cellular user is expressed as the sum of its safe achievable rate and the interference cost of all D2D to the cellular user;
s3-c, the base station randomly selects another interference cost factor R from the interference cost factor setI' the selection of the interference cost factor is updated according to the following formula, and jumps to the inner loop S2,
Figure FDA0002313262180000041
s3-d, randomly selecting an interference cost factor from the interference cost factor set; steps S3-a through S3-c are repeated until the outer loop satisfies the convergence condition.
8. The robust random learning based D2D power control method against probabilistic active eavesdropping as claimed in claim 7, wherein in step S3-D, the convergence condition is: the outer loop iteration reaches the preset times, or the interference cost factor selected by the cellular user at the current time is consistent with that at the previous time, and the preset times are 1000 times.
CN201911267451.0A 2019-12-11 2019-12-11 Robust D2D power control method under probability-based active eavesdropping Active CN110933679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911267451.0A CN110933679B (en) 2019-12-11 2019-12-11 Robust D2D power control method under probability-based active eavesdropping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911267451.0A CN110933679B (en) 2019-12-11 2019-12-11 Robust D2D power control method under probability-based active eavesdropping

Publications (2)

Publication Number Publication Date
CN110933679A true CN110933679A (en) 2020-03-27
CN110933679B CN110933679B (en) 2023-05-02

Family

ID=69860031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911267451.0A Active CN110933679B (en) 2019-12-11 2019-12-11 Robust D2D power control method under probability-based active eavesdropping

Country Status (1)

Country Link
CN (1) CN110933679B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108834109A (en) * 2018-05-03 2018-11-16 中国人民解放军陆军工程大学 D2D cooperative relay power control method based on Q learning under full-duplex active eavesdropping
CN108834108A (en) * 2018-05-03 2018-11-16 中国人民解放军陆军工程大学 D2D cooperative relay selection method for resisting half-duplex active eavesdropping and based on virtual decision

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108834109A (en) * 2018-05-03 2018-11-16 中国人民解放军陆军工程大学 D2D cooperative relay power control method based on Q learning under full-duplex active eavesdropping
CN108834108A (en) * 2018-05-03 2018-11-16 中国人民解放军陆军工程大学 D2D cooperative relay selection method for resisting half-duplex active eavesdropping and based on virtual decision

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
H. WANG等: "Power control for multiple interfering D2D communications underlaying cellular networks: An approximate interior point approach", 《2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS)》 *
刘晓玲等: "基于博弈论的D2D通信功率控制算法", 《信息通信》 *
江琳丽等: "基于物理层安全的D2D功率控制和信道接入", 《通信技术》 *
罗屹洁等: "D2D使能蜂窝网络中存在主动窃听者的物理层安全研究", 《信号处理》 *

Also Published As

Publication number Publication date
CN110933679B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN108834109B (en) D2D cooperative relay power control method based on Q learning under full-duplex active eavesdropping
CN108112082B (en) Wireless network distributed autonomous resource allocation method based on stateless Q learning
CN108834108B (en) D2D cooperative relay selection method for resisting half-duplex active eavesdropping and based on virtual decision
CN104994569B (en) Multi-user reinforcement learning-based method for resisting hostile interference of cognitive wireless network
CN107172705B (en) Beam optimization method and system of wireless energy-carrying heterogeneous network
Li et al. Enhanced secure transmission against intelligent attacks
CN109150855B (en) Robust wireless communication safety transmission method for optimizing power resources
CN111586646B (en) Resource allocation method for D2D communication combining uplink and downlink channels in cellular network
CN113890564B (en) Special ad hoc network frequency hopping anti-interference method and device for unmanned aerial vehicle based on federal learning
Wang et al. Distributed reinforcement learning based framework for energy-efficient UAV relay against jamming
Ji et al. Reconfigurable intelligent surface enhanced device-to-device communications
CN108848045A (en) D2D Communication Jamming management method based on joint interference alignment and power optimization
Kumari Investigation: life-time and stability period in wireless sensor network
CN115766089A (en) Energy acquisition cognitive Internet of things anti-interference optimal transmission method
Gharagezlou et al. Secrecy sum rate analysis and power allocation with OSTBC and artificial noise for MIMO systems
Abuzainab et al. Robust Bayesian learning for wireless RF energy harvesting networks
CN110933679A (en) Robust D2D power control method under active eavesdropping according to probability
CN113938997B (en) Resource allocation method of secure MEC system in NOMA (non-volatile memory access) Internet of things
Li et al. Multigroup multicast transmission via intelligent reflecting surface
CN105227222B (en) A kind of extensive MIMO beam-forming method of high energy efficiency using statistical channel status information
Yao et al. Efficient interference-aware power control in wireless ad hoc networks
CN106102146B (en) A kind of energy consumption optimization method of D2D communication under more honeycombs
CN115085856A (en) Distributed type decoy anti-interference method and system based on back-to-back cooperative learning
Jin et al. Multiple-objective power control algorithm based on successive interference cancellation algorithm
Makhanbet et al. Users first: A robust two-level learning of power control in uplink ultra-dense HetNets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant