Unlock instant, AI-driven research and patent intelligence for your innovation.

A hybrid resource allocation method for fog computing IoT physical layer security

A physical layer security and resource allocation technology, applied in the field of mixed resource allocation, can solve the problems of complex implementation process of high-level fog computing security policies, less failure to mix security resource allocation, and discussion, so as to reduce data leakage and prevent malicious Bugs eavesdrop on useful information and enhance the effect of confidentiality capacity

Active Publication Date: 2022-07-15
HARBIN ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the implementation process of the high-level fog computing security strategy proposed above is relatively complicated, and specific protocols and mechanisms need to be redesigned for different network structures
Compared with high-level security, physical layer security is also an important aspect of protecting the privacy of information transmission in fog computing systems. However, the existing research on the physical layer security of fog computing Internet of Things is very little and fails to address the issue of hybrid security resource allocation. discuss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hybrid resource allocation method for fog computing IoT physical layer security
  • A hybrid resource allocation method for fog computing IoT physical layer security
  • A hybrid resource allocation method for fog computing IoT physical layer security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with the accompanying drawings, such as figure 1 As shown, the hybrid resource configuration method for fog computing IoT physical layer security designed by the present invention includes the following steps:

[0044] Step 1: Establish a secure fog computing IoT system model

[0045] Consider a fog computing IoT system with K fog nodes, D IoT users, and L passive eavesdroppers. use Represents the data tasks that each IoT user has a delay requirement, where S d Indicates the size of the data task, C d Indicates the CPU cycles required to process data tasks, is the maximum allowable delay threshold. There are W orthogonal spectrum resource blocks in the network, each IoT user occupies one spectrum resource block and transmits data tasks to the corresponding fog nodes assigned by the cloud service provider, using χ d,k ∈{0,1} indicates whether the data task of the d-th IoT user is assigned to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mixed resource allocation method for fog computing IoT physical layer security, including: establishing a secure fog computing IoT system model; initializing quantum galaxy groups and parameters; Carry out evolution; measure the quantum states of the quantum galaxies after the update, obtain the measured states of all the quantum galaxies after the update, calculate the fitness of the measured states, and update the measured states of all quantum galaxies and the global quantum galaxy group according to the size of the fitness value Optimal measurement state; judge whether the termination condition is reached. If the current evolutionary algebra is less than the set maximum number of iterations, set i=i+1, and return to step 3; otherwise, terminate the evolution and output the global optimal measurement state of the quantum galaxy group, so that the corresponding mixed resource allocation scheme can be obtained. . The invention greatly improves the uplink security capacity of the entire Internet of Things system, reduces network data leakage, and prevents Internet of Things users from being eavesdropped on useful information by malicious eavesdroppers.

Description

technical field [0001] The invention relates to a mixed resource configuration method for fog computing Internet of Things physical layer security, and belongs to the field of Internet of Things information security. Background technique [0002] With the rapid increase in the demand for wireless communication and network information interaction, the information industry is promoting social development in an unprecedented way, and the Internet of Things, as one of the key technologies, has received extensive attention. Compared with traditional networks, various networks in the Internet of Things coexist with each other, and the things connected to the network are no longer limited to devices or objects, but also information and human behavior. Through radio frequency identification technology, intelligent perception technology and a variety of embedded devices, the Internet of Things can provide more information exchange opportunities for smart devices in modern communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40H04L41/0803
CPCH04L9/0852H04L63/16H04L41/0803
Inventor 张世铂高洪元苏雨萌孙贺麟马静雅刘亚鹏张禹泽郭瑞晨
Owner HARBIN ENG UNIV