当前位置:主页 > 科技论文 > 网络通信论文 >

基于非零和博弈的无线通信物理层安全研究

发布时间:2018-12-17 03:10
【摘要】:随着科技的发展,无线通信已经成为一种有效的现代通讯技术,并被广泛采用。但是由于无线通信的广播天性,保密和安全性能在无线通讯的技术发展中起着越来越重要的作用。在存在窃听者的无线通信中,节点之间的协作可以有效地提升物理层安全。然而,当中继节点为不可信节点时,这些节点可能采取自私行为甚至恶意行为,无线通信的安全性能将因此受到严重影响。一种有效的解决方式,提前预测不可信节点行为,找到合适的防御策略。在本文中,作者采用多节点模型,该模型包含多个不可信中继,一个窃听者,源节点和目的节点。该模型采用固定放大转发中继协议(AF),并将中继权重?和恶意指数β作为重要参数。本文运用数学中非零和博弈的方法,建立了不可信节点群行为和监测系统策略之间的联系。其中,安全容量用以表示在不可信节点群采取不同行为后的收益。最后,论文提出一种算法,用以预测不可信节点群的行为,以及对应的系统最优监测策略。
[Abstract]:With the development of science and technology, wireless communication has become an effective modern communication technology and widely used. However, due to the nature of wireless communication, security and security play a more and more important role in the development of wireless communication technology. In wireless communication with eavesdroppers, the cooperation between nodes can effectively improve physical layer security. However, when the relay nodes are untrusted nodes, these nodes may take selfish behavior or even malicious behavior, so the security performance of wireless communication will be seriously affected. An effective solution to predict the behavior of untrusted nodes in advance and find appropriate defense strategies. In this paper, the author uses a multi-node model, which includes multiple untrusted relays, an eavesdropper, a source node and a destination node. The model adopts the fixed amplification relay protocol (AF),) and weights the relay. And malicious index 尾 as an important parameter. In this paper, the relationship between the behavior of untrusted node group and the strategy of monitoring system is established by using mathematical non-zero sum game method. The security capacity is used to represent the benefit of different behaviors of the untrusted node group. Finally, an algorithm is proposed to predict the behavior of untrusted nodes and the corresponding optimal monitoring strategy.
【学位授予单位】:天津大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN92

【参考文献】

相关期刊论文 前1条

1 江能;;博弈论理论体系及其应用发展述评[J];商业时代;2011年02期



本文编号:2383551

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2383551.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户40d5c***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com