CN112601294A - Energy consumption balance-based trusted connection excitation method for wireless Mesh ad hoc network - Google Patents

Energy consumption balance-based trusted connection excitation method for wireless Mesh ad hoc network Download PDF

Info

Publication number
CN112601294A
CN112601294A CN202011315408.XA CN202011315408A CN112601294A CN 112601294 A CN112601294 A CN 112601294A CN 202011315408 A CN202011315408 A CN 202011315408A CN 112601294 A CN112601294 A CN 112601294A
Authority
CN
China
Prior art keywords
node
nodes
backbone
network
combination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011315408.XA
Other languages
Chinese (zh)
Other versions
CN112601294B (en
Inventor
徐乃庭
胡岩峰
廉海明
任岩
王毅
张培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Research Institute Institute Of Electronics Chinese Academy Of Sciences
Original Assignee
Suzhou Research Institute Institute Of Electronics Chinese Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Research Institute Institute Of Electronics Chinese Academy Of Sciences filed Critical Suzhou Research Institute Institute Of Electronics Chinese Academy Of Sciences
Priority to CN202011315408.XA priority Critical patent/CN112601294B/en
Publication of CN112601294A publication Critical patent/CN112601294A/en
Application granted granted Critical
Publication of CN112601294B publication Critical patent/CN112601294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a trusted connection excitation method of a wireless Mesh ad hoc network, which comprises the steps of setting registration qualification of backbone nodes and admission conditions of branch nodes, screening out a backbone network node set with the qualification for constructing a private network and a branch node set allowing borrowing the backbone nodes to access the Internet; calculating the overall cooperation level of the backbone network node networking according to the cooperation willingness and the possessed energy of the dynamic nodes, and screening out a backbone node set which needs to receive a new node; and removing monopoly nodes from the expected receiving node combination of the backbone nodes, determining an effective expected combination, calculating the average expenditure of single nodes of the effective expected combination, determining a winner set and a corresponding access node set, and completing the trusted connection of the wireless ad hoc network based on an excitation method. The network has the characteristics of mutual trust, active cooperation and balanced energy consumption, and the combination will of the network nodes to be accessed and the node combination expected to be received by the backbone nodes are considered.

