CN109996218B - Resource allocation method for improving wireless transmission safety performance of Internet of vehicles - Google Patents

Resource allocation method for improving wireless transmission safety performance of Internet of vehicles Download PDF

Info

Publication number
CN109996218B
CN109996218B CN201810003053.7A CN201810003053A CN109996218B CN 109996218 B CN109996218 B CN 109996218B CN 201810003053 A CN201810003053 A CN 201810003053A CN 109996218 B CN109996218 B CN 109996218B
Authority
CN
China
Prior art keywords
communication link
link
eavesdropping
communication
capacity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810003053.7A
Other languages
Chinese (zh)
Other versions
CN109996218A (en
Inventor
曹扬
许爱东
陈华军
蒋屹新
王志明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Power Grid International Co ltd
Original Assignee
China South Power Grid International Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Power Grid International Co ltd filed Critical China South Power Grid International Co ltd
Priority to CN201810003053.7A priority Critical patent/CN109996218B/en
Publication of CN109996218A publication Critical patent/CN109996218A/en
Application granted granted Critical
Publication of CN109996218B publication Critical patent/CN109996218B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/22Traffic simulation tools or models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a resource allocation method for improving the wireless transmission safety performance of Internet of vehicles, which comprises the following steps: the method comprises the steps of acquiring first communication parameters of each first communication link, second communication parameters of each second communication link, first eavesdropping parameters of the first eavesdropping link and second eavesdropping parameters of the second eavesdropping link in the Internet of vehicles, then respectively calculating channel transmission capacity of each first communication link and each second communication link on each resource block according to the first communication parameters and the second communication parameters, respectively calculating first eavesdropping channel capacity and second eavesdropping channel capacity according to the first eavesdropping parameters and the second eavesdropping parameters, determining total system secrecy capacity according to the channel transmission capacity and the eavesdropping channel capacity, establishing a resource allocation and power control combined model based on a target with the maximum total system secrecy capacity, allocating the resource blocks, and improving the safety performance of the system in a mode of improving the secrecy capacity of the system.

