期刊文献+

基于演化博弈的传感节点保密率自适应调节方法 被引量:1

Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game
下载PDF
导出
摘要 通过扩展经典窃听信道模型,针对聚簇无线传感器网络提出了传感节点和簇头之间的保密率计算方法,构建了一个非合作保密率博弈模型,以反映传感节点之间的交互关系。利用演化博弈思想,建立了传感节点自适应选择发射功率的机制,提出了传感节点自适应调节保密率的算法。实验结果表明,提出的方法能自适应地调节传感节点的保密率,为保证无线传感器网络数据的保密性提供了新途径。 By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network. A non-cooperative secrecy rate game model was formulated to reflect on the interaction relationship between sensor nodes. Using evolutionary game theory, a selection scheme in which a power level can be adaptively selected by a sensor node was developed. Moreover, a corresponding algorithm of secrecy rate adaptation was proposed. Numerical experiments show that the proposed algorithm adaptively adjusts the secrecy rate of the sensor node. Therefore, a novel method to guarantee the confidentiality of wireless sensor network data was orovided.
出处 《电信科学》 北大核心 2014年第11期73-79,共7页 Telecommunications Science
基金 国家自然科学基金资助项目(No.61272034 浙江省自然科学基金资助项目(No.LY13F030012 No.LY13F020035)
关键词 无线传感器网络 物理层安全 保密率 演化博弈 wireless sensor network, physical layer security, secrecy rate, evolutionary game
  • 相关文献

参考文献19

  • 1Chen X,Makki K,Yen K,et al.Sensor network security:a survey.IEEE Communications Surveys&Tutorials,2009,11(2):52-73.
  • 2Poor H V.Information and inference in the wireless physical layer.IEEE Wireless Communications,2012,19(1):40-47.
  • 3龙航,袁广翔,王静,刘元安.物理层安全技术研究现状与展望[J].电信科学,2011,27(9):60-65. 被引量:19
  • 4Wyner A D.The wire-tap channel.Bell System Technical Journal,1975,54(8):1355-1387.
  • 5Leung-Yan-Cheong S K,Hellman M E.The Gaussian wire-tap channel.IEEE Transactions on Information Theory,1978,IT-24(4):451-456.
  • 6Csiszár I,Krner J.Broadcast channels with confidential messages.IEEE Transactions on Information Theory,1978,IT-24(3):339-348.
  • 7Awan Z H,Zaidi A,Vandendorpe L.Secure communication over parallel relay channel.IEEE Transactions on Information Forensics and Security,2012,7(2):359-371.
  • 8Liu R,Mari I,Spasojevi P,et al.Discrete memoryless interference and broadcast channels with confidential messages:secrecy rate regions.IEEE Transactions on Information Theory,2008,54(6):2493-2507.
  • 9吉江,金梁,黄开枝.基于人工噪声的MISO保密容量分析[J].通信学报,2012,33(10):138-142. 被引量:5
  • 10Gerbracht S,Scheunert C,Jorswieck E A.Secrecy outage in MISO systems with partial channel information.IEEE Transactions on Information Forensics and Security,2012,7(2):704-716.

二级参考文献81

  • 1Khisti A, Tchamkerten A, Wornell G W. Secure broadcasting over fading channels. IEEE Transactions on Information Theory, 2008, 54(6): 2 453-2 469.
  • 2Tan F Wong, Matthieu B, John M S. Secret sharing over fast-fading MIMO wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 3Yingbin Liang, Gerhard K, Poor H V, et ol. Compound wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 4Tie Liu, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, 2009, 55(6): 2 547-2 553.
  • 5Lifeng Lai, Hesham E G. The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 2008, 54(9): 4 005-4 019.
  • 6Aggarwal V, Sankar L, Calderbank A R, et al. Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 7Xiang He, Aylin Yener. Two-hop secure communication using an untrusted relay. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 8Zhu Han, Ninoslav Marina, Merouane Debbah, et ol. Physical layer security game: interaction between source, eavesdropper and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009.
  • 9Kashyap A, Basar T, Srikant R. Correlated jamming on MIMO Gaussian fading channels. IEEE Transactions on Information Theory, 2004, 50(9): 2 119-2 123.
  • 10Ellis K J, Serinken N. Characteristics of radio transmitter fingerprints. Radio Science, 2001, 36(4): 585-597.

共引文献22

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部