Credible Collaborative Interference Node Selection Method Based on Hidden Markov Model

A cooperative interference and node technology, applied in wireless communication, transmission monitoring, electrical components, etc., to achieve the effect of ensuring safety performance

Active Publication Date: 2021-05-18
BEIJING JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is no effective method for selecting trusted cooperative jamming nodes based on hidden Markov model in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible Collaborative Interference Node Selection Method Based on Hidden Markov Model
  • Credible Collaborative Interference Node Selection Method Based on Hidden Markov Model
  • Credible Collaborative Interference Node Selection Method Based on Hidden Markov Model

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0086] Example 1 Selection Strategy of Trusted Collaborative Interference Nodes in the Internet of Things

[0087] In the embodiment of the present invention, the secure transmission in the Internet of Things system is considered. This IoT system consists of two access nodes and various types of IoT devices. In this system, access node 2 wants to send information to an IoT device (smart kettle). Meanwhile, an eavesdropper (sweeping robot) intends to intercept and decode the message. In order to protect the sent messages from being decoded by eavesdroppers, another access node 1 selects an IoT device (smart safe) as a cooperative interference node. Cooperating jamming nodes send jamming signals to eavesdroppers so that messages cannot be decoded correctly.

[0088] However, there is a challenge that needs to be addressed in cooperative jamming techniques. Traditionally, cooperative jamming techniques are considered to be based on a fundamental assumption: cooperative jammin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for selecting a credible cooperative interference node based on a hidden Markov model. The method includes: using an energy detector to detect the behavior of the cooperative interference node, judging whether the cooperative interference node has sent an interference signal according to the detection result; according to the judgment result of the energy detector, using a hidden Markov trust model Update the reputation value of the cooperative interference node; according to the updated reputation value of the cooperative interference node, judge whether the cooperative interference node meets the system requirements, if so, continue to use the cooperative interference node; otherwise, select other nodes as the cooperative interference node node. The embodiment of the present invention designs a new mechanism for selecting a trusted cooperative interference node based on the hidden Markov model, which can analyze the behavior of the cooperative interference node more dynamically, select a credible cooperative interference node, and effectively guarantee the wireless communication channel safety performance.

Description

technical field [0001] The invention relates to the technical field of wireless communication networks, in particular to a method for selecting trusted cooperative interference nodes based on a hidden Markov model. Background technique [0002] With the development of wireless communication networks, people's dependence on wireless networks is gradually deepening, and the security of wireless networks has attracted people's attention. Traditional high-level encryption technology requires strong computing power support, which is more difficult for energy-constrained wireless nodes. Therefore, researchers set out to study physical layer security technology to improve the security of wireless communication. A mainstream physical layer security technology is cooperative jamming technology, which selects a cooperative jammer to assist in sending artificial noise to reduce the signal-to-noise ratio of the eavesdropper and achieve the purpose of secure communication. However, con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B17/345H04B17/391H04W24/06H04W12/08
CPCH04W24/06H04W12/66
Inventor 荆涛温营坤高青鹤霍炎
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products