Description

Energy consumption balance-based trusted connection excitation method for wireless Mesh ad hoc network
Technical Field
The invention relates to the field of wireless ad hoc networks, in particular to a trusted connection excitation method for a wireless Mesh ad hoc network.
Background
The wireless Mesh network does not need the support of basic facilities such as a base station and the like, and constructs a dynamic self-organized wireless multi-hop network by taking a distributed idea as guidance, so that nodes in a network coverage range can flexibly perform high-speed wireless access on the internet and dynamically maintain the contact with other nodes. In the wireless Mesh network, each node has the capability of sending out a wireless signal, the network coverage is greatly widened, and meanwhile, each node has a routing function and can forward data, so that data congestion caused by the increase of access nodes is avoided. In addition, the self-repairing technology of the Mesh network can ensure that when one connection path fails, the network nodes can adaptively search the communication paths for communication, and therefore the stability and reliability of the whole network are improved. The wireless Mesh network can meet the communication requirements of modern military and social development, and therefore has very important research value.
In the wireless Mesh network, as long as a mobile phone is connected to the network, people in a certain area around the mobile phone can build an internet belonging to the mobile phone. However, it is difficult to secure personal information in this communication method, and power consumption of the backbone node is enormous. In addition, the outdoor environment is complex, the difficulty in deploying communication basic equipment is high, and the energy use of wireless network nodes is lack of balance, so that the access of outdoor mobile nodes to the internet and the communication among the nodes face huge challenges. Therefore, balanced energy consumption and reliable access are two important issues that need to be focused on in the wireless ad hoc network.
Assuming that a dynamic Node can be connected to the internet, after the Node is connected to the internet, other dynamic nodes in the power coverage range can surf the internet through the Node hotspot, and communication among the dynamic nodes (smart phones) can be realized. The new dynamic node wants to access the networking to realize the purpose of surfing the internet or communicating with the nodes in the networking, and only the dynamic node meeting the requirements has the qualification of applying to join the networking through the evaluation and the certification of credit and cooperation capacity. The evaluation of the reputation is to ensure the information security of the node communication, and the evaluation of the cooperation capability is to measure whether the current node can better cooperate with other nodes to realize networking communication. Considering that all nodes in a networking access the internet need to forward messages by means of the nodes, the electric energy of the nodes is consumed greatly, and in order to better stimulate the nodes to provide network assistance without privacy, the nodes are required to obtain economic or other benefits. In fact, in a region, more than one dynamic node may have the capability of connecting to the internet (the network radio wave may cover), and meanwhile, a large number of nodes which cannot connect to the internet (the network radio wave is not covered) may exist, so that an effective method is designed to plan the free convenience of the cooperative group to realize the network connection, which meets the idea of the information era.
Disclosure of Invention
The invention aims to provide a trusted connection excitation method for a wireless Mesh ad hoc network.
The technical solution for realizing the purpose of the invention is as follows: a wireless Mesh ad hoc network trusted connection excitation method comprises the following steps:
step 1, setting registration qualification of backbone nodes and admission conditions of branch nodes, screening out a backbone network node set with the qualification of constructing a private network and a branch node set allowing borrowing the backbone nodes to access the Internet;
step 2, calculating the overall cooperation level of the backbone network node networking according to the cooperation willingness and the possessed energy of the dynamic nodes, and screening out a backbone node set which needs to receive a new node;
and 3, removing monopoly nodes from the expected receiving node combination of the backbone nodes, determining an effective expected combination, calculating the average expenditure of single nodes of the effective expected combination, determining a winner set and a corresponding access node set, and completing the trusted connection of the wireless ad hoc network based on the excitation method.
Compared with the prior art, the invention has the following remarkable advantages: the method can effectively stimulate the complete rationality nodes covered by network electromagnetism to construct a networking and assist other nodes covered by non-electromagnetism to carry out network communication, and the networking has the characteristics of mutual trust, active cooperation and energy consumption balance, and considers the combination willingness of the network nodes to be accessed and the node combination expected to be received by the backbone nodes.
Drawings
Fig. 1 is a flowchart of a trusted connection excitation method of a wireless Mesh ad hoc network.
Fig. 2 is a schematic diagram of an excitation mechanism for establishing Mesh end networking and node access.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The invention is suitable for a wireless Mesh network environment, nodes seeking to access the internet all have a routing forwarding function, and dynamic nodes realize network access and information exchange among the nodes through cooperation. The invention aims to design a set of mechanism to stimulate electromagnetic coverage nodes to share hot spots to construct an ad hoc network (similar to a wireless Mesh terminal network), control the safe access of non-electromagnetic coverage nodes to the existing ad hoc network which is published externally by establishing a multi-party interest relationship, fully consider the load of each networking internal node, balance energy consumption and ensure the lasting stability of the ad hoc network. In addition, the invention uses the weighted aggregation idea for adaptive analysis to determine whether a new node needs to be introduced into the current ad hoc network or not so as to improve the overall cooperation capability. With the loss of the energy of the whole node, the communication cooperation capability presents a descending trend, because the fully rational nodes are selfish, the forced requirement of the fully rational nodes for assisting in forwarding messages can enable the nodes to be separated from a team for pursuing benefit balance, and the introduction of new nodes can certainly increase the communication links of the existing nodes, but the excessive addition of the new nodes can enable backbone nodes (the only nodes connected with the internet in each networking mode) to run in an overload mode, and the benefits of the backbone nodes are damaged to a certain extent. Therefore, the invention designs a set of scheme to control the overall cooperation level in the network, and ensures the benefit balance of each party.
