CN114302490B - Relay power setting method for guaranteeing information transmission safety by considering relay trust - Google Patents
Relay power setting method for guaranteeing information transmission safety by considering relay trust Download PDFInfo
- Publication number
- CN114302490B CN114302490B CN202111671391.6A CN202111671391A CN114302490B CN 114302490 B CN114302490 B CN 114302490B CN 202111671391 A CN202111671391 A CN 202111671391A CN 114302490 B CN114302490 B CN 114302490B
- Authority
- CN
- China
- Prior art keywords
- relay
- relay node
- rate
- receiver
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 152
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004364 calculation method Methods 0.000 claims abstract description 36
- 238000005457 optimization Methods 0.000 claims abstract description 30
- 239000000654 additive Substances 0.000 claims description 16
- 230000000996 additive effect Effects 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 5
- 238000012821 model calculation Methods 0.000 claims description 4
- 239000000835 fiber Substances 0.000 claims 2
- 230000006854 communication Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a relay power setting method and device for guaranteeing information transmission safety by considering relay trust, wherein the method comprises the following steps: dividing the message transmission process into a first time slot and a second time slot, and combining basic configuration information to obtain a corresponding message rate formula; setting the relay trust degree of the relay node, combining a message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints; in the optimization model, comprehensively calculating a conditional formula of relay trust degree and a calculation formula of relay transmission power; and combining the derived relation formula between the relay trust degree and the relay transmission power with the actual relay trust degree to obtain the corresponding minimum actual transmission power. By adopting the method, the transmitting power of the relay node can be set under the condition of known relay trust degree in the actual situation, so that the interference power is minimum to ensure the safe transmission of the information.
Description
Technical Field
The invention relates to the technical field of information and communication engineering, in particular to a relay power setting method and device for guaranteeing information transmission safety by considering relay trust.
Background
With the development of the internet of things, information is explosively increased, and the security of data transmission is increasingly serious. Along with the improvement of computing power, the traditional information encryption mode based on algorithm complexity is not suitable for the existing network any more, physical layer security is based on interception of channels, and security transmission of information is realized by adopting physical layer technologies such as secret coding, cooperative interference and the like, so that the method becomes an important supplement of the traditional security system, and the trust degree has a critical influence on communication security.
However, in the actual communication process, many selfish users exist, namely, information eavesdroppers can simulate relay nodes to interfere with information, so that information eavesdropping is performed, and the information safety of the users is affected.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a relay power setting method and device for guaranteeing information transmission safety by considering relay trust.
The embodiment of the invention provides a relay power setting method for guaranteeing information transmission safety by considering relay trust, which comprises the following steps:
acquiring basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power;
dividing a message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining the basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot;
setting the relay trust degree of the relay node, combining the message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints;
in the optimization model, the maximum message rate of the receiver receives information is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay sending power are comprehensively calculated on the condition that the message rate of the relay node receives information is larger than the message rate of the receiver and the message rate of the relay node receives information is smaller than the message rate of the receiver;
and according to the condition formula of the relay trust degree and the calculation formula of the relay transmission power, the deduced relation formula between the relay trust degree and the relay transmission power is combined with the actual relay trust degree corresponding to the actual safety requirement to obtain the minimum actual transmission power of the corresponding relay node.
In one embodiment, the method further comprises:
in the first time slot, the sender sends information to the relay node i, and the message rate received by the relay node i is as follows:
wherein R is si For the message rate received by relay node i, P s Power g for transmitting information to relay node i for sender si For the channel coefficients between the sender and the relay node i,is the variance of the additive white gaussian noise at relay node i;
in the first time slot, the sender sends information to the relay node i, and the rate of the information received by the eavesdropper is as follows:
wherein y is e1 Rate of messages received for eavesdroppers, g se For the channel coefficient between sender and eavesdropper, x is the transmissionInformation signal transmitted by a person, n e Additive white gaussian noise at an eavesdropper;
in the second time slot, the relay node i sends information to the receiver, and the rate of the received information received by the receiver is as follows:
wherein R is id For the rate of messages received by the receiver, P i c Power g for transmitting information to receiver for relay node i id For the channel coefficients between the relay node i and the receiver,is the variance of additive white gaussian noise at the receiver;
in the second time slot, the relay node i sends information to the receiver, and the rate of the information received by the eavesdropper is as follows:
wherein y is e2 Rate of messages received for eavesdroppers, g ie For the channel coefficient, x, between the relay node i and the eavesdropper c An information signal transmitted for the relay node i.
In one embodiment, the method further comprises:
the total message rate overheard by an eavesdropper in the first time slot and the second time slot is calculated as follows:
wherein sigma e Variance of additive gaussian white noise at an eavesdropper;
setting the trust of the relay node i to alpha i The relay node i uses the probability alpha i Forwarding sender information to receiverThe average security rate of the information received by the receiver is that
In one embodiment, the optimization model includes:
the three constraint conditions included in the optimization model respectively comprise:
constraint 1:
constraint 2:0 < P i c ≤P max
Constraint 3: alpha is 0 to or less i ≤1
Wherein constraint 1 is an average privacy rate constraint,is the lower limit of the average privacy rate;
constraint 2 is relay transmit power constraint, P max The upper limit of the transmission power of the relay node i;
constraint 3 is a relay confidence constraint.
In one embodiment, the method further comprises:
condition 1: the message rate of the relay node for receiving the information is larger than that of the receiver, R si >R id ;
If the condition 1 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by the relay node i and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain the satisfaction of relay trust under the condition of 1The condition and the corresponding relay transmitting power take on values;
condition 2: the message rate of the relay node receiving the information is smaller than that of the receiver, R si ≤R id ;
If the condition 2 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by a receiver and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain a relay trust degree meeting condition and a corresponding relay transmitting power value under the condition of condition 2.
In one embodiment, the method further comprises:
combining the condition that the relay trust degree satisfies the condition and the corresponding relay transmission power value under the condition 1 and the condition 2 to obtain a conditional formula of the relay trust degree:
the calculation formula of the relay transmission power of the relay node i:
in one embodiment, the basic configuration information includes:
the method comprises the steps of transmitting a channel basic parameter, an average secret rate lower limit and a relay transmission power, wherein the relay transmission power is a relay transmission power upper limit.
The embodiment of the invention provides a relay power setting device for guaranteeing information transmission safety by considering relay trust, which comprises the following components:
the acquisition module is used for acquiring basic configuration information of the current network, wherein the basic configuration information comprises relay transmission power;
the dividing module is used for dividing the message transmission process into a first time slot sent by a sender to a relay node and a second time slot sent by the relay node to a receiver, and combining the basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot;
the model building module is used for setting the relay trust degree of the relay node, combining the message rate formula to obtain an average secret rate, and building a corresponding optimization model by taking the average secret rate, the relay transmission power and the relay trust degree as constraints;
the model calculation module is used for comprehensively calculating a conditional formula of the relay trust degree and a calculation formula of the relay sending power in the optimization model by taking the maximum message rate of the information received by the receiver as a target and taking the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver;
and the calculation module is used for obtaining the minimum actual transmission power of the corresponding relay node according to the relay trust degree condition formula and the relay transmission power calculation formula, the deduced relationship formula between the relay trust degree and the relay transmission power and the actual relay trust degree corresponding to the actual safety requirement.
The embodiment of the invention provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of the relay power setting method considering the relay trust and ensuring the information transmission safety when executing the program.
An embodiment of the present invention provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the relay power setting method for guaranteeing information transmission security that consider relay trust as described above.
The relay power setting method and device for guaranteeing information transmission safety considering relay trust degree provided by the embodiment of the invention acquire basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power; dividing the message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot; setting the relay trust degree of the relay node, combining a message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints; in the optimization model, the maximum message rate of the information received by the receiver is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay transmission power are comprehensively calculated on the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver; and according to a conditional formula of the relay trust degree and a calculation formula of the relay transmission power, a relationship formula between the relay trust degree and the relay transmission power is deduced, and the minimum actual transmission power of the corresponding relay node is obtained by combining the actual relay trust degree corresponding to the actual security requirement. Therefore, the relation between the trust and the minimum relay interference power, namely the actual sending power of the relay node, can be obtained by taking the average secret rate as a constraint, and further under the condition that the relay trust is known in the actual situation, the sending power of the relay node is set, so that the interference power is minimum to ensure the safe transmission of information.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for setting relay power for guaranteeing information transmission security, which considers relay trust in an embodiment of the present invention;
fig. 2 is a block diagram of a relay power setting device for guaranteeing information transmission security, which considers relay trust in the embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 is a flow chart of a relay power setting method for guaranteeing information transmission security, which is provided by the embodiment of the invention and considers relay trust, and as shown in fig. 1, the embodiment of the invention provides a relay power setting method for guaranteeing information transmission security, which considers relay trust and includes:
step S101, obtaining basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power.
Specifically, basic configuration information of the current network is obtained, the basic configuration information includes relay transmission power, wherein the relay transmission power is a relay transmission power upper limit of a relay node, the basic configuration information also can include data such as a transmission channel basic parameter, an average secret rate lower limit and the like, and a specific obtaining mode can obtain and upload respective information by mutually transmitting messages between the relay nodes through HELLO packets.
Step S102, dividing the message transmission process into a first time slot sent by a sender to a relay node and a second time slot sent by the relay node to a receiver, and combining the basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot.
Specifically, the message transmission process can be completed in two time slots, wherein the first time slot is used for transmitting a message signal to the relay node for a sender; the second time slot is a formula of message rate received by the relay node and the eavesdropper in the first time slot can be obtained by combining basic configuration information data and forwarding the message to the receiver, and in the second time slot, the total of 4 formulas of message rate formulas received by the receiver and the eavesdropper can be:
in the first time slot, the sender sends information to the relay node i, and the message rate received by the relay node i is as follows:
wherein R is si For the message rate received by relay node i, P s Power g for transmitting information to relay node i for sender si For the channel coefficients between the sender and the relay node i,is the variance of the additive white gaussian noise at relay node i;
in the first time slot, the sender sends information to the relay node i, and the rate of the information received by the eavesdropper is as follows:
wherein y is e1 Rate of messages received for eavesdroppers, g se For the channel coefficient between sender and eavesdropper, x is the information signal sent by the sender, n e Additive white gaussian noise at an eavesdropper;
in the second time slot, the relay node i sends information to the receiver, and the rate of the received information received by the receiver is as follows:
wherein R is id For the rate of messages received by the receiver, P i c Power g for transmitting information to receiver for relay node i id For the channel coefficients between the relay node i and the receiver,is the variance of additive white gaussian noise at the receiver;
in the second time slot, the relay node i sends information to the receiver, and the rate of the information received by the eavesdropper is as follows:
wherein y is e2 Rate of messages received for eavesdroppers, g ie For the channel coefficient, x, between the relay node i and the eavesdropper c An information signal transmitted for the relay node i.
Step S103, setting the relay trust degree of the relay node, combining the message rate formula to obtain an average secret rate, and establishing a corresponding optimization model by taking the average secret rate, the relay transmission power and the relay trust degree as constraints.
Specifically, according to a message rate formula received by an eavesdropper in the first time slot and the second time slot, the total message rate overheard by the eavesdropper can be calculated as follows:
wherein sigma e Variance of additive gaussian white noise at an eavesdropper;
then, the relay trust α of the relay node may be set i In combination with the message rate formula, an average secret rate is obtained, wherein in a two-hop relay network (one hop for a sender to send information to a relay node, and one hop for a relay node to forward information to a receiver), the maximum information rate available to the receiver should take the smaller value of the two-hop transmission rate, namely min (R) si ,R id ) Considering relay trust alpha of relay node i The relay node i uses the probability alpha i Forwarding the sender's information to the receiver, the average privacy rate at which the receiver receives the information beingThen, respectively establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints, wherein the optimization model can be specifically:
constraint 1:
constraint 2:0 < P i c ≤P max
Constraint 3: alpha is 0 to or less i ≤1
Wherein constraint 1 is an average privacy rate constraint,is the lower limit of the average privacy rate;
constraint 2 is relay transmit power constraint, P max The upper limit of the transmission power of the relay node i;
constraint 3 is a relay confidence constraint.
Step S104, in the optimization model, the maximum message rate of the receiver is taken as a target, and the condition formula of the relay trust degree and the calculation formula of the relay sending power are comprehensively calculated on the condition that the message rate of the relay node for receiving the information is larger than the message rate of the receiver and the message rate of the relay node for receiving the information is smaller than the message rate of the receiver.
Specifically, in the optimization model, since the maximum information rate available to the receiver in the two networks is a smaller value of the transmission rate in the two hops, the maximum information rate of the receiver is targeted, and the conditions that the information rate of the relay node is greater than the information rate of the receiver and the information rate of the relay node is less than the information rate of the receiver are respectively used, so that the calculation results under the two conditions are respectively:
condition 1: the message rate of the relay node for receiving the information is larger than that of the receiver, R si >R id ;
If the condition 1 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting the message rate formula received by the relay node i and the total message rate formula overheard by an eavesdropper into constraint 1 to obtain the following conditions:
the value of the transmission power of the available relay node i is as follows:
in the above-mentioned description of the invention,and alpha is i > 0, can be deduced->Further, it can be seen that the value of numerator in the above formula is greater than zero, and because the relay transmission power value is necessarily greater than zero, if the formula 3 is to be satisfied, the condition of the formula 2 must be satisfied:
thus, the confidence should satisfy:
when the current trust feeling is satisfied, the value of the transmission power of the relay node i is as follows:
condition 2: the message rate of the relay node receiving the information is smaller than that of the receiver, R si ≤R id ;
If the condition 2 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting the message rate formula received by the receiver and the total message rate formula overheard by the eavesdropper into constraint 1 to obtain the following conditions:
the value of the transmission power of the available relay node i is as follows:
in the above formula, since the relay transmission power value must be greater than zero, the numerator of formula 6 should be greater than zero, and the degree of trust must satisfy the condition of formula 5. The condition that there is a viable solution for the relay transmission power is that equation 4 and equation 6 are satisfied at the same time, and it is thereby obtained that:
thus, the confidence should satisfy:
when the current trust feeling is satisfied, the value of the transmission power of the relay node i is as follows:
combining the two conditions, namely combining the condition of the relay trust degree under the condition 1 and the condition of the relay trust degree under the condition 2 and the corresponding relay transmission power value to obtain a conditional formula of the relay trust degree:
the calculation formula of the minimum relay transmission power of the relay node i:
step 105, according to the condition formula of the relay trust degree and the calculation formula of the relay transmission power, the relationship formula between the relay trust degree and the relay transmission power is derived, and the minimum actual transmission power of the corresponding relay node is obtained by combining the actual relay trust degree corresponding to the actual security requirement.
Specifically, according to a conditional formula of the relay trust degree and a calculation formula of the relay transmission power, the method can be converted into:
from the above equation it can be concluded that,
if it isThe trust value range is 0-alpha i Minimum transmit power of 1, i relay
If it isIf and only if the trust level value range satisfies +.>At the time, the minimum transmit power of the i relayOtherwise, no matter how much the relay transmission power is, the confidentiality rate cannot be ensured;
if it isOtherwise, no matter what the relay transmission power is, the confidentiality is keptNo guarantee of rate is obtained.
And then according to the deduced conclusion, combining the actual relay trust degree corresponding to the actual security requirement to obtain the minimum actual transmission power of the corresponding relay node.
The embodiment of the invention provides a relay power setting method for guaranteeing information transmission safety by considering relay trust, which comprises the steps of acquiring basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power; dividing the message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot; setting the relay trust degree of the relay node, combining a message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints; in the optimization model, the maximum message rate of the information received by the receiver is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay transmission power are comprehensively calculated on the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver; and according to a conditional formula of the relay trust degree and a calculation formula of the relay transmission power, a relationship formula between the relay trust degree and the relay transmission power is deduced, and the minimum actual transmission power of the corresponding relay node is obtained by combining the actual relay trust degree corresponding to the actual security requirement. Therefore, the relation between the trust degree and the minimum interference power of the relay can be obtained by taking the average confidentiality rate as constraint, and further in the actual situation, under the condition of knowing the trust degree of the relay, the transmitting power of the relay node is set, so that the interference power is minimum to ensure the safe transmission of information.
Fig. 2 is a relay power setting device for guaranteeing information transmission security, which is provided by the embodiment of the present invention and considers relay trust, and includes: an acquisition module S201, a division module S202, a model establishment module S203, a model calculation module S204, and a calculation module S205, wherein:
an obtaining module S201, configured to obtain basic configuration information of the current network, where the basic configuration information includes relay transmit power.
The dividing module S202 is configured to divide the message transmission process into a first time slot sent by the sender to the relay node and a second time slot sent by the relay node to the receiver, and combine the basic configuration information to obtain a corresponding message rate formula, where the message rate formula includes a message rate formula received by the relay node and the eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot.
The model building module S203 is configured to set a relay trust degree of the relay node, combine the message rate formula to obtain an average security rate, and build a corresponding optimization model with the average security rate, the relay transmission power, and the relay trust degree as constraints.
And the model calculation module S204 is configured to comprehensively calculate a conditional formula of the relay trust degree and a calculation formula of the relay transmit power, where the conditional formula is based on the condition that the message rate of the information received by the receiver is the maximum, and the message rate of the information received by the relay node is greater than the message rate of the information received by the receiver and the message rate of the information received by the relay node is less than the message rate of the information received by the receiver, respectively.
And the calculating module S205 is configured to obtain the minimum actual transmission power of the corresponding relay node according to the relay trust degree condition formula and the relay transmission power calculation formula, and by combining the actual relay trust degree corresponding to the actual security requirement, the derived relationship formula between the relay trust degree and the relay transmission power.
The specific limitation of the relay power setting device for guaranteeing information transmission security in consideration of relay trust degree can be referred to the limitation of the relay power setting method for guaranteeing information transmission security in consideration of relay trust degree hereinabove, and will not be described herein. The above-mentioned modules in the relay power setting device for ensuring information transmission security in consideration of relay trust may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
Fig. 3 illustrates a physical schematic diagram of an electronic device, as shown in fig. 3, where the electronic device may include: a processor (processor) 301, a memory (memory) 302, a communication interface (Communications Interface) 303 and a communication bus 304, wherein the processor 301, the memory 302 and the communication interface 303 perform communication with each other through the communication bus 304. The processor 301 may call logic instructions in the memory 302 to perform the following method: acquiring basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power; dividing the message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot; setting the relay trust degree of the relay node, combining a message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints; in the optimization model, the maximum message rate of the information received by the receiver is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay transmission power are comprehensively calculated on the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver; and according to a conditional formula of the relay trust degree and a calculation formula of the relay transmission power, a relationship formula between the relay trust degree and the relay transmission power is deduced, and the minimum actual transmission power of the corresponding relay node is obtained by combining the actual relay trust degree corresponding to the actual security requirement.
Further, the logic instructions in memory 302 described above may be implemented in the form of software functional units and stored in a computer readable storage medium when sold or used as a stand alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In another aspect, embodiments of the present invention further provide a non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor is implemented to perform the transmission method provided in the above embodiments, for example, including: acquiring basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power; dividing the message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot; setting the relay trust degree of the relay node, combining a message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints; in the optimization model, the maximum message rate of the information received by the receiver is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay transmission power are comprehensively calculated on the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver; and according to a conditional formula of the relay trust degree and a calculation formula of the relay transmission power, a relationship formula between the relay trust degree and the relay transmission power is deduced, and the minimum actual transmission power of the corresponding relay node is obtained by combining the actual relay trust degree corresponding to the actual security requirement.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (5)
1. The relay power setting method for guaranteeing information transmission safety by considering relay trust is characterized by comprising the following steps:
acquiring basic configuration information of a current network, wherein the basic configuration information comprises relay transmission power;
dividing a message transmission process into a first time slot transmitted to a relay node by a sender and a second time slot transmitted to a receiver by the relay node, and combining the basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot;
setting the relay trust degree of the relay node, combining the message rate formula to obtain an average confidentiality rate, and establishing a corresponding optimization model by taking the average confidentiality rate, the relay transmission power and the relay trust degree as constraints;
in the optimization model, the maximum message rate of the information received by the receiver is used as a target, and the condition formula of the relay trust degree and the calculation formula of the relay transmission power are comprehensively calculated on the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver;
according to the condition formula of the relay trust degree and the calculation formula of the relay transmission power, deriving a relation formula between the relay trust degree and the relay transmission power, and combining the actual relay trust degree corresponding to the actual safety requirement to obtain the minimum actual transmission power of the corresponding relay node;
the message transmission process is divided into a first time slot sent to the relay node by the sender and a second time slot sent to the receiver by the relay node, and the basic configuration information is combined to obtain a corresponding message rate formula, which comprises the following steps:
in the first time slot, the sender sends information to the relay node i, and the message rate received by the relay node i is as follows:
wherein R is si For the message rate received by relay node i, P s Power g for transmitting information to relay node i for sender si For the channel coefficients between the sender and the relay node i,is the variance of the additive white gaussian noise at relay node i;
in the first time slot, the sender sends information to the relay node i, and the rate of the information received by the eavesdropper is as follows:
wherein y is e1 Rate of messages received for eavesdroppers, g se For the channel coefficient between sender and eavesdropper, x is the information signal sent by the sender, n e Additive white gaussian noise at an eavesdropper;
in the second time slot, the relay node i sends information to the receiver, and the rate of the received information received by the receiver is as follows:
wherein R is id For the rate of messages received by the receiver, P i c Power g for transmitting information to receiver for relay node i id For the channel coefficients between the relay node i and the receiver,is the variance of additive white gaussian noise at the receiver;
in the second time slot, the relay node i sends information to the receiver, and the rate of the information received by the eavesdropper is as follows:
wherein y is e2 Rate of messages received for eavesdroppers, g ie For the channel coefficient, x, between the relay node i and the eavesdropper c An information signal sent for the relay node i;
setting the relay trust degree of the relay node, and combining the message rate formula to obtain an average confidentiality rate, wherein the method comprises the following steps:
the total message rate overheard by an eavesdropper in the first time slot and the second time slot is calculated as follows:
wherein sigma e Variance of additive gaussian white noise at an eavesdropper;
setting the trust of the relay node i to alpha i The relay node i uses the probability alpha i Forwarding the sender's information to the receiver, the average privacy rate at which the receiver receives the information being
The optimization model comprises:
the three constraint conditions included in the optimization model respectively comprise:
constraint 1:
constraint 2:0 < P i c ≤P max
Constraint 3: alpha is 0 to or less i ≤1
Wherein constraint 1 is an average privacy rate of aboutThe beam is directed to a fiber optic fiber bundle,is the lower limit of the average privacy rate;
constraint 2 is relay transmit power constraint, P max The upper limit of the transmission power of the relay node i;
constraint 3 is a relay trust degree constraint;
the method is characterized in that the conditions that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver are respectively provided, and the method comprises the following steps:
condition 1: the message rate of the relay node for receiving the information is larger than that of the receiver, R si >R id ;
If the condition 1 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by the relay node i and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain a relay trust degree meeting condition and a corresponding relay transmission power value under the condition of condition 1;
condition 2: the message rate of the relay node receiving the information is smaller than that of the receiver, R si ≤R id ;
If the condition 2 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by a receiver and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain a relay trust degree meeting condition and a corresponding relay transmission power value under the condition of condition 2;
the condition formula for obtaining the relay trust degree by comprehensive calculation and the calculation formula for relay transmitting power comprise the following steps:
combining the condition that the relay trust degree satisfies the condition and the corresponding relay transmission power value under the condition 1 and the condition 2 to obtain a conditional formula of the relay trust degree:
the calculation formula of the relay transmission power of the relay node i:
converting the calculation formula of the relay transmission power into:
wherein if itThe trust value range is 0-alpha i Minimum transmit power of 1, i relay
If it isThe trust value range satisfies/>At the time, the minimum transmit power of the i relay
If it isThe privacy rate cannot be guaranteed.
2. The relay power setting method for guaranteeing information transmission security considering relay trust according to claim 1, wherein the basic configuration information comprises:
the method comprises the steps of transmitting a channel basic parameter, an average secret rate lower limit and a relay transmission power, wherein the relay transmission power is a relay transmission power upper limit.
3. A relay power setting apparatus for guaranteeing information transmission security in consideration of relay trust, the apparatus comprising:
the acquisition module is used for acquiring basic configuration information of the current network, wherein the basic configuration information comprises relay transmission power;
the dividing module is used for dividing the message transmission process into a first time slot sent by a sender to a relay node and a second time slot sent by the relay node to a receiver, and combining the basic configuration information to obtain a corresponding message rate formula, wherein the message rate formula comprises a message rate formula received by the relay node and an eavesdropper in the first time slot and a message rate formula received by the receiver and the eavesdropper in the second time slot;
the model building module is used for setting the relay trust degree of the relay node, combining the message rate formula to obtain an average secret rate, and building a corresponding optimization model by taking the average secret rate, the relay transmission power and the relay trust degree as constraints;
the model calculation module is used for comprehensively calculating a conditional formula of the relay trust degree and a calculation formula of the relay sending power in the optimization model by taking the maximum message rate of the information received by the receiver as a target and taking the condition that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver;
the calculation module is used for deriving a relation formula between the relay trust degree and the relay transmission power according to the condition formula of the relay trust degree and the calculation formula of the relay transmission power, and combining the actual relay trust degree corresponding to the actual safety requirement to obtain the minimum actual transmission power of the corresponding relay node;
the message transmission process is divided into a first time slot sent to the relay node by the sender and a second time slot sent to the receiver by the relay node, and the basic configuration information is combined to obtain a corresponding message rate formula, which comprises the following steps:
in the first time slot, the sender sends information to the relay node i, and the message rate received by the relay node i is as follows:
wherein R is si For the message rate received by relay node i, P s Power g for transmitting information to relay node i for sender si For the channel coefficients between the sender and the relay node i,is the variance of the additive white gaussian noise at relay node i;
in the first time slot, the sender sends information to the relay node i, and the rate of the information received by the eavesdropper is as follows:
wherein y is e1 Rate of messages received for eavesdroppers, g se For the channel coefficient between sender and eavesdropper, x is the information signal sent by the sender, n e Additive white gaussian noise at an eavesdropper;
in the second time slot, the relay node i sends information to the receiver, and the rate of the received information received by the receiver is as follows:
wherein R is id For the rate of messages received by the receiver, P i c Power g for transmitting information to receiver for relay node i id For the channel coefficients between the relay node i and the receiver,is the variance of additive white gaussian noise at the receiver;
in the second time slot, the relay node i sends information to the receiver, and the rate of the information received by the eavesdropper is as follows:
wherein y is e2 Rate of messages received for eavesdroppers, g ie For the channel coefficient, x, between the relay node i and the eavesdropper c An information signal sent for the relay node i;
setting the relay trust degree of the relay node, and combining the message rate formula to obtain an average confidentiality rate, wherein the method comprises the following steps:
the total message rate overheard by an eavesdropper in the first time slot and the second time slot is calculated as follows:
wherein sigma e Variance of additive gaussian white noise at an eavesdropper;
setting the trust of the relay node i to alpha i The relay node i uses the probability alpha i Forwarding the sender's information to the receiver, the average privacy rate at which the receiver receives the information being
The optimization model comprises:
the three constraint conditions included in the optimization model respectively comprise:
constraint 1:
constraint 2:0 < P i c ≤P max
Constraint 3: alpha is 0 to or less i ≤1
Wherein constraint 1 is an average privacy rate constraint,is the lower limit of the average privacy rate;
constraint 2 is relay transmit power constraint, P max The upper limit of the transmission power of the relay node i;
constraint 3 is a relay trust degree constraint;
the method is characterized in that the conditions that the message rate of the information received by the relay node is larger than the message rate of the information received by the receiver and the message rate of the information received by the relay node is smaller than the message rate of the information received by the receiver are respectively provided, and the method comprises the following steps:
condition 1: the message rate of the relay node for receiving the information is larger than that of the receiver, R si >R id ;
If the condition 1 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by the relay node i and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain a relay trust degree meeting condition and a corresponding relay transmission power value under the condition of condition 1;
condition 2: the message rate of the relay node receiving the information is smaller than that of the receiver, R si ≤R id ;
If the condition 2 is to be satisfied, the transmission power of the relay node i should satisfy:
constraint 1 evolves intoSubstituting a message rate formula received by a receiver and a total message rate formula overheard by an eavesdropper into constraint 1 to obtain a relay trust degree meeting condition and a corresponding relay transmission power value under the condition of condition 2;
the condition formula for obtaining the relay trust degree by comprehensive calculation and the calculation formula for relay transmitting power comprise the following steps:
combining the condition that the relay trust degree satisfies the condition and the corresponding relay transmission power value under the condition 1 and the condition 2 to obtain a conditional formula of the relay trust degree:
the calculation formula of the relay transmission power of the relay node i:
converting the calculation formula of the relay transmission power into:
wherein if itThe trust value range is 0-alpha i Minimum transmit power of 1, i relay
If it isThe trust value range satisfies->At the time, the minimum transmit power of the i relay
If it isThe privacy rate cannot be guaranteed.
4. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the relay power setting method for guaranteeing information transmission security taking into account relay trust according to any one of claims 1 to 2 when executing the program.
5. A non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements the steps of the relay power setting method for guaranteeing information transmission security taking relay trust into account according to any one of claims 1 to 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111671391.6A CN114302490B (en) | 2021-12-31 | 2021-12-31 | Relay power setting method for guaranteeing information transmission safety by considering relay trust |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111671391.6A CN114302490B (en) | 2021-12-31 | 2021-12-31 | Relay power setting method for guaranteeing information transmission safety by considering relay trust |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114302490A CN114302490A (en) | 2022-04-08 |
CN114302490B true CN114302490B (en) | 2024-04-02 |
Family
ID=80973844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111671391.6A Active CN114302490B (en) | 2021-12-31 | 2021-12-31 | Relay power setting method for guaranteeing information transmission safety by considering relay trust |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114302490B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109525984A (en) * | 2018-10-16 | 2019-03-26 | 西安电子科技大学 | A method of improving the safe rate of insincere relaying portable communications system |
WO2020215801A1 (en) * | 2019-04-26 | 2020-10-29 | 深圳先进技术研究院 | Method and device for relay network energy efficiency optimized distribution, terminal, and storage medium |
CN112243252A (en) * | 2020-09-08 | 2021-01-19 | 西北工业大学 | Safety transmission enhancement method for relay network of unmanned aerial vehicle |
-
2021
- 2021-12-31 CN CN202111671391.6A patent/CN114302490B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109525984A (en) * | 2018-10-16 | 2019-03-26 | 西安电子科技大学 | A method of improving the safe rate of insincere relaying portable communications system |
WO2020215801A1 (en) * | 2019-04-26 | 2020-10-29 | 深圳先进技术研究院 | Method and device for relay network energy efficiency optimized distribution, terminal, and storage medium |
CN112243252A (en) * | 2020-09-08 | 2021-01-19 | 西北工业大学 | Safety transmission enhancement method for relay network of unmanned aerial vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN114302490A (en) | 2022-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5291200B2 (en) | Method, system, and device for realizing device addition in a Wi-Fi device-to-device network | |
Bassily et al. | Deaf cooperation and relay selection strategies for secure communication in multiple relay networks | |
EP3123693A2 (en) | Secure and simplified procedure for joining a social wi-fi mesh network | |
KR20170010756A (en) | Establishing reliable routes without expensive mesh peering | |
JP2011160098A (en) | Communication system and communication device | |
CN113821789B (en) | User key generation method, device, equipment and medium based on blockchain | |
US20220417015A1 (en) | Key update method and related apparatus | |
CN112260796B (en) | Method and device for controlling interference signal emission | |
Kazmi et al. | Decentralized spectrum allocation in D2D underlying cellular networks | |
CN108768443B (en) | Spectrum spreading parameter agility method based on random signal | |
CN114302490B (en) | Relay power setting method for guaranteeing information transmission safety by considering relay trust | |
CN112566123B (en) | Method and device for determining abnormal network node | |
CN109617676B (en) | Password synchronization method, communication node, electronic equipment and readable storage medium | |
CN111934863A (en) | Secret key sharing method based on artificial noise and safety coding in edge calculation | |
CN101534174B (en) | Physical channel scrambling and descrambling method and device thereof | |
CN114302476B (en) | Energy-saving relay selection method and device based on trust degree for wireless energy-carrying network | |
CN111786789B (en) | Physical layer key distribution method based on random wave beam and edge calculation | |
EP2563055A1 (en) | Method and devices for reducing detectability of an encryption key | |
Mohammed et al. | Adversarial learning for hiding wireless signals | |
Alavi et al. | Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays | |
JP2018516019A (en) | Method for generating a secret or key in a network | |
CN114302489B (en) | Low-energy-consumption relay power distribution method considering information transmission safety | |
Medina-López et al. | On mitigating pollution and free-riding attacks by Shamir's Secret Sharing in fully connected P2P systems | |
CN111918282B (en) | ZigBee master key protection method and equipment based on physical layer key | |
Pan | Probability of secrecy outage in cognitive radio networks over Rician-fading channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |