Trust management method based on nested game in center base cognitive wireless network

A technology of cognitive wireless network and trust management, applied in the field of trust management based on nested game

Active Publication Date: 2017-05-31
XIDIAN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this algorithm can only identify malicious users whose uploaded perception results are always "the autho

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust management method based on nested game in center base cognitive wireless network
  • Trust management method based on nested game in center base cognitive wireless network
  • Trust management method based on nested game in center base cognitive wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The application scenario of the present invention is a central cognitive wireless network. The secondary users in the network are located in the same geographical location, and there is a data center to record user behavior and store the user's reputation value. communication.

[0058] Such as figure 1 , 2 As shown, the present invention provides a trust management method based on nested game in a centralized cognitive wireless network, which is characterized in that it includes the following steps:

[0059] Step 1. Build a model:

[0060] The activities of the secondary users in the central cognitive wireless network are divided into two periods: the perception stage and the transmission stage, and a game model is established according to the behavior of the secondary users in the two periods. The game tree model is as follows: image 3 shown.

[0061] Step 2. The secondary user perceives spectrum status information:

[0062] For secondary users participating in s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust management method based on a nested game in a center based cognitive wireless network. The method comprises the steps of establishing a nested game model, perceiving a spectral state, making a secondary user select a perception stage strategy and upload the perception data, making a data center fuse the perception data, making the secondary user select a transmission stage strategy, selecting a sliding window value, calculating a historical credit value and the credit value of this time based on the strategy, calculating utility functions of the first and second stages, optimizing the utility functions based on the game theory to solve the optimal strategy, updating trust function values, and distributing the spectrum based on the ranking of the trust values. The method aims at the buildup of the whole cognitive cycle, and uses the nested game theory and the marginal utility theory to be capable of effectively resisting malicious attacks. The cognitive process is classified into the perception stage and the data transmission stage. A secondary user can assess the credit value in the strategies in different periods of time. Secondary users game each other to acquire the spectrum, eliminate the malicious users and make the whole system tend to be better.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a nested game-based trust management method in a central cognitive wireless network. Background technique [0002] Cognitive wireless networks allow unlicensed users to opportunistically utilize idle spectrum without interfering with authorized users, thereby effectively improving the utilization of spectrum resources and meeting the needs of more users. These new functions of cognitive wireless networks have introduced many new types of network attacks, such as: perception data tampering attacks, learning threats, master user interference attacks, partner deception, etc. However, traditional security strategies such as encryption technology, authentication technology, and access control technology cannot solve these soft security threats from within cognitive wireless networks. Trust management mechanism is currently recognized as one of the most effective strategies and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/00H04W16/18
CPCH04L63/1441H04W12/00H04W16/18
Inventor 裴庆祺冷昊马立川肖阳
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products