CN117650844A - VLC relay system safety performance optimization method - Google Patents
VLC relay system safety performance optimization method Download PDFInfo
- Publication number
- CN117650844A CN117650844A CN202410118373.2A CN202410118373A CN117650844A CN 117650844 A CN117650844 A CN 117650844A CN 202410118373 A CN202410118373 A CN 202410118373A CN 117650844 A CN117650844 A CN 117650844A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- light source
- path
- main light
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000005457 optimization Methods 0.000 title claims abstract description 17
- 238000004891 communication Methods 0.000 claims abstract description 377
- 230000005855 radiation Effects 0.000 claims abstract description 215
- 230000001815 facial effect Effects 0.000 claims abstract description 20
- 238000004364 calculation method Methods 0.000 claims description 22
- 230000001174 ascending effect Effects 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 16
- 238000012216 screening Methods 0.000 claims description 14
- 230000008878 coupling Effects 0.000 claims description 9
- 238000010168 coupling process Methods 0.000 claims description 9
- 238000005859 coupling reaction Methods 0.000 claims description 9
- 238000002372 labelling Methods 0.000 claims description 4
- 238000012163 sequencing technique Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 abstract description 19
- 238000004422 calculation algorithm Methods 0.000 description 24
- 238000000605 extraction Methods 0.000 description 13
- 238000005286 illumination Methods 0.000 description 13
- 238000004458 analytical method Methods 0.000 description 10
- 230000008054 signal transmission Effects 0.000 description 10
- 230000000694 effects Effects 0.000 description 8
- 238000013461 design Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000000007 visual effect Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000001965 increasing effect Effects 0.000 description 4
- 238000005259 measurement Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000013136 deep learning model Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012800 visualization Methods 0.000 description 2
- 230000003321 amplification Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 238000003708 edge detection Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/11—Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
- H04B10/114—Indoor or close-range type systems
- H04B10/116—Visible light communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/29—Repeaters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of visible light communication, in particular to a safety performance optimization method of a VLC relay system. The method comprises the following steps: acquiring legal user face image data and an indoor floor contour map; positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user; performing point projection on the indoor floor contour map according to legal user position data, thereby obtaining a projected indoor floor contour map; calculating a radiation radius interval of the main light source so as to obtain radiation radius interval data of the main light source; and (3) carrying out primary light source and relay equipment radiation range drawing on the projection indoor floor profile, thereby obtaining an updated projection indoor floor profile. According to the invention, the safety and the reliability of the VLC relay system can be improved by selecting the optimal communication path and encrypting the transmission data, so that safer and more efficient indoor visible light communication is realized.
Description
Technical Field
The invention relates to the technical field of visible light communication, in particular to a safety performance optimization method of a VLC relay system.
Background
With the development of wireless communication technology, VLC is an emerging communication technology, and has wide application prospect by utilizing visible light wave bands for data transmission. VLC relay systems play a key role in VLC communication, and can expand communication range, enhance signal coverage, and improve communication quality by relay devices. However, current VLC relay systems present some challenges in terms of security performance.
Because VLC has spectrum openness, even if visible light is non-wall-penetrating, its communication system still presents physical layer security risks. In addition, the relay system improves the channel quality of the weak user in a mode of increasing the relay, and in the VLC relay system, a single-hop link of the direct transmission system is increased to a double-hop or multi-hop link of the relay system, so that the user is at risk of being intercepted, the relay is also at risk of being intercepted, namely the number of the intercepted nodes is increased, and the safety risk of the relay process is further increased.
Disclosure of Invention
Based on the foregoing, the present invention is needed to provide a method for optimizing safety performance of a VLC relay system, so as to solve at least one of the above-mentioned technical problems.
In order to achieve the above object, a method for optimizing safety performance of a VLC relay system, acting indoors, wherein a main light source is fixed on a ceiling of the indoor, a plurality of relay devices are arranged between the ceiling and a floor of the indoor, a plurality of cameras are arranged in the indoor, a plurality of potential eavesdropping users are arranged in the indoor, and at least one legal user is arranged in the indoor, comprising the following steps:
Step S1: acquiring legal user face image data and an indoor floor contour map; positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user; performing point projection on the indoor floor contour map according to legal user position data, thereby obtaining a projected indoor floor contour map;
step S2: calculating a radiation radius interval of the main light source so as to obtain radiation radius interval data of the main light source; drawing the radiation range of a main light source and relay equipment on the projection indoor floor profile, thereby obtaining an updated projection indoor floor profile; calculating the horizontal distance between the user and the main light source according to the updated floor profile in the projection room, so as to obtain the horizontal distance data between the user and the main light source;
step S3: comparing the user-primary light source horizontal distance data with primary light source radiation radius interval data; when a legal user is in the radiation range of the main light source, carrying out radiation radius adjustment on the main light source according to the horizontal distance data of the user and the main light source, thereby obtaining first radiation radius data of the main light source; selecting an optimal communication path between the main light source and a legal user based on the first radiation radius data of the main light source, so as to acquire first optimal communication path data;
Step S4: when the legal user is out of the radiation range of the main light source, carrying out reachable communication path statistics between the main light source and the user so as to acquire a second candidate path data set; acquiring user performance requirement data; when the user performance requirement data is communication security data, security path screening is carried out on the second candidate path data set, so that second optimal communication path data are obtained; when the user performance requirement data is communication low-delay data, carrying out communication low-delay path screening on the second candidate path data set so as to obtain third optimal communication path data;
step S5: taking the first optimal communication path data or the second optimal communication path data or the third optimal communication path data as final communication link data; acquiring data to be transmitted; performing biological characteristic encryption on data to be transmitted according to legal user face image data, thereby obtaining encrypted data to be transmitted; and transmitting the encrypted data to be transmitted based on the final communication link data.
The invention can realize the accurate positioning of the legal user by acquiring the facial image data of the legal user and positioning the position data of the legal user. The projected indoor floor profile can be obtained using point projection of the indoor floor profile. This may help determine the distance between the legitimate user and the primary light source for communication path selection and radiation radius adjustment. By calculating the radiation radius interval data of the main light source, the radiation range of the main light source can be determined. And the projection indoor floor contour map is subjected to radiation range drawing, so that the projection indoor floor contour map can be updated, and the radiation ranges of the main light source and the relay equipment can be accurately represented. And calculating horizontal distance data of the user and the main light source according to the updated projection indoor floor profile, and facilitating adjustment of the radiation radius of the main light source and communication path selection in the subsequent steps. Comparing the user-primary light source horizontal distance data with the primary light source radiation radius interval data can determine whether a legitimate user is within the radiation range of the primary light source. If the legal user is in the radiation range of the main light source, the radiation radius of the main light source is adjusted according to the horizontal distance data of the user-the main light source, so that the legal user is placed in the radiation range of the main light source, and the coverage range and the signal strength of communication are optimized. Based on the primary light source first radiation radius data, an optimal communication path can be selected, and communication quality and safety performance are ensured. When a legitimate user is outside the radiation range of the primary light source, a reachable communication path needs to be found. The second candidate path dataset may be obtained by counting the reachable communication paths between the primary light source and the user. According to the performance requirement data of the user, the second candidate path data set can be subjected to requirement screening according to the requirement of communication safety or low latency, so that second or third optimal communication path data can be obtained. In this way, the optimization selection can be performed according to the requirements of the user, so that better communication performance is provided and the specific requirements of the user are met. In summary, the invention can prevent the relay node from being eavesdropped and ensure the reliability and confidentiality of data transmission by adopting reasonable communication path selection and data encryption strategies. The invention can locate legal users, adjust the radiation radius of the main light source, select the optimal communication path and encrypt and transmit data, thereby improving the safety, communication range and quality of the system and reducing the eavesdropping risk to the greatest extent.
The main difference between the invention and paper Physical Layer Security Performance Analysis for Relay-Aided Visible Light Communication System is that firstly, the considered scene is different, the considered application scene in the paper is static, and the main light source with fixed radiation radius and no detector are considered in the paper under the condition that both legal users and potential eavesdroppers are static; the applicable scene of the invention is a dynamic scene, legal users and potential eavesdroppers are in a disordered dynamic change process, and the invention considers that the radiation radius of the main light source is adjustable, so that the radiation range is wider, and the visible light communication system in the scene of the invention has more flexibility. Secondly, the invention can detect the total number of the eavesdroppers of each communication link by arranging a plurality of cameras, and can select a safer communication link by comparing the total number of the eavesdroppers of each communication link; however, the main work of the paper is to deduce and verify the probability of the safety interruption, but the invention just uses the result to set the threshold of the probability of the safety interruption, then compares the number of eavesdroppers near the communication link and the relay node, can ensure the connectivity of the link, and further considers the real-time performance of data transmission. Third, the paper considers only the quality and security of area-edge user communications in a visible light communication system, while the present invention considers the quality and security of all legitimate user communications in a visible light communication system. Fourth, the paper simply helps the communication between the LED light source and the legitimate edge user by selecting the LED task light closest to the legitimate edge user as a relay to determine the optimal communication path; the invention considers the safety between all legal users and the paths which can be communicated with the main light source in the visible light communication system. Fifth, the invention considers not only the safe interruption probability, but also the path length, the path obstacle and the distance between the final relay node and the user on the communication link in all the communicable paths between the legal user and the main light source; whereas the paper only considers the security outage probability of the relay node closest to the user. Sixth, the scenario considered by the paper favors academic research; and the practicability of the scene considered by the invention is stronger. Seventh, the present invention classifies and discusses the distance between the user and the dynamic main light source radiation radius, one is the dynamic legal user within the adjustable radiation radius range, and the other is the dynamic legal user outside the adjustable radiation radius range, and this factor is not considered in the paper.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of a non-limiting implementation, made with reference to the accompanying drawings in which:
fig. 1 is a schematic flow chart of the steps of a VLC relay system security performance optimization method according to an embodiment.
Fig. 2 shows a detailed step flow diagram of step S3 of an embodiment.
Fig. 3 shows a detailed step flow diagram of step S35 of an embodiment.
Detailed Description
The following is a clear and complete description of the technical method of the present patent in conjunction with the accompanying drawings, and it is evident that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, are intended to fall within the scope of the present invention.
Furthermore, the drawings are merely schematic illustrations of the present invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. The functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor methods and/or microcontroller methods.
It will be understood that, although the terms "first," "second," etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
To achieve the above objective, referring to fig. 1 to 3, the present invention provides a method for optimizing security performance of a VLC relay system, for acting in a room, wherein a main light source is fixed on a ceiling of the room, a plurality of relay devices are disposed between the ceiling and a floor of the room, a plurality of cameras are disposed in the room, a plurality of potential eavesdropping users are disposed in the room, and at least one legal user is disposed in the room, the method comprising the steps of:
step S1: acquiring legal user face image data and an indoor floor contour map; positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user; performing point projection on the indoor floor contour map according to legal user position data, thereby obtaining a projected indoor floor contour map;
Step S2: calculating a radiation radius interval of the main light source so as to obtain radiation radius interval data of the main light source; drawing the radiation range of a main light source and relay equipment on the projection indoor floor profile, thereby obtaining an updated projection indoor floor profile; calculating the horizontal distance between the user and the main light source according to the updated floor profile in the projection room, so as to obtain the horizontal distance data between the user and the main light source;
step S3: comparing the user-primary light source horizontal distance data with primary light source radiation radius interval data; when a legal user is in the radiation range of the main light source, carrying out radiation radius adjustment on the main light source according to the horizontal distance data of the user and the main light source, thereby obtaining first radiation radius data of the main light source; selecting an optimal communication path between the main light source and a legal user based on the first radiation radius data of the main light source, so as to acquire first optimal communication path data;
step S4: when the legal user is out of the radiation range of the main light source, carrying out reachable communication path statistics between the main light source and the user so as to acquire a second candidate path data set; acquiring user performance requirement data; when the user performance requirement data is communication security data, security path screening is carried out on the second candidate path data set, so that second optimal communication path data are obtained; when the user performance requirement data is communication low-delay data, carrying out communication low-delay path screening on the second candidate path data set so as to obtain third optimal communication path data;
Step S5: taking the first optimal communication path data or the second optimal communication path data or the third optimal communication path data as final communication link data; acquiring data to be transmitted; performing biological characteristic encryption on data to be transmitted according to legal user face image data, thereby obtaining encrypted data to be transmitted; and transmitting the encrypted data to be transmitted based on the final communication link data.
The invention can realize the accurate positioning of the legal user by acquiring the facial image data of the legal user and positioning the position data of the legal user. The projected indoor floor profile can be obtained using point projection of the indoor floor profile. This may help determine the distance between the legitimate user and the primary light source for communication path selection and radiation radius adjustment. By calculating the radiation radius interval data of the main light source, the radiation range of the main light source can be determined. And the projection indoor floor contour map is subjected to radiation range drawing, so that the projection indoor floor contour map can be updated, and the radiation ranges of the main light source and the relay equipment can be accurately represented. The horizontal distance data of the user-main light source is calculated according to the updated projection indoor floor profile, and the adjustment of the radiation radius of the main light source and the communication path selection in the follow-up steps are facilitated. Comparing the user-primary light source horizontal distance data with the primary light source radiation radius interval data can determine whether a legitimate user is within the radiation range of the primary light source. If the legal user is in the radiation range of the main light source, the radiation radius of the main light source is adjusted according to the horizontal distance data of the user-the main light source, so that the legal user is placed in the radiation range of the main light source, and the coverage range and the signal strength of communication are optimized. Based on the primary light source first radiation radius data, an optimal communication path can be selected, and communication quality and safety performance are ensured. When a legitimate user is outside the radiation range of the primary light source, a reachable communication path needs to be found. The second candidate path dataset may be obtained by counting the reachable communication paths between the primary light source and the user. According to the performance requirement data of the user, the second candidate path data set can be subjected to requirement screening according to the requirement of communication safety or low latency, so that second or third optimal communication path data can be obtained. In this way, the optimization selection can be performed according to the requirements of the user, so that better communication performance is provided and the specific requirements of the user are met. In summary, the invention can prevent the relay node from being eavesdropped and ensure the reliability and confidentiality of data transmission by adopting reasonable communication path selection and data encryption strategies. The invention can locate legal users, adjust the radiation radius of the main light source, select the optimal communication path and encrypt and transmit data, thereby improving the safety, communication range and quality of the system and reducing the eavesdropping risk to the greatest extent.
Preferably, step S1 comprises the steps of:
step S11: acquiring legal user face image data and an indoor floor contour map;
specifically, for example, a legitimate user may capture their facial image data when they enter the room through the camera. The captured images may be analyzed using face recognition algorithms to identify facial features of legitimate users. The indoor floor outline drawing can be drawn according to the indoor design drawing by acquiring the indoor design drawing.
Step S12: positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user;
specifically, for example, after the facial features of the legal user are identified by using a face recognition algorithm, the relative position of the legal user in the room can be estimated according to the position and angle information of the camera. The accuracy of positioning can be further improved by utilizing the visual field overlapping areas of the cameras through a triangular positioning or multi-view positioning algorithm. Finally, location data of the legitimate user, such as the user's coordinates or relative location in the room, can be determined.
Step S13: acquiring position data of a main light source and position data of each relay device;
Specifically, for example, the main light source position data and the position data of each relay device may be acquired by manual measurement. Alternatively, an optical sensor or a position sensing device may be used to obtain position data of a primary light source fixed to the ceiling of the room. Between the ceiling and the floor several relay devices may be installed with position sensing devices to obtain their position data for subsequent signal transmission and relay functions.
Step S14: performing point projection on the indoor floor contour map according to legal user position data, main light source position data and position data of each relay device, so as to obtain a first indoor floor contour map;
specifically, for example, the position data of the legitimate user, the main light source, and each relay device may be converted into projection points on the indoor floor profile. For legal users, according to the position data, the position points of the legal users are projected onto the indoor floor contour map. For the main light source, according to the position data, the position point of the main light source is projected onto the indoor floor contour map. For each relay device, their location points are projected onto the indoor floor profile according to its location data. In this embodiment, the indoor floor profile is a two-dimensional plane, and the relative positional relationship of the legitimate user, the main light source, and the relay devices can be obtained on the floor profile by projecting the positional data of them onto the floor profile.
Step S15: capturing the portrait of the indoor potential eavesdropping user by using a camera, so as to obtain a portrait image set of the potential eavesdropping user;
specifically, for example, image data in a room can be acquired by a camera through a real-time video stream. And analyzing the image captured by the camera by using a face detection algorithm in the computer vision technology so as to detect the face. And processing the detected face by a face recognition algorithm to distinguish potential eavesdropping users from other people. The face images identified as potential eavesdropping users are saved to form a potential eavesdropping user portrait image set.
Step S16: repeating the image rejection of the image set of the potential eavesdropping user, thereby obtaining a simplified image set of the potential eavesdropping user;
specifically, for example, feature extraction may be performed on each of the image images in the image set of the potential eavesdropping user, and a face feature extraction algorithm, such as a face feature extraction method based on deep learning, may be used. The extracted features are compared, and a similarity measurement algorithm, such as cosine similarity, can be used. And judging the portrait images with similarity higher than the threshold value as repeated portraits according to the set similarity threshold value, and eliminating the portraits. The removed portrait image set is used as the portrait image set of the simple potential eavesdropping user.
Step S17: and carrying out potential eavesdropping user position point projection on the first indoor floor contour map by combining a camera according to the reduced potential eavesdropping user portrait image set, so as to obtain a projected indoor floor contour map.
Specifically, for example, face positioning and feature extraction may be performed on each image in the reduced set of potential eavesdropping user images to obtain face features and position data thereof. And identifying the positioned face by utilizing a face identification algorithm to determine the corresponding simplified potential eavesdropping user. And projecting the position points of the potential eavesdropping users onto the first indoor floor profile according to the position data of the potential eavesdropping users. And connecting and simplifying projection position points of potential eavesdropping users to form a projection indoor floor profile.
The invention can identify and locate the legal user by acquiring the facial image data of the legal user, ensures that only the legal user can participate in communication, and enhances the safety of a communication system. Accurate information of the geometric shape and the size of the indoor bottom plate can be provided by acquiring the indoor floor profile map, and basic data is provided for light source positioning and communication path planning in the subsequent steps. By locating the legal user, the position of the legal user can be accurately located, and accurate references are provided for light source adjustment, communication path selection and data encryption in the subsequent steps. The communication range can be limited, the number of potential eavesdropping users is reduced to the greatest extent in the signal transmission process, and the safety of a communication system is enhanced. The positions of the main light source and the relay devices can be determined by acquiring the position data of the main light source and the position data of each relay device, and accurate information is provided for communication path selection and signal strength adjustment in the subsequent steps. By knowing the position of the relay device, the layout of the relay system can be optimized, and the communication range and coverage performance can be improved. By performing point projection on the indoor floor profile, projection points corresponding to legal users and light source positions can be generated on the floor, and the shortest distance and visual visualization of the communication path can be determined. Providing accurate basic data for communication path selection and light source radiation range calculation in subsequent steps. By capturing the portrait of the potential eavesdropping user, the portrait information of the potential eavesdropping user can be identified and recorded for user identification and communication path selection in subsequent steps. Location data of potential eavesdropping users is provided, providing a reference for communication path selection, security analysis, and potential threat assessment. The position of the potential eavesdropping user can be marked on the first indoor floor profile by the projection of the position point of the potential eavesdropping user, and the potential eavesdropping area and the potential eavesdropping path are intuitively displayed. Visual references are provided for security analysis and potential threat assessment in subsequent steps to help identify potential security hazards and improve the security of the communication system.
Preferably, step S17 comprises the steps of:
step S171: performing real-time scene restoration on the indoor space by using a camera so as to obtain an indoor real-time point cloud model;
specifically, for example, image data in a room can be acquired by a camera through a real-time video stream. And analyzing the image captured by the camera by utilizing methods such as structured light or binocular vision in the computer vision technology so as to restore indoor scene information. And carrying out three-dimensional point cloud reconstruction on the indoor scene by a depth perception technology, such as using an RGB-D camera or using a deep learning model, so as to obtain an indoor real-time point cloud model. Or acquiring the indoor house three-dimensional design model, capturing a scene graph of the indoor house by using a camera, and attaching the house three-dimensional design model by using the captured image so as to obtain the indoor real-time point cloud model.
Step S172: performing virtual human body simple modeling on the indoor real-time point cloud model according to the reduced potential eavesdropping user portrait image set, so as to obtain an indoor-human body coupling model;
specifically, for example, human body pose estimation and keypoint detection may be performed on each of a reduced set of potential eavesdropping user human images, and a deep learning model such as openPose or the like may be used. And according to the detected human body key points, performing virtual human body simple modeling on the indoor real-time point cloud model, and corresponding the human body key points to the point cloud model to form an indoor-human body coupling model. And fusing the virtual human body model with the real-time point cloud model to obtain the indoor-human body coupling model.
Step S173: determining key points of potential eavesdropping users and extracting coordinates of the key points of the indoor-human body coupling model, so that a first potential eavesdropping person coordinate set is obtained;
specifically, for example, determination of human keypoints may be performed on an indoor-human coupling model, and a keypoint detection algorithm, such as openelse, may be used. And extracting the coordinates of the key points of the potential eavesdropping user from the indoor-human body coupling model according to the position information of the key points. And the extracted coordinates of the key points of the potential eavesdropping user are arranged into a first coordinate set of potential eavesdropping personnel.
Step S174: and carrying out potential eavesdropping user position point projection on the first indoor floor profile according to the first potential eavesdropping person coordinate set, so as to obtain a projected indoor floor profile.
Specifically, for example, the first indoor floor profile obtained in step S14 may be used as the reference image. The location points of each person in the first set of potential eavesdropping person coordinates are projected onto the floor plane of the reference image according to their location points. And marking projection points on the reference image to form a projection indoor floor profile.
According to the invention, the indoor real-time point cloud model is obtained through real-time scene restoration, so that three-dimensional perception and accurate modeling of an indoor environment can be provided, and basic data is provided for position positioning and path planning in subsequent steps. The real-time point cloud model reflects indoor dynamic changes, can capture the position and the movement track of potential eavesdropping users, and is beneficial to subsequent communication path selection, security analysis and potential threat assessment. By means of virtual human body simple modeling on the indoor real-time point cloud model, the human body model and the real-time point cloud model can be coupled, space constraint and position association of potential eavesdropping users are achieved, and accuracy of position identification is improved. The virtual human body simple modeling is helpful for extracting key features of the human body, and basic data is provided for key point determination and coordinate extraction in the subsequent steps. By performing keypoint determination and coordinate extraction on the indoor-human coupling model, keypoints, such as heads, hands, etc., of potential eavesdropping users can be determined in order to more accurately track and locate potential threats. The coordinate set of the potential eavesdropping user is extracted, accurate information on the position and movement of the potential eavesdropping user is provided, and basic data is provided for position point projection and security analysis in subsequent steps. The position of the potential eavesdropping user can be marked on the first indoor floor contour map through the projection of the position point of the potential eavesdropping user, visual representation is provided, and the identification of the potential safety hazard area is facilitated. The projection indoor floor profile shows the distribution of potential eavesdropping users indoors, provides references for security analysis and potential threat assessment, and is beneficial to dynamically selecting a communication path with higher security and improving the security of a communication system.
Preferably, step S2 comprises the steps of:
step S21: acquiring corresponding radiation radius data, current control file data of a main light source and current radiation radius data of the main light source of each relay device;
specifically, for example, for each relay device, its corresponding fixed radiation radius data may be acquired. This may be obtained from specifications provided by the device manufacturer or from a device document. The actual height data corresponding to each relay device is then obtained, either by actual measurement or in a VLC relay system device layout parameter file. And then, calculating the actual radiation radius data of the corresponding relay equipment according to the fixed radiation radius data corresponding to each relay equipment and the actual height data corresponding to the fixed radiation radius data, and taking the actual radiation radius data of the relay equipment as the corresponding radiation radius data of the relay equipment. The current control file data of the main light source is acquired through communication with the relay device or by using device management software. The data represents the current control gear of the main light source, such as the illumination range adjusting gear, the brightness adjusting gear or the color temperature gear. And acquiring current radiation radius data of the main light source. This may be obtained through a sensor of the primary light source device or an interface provided by device management software.
Step S22: acquiring a main light source control file data set, wherein the main light source control file data set comprises first control file data, second control file data and third control file data;
specifically, for example, a control profile data set of the main light source may be obtained according to a control system and device management software of the main light source. The primary light source control gear data set typically includes a plurality of control gears, such as different gears of the illumination range, brightness or color temperature. The first control gear data, the second control gear data and the third control gear data in the main light source control gear data set respectively represent different control gears. In this embodiment, the main light source is composed of led arrays, and the main light source has three control gears, and the control gears are used for selecting/controlling the led arrays in the main light source that need to emit light, and adjusting the radiation radius of the main light source by adjusting the number of the led arrays that emit light.
Step S23: calculating the radiation range radius of the main light source according to the current radiation radius data of the main light source, the first control file data and the third control file data, so as to obtain radiation radius interval data of the main light source;
specifically, for example, the current radiation range radius of the primary light source may be determined using the primary light source current radiation radius data. And determining the radius of the current radiation range of the main light source by using the current radiation radius data of the main light source. And the calculated radiation range radius data of the main light source are arranged into radiation radius interval data so as to represent the variation range of the radiation range of the main light source under different control gears.
Step S24: extracting the upper limit and the lower limit of the radiation radius of the main light source radiation radius interval data, thereby obtaining the upper limit and the lower limit of the radiation radius of the main light source;
specifically, for example, the upper limit and the lower limit of the radiation radius at each control gear may be extracted for the main light source radiation radius section data. This can be done by simple mathematical calculations to split the radiation radius interval data into upper and lower data.
Step S25: carrying out main light source and relay equipment radiation range description on the projection indoor floor profile according to the corresponding radiation radius data of each relay equipment, the upper limit and lower limit data of the radiation radius of the main light source and the current radiation radius data of the main light source, thereby obtaining an updated projection indoor floor profile;
specifically, for example, the radiation range of each relay device may be determined using the radiation radius data corresponding to each relay device. And determining the radiation range of the main light source according to the upper limit data and the lower limit data of the radiation radius of the main light source. And determining the current radiation range of the main light source according to the current radiation radius data of the main light source. The radiation ranges of the relay device and the main light source are depicted on a projection indoor floor contour diagram, the positions of the main light source and each relay device are used as circle centers, circles are drawn on the contour diagram, and the radius of each circle is the corresponding radiation radius. The operations may be performed using graphics processing software or drawing tools. And superposing the depicted radiation range with the projection indoor floor contour map to obtain an updated projection indoor floor contour map.
Step S26: and calculating the horizontal distance between the user and the main light source according to the updated floor profile in the projection room, thereby obtaining the horizontal distance data between the user and the main light source.
Specifically, for example, the user position and the main light source position may be determined in the updated projection indoor floor profile. The horizontal distance between the user and the primary light source is calculated using image processing techniques or measurement tools. The horizontal distance is the linear distance between the user and the main light source in the horizontal plane, and can be measured by using a geometric calculation method.
According to the invention, the radiation radius data of each relay device, the control file data of the main light source and the current radiation radius data are acquired, so that the radiation range information of each relay device and the main light source can be provided, and the indoor coverage area and the illumination intensity distribution can be determined. The control profile data and the current radiation radius data of the main light source provide knowledge of the control parameters and the current working state of the main light source, and provide basic data for radiation range calculation and distance calculation in subsequent steps. The control file data set of the main light source provides the selection of different illumination modes and intensities, so that a user can adjust the radiation radius of the main light source according to the requirements, and the flexibility of a path in visible light communication is improved. The radiation range radius is calculated according to the current radiation radius data of the main light source and the data of different control files, so that the radiation radius interval data of the main light source is obtained, the radiation range change condition of the main light source under the different control files is provided by the radiation radius interval data of the main light source, and a user is helped to know and select a proper radiation radius. The calculation of the radiation radius interval data provides basic data for the radiation range drawing and the distance calculation in the subsequent steps, and is beneficial to realizing the accurate positioning of the light source and the projection effect of the radiation range. The upper limit data and the lower limit data of the radiation radius of the main light source provide specific values of the radiation range of the main light source, so that a user can know and adjust the illumination range conveniently, and the illumination effect is ensured to meet the requirements. The extraction of the upper and lower limit data of the radiation radius provides necessary parameters and limiting conditions for projection indoor floor profile drawing and user-main light source distance calculation in the subsequent steps, and ensures the accuracy and feasibility of the subsequent processing steps. The projection indoor floor contour map is drawn according to the radiation radius data of the relay device and the main light source and the radiation radius upper limit and lower limit data, so that an updated projection indoor floor contour map is obtained, the updated projection indoor floor contour map provides the radiation range visualization of the relay device and the main light source, the illumination distribution and the coverage area can be understood in a visual way, and the decision of layout and path design can be made. The radiation range depiction provides necessary spatial information for the user-primary light source distance calculation in the subsequent step, is helpful for determining the relationship between the user and the light source, and provides basis for the personalized customization of the subsequent illumination effect. Distance information between the user and the primary light source can be provided by performing a calculation of the user-primary light source horizontal distance based on the updated projection indoor floor profile. The calculation result of the horizontal distance can be used for subsequent personalized illumination adjustment and user demand analysis, so that the system is helped to intelligently adjust illumination according to the user position and distance, and a safer communication environment is provided.
Preferably, step S3 comprises the steps of:
step S31: comparing the user-primary light source horizontal distance data with primary light source radiation radius interval data;
specifically, for example, the user-primary light source horizontal distance data may be compared with primary light source radiation radius interval data. If the user-primary light source horizontal distance data is less than or equal to the maximum value of the primary light source radiation radius interval data, then the user is located within the primary light source radiation range.
Step S32: when the legal user is in the radiation range of the main light source, comparing the user-main light source horizontal distance data with the current radiation radius data of the main light source;
specifically, for example, if the user is located within the primary light source radiation range, user-primary light source horizontal distance data and primary light source current radiation radius data are acquired. The user-primary light source horizontal distance data is compared with the primary light source current radiation radius data.
Step S33: when the user-main light source horizontal distance data is smaller than the current radiation radius data of the main light source, taking the main light source-user as a visible light communication path, and thus obtaining first optimal communication path data;
specifically, for example, if the user-primary light source horizontal distance data is smaller than the primary light source current radiation radius data, the primary light source-user may be taken as the visible light communication path, so as to obtain the first optimal communication path data, and relevant parameters of the path, such as channel gain, may be used.
Step S34: when the user-main light source horizontal distance data is equal to or greater than the current radiation radius data of the main light source, determining the radiation radius of the main light source according to the user-main light source horizontal distance data and the main light source radiation radius interval data, so as to obtain first radiation radius data of the main light source, and adjusting the control gear of the main light source according to the first radiation radius data of the main light source, so that a legal user is placed in the radiation range of the main light source;
specifically, for example, it may be determined whether the user-primary light source horizontal distance data is equal to or greater than the primary light source current radiation radius data. If the user-primary light source horizontal distance data is equal to or greater than the primary light source current radiation radius data, a radiation radius determination for the primary light source is required based on the user-primary light source horizontal distance data and the primary light source radiation radius interval data. And acquiring first radiation radius data of the main light source according to the result of the radiation radius determination. And then, using the first radiation radius data of the main light source to carry out control gear adjustment on the main light source so as to ensure that legal users are positioned in the radiation range of the main light source.
Step S35: and selecting an optimal communication path between the main light source and a legal user according to the updated projection indoor floor profile graph, so as to acquire first optimal communication path data.
Specifically, for example, a candidate path set between the main light source and the legal user may be counted according to updating the floor profile in the projection room, and then the candidate path set is subjected to optimal communication path selection according to the screening condition, so as to obtain first optimal communication path data.
According to the invention, by comparing the horizontal distance between the user and the main light source with the radiation radius interval data of the main light source, the comparison result can determine whether the user is in the radiation range of the main light source, and help to judge whether the user can be irradiated by the main light source. By evaluating the distance of the user from the light source, basic data can be provided for subsequent steps for determining an optimal communication path and lighting adjustment scheme. By evaluating the distance of the user from the light source, basic data can be provided for subsequent steps for determining an optimal communication path and lighting adjustment scheme. The judgment of the result provides basis for the subsequent steps for determining the optimal communication path and the illumination adjustment scheme. When the horizontal distance between the user and the main light source is smaller than the current radiation radius, the main light source-user is used as a visible light communication path, and the establishment of the visible light communication path provides a stable and high-speed communication mode, so that the user can carry out two-way communication or one-way communication with the main light source through light rays. The acquisition of the data of the first optimal communication path provides a reliable basis for data transmission and information exchange in the subsequent steps, and improves the communication efficiency and the user experience. When the horizontal distance between the user and the main light source is equal to or greater than the current radiation radius, the main light source is subjected to radiation radius determination and control gear adjustment according to the user-main light source horizontal distance and the main light source radiation radius interval data to obtain first radiation radius data of the main light source, so that a proper radiation range value is provided, the radiation of the main light source is ensured to cover the position of a legal user, and the illumination requirement of the user is met. The control gear adjustment can ensure that the main light source adjusts the radiation range according to the distance between the user and the light source, so that legal users are in the radiation range of the main light source, and stable and proper illumination environment is provided. By selecting the communication path between the main light source and the legal user according to the updated projection indoor floor profile, the selection of the optimal communication path can provide the optimal light transmission effect, reduce signal loss and interference in transmission, and improve communication quality and reliability. The acquisition of the first optimal communication path data can provide a reliable basis for subsequent data transmission and information communication, and high-efficiency and safe communication between the user and the main light source is ensured.
Preferably, step S35 includes the steps of:
step S351: carrying out new radiation range drawing on the updated projection indoor floor profile according to the first radiation radius data of the main light source, thereby obtaining a first updated projection indoor floor profile;
specifically, for example, the projection indoor floor profile may be updated using image processing software or tool loading. And drawing a new radiation range of the main light source on the floor outline according to the first radiation radius data of the main light source. And generating a first updated projection indoor floor profile according to the drawn new radiation range.
Step S352: carrying out potential eavesdropping personnel coordinate statistics on a radiation range corresponding to the first radiation radius data of the main light source according to the first updated projection indoor floor profile graph, so as to obtain a second potential eavesdropping personnel coordinate set;
specifically, for example, the radiation range corresponding to the main light source may be determined on the first updated projection indoor floor profile according to the first radiation radius data of the main light source. For each coordinate point that may exist, it is determined whether it is within the primary light source radiation range. Coordinate points within the radiation range of the main light source are used as coordinate sets of potential eavesdroppers.
Step S353: carrying out communication relay reachable path statistics between a main light source and a user according to the first updated projection indoor floor profile graph, thereby obtaining a first candidate path data set;
specifically, for example, a graph theory algorithm, such as Depth First Search (DFS) or Breadth First Search (BFS), may be used to traverse the path of the floor profile. And starting from the position of the main light source, sequentially advancing to adjacent passable areas, and recording the passing path. According to the position and layout of the communication relay apparatus, a relay path is determined to ensure the reliability of signal transmission. The traversal continues until the user location is reached or no more paths are available. Repeating the steps in the embodiment to calculate all possible reachable paths between the primary light source and the user, and taking all the calculated reachable paths as the first candidate path data set. Or a backtracking algorithm may be employed to record each path and continue searching for other possible paths. It is ensured that all feasible paths are traversed until all possible candidate paths are found. And taking all the calculated reachable paths as a first candidate path data set.
Step S354: carrying out potential eavesdropping personnel coordinate statistics on each candidate path in the first candidate path data set according to the first updated projection indoor floor profile graph, so as to obtain a third potential eavesdropping user coordinate set;
Specifically, for example, a coordinate judgment algorithm such as a ray method or a polygon judgment method may be used to judge whether or not the point on each path is located in the coordinate set of the potential eavesdropper. To traverse by a point on the path for each path in the first candidate path dataset. And recording points in the coordinate set of the potential eavesdropper to form a third coordinate set of the potential eavesdropper. Or using artificial statistics of coordinates of potential eavesdropping users for each path in the first candidate path data set to form a third potential eavesdropping user coordinate set.
Step S355: correspondingly eliminating the data, in the third potential eavesdropping user coordinate set, which is the same as the coordinates of the second potential eavesdropping person coordinate set, so as to obtain a first potential eavesdropping user increment coordinate set, wherein the first potential eavesdropping user increment coordinate set comprises potential eavesdropping user increment coordinates corresponding to each candidate path; performing potential eavesdrop user increment statistics on each candidate path in the first candidate path data set according to the first potential eavesdrop user increment coordinate set, so as to obtain potential eavesdrop user increment data corresponding to each candidate path;
specifically, for example, for each coordinate point in the third potential eavesdropping user coordinate set, it may be checked whether the point is the same as any coordinate point in the second potential eavesdropper coordinate set. If the same coordinate point exists, the point is removed from the third set of potentially eavesdropping user coordinates. The remaining coordinate points form a first set of potential eavesdropping user delta coordinates including potential eavesdropping user delta coordinates corresponding to each candidate path.
Step S356: and selecting the optimal communication path of the first candidate path data set based on the increment data of the potential eavesdropping user corresponding to each candidate path, so as to acquire the first optimal communication path data.
Specifically, for example, for each candidate path, an optimal communication path may be evaluated and selected according to incremental data of potential eavesdropping users, for example, each candidate path may be evaluated and ordered, and factors such as the number of potential eavesdropping users, the number of relay nodes, channel gain, and the like are considered to select a path with the highest score as the first optimal communication path.
According to the invention, the new radiation range of the projection indoor floor profile is depicted according to the first radiation radius data of the main light source, so that a new floor profile based on the radiation range of the main light source is provided, and the new radiation range of the main light source is reflected. An updated floor profile is provided that provides an updated reference for path selection and potential eavesdropping user detection in subsequent steps. The coordinate statistics is carried out on the potential eavesdroppers in the radiation range of the main light source according to the first updated projection indoor floor profile graph, so that a second potential eavesdropper coordinate set is obtained, the position information of the potential eavesdroppers in the radiation range of the main light source can be provided, the detection and the identification of possible eavesdropping threats can be facilitated, and a reference basis is provided for subsequent path selection. The communication relay reachable paths between the main light source and the user are counted according to the first updated projection indoor floor profile to obtain a first candidate path data set, and the first candidate path data set provides various possible communication relay paths between the main light source and the user and is helpful for selecting the optimal communication path to ensure the reliability and quality of communication. The statistical communication relay reachable path provides a path selection mechanism based on geographic position, and can consider factors such as path reachability, signal quality and the like, and optimize communication effect. And carrying out potential eavesdropping personnel coordinate statistics on each candidate path according to the first updated projection indoor floor profile graph to obtain a third potential eavesdropping user coordinate set, wherein the third potential eavesdropping user coordinate set provides position information of potential eavesdropping users on each candidate path and is beneficial to identifying potential eavesdropping threats. By counting the coordinates of potential eavesdropping users, the impact of potential eavesdropping threats on each candidate path can be evaluated and a relatively safer path can be selected for communication. The third potential eavesdropping user coordinate set is processed to obtain a first potential eavesdropping user increment coordinate set, and the first potential eavesdropping user increment coordinate set provides position information of a newly-added potential eavesdropping user relative to the second potential eavesdropping person coordinate set, so that further identification and analysis of potential eavesdropping threats are facilitated. The increment statistics of the potential eavesdropping users provide the number information of newly added potential eavesdropping users on each candidate path, and provide basis for subsequent path selection and security evaluation. The optimal communication path selection is carried out based on the increment data of the potential eavesdropping user corresponding to each candidate path, so that first optimal communication path data is obtained, and the first optimal communication path data provides the optimal communication path selected under the condition of considering the potential eavesdropping threat, so that the safety and the reliability of communication are ensured. By analyzing and balancing the incremental data of potential eavesdropping users, paths that are relatively less threatened by potential eavesdropping can be selected, improving the security of the communication system. In summary, the invention can better protect the communication system from the influence of potential eavesdropping threat, and improve the reliability and confidentiality of communication.
Preferably, step S356 comprises the steps of:
step S3561: performing ascending sort on the incremental data of the potential eavesdropping users corresponding to each candidate path, so as to obtain an incremental sorting list of the potential eavesdropping users;
in particular, for example, the potential eavesdropping user delta data may be ranked using a ranking algorithm, such as a fast ranking or a merge ranking. Or sorting according to the size of the increment data, and arranging from small to large.
Step S3562: taking the first data and the second data in the eavesdropping user increment sequencing list as first eavesdropping user increment data and second eavesdropping user increment data;
specifically, for example, the first and second data may be taken out of the ordered list as the first eavesdropping user delta data and the second eavesdropping user delta data.
Step S3563: when the first eavesdropping user increment data is smaller than the second eavesdropping user increment data, taking a candidate path corresponding to the first eavesdropping user increment data as first optimal communication path data;
specifically, for example, the first eavesdropping user delta data and the second eavesdropping user delta data may be compared in size. And if the first eavesdropping user increment data is smaller than the second eavesdropping user increment data, selecting a candidate path corresponding to the first eavesdropping user increment data as first optimal communication path data.
Step S3564: when the first eavesdropping user increment data is equal to the second eavesdropping user increment data, a candidate path corresponding to the first eavesdropping user increment data is obtained, and therefore first candidate communication path data are obtained; acquiring a candidate path corresponding to the incremental data of the second eavesdropping user, thereby acquiring second candidate communication path data;
specifically, for example, the sizes of the first eavesdropping user delta data and the second eavesdropping user delta data may be compared, and if the first eavesdropping user delta data is equal to the second eavesdropping user delta data, a candidate path corresponding to the first eavesdropping user delta data is acquired as the first candidate communication path data. Likewise, a candidate path corresponding to the second eavesdropping user delta data is acquired as second candidate communication path data.
Step S3565: labeling and extracting a path final relay node of the first updated projection indoor floor contour map according to the first candidate communication path data and the second candidate communication path data, so as to obtain a first path final node coordinate and a second path final node coordinate;
specifically, for example, the first candidate communication path data may be used to label and extract the path final relay node for the first updated projection indoor floor profile. The projection indoor floor contour map can be processed by using image processing algorithms, such as edge detection, contour extraction, hough transformation and the like. In the processing process, the relay node corresponding to the first candidate communication path data is found according to the path represented by the first candidate communication path data, and labeling and extraction are carried out. The result of the extraction may be coordinates of the relay node or other information representing the relay node location. Likewise, the projected indoor floor profile is processed from the second candidate communication path data using appropriate image processing algorithms and techniques to extract the final node coordinates of the second path.
Step S3566: performing horizontal distance calculation on the user and the first path final relay node according to legal user position data and the first path final node coordinates, so as to obtain first user-final relay node horizontal distance data; performing horizontal distance calculation on the user and the second path final relay node according to legal user position data and the second path final node coordinates, thereby obtaining second user-final relay node horizontal distance data;
specifically, for example, the horizontal distance between the user and the first path final relay node may be calculated using the legitimate user position data and the first path final node coordinates. The distance between two points may be calculated using the euclidean distance formula or other distance calculation method. Or regarding legal user position data and the final node coordinates of the first path as two points in space, and calculating the horizontal distance between the two points. Similarly, using the legal user location data and the second path final node coordinates, a horizontal distance between the user and the second path final relay node is calculated. The horizontal distance between the user position and the final node of the second path is calculated using a suitable distance calculation method, such as the euclidean distance formula.
Step S3567: when the first user-final relay node horizontal distance data is smaller than the second user-final relay node horizontal distance data, the first candidate communication path data is used as first optimal communication path data; when the first user-final relay node horizontal distance data is equal to the second user-final relay node horizontal distance data, the first candidate communication path data or the second candidate communication path data is used as first optimal communication path data; and when the first user-final relay node horizontal distance data is larger than the second user-final relay node horizontal distance data, the second candidate communication path data is used as first optimal communication path data.
Specifically, for example, if the first user-final relay node horizontal distance data is smaller than the second user-final relay node horizontal distance data, the first candidate communication path data is regarded as first optimal communication path data. And if the first user-final relay node horizontal distance data is equal to the second user-final relay node horizontal distance data, selecting one path as first optimal communication path data according to specific requirements. The selection may be considered based on other factors such as reliability of the path, bandwidth, etc. In this embodiment, either the first candidate communication-path data or the second candidate communication-path data is selected as the first optimal communication-path data. And if the first user-final relay node horizontal distance data is greater than the second user-final relay node horizontal distance data, the second candidate communication path data is used as the first optimal communication path data.
The invention can identify the priority order of the potential eavesdropping users by sorting the increment data of the potential eavesdropping users in an ascending order. This helps to select the optimal eavesdropping user delta data and communication path in the subsequent steps, ensuring efficient utilization of resources and optimizing network performance. By selecting the first and second eavesdropping user delta data, the two potential eavesdropping users with the lowest delta can be determined. This facilitates the determination of optimal communication path data and final relay node coordinates in subsequent steps to achieve optimal communication performance. By selecting the candidate path with the lower eavesdropping user delta data as the optimal communication path data. This can reduce interference of potential eavesdropping users on the communication path, improving the security and reliability of the communication. By handling the case where the first and second eavesdropping user delta data are equal. By acquiring the corresponding candidate path data, further analysis and selection of these paths can be continued, ensuring that the best communication path is selected. And labeling the indoor floor profile according to the candidate communication path data and extracting final relay node coordinates. This helps to determine the final relay node of the communication path, providing accurate data for user-final relay node horizontal distance calculation in subsequent steps. And obtaining first and second user-final relay node horizontal distance data through horizontal distance calculation of the user and the path final relay node. This helps to evaluate the distance between the user and the final relay node, determine the optimal communication path and the optimal final relay node, and thereby improve the security of the communication. Optimal communication path data is determined by comparing according to the horizontal distance between the user and the node. When the first user-final relay node horizontal distance data is smaller than the second user-final relay node horizontal distance data, the first candidate communication path data is selected as the first optimal communication path data. By selecting the first candidate communication path, it is possible to ensure that the horizontal distance between the user and the node is shorter, thereby reducing path loss and interference in signal transmission. This helps to improve communication quality and network performance. When the first user-final relay node horizontal distance data is equal to the second user-final relay node horizontal distance data, the first candidate communication path data or the second candidate communication path data is selected as the first optimal communication path data. In case the horizontal distances between the user and the final relay node are equal, further evaluation of other metrics is required to select the optimal communication path. By selecting the first or second candidate communication path data, other factors, such as channel gain, may be taken into account in combination to select the most appropriate communication path. And selecting the second candidate communication path data as the first optimal communication path data when the first user-final relay node horizontal distance data is greater than the second user-final relay node horizontal distance data. In the horizontal distance between the user and the final relay node, when the first user-final relay node horizontal distance data is larger than the second user-final relay node horizontal distance data, selecting the second candidate communication path can ensure that the distance between the user and the final relay node is shorter, and path loss and interference in signal transmission are reduced. This contributes to improvement of communication quality and security.
Preferably, step S4 comprises the steps of:
step S41: when the legal user is out of the radiation range of the main light source, carrying out reachable communication path statistics between the main light source and the user so as to acquire a second candidate path data set;
in particular, for example, if a legitimate user is outside the primary light source radiation range, a path search algorithm, such as Dijkstra's algorithm or a' algorithm, may be used to find all reachable paths from the primary light source to the user in the network topology. An reachable path refers to a path through which a signal can reach a user from a primary light source under signal transmission conditions. The found reachable communication paths are added to the second candidate path dataset. The communication path may be represented by a set of nodes or connections, recording the path and order of signal transmission.
Step S42: acquiring user performance requirement data;
specifically, for example, a user interface may be designed or a questionnaire provided for the user to fill in or select performance requirements. The performance requirement data of the user may be obtained by querying the user's personal profile or system settings. The performance requirement data may be stored in a database or configuration file for use by the system. User performance requirements may include bandwidth, latency, security, etc. requirements.
Step S43: carrying out communication safety interruption probability calculation on each candidate path in the second candidate path data set so as to obtain a communication safety interruption probability data set;
specifically, for example, the communication security break probability refers to a probability of causing a break of a communication link due to various reasons during communication. The probability model and statistical method may be used to calculate the communication security break probability, taking into account factors including channel gain, obstructions, etc. And correlating the calculated communication safety interruption probability with the corresponding candidate path to form a communication safety interruption probability data set. The data set may be a table or database that records the probability of communication security outage for each candidate path.
Step S44: correspondingly eliminating candidate paths corresponding to the communication safety interruption probability higher than the preset safety interruption probability threshold value in the second candidate path data set according to the preset safety interruption probability threshold value and the communication safety interruption probability data set, so as to acquire a third candidate path data set;
specifically, for example, a preset safe break probability threshold value may be determined. The safe break probability threshold value is a preset threshold value, and is used for determining which candidate paths have the safe break probability higher than the threshold value and need to be removed. And traversing each candidate path in the communication safety interruption probability data set and the corresponding communication safety interruption probability. Each candidate path in the data set has a communication security break probability corresponding thereto. And comparing each candidate path with a preset safe break probability threshold value. And if the communication safety interruption probability is higher than a preset safety interruption probability threshold value, rejecting the candidate path from the second candidate path data set. The candidate paths that are not rejected are composed into a third candidate path dataset. The third candidate path data set is a result after the candidate paths with the communication safety interruption probability higher than a preset threshold value are removed.
Step S45: when the user performance requirement data is communication security data, counting potential eavesdropping users of each candidate path in the third candidate path data set, so as to obtain potential eavesdropping user quantity data corresponding to each candidate path;
specifically, for example, when determining that the user performance requirement data is communication security data, this means that the user's requirement for the communication system is mainly concerned with communication security, such as preventing eavesdropping. Each candidate path in the third candidate path dataset is traversed. The third candidate path data set comprises candidate paths subjected to safe interrupt probability screening. For each candidate path, statistics of potential eavesdropping users are carried out according to the coordinate projection of the potential eavesdropping users in the first updated projection indoor floor profile. Each candidate path is associated with a corresponding number of potential eavesdropping users to form a potential eavesdropping user number data set. The data set may be a table or database that records the number of potential eavesdropping users for each candidate path.
Step S46: performing ascending sort on the number data of the potential eavesdropping users corresponding to each candidate path, so as to obtain a ranking table of the number of the potential eavesdropping users;
In particular, for example, an ordering algorithm, such as a fast ordering or a merge ordering, may be used to order the number of potential eavesdropping users in the dataset in ascending order. The ranking table of the number of potential eavesdropping users is a table or list ordered from small to large in the number of potential eavesdropping users. The table may contain two columns of candidate paths and corresponding numbers of potential eavesdropping users for ease of viewing and comparison.
Step S47: candidate path data corresponding to the first three potential eavesdropping user quantity data in the potential eavesdropping user quantity sequencing table are used as a fourth candidate path data set;
specifically, for example, candidate path data corresponding to the first three potential eavesdropping user number data may be selected from the potential eavesdropping user number ranking table. The first three candidate paths are fetched from the head of the ranking table, and the candidate paths correspond to the least number of potential eavesdropping users. And forming the selected candidate path data into a fourth candidate path data set.
Step S48: carrying out link communication relay node statistics on each candidate path in the fourth candidate path data set, thereby obtaining total relay node data corresponding to each candidate path; selecting a corresponding candidate path with the smallest total relay node data as a final communication path based on the total relay node data corresponding to each candidate path, thereby obtaining second optimal communication path data;
Specifically, for example, each candidate path in the fourth candidate path dataset may be traversed. For each candidate path, statistics of link communication relay nodes are required. For each candidate path, the number of link communication relay nodes is counted. The link communication relay node refers to a node that assumes a relay function in a communication path and is used to forward data. And associating each candidate path with the corresponding total relay node data to form a total relay node data set. The total relay node data set records the number of link communication relay nodes corresponding to each candidate path. And selecting a candidate path with the minimum number of relay nodes as a final communication path according to the data in the total relay node data set.
Step S49: and when the user performance requirement data is communication low-delay data, performing communication low-delay path screening on the third candidate path data set so as to acquire third optimal communication path data.
Specifically, for example, the user performance requirement data may be determined to be communication low latency data. This means that the user's demands on the communication system are mainly focused on minimizing the communication delay, and it is desirable to select a path with a lower delay. Communication low latency path screening is performed for each candidate path in the third candidate path data set. For example, the path selection mechanism of steps S491-S494 is used to evaluate the communication delay of each candidate path. And selecting a candidate path with lower delay as a third optimal communication path based on the screening result of the communication delay.
The invention can determine which paths can realize communication by counting the reachable communication paths between the main light source and the user. This has the advantage of providing an alternative path to ensure that the communication connection can still be established when the user is outside the radiation range of the primary light source, enhancing the reliability and coverage of the communication. By knowing the performance requirements of the user, the optimal communication path is selected based on these requirements. Different users may have different requirements for different aspects of the communication, such as security, low latency, etc. Acquiring user performance requirement data may help select an optimal communication path that meets user requirements. By calculating the communication security outage probability of each candidate path, the security of the path can be evaluated. This helps identify potential communication security risks and eliminates unsafe paths, thereby ensuring confidentiality and integrity of the communication. By setting the safe break probability threshold value, the communication path with higher safety can be screened out. The candidate paths with the communication safety interruption probability higher than the threshold value are eliminated, so that the risk that the communication is interrupted or threatened can be reduced, and the safety of the communication is improved. Counting potential eavesdropping users of the third candidate path may evaluate the security of the path. By determining the number of potential eavesdropping users, paths can be identified that present a security risk. This helps to select a communication path that can provide a higher security, protecting the communication content from unauthorized access and eavesdropping. By ordering the number of potential eavesdropping users, a ranking table of the number of potential eavesdropping users can be obtained. This helps to identify paths that are at risk for potential eavesdropping and prioritizes the risk size, further enhancing the security of the communication. By selecting the first three candidate paths with the highest number of potential eavesdropping users as the fourth candidate path data set, it may be ensured that the selected paths have a lower potential eavesdropping risk. By selecting a path with a smaller number of potential eavesdropping users, the risk of eavesdropping on the communication can be reduced, and the confidentiality and security of the communication can be improved. By counting the number of link communication relay nodes per candidate path, the reliability and stability of the path can be evaluated. The candidate path with the smallest total relay node data is selected as the final communication path, so that the reliability and stability of communication can be improved, and the possibility of communication interruption is reduced. The third candidate path dataset is filtered according to the user's need for low latency, selecting a communication path with lower latency. The method is favorable for meeting the application scene with higher requirement on real-time performance, provides faster communication response and data transmission, and enhances the real-time performance and efficiency of communication. In summary, the invention can enhance the reliability and coverage of communication, improve the security and confidentiality of communication, reduce the risk of interception of communication, and improve the stability and real-time performance of communication. The purpose of these steps is to select an optimal communication path to meet the performance needs of the user and to provide a better communication experience.
Preferably, step S49 comprises the steps of:
step S491: carrying out path communication relay node statistics on each candidate path in the third candidate path data set so as to obtain a candidate path relay node quantity data set;
specifically, for example, each candidate path in the third candidate path data set may be traversed. For each candidate path, statistics of path communication relay nodes are required. For each candidate path, the number of path communication relay nodes is counted. The path communication relay node is a node that performs a relay function in a communication path, and is configured to forward a packet. And associating each candidate path with the corresponding relay node number to form a candidate path relay node number data set. The candidate path relay node number data set records the number of path communication relay nodes corresponding to each candidate path.
Step S492: ascending order sorting is carried out on the candidate path relay node quantity data set, so that a candidate path relay node quantity ascending order table is obtained; taking candidate paths corresponding to the first three data of the ascending list of the number of the candidate path relay nodes as a fifth candidate path set;
specifically, for example, the candidate path relay node number data set may be sorted in ascending order using a sorting algorithm (e.g., fast sorting, merge sorting, etc.). And taking out the relay node numbers of all the candidate paths from the ordered data set according to ascending order to form an ascending order table of the relay node numbers of the candidate paths. And selecting candidate paths corresponding to the first three data from the head of the ascending list of the number of the relay nodes of the candidate paths, wherein the candidate paths have the least number of the relay nodes.
Step S493: calculating the number of path obstacles for each candidate path in the fifth candidate path set based on the indoor real-time point cloud model, so as to obtain a path obstacle number data set, wherein the path obstacle number data set comprises first path obstacle number data, second path obstacle number data and third path obstacle number data;
specifically, for example, the number of path obstacles may be calculated by mapping the candidate paths into an indoor real-time point cloud model, and counting the number of times the paths intersect with the obstacles in the point cloud model or calculating the distance between the paths and the obstacles. Each candidate path is associated with a corresponding number of path obstructions to form a path obstruction number data set. The path obstacle number data set records the number of path obstacles corresponding to each candidate path.
Step S494: comparing the first path obstacle number data, the second path obstacle number data and the third path obstacle number data, thereby obtaining minimum obstacle number data; and taking the candidate path corresponding to the minimum number of obstacles as third optimal communication path data.
Specifically, for example, the first path obstacle number data, the second path obstacle number data, and the third path obstacle number data may be compared. And determining data with the least number of obstacles, namely data with the least number of path obstacles, according to the comparison result. And finding a corresponding candidate path as third optimal communication path data according to the position of the minimum obstacle number data.
The invention can evaluate the reliability and stability of the paths by counting the number of the communication relay nodes of each candidate path. The relay node may provide signal amplification and forwarding functions to extend the coverage of the communication and enhance signal strength. Acquiring the candidate path relay node number dataset facilitates selection of paths with fewer relay nodes, thereby improving security of communications. By ordering the number of relay nodes in the candidate paths, a ranking table of the number of relay nodes can be obtained. The first three candidate paths with fewer relay nodes are selected as the fifth candidate path set, so that the reliability and stability of communication can be improved. Fewer relay nodes means fewer signal forwarding and transmission delays, helping to reduce delays and signal loss in communications. By performing a path obstacle number calculation for each candidate path in the fifth candidate path set, the traffic capacity and reliability of the path can be evaluated. Obstructions present in the path (e.g., walls, furniture, etc.) may interfere with signal transmission, cause signal attenuation, or multipath effects, thereby affecting the quality and stability of the communication. The acquisition of the data sets of the number of the path obstacles is beneficial to selecting paths with better traffic capacity, so that risks of signal interference and quality degradation are reduced, and the reliability of communication is improved. By comparing the first, second and third path obstacle number data, the path having the least number of obstacles can be determined. The candidate path with the minimum number of obstacles is selected as the third optimal communication path, so that the risk that signals are interfered by the obstacles can be reduced, and the stability and reliability of communication are improved. A smaller number of obstructions means less signal attenuation and multipath effects and helps to provide better signal transmission quality and communication performance. In summary, the present invention can improve reliability and stability of communication, reduce possibility of communication interruption, reduce delay and signal loss of communication, reduce risk of signal interference and quality degradation, improve throughput and quality of communication, and provide better signal transmission quality and communication performance. These effects help optimize the selection of communication paths, thereby improving the performance and user experience of the overall communication system.
Preferably, step S5 comprises the steps of:
step S51: taking the first optimal communication path data or the second optimal communication path data or the third optimal communication path data as final communication link data;
specifically, for example, when the path selection result obtained in the current example step is the first optimal communication path data, the first optimal communication path data is used as the final communication link data; when the path selection result obtained in the current example step is second optimal communication path data, the second optimal communication path data is used as final communication link data; when the path selection result obtained in the current example step is third optimal communication path data, the third optimal communication path data is used as final communication link data;
step S52: acquiring data to be transmitted;
specifically, for example, the type of data to be transmitted, such as user face image data, text data, audio data, and the like, and the source of the data, such as a camera, text input box, microphone, and the like, may be determined. According to the determined data source, the data to be transmitted is acquired from the corresponding device or input source. The format and coding mode of the transmission data are determined according to the transmission requirement and the system design, for example, the image data can use JPEG, PNG and other formats, and the audio data can use MP3, AAC and other formats. And acquiring data to be transmitted from corresponding equipment or input sources according to the data sources and the determined formats, and performing necessary format conversion and coding processing.
Step S53: performing picture cutting processing on the legal user face image data according to a preset cutting rule, so as to obtain a user face image block set, wherein the user face image block set comprises a plurality of user face image cutting blocks;
specifically, for example, the rules and methods of picture cutting, such as cutting by a fixed size, cutting by a specific location, etc., may be preset according to the needs and system design. And cutting the facial image data of the synthetic user into a plurality of blocks according to a preset cutting rule and a preset cutting method. The cut image blocks are combined to form a user face image block set, wherein the cut user face image blocks are included.
Step S54: counting the number of blocks of the user face image block set, so as to obtain user face image block number data; taking a data range represented by the user face image block quantity data as the sequence number of the user face image block set, thereby obtaining the user face image block sequence number set;
specifically, for example, a set of blocks of the user face image may be traversed, and the number of blocks therein calculated to determine the number of blocks of the user face image. And taking the block number statistical result as the block number data of the facial image of the user. Assuming that the number of user face image pieces data is N, the sequence number of the user face image piece set ranges from 1 to N. Based on the sequence number range, an integer sequence containing 1 to N is generated as a user face image block sequence number set.
Step S55: the method comprises the steps that a user face image block sequence number set is used as a random number generation constraint interval, and a random image block sequence number is generated by a random number generator based on the random number generation constraint interval, so that an encrypted face image block sequence number is obtained; extracting biological characteristics of a user face image cutting block corresponding to the encrypted face image block serial number, thereby obtaining a biological characteristic encryption key;
specifically, for example, the minimum value and the maximum value in the user face image block sequence number set may be set as constraint sections of the random number generator, ensuring that the generated random number is within this range. A random image block sequence number is generated within the scope of the user's facial image block sequence number set based on the previously generated constraint interval using a suitable random number generation algorithm or tool. This sequence number will be used to select the encrypted face image segment. The generated random image block sequence number is the encrypted facial image block sequence number. And finding out a corresponding user face image cutting block according to the encrypted face image block sequence number. And then, extracting the biological characteristics of the image block by using a biological characteristic extraction algorithm or tool to extract a biological characteristic encryption key. The process of biometric extraction may obtain biometric data that is unique.
Step S56: performing biological characteristic encryption on the data to be transmitted by using the biological characteristic encryption key, thereby obtaining encrypted data to be transmitted; and transmitting the encrypted face image block sequence number and the encrypted data to be transmitted based on the final communication link data.
Specifically, for example, the data to be transmitted may be encrypted with a biometric encryption key using a suitable biometric encryption algorithm or tool, such as biometric template encryption or a biometric-based encryption method. The encryption algorithm may employ an exclusive-or operation, AES encryption, or other encryption algorithm. Only a decryption party with a corresponding biological characteristic encryption key is ensured to decrypt and restore the original data, so that the biological characteristic encryption is realized. And after biological characteristic encryption processing, obtaining encrypted data to be transmitted, namely encrypting the data to be transmitted. These data are already protected by the biometric encryption key, ensuring that only the decrypting party with the corresponding biometric encryption key is able to decrypt and restore the original data. In the final communication link, the encrypted face image block sequence number is transmitted to the target device together with the encrypted data to be transmitted. The data transmission may be performed using a suitable communication protocol or manner.
The invention can ensure that the communication path with better performance and higher security is selected by selecting the first, second or third optimal communication path as the final communication link data. This helps to improve the quality and stability of the communication, ensuring that data can be efficiently and safely transmitted to legitimate users. Acquisition of data to be transmitted is the basis for communication. Such data may include files, messages, and the like. By acquiring the data to be transmitted, it is ensured that there is valid information to be transmitted, providing input for subsequent processing steps. The whole face image can be divided into a plurality of small blocks, namely user face image cutting blocks, by performing picture cutting processing on the synthetic user face image data according to a preset cutting rule. By the partitioning processing, a large amount of facial image data can be processed more flexibly, and the processing efficiency and the accuracy of biological feature extraction are improved. And counting the number of the facial images of the user, and providing basic data for the subsequent random number generation and sequence number set processing. By counting the number of blocks, it is possible to know how many blocks an image is cut into and assign a unique sequence number to each image block. This helps to accurately identify and locate each image block in subsequent processing and transmission. Encryption of the face image block sequence number can be achieved by using the set of face image block sequence numbers of the user as a constraint section in combination with a random number generator to generate a random image block sequence number. The encryption method can increase the security of data transmission and reduce unauthorized access and use. And secondly, extracting biological characteristics of the user facial image cutting blocks corresponding to the encrypted facial image block serial numbers, and acquiring a biological characteristic encryption key. These biometric data can be used for authentication and secure access control, ensuring that only authorized users can decrypt the data during transmission. And carrying out biological characteristic encryption on the data to be transmitted by utilizing the encrypted biological characteristic data, thereby obtaining the encrypted data to be transmitted. Biometric encryption is a secure encryption method that ensures confidentiality and integrity of data. By encrypting using biometric data, only authorized users with the corresponding biometric can decrypt and access the data. Then, based on the final communication link data, the encrypted face image block sequence number and the encrypted data to be transmitted are transmitted. By transmitting the encrypted data over the final communication link, the data may be protected from interception or tampering by unauthorized users, thereby ensuring the security and reliability of the data transmission.
The main difference between the invention and paper Physical Layer Security Performance Analysis for Relay-Aided Visible Light Communication System is that firstly, the considered scene is different, the considered application scene in the paper is static, and the main light source with fixed radiation radius and no detector are considered in the paper under the condition that both legal users and potential eavesdroppers are static; the applicable scene of the invention is a dynamic scene, legal users and potential eavesdroppers are in a disordered dynamic change process, and the invention considers that the radiation radius of the main light source is adjustable, so that the radiation range is wider, and the visible light communication system in the scene of the invention has more flexibility. Secondly, the invention can detect the total number of the eavesdroppers of each communication link by arranging a plurality of cameras, and can select a safer communication link by comparing the total number of the eavesdroppers of each communication link; however, the main work of the paper is to deduce and verify the probability of the safety interruption, but the invention just uses the result to set the threshold of the probability of the safety interruption, then compares the number of eavesdroppers near the communication link and the relay node, can ensure the connectivity of the link, and further considers the real-time performance of data transmission. Third, the paper considers only the quality and security of area-edge user communications in a visible light communication system, while the present invention considers the quality and security of all legitimate user communications in a visible light communication system. Fourth, the paper simply helps the communication between the LED light source and the legitimate edge user by selecting the LED task light closest to the legitimate edge user as a relay to determine the optimal communication path; the invention considers the safety between all legal users and the paths which can be communicated with the main light source in the visible light communication system. Fifth, the invention considers not only the safe interruption probability, but also the path length, the path obstacle and the distance between the final relay node and the user on the communication link in all the communicable paths between the legal user and the main light source; whereas the paper only considers the security outage probability of the relay node closest to the user. Sixth, the scenario considered by the paper favors academic research; and the practicability of the scene considered by the invention is stronger. Seventh, the present invention classifies and discusses the distance between the user and the dynamic main light source radiation radius, one is the dynamic legal user within the adjustable radiation radius range, and the other is the dynamic legal user outside the adjustable radiation radius range, and this factor is not considered in the paper.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. The safety performance optimization method of the VLC relay system is characterized by acting indoors, wherein a main light source is fixed on an indoor ceiling, a plurality of relay devices are arranged between the indoor ceiling and a floor, a plurality of cameras are arranged in the indoor, a plurality of potential eavesdropping users are arranged in the indoor, and at least one legal user is arranged in the indoor, and the method comprises the following steps:
Step S1: acquiring legal user face image data and an indoor floor contour map; positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user; performing point projection on the indoor floor contour map according to legal user position data, thereby obtaining a projected indoor floor contour map;
step S2: calculating a radiation radius interval of the main light source so as to obtain radiation radius interval data of the main light source; drawing the radiation range of a main light source and relay equipment on the projection indoor floor profile, thereby obtaining an updated projection indoor floor profile; calculating the horizontal distance between the user and the main light source according to the updated floor profile in the projection room, so as to obtain the horizontal distance data between the user and the main light source;
step S3: comparing the user-primary light source horizontal distance data with primary light source radiation radius interval data; when a legal user is in the radiation range of the main light source, carrying out radiation radius adjustment on the main light source according to the horizontal distance data of the user and the main light source, thereby obtaining first radiation radius data of the main light source; selecting an optimal communication path between the main light source and a legal user based on the first radiation radius data of the main light source, so as to acquire first optimal communication path data;
Step S4: when the legal user is out of the radiation range of the main light source, carrying out reachable communication path statistics between the main light source and the user so as to acquire a second candidate path data set; acquiring user performance requirement data; when the user performance requirement data is communication security data, security path screening is carried out on the second candidate path data set, so that second optimal communication path data are obtained; when the user performance requirement data is communication low-delay data, carrying out communication low-delay path screening on the second candidate path data set so as to obtain third optimal communication path data;
step S5: taking the first optimal communication path data or the second optimal communication path data or the third optimal communication path data as final communication link data; acquiring data to be transmitted; performing biological characteristic encryption on data to be transmitted according to legal user face image data, thereby obtaining encrypted data to be transmitted; and transmitting the encrypted data to be transmitted based on the final communication link data.
2. The VLC relay system security performance optimization method as set forth in claim 1, wherein step S1 includes the steps of:
step S11: acquiring legal user face image data and an indoor floor contour map;
Step S12: positioning the legal user through the camera according to the facial image data of the legal user, thereby obtaining the position data of the legal user;
step S13: acquiring position data of a main light source and position data of each relay device;
step S14: performing point projection on the indoor floor contour map according to legal user position data, main light source position data and position data of each relay device, so as to obtain a first indoor floor contour map;
step S15: capturing the portrait of the indoor potential eavesdropping user by using a camera, so as to obtain a portrait image set of the potential eavesdropping user;
step S16: repeating the image rejection of the image set of the potential eavesdropping user, thereby obtaining a simplified image set of the potential eavesdropping user;
step S17: and carrying out potential eavesdropping user position point projection on the first indoor floor contour map by combining a camera according to the reduced potential eavesdropping user portrait image set, so as to obtain a projected indoor floor contour map.
3. The VLC relay system security performance optimization method as claimed in claim 2, wherein step S17 includes the steps of:
step S171: performing real-time scene restoration on the indoor space by using a camera so as to obtain an indoor real-time point cloud model;
Step S172: performing virtual human body simple modeling on the indoor real-time point cloud model according to the reduced potential eavesdropping user portrait image set, so as to obtain an indoor-human body coupling model;
step S173: determining key points of potential eavesdropping users and extracting coordinates of the key points of the indoor-human body coupling model, so that a first potential eavesdropping person coordinate set is obtained;
step S174: and carrying out potential eavesdropping user position point projection on the first indoor floor profile according to the first potential eavesdropping person coordinate set, so as to obtain a projected indoor floor profile.
4. The VLC relay system security performance optimization method as claimed in claim 1, wherein step S2 includes the steps of:
step S21: acquiring corresponding radiation radius data, current control file data of a main light source and current radiation radius data of the main light source of each relay device;
step S22: acquiring a main light source control file data set, wherein the main light source control file data set comprises first control file data, second control file data and third control file data;
step S23: calculating the radiation range radius of the main light source according to the current radiation radius data of the main light source, the first control file data and the third control file data, so as to obtain radiation radius interval data of the main light source;
Step S24: extracting the upper limit and the lower limit of the radiation radius of the main light source radiation radius interval data, thereby obtaining the upper limit and the lower limit of the radiation radius of the main light source;
step S25: carrying out main light source and relay equipment radiation range description on the projection indoor floor profile according to the corresponding radiation radius data of each relay equipment, the upper limit and lower limit data of the radiation radius of the main light source and the current radiation radius data of the main light source, thereby obtaining an updated projection indoor floor profile;
step S26: and calculating the horizontal distance between the user and the main light source according to the updated floor profile in the projection room, thereby obtaining the horizontal distance data between the user and the main light source.
5. The VLC relay system security performance optimization method as claimed in claim 1, wherein step S3 includes the steps of:
step S31: comparing the user-primary light source horizontal distance data with primary light source radiation radius interval data;
step S32: when the legal user is in the radiation range of the main light source, comparing the user-main light source horizontal distance data with the current radiation radius data of the main light source;
step S33: when the user-main light source horizontal distance data is smaller than the current radiation radius data of the main light source, taking the main light source-user as a visible light communication path, and thus obtaining first optimal communication path data;
Step S34: when the user-main light source horizontal distance data is equal to or greater than the current radiation radius data of the main light source, determining the radiation radius of the main light source according to the user-main light source horizontal distance data and the main light source radiation radius interval data, so as to obtain first radiation radius data of the main light source, and adjusting the control gear of the main light source according to the first radiation radius data of the main light source, so that a legal user is placed in the radiation range of the main light source;
step S35: and selecting an optimal communication path between the main light source and a legal user according to the updated projection indoor floor profile graph, so as to acquire first optimal communication path data.
6. The VLC relay system security performance optimization method as in claim 5, wherein step S35 includes the steps of:
step S351: carrying out new radiation range drawing on the updated projection indoor floor profile according to the first radiation radius data of the main light source, thereby obtaining a first updated projection indoor floor profile;
step S352: carrying out potential eavesdropping personnel coordinate statistics on a radiation range corresponding to the first radiation radius data of the main light source according to the first updated projection indoor floor profile graph, so as to obtain a second potential eavesdropping personnel coordinate set;
Step S353: carrying out communication relay reachable path statistics between a main light source and a user according to the first updated projection indoor floor profile graph, thereby obtaining a first candidate path data set;
step S354: carrying out potential eavesdropping personnel coordinate statistics on each candidate path in the first candidate path data set according to the first updated projection indoor floor profile graph, so as to obtain a third potential eavesdropping user coordinate set;
step S355: correspondingly eliminating the data, in the third potential eavesdropping user coordinate set, which is the same as the coordinates of the second potential eavesdropping person coordinate set, so as to obtain a first potential eavesdropping user increment coordinate set, wherein the first potential eavesdropping user increment coordinate set comprises potential eavesdropping user increment coordinates corresponding to each candidate path; performing potential eavesdrop user increment statistics on each candidate path in the first candidate path data set according to the first potential eavesdrop user increment coordinate set, so as to obtain potential eavesdrop user increment data corresponding to each candidate path;
step S356: and selecting the optimal communication path of the first candidate path data set based on the increment data of the potential eavesdropping user corresponding to each candidate path, so as to acquire the first optimal communication path data.
7. The VLC relay system security performance optimization method as in claim 6, wherein step S356 includes the steps of:
step S3561: performing ascending sort on the incremental data of the potential eavesdropping users corresponding to each candidate path, so as to obtain an incremental sorting list of the potential eavesdropping users;
step S3562: taking the first data and the second data in the eavesdropping user increment sequencing list as first eavesdropping user increment data and second eavesdropping user increment data;
step S3563: when the first eavesdropping user increment data is smaller than the second eavesdropping user increment data, taking a candidate path corresponding to the first eavesdropping user increment data as first optimal communication path data;
step S3564: when the first eavesdropping user increment data is equal to the second eavesdropping user increment data, a candidate path corresponding to the first eavesdropping user increment data is obtained, and therefore first candidate communication path data are obtained; acquiring a candidate path corresponding to the incremental data of the second eavesdropping user, thereby acquiring second candidate communication path data;
step S3565: labeling and extracting a path final relay node of the first updated projection indoor floor contour map according to the first candidate communication path data and the second candidate communication path data, so as to obtain a first path final node coordinate and a second path final node coordinate;
Step S3566: performing horizontal distance calculation on the user and the first path final relay node according to legal user position data and the first path final node coordinates, so as to obtain first user-final relay node horizontal distance data; performing horizontal distance calculation on the user and the second path final relay node according to legal user position data and the second path final node coordinates, thereby obtaining second user-final relay node horizontal distance data;
step S3567: when the first user-final relay node horizontal distance data is smaller than the second user-final relay node horizontal distance data, the first candidate communication path data is used as first optimal communication path data; when the first user-final relay node horizontal distance data is equal to the second user-final relay node horizontal distance data, the first candidate communication path data or the second candidate communication path data is used as first optimal communication path data; and when the first user-final relay node horizontal distance data is larger than the second user-final relay node horizontal distance data, the second candidate communication path data is used as first optimal communication path data.
8. The VLC relay system security performance optimization method as claimed in claim 1, wherein step S4 includes the steps of:
Step S41: when the legal user is out of the radiation range of the main light source, carrying out reachable communication path statistics between the main light source and the user so as to acquire a second candidate path data set;
step S42: acquiring user performance requirement data;
step S43: carrying out communication safety interruption probability calculation on each candidate path in the second candidate path data set so as to obtain a communication safety interruption probability data set;
step S44: correspondingly eliminating candidate paths corresponding to the communication safety interruption probability higher than the preset safety interruption probability threshold value in the second candidate path data set according to the preset safety interruption probability threshold value and the communication safety interruption probability data set, so as to acquire a third candidate path data set;
step S45: when the user performance requirement data is communication security data, counting potential eavesdropping users of each candidate path in the third candidate path data set, so as to obtain potential eavesdropping user quantity data corresponding to each candidate path;
step S46: performing ascending sort on the number data of the potential eavesdropping users corresponding to each candidate path, so as to obtain a ranking table of the number of the potential eavesdropping users;
step S47: candidate path data corresponding to the first three potential eavesdropping user quantity data in the potential eavesdropping user quantity sequencing table are used as a fourth candidate path data set;
Step S48: carrying out link communication relay node statistics on each candidate path in the fourth candidate path data set, thereby obtaining total relay node data corresponding to each candidate path; selecting a corresponding candidate path with the smallest total relay node data as a final communication path based on the total relay node data corresponding to each candidate path, thereby obtaining second optimal communication path data;
step S49: and when the user performance requirement data is communication low-delay data, performing communication low-delay path screening on the third candidate path data set so as to acquire third optimal communication path data.
9. The VLC relay system security performance optimization method as in claim 8, wherein step S49 includes the steps of:
step S491: carrying out path communication relay node statistics on each candidate path in the third candidate path data set so as to obtain a candidate path relay node quantity data set;
step S492: ascending order sorting is carried out on the candidate path relay node quantity data set, so that a candidate path relay node quantity ascending order table is obtained; taking candidate paths corresponding to the first three data of the ascending list of the number of the candidate path relay nodes as a fifth candidate path set;
Step S493: calculating the number of path obstacles for each candidate path in the fifth candidate path set based on the indoor real-time point cloud model, so as to obtain a path obstacle number data set, wherein the path obstacle number data set comprises first path obstacle number data, second path obstacle number data and third path obstacle number data;
step S494: comparing the first path obstacle number data, the second path obstacle number data and the third path obstacle number data, thereby obtaining minimum obstacle number data; and taking the candidate path corresponding to the minimum number of obstacles as third optimal communication path data.
10. The VLC relay system security performance optimization method as in claim 1, wherein step S5 includes the steps of:
step S51: taking the first optimal communication path data or the second optimal communication path data or the third optimal communication path data as final communication link data;
step S52: acquiring data to be transmitted;
step S53: performing picture cutting processing on the legal user face image data according to a preset cutting rule, so as to obtain a user face image block set, wherein the user face image block set comprises a plurality of user face image cutting blocks;
Step S54: counting the number of blocks of the user face image block set, so as to obtain user face image block number data; taking a data range represented by the user face image block quantity data as the sequence number of the user face image block set, thereby obtaining the user face image block sequence number set;
step S55: the method comprises the steps that a user face image block sequence number set is used as a random number generation constraint interval, and a random image block sequence number is generated by a random number generator based on the random number generation constraint interval, so that an encrypted face image block sequence number is obtained; extracting biological characteristics of a user face image cutting block corresponding to the encrypted face image block serial number, thereby obtaining a biological characteristic encryption key;
step S56: performing biological characteristic encryption on the data to be transmitted by using the biological characteristic encryption key, thereby obtaining encrypted data to be transmitted; and transmitting the encrypted face image block sequence number and the encrypted data to be transmitted based on the final communication link data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410118373.2A CN117650844B (en) | 2024-01-29 | 2024-01-29 | VLC relay system safety performance optimization method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410118373.2A CN117650844B (en) | 2024-01-29 | 2024-01-29 | VLC relay system safety performance optimization method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117650844A true CN117650844A (en) | 2024-03-05 |
CN117650844B CN117650844B (en) | 2024-04-26 |
Family
ID=90048094
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410118373.2A Active CN117650844B (en) | 2024-01-29 | 2024-01-29 | VLC relay system safety performance optimization method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117650844B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102034238A (en) * | 2010-12-13 | 2011-04-27 | 西安交通大学 | Multi-camera system calibrating method based on optical imaging test head and visual graph structure |
US20110096313A1 (en) * | 2009-10-26 | 2011-04-28 | International Business Machines Corporation | Constrained Optimization Of Lithographic Source Intensities Under Contingent Requirements |
KR20150017861A (en) * | 2013-08-08 | 2015-02-23 | 에스케이플래닛 주식회사 | Positional information processing apparatus using visible light communication and method therof |
CN109829573A (en) * | 2019-01-15 | 2019-05-31 | 宁波洁程汽车科技有限公司 | A kind of intelligent paths planning method merging user driving habits |
AU2020103224A4 (en) * | 2020-11-04 | 2021-01-14 | Vemu Institute of Technology | Secure Visible light communication through DRL-Smart Beamforming to protect against eavesdropping of wiretap |
CN113959439A (en) * | 2021-10-21 | 2022-01-21 | 重庆邮电大学 | Indoor high-precision visible light positioning method and system under sparse light source |
CN115691208A (en) * | 2022-10-28 | 2023-02-03 | 兰州理工大学 | Indoor vehicle navigation system and method based on visible light positioning technology |
CN116455480A (en) * | 2023-05-22 | 2023-07-18 | 桂林电子科技大学 | Safe transmission method of indoor hybrid PLC/VLC network |
CN116722919A (en) * | 2023-07-14 | 2023-09-08 | 重庆邮电大学 | Wireless optical communication method for social perception indoor equipment cooperation blind spot access |
-
2024
- 2024-01-29 CN CN202410118373.2A patent/CN117650844B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110096313A1 (en) * | 2009-10-26 | 2011-04-28 | International Business Machines Corporation | Constrained Optimization Of Lithographic Source Intensities Under Contingent Requirements |
CN102034238A (en) * | 2010-12-13 | 2011-04-27 | 西安交通大学 | Multi-camera system calibrating method based on optical imaging test head and visual graph structure |
KR20150017861A (en) * | 2013-08-08 | 2015-02-23 | 에스케이플래닛 주식회사 | Positional information processing apparatus using visible light communication and method therof |
CN109829573A (en) * | 2019-01-15 | 2019-05-31 | 宁波洁程汽车科技有限公司 | A kind of intelligent paths planning method merging user driving habits |
AU2020103224A4 (en) * | 2020-11-04 | 2021-01-14 | Vemu Institute of Technology | Secure Visible light communication through DRL-Smart Beamforming to protect against eavesdropping of wiretap |
CN113959439A (en) * | 2021-10-21 | 2022-01-21 | 重庆邮电大学 | Indoor high-precision visible light positioning method and system under sparse light source |
CN115691208A (en) * | 2022-10-28 | 2023-02-03 | 兰州理工大学 | Indoor vehicle navigation system and method based on visible light positioning technology |
CN116455480A (en) * | 2023-05-22 | 2023-07-18 | 桂林电子科技大学 | Safe transmission method of indoor hybrid PLC/VLC network |
CN116722919A (en) * | 2023-07-14 | 2023-09-08 | 重庆邮电大学 | Wireless optical communication method for social perception indoor equipment cooperation blind spot access |
Non-Patent Citations (4)
Title |
---|
MANJING ZHU: "Performance Analysis for DF Relay-Aided Visible Light Communication System With NOMA", IEEE PHOTONICS JOURNAL, 6 September 2022 (2022-09-06) * |
MANJING ZHU: "Physical Layer Security Performance Analysis for Relay-Aided Visible Light Communication System", IEEE PHOTONICS JOURNAL, 30 March 2023 (2023-03-30) * |
朱蔓菁: "NOMA机制下可见光通信系统多维度性能研究", CNKI优秀博士学位论文, 15 April 2023 (2023-04-15) * |
朱蔓菁: "可见光通信中继技术研究", 光通信研究, 10 June 2021 (2021-06-10) * |
Also Published As
Publication number | Publication date |
---|---|
CN117650844B (en) | 2024-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10816693B2 (en) | Methods, systems, apparatuses and devices for facilitating motion analysis in a field of interest | |
US9767389B2 (en) | Method and apparatus for utilizing representational images in analytical activities | |
CN106453385B (en) | Fine granularity face method for secret protection in a kind of social networks | |
JP6353175B1 (en) | Automatically combine images using visual features | |
KR20130139622A (en) | Convergence security control system and method thereof | |
CA3030125A1 (en) | Methods, systems, apparatuses and devices for facilitating motion analysis in a field of interest | |
CN117853986B (en) | Video monitoring system and method based on oil well equipment | |
CN117650844B (en) | VLC relay system safety performance optimization method | |
CN110889315A (en) | Image processing method and device, electronic equipment and system | |
JP2018526754A (en) | Image processing apparatus, image processing method, and storage medium | |
Wen et al. | Weighted clustering of spatial pattern for optimal logistics hub deployment | |
CN111611921B (en) | Solar panel identification system based on remote sensing big data | |
CN114373200A (en) | Face acquisition system based on edge intelligent perceptron and privacy protection method | |
US11893683B2 (en) | Systems and methods for artificial intelligence (AI) three-dimensional modeling | |
US11709954B2 (en) | Image content obfuscation using a neural network | |
dos Santos et al. | Interactive classification of remote sensing images by using optimum-path forest and genetic programming | |
CN111523434A (en) | Building site personnel abnormal gathering detection system based on block chain and BIM | |
JP4998422B2 (en) | Image generating apparatus, method, communication system, and program | |
Juhász et al. | Cross-checking user activities in multiple geo-social media networks | |
KR102058723B1 (en) | System for building a database by extracting and encrypting video objects and its oontrol method | |
Marin-Garcia et al. | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment | |
Musale et al. | Tri Bird Technique for Effective Face Recognition Using Deep Convolutional Neural Network | |
KR20220045539A (en) | Apparatus for evaluating safety of cut-slopes | |
RU2788432C1 (en) | Method for automatic control of the engineering procedure and safety and an intelligent video system for its implementation | |
Lichtenegger et al. | Simulation of fingerprinting based Visible Light Positioning without the need of prior map generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |