CN116847340A - Security transmission policy adjustment method, device, computer equipment and storage medium - Google Patents

Security transmission policy adjustment method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116847340A
CN116847340A CN202310797813.7A CN202310797813A CN116847340A CN 116847340 A CN116847340 A CN 116847340A CN 202310797813 A CN202310797813 A CN 202310797813A CN 116847340 A CN116847340 A CN 116847340A
Authority
CN
China
Prior art keywords
transmission
target
base station
strategy
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310797813.7A
Other languages
Chinese (zh)
Inventor
孙强强
连耿雄
杨明婕
郑通兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN202310797813.7A priority Critical patent/CN116847340A/en
Publication of CN116847340A publication Critical patent/CN116847340A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/046Wireless resource allocation based on the type of the allocated resource the resource being in the space domain, e.g. beams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/535Allocation or scheduling criteria for wireless resources based on resource usage policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria

Abstract

The application relates to a method, a device, computer equipment and a storage medium for adjusting a secure transmission policy. The method comprises the following steps: carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station; beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined; evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result; and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy. The method realizes the encryption transmission of the instruction information in the transmission process of sending the instruction information, ensures the transmission safety, can adjust the transmission strategy in real time, is beneficial to improving the resistance performance of the signal to the channel random fading in the transmission process, and ensures the connection stability.

Description

Security transmission policy adjustment method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of smart grid information security technologies, and in particular, to a method and apparatus for adjusting a security transmission policy, a computer device, and a storage medium.
Background
In order to construct a smart grid with stronger robustness, self-healing property, compatibility and interactivity, the development of modernization and intellectualization of the power grid in China is promoted, and the framework of an information physical fusion system (CPS, cyber Physical System) is gradually transplanted into the smart grid so as to realize the tight combination of computing resources and physical resources, and the power-assisted construction is more intelligent, reliable and efficient power regulation and control network. In a smart grid based on a CPS system architecture, a sensor group and an actuator group are used as information interaction interfaces between an information system and a physical system, and related data information transfer interaction is carried out in a wireless network. In the process of issuing the power grid instruction, the open characteristics of the wireless channel provide a break for a malicious eavesdropper to intercept eavesdropping by the confidential information, and the risk of leakage of the confidential information exists in the transmission process of the power system regulation information.
However, the current network layer key encryption technology based on computational complexity can lead to high computational complexity and high energy consumption due to the need of distributing, storing and managing the keys. Meanwhile, the safety strategy of the power grid transmission is determined, and cannot be adjusted after deployment, so that the power grid transmission cannot adapt to the requirements of the power grid in a complex environment state.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a secure transmission policy adjustment method, apparatus, computer device, computer-readable storage medium, and computer program product that can transmit security and reliability based on existing road balance instruction information.
In a first aspect, the present application provides a method for adjusting a secure transmission policy. The method comprises the following steps:
carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station;
beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined;
evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
In one embodiment, performing loss analysis on a communication link according to a preset transmission model and a preset access policy, and determining a target access base station includes:
calculating the signal quality of a transmission path according to a preset transmission model, and determining the loss of a communication link;
and selecting and judging the receiving end according to the communication link loss and a preset access strategy, and determining a target access base station.
In one embodiment, calculating signal quality of a transmission path according to a preset transmission model, determining a communication link loss includes:
determining a communication link type according to the transmitting node position, the receiving node position and a preset link selection condition;
the communication link loss is determined based on the communication link type and its corresponding path loss parameters.
In one embodiment, the selecting and judging the receiving end according to the communication link loss and the preset access policy, and determining the target access base station includes:
determining a preselected access base station according to a preset access strategy;
and determining the target access base station according to the path loss parameters for determining the loss of the communication link, the preselected access base station and the model parameters of the preset transmission model.
In one embodiment, beam allocation and transmit power allocation for confidential signals and artifacts determine a target safe transmission strategy, comprising:
performing power distribution according to the total transmitting power of the transmitting node and a preset power distribution coefficient to obtain confidential signal power and artificial noise power;
determining the receiving antenna gain of the receiving node according to the preset main lobe width;
the confidential signal power, the artificial noise power and the receiving antenna gain are set as target safe transmission strategies.
In one embodiment, the evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain the target evaluation result includes:
performing connection interruption analysis according to the determined path loss parameter of the target access base station and the model parameter of a preset transmission model to obtain connection interruption probability;
carrying out security interruption analysis according to a target security transmission strategy and model parameters of a preset transmission model to obtain security interruption probability;
the connection interruption probability and the security interruption probability are set as target evaluation results.
In a second aspect, the application further provides a device for adjusting the security transmission policy. The device comprises:
the base station determining module is used for carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy and determining a target access base station;
the strategy generation module is used for carrying out beam distribution and transmitting power distribution on the confidential signals and the artificial noise and determining a target safe transmission strategy;
the performance evaluation module is used for evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and the strategy updating module is used for adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the following steps when executing the computer program:
carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station;
beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined;
evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station;
beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined;
evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station;
beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined;
evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
The method, the device, the computer equipment, the storage medium and the computer program product for adjusting the safe transmission strategy are characterized in that a preset transmission model is obtained based on modeling of the position of a communication node on a road, the transmission loss in a communication link is calculated by combining with a preset access strategy selected by a base station, the probability of a selectable base station applicable to different communication links is calculated, and a maximum power base station, namely a target access base station, is selected based on the transmission loss; performing power distribution and beam distribution on the confidential information and the artificial noise to generate a safe transmission strategy; and then calculating the transmission signal and interruption probability and the stealing probability of the confidential signal in the communication link, evaluating the interruption level of the whole network through the transmission signal interruption probability and the stealing probability of the confidential signal, and adjusting the safe transmission strategy based on the interruption level of the whole network, thereby realizing the encryption transmission of the instruction information in the transmission process of the instruction information sent to the physical side from the information decision control side in consideration of actual conditions, ensuring the safety of the transmission process, simultaneously adjusting the transmission strategy according to the real-time transmission conditions, being beneficial to improving the resistance performance of the signal to the channel random fading in the transmission process and ensuring the stability of connection.
Drawings
FIG. 1 is an application environment diagram of a method for adjusting a security transmission policy in one embodiment;
FIG. 2 is a flow chart of a method for adjusting a security transmission policy according to one embodiment;
FIG. 3 is a flow chart of determining an access base station in one embodiment;
FIG. 4 is a schematic flow chart of calculating communication loss in one embodiment;
FIG. 5 is a flow chart illustrating a method for selecting a base station in one embodiment;
FIG. 6 is a flow diagram of determining a secure transmission policy in one embodiment;
FIG. 7 is a flow diagram of transport network evaluation in one embodiment;
FIG. 8 is a graph showing the probability of connection interruption with the power distribution coefficient according to the artificial noise transmission mechanism in one embodiment;
FIG. 9 is a graph showing the probability of privacy interruption as a function of power distribution coefficients for an artificial noise transmission scheme according to one embodiment;
FIG. 10 is a block diagram illustrating a configuration of a security transmission policy adjustment device according to an embodiment;
FIG. 11 is an internal block diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The method for adjusting the security transmission policy provided by the embodiment of the application can be applied to an application environment as shown in fig. 1. Wherein the power control execution node 102 communicates with the control center 104 via a network. The data storage system may store data that the control center 104 needs to process. The data storage system may be integrated on the control center 104 or may be located on the cloud or other network server. Modeling based on the position of the communication node on the road to obtain a preset transmission model, calculating the propagation loss in the communication link by combining with a preset access strategy selected by the base station, calculating the probability of the selectable base station applicable to different communication links, and selecting the maximum power base station, namely the target access base station, based on the propagation loss; performing power distribution and beam distribution on the confidential information and the artificial noise to generate a safe transmission strategy; and then calculating the outage probability of the transmission signal and the theft probability of the confidential signal in the communication link, evaluating the outage level of the whole network according to the outage probability of the transmission signal and the theft probability of the confidential signal, and adjusting the safe transmission strategy based on the outage level of the whole network. Wherein the power control execution node 102 may be a power device. The control center 104 may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a method for adjusting a security transmission policy is provided, and the method is applied to the control center in fig. 1 for illustration, and includes the following steps:
step 202, performing loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station.
The preset transmission model is a model constructed based on the CPS structure of the smart grid and the downlink communication scene from the information side to the physical side, and the position distribution of each role node participating in communication in the communication process is located.
Specifically, under the architecture of a preset transmission model, the propagation loss of different types of communication links in the transmission process is calculated by considering the communication links of communication transmission. And then combining with a preset access strategy, calculating the probability density of the base stations of different types of communication links, and selecting an access base station according to the probability density of the base stations of the same type of communication links.
And 204, carrying out beam allocation and transmission power allocation on the confidential signals and the artificial noise, and determining a target safe transmission strategy.
Specifically, a space in which the confidential signal can be transmitted is set, the confidential signal is transmitted in the beam main board after being concentrated, and then artificial noise is added in the remaining space except the confidential signal transmission space. After the transmission space setting is completed, the transmission power of the confidential signal and the artificial noise is allocated. The allocation of transmission space and the allocation of transmission power are set as target safe transport layer policies.
And step 206, evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result.
Specifically, after the distribution of transmission space and transmission power of confidential signals and artificial noise is completed, the connection performance and confidentiality between a target access base station and a receiving node in the transmission process are calculated, and the transmission performance and confidentiality are used as the evaluation result of the power grid performance.
And step 208, adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
Specifically, data for monitoring a current power grid are obtained, the direction of the emphasis of the performance of the current power grid is judged, and a transmission strategy is adjusted based on the emphasis of the performance of the current power grid.
In the above method for adjusting the security transmission policy, a preset transmission model is obtained based on modeling of the position of the communication node on the road, a preset access policy selected by the base station is combined, the propagation loss in the communication link is calculated, then the probability of the selectable base station applicable to different communication links is calculated, and the base station with the maximum power, that is, the target access base station, is selected based on the propagation loss; performing power distribution and beam distribution on the confidential information and the artificial noise to generate a safe transmission strategy; and then calculating the transmission signal and interruption probability and the stealing probability of the confidential signal in the communication link, evaluating the interruption level of the whole network through the transmission signal interruption probability and the stealing probability of the confidential signal, and adjusting the safe transmission strategy based on the interruption level of the whole network, thereby realizing the encryption transmission of the instruction information in the transmission process of the instruction information sent to the physical side from the information decision control side in consideration of actual conditions, ensuring the safety of the transmission process, simultaneously adjusting the transmission strategy according to the real-time transmission conditions, being beneficial to improving the resistance performance of the signal to the channel random fading in the transmission process and ensuring the stability of connection.
In one embodiment, as shown in fig. 3, performing loss analysis on a communication link according to a preset transmission model and a preset access policy, and determining a target access base station includes:
step 302, calculating the signal quality of the transmission path according to the preset transmission model, and determining the communication link loss.
The communication link includes, among other things, line of Sight (LoS) and non-Line of Sight (NloS, non Line of Sight).
Specifically, under the architecture of a preset transmission model, the signal quality of receiving nodes at different positions from a transmitting node is analyzed by considering communication links of communication transmission, namely, the propagation loss of different types of communication links in the transmission process is calculated.
And step 304, selecting and judging the receiving end according to the communication link loss and a preset access strategy, and determining a target access base station.
The preset access strategy adopts a maximum average power access strategy.
Specifically, the base stations are divided into LoS base stations and NLoS base stations based on different links, and the point procedure phi is performed B Divided into two sub-processes. Calculating the point distance sigma between different types of access base stations in one-dimensional mapping PPP between the access base stations and typical receiving nodes i And then determines the target access base station.
In this embodiment, by calculating the propagation loss in the communication link based on the preset transmission model and combining with the preset access policy selected by the base station, and then calculating the probability of the selectable base station applicable to different communication links, the maximum power base station, that is, the target access base station, is selected based on the propagation loss, so that a suitable access base station can be selected, and a signal transmitted by the base station with the maximum transmission power can be received, so that the loss of the received signal in the propagation process is minimum, and the transmission quality is improved.
In one embodiment, as shown in fig. 4, calculating the signal quality of the transmission path according to the preset transmission model, determining the communication link loss includes:
step 402, determining the communication link type according to the transmitting node position, the receiving node position and the preset link selection condition.
Specifically, in communication transmission, it is considered that communication between nodes has two cases of line-of-sight propagation (LoS) and non-line-of-sight propagation (NLoS). And describing the blocking state of links between other nodes at different distances from the transmitting node by adopting a blocking sphere model, and calculating the link selection probability with the distance r through a probability function.
When the connection link is a LoS link and the distance between the transmitting node and the receiving node is r, the probability that the LoS link is adopted is as follows:
where D is the radius of sphere B (o, D).
The probability of using NLoS link is p N (r)=1-p L (r)。
For convenience of expression, all parameters or variables related to the blocking state are identified by the subscript i, where L and N identify the LoS link and NLoS link, respectively.
Step 402, determining the communication link loss according to the communication link type and the corresponding path loss parameter.
Specifically, the propagation loss generated by a signal during propagation is represented by a path loss function:
wherein alpha is i For a path loss index related to the path blocking state,is equal to the constant beta i The related path loss intercept, ||refers to the transmission distance in a preset transmission model, x is the position of the transmission end in the communication link, and y is the position of the receiving end in the communication link.
In this embodiment, the millimeter wave channel used for downlink communication transmission from the information side to the physical side is modeled, so that the signal quality received at each receiving node is determined conveniently, and the access base station is selected conveniently according to the signal quality and the blocking condition of the communication link.
In this embodiment, as shown in fig. 5, selecting and judging a receiving end according to a communication link loss and a preset access policy, determining a target access base station includes:
step 502, determining a pre-selected access base station according to a preset access strategy.
Specifically, after determining the propagation loss, the receiving node needs to satisfy, when selecting a location according to a preset access policy:
wherein b * P for the base station position of access I For confidential signal power, o is the typical access vehicle location and r is the communication link distance.
And step 504, determining the target access base station according to the path loss parameters for determining the communication link loss, the preselected access base station and the model parameters of the preset transmission model.
Specifically, the base station position in the preset transmission model is determined from the two-dimensional PPP (Poisson-Point-Process) phi B Mapping to a new one-dimensional PPPFind to make->Position b of minimum base station * Transitioning from one-dimensional PPPΩ B The closest point sigma to the origin is found.
Because of the existence of two links, namely Los link and NLos link, the base stations can be divided into two types of base stations adopting different links, namely, the point process phi can be realized B Divided into two sub-processes: loS point procedureAnd NLoS Point procedure->Likewise, the mapped one-dimensional PPPpOmega may be used B Divided into-> And
when the access base station is the LoS base station, the point distance between the access base station and a typical receiving node in a preset transmission model in one-dimensional mapping PPP is sigma L The Probability Density Function (PDF) of (c) is:
wherein lambda is B Is two-dimensional PPP phi B Node density of χ e { G i ,G A And is the antenna gain.
A L Probability that the maximum power base station accessed for a typical receiving node is a LoS base station, a L =1-A N
When the access base station is an NLos base station, the point distance between the access base station and a typical receiving node in a preset transmission model in one-dimensional mapping PPP is sigma N The Probability Density Function (PDF) of (c) is:
wherein, the liquid crystal display device comprises a liquid crystal display device,for the indication function, the output is 1 when the condition in brackets is satisfied, otherwise is 0; a is that N The probability that the maximum power base station to which a typical receiving node has access is the NLoS base station is:
wherein, the liquid crystal display device comprises a liquid crystal display device,indicating +.>Point of->Is a punctual process->Falls within bounded region [0, sigma ]]The average poisson number in the matrix is also referred to as the intensity.
For one-dimensional PPP omega B DividedWherein the shortest distance->The PDF of (2) is:
for the intensity corresponding to the mapped one-dimensional PPP in the above formula, the specific calculation mode is as follows:
wherein, the liquid crystal display device comprises a liquid crystal display device,is->Respectively->And->Is a strength of (a) is a strength of (b).
In this embodiment, the two-dimensional PPP phi is received by selecting the optimal base station to accept the confidential signal based on the preset access policy B Mapping to one-dimensional PPP omega B And find the nearest point sigma from the origin, and consider the propagation loss in choosing the course to cut in the base transceiver station, make the signal quality sent out from goal cut in the base transceiver station the highest, facilitate the subsequent assessment of the transmission performance.
In one embodiment, as shown in fig. 6, beam allocation and transmit power allocation for confidential signals and artifacts, determining a target safe transmission strategy includes:
step 602, performing power distribution according to the total transmission power of the transmission node and a preset power distribution coefficient to obtain confidential signal power and artificial noise power.
Specifically, after determining the target access base station, the base station has a transmitting power P t . At this time, if the power share for transmitting the confidential signal is set to be phi, the confidential signal power is P I =φP t And the artificial noise power is P A =(1-φ)P t
Step 604, determining a receiving antenna gain of the receiving node according to the preset main lobe width.
Specifically, the transmitters of the target access base station are all deployed with directional antenna arrays to realize directional beamforming of data transmission and compensate increased path loss of millimeter waves. And the receiving node is only provided with one omni-directional antenna for receiving signals.
After setting transmission space of confidential signals and artificial noise, adopting a classical sector antenna transmission model to approximate an antenna mode at a base station, and the antenna gain at a receiving node is as follows:
wherein G is I And G A Antenna gain, pr, representing main lobe gain and transmit artificial noise of a transmit message signal with a beam width θ, respectively k (k.epsilon.I, A) represents the antenna gain G k Probability of occurrence.
Step 606 sets the secret signal power, the artificial noise power and the receive antenna gain to the target safe transmission strategy.
Specifically, after allocating transmit power and determining antenna gain at the receiving node, the power allocation scheme and antenna gain are set to a target safe transmission strategy.
In this embodiment, by considering the base station power of the access base station, the transmission space of the confidential signal, and setting the antenna gains of the receiving nodes in different spaces according to the transmission space, the confidential signal received at the legal receiving node is more obvious, and the artificial noise received at the illegal receiving node, i.e. the eavesdropping node, is more obvious, thereby improving the security performance of the transmission signal.
In one embodiment, as shown in fig. 7, the evaluation of the performance of the power grid according to the target access base station and the target safe transmission policy, to obtain a target evaluation result, includes:
step 702, performing connection interruption analysis according to the determined path loss parameter of the target access base station and the model parameter of the preset transmission model, and obtaining connection interruption probability.
Specifically, during transmission, it is first required to consider whether a signal can be transmitted to a receiving node, and therefore, it is required to calculate the connection interruption probability during communication, as follows:
wherein, the liquid crystal display device comprises a liquid crystal display device,for the laplace transform of the disturbance,the method can be specifically calculated as follows:
wherein, for the sake of simplicity of expression, the polynomial is used as a functionShorthand, specifically,/->
And step 704, performing security outage analysis according to the target security transmission strategy and model parameters of a preset transmission model to obtain security outage probability.
Specifically, after determining the connection interruption probability, determining the confidentiality interruption probability of the confidential signal in the propagation process, and calculating as follows:
wherein, for simplicity of expression, the vertical Euclidean distance of a typical vehicle to any road is abbreviated as a sum ζ L Related function f (ζ L ) Specifically, the number of the cells, specifically, representing the random position b * Finding expectations, whereinThe specific calculation is as follows:
wherein r is b*, o is the distance between a typical vehicle and the base station to which it is attached, r e Represents the distance between the eavesdropping vehicle and the origin of coordinates, |r b*, o-r e I represents distance r b*, o and distance r e Is a difference in absolute value of (c).
r b*, e has a probability density of:
wherein r is e Is the distance of the eavesdropping vehicle to the origin,wherein ζ L Represents the vertical distance between the road and the origin point, ζ e Representing the distance between eavesdroppers ∈ ->And the midpoint of the road where it is located.
Step 706, setting the connection interruption probability and the security interruption probability as target evaluation results.
Specifically, data for monitoring the current power grid are obtained, the emphasis direction of the performance under the current power grid is judged, and the emphasis condition for the reliable performance is reflected by using the weight parameter xi. After completing the probability of interrupting the communication connection and the probability of interrupting the confidentiality of the confidential signal, calculating the overall interruption level of the whole, using p out The representation is specifically calculated as follows:
p out =ξp co +(1-ξ)p so
wherein p is co To connect outage probability, p so To keep the probability of interruption secret.
In this embodiment, the communication reliability and the security performance under the artificial noise transmission policy are analyzed, that is, the connection interruption probability and the security interruption probability are calculated, and the security transmission policy is adjusted in real time by combining the emphasis degree of the power grid on the communication transmission reliability under the current environment, so as to improve the security in the transmission process.
In one embodiment, as shown in fig. 8, the theoretical result of the connection interruption probability obtained by pushing the method is close to the simulation result of the monte carlo, which proves that the monotonicity between the confidentiality interruption probability and the power distribution coefficient is higher, and as the power distribution coefficient is higher, the more power distribution is used for artificial noise transmission, the higher the probability of connection interruption occurs, which indicates that the confidentiality is improved with the sacrifice of reliability.
Meanwhile, as can be seen from the figure, when the power distribution coefficient is 1, all transmission power is used for transmission of confidential signals, and the connection interruption probability at the moment is a non-zero value, and the value represents the influence of random fading of a wireless channel. The occurrence of a connection interruption event without artificial noise disturbance is caused by the random time-varying nature of the wireless channel. And according to the comparison of the three vertical curves, the probability of connection interruption is reduced sharply along with the reduction of the beam width, which means that the more concentrated the beam is, the higher the stability of connection is.
As shown in fig. 9, the privacy interruption probability continuously rises with the increase of the power distribution coefficient, contrary to the variation trend of the connection interruption probability in fig. 8. When the power share allocated for transmission of the artificial noise signal increases, the intensity of noise received by the eavesdropping node increases, and thus the quality of the received signal decreases, and the probability of transmission eavesdropping interruption also decreases. It is noted that when the beam width for transmitting the confidential signal is tightened, the probability of the confidential interruption can be effectively reduced, and the sensitivity of the confidential interruption probability to the power distribution coefficient is different under the transmission condition of different beam widths. It can be seen from the figure that the wider the beam, the better the security performance at a smaller power allocation coefficient; and vice versa. This is because the power distribution coefficient essentially represents the power duty cycle allocated for transmission of the confidential signal, the larger the power distribution coefficient, the smaller the power allocated for transmission of the noise signal in the artificial noise transmission mechanism, the power used in the transmission of the artificial noise transmission mechanism may not be sufficient for confusing and interfering with the eavesdropping node, so that the beam width of the confidential signal to be transmitted needs to be narrowed, all the beam angles in the transmission of the artificial noise transmission mechanism need to be widened, so that the beam in the artificial noise transmission mechanism covers more eavesdropping nodes, the probability that the eavesdropping node is located in the transmission beam of the confidential signal is reduced, and higher confidentiality is further ensured. The transmission of the secret signal without the aid of the artificial noise transmission mechanism is equivalent to the transmission of the signal with full power, and the observation that the probability of finding the secret interruption is quite different from that of helping to guarantee the secret signal without the artificial noise transmission mechanism.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a safe transmission strategy adjustment device for realizing the above-mentioned safe transmission strategy adjustment method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the one or more security transmission policy adjustment devices provided below may be referred to the limitation of the security transmission policy adjustment method hereinabove, and will not be described herein.
In one embodiment, as shown in fig. 10, there is provided a secure transmission policy adjustment apparatus, including: base station determination module 1002, policy generation module 1004, performance evaluation module 1006, and policy update module 1008, wherein:
the base station determining module 1002 is configured to perform loss analysis on the communication link according to a preset transmission model and a preset access policy, and determine a target access base station.
The policy generation module 1004 is configured to perform beam allocation and transmit power allocation on the confidential signal and the artificial noise, and determine a target security transmission policy.
And the performance evaluation module 1006 is configured to evaluate the performance of the power grid according to the target access base station and the target security transmission policy, and obtain a target evaluation result.
And the policy updating module 1008 is configured to adjust the target safe transmission policy according to the target evaluation result and the current power grid state analysis result, and obtain an adjusted safe transmission policy.
In one embodiment, the base station determining module 1002 is further configured to calculate a signal quality of a transmission path according to a preset transmission model, and determine a communication link loss; and selecting and judging the receiving end according to the communication link loss and a preset access strategy, and determining a target access base station.
In one embodiment, the base station determining module 1002 is further configured to determine a communication link type according to the transmitting node location, the receiving node location, and a preset link selection condition; the communication link loss is determined based on the communication link type and its corresponding path loss parameters.
In one embodiment, the base station determining module 1002 is further configured to determine a preselected access base station according to a preset access policy; and determining the target access base station according to the path loss parameters for determining the loss of the communication link, the preselected access base station and the model parameters of the preset transmission model.
In one embodiment, the policy generating module 1004 is further configured to perform power allocation according to the total transmission power of the transmitting node and a preset power allocation coefficient, so as to obtain confidential signal power and artificial noise power; determining the receiving antenna gain of the receiving node according to the preset main lobe width; the confidential signal power, the artificial noise power and the receiving antenna gain are set as target safe transmission strategies.
In one embodiment, the performance evaluation module 1006 is further configured to perform connection interruption analysis according to the path loss parameter of the determined target access base station and the model parameter of the preset transmission model, so as to obtain connection interruption probability; carrying out security interruption analysis according to a target security transmission strategy and model parameters of a preset transmission model to obtain security interruption probability; the connection interruption probability and the security interruption probability are set as target evaluation results.
The above-mentioned respective modules in the secure transmission policy adjustment apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 11. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store confidential signals and secure transmission policy data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a secure transmission policy adjustment method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 11 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. A method for adjusting a secure transmission policy, the method comprising:
carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy, and determining a target access base station;
beam distribution and transmitting power distribution are carried out on confidential signals and artificial noise, and a target safe transmission strategy is determined;
evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
2. The method of claim 1, wherein the performing loss analysis on the communication link according to the preset transmission model and the preset access policy, and determining the target access base station, comprises:
calculating the signal quality of a transmission path according to a preset transmission model, and determining the loss of a communication link;
and selecting and judging the receiving end according to the communication link loss and a preset access strategy, and determining a target access base station.
3. The method of claim 2, wherein the calculating the signal quality of the transmission path according to the predetermined transmission model, determining the communication link loss, comprises:
determining a communication link type according to the transmitting node position, the receiving node position and a preset link selection condition;
and determining the communication link loss according to the communication link type and the corresponding path loss parameter.
4. The method of claim 2, wherein the selecting and judging the receiving end according to the communication link loss and the preset access policy, and determining the target access base station, includes:
determining a preselected access base station according to a preset access strategy;
and determining a target access base station according to the path loss parameters for determining the communication link loss, the preselected access base station and the model parameters of the preset transmission model.
5. The method of claim 1, wherein the beam allocation and transmit power allocation of the confidential signal and the artificial noise to determine the target safe transmission strategy comprises:
performing power distribution according to the total transmitting power of the transmitting node and a preset power distribution coefficient to obtain confidential signal power and artificial noise power;
determining the receiving antenna gain of the receiving node according to the preset main lobe width;
setting the confidential signal power, the artificial noise power and the receiving antenna gain as target safe transmission strategies.
6. The method according to claim 1, wherein the evaluating the power grid performance according to the target access base station and the target safe transmission policy to obtain a target evaluation result includes:
performing connection interruption analysis according to the determined path loss parameters of the target access base station and the model parameters of the preset transmission model to obtain connection interruption probability;
carrying out security interruption analysis according to the target security transmission strategy and the model parameters of the preset transmission model to obtain security interruption probability;
and setting the connection interruption probability and the security interruption probability as target evaluation results.
7. A secure transmission policy adjustment device, the device comprising:
the base station determining module is used for carrying out loss analysis on the communication link according to a preset transmission model and a preset access strategy and determining a target access base station;
the strategy generation module is used for carrying out beam distribution and transmitting power distribution on the confidential signals and the artificial noise and determining a target safe transmission strategy;
the performance evaluation module is used for evaluating the performance of the power grid according to the target access base station and the target safe transmission strategy to obtain a target evaluation result;
and the strategy updating module is used for adjusting the target safe transmission strategy according to the target evaluation result and the current power grid state analysis result to obtain an adjusted safe transmission strategy.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310797813.7A 2023-06-30 2023-06-30 Security transmission policy adjustment method, device, computer equipment and storage medium Pending CN116847340A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310797813.7A CN116847340A (en) 2023-06-30 2023-06-30 Security transmission policy adjustment method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310797813.7A CN116847340A (en) 2023-06-30 2023-06-30 Security transmission policy adjustment method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116847340A true CN116847340A (en) 2023-10-03

Family

ID=88173762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310797813.7A Pending CN116847340A (en) 2023-06-30 2023-06-30 Security transmission policy adjustment method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116847340A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117335928A (en) * 2023-12-01 2024-01-02 长沙普洛电气设备有限公司 Engineering data transmission method, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117335928A (en) * 2023-12-01 2024-01-02 长沙普洛电气设备有限公司 Engineering data transmission method, system and storage medium
CN117335928B (en) * 2023-12-01 2024-01-30 长沙普洛电气设备有限公司 Engineering data transmission method, system and storage medium

Similar Documents

Publication Publication Date Title
US10211975B2 (en) Managed secure computations on encrypted data
Murta et al. Towards a realization of device-independent quantum key distribution
Moosavi et al. A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks
US20160055347A1 (en) Data access control method in cloud
KR101639051B1 (en) A method for secure communication in a network, a communication device, a network and a computer program therefor
Rajasoundaran et al. Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
CN111242453B (en) Financial evaluation method and evaluation system based on block chain
Grissa et al. Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures
CN116847340A (en) Security transmission policy adjustment method, device, computer equipment and storage medium
CN101888341A (en) Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains
US11741247B2 (en) Smart privacy and controlled exposure on blockchains
Li et al. Fuzzy c-means clustering based secure fusion strategy in collaborative spectrum sensing
Liang et al. Co-maintained database based on blockchain for idss: A lifetime learning framework
CN111639367A (en) Tree model-based two-party combined classification method, device, equipment and medium
Saha et al. The blockchain solution for the security of internet of energy and electric vehicle interface
CN114978638A (en) Block chain cross-chain supervision method based on shared nodes
Jia et al. Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Chen et al. Performance analysis and optimization of IRS-aided covert communication with hardware impairments
CN113065866B (en) Internet of things edge computing system and method based on block chain
CN113312635A (en) Multi-agent fault-tolerant consistency method and system based on state privacy protection
Basha et al. AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks
Azmat et al. Bio‐inspired collaborative spectrum sensing and allocation for cognitive radios
US9929860B1 (en) Methods and apparatus for generalized password-based secret sharing
Khan et al. Secure smart grids: Based on post-quantum blockchain
Zhang et al. Antiquantum privacy protection scheme in advanced metering infrastructure of smart grid based on consortium blockchain and rlwe

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination