CN111212423B - Credible cooperative interference node selection method based on hidden Markov model - Google Patents

Credible cooperative interference node selection method based on hidden Markov model Download PDF

Info

Publication number
CN111212423B
CN111212423B CN202010032461.2A CN202010032461A CN111212423B CN 111212423 B CN111212423 B CN 111212423B CN 202010032461 A CN202010032461 A CN 202010032461A CN 111212423 B CN111212423 B CN 111212423B
Authority
CN
China
Prior art keywords
cooperative
cooperative interference
node
interference node
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010032461.2A
Other languages
Chinese (zh)
Other versions
CN111212423A (en
Inventor
荆涛
温营坤
高青鹤
霍炎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhuangyan Automation Technology Co.,Ltd.
Original Assignee
Beijing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jiaotong University filed Critical Beijing Jiaotong University
Priority to CN202010032461.2A priority Critical patent/CN111212423B/en
Publication of CN111212423A publication Critical patent/CN111212423A/en
Application granted granted Critical
Publication of CN111212423B publication Critical patent/CN111212423B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships

Abstract

The invention provides a credible cooperative interference node selection method based on a hidden Markov model. The method comprises the following steps: detecting the behavior of the cooperative interference node by using an energy detector, and judging whether the cooperative interference node sends an interference signal according to a detection result; updating the credit value of the cooperative interference node which sends the interference signal by using a hidden Markov trust model according to the judgment result of the energy detector; judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, and if so, continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes. The embodiment of the invention designs a novel credible cooperative interference node selection mechanism based on a hidden Markov model, which can more dynamically analyze the behavior of the cooperative interference node, select a credible cooperative interference node and effectively ensure the safety performance of a wireless communication channel.

Description

Credible cooperative interference node selection method based on hidden Markov model
Technical Field
The invention relates to the technical field of wireless communication networks, in particular to a credible cooperative interference node selection method based on a hidden Markov model.
Background
With the development of wireless communication networks, people's dependence on wireless networks is gradually deepened, and the security problem of wireless networks draws attention. Traditional high-level encryption techniques require strong support of computing power, which is laborious for energy-constrained wireless nodes. Therefore, researchers are beginning to research physical layer security techniques for improving the security of wireless communication. A mainstream physical layer security technology is a cooperative interference technology, a cooperative interferer is selected to assist in sending artificial noise to reduce the signal-to-noise ratio of an eavesdropper, and the purpose of secure communication is achieved. However, considering social attributes among users, the collaboration disturber refuses to send artificial noise with a certain probability for the purpose of saving energy for self transmission, which may result in that network security performance is not guaranteed. Therefore, it is necessary to design a confidence model for selecting a trusted cooperative interfering node.
Most of the traditional trust models are Bayesian trust models. The following assumptions exist in the bayesian belief model: the behavior of the node is described according to a probability distribution, and the confidence level is a function of the expected value of the probability distribution, which will be updated with each new rating received according to bayesian theorem. Hidden markov models are statistical markov models in which it is assumed that the system being modeled is a markov process with unobserved (hidden) states that control each selected component. Thus, each hidden markov model has a sequence of hidden states from a finite set of states and its corresponding sequence of observations. The hidden Markov model has more parameters than the Bayesian trust model, so that fine adjustment can be performed to adapt to a dynamic environment.
At present, an effective method for selecting the credible cooperative interference nodes based on the hidden Markov model does not exist in the prior art.
Disclosure of Invention
The embodiment of the invention provides a method for selecting a credible cooperative interference node based on a hidden Markov model, so as to select an effective credible cooperative interference node.
In order to achieve the purpose, the invention adopts the following technical scheme.
A credible cooperative interference node selection method based on a hidden Markov model comprises the following steps:
detecting the behavior of the cooperative interference node by using an energy detector, and judging whether the cooperative interference node sends an interference signal according to a detection result;
updating the credit value of the cooperative interference node which sends the interference signal by using a hidden Markov trust model according to the judgment result of the energy detector;
judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, and if so, continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes;
the detecting the behavior of the cooperative interference node by using the energy detector, and judging whether the cooperative interference node sends an interference signal according to the detection result, includes:
the energy detector comprises a noise pre-filter, an energy operator and an integrator, and receives an output signal y of a cooperative interference node to be detectedc(t) applying a noise prefilter to yc(t) noise filtering and energy operation device for yc(t) amplifying the y-signal and integrating the y-signal with an integratorc(t) performing integration processing to obtain a detection signal Yp
Figure GDA0002967826150000021
Setting e as detection threshold when detecting signal YpIf the detection threshold is larger than the maximum element, judging that the cooperative interference node sends an interference signal, otherwise, judging that the cooperative interference node does not send the interference signal;
cooperative interference node transmitting interference signal
Figure GDA0002967826150000022
Indicating that no interfering signal is being transmitted for cooperative interfering nodes
Figure GDA0002967826150000023
Represents;
Figure GDA0002967826150000024
Figure GDA0002967826150000025
N02representing bilateral noise power spectral density
Figure GDA0002967826150000026
Representing the variance of the noise
t represents time
p represents the exponential power of the signal in the test statistic
Figure GDA0002967826150000031
Representing the time of sampling
Figure GDA0002967826150000032
Representing a source node to a control node channel
Figure GDA0002967826150000033
Beamforming vector representing a source node
xp(t) a transmission signal of a source node
nc(t) represents channel white noise
Figure GDA0002967826150000034
Representing a cooperative interfering node to a control node channel
Figure GDA0002967826150000035
Beamforming vectors representing cooperative interfering nodes
xj(t) represents an interference signal
The step of updating the credit value of the cooperative interference node which sends the interference signal by using the hidden Markov trust model according to the judgment result of the energy detector comprises the following steps:
the hidden Markov model is composed of N hidden states S ═ S1,...,sNA finite set of where s1Being a trusted state, s2Is an untrusted state and has a probability distribution associated with each hidden state, the initial probability distribution of each hidden state being defined by pi-piiShowing the state of the system at the beginning of energy detection, wherein the state of the detected cooperative interference node is represented by a discrete time Markov chain xk={x1,x2,...xk,.., where xkThe epsilon is a hidden state of the cooperative interference node at a sampling time k;
observed value y of detection signal of detected cooperative interference nodek={y1,y2,...yn,., wherein yke.V is the observed value at sampling time k, xkAnd ykThe relationship between the two is defined by a probability distribution matrix Q ═ Qi(m) }, wherein q isi(m)P(yk=vm|xk=si) I is more than or equal to 1 and less than or equal to N, M is more than or equal to 1 and less than or equal to M, M is the number of detection results, and an observation symbol v is observed under the condition that the system is in the state simThe probability of (d); suppose that
Figure GDA0002967826150000036
Is a set of state transition probabilities of detected cooperative interfering nodes, wherein
Figure GDA0002967826150000037
The output level of the cooperative interference node is determined by detecting a symbol set V ═ V1,...,vMClassified, the dynamics of the system is determined by the slew rate matrix Λ ═ λijDescription, as follows:
Figure GDA0002967826150000038
wherein λ isijIs the slew rate, indicating how fast the node state switches, and P (x (t + dt) ═ j | x (t) ═ i) is the state transition probability, indicating the transition probability that time t is state i and time t + Δ t is state j;
respectively modeling the state occupation time, wherein the state occupation time is expressed as H ═ H (H) without self-conversion in a conversion matrix1,h2) Wherein h is1Mean time of trust of cooperative interfering node, h2Representing the mean time of the cooperative interference nodes without trust, and obtaining a dynamic transition probability matrix according to the Kolmogorov equation
Figure GDA0002967826150000041
The expression of (a) is as follows:
Figure GDA0002967826150000042
Figure GDA0002967826150000043
representing the probability of a state transition at time k, δkIs the time interval between this and the last sampling, hiRepresents the average occupancy time of the i state;
Figure GDA0002967826150000046
is a function of the transfer rate, pijRepresenting state transition probabilities
The observed value obtained by detection is represented as ykThe time at which the detection result is obtained is denoted as tkThe time between the detection result k-1 and the detection result k is expressed as σk=tk-tk-1X (t) represents the hidden state of the system at time t, let xk=x(tk) The state distribution of the cooperative interference nodes is expressed as
Figure GDA0002967826150000044
This value is updated for each new detection result,
Figure GDA0002967826150000045
representing the current state distribution, n represents the nth cooperative interference node, and y is equal to ykIs the current detection result, δkRepresenting the time between the current detection and the last detection;
the detected cooperative interference node is in a credible state S at the current moment1As the current reputation value of the cooperative interfering node
Judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, and if so, continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes, including:
setting a credit value threshold value of the cooperative interference node, and when the current credit value of the cooperative interference node is greater than the credit value threshold value, judging that the cooperative interference node meets the system requirement, and continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes.
According to the technical scheme provided by the embodiment of the invention, a novel credible cooperative interference node selection mechanism based on a hidden Markov model is designed, so that the behavior of the cooperative interference node can be more dynamically analyzed, a credible cooperative interference node is selected, and the safety performance of a wireless communication channel is effectively guaranteed.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a processing flow chart of a method for selecting a trusted cooperative interfering node based on a hidden markov model according to an embodiment of the present invention;
FIG. 2 is a flow chart of a process of an energy detector according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a markov transformation process and an observed value according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a simulation result of a function in which the detection probability is different between the cooperative interference node received power and the access node received power according to an embodiment of the present invention;
FIG. 5 is a graph illustrating Receiver Operating Characteristic (ROC) curves for a conventional energy detector and an improved energy detector for different detection durations, according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a hidden markov confidence model with different detection probabilities according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an embodiment of the invention is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or coupled. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
For the convenience of understanding the embodiments of the present invention, the following description will be further explained by taking several specific embodiments as examples in conjunction with the drawings, and the embodiments are not to be construed as limiting the embodiments of the present invention.
The embodiment of the invention provides a method for selecting a credible cooperative interference node based on a hidden Markov model, and the processing flow of the method is shown as figure 1, and the method comprises the following processing steps:
step 1, detecting the behavior of a cooperative interference node by using an energy detector, and judging whether the cooperative interference node sends an interference signal according to a detection result;
step 2, updating the credit value of the cooperative interference node which sends the interference signal by using a hidden Markov trust model according to the judgment result of the energy detector;
and 3, judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, if so, continuing to use the cooperative interference node, otherwise, selecting other nodes as cooperative interference nodes.
The embodiment of the present invention provides an energy detection scheme for detecting whether a cooperative interference node transmits an interference signal, fig. 2 is a detection processing flow chart of an energy detector according to the embodiment of the present invention, and as shown in fig. 2, the energy detector includes a noise prefilter, an energy operator, and an integrator, and finally performs decision detection on an output signal.
In the step 1, the energy detector comprises a noise prefilter, an energy operator and an integrator, and the energy detector receives the output signal y of the cooperative interference node to be detectedc(t) applying a noise prefilter to yc(t) noise filtering and energy operation device for yc(t) amplifying the y-signal and integrating the y-signal with an integratorc(t) performing integration processing to obtain a detection signal Yp
The output of the detection process of the energy detector is as follows:
Figure GDA0002967826150000061
wherein Y ispAnd E is a detection signal, wherein epsilon is a detection threshold, when the detection signal is greater than the detection threshold, the detection signal is judged to have an interference signal, otherwise, the detection signal is judged to have no interference signal.
N02Representing the noise power spectral density, δcRepresenting white noise, p represents an index value of energy operation,
Figure GDA0002967826150000062
indicating the length of the detection time from
Figure GDA0002967826150000063
A length to t of
Figure GDA0002967826150000064
The length of time of (a) is integrated with the energy.
The embodiment of the invention assumes that the cooperative interference node has two behaviors: 1, sending an interference signal. 2, no interference signal is transmitted. Therefore, a hypothesis test was designed, the formula being:
Figure GDA0002967826150000065
Figure GDA0002967826150000071
wherein the content of the first and second substances,
Figure GDA0002967826150000072
no interfering signal is transmitted on behalf of the cooperating interfering nodes,
Figure GDA0002967826150000073
an interfering signal is transmitted on behalf of the cooperating interfering nodes.
T in parentheses in the above formula represents time t,
Figure GDA0002967826150000074
representing the channel from the primary user to the energy detector,
Figure GDA0002967826150000075
optimal beamforming vector, x, representing primary userpIndicating the primary user signal, ncRepresenting ambient white noise received by the energy detector,
Figure GDA0002967826150000076
representing the channel, x, from the cooperating interfering nodes to the energy detectorjRepresenting an interfering signal.
In the step 2, after the cooperative interference node that has sent the interference signal is found according to the judgment result of the energy detector, the reputation value of the cooperative interference node that has sent the interference signal is updated by using the hidden markov trust model. The input signal of the hidden Markov trust model is
Figure GDA0002967826150000077
Fig. 3 is a schematic diagram of a markov transformation process and an observation value according to an embodiment of the present invention, and as shown in fig. 3, a hidden markov model is formed by N hidden states S ═ S1,...,sNA finite set of and with a probability distribution associated with each hidden state. In an embodiment of the invention, the model has two hidden fieldsHidden state S ═ S1(trusted State), s2(untrusted state) }. The initial distribution is formed by pi ═ piiThere is shown, a state of the system at the beginning of energy detection. The state of the detected cooperative interference node is formed by a discrete time Markov chain xk={x1,x2,...xk,.., where xkE S is the state that the cooperative interfering node may hide at the sampling instant k.
Suppose that
Figure GDA0002967826150000078
Is a set of state transition probabilities, wherein
Figure GDA0002967826150000079
The output level of the cooperative interference node is determined by detecting a symbol set V ═ V1,...,vMAnd (5) classifying. In the embodiment of the invention, the output value of the energy detector has two conditions
Figure GDA00029678261500000710
Suppose that in the observed data, the embodiment of the present invention has an observed value yk={y1,y2,...yk,., wherein ykE.v is the observed value at sampling instant k. x is the number ofkAnd ykThe relationship between the two is defined by a probability distribution matrix Q ═ Qi(m) } (used in step 2 of the Algorithm) description, where q isi(m)=P(yk=vm|xk=si) I is more than or equal to 1 and less than or equal to N, M is more than or equal to 1 and less than or equal to M, and the system is in a state siObserve the observation symbol vmThe probability of (c). The dynamics of the system are determined by the slew rate matrix Λ ═ λijDescription of (algorithm step 1) as follows:
Figure GDA00029678261500000711
wherein λ isijIs a slew rate matrix, and P (x (t + dt) ═ j | x (t) ═ i) is a state transition probability, which indicates that time t is state i and time t + Δ t is state iTransition probability of state j.
The embodiment of the invention models the state occupation time respectively, and the conversion matrix has no self-conversion. The state occupancy time is expressed as H ═ H (H)1,h2) Wherein h is1Mean time of trust of cooperative interfering node, h2Representing the average time that the cooperative interfering node is untrusted. According to the Kolmogorov equation, the dynamic transition probability matrix can be obtained according to the embodiment of the invention
Figure GDA0002967826150000081
The expression of (a) is as follows:
Figure GDA0002967826150000082
Figure GDA0002967826150000083
representing the probability of a state transition at time k, δkIs the time interval between this and the last sampling, hiRepresenting the average occupancy time of the i state.
Figure GDA0002967826150000084
Figure GDA0002967826150000091
In the embodiment of the present invention, the detection result is represented as ykThe time at which the detection result is obtained is denoted as tk. The time between the detection result k-1 and the detection result k is denoted as σk=tk-tk-1. x (t) represents the hidden state of the system at time t, and for simplicity, the embodiment of the present invention makes xk=x(tk). In the embodiment of the invention, the state distribution of the cooperative interference nodes is expressed as
Figure GDA0002967826150000092
This value is updated for each new detection result.
Figure GDA0002967826150000093
Representing the current state distribution, n represents the nth cooperative interference node, and y is equal to ykIs the current detection result, δkRepresenting the time between the current detection and the last detection.
In the hidden markov-based trust model considered in the embodiments of the present invention, the embodiments of the present invention use two hidden states S ═ S1(trusted State), s2(untrusted state) } and two test results
Figure GDA0002967826150000094
Wherein
Figure GDA0002967826150000095
And
Figure GDA0002967826150000096
the presence and absence of a detection result indicating the presence of an artifact. And if the artificial noise is not detected in the previous detection, the cooperative interference node is in an untrusted state, and if the artificial noise is detected, the cooperative interference node is in a trusted state. Reputation values are defined as dynamic variables that change over time. Therefore, the embodiment of the invention can capture the behavior characteristics of the cooperative interference nodes which are good in behavior but abnormal in behavior suddenly in a certain time period. Since the behavior of the cooperative interfering node may change over time, the cooperative interfering node may be in a different state than when it was last detected. The embodiment of the invention can only evaluate the reliability of the cooperative interference node according to the previous detection result of the cooperative interference node as best as possible. This means that the network state is hidden, so embodiments of the present invention use a hidden markov trust model in this network.
The initial state distribution of the cooperative interference nodes is defined as xi0={ξ0(1),ξ0(2) Is where ξ0(1)=ξ0(trusted)0.5,ξ0(2)=ξ0(unregusted) ═ 0.5. According to the inventionAccording to the model of the embodiment, the embodiment of the invention can obtain the state probability distribution of the cooperative interference node, and updates the probability distribution according to the algorithm, which is expressed as
Figure GDA0002967826150000097
Figure GDA0002967826150000098
In particular, embodiments of the invention use being in a trusted state
Figure GDA0002967826150000099
The probability of (c) is used as the reputation value of the cooperative interfering node.
The detected cooperative interference node is in a credible state S at the current moment1The probability of (c) is used as the current reputation value of the cooperative interfering node.
In step 3, based on the reputation value list of each cooperative interference node, setting a reputation value threshold of the cooperative interference node (1> threshold >0, generally 0.5-0.8), and when the current reputation value of the cooperative interference node is greater than the reputation value threshold, determining that the cooperative interference node meets the system requirements, and continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes.
Example two
Example 1 credible cooperative interference node selection strategy in Internet of things
In embodiments of the present invention, secure transmissions in an internet of things system are considered. The Internet of things system consists of two access nodes and various types of Internet of things equipment. In this system, the access node 2 wishes to send information to an internet of things device (intelligent hot water kettle). At the same time, there is an eavesdropper (sweeping robot) that intends to intercept and decode the message. In order to protect the transmitted message from being decoded by an eavesdropper, another access node 1 selects an internet of things device (intelligent safe) as a cooperative interference node. The cooperative interfering nodes send interfering signals to the eavesdropper so that the message cannot be decoded correctly.
However, there is a need to address one challenge in cooperative interference techniques. Traditionally, cooperative interference techniques are considered to be based on a basic assumption: the cooperative interfering nodes are considered to be trustworthy in transmitting the artificial noise. However, for some selfish reasons (e.g., energy saving), the cooperative interfering node may choose not to generate the interfering signal, that is, the cooperative interfering node may not be trusted. If the cooperative interfering node is not trusted, the transmitted message cannot be protected. Therefore, it is necessary to design a trust model to evaluate the trustworthiness of each internet of things device and select a trustworthy internet of things device as an interference source.
Therefore, in the present invention, the access node 1 is used to detect the cooperative interfering node and determine whether the node transmits an interfering signal. The detection method uses the improved energy detection method proposed in the present invention. And according to the detection result, utilizing hidden Markov model to make credit value, namely in trust state
Figure GDA0002967826150000101
And (4) updating. And finally, the access node 1 can obtain a credit value list of all the internet of things devices, and according to the credit value list, the device with the highest credit value is selected as a cooperative interference node.
Analysis of this example is shown in fig. 4, and fig. 4 shows a schematic diagram of a simulation result of a detection probability which is a function that the reception power of the cooperative interference node is different from the reception power of the access node. In this figure, the false alarm probability threshold is fixed
Figure GDA0002967826150000102
The detection duration is set to
Figure GDA0002967826150000103
It can be concluded that the detection probability of the improved energy detector is better than that of the conventional energy detector under the condition that the received powers of the cooperative interference nodes are different. In addition, a tag with P is detectedjWith increasing detection probability, the detection probability is gradually increased to 1, and higher PaResulting in a lower detection probability. It is apparent that when the access node 1 receives a higher power interfering signalAnd is easier to detect. However, when the received power of the access node 1 is higher, the interfering signal will be masked and difficult to detect.
Fig. 5 shows a Receiver Operating Characteristic (ROC) curve diagram for a conventional energy detector and an improved energy detector for different detection durations. In this figure, the average received power of the access node and the interferer is set to Pa=10W,Pj1W. Shows improved energy detector performance over conventional energy detection at different detection durations
Figure GDA0002967826150000111
The following properties. In addition, it can be derived that
Figure GDA0002967826150000112
The detection probability gradually increases to 1. This is because of the following
Figure GDA0002967826150000113
Is increased, samples are sampled
Figure GDA0002967826150000114
The number of the detection signals increases, and thus an accurate detection probability can be obtained.
FIG. 6 is a schematic diagram of hidden Markov model with different detection probabilities according to an embodiment of the present invention, and as shown in FIG. 6, the embodiment of the present invention provides reputation values of the hidden Markov model, where the input is 10
Figure GDA0002967826150000115
An observed value is input, and then 5 observed values are input
Figure GDA0002967826150000116
The observations are for different detection probabilities. The detection probability models the uncertainty of the detection. For example, q1(1) 0.8 indicates that even if the cooperative interfering node is in an untrusted state (no interfering signal is present), a probability of 0.2 is obtained
Figure GDA0002967826150000117
That is, there is a 80% probability of obtaining a correct detection result. As can be seen in fig. 6, the slope of the reputation value is steeper as the probability of detection is higher. This can be explained by the detection becoming more reliable as the probability of detection increases, resulting in a fast response to the reputation value.
In summary, in the embodiment of the present invention, the energy detection and the reputation value update are seamlessly connected, without time delay, and are more stable.
The credit value can be dynamically updated, so that the dynamic property of the system is ensured, and the system is more flexible.
The scheme of the invention has higher success rate and better practicability.
Those of ordinary skill in the art will understand that: the figures are merely schematic representations of one embodiment, and the blocks or flow diagrams in the figures are not necessarily required to practice the present invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for apparatus or system embodiments, since they are substantially similar to method embodiments, they are described in relative terms, as long as they are described in partial descriptions of method embodiments. The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (1)

1. A credible cooperative interference node selection method based on a hidden Markov model is characterized by comprising the following steps:
detecting the behavior of the cooperative interference node by using an energy detector, and judging whether the cooperative interference node sends an interference signal according to a detection result;
updating the credit value of the cooperative interference node which sends the interference signal by using a hidden Markov trust model according to the judgment result of the energy detector;
judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, and if so, continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes;
the detecting the behavior of the cooperative interference node by using the energy detector, and judging whether the cooperative interference node sends an interference signal according to the detection result, includes:
the energy detector comprises a noise pre-filter, an energy operator and an integrator, and receives an output signal y of a cooperative interference node to be detectedc(t) prefiltering by noiseDevice pair yc(t) noise filtering and energy operation device for yc(t) amplifying the y-signal and integrating the y-signal with an integratorc(t) performing integration processing to obtain a detection signal Yp
Figure FDA0003005442890000011
Setting e as detection threshold when detecting signal YpIf the detection threshold is larger than the maximum element, judging that the cooperative interference node sends an interference signal, otherwise, judging that the cooperative interference node does not send the interference signal;
cooperative interference node transmitting interference signal
Figure FDA0003005442890000014
Indicating that no interfering signal is being transmitted for cooperative interfering nodes
Figure FDA0003005442890000015
Represents;
Figure FDA0003005442890000012
Figure FDA0003005442890000013
the step of updating the credit value of the cooperative interference node which sends the interference signal by using the hidden Markov trust model according to the judgment result of the energy detector comprises the following steps:
the hidden Markov model is composed of N hidden states S ═ S1,...,sNA finite set of N-2 in the model presented here, with two hidden states, where s is1Being a trusted state, s2Being untrusted and having a probability distribution associated with each hidden state, of the respective hidden stateThe initial probability distribution is formed by pi ═ piiShowing the state of the system at the beginning of energy detection, wherein the state of the detected cooperative interference node is formed by a discrete time Markov chain x ═ { x ═ x1,x2,...xk,.., where xkThe epsilon is a hidden state of the cooperative interference node at a sampling time k;
observed value y ═ y of detection signal of detected cooperative interfering node1,y2,...yk,., wherein yke.V is the observed value at sampling time k, xkAnd ykThe relationship between the two is defined by a probability distribution matrix Q ═ Qi(m) }, wherein q isi(m)=P(yk=vm|xk=si) I is more than or equal to 1 and less than or equal to N, M is more than or equal to 1 and less than or equal to M, and the system is in a state siObserve the observation symbol vmThe probability of (d); suppose that
Figure FDA0003005442890000021
Is a set of state transition probabilities of detected cooperative interfering nodes, wherein
Figure FDA0003005442890000022
I is more than or equal to 1, j is less than or equal to N, and the output level of the cooperative interference node is determined by detecting a symbol set V ═ V1,...,vMClassified, the dynamics of the system is determined by the slew rate matrix Λ ═ λijDescription, as follows:
Figure FDA0003005442890000023
p (x (t + dt) ═ j | x (t) ═ i) is a state transition probability indicating that time t is state i and time t + Δ t is state j;
respectively modeling the state occupation time, wherein the state occupation time is expressed as H ═ H (H) without self-conversion in a conversion matrix1,h2) Wherein h is1Mean time of trust of cooperative interfering node, h2Indicating cooperative interfering nodes are untrustedThe dynamic transition probability matrix is obtained according to the Kolmogorov equation
Figure FDA0003005442890000024
The expression of (a) is as follows:
Figure FDA0003005442890000025
Figure FDA0003005442890000026
representing the probability of a state transition at time k, δkIs the time interval between this and the last sampling, hiRepresents the average occupancy time of the i state;
the observed value obtained by detection is represented as ykThe time at which the observed value is obtained is denoted as tkObserved value yk-1And the observed value ykThe time between is expressed as σk=tk-tk-1X (t) represents the hidden state of the system at time t, let xk=x(tk) The state distribution of the cooperative interference nodes is expressed as
Figure FDA0003005442890000027
This value is updated for each new detection result,
Figure FDA0003005442890000028
representing the current state distribution, n represents the nth cooperative interference node, and y is equal to ykIs the current detection result, δkRepresenting the time between the current detection and the last detection;
the detected cooperative interference node is in a credible state S at the current moment1The probability of the interference is used as the current reputation value of the cooperative interference node;
judging whether the cooperative interference node meets the system requirements or not according to the updated credit value of the cooperative interference node, and if so, continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes, including:
setting a credit value threshold value of the cooperative interference node, and when the current credit value of the cooperative interference node is greater than the credit value threshold value, judging that the cooperative interference node meets the system requirement, and continuing to use the cooperative interference node; otherwise, selecting other nodes as cooperative interference nodes.
CN202010032461.2A 2020-01-13 2020-01-13 Credible cooperative interference node selection method based on hidden Markov model Active CN111212423B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010032461.2A CN111212423B (en) 2020-01-13 2020-01-13 Credible cooperative interference node selection method based on hidden Markov model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010032461.2A CN111212423B (en) 2020-01-13 2020-01-13 Credible cooperative interference node selection method based on hidden Markov model

Publications (2)

Publication Number Publication Date
CN111212423A CN111212423A (en) 2020-05-29
CN111212423B true CN111212423B (en) 2021-05-18

Family

ID=70790092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010032461.2A Active CN111212423B (en) 2020-01-13 2020-01-13 Credible cooperative interference node selection method based on hidden Markov model

Country Status (1)

Country Link
CN (1) CN111212423B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115173975B (en) * 2022-07-06 2024-02-06 北京航空航天大学 Method, device, equipment and storage medium for detecting interference signal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110094983A (en) * 2010-02-18 2011-08-24 인하대학교 산학협력단 Weighted-cooperative spectrum sensing scheme using markov model in cognitive radio systems
CN104244322A (en) * 2014-08-27 2014-12-24 华中师范大学 Wireless multicast cooperative node selection establishment method for overcoming hidden interference
CN105682174A (en) * 2016-01-15 2016-06-15 哈尔滨工业大学深圳研究生院 Opportunity network evolution algorithm and device for promoting node cooperation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595570B (en) * 2012-01-11 2014-09-24 北京邮电大学 Hidden Markov model based spectrum accessing method for cognitive radio system
CN104662809B (en) * 2012-07-23 2018-03-23 苹果公司 Method and system for adaptive channel estimation/predictive filter design
CN108924935A (en) * 2018-07-06 2018-11-30 西北工业大学 A kind of power distribution method in NOMA based on nitrification enhancement power domain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110094983A (en) * 2010-02-18 2011-08-24 인하대학교 산학협력단 Weighted-cooperative spectrum sensing scheme using markov model in cognitive radio systems
CN104244322A (en) * 2014-08-27 2014-12-24 华中师范大学 Wireless multicast cooperative node selection establishment method for overcoming hidden interference
CN105682174A (en) * 2016-01-15 2016-06-15 哈尔滨工业大学深圳研究生院 Opportunity network evolution algorithm and device for promoting node cooperation

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks;Yingkun Wen;《IEEE Transactions on Vehicular Technology》;20190128;全文 *
Cooperative Communication in Physical Layer Security:Technologies and Challenges;Sonika Pahuja;《Wireless Personal Communications》;20190424;全文 *
Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks;Yingkun Wen;《2018 International Conference on Computing, Networking and Communications (ICNC)》;20180621;全文 *
基于离散马尔可夫链的不同抗干扰系统模型分析;任权; 贺磊; 邬江兴;《网络与信息安全学报》;20180415;全文 *
认知无线电网络中的频谱预测技术研究;邢晓双;《中国博士学位论文全文数据库》;20141231;全文 *

Also Published As

Publication number Publication date
CN111212423A (en) 2020-05-29

Similar Documents

Publication Publication Date Title
Kan et al. A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network
Lee et al. Deep cooperative sensing: Cooperative spectrum sensing based on convolutional neural networks
CN115943382A (en) Method and apparatus for defending against adversarial attacks on a federated learning system
Shi et al. Active deep learning attacks under strict rate limitations for online API calls
CN113242259B (en) Network abnormal flow detection method and device
Moghanian et al. GOAMLP: Network intrusion detection with multilayer perceptron and grasshopper optimization algorithm
Ghasemzadeh et al. GS-QRNN: A high-efficiency automatic modulation classifier for cognitive radio IoT
Rani et al. An ensemble-based multiclass classifier for intrusion detection using Internet of Things
CN111212423B (en) Credible cooperative interference node selection method based on hidden Markov model
Guo et al. An intelligent image agent based on soft-computing techniques for color image processing
CN116992986A (en) Network traffic prediction system based on time sequence decomposition
Jothiraj et al. An efficient adaptive threshold‐based dragonfly optimization model for cooperative spectrum sensing in cognitive radio networks
Lee et al. Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks
Gez et al. Subgradient descent learning over fading multiple access channels with over-the-air computation
Zhang et al. Machine learning based protocol classification in unlicensed 5 GHz bands
Arshad et al. Robust collaborative spectrum sensing in the presence of deleterious users
Satyanegara et al. Implementation of CNN-MLP and CNN-LSTM for MitM attack detection system
JP7455240B2 (en) Methods, systems, and computer programs for optimizing communication channel capacity using Dirichlet processes
Chen et al. Blind nonlinear system identification based on a constrained hybrid genetic algorithm
Mikaeil Machine learning approaches for spectrum management in cognitive radio networks
Sun et al. Joint detection scheme for spectrum sensing over time‐variant flat fading channels
Gruenwedel et al. Efficient foreground detection for real‐time surveillance applications
Sun et al. Recursive regularisation parameter selection for sparse RLS algorithm
Han et al. Modified fuzzy c-means and Bayesian equalizer for nonlinear blind channel
Harel et al. Non-Bayesian estimation with partially quantized observations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240109

Address after: 200439, 9th Floor, Building 1, No. 2816 Yixian Road, Baoshan District, Shanghai

Patentee after: Shanghai Zhuangyan Automation Technology Co.,Ltd.

Address before: 100044 Beijing city Haidian District Xizhimen Shangyuan Village No. 3

Patentee before: Beijing Jiaotong University

TR01 Transfer of patent right