The energy consumption balance-based wireless Mesh ad hoc network trusted connection excitation method has the following specific steps, with reference to fig. 1, in the whole detailed operation process:
step 100: the method comprises the steps of counting nodes which are electromagnetically covered by a network in a certain area and are expected to establish networking to play a network access medium, namely backbone nodes, and counting dynamic nodes which are not electromagnetically covered by the network in the certain area and are intentionally accessed to the Internet, namely branch nodes. And the registration qualification of the backbone node and the admission condition of the branch node are determined, and the detailed steps comprise:
dynamic node state initialization 101: assume that there are k dynamic nodes in a certain area, defined as a ═ a1,...,akH, m electromagnetically covered backbone nodes B ═ B1,...,bmCan be connected to the internet and build a private network, there are n non-electromagnetically covered branch nodes C ═ C1,...,cnIntentional access to the internet requires the achievement of a goal by elements in the backbone node B. Wherein the content of the first and second substances,
Figure BDA0002791192780000033
confirm registration and admission qualification of all nodes 102: assuming that the reputation value of a dynamic node is known, a ═ a1,...,akThe reputation sequence corresponding to is R ═ R (a)1),...,r(ak) The reputation value corresponding to any element in the A is required to satisfy ri≥r0The person has the qualification of participating in the task, wherein ri∈R,r0Is a preset reference reputation threshold. Therefore, the backbone network node set with the qualification of constructing a private network is B' ═ B1,...,bm′Therein of
Figure BDA0002791192780000031
And a set of branch nodes allowing access to the internet by borrowing backbone nodesIs C ═ C1,...,cn′Therein of
Figure BDA0002791192780000032
When a node has dangerous behaviors, such as stealing information of others, the corresponding credit value is greatly reduced.
Step 200: in order to ensure the cooperation of nodes in the ad hoc network, the invention designs a set of mechanism to measure the overall cooperation capability of the network, and assists the backbone nodes to decide whether to bid for the addition of new nodes, namely, the multi-backbone nodes compete for the addition of branch nodes into the ad hoc network. Considering the selfishness of the dynamic nodes, assuming that all the dynamic nodes in the A are associated with a subjective cooperation willingness value, combining the weighted aggregation idea and the energy of each node, the method carries out expansion and extension, can quantify the overall cooperation capability, and presets an overall cooperation threshold { xi (b) according to the needs of the backbone nodesi)|biE.g. B'. When with biIf the overall cooperation capability level of all nodes in the network of the backbone nodes is smaller than the threshold, the receiving new nodes promote the overall cooperation level (the addition of the new nodes will increase part of the node path selection range), otherwise, the current node group cooperation communication process is harmonious, and the new nodes can be considered to be temporarily stopped receiving. The cooperation capability represents the cooperation strength of the dynamic nodes in network activities (such as accessing the network by means of backbone nodes), and measures whether the branch nodes can actively help other nodes to forward messages. The specific principle is contained in fig. 2, and the detailed steps include:
individual node cooperation degree quantization 201: defining the coordination intention sequence corresponding to all the dynamic nodes in the A as theta ═ theta (a)1),...,θ(ak) The percentage of remaining energy series is E ═ E (a)1),...,e(ak) }, node aiThe collaboration level of epsilon A is defined as x (a)i) The x (a) is easily obtained by fully considering the coordination willingness and the remaining energy percentage of the nodesi)=θ(ai)αe(ai)βWhere α and β are positive control factors, depending on the bias of the backbone nodes.
NetworkingOverall degree of collaboration quantization 202: any rational node a in node set A in a certain regioniThe phenomenon that the cooperation forwarding of information is rejected may occur due to the fact that the E is analyzed from the angle of personal interest, and therefore the method defines rational nodes aiThe probability of selecting the information to assist in forwarding is p (a)i) Then the probability of rejecting the cooperative forwarding of information is 1-p (a)i) Wherein p (a)i)=x(ai)∈[0,1]. For backbone node bjConstructed networking, let bjThere is a set of branch nodes S (b)j) Also called winner set, combines with weighted aggregation idea to expand and is based on S (b)j) Level of cooperation and bjTolerable degree of uncooperative 1- ξ (b)j) Around bjThe unique network established can draw the following weight aggregation conclusion:
Figure BDA0002791192780000041
it is easy to find from the above formula that when there is a new node join or S (b)j) ω (b) when the percentage of remaining energy of the elements in the winner set changesj) Will fluctuate in value, at which point backbone node b will fluctuatejThe following choices will be made:
when in use
Figure BDA0002791192780000042
When, backbone node b is illustratedjThe constructed network has a state of good overall cooperation, bjThe backbone nodes consider load balance and group benefits, select to keep the current state, do not receive new nodes any more, network congestion can be caused due to excessive introduction of the new nodes, and the rational branch nodes select to separate from networking groups from the perspective of personal income to search for new groups.
On the contrary, the method can be used for carrying out the following steps,
Figure BDA0002791192780000043
when, the description is currently with bjThe overall cooperation level of the core network is reduced, and a new branch needs to be introduced for biddingNodes to maintain the level of the overall cooperation state, otherwise, rational branch nodes can be lost due to the non-operation of partial nodes, and the backbone node b is damagedjThe benefit (massive loss of branch nodes, which will cause b)jA reduction in revenue).
Step 300: based on the backbone node sequence and the free branch node sequence which satisfy the auction requirement and are involved in the step 200, an excitation electromagnetic coverage node B' is designed1,...,bm′The mechanism to build a private network, and fully consider C ═ C1,...,cn′And (4) the willingness of combining branch nodes to enter the network (the nodes in the C' are not added into the networking group), which accords with the typical combined bidding mode, the free branch nodes and the backbone nodes form a sealed reverse combined auction model, the free branch nodes are combined by themselves and give a paid price which can be accepted in mind, and the paid price is an acceptable cost given aiming at the predicted possible consumption flow of the free branch nodes. And the backbone node also gives the node combination which is expected to be obtained by auction and the real price (the price is also for the flow which is needed to be consumed by the branch node), the mechanism related by the invention can ensure that the completely rational backbone node gives the real price of the backbone node, because the unreal price can make the backbone node become the loser of the auction.
The invention utilizes the idea of mean value quotation of a combined auction incentive mechanism to carry out evolution expansion, the related single auction satisfies monotonicity and the individual transaction price is a critical value, if the individual has an opportunistic behavior, the auction is randomly quotated, and the auction is likely to be a loser of the auction activity. The excitation mechanism designed by the invention accords with Myerson's rule and has effective excitation. The detailed principle is shown in fig. 2.
The combined bidding mechanism parameter definition 301: presence of C ═ C1,…,cn′The non-electromagnetic coverage node element is expected to pass through B ═ B1,…,bm′Networking access internet constructed by backbone nodes, and in order to promote effective cooperation between the backbone nodes and the branch nodes, C ═ C1,…,cn′The node elements in the } need to pay backbone node remuneration for incentive B' ═ B1,…,bm′Participate in the collaboration. B' ═ B1,…,bm′The power coverage of the skeleton node is limited, and the invention assumes that B ═ B1,…,bm′In the node power coverage and intentionally access private networking, as a free branch node set
Figure BDA0002791192780000051
Wherein
Figure BDA0002791192780000052
Represents biPower covered and intentional introduction of biNode set of the constructed network, and for any backbone node biThere is at least one intended combination of receiving nodes for e B', for ease of description, the invention defines BiThe combination of the reported reception intentions is
Figure BDA0002791192780000053
Figure BDA0002791192780000054
Wherein N (b)i) Represents biThe number of sets to be auctioned, backbone node set B' ═ B1,…,bm′The corresponding expected receiving node combination sequence is:
Figure BDA0002791192780000055
combining sequences with an intended receiving node
Figure BDA0002791192780000058
The corresponding sealing quotation is
Figure BDA0002791192780000056
Figure BDA0002791192780000057
biThe expected receiving node set and the bid sequence are
Figure BDA0002791192780000061
Further, C ═ { C ═ C1,...,cn′The combination of intentions of the elements in } is
Figure BDA0002791192780000062
Wherein
Figure BDA0002791192780000063
Free branch node network access intention combination
Figure BDA0002791192780000064
The corresponding psychological valence sequence is V ═ V1,...,vγ}。
Judging monopoly nodes 302: for a free branch node contained in C', there may exist a certain node CjE C' is only biE B' unique power cover, then the present invention defines that this case is monopolized because B is now at this pointiThere is no competitor. If free branch node cjFor a great desire to gain access to the internet, the backbone node biPossibly for a roaming price in order to obtain a richer return. For this case, the present invention clarifies the following execution flow:
(1) in order to guarantee the effectiveness of an incentive mechanism and maintain the order of the market, the invention selects to temporarily reject free branch node combinations containing monopoly nodes. Defining the set of ridge free nodes as CmonThe non-monopolized free node set is CnomoSuppose node element cjIs collected
Figure BDA0002791192780000065
Including a number of times of
Figure BDA0002791192780000066
Is easy to obtain
Figure BDA0002791192780000067
Figure BDA0002791192780000068
Wherein in order to guarantee the backbone node biMalicious circumvention monopoly (because each backbone node can submit a plurality of expected receiving node sets, if a plurality of sets submitted by a backbone node repeatedly contain a certain node, the situation that the node competes with the backbone node itself can be caused), engagement is given
Figure BDA0002791192780000069
There is no intersection of submitted expectation sets, i.e.
Figure BDA00027911927800000610
While
Figure BDA00027911927800000611
The intention combination of the nodes not including the monopolized free branches is
Figure BDA00027911927800000612
The intention combination of the monopolizing free branch nodes is
Figure BDA00027911927800000613
(2) To is directed at
Figure BDA00027911927800000614
The free branch node intention combination in (1) opens up a bidding auction campaign.
(3) Aiming at intention combination containing monopoly dissociative branch nodes
Figure BDA00027911927800000615
Taking negotiation or recombination intention combination, abandoning monopoly branch nodes, and recombining. Suppose there is a certain node c containing a monopoly disjoint branchlIn combination with (1)
Figure BDA00027911927800000616
Then
Figure BDA00027911927800000617
After the change
Figure BDA00027911927800000618
The auction can be selected directly or combined with other non-monopolized nodes and then opened publicly.
Determine winner set 303:
Figure BDA00027911927800000619
and for the network-accessing intention combination without monopolizing the free branch nodes, determining a winner set according to the effective expected combination average expenditure of the backbone nodes, wherein the winner set is the backbone nodes which successfully acquire the free branch nodes to join the network. The invention here describes what is effectively expected to combine the average costs of the single nodes, which can be obtained from step 301, of the backbone node biIs combined into a desired access node
Figure BDA00027911927800000620
Figure BDA00027911927800000621
Non-monopolized node combination C defined according to step 302nomoAssuming that the non-monopolized node element set which is not accessed into the network currently is CrestThen, then
Figure BDA0002791192780000071
When present, is
Figure BDA0002791192780000072
At a price of o (b)i)jBidding, then the effective expected combined single-node average payout is:
Figure BDA0002791192780000073
in order to avoid cheating of backbone nodes, all intention sets submitted by the backbone nodes in a sealing way only have one winning bid (if the probability of multiple winning bids exists, the mechanism has the factor of cooperative game), and the detailed steps for determining the winner set are as follows:
(1) non-monopolized node set C not accessed to networkingrestIs C in the initial staterest←CnomoAnd the backbone nodes which participate in the auction and have not been successfully auctioned are integrated into BrestStir No. B', the corresponding intention set is
Figure BDA0002791192780000074
The initial state of the winner set is defined as
Figure BDA0002791192780000075
The corresponding expected access node set and real access node set sequences are respectively
Figure BDA0002791192780000076
Figure BDA0002791192780000077
The mapping sequence of the winner set and the corresponding access node set is
Figure BDA0002791192780000078
(2) To pair
Figure BDA0002791192780000079
Middle set element R (b)i)jCalculating the average expenditure of the effective expected combination single node:
Figure BDA00027911927800000710
(3) calculating backbone nodes corresponding to the average expenditure of the minimum effective expected combination single node:
Figure BDA00027911927800000711
(4) counting a winner set, a corresponding access node set and a mapping sequence:
Figure BDA00027911927800000712
Figure BDA00027911927800000713
(5) removing the branch node combination which has successfully accessed the network:
Figure BDA00027911927800000714
(6) is removed from*There is a set of all desired access nodes associated:
Figure BDA00027911927800000715
repeating the steps (2), (3), (4) and (5) until CrestIs empty, at this time
Figure BDA00027911927800000720
Namely the set of the winner is obtained,
Figure BDA00027911927800000716
the mapping sequence of the winner and the access point set is that for the corresponding access point set
Figure BDA00027911927800000717
Determining a final transaction price 304: the melarson's law demonstrates that this mechanism is valid and has incentive implications if the single auction satisfies monotonicity and the individual transaction price is marginal. The invention here calculates the critical price (the price of the benefit that the backbone node wants to obtain) for each winner for the set of access nodes. The detailed steps for determining the critical transaction price are as follows:
(1) for the winner set in step 303
Figure BDA00027911927800000718
Defining a corresponding transaction price mapping sequence as Q, and judging that the quotation mapping sequence free from individual control is Q';
(2) select any winner
Figure BDA00027911927800000719
The desired set according to step 301
Figure BDA00027911927800000721
Staging an expected set
Figure BDA0002791192780000081
(Note: winners in the calculation process correspond to a temporarily defined expectation set, e.g.
Figure BDA0002791192780000082
(3) Initializing temporary winner set store sequences
Figure BDA0002791192780000083
Crest←CnomoThe remaining set of backbone nodes is Brest←B′;
(4) By the desired node set in step 303
Figure BDA0002791192780000084
The node element combinations initiated by the backbone nodes and actually participating in the auction can be known, and the current minimum price is calculated according to the following steps:
Figure BDA0002791192780000085
Figure BDA0002791192780000086
update the final transaction price to
Figure BDA0002791192780000087
Wherein R (b)τ)exIn step 304Described in detail
Figure BDA0002791192780000088
Winner in sequence bτA corresponding expected offer combination;
(5) giving real quotation for exciting the backbone nodes and calculating the critical point price of the backbone node income
Figure BDA0002791192780000089
Determining prices to break away from individual control
Figure BDA00027911927800000810
(6) Updating
Figure BDA00027911927800000811
If it is
Figure BDA00027911927800000812
Then
Figure BDA00027911927800000813
(7) Repeating the steps (4) and (5) until
Figure BDA00027911927800000823
At this time q (b)τ) Has the value of bτThe transaction price, Q ← Q £ U (b), which can be obtainedτ,q(bτ)),Q′←Q′∪(bτ,q′(bτ));
(8) Jumping to the step (2) until the traversal is finished
Figure BDA00027911927800000824
And obtaining a complete winner and a trading price mapping sequence Q by all winners (backbone node auction winners).
Excitation mechanism effectiveness control 305: the non-monopolized combined sequence from step 302
Figure BDA00027911927800000814
Figure BDA00027911927800000815
And the combination of intention of accessing network of the free branch node described in step 301
Figure BDA00027911927800000816
The bearable price sequence of the branch node is V ═ V1,...,vγBecause of
Figure BDA00027911927800000817
Can easily obtain
Figure BDA00027911927800000818
Corresponding price sequence, defined as V*Total accepted price
Figure BDA00027911927800000819
The upper limit of the effective quotation is easily obtained according to the Q' mapping sequence in step 304
Figure BDA00027911927800000820
If v is*<q', which indicates that the free branch node or the backbone node is not enough to support the effective operation of the mechanism, seeking price adjustment and re-developing the auction activity.
Determining the actual cost paid by the branch node 306: from the bid mapping sequence Q in step 304, a winner set is easily derived
Figure BDA00027911927800000821
The total value required for providing the service is
Figure BDA00027911927800000822
And dividing the price to be borne by the individual according to the flow demand of the branch node and the service experience of the backbone node. Suppose a known winner backbone node biHas an experience degree of t (b)i) Accessed backbone node biBranch node c for establishing networkjFlow demand is f (c)j) Then, thencjThe price that an individual needs to bear is according to g (c)j)=t(bi)ζf(cj)ηζ and η are known and adjustable, depending on the bias of participating auction branch nodes. Computing all already accessed network nodes cjCorresponding weight g (c)j) Dividing the winner set
Figure BDA0002791192780000091
Total value required for providing service
Figure BDA0002791192780000092
If present, part of CnomoThe node(s) abandon the auction arrangement, then go to step 302 and resume the "auction" activity of the node network connection.
The invention also provides a wireless Mesh ad hoc network trusted connection excitation system, and the wireless Mesh ad hoc network trusted connection excitation is carried out based on the method.
A computer device comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the method, and the trusted connection excitation of the wireless Mesh ad hoc network is carried out.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the above-mentioned method for trusted connection activation of a wireless Mesh ad hoc network.
It is understood that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A wireless Mesh ad hoc network trusted connection excitation method is characterized by comprising the following steps:
step 1, setting registration qualification of backbone nodes and admission conditions of branch nodes, screening out a backbone network node set with the qualification of constructing a private network and a branch node set allowing borrowing the backbone nodes to access the Internet;
step 2, calculating the overall cooperation level of the backbone network node networking according to the cooperation willingness and the possessed energy of the dynamic nodes, and screening out a backbone node set which needs to receive a new node;
and 3, removing monopoly nodes from the expected receiving node combination of the backbone nodes, determining an effective expected combination, calculating the average expenditure of single nodes of the effective expected combination, determining a winner set and a corresponding access node set, and completing the trusted connection of the wireless ad hoc network based on the excitation method.
2. The method for stimulating the trusted connection of the wireless Mesh ad hoc network according to claim 1, wherein in step 1, the registration qualification of the backbone nodes and the admission conditions of the branch nodes are set, and a backbone network node set with the qualification for constructing a private network and a branch node set allowing the borrowing of the backbone nodes to access the internet are screened out, and the specific method is as follows:
dynamic node state initialization 101: assume that there are k dynamic nodes in a certain area, defined as a ═ a1,...,akThere are m electromagnetically covered backbone nodes B ═ B1,...,bmMay be connected to the internet and build a private network, and n non-electromagnetically covered branch nodes C ═ C1,...,cnIntentional access to the internet requires the achievement of a goal by means of elements in the backbone node B, where,
Figure FDA0002791192770000011
confirm registration and admission qualification of all nodes 102: assuming that the reputation value of a dynamic node is known, a ═ a1,...,akThe reputation sequence corresponding to is R ═ R (a)1),...,r(ak) The reputation value corresponding to any element in the A is required to satisfy ri≥r0The person has the qualification of participating in the task, wherein ri∈R,r0Is a preset reference credit threshold value;
according to the information, the finally obtained backbone network node set with the qualification of constructing the private network is B' ═ B1,...,bm′Therein of
Figure FDA0002791192770000012
And a set of branch nodes allowing the internet access by the backbone node is C ═ C1,...,cn′Therein of
Figure FDA0002791192770000013
3. The method for exciting the trusted connection of the wireless Mesh ad hoc network according to claim 2, wherein in the step 2, the overall cooperation level of the backbone network node networking is calculated according to the cooperation intention and the possessed energy of the dynamic nodes, and a backbone node set which needs to receive a new node is screened out, and the method specifically comprises the following steps:
individual node cooperation degree quantization 201: defining the coordination intention sequence corresponding to all the dynamic nodes in the A as theta ═ theta (a)1),...,θ(ak) The percentage of remaining energy series is E ═ E (a)1),...,e(ak) }, node aiThe collaboration level of epsilon A is defined as x (a)i) Fully considering the coordination willingness and the remaining energy percentage of the nodes to obtain x (a)i)=θ(ai)αe(ai)βWherein α and β are positive control factors;
networking overall cooperation degree quantification 202: defining rational nodes aiThe probability of selecting the information to assist in forwarding is p (a)i) Then the probability of rejecting the cooperative forwarding of information is 1-p (a)i) Wherein p (a)i)=x(ai)∈[0,1]For backbone node bjConstructed networking, let bjThere is a set of branch nodes S (b)j) Then S (b) is obtainedj) The collaboration level of (c) is:
Figure FDA0002791192770000021
according to S (b)j) Level of cooperation and bjTolerable degree of uncooperative 1- ξ (b)j) In which ξ (b)j) Is b isjTolerable degree of collaboration, bjThe following judgment is made: when in use
Figure FDA0002791192770000022
When, backbone node b is illustratedjThe constructed network has a state of good overall cooperation, bjThe backbone node selects to keep the current state and does not receive a new node any more; on the contrary, the method can be used for carrying out the following steps,
Figure FDA0002791192770000023
when, the description is currently with bjThe overall cooperation level of the networking serving as the core is reduced, and a new branch node needs to be introduced for bidding so as to maintain the overall cooperation state level.
4. The excitation method for the trusted connection of the wireless Mesh ad hoc network according to claim 3, wherein in step 3, monopoly nodes are removed from the expected receiving node combinations of the backbone nodes, effective expected combinations are determined, the average expenditure of the single nodes of the effective expected combinations is calculated, a winner set and a corresponding access node set are determined, and the trusted connection of the wireless Mesh ad hoc network based on the excitation method is completed, and the specific method is as follows:
the combined bidding mechanism parameter definition 301: suppose that B' is { B }1,…,bm′In the node power coverage and intentionally access private networking, as a free branch node set
Figure FDA0002791192770000024
Wherein
Figure FDA0002791192770000025
Represents biPower covered and intentional introduction of biA node set of the constructed network;
for any backbone node biE B' has at least one receiving node intention combination, definition BiThe combination of the reported reception intentions is
Figure FDA0002791192770000026
And is
Figure FDA0002791192770000027
Submitted expectation setThere is no intersection, i.e.
Figure FDA0002791192770000028
Wherein N (b)i) Represents biThe number of sets to be auctioned, backbone node set B' ═ B1,…,bm′The corresponding expected receiving node combination sequence is:
Figure FDA0002791192770000029
combining sequences with an intended receiving node
Figure FDA00027911927700000210
The corresponding sealing quotation is
Figure FDA00027911927700000211
Figure FDA0002791192770000031
biThe expected receiving node set and the bid sequence are
Figure FDA0002791192770000032
In addition, for a set C' of branch nodes that allow access to the internet by borrowing a backbone node, { C } C1,...,cn′Define the combination of the access intention of the free branch node as
Figure FDA0002791192770000033
Wherein
Figure FDA0002791192770000034
Figure FDA0002791192770000035
Free branch node network access intention combination
Figure FDA0002791192770000036
The corresponding psychological valence sequence is V ═ V1,...,vγ};
Judging monopoly nodes 302: defining the set of ridge free nodes as CmonThe non-monopolized free node set is CnomoSuppose node element cjIs collected
Figure FDA0002791192770000037
Including a number of times of
Figure FDA0002791192770000038
Then
Figure FDA0002791192770000039
While
Figure FDA00027911927700000310
The intention combination of the nodes not including the monopolized free branches is
Figure FDA00027911927700000311
The intention combination of the monopolizing free branch nodes is
Figure FDA00027911927700000312
According to the above-mentioned judgement result, for
Figure FDA00027911927700000313
The free branch node intention combination in the auction system can be directly added into an effective expected combination for bidding auction activities; to combinations of intentions comprising monopolized free branch nodes
Figure FDA00027911927700000314
The set in (1) needs to adopt a negotiation or recombination intention combination, abandons the monopoly branch node and then directly adds an effective expected combination, or recombinesAdding a valid expectation combination for bidding auction activities;
determine winner set 303: according to the average expenditure of the effective expected combination single nodes of the backbone nodes, a winner set and a corresponding access node set are determined, and the detailed steps are as follows:
initializing a non-monopolized node set C that has not been accessed into a networkingrestA backbone node set B which is a non-monopolized node set and participates in auction and has not been successfully auctionedrestCorresponding intention set for backbone node set needing to receive new node obtained in step 2
Figure FDA00027911927700000315
Initializing a winner set for the intention set of the backbone node set needing to receive the new node obtained in the step 2
Figure FDA00027911927700000316
Is composed of
Figure FDA00027911927700000317
Corresponding desired access node set
Figure FDA00027911927700000318
And real access node set sequence
Figure FDA00027911927700000329
Are respectively as
Figure FDA00027911927700000319
Winner set and corresponding access node set mapping sequence
Figure FDA00027911927700000320
Is composed of
Figure FDA00027911927700000333
To pair
Figure FDA00027911927700000321
Middle set element R (b)i)jCalculating the average expenditure of the effective expected combination single nodes, wherein the backbone node corresponding to the average expenditure of the minimum effective expected combination single node is the backbone node which successfully acquires the free branch node and joins the network, and updating C according to the average expenditurerest
Figure FDA00027911927700000334
And
Figure FDA00027911927700000324
the formula for calculating the average expenditure of the effective expected combination single nodes is as follows:
Figure FDA00027911927700000325
repeating the previous step until CrestIs empty, at this time
Figure FDA00027911927700000326
Namely the set of the winner is obtained,
Figure FDA00027911927700000327
the mapping sequence of the winner and the access point set is that for the corresponding access point set
Figure FDA00027911927700000328
5. The method of claim 4, further comprising a process 304 of determining a final transaction price, namely calculating a critical price for each winner for the set of access nodes, the detailed steps are as follows:
(1) for the winner set in step 303
Figure FDA0002791192770000041
Defining a corresponding transaction price mapping sequence as Q, and judging that the quotation mapping sequence free from individual control is Q';
(2) select any winner
Figure FDA0002791192770000042
Initializing a scratch expected set
Figure FDA0002791192770000043
Is composed of
Figure FDA0002791192770000044
Winners in the calculation process correspond to a temporarily defined desired set, e.g.
Figure FDA0002791192770000045
(3) Initializing temporary winner set store sequences
Figure FDA0002791192770000046
Initializing non-monopolized node element set C which is not accessed into the network at presentrestInitializing a remaining set B of backbone nodes for a non-monopolized node setrestA backbone node set which needs to receive a new node and is obtained in the step 2;
(4) according to the desired node set in step 303
Figure FDA0002791192770000047
Determining the node element combination which is initiated by the backbone node and really participates in the auction, and calculating the current minimum price according to the following steps:
Figure FDA0002791192770000048
Figure FDA0002791192770000049
updating the final trading valueLattice is
Figure FDA00027911927700000410
Wherein R (b)τ)exIs as described in step 304
Figure FDA00027911927700000411
Winner in sequence bτA corresponding expected offer combination;
(5) calculating a critical point price for backbone node revenue
Figure FDA00027911927700000412
Updating prices judged to be free from individual control
Figure FDA00027911927700000413
(6) Updating
Figure FDA00027911927700000414
If it is
Figure FDA00027911927700000415
Then
Figure FDA00027911927700000416
(7) Repeating the steps (4) and (5) until
Figure FDA00027911927700000417
At this time q (b)τ) Has the value of bτThe transaction price, Q ← Q £ U (b), which can be obtainedτ,q(bτ)),Q′←Q′∪(bτ,q′(bτ));
(8) Jumping to the step (2) until the traversal is finished
Figure FDA00027911927700000420
And obtaining a complete winner and a trading price mapping sequence Q.
6. The method for exciting the trusted connection of the wireless Mesh ad hoc network according to claim 5, further comprising an excitation mechanism validity control process 305, specifically comprising:
assume that the non-monopoly combination sequence of step 302 is
Figure FDA00027911927700000418
The combination of the access intents of the free branch nodes in step 301 is
Figure FDA00027911927700000419
The bearable price sequence of the branch node is V ═ V1,...,vγBecause of
Figure FDA0002791192770000051
Can obtain
Figure FDA0002791192770000052
Corresponding price sequence, defined as V*Total accepted price
Figure FDA0002791192770000053
The upper limit value of the effective quotation of the mechanism is obtained according to the Q' mapping sequence in the step 304
Figure FDA0002791192770000054
If v is*<q', which indicates that the free branch node or backbone node quoted at this time is not enough to support the effective operation of the mechanism, needs to seek price adjustment and re-opens the auction activity, otherwise indicates that the free branch node or backbone node quoted at this time can support the effective operation of the mechanism.
7. The method for exciting the trusted connection of the wireless Mesh ad hoc network according to claim 5, further comprising a process 306 of determining an actual cost paid by the branch node, wherein the method specifically comprises:
(1) determining a winner set according to the price-reporting mapping sequence Q in step 304
Figure FDA0002791192770000055
The total value required for providing the service is
Figure FDA0002791192770000056
(2) Dividing the price to be borne by the individual according to the flow demand of the branch node and the service experience of the backbone node, and assuming the known winner backbone node biHas an experience degree of t (b)i) Accessed backbone node biBranch node c for establishing networkjFlow demand is f (c)j) Then c isjThe price that an individual needs to bear is according to g (c)j)=t(bi)ζf(cj)ηζ and η are known and adjustable, depending on the bias of participating auction branch nodes;
(3) computing all already accessed network nodes cjCorresponding weight g (c)j) Thereafter, the winner set is partitioned accordingly
Figure FDA0002791192770000058
Total value required for providing service
Figure FDA0002791192770000057
The actual payment cost of the branch node can be obtained.
8. A wireless Mesh ad hoc network trusted connection excitation system, characterized in that, based on the method of any one of claims 1-7, the wireless Mesh ad hoc network trusted connection excitation is performed.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1-7 when executing the computer program, performing a wireless Mesh ad hoc network trusted connection stimulus.
10. A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, implements the method of any of claims 1-7 for wireless Mesh ad hoc network trusted connection actuation.
CN202011315408.XA 2020-11-20 2020-11-20 Wireless Mesh ad hoc network trusted connection excitation method based on energy consumption balance Active CN112601294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011315408.XA CN112601294B (en) 2020-11-20 2020-11-20 Wireless Mesh ad hoc network trusted connection excitation method based on energy consumption balance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011315408.XA CN112601294B (en) 2020-11-20 2020-11-20 Wireless Mesh ad hoc network trusted connection excitation method based on energy consumption balance

Publications (2)

Publication Number Publication Date
CN112601294A true CN112601294A (en) 2021-04-02
CN112601294B CN112601294B (en) 2022-06-28

Family

ID=75183523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011315408.XA Active CN112601294B (en) 2020-11-20 2020-11-20 Wireless Mesh ad hoc network trusted connection excitation method based on energy consumption balance

Country Status (1)

Country Link
CN (1) CN112601294B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517479A (en) * 2017-08-17 2017-12-26 湖北工业大学 A kind of wireless relay network dynamic exciting Mechanism Design method based on contract theory
CN109379739A (en) * 2018-09-28 2019-02-22 嘉兴学院 A kind of credible cooperating service method of sea wireless Mesh netword

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517479A (en) * 2017-08-17 2017-12-26 湖北工业大学 A kind of wireless relay network dynamic exciting Mechanism Design method based on contract theory
CN109379739A (en) * 2018-09-28 2019-02-22 嘉兴学院 A kind of credible cooperating service method of sea wireless Mesh netword

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NAITING XU,ET AL.: "Privacy-Preserving Auction-based Incentive Mechanism for Mobile Crowdsensing Systems", 《IEEE XPLORE》 *
肖迎春,等: "基于混合组合双向拍卖的网格资源分配方案", 《计算机科学》 *

Also Published As

Publication number Publication date
CN112601294B (en) 2022-06-28

Similar Documents

Publication Publication Date Title
Sun et al. Social-aware incentive mechanisms for D2D resource sharing in IIoT
Chen et al. Tarco: Two-stage auction for d2d relay aided computation resource allocation in hetnet
Luong et al. A machine-learning-based auction for resource trading in fog computing
Hu et al. Game theoretic approaches for wireless proactive caching
CN111262940A (en) Vehicle-mounted edge computing application caching method, device and system
Moniruzzaman et al. Blockchain and cooperative game theory for peer-to-peer energy trading in smart grids
Qian et al. Spectrum trading in cognitive radio networks: An agent-based model under demand uncertainty
Liu et al. Role of gifts in decision making: An endowment effect incentive mechanism for offloading in the IoV
Shi et al. Mpcstoken: Smart contract enabled fault-tolerant incentivisation for mobile p2p crowd services
CN109831788A (en) Internet resources dynamic allocation method and system for edge access scene
Ji et al. A game theoretical framework for dynamic pricing-based routing in self-organized MANETs
Zhang et al. Mining task offloading in mobile edge computing empowered blockchain
CN112601294B (en) Wireless Mesh ad hoc network trusted connection excitation method based on energy consumption balance
CN112887435B (en) Method for improving task unloading cooperation rate in edge calculation
Zhang et al. A vehicular task offloading method with eliminating redundant tasks in 5g hetnets
Li et al. A three-stage incentive formation for optimally pricing social data offloading
Maghsudi et al. Distributed task management in cyber-physical systems: How to cooperate under uncertainty?
CN108901003B (en) Power distribution method based on social relationship in D2D collaborative network scene
Jiang et al. Combinatorial double auction for resource allocation with differential privacy in edge computing
Jiang et al. A truthful double auction framework for promoting femtocell access
Yang et al. Incorporating user willingness in contract-based incentive mechanism for D2D cooperative data forwarding
Liu et al. A novel game based incentive strategy for opportunistic networks
Zhang et al. Pricing, caching selection, and content delivery in wireless networks: a hierarchical approach
CN106851672B (en) Method and device for constructing data packet forwarding alliance game payment model
Yang et al. A service negotiation model for selfish nodes in the mobile ad hoc networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant