Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer security resource allocation method in ICV network

A technology of physical layer security and resource allocation, applied in the field of wireless communication, can solve problems such as the inability to optimize V2V delay, achieve the effect of easy network deployment and online execution, and improve security and confidentiality capacity

Active Publication Date: 2020-12-29
HARBIN INST OF TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem that the existing resource allocation method cannot optimize the V2V time delay, the present invention provides a physical layer security resource allocation method in the ICV network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer security resource allocation method in ICV network
  • Physical layer security resource allocation method in ICV network
  • Physical layer security resource allocation method in ICV network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0060] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0061] This embodiment provides a distributed wireless resource allocation method based on multi-agent reinforce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer security resource allocation method in an ICV network, solves the problem that an existing allocation mode cannot optimize V2V time delay, and belongs to the technical field of wireless communication. The method comprises the following steps: S1, a sending vehicle in each V2V link being an intelligent agent, the intelligent agent being realized by adoptinga deep reinforcement learning network and comprising a trained target network and a real-time network, and the target network being used for updating parameters of the real-time network; S2, each intelligent agent obtaining local observation of the environment, including information of legality, interference and eavesdropping channels, sending load, time delay limitation, training iteration timesof a target network and exploration utilization probability; S3, each intelligent agent outputting an action by using a real-time network according to local observation, wherein the action comprises afrequency band occupied by signal sending and transmitting power; S4, the target networks of all the intelligent agents receiving the same reward from the environment, the environment entering the global state of the next moment, executing the step S2, and the reward comprising the system secrecy capacity and the time delay limit.

Description

technical field [0001] The invention relates to a resource allocation method based on reinforcement learning in an ICV (Intelligent Connected Vehicle, Intelligent Networked Vehicle) network, belonging to the technical field of wireless communication. Background technique [0002] In recent years, with the rapid development of communication technology, the first phase of 5G has been frozen in 3GPP R15. Among them, the Internet of Vehicles technology including V2X (Vehicle to Everything, information exchange between the vehicle and the outside world) has become the focus of 5G research. Networking has become one of the main application scenarios of 5G. China's V2X communication technology based on LTE and 5G has become the main technology of intelligent transportation systems in recent years. V2V (Vehicle-to-Vehicle, vehicle-to-vehicle communication) technology has a wider communication range, lower latency and higher The transmission rate can adapt to various application sce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W72/04H04W72/08H04W4/44H04W4/46
CPCH04W72/0453H04W72/0473H04W4/46H04W4/44H04W72/543H04W72/541H04W72/542
Inventor 陈晓华李瑞恩罗雪文林庆丰于启月
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products