Description

Resource allocation method for improving wireless transmission safety performance of Internet of vehicles
Technical Field
The invention relates to the technical field of wireless communication, in particular to a resource allocation method for improving wireless transmission safety performance of Internet of vehicles.
Background
As the demand for data transmission security in wireless networks has increased, information security has begun to become a critical issue. Different from the application of the traditional cryptography on the upper layer of a network architecture, the physical layer security technology mainly studies how to utilize the characteristics of a physical layer channel in a wireless network to realize secure communication in an absolute sense, namely, effective secret communication can still be provided under the condition that high-layer encryption is not available or a key is stolen by an eavesdropper.
The national grid company puts forward the vision of intelligent car networking, realizes seamless connection of electric vehicles, traffic flow and grid operation through data fusion of cars, piles and grids, and meets the optimization target of the grid company on energy flow and demand management. The southern power grid is also steadily promoting the construction of electric vehicles and vehicle networking systems, for vehicle networking, due to the high-speed mobility of vehicles, the topological structure of the network also changes in real time, and the practicability of the traditional upper-layer encryption scheme based on key distribution may be weakened.
Disclosure of Invention
Based on this, it is necessary to provide a resource allocation method for improving wireless transmission security performance of the internet of vehicles in order to solve the problem that the security performance of the internet of vehicles based on the physical layer is not high enough.
A resource allocation method for improving wireless transmission safety performance of Internet of vehicles comprises the following steps:
acquiring first communication parameters of each first communication link of a vehicle and a road side unit in the Internet of vehicles, wherein the first communication parameters comprise the number of the first links, the number of resource blocks, the transmission power of the first communication links on each resource block and the channel gain of each first communication link;
obtaining second communication parameters of second communication links among vehicles in the Internet of vehicles, wherein the second communication parameters comprise the number of the second communication links, the number of resource blocks, the transmitting power of the second communication links on each resource block and the channel gain of each second communication link;
acquiring a first eavesdropping parameter of each eavesdropper eavesdropping a first communication link and a second eavesdropping parameter of each eavesdropping second communication link in the Internet of vehicles, wherein the first eavesdropping parameter comprises the number of resource blocks occupied by the eavesdropping, the transmitting power of the eavesdropping first communication link and the channel gain of the first eavesdropping link, and the second eavesdropping parameter comprises the number of resource blocks occupied by the eavesdropping, the transmitting power of the eavesdropping second communication link and the channel gain of the eavesdropping link;
calculating the channel transmission capacity of each first communication link on each resource block according to the first communication parameters of the first communication links; calculating the channel transmission capacity of each second communication link on each resource block according to the second communication parameters of the second communication links;
calculating a first wiretapping channel capacity and a second wiretapping channel capacity according to a first wiretapping parameter of the wiretapping first communication link and a second wiretapping parameter of the wiretapping second communication link;
determining a total security capacity of the system according to the transmission capacity of each channel and the capacity of each eavesdropping channel;
and establishing a resource allocation and power control combined model based on the target of the maximum total secret capacity of the system, and allocating resource blocks.
In one embodiment, establishing the joint resource allocation and power control model comprises: obtaining the security capacity of each first communication link according to the channel transmission capacity of each first communication link on each resource block and the capacity of each first eavesdropping channel;
obtaining the secret capacity of each second communication link according to the channel transmission capacity of each second communication link on each resource block and the capacity of each second eavesdropping channel;
obtaining the total system secret capacity according to the secret capacity of each first communication link, the secret capacity of each second communication link and the allocation condition of resource blocks;
the allocation condition of the resource blocks comprises the following steps: each first communication link only occupies one resource block, each second communication link also only occupies one resource block, and each resource block is simultaneously distributed to at most one first communication link and one second communication link;
the sum of the power of each first communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the first communication link, and the sum of the power of each second communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the second communication link.
In one embodiment, the first communication link may transmit via a shared resource block of a second communication link at the same time;
the second communication link may transmit its own data over shared resource blocks.
In one embodiment, a network topology structure of the Internet of vehicles is obtained according to the resource allocation and power control combined model;
constructing a bipartite graph according to the network topology structure of the Internet of vehicles;
the bipartite graph comprises a plurality of resource block nodes and a link pair consisting of a first communication link and a second communication link;
the link pair and the resource block node are connected to form an edge weight of the bipartite graph;
and the edge weight value represents the maximum secret rate of the corresponding link pair when the corresponding link pair is connected with different resource block nodes for communication.
In one embodiment, when a bipartite graph G '═ (R', V ', E') exists, there is
Figure GDA0003598042260000031
FIG. G' is a sub-diagram of FIG. G;
obtaining a subgraph G' with the maximum sum of all edge weights based on the target with the maximum privacy rate;
each resource block node of the subgraph G' can be connected with only one link node at most;
each link of the subgraph G' can only occupy one resource block;
and carrying out resource allocation according to the subgraph G' which obtains the maximum sum of all the edge weights.
In one embodiment, before applying the resource allocation scheme, a maximum power combination is found, and a maximum edge weight in the sub-graph G' is calculated according to the maximum power combination.
In one embodiment, the transmission power of the first communication link and the second communication link on the resource block is divided into a plurality of equal divisions from 0 to the maximum value, so as to obtain all power combinations of the first communication link and the second communication link, and find the power pair with the maximum weight value.
In one embodiment, according to the maximum power combination of the first communication link and the second communication link, the maximum safe rate of a link pair composed of the first communication link and the second communication link on different resource blocks is obtained;
calculating to obtain a maximum edge weight value in the subgraph G' according to the maximum safe rate;
the transmission power of the first communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the first communication link;
the transmission power of the second communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the second communication link.
In one embodiment, each resource block node in the sub-graph G' has a corresponding priority queue;
the priority queue is arranged in the order that the weight of the edge obtained by connecting the resource block node and the nodes by different links is arranged from large to small.
In one embodiment, each resource block node and link pair node in the subgraph G' have a corresponding matching result;
and when the resource block node is connected with the link-to-node and a successful matching result is obtained, the first communication link is successfully matched with the resource block node, and the second communication link is successfully matched with the resource block node.
According to the resource allocation method for improving the wireless transmission safety performance of the Internet of vehicles, under the scene of the Internet of vehicles, the channel transmission capacity of each first communication link on each resource block and the channel transmission capacity of each second communication link on each resource block are calculated, the first eavesdropping channel capacity of an eavesdropper on the first communication link and the second eavesdropping channel capacity of the second communication link are calculated, the total secrecy capacity of the system is determined according to the channel transmission capacities and the eavesdropping channel capacities, a resource allocation and power control combined model is established based on the maximum target of the total secrecy capacity of the system, the resource blocks are allocated, and the safety performance of the system can be improved in a mode of improving the secrecy capacity of the system.
Drawings
FIG. 1 is a diagram illustrating an exemplary embodiment of a resource allocation method for improving security of wireless transmission in the Internet of vehicles;
FIG. 2 is a schematic flow chart illustrating a resource allocation method for improving security of wireless transmission in the Internet of vehicles according to an embodiment;
FIG. 3 is a schematic flowchart illustrating a resource allocation method for improving security of wireless transmission in Internet of vehicles according to another embodiment;
FIG. 4 is a schematic structural diagram of a resource allocation method for improving security of wireless transmission in the Internet of vehicles according to an embodiment;
fig. 5 is a schematic algorithm flow diagram of a resource allocation method for improving wireless transmission security of the internet of vehicles in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is an application scenario diagram of a resource allocation method for improving wireless transmission security of the internet of vehicles in an embodiment. As shown in fig. 1, the internet of vehicles includes a roadside unit 10, a eavesdropping vehicle 202, and first and second general vehicles 204 and 206.
The internet of vehicles is a huge interactive network formed by information such as vehicle position, speed and route. Through devices such as GPS, RFID, sensors, camera image processing, the vehicle can accomplish the collection of self environment and state information, through internet technology, all vehicles can assemble the various information transmission of self to central processing unit, through computer technology, the information of these a large amount of vehicles can be analyzed and handled to calculate the best route of different vehicles, report road conditions in time and arrange signal lamp cycle.
In this embodiment, the roadside unit 10 is installed at the roadside, and communicates with the first general vehicle 204 by using a dedicated short-range communication technology to form a first communication link 302, that is, a communication link between the vehicle and the roadside unit, for implementing communication between the vehicle and the roadside unit, thereby implementing data and information interaction.
The second communication link 304, namely the communication link between the vehicles, is formed between the first general vehicle 204 and the second general vehicle 206, and is used for realizing pairing between the vehicles and directly performing communication without passing through a road side unit. Low latency, highly reliable information transfer can be provided.
The wiretapping vehicle 202 simultaneously wiretapping the first communication link 302 and the second communication link 304, and a first wiretapping link 402 is formed between the wiretapping vehicle 202 and the first common vehicle 204 and is used for wiretapping the first communication link 302; a second eavesdropping link 402 is formed between eavesdropping vehicle 202 and second normal vehicle 206 for eavesdropping on the second communication link.
Fig. 2 is a schematic flowchart of a resource allocation method for improving security of wireless transmission in the internet of vehicles in an embodiment. As shown in fig. 2, the resource allocation method for improving the security performance of wireless transmission in the internet of vehicles includes:
s202, acquiring a first communication parameter of the first communication link.
Wherein the first communication parameters include a number of the first communication links, a number of the resource blocks, a transmit power of the first communication links on each resource block, and a channel gain of each of the first communication links.
S204, second communication parameters of the second communication link are obtained.
The second communication parameters comprise the number of the second communication links, the number of the resource blocks, the transmission power of the second communication links on each resource block and the channel gain of each second communication link.
S206, acquiring first eavesdropping parameters of each eavesdropping person eavesdropping the first communication link.
The first eavesdropping parameter comprises the number of resource blocks occupied by an eavesdropper, the transmission power of the first communication link eavesdropped by the eavesdropper and the channel gain of the first eavesdropping link.
S208, acquiring a second eavesdropping parameter of each eavesdropping person eavesdropping the second communication link.
The second eavesdropping parameter includes the number of resource blocks occupied by the eavesdropper, the transmission power of the eavesdropper eavesdropping on the second communication link 304, and the channel gain of the second eavesdropping link.
S210, calculating the channel transmission capacity of each first communication link on each resource block according to the first communication parameters of the first communication links.
In a car networking application scenario, applying a positive frequency division multiplexing technique, the total bandwidth is divided into K resource blocks, each resource block consists of multiple sub-carriers, and on each resource block, the channel experiences flat fading. Ith first communication Link (with A)iRepresents) a transmit power on the k-th resource block of
Figure GDA0003598042260000061
J-th second communication link (with B)jRepresents) a transmit power on the k-th resource block of
Figure GDA0003598042260000062
Channel gain for different links employs hkAnd (4) showing.
In particular, the first channel transmission capacity of the first communication link may be expressed as:
Figure GDA0003598042260000063
where σ 2 is the background noise of the channel, usually taking a constant value, and the other part is the power of invalid information at the receiver, also known as noise.
S212, calculating the channel transmission capacity of each second communication link on each resource block according to the second communication parameters of the second communication link.
Specifically, the second channel transmission capacity of the second communication link is represented as:
Figure GDA0003598042260000064
and S214, calculating the first wiretapping channel capacity and the second wiretapping channel capacity according to the first wiretapping parameters of the first wiretapping link and the second wiretapping parameters of the second wiretapping link.
Specifically, the first eavesdropping channel capacity of the first eavesdropping link is expressed as:
Figure GDA0003598042260000071
the second eavesdropping channel capacity of the second eavesdropping link is expressed as:
Figure GDA0003598042260000072
s216, determining the total security capacity of the system according to the transmission capacity of each channel and the capacity of each eavesdropping channel.
According to the physical layer security theory, the secrecy capacity is defined as the difference between the transmission capacity of a main channel of a source-destination node and the transmission capacity of a source-eavesdropper eavesdropping channel. Thus, in this scenario, the first communication link AiThe secret capacity on the kth resource block may be expressed as a difference between a channel transmission capacity of the first communication link and an eavesdropping channel transmission capacity of the first eavesdropping link, namely expressed as:
Figure GDA0003598042260000073
wherein
Figure GDA0003598042260000074
Is the signal-to-noise of the first communication linkThe ratio of the amount of the acid to the amount of the water,
Figure GDA0003598042260000075
the signal-to-noise ratio of the first eavesdropping link, the numerator part is the received power obtained by transmitting the effective information through the channel, i.e., multiplying the effective information by the square value of the channel gain, and the denominator part is the noise, and includes two parts.
Second communication link BjThe secret capacity on the kth resource block may be expressed as a difference between a channel transmission capacity of the second communication link and an eavesdropping channel transmission capacity of the second eavesdropping link, that is, expressed as:
Figure GDA0003598042260000076
thus, the total security capacity of the system can be determined by the transmission capacity of each channel and the capacity of each eavesdropping channel so as to maximize the total security capacity of the system, and the target can be described as:
Figure GDA0003598042260000081
Figure GDA0003598042260000082
wherein pi is a first communication link resource block allocation matrix, Θ is a second communication link resource block allocation matrix, and P is a power allocation matrix.
Figure GDA0003598042260000083
Indicating whether the kth resource block is allocated to the ith first communication link,
Figure GDA0003598042260000084
indicating whether the kth resource block is allocated to the jth second communication link. The second and third constraints state that each link can only occupy one resource block, each resource block is also allocated to at most one first communication link and one second communication link,the fourth and fifth constraints state that the sum of the power of each of the first communication link and the second communication link over all resource blocks is less than the maximum allowed transmission power for the respective link.
S218, based on the maximum target of the total secrecy capacity of the system, a resource allocation and power control combined model is established, and resource blocks are allocated.
According to the resource allocation method for improving the wireless transmission security performance of the Internet of vehicles, under the scene of the Internet of vehicles, the channel transmission capacity of each first communication link on each resource block and the channel transmission capacity of each second communication link on each resource block are calculated, the first eavesdropping channel capacity of an eavesdropper on the first communication link and the second eavesdropping channel capacity of the second communication link are calculated, the total security capacity of the system is determined according to the channel transmission capacities and the eavesdropping channel capacities, a resource allocation and power control combined model is established based on the target of the maximum total security capacity of the system, the resource blocks are allocated, and the security performance of the system can be improved in a mode of improving the security capacity of the system.
Fig. 3 is a schematic flowchart of a resource allocation method for improving security of wireless transmission in the internet of vehicles in another embodiment, and as shown in fig. 3, establishing a resource allocation and power control joint model includes:
s302, the security capacity of each first communication link is obtained according to the channel transmission capacity of each first communication link on each resource block and the capacity of each first eavesdropping channel.
Specifically, the difference between the channel transmission capacity of the first communication link and the eavesdropping channel transmission capacity of the first eavesdropping link is expressed as:
Figure GDA0003598042260000091
s304, the secret capacity of each second communication link is obtained according to the channel transmission capacity of each second communication link on each resource block and the capacity of each second eavesdropping channel.
Specifically, the difference between the channel transmission capacity of the second communication link and the eavesdropping channel transmission capacity of the second eavesdropping link is expressed as:
Figure GDA0003598042260000092
s306, obtaining the total system secret capacity according to the secret capacity of each first communication link, the secret capacity of each second communication link and the allocation condition of the resource blocks.
Specifically, the total security capacity of the system can be determined by the transmission capacity of each channel and the capacity of each eavesdropping channel, so that the total security capacity of the system is maximized, and the goal can be described as:
Figure GDA0003598042260000093
wherein, the allocation condition of the resource block comprises: each first communication link only occupies one resource block, and each second communication link also only occupies one resource block; each resource block is simultaneously allocated to at most one first communication link and one second communication link.
Specifically, in a car networking scenario, the first communication link and the second communication link can only occupy one resource block respectively, that is, one communication link cannot occupy more than one resource block simultaneously. Each resource block may be allocated to at most one first communication link and one second communication link at the same time, i.e. the first communication link and the second communication link may share the resource block. The first communication link may transmit via the shared resource block of the second communication link at the same time, while the second communication link may transmit its own data via the shared resource block.
The sum of the power of each first communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the first communication link, and the sum of the power of each second communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the second communication link.
In particular, each first communication link is transmitted on a different resource blockHas a radiation power of
Figure GDA0003598042260000101
Each second communication link has a transmission power of
Figure GDA0003598042260000102
The sum of the power of each first communication link on all resource blocks being less than the maximum allowed transmit power on the first communication link can be expressed as:
Figure GDA0003598042260000103
the sum of the power of each second communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the second communication link, which can be expressed as:
Figure GDA0003598042260000104
by establishing the resource allocation and power control combined model, the total system secret capacity is obtained according to the secret capacity of each first communication link, the secret capacity of each second communication link and the allocation condition of resource blocks, and meanwhile, the transmission power, the combined power and the resource allocation of each first communication link and each second communication link on different resource blocks are considered, so that the secret capacity of the system is improved.
Fig. 4 is a schematic structural diagram of a bipartite graph of a resource allocation method for improving security performance of wireless transmission in the internet of vehicles in one embodiment. As shown in fig. 4, a network topology structure of the car networking is obtained according to a resource allocation and power control combined model, the bipartite graph G includes a plurality of resource block nodes 40 and link pairs 50 formed by a first communication link and a second communication link, the link pairs and the resource block nodes are connected to form edge weights 60 of the bipartite graph, and the edge weights 60 represent maximum privacy rates of corresponding link pairs 50 when the corresponding link pairs 50 are connected to different resource block nodes 40 for communication.
Specifically, bipartite graph G includesk resource block nodes rkAnd the system also comprises a plurality of link pairs v consisting of the first communication link and the second communication linkijIs represented as a link pair (A) composed of the ith first communication link and the jth second communication linki,Bj),
Figure GDA0003598042260000105
Represents a node rkAnd vijEdge weight of a connection, this weight representing the link pair (A)i,Bj) And when the k-th resource block is selected for communication, the link has the maximum secret rate.
In another embodiment, if a bipartite graph G '═ (R', V ', E') exists, there are
Figure GDA0003598042260000111
Then, the graph G 'is called a subgraph of the graph G, and the subgraph G' with the maximum sum of all the edge weights is obtained based on the target with the maximum privacy rate.
Specifically, when a certain constraint condition is satisfied, the sum of the weights included in the subgraph G' is made to be the maximum, which can be expressed as:
Figure GDA0003598042260000112
Figure GDA0003598042260000113
each resource block node of the subgraph G ' can only be connected with one link node at most, each link of the subgraph G ' can only occupy one resource block, and resource allocation is carried out according to the subgraph G ' which obtains the maximum sum of all edge weights.
In yet another embodiment, before applying the resource allocation scheme, a maximum power combination is found, and a maximum edge weight in the sub-graph G' is calculated according to the maximum power combination.
Specifically, the first communication link has a transmit power of
Figure GDA0003598042260000114
The second communication link has a transmission power of
Figure GDA0003598042260000115
Thus, the optimal power combining solution for the first and second communication links may be expressed as:
Figure GDA0003598042260000116
Figure GDA0003598042260000117
in one embodiment, the transmission power of the first communication link and the second communication link on the resource block is divided into a plurality of equal divisions from 0 to the maximum value, so as to obtain all power combinations of the first communication link and the second communication link, and find the power pair with the maximum weight value.
Alternatively, the optimal power pair combination can be found by a brute force enumeration method, and specifically the optimal power pair combination will be found
Figure GDA0003598042260000118
And
Figure GDA0003598042260000119
dividing the power pair into multiple equal parts from 0 to the maximum value, then obtaining the combination of all the power pairs, and finding the power pair which enables the weight value to be maximum.
In another embodiment, the maximum safety rates of the link pair composed of the first communication link and the second communication link on different resource blocks are obtained according to the maximum power combination of the first communication link and the second communication link, and the maximum edge weight in the sub-graph G' is obtained through calculation according to the maximum safety rates.
The transmission power of the first communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the first communication link, and the transmission power of the second communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the second communication link.
In one embodiment, each resource block node in the subgraph G' has a corresponding priority queue, and the priority queues are arranged in a descending order of weights of edges obtained by connecting the resource block node with different link pair nodes.
In particular, for a bipartite graph G ═ (R, V, E), each resource block node R in the set RkHaving a priority queue L (r)k) Wherein the element is a link pair node in the set V and is according to rkThe weights of the edges connected with different nodes are arranged, and the node with the larger edge weight is arranged in L (r)k) The front of the queue.
In another embodiment, each resource block node and link pair node in the sub-graph G' have corresponding matching results, and when the resource block node and link pair node are connected and a result of successful matching is obtained, the first communication link and the resource block node are successfully matched, and the second communication link and the resource block node are successfully matched.
In particular, for each resource block node r in the figurekAnd link pair node vijThere is a match result, which is denoted by S (-). If node rkAnd vijAre connected, then there is S (u)k)=vijAnd S (v)ij)=rk. Due to node vijRepresents an uplink and downlink pair (A)i,Bj) The concept of matching is extended to separate first and second communication links, i.e. S (v)ij)=rkIs equivalent to S (A)i)=rkAnd S (B)j)=rk
Fig. 5 is a schematic algorithm flow diagram of a resource allocation method for improving security of wireless transmission in the internet of vehicles in another embodiment. As shown in fig. 5, the algorithm of the resource allocation method for improving the security performance of wireless transmission in the internet of vehicles includes the following steps:
s502, constructing a bipartite graph according to a network topology structure, calculating a weight of each edge in the bipartite graph through a traversal algorithm, and calculating a priority queue of each resource block node in the bipartite graph.
S504, the initialization node index k equals 1.
S506, judging whether one of the following two conditions is met: all resource block nodes have been paired; all first and second communication link nodes have been paired;
if not, executing S508; if yes, the process proceeds to step S524, and the algorithm ends.
S508, each resource block node is traversed circularly, and whether the kth node is paired or not is judged; if so, go to S514; otherwise, S510 is performed.
S510, the kth node makes a pairing request to the first node in its priority queue in the link pair.
S512, judging whether one of the following two conditions is met:
the link pair comprises a first communication link and a second communication link which are not paired;
the first communication link or the second communication link is paired, but for the first node in the link pair priority queue, the pairing with the kth node can obtain a larger edge weight value;
if yes, go to S514; if not, S516 is performed.
S514, the first node in the link pair priority queue receives the pairing request of the kth node, updates the pairing result, and adds the corresponding node and edge into the subgraph.
S516, the first node in the link pair priority queue rejects the pairing request of the kth node, and retains the original pairing result.
S518,k=k+1。
S520, if K is less than or equal to K, executing S508, otherwise executing S522.
S522, the priority lists of all resource block nodes are updated, the paired link pair nodes are deleted from the priority list of each resource block node, and the process goes to S504.
And S524, finishing the algorithm, and determining a resource allocation scheme according to the obtained subgraph.
Compared with the traditional greedy resource allocation scheme and the random resource allocation scheme, the resource allocation method for improving the security of wireless transmission of the internet of vehicles has obvious performance advantages in terms of the difference of the confidentiality capacity of the internet of vehicles, and each iteration can make the system capacity approach to the optimal solution.
For the second communication link, as the distance of the second communication link increases, the secrecy capacity of the system is in a descending trend, but the interference of the first wiretapping link and the second wiretapping link on the second communication link does not affect the secrecy capacity of the whole system, and the safety performance of the system is improved.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent should be subject to the appended claims.

Claims (9)

1. A resource allocation method for improving wireless transmission safety performance of an Internet of vehicles is applied to an Internet of vehicles scene, wherein the Internet of vehicles is an interactive network formed by vehicle position, speed and route information, and comprises a road side unit, a wiretapping vehicle, a first common vehicle and a second common vehicle, and is characterized by comprising the following steps:
acquiring first communication parameters of each first communication link of a vehicle and a road side unit in the internet of vehicles, wherein the first communication parameters comprise the number of the first links, the number of resource blocks, the transmitting power of each resource block of the first communication link and the channel gain of each first communication link; the first communication link is used for realizing communication between the first common vehicle and the road side unit; the system comprises a central processing unit, a road condition monitoring unit, a traffic light control unit, a road condition monitoring unit and a traffic light control unit, wherein each vehicle in the internet of vehicles can acquire own environment and state information and transmit the own environment and state information to the central processing unit, and the central processing unit is used for analyzing and processing the own environment and state information of each vehicle, respectively determining the optimal routes of different vehicles, reporting road conditions in time and arranging a signal light period;
obtaining second communication parameters of second communication links among vehicles in the Internet of vehicles, wherein the second communication parameters comprise the number of the second communication links, the number of resource blocks, the transmitting power of the second communication links on each resource block and the channel gain of each second communication link; the second communication link is used for realizing pairing of the first common vehicle and the second common vehicle and direct communication between the first common vehicle and the second common vehicle;
acquiring a first eavesdropping parameter of each eavesdropper eavesdropping a first communication link and a second eavesdropping parameter of each eavesdropping second communication link in the Internet of vehicles, wherein the first eavesdropping parameter comprises the number of resource blocks occupied by the eavesdropping, the transmitting power of the eavesdropping first communication link and the channel gain of the first eavesdropping link, and the second eavesdropping parameter comprises the number of resource blocks occupied by the eavesdropping, the transmitting power of the eavesdropping second communication link and the channel gain of the eavesdropping link; corresponding eavesdropping links are formed between the eavesdropper and the first common vehicle and between the eavesdropper and the second common vehicle respectively, wherein the eavesdropping links comprise a first eavesdropping link for eavesdropping the first communication link and a second eavesdropping link for eavesdropping the second communication link;
calculating the channel transmission capacity of each first communication link on each resource block according to the first communication parameters of the first communication links; calculating the channel transmission capacity of each second communication link on each resource block according to the second communication parameters of the second communication links;
calculating a first wiretapping channel capacity and a second wiretapping channel capacity according to a first wiretapping parameter of the wiretapping first communication link and a second wiretapping parameter of the wiretapping second communication link;
determining a total security capacity of the system according to the transmission capacity of each channel and the capacity of each eavesdropping channel;
establishing a resource allocation and power control combined model based on the target of the maximum total secrecy capacity of the system, and allocating resource blocks; wherein each of the resource blocks may be simultaneously allocated to at most one of the first communication links and one of the second communication links, and the first communication link and the second communication link may share the resource blocks; the first communication link can transmit by means of the shared resource block of the second communication link at the same time, and meanwhile, the second communication link can transmit data per se by the shared resource block;
the step of allocating resource blocks includes: obtaining total system secret capacity according to the secret capacity of each first communication link, the secret capacity of each second communication link and the allocation condition of resource blocks, and simultaneously considering the transmission power of each first communication link and each second communication link on different resource blocks and combining the transmission power and the allocation condition of the resource blocks to allocate resources; the sum of the power of each first communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the first communication link, and the sum of the power of each second communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the second communication link.
2. The method for allocating resources to improve safety performance of wireless transmission in internet of vehicles according to claim 1, wherein establishing the joint model of resource allocation and power control comprises: obtaining the security capacity of each first communication link according to the channel transmission capacity of each first communication link on each resource block and the capacity of each first eavesdropping channel;
obtaining the secret capacity of each second communication link according to the channel transmission capacity of each second communication link on each resource block and the capacity of each second eavesdropping channel;
obtaining the total system secret capacity according to the secret capacity of each first communication link, the secret capacity of each second communication link and the allocation condition of resource blocks;
the allocation condition of the resource blocks comprises the following steps: each first communication link only occupies one resource block, each second communication link also only occupies one resource block, and each resource block is simultaneously allocated to at most one first communication link and one second communication link;
the sum of the power of each first communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the first communication link, and the sum of the power of each second communication link on all resource blocks is smaller than the maximum value of the allowed transmission power on the second communication link.
3. The resource allocation method for improving the wireless transmission safety performance of the Internet of vehicles according to claim 2, wherein a network topology structure of the Internet of vehicles is obtained according to the resource allocation and power control combined model;
constructing a bipartite graph G according to the network topology structure of the Internet of vehicles; wherein the bipartite graph G is denoted G ═ (R, V, E), and includes k resource block nodes R in the set RkA link pair V composed of a plurality of first communication links and second communication links in the set VijAnd link pairs v in set EijAnd resource block node rkConnecting to form the edge weight of the bipartite graph G
Figure FDA0003598042250000031
Wherein each resource block node R in the set RkCorresponding to a priority queue L (r)k) Priority queue L (r)k) Is a link pair node in the set V and is according to rkThe weights of the edges obtained by connecting with different nodes are arranged, and the node with the larger edge weight is arranged in L (r)k) The front of the queue;
the bipartite graph G comprises a plurality of resource block nodes and a link pair consisting of a first communication link and a second communication link;
the link pair and the resource block node are connected to form an edge weight of the bipartite graph G;
the edge weight value represents the maximum secret rate of the corresponding link pair when the corresponding link pair is connected with different resource block nodes for communication.
4. The method according to claim 3, wherein when there is a bipartite graph G ═ R ', V ', E ', there is a bipartite graph G ═ R ', V ', E ═ f
Figure FDA0003598042250000032
FIG. G' is a subgraph of FIG. G;
obtaining a subgraph G' with the maximum sum of all edge weights based on the target with the maximum privacy rate;
each resource block node of the subgraph G' can be connected with only one link node at most;
each link of the subgraph G' can only occupy one resource block;
and carrying out resource allocation according to the subgraph G' which obtains the maximum sum of all the edge weights.
5. The method for allocating resources to improve security of wireless transmission in internet of vehicles according to claim 4, wherein before applying the resource allocation scheme, a maximum power combination is found, and a maximum edge weight in the subgraph G' is calculated according to the maximum power combination.
6. The resource allocation method for improving the wireless transmission safety performance of the Internet of vehicles according to claim 5, wherein the first communication link and the second communication link are divided into a plurality of equal parts from 0 to the maximum value of the transmission power on the resource block, so that all power combinations of the first communication link and the second communication link are obtained, and the power pair with the maximum weight is found.
7. The resource allocation method for improving the wireless transmission safety performance of the Internet of vehicles according to claim 6, wherein the maximum safety rate of the link pair consisting of the first communication link and the second communication link on different resource blocks is obtained according to the maximum power combination of the first communication link and the second communication link;
calculating to obtain a maximum edge weight value in the subgraph G' according to the maximum safe rate;
the transmission power of the first communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the first communication link;
the transmission power of the second communication link on different resource blocks is smaller than the maximum value of the allowed transmission power of the second communication link.
8. The resource allocation method for improving the wireless transmission safety performance of the internet of vehicles according to claim 7, wherein each resource block node in the subgraph G' has a corresponding priority queue;
the priority queue is arranged in the order that the weight of the edge obtained by connecting the resource block node and the nodes by different links is arranged from large to small.
9. The resource allocation method for improving the safety performance of wireless transmission of the internet of vehicles according to claim 8, wherein each resource block node and link pair node in the subgraph G' have corresponding matching results;
and when the resource block node is connected with the link pair node and a result of successful matching is obtained, the first communication link is successfully matched with the resource block node, and the second communication link is successfully matched with the resource block node.
CN201810003053.7A 2018-01-02 2018-01-02 Resource allocation method for improving wireless transmission safety performance of Internet of vehicles Active CN109996218B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810003053.7A CN109996218B (en) 2018-01-02 2018-01-02 Resource allocation method for improving wireless transmission safety performance of Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810003053.7A CN109996218B (en) 2018-01-02 2018-01-02 Resource allocation method for improving wireless transmission safety performance of Internet of vehicles

Publications (2)

Publication Number Publication Date
CN109996218A CN109996218A (en) 2019-07-09
CN109996218B true CN109996218B (en) 2022-07-22

Family

ID=67128320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810003053.7A Active CN109996218B (en) 2018-01-02 2018-01-02 Resource allocation method for improving wireless transmission safety performance of Internet of vehicles

Country Status (1)

Country Link
CN (1) CN109996218B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111429742B (en) * 2020-03-30 2021-06-11 腾讯科技(深圳)有限公司 Road side equipment distribution method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100081165A (en) * 2009-01-05 2010-07-14 경희대학교 산학협력단 Method for calculating security capacity of gaussian mimo wiretap channel
CN105657700A (en) * 2016-03-10 2016-06-08 南京邮电大学 Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN106535342A (en) * 2016-11-30 2017-03-22 北京大学 Resource allocation method used for full duplex cellular network physical layer safe scene
CN107231683A (en) * 2017-05-27 2017-10-03 西安电子科技大学 Relay system power distribution method based on safety of physical layer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100081165A (en) * 2009-01-05 2010-07-14 경희대학교 산학협력단 Method for calculating security capacity of gaussian mimo wiretap channel
CN105657700A (en) * 2016-03-10 2016-06-08 南京邮电大学 Wireless anti-eavesdropping communication method based on cooperation of multiple source nodes
CN106535342A (en) * 2016-11-30 2017-03-22 北京大学 Resource allocation method used for full duplex cellular network physical layer safe scene
CN107231683A (en) * 2017-05-27 2017-10-03 西安电子科技大学 Relay system power distribution method based on safety of physical layer

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
R1-157372:Discussion on V2X Resource Allocation;Ericsson;《3GPP TSG RAN WG1 Meeting #83》;20151107;全文 *
Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks;Kecheng Zhang等;《IEEE Transactions on Vehicular Technology》;20170228;第66卷(第2期);第1822-1834页 *
无线多载波信道的保密容量及最优功率分配;曾伟超等;《浙江大学学报(工学版)》;20080815(第08期);全文 *

Also Published As

Publication number Publication date
CN109996218A (en) 2019-07-09

Similar Documents

Publication Publication Date Title
Chen et al. A multihop task offloading decision model in MEC-enabled internet of vehicles
Wang et al. Lifesaving with RescueChain: Energy-efficient and partition-tolerant blockchain based secure information sharing for UAV-aided disaster rescue
Klymash et al. State of the art and further development of information and communication systems
CN109699033B (en) LoRa power Internet of things base station deployment method and device for cost and load balancing
Kalinin et al. Architectures for building secure vehicular networks based on SDN technology
Mekki et al. Vehicular cloud networking: evolutionary game with reinforcement learning-based access approach
Hao et al. URLLC resource slicing and scheduling for trustworthy 6G vehicular services: A federated reinforcement learning approach
Vinita et al. Federated Learning-based Misbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles
Kohli et al. Security of cloud-based vehicular ad-hoc communication networks, challenges and solutions
Tolba et al. A three-tier architecture for securing IoV communications using vehicular dependencies
CN109996218B (en) Resource allocation method for improving wireless transmission safety performance of Internet of vehicles
Tirumalasetti et al. Automatic Dynamic User Allocation with opportunistic routing over vehicles network for Intelligent Transport System
Atat et al. Stochastic geometry model for interdependent cyber-physical communication-power networks
Rehman et al. Modeling and optimizing IoT-driven autonomous vehicle transportation systems using intelligent multimedia sensors
CN115882925A (en) Cognitive satellite network spectrum sharing method based on block chain intelligent contract verification
Kait et al. Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities
Alaa et al. Towards trust model in unmanned aerial vehicle ad hoc networks
Boualam et al. Internet of connected vehicles: Challenges and opportunities
Prakash et al. Resource key distribution and allocation based on sensor vehicle nodes for energy harvesting in vehicular ad hoc networks for transport application
Abbas et al. Blockchain based vehicular trust management and less dense area optimization
Paranjothi et al. Message dissemination in connected vehicles
Sethi et al. Secure cross layer architecture for IOT devices in NGN
Sarangi Malicious Attacks Detection Using Trust Node Centric Weight Management Algorithm in Vehicular Platoon
Mirzaee et al. CHFL: A collaborative hierarchical federated intrusion detection system for vehicular networks
CN113784308B (en) Content sharing method and device based on coding cache

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant