Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for secure distribution of d2d content based on Stein Kohlberg game

A content security and content technology, applied in the field of mobile communication, can solve the problems of not taking into account the threat of eavesdropping, and the threat of eavesdropping is not completely equal, so as to achieve the effect of less consumption and safety risk, ensuring effectiveness and safety, and more benefits

Active Publication Date: 2021-08-24
ARMY ENG UNIV OF PLA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is worth noting that in the D2D content sharing scenario, there are generally multiple content providers near the content requester who can provide the desired content. Since these content providers have different information such as location and channel status, different content providers are selected. The threat of eavesdropping faced by the content requester is not exactly the same
Existing models also do not account for this eavesdropping threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure distribution of d2d content based on Stein Kohlberg game
  • Method and system for secure distribution of d2d content based on Stein Kohlberg game
  • Method and system for secure distribution of d2d content based on Stein Kohlberg game

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0029] figure 1 It is a schematic diagram of a communication scenario according to the present invention. refer to figure 1 , in the cellular network based on D2D communication, there is one content requester d, and multiple content providers and potential eavesdropper E. Wherein, J is a positive integer, and j is any positive integer between [1, J]. Content requester d requests content f, whose content size is F. In addition, content requester d can use D2D device discovery technology to search for content providers around it, and at the same time send its content request to these searched content providers, and the content provider that receives the content r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for secure distribution of D2D content based on Stan Kohlberg game. In the cellular network, in order to ensure the validity and security of user content sharing, the invention utilizes the fusion of user physical and social information, and based on the Stan-Kolberg game, designs and implements a content security distribution method and system thereof. Among them, in the actual content distribution stage, the content requester needs to select a suitable one or several from many content providers to provide the content it needs, so as to obtain better content sharing services with less cost; and the content Providers also need to determine their distribution plan according to their benefits and costs, so as to provide content sharing services for content requesters with less consumption and security risks, and at the same time obtain more benefits. Therefore, the "leader-follower model" is established by using the Stan-Kolberg game to simulate and realize the optimization of the unit content price φ and the ratio, and obtain the best safe distribution method of D2D content.

Description

technical field [0001] The present invention relates to the field of mobile communications, in particular to a method and system for securely distributing D2D content based on the Stan-Kolberg game. Background technique [0002] In recent years, with the explosive growth of wireless data traffic, wireless content sharing services are facing many serious challenges, such as the high redundancy of user requests for multimedia content, the huge pressure on base stations, and the severe shortage of wireless resources. However, D2D content sharing technology can take advantage of D2D communication, distribute the pressure of base stations to mobile terminals all over the network, and effectively deal with the above-mentioned challenges through content caching and distribution technology, which has aroused extensive discussion and research in the industry. [0003] However, there are many problems to be solved urgently in the D2D content sharing technology. Most existing studies ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/70H04W8/00H04W12/02H04L29/06G06F21/62
Inventor 吴丹张灿蔡跃明杨炜伟杨文东管新荣
Owner ARMY ENG UNIV OF PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products