CN111866861B - Wireless sensor network secure transmission method and device based on cooperation - Google Patents
Wireless sensor network secure transmission method and device based on cooperation Download PDFInfo
- Publication number
- CN111866861B CN111866861B CN202010516256.3A CN202010516256A CN111866861B CN 111866861 B CN111866861 B CN 111866861B CN 202010516256 A CN202010516256 A CN 202010516256A CN 111866861 B CN111866861 B CN 111866861B
- Authority
- CN
- China
- Prior art keywords
- threshold
- networking
- wireless sensor
- cooperative transmission
- sensor network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 100
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000006855 networking Effects 0.000 claims abstract description 100
- 238000005457 optimization Methods 0.000 claims abstract description 22
- 230000008685 targeting Effects 0.000 claims abstract description 6
- 238000013178 mathematical model Methods 0.000 claims description 12
- 238000005562 fading Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 9
- 239000000654 additive Substances 0.000 claims description 5
- 230000000996 additive effect Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 abstract description 16
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/18—Network planning tools
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a wireless sensor network safe transmission method and a device based on cooperation, wherein the method comprises the following steps: acquiring the instant power intensity of a received signal of a wireless sensor network node, and controlling the networking strategy of the wireless sensor network node according to a preset cooperative transmission networking threshold; and constructing a networking threshold optimization model targeting the maximum average safety rate under the safety performance constraint, and searching for the optimal cooperative transmission networking threshold. The invention has at least the following beneficial effects: by setting and optimizing the cooperative transmission networking threshold, the characteristics of distributed dynamic deployment of the wireless sensor network nodes are utilized, two important performance indexes of transmission rate and safety are considered, and implementation of safety communication in the wireless sensor network is ensured.
Description
Technical Field
The invention relates to the field of wireless sensor network communication transmission, in particular to a wireless sensor network safety transmission method and device based on cooperation.
Background
Networking communications of wireless sensor networks have led to rapid development of smart city applications. The wireless network interconnection and intercommunication method is widely and randomly deployed, and meanwhile, the potential risk of interception of private information exists. Today, communication security is becoming important, and the problem of secure communication of a wireless sensor network is becoming urgent. Because the sensor node has weak computing capability, a single node cannot perform complex encryption computation, and the security communication of the sensor node cannot be ensured by applying a complex encryption technology.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the invention provides a wireless sensor network secure transmission method based on cooperation, which can apply physical layer secure technology secure communication.
The invention also provides a cooperative wireless sensor network safety transmission device based on the cooperative wireless sensor network safety transmission method.
The invention also provides a storage medium for storing the executable program of the wireless sensor network safety transmission method based on cooperation.
According to an embodiment of the first aspect of the invention, the cooperative wireless sensor network security transmission method comprises the following steps: acquiring the instant power intensity of a received signal of a wireless sensor network node, and controlling the networking strategy of the wireless sensor network node according to a preset cooperative transmission networking threshold; and constructing a networking threshold optimization model targeting the maximum average safety rate under the safety performance constraint, and searching for the optimal cooperative transmission networking threshold.
The wireless sensor network safety transmission method based on cooperation, provided by the embodiment of the invention, has at least the following beneficial effects: by setting and optimizing the cooperative transmission networking threshold, the characteristics of distributed dynamic deployment of the wireless sensor network nodes are utilized, two important performance indexes of transmission rate and safety are considered, and implementation of safety communication in the wireless sensor network is ensured.
According to some embodiments of the invention, the method for controlling the networking policy includes: and if the instantaneous power intensity of the received signal is larger than the cooperative transmission networking threshold, the wireless sensor network node can participate in the cooperative transmission networking.
According to some embodiments of the invention, the networking threshold optimization model comprises:
s.t.C1:P so ≤ε
C2:ε∈[0,1]
C3:β∈[0,β up ]
where ζ is the average safe rate, P so For safe interrupt probability, R u For the average reachable rate of the target node, epsilon is the maximum safe interruption probability acceptable by the system, beta is the threshold value of the cooperative transmission networking, and beta up And C1, C2 and C3 are constraint conditions for the maximum value of the cooperative transmission networking threshold.
According to some embodiments of the present invention, the optimization method for optimizing the cooperative transmission networking threshold includes the following steps: s100, traversing the value range of the cooperative transmission networking threshold according to a preset threshold searching step; s200, obtaining the safe interruption probability P according to a first mathematical model so Determining the average achievable rate R according to a second mathematical model u Lower limit value of (2)Updating the current cooperative transmission networking threshold value into a threshold value set according to the meeting condition of the constraint condition C1; and S300, traversing the threshold set, and acquiring the cooperative transmission networking threshold corresponding to the maximum average safety rate.
According to some embodiments of the invention, the first mathematical model is:
wherein P is so For safe interrupt probability exp () is an exponential function based on e, λ e For the spatial division density of eavesdropping nodes, lambda is the spatial distribution density of sensing nodes, P i For the transmit power of the sensor node i,R u for the average reachable rate of the target node, R s For secret information transmission rate, y is the position of eavesdropping node to transmitting node, sigma 2 Receiving noise power of additive Gaussian white noise for target node, gamma () is Gamma distribution, alpha represents path fading coefficient and alpha>2。
According to some embodiments of the invention, the second mathematical model is:
wherein,
representing the probability that a sensing node i participates in cooperative transmission networking, wherein X is the distance between a target node and a sensor node, beta is the threshold value of the cooperative transmission networking, exp () is an exponential function based on e, and P i For the transmitting power of the sensor node i, M represents the number of the sensor nodes, n represents the nth sensor node, lambda is the spatial distribution density of the sensor nodes, sigma 2 Noise power of the additive white gaussian noise received for the target node, alpha representing the path fading coefficient and alpha>2。
According to some embodiments of the invention, the step S200 includes: s210, if the safe interrupt probability P so If constraint C1 is not satisfied, the process returns to step S100; s220, if the safe interrupt probability P so And if the constraint condition C1 is not met, updating the current cooperative transmission networking threshold to a threshold set, and returning to the step S100.
According to some embodiments of the invention, the step S220 further includes: s221, based on the networking threshold optimization model, passing through the average reachable rate R u Lower limit value of (2)And obtaining the current average safety rate xi and storing.
According to a second aspect of the present invention, a cooperative wireless sensor network secure transmission device, using the method of the first aspect of the present invention, includes: the threshold setting module is used for presetting a cooperative transmission networking threshold of the wireless sensor network node; the networking control module is used for acquiring the instant power intensity of the received signal of the wireless sensor network node and controlling the networking strategy of the wireless sensor network node according to the cooperative transmission networking threshold; and the threshold optimization module is used for constructing a networking threshold optimization model targeting the maximum average safety rate under the safety performance constraint and searching the optimal cooperative transmission networking threshold.
The wireless sensor network safety transmission device based on cooperation, provided by the embodiment of the invention, has at least the following beneficial effects: by setting and optimizing the cooperative transmission networking threshold, the characteristics of distributed dynamic deployment of the wireless sensor network nodes are utilized, two important performance indexes of transmission rate and safety are considered, and implementation of safety communication in the wireless sensor network is ensured.
A computer storage medium according to an embodiment of the third aspect of the present invention has stored thereon a computer program which, when executed by a processor, implements a method according to an embodiment of the first aspect of the present invention.
The computer storage medium according to the embodiments of the third aspect of the present invention has at least the same advantageous effects as the method according to the embodiments of the first aspect of the present invention.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 is a schematic diagram illustrating an overview of the steps of a method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a networking threshold optimization step in the method according to the embodiment of the present invention.
Fig. 3 is a block schematic diagram of an apparatus according to an embodiment of the present invention.
Fig. 4 is a topology diagram of wireless sensor network cooperative transmission.
Reference numerals:
a threshold setting module 100, a networking control module 200 and a threshold optimizing module 300.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
In the description of the present invention, a number means one or more, a number means two or more, and greater than, less than, exceeding, etc. are understood to not include the present number, and above, below, within, etc. are understood to include the present number. The description of the first and second is for the purpose of distinguishing between technical features only and should not be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
The method of the embodiment of the invention, referring to fig. 1, comprises the following steps: presetting a cooperative transmission networking threshold of a wireless sensor network node, acquiring the instant power intensity of a received signal of the wireless sensor network node, and controlling the networking strategy of the wireless sensor network node; constructing a networking threshold optimization model, wherein the optimization model takes safety performance as a constraint condition and takes the maximum average safety rate as a target; and obtaining an optimal cooperative transmission networking threshold through searching, and updating the cooperative transmission networking threshold. According to the embodiment of the invention, the networking strategy is controlled by setting the cooperative transmission networking threshold, and the threshold with the maximum average safety rate is obtained by searching through a search algorithm, so that the safety communication of the wireless sensor network node is ensured; starting from the characteristic of distributed dynamic deployment of wireless sensor network nodes, two important performance indexes of transmission rate and safety are considered.
Referring to fig. 4, a wireless sensor network is composed of a large number of sensor devices, and the sensor network and a target node communicate through a wireless channel. Due to the openness of the wireless channel, surrounding eavesdroppers may eavesdrop on the secret information. In the embodiment of the invention, the natural difference between the legal channel and the eavesdropping channel is applied by the physical layer security technology, and the legal channel capacity can be increased on the premise of not changing the eavesdropping channel capacity by the cooperative networking mode, so that the secure communication is ensured.
The spatial location distribution of the sensor is assumed to follow a two-dimensional poisson point process (Possion Pointed Process, PPP) with a density λ, denoted by Φ. Taking into account both large-scale and small-scale fading, wherein the path fading coefficient alpha>2, the small-scale fading obeys the quasi-static Rayleigh distribution, then the legal channel vector can be expressed as h ui x -α X is the distance from the target node (i.e. the node used by the legitimate user) to the serving base station, h ui Is a small-scale fading vector, and each sensor corresponds to a channel h ui Complex gaussian random distribution subject to independent same distribution and whose gain is expressed as |h ui | 2 . Spatial location distribution compliance density of eavesdroppers is lambda e Is applied to the two-dimensional poisson point process of phi e And (3) representing. The eavesdropper is in the same physical space as the legitimate user, taking into account the same channel conditions. The eavesdropping channel vector can be expressed as h ei y -α Y is the distance from the eavesdropping node to the serving base station, h ei Is a small-scale fading vector, and each sensor corresponds to a channel h ei Complex gaussian random distribution subject to independent same distribution and whose gain is expressed as |h ei | 2 。
In order to ensure safe and reliable communication of the target node, legal channel capacity is increased on the premise of not changing eavesdropping channel capacity in a cooperative networking mode, so that safe communication is ensured. Setting a cooperative transmission networking threshold of the wireless sensor network node, and confirming a cooperative networking strategy. The networking strategy is specifically that when the instant power intensity of the received signal of the target node is larger than or equal to the cooperative transmission networking threshold value beta, the wireless sensor network node can participate in the cooperative networking transmission. Can be expressed mathematically as:
wherein,is the target node's ISP (Instantaneous Signal Power), the received signal instantaneous power strength. The probability that the sensor nodes participate in cooperation is known as follows:
wherein,probability of participating in cooperation for sensing node i, P i The transmitting power of the sensing node i, X is the distance between the target node and the sensor node, alpha represents the path fading coefficient and alpha>2, exp () is an exponential function based on e, exp (n) returns to the power n of e. Because the target node can select any wireless sensor network node for communication, and the wireless sensor network node distribution obeys the poisson point process, the probability density function of the distance X of the target node to the wireless sensor network node can be expressed as:
f X (x)=2πλxexp(-πλx 2 )
wherein x is the distance from the target node to the sensor node, and lambda is the density of the wireless sensor network nodes;
when there are N sensor nodes among the M sensor nodes, the probability of participating in the cooperation can be expressed as:
and constructing a threshold optimization model under the safety constraint condition by taking the average safety rate xi as an optimization target.
The optimization model can be expressed as:
s.t.C1:P so ≤ε
C2:ε∈[0,1]
C3:β∈[0,β up ]
wherein P is so For the safe interrupt probability, the smaller the safe interrupt probability is, the better the system safety performance is. R is R u For the average reachable rate of the target node, epsilon is the maximum safe interrupt probability acceptable by the system, epsilon is [0,1 ]]。β up For maximum value of cooperative transmission networking threshold value, beta epsilon [0, beta up ]C1, C2 and C3 represent constraints of the threshold optimization model. I.e. beta is within a range of values such that the average safe rate ζ is optimal (i.e. takes a maximum value).
In the embodiment of the invention, the step of searching the cooperative transmission networking threshold corresponding to the optimal average security rate under the security performance constraint comprises the following steps: and S100, traversing in the value range of the cooperative transmission networking threshold according to the preset threshold searching step length. S200, obtaining the safe interrupt probability P according to the first mathematical model so Determining an average achievable rate R from the second mathematical model u Lower limit value of (2)Judging whether the constraint condition C1 is met, if so, updating the current cooperative transmission networking threshold value into a threshold value set, and returning to S100 until the traversal is completed; otherwise, directly returning to S100 until the traversal is completed. And S300, traversing the threshold set, and acquiring a cooperative transmission networking threshold corresponding to the maximum average safety rate.
The embodiment of the invention searches the optimal cooperative transmission networking threshold value and needs to acquire the number M of the sensing nodes and the transmitting power P of the sensing nodes i Sensor node density λ, eavesdropper density λ e Secret information transmission speedRate R s Upper networking threshold beta up Basic parameters such as safe interrupt constraint epsilon, threshold search step delta beta and the like, referring to fig. 2, the specific steps are as follows:
step 1, searching a step delta beta according to a preset threshold value, and obtaining a value range [0, beta ] of a cooperative transmission networking threshold value up ]The traversal is performed, for example, when initializing, let the cooperative transmission networking threshold β=0, and β is added by Δβ at the next search.
Step 2, under the current cooperative transmission networking threshold value beta, the safety interruption probability P is calculated so Solving, wherein the safety interruption probability refers to that safety interruption occurs when the capacity of an interception channel is larger than the redundancy rate of signal transmission, and is defined as P so =P(C E >R u -R s ). The probability of a safe outage in an embodiment of the present invention may be expressed as (i.e., a first mathematical model):
wherein C is E To tap the channel capacity, R u For the average reachable rate of the target node, R s For secret information transmission ratey represents the location of the eavesdropping node to the transmitting node, σ 2 Receiving noise power of additive Gaussian white noise for target node, gamma () is Gamma distribution, alpha represents path fading coefficient and alpha>2, M represents the number of sensing nodes, P i Representing the transmitting power of the sensing node, lambda representing the density of the sensing node and lambda e Representing eavesdropper density.
And step 3, solving the average reachable rate under the current cooperative transmission networking threshold beta. Assuming that there are M sensor nodes in the network, in the cooperative networking transmission scenario, the average reachable rate of the target node is related to the number of sensors involved in the cooperative transmission. Since the number of base stations participating in cooperative transmission in the system is affected by the current channel state, the number of cooperative base stations is random. When there are N sensor nodes in the M sensor nodes that participate in the cooperative transmission, applying a full probability formula, the average achievable rate of the target node may be expressed as:
wherein the method comprises the steps ofE () is the desired function, ">The received signal-to-interference-and-noise ratio (Signal to Interference plus Noise Ratio) for the user when n sensor nodes are involved in the cooperative transmission.
The key to solving for the average achievable rate is to solve forDue to->There is difficulty in calculating the accurate expression of (a) taking into account the lower bound of the average achievable rate of the calculation target node. The inequality by Jensen is:
recording deviceThe lower average achievable rate limit for the target node can be expressed by calculation as:
there is a second mathematical model:
wherein,
step 4, solving the average safety rate to makeSubstituted with ζ= (1-P) so )R u An average safe rate can be obtained.
Step 5: verify P so Whether under the constraint of safety performance epsilon, namely whether the constraint condition C1 is met, if so, adding the current cooperative transmission networking into a threshold setIs a kind of medium.
Step 6, returning to the step 1 until the value range [0, beta ] of the cooperative transmission networking threshold value up ]The traversal is completed, and the threshold value set meeting the constraint condition C1 is obtained
Step 7, traversing the threshold setThe maximum average safety rate xi is obtained by the cooperative transmission networking threshold value in the network, and the threshold value beta when the average safety rate is maximum is obtained * 。
In some embodiments of the present invention, P is calculated from the first data model during traversal of the cooperative transmission networking threshold so Deriving from a second mathematical modelIf the constraint condition C1 is judged to be met, recording P corresponding to the current transmission networking threshold beta so 、/>And storing the value of the current beta to the threshold set +.>In (a) and (b); acquiring threshold set->After that, traverse the threshold set +.>Is set to be a cooperative transmission networking threshold value, let ∈ ->And substitutes ζ= (1-P) so )R u Corresponding average safety rate can be obtained, and the comparison is carried out to obtain corresponding threshold value beta with maximum average safety rate xi * 。
It is apparent that in some embodiments of the invention, the thresholds may also be aggregatedThe traversal of (2) is fused into the traversal process of the cooperative transmission networking threshold. Specifically, in the calculation process of traversing each transmission networking threshold, the current maximum average safety rate xi and the corresponding threshold beta are saved, and the maximum average safety speed and the corresponding threshold beta can be obtained after the transmission networking threshold is traversed * 。
Referring to fig. 3, the apparatus of the embodiment of the present invention includes the following modules: a threshold setting module 100, a networking control module 200 and a threshold optimizing module 300. The threshold setting module 100 is configured to set a cooperative transmission networking threshold; the networking control module 200 acquires the instant power intensity of the received signal of the wireless sensor network node, and controls the networking strategy of the node according to the cooperative transmission networking threshold; the threshold optimization module 300 is configured to construct a networking threshold optimization model targeting the maximum average security rate under the security constraint, obtain an optimal cooperative transmission networking threshold, and update the original cooperative transmission networking threshold.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the system embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium may include content that is subject to appropriate increases and decreases as required by jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is not included as electrical carrier signals and telecommunication signals.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of one of ordinary skill in the art without departing from the spirit of the present invention.
Claims (6)
1. The wireless sensor network safe transmission method based on cooperation is characterized by comprising the following steps:
acquiring the instant power intensity of a received signal of a wireless sensor network node, and controlling the networking strategy of the wireless sensor network node according to a preset cooperative transmission networking threshold;
constructing a networking threshold optimization model targeting the maximum average safety rate under the safety performance constraint, and searching the optimal cooperative transmission networking threshold;
the networking threshold optimization model comprises:
wherein,for average safe rate>For safe interrupt probability, +.>For the average achievable rate of the target node, +.>Maximum safe interrupt probability acceptable for the system, < +.>Networking threshold for said cooperative transmission, +.>For the maximum value of the cooperative transmission networking threshold,C1、C2, 2C3 are constraint conditions;
the optimization method for optimizing the cooperative transmission networking threshold comprises the following steps:
s100, traversing the value range of the cooperative transmission networking threshold according to a preset threshold searching step;
s200, obtaining the safe interrupt probability according to a first mathematical modelDetermining said average achievable rate +.>Lower limit value of>And according to constraint conditionsC1, updating the current cooperative transmission networking threshold value into a threshold value set;
s300, traversing the threshold set to obtain the cooperative transmission networking threshold corresponding to the maximum average safety rate;
the first mathematical model is:
wherein,for the safe interrupt probability exp () is an exponential function based on e, ++>For the spatial graduation density of eavesdropping nodes, +.>For the spatial distribution density of the sensor nodes, +.>Is a sensor nodeiIs>,/>For the average achievable rate of the target node, +.>In order to keep the rate of transmission of information secret,yfor eavesdropping on the distance of the node to the transmitting node, < >>Receiving additive white gaussian noise for a target nodeNoise power->Is Gamma distribution, ->Representing the path fading coefficient and->;
The second mathematical model is:
wherein,,
indicating the probability of the ith participation in the cooperative transmission network,Xfor the distance between the target node and the sensor node, < > j->For the cooperative transmission networking threshold, exp () is an exponential function based on e,/->Is a sensor nodeiIs used for the transmission power of the (c),Mthe number of the sensing nodes is represented,nrepresent the firstnIndividual sensor nodes->For the spatial distribution density of the sensor nodes, +.>Noise power for receiving additive white gaussian noise for target node, +.>Representing the path fading coefficient and->。
2. The cooperative wireless sensor network secure transmission method according to claim 1, wherein the control method of the networking policy comprises: and if the instantaneous power intensity of the received signal is greater than or equal to the cooperative transmission networking threshold, the wireless sensor network node can participate in the cooperative transmission networking.
3. The method for secure transmission of wireless sensor networks based on collaboration according to claim 1, wherein the step S200 includes:
s210, if the safe interrupt probability isNot meeting the constraint conditionC1, returning to the step S100;
s220, if the safe interrupt probability isMeeting the constraint conditionCAnd 1, adding the current cooperative transmission networking threshold to a threshold set, and returning to the step S100.
4. The method for secure transmission of wireless sensor networks based on collaboration according to claim 3, wherein the step S220 further comprises:
s221, based on the networking threshold optimization model, passing through the average reachable rateLower limit value of>To obtain the currentIs +.>And storing.
5. A wireless sensor network security transmission device based on cooperation, characterized in that the method according to any one of claims 1 to 4 is used, comprising:
the threshold setting module is used for presetting a cooperative transmission networking threshold of the wireless sensor network node;
the networking control module is used for acquiring the instant power intensity of the received signal of the wireless sensor network node and controlling the networking strategy of the wireless sensor network node according to the cooperative transmission networking threshold;
and the threshold optimization module is used for constructing a networking threshold optimization model targeting the maximum average safety rate under the safety performance constraint and searching the optimal cooperative transmission networking threshold.
6. A computer storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010516256.3A CN111866861B (en) | 2020-06-09 | 2020-06-09 | Wireless sensor network secure transmission method and device based on cooperation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010516256.3A CN111866861B (en) | 2020-06-09 | 2020-06-09 | Wireless sensor network secure transmission method and device based on cooperation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111866861A CN111866861A (en) | 2020-10-30 |
CN111866861B true CN111866861B (en) | 2024-01-23 |
Family
ID=72987549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010516256.3A Active CN111866861B (en) | 2020-06-09 | 2020-06-09 | Wireless sensor network secure transmission method and device based on cooperation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111866861B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115291609A (en) * | 2022-08-25 | 2022-11-04 | 七腾机器人有限公司 | Positioning and navigation method and system of inspection robot |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072607A (en) * | 2015-08-24 | 2015-11-18 | 重庆邮电大学 | Semi-defined programming (SDP) based physical layer safe optimization method in multi-eavesdropping user cognitive network |
CN106131823A (en) * | 2016-06-06 | 2016-11-16 | 西安交通大学 | Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
CN109004961A (en) * | 2018-07-05 | 2018-12-14 | 华侨大学 | The combined optimization method of full duplex destination scrambling safe transmission |
CN110191505A (en) * | 2019-04-30 | 2019-08-30 | 南京邮电大学 | User mode selection and Poewr control method in multicast network towards secure communication |
CN110225579A (en) * | 2019-06-12 | 2019-09-10 | 西安电子科技大学 | A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply |
CN111132259A (en) * | 2019-12-27 | 2020-05-08 | 西安理工大学 | Combined power optimization and routing method for physical layer security |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009107297A1 (en) * | 2008-02-25 | 2009-09-03 | 三菱電機株式会社 | Vehicle-mounted communication device |
US9654846B2 (en) * | 2015-05-26 | 2017-05-16 | Intel Corporation | Sensor based signal transmission methods and apparatuses |
-
2020
- 2020-06-09 CN CN202010516256.3A patent/CN111866861B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072607A (en) * | 2015-08-24 | 2015-11-18 | 重庆邮电大学 | Semi-defined programming (SDP) based physical layer safe optimization method in multi-eavesdropping user cognitive network |
CN106131823A (en) * | 2016-06-06 | 2016-11-16 | 西安交通大学 | Relay transmission method based on safety of physical layer in eavesdropping user's random distribution scene |
CN108712228A (en) * | 2018-05-03 | 2018-10-26 | 电子科技大学 | A kind of optimal safe transmission method of anti-eavesdrop based on cooperation interference |
CN109004961A (en) * | 2018-07-05 | 2018-12-14 | 华侨大学 | The combined optimization method of full duplex destination scrambling safe transmission |
CN110191505A (en) * | 2019-04-30 | 2019-08-30 | 南京邮电大学 | User mode selection and Poewr control method in multicast network towards secure communication |
CN110225579A (en) * | 2019-06-12 | 2019-09-10 | 西安电子科技大学 | A kind of cooperation interference safe transmission method of physical layer based on wireless energy supply |
CN111132259A (en) * | 2019-12-27 | 2020-05-08 | 西安理工大学 | Combined power optimization and routing method for physical layer security |
Non-Patent Citations (2)
Title |
---|
3GPP. "23887-070-rm".3GPP specs\23_series.2013,全文. * |
安全约束下异构蜂窝网联合负载均衡与资源分配方法;赵鹏飞;彭建华;罗文宇;黄开枝;;信息工程大学学报(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111866861A (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiao et al. | Security in mobile edge caching with reinforcement learning | |
Wang et al. | Learning decentralized wireless resource allocations with graph neural networks | |
Yu et al. | Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios | |
Slimeni et al. | Cooperative Q-learning based channel selection for cognitive radio networks | |
Moscibroda et al. | How optimal are wireless scheduling protocols? | |
Ejaz et al. | Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks | |
CN105187200A (en) | Method For Generating A Key In A Network And User On A Network And Network | |
Ho et al. | Impact of power control on performance of IEEE 802.11 wireless networks | |
CN111866861B (en) | Wireless sensor network secure transmission method and device based on cooperation | |
Gu et al. | Socially aware V2X networks with RIS: Joint resource optimization | |
Wan et al. | An efficient impersonation attack detection method in fog computing | |
CN113271119B (en) | Anti-interference cooperative frequency hopping method based on transmission scheduling | |
Hu et al. | CCMAC: Coordinated cooperative MAC for wireless LANs | |
CN110337116B (en) | Method for judging QoS index of MAC layer converged communication | |
Guo et al. | Adaptive varying contention window MAC protocol based on underwater acoustic propagation delay | |
Jayaraman et al. | A trusted water fall model for efficient data transmission in VANET | |
Park et al. | Noncooperative carrier sense game in wireless networks | |
Pang et al. | Optimal target user selection policy for d2d wireless caching networks | |
CN116032415A (en) | Wireless covert communication method and system combining cooperative interference and relay selection | |
Cho et al. | Cooperative and non-cooperative ALOHA games with channel capture | |
Ju et al. | Learning based and physical-layer assisted secure computation offloading in vehicular spectrum sharing networks | |
Khodaverdizadeh et al. | Improving the performance of HF radio networks in the presence of interference through automatic link establishment with frequency hopping technique | |
CN112312390A (en) | Neighbor discovery method and system | |
JP4757309B2 (en) | Signaling method for distributed distribution of online transmission power in wireless networks | |
Hwang et al. | The capacity of random wireless networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |