浏览全部资源
扫码关注微信
1. 绍兴文理学院工学院 绍兴 312000
2. .嘉兴学院数理与信息工程学院 嘉兴 314001
3. 浙江工业大学计算机科学与技术学院 杭州 310023
4. 上海大学机电工程与自动化学院 上海 200072
5. 东华大学计算机科学与技术学院 上海 201620
[ "沈士根,男,博士,绍兴文理学院工学院教授,主要研究方向为无线传感器网络、博弈论。" ]
[ "黄龙军,男,浙江工业大学计算机科学与技术学院博士生,绍兴文理学院工学院讲师, 主要研究方向为无线传感器网络、博弈论。" ]
[ "屠昂燕,女,上海大学机电工程与自动化学院博士生,绍兴文理学院工学院讲师, 主要研究方向为无线传感器网络、网络调度和优化。" ]
[ "李宏杰,男,博士,嘉兴学院数理与信息工程学院副教授,主要研究方向为复杂网络、优化控制。" ]
[ "韩日昇,男,博士,嘉兴学院数理与信息工程学院讲师,主要研究方向为复杂网络、优化控制。" ]
[ "曹奇英,男,博士,东华大学计算机科学与技术学院教授,主要研究方向为普适计算、智能信息处理。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-20
移动端阅览
沈士根, 黄龙军, 屠昂燕, 等. 基于演化博弈的传感节点保密率自适应调节方法 *[J]. 电信科学, 2014,30(11):73-79.
Shigen Shen, Longjun Huang, Angyan Tu, et al. Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game[J]. Dianxin kexue, 2014, 30(11): 73-79.
沈士根, 黄龙军, 屠昂燕, 等. 基于演化博弈的传感节点保密率自适应调节方法 *[J]. 电信科学, 2014,30(11):73-79. DOI: 10.3969/j.issn.1000-0801.2014.11.013.
Shigen Shen, Longjun Huang, Angyan Tu, et al. Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game[J]. Dianxin kexue, 2014, 30(11): 73-79. DOI: 10.3969/j.issn.1000-0801.2014.11.013.
摘 要:通过扩展经典窃听信道模型,针对聚簇无线传感器网络提出了传感节点和簇头之间的保密率计算方法,构建了一个非合作保密率博弈模型,以反映传感节点之间的交互关系。利用演化博弈思想,建立了传感节点自适应选择发射功率的机制,提出了传感节点自适应调节保密率的算法。实验结果表明,提出的方法能自适应地调节传感节点的保密率,为保证无线传感器网络数据的保密性提供了新途径。
By developing the classical wire-tap channel
an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network. A non-cooperative secrecy rate game model was formulated to reflect on the interaction relationship between sensor nodes. Using evolutionary game theory
a selection scheme in which a power level can be adaptively selected by a sensor node was developed. Moreover
a corresponding algorithm of secrecy rate adaptation was proposed. Numerical experiments show that the proposed algorithm adaptively adjusts the secrecy rate of the sensor node. Therefore
a novel method to guarantee the confidentiality of wireless sensor network data was provided.
Chen X , Makki K , Yen K , et al . Sensor network security:a survey . IEEE Communications Surveys&Tutorials , 2009 , 11 ( 2 ): 52 - 73
Poor H V . Information and inference in the wireless physical layer . IEEE Wireless Communications , 2012 , 19 ( 1 ): 40 ~ 47
龙航 , 袁广翔 , 王静 等 . 物理层安全技术研究现状与展望 . 电信科学 , 2011 , 27 ( 9 ): 60 ~ 65
Wyner A D . The wire-tap channel . Bell System Technical Journal , 1975 , 54 ( 8 ): 1355 ~ 1387
Leung-Yan-Cheong S K , Hellman M E . The Gaussian wire-tap channel . IEEE Transactions on Information Theory , 1978 , IT-24 ( 4 ): 451 ~ 456
Csiszár I , Körner J . Broadcast channels with confidential messages . IEEE Transactions on Information Theory , 1978 , IT-24 ( 3 ): 339 ~ 348
Awan Z H , Zaidi A , Vandendorpe L . Secure communication over parallel relay channel . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 359 ~ 371
Liu R , Mari I , Spasojevi P , et al . Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions . IEEE Transactions on Information Theory , 2008 , 54 ( 6 ): 2493 ~ 2507
吉江 , 金梁 , 黄开枝 . 基于人工噪声的 MISO 保密容量分析 . 通信学报 , 2012 , 33 ( 10 ): 138 ~ 142
Gerbracht S , Scheunert C , Jorswieck E A . Secrecy outage in MISO systems with partial channel information . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 704 ~ 716
Shafiee S , Liu N , Ulukus S . Towards the secrecy capacity of the gaussian MIMO wire-tap channel: the 2-2-1 channel . IEEE Transactions on Information Theory , 2009 , 55 ( 9 ): 4033 ~ 4039
肖宛阳 , 黄开枝 , 罗兴国 et al . 基于博弈论的物理层安全建模及现状分析 . 信息工程大学学报 , 2013 , 14 ( 4 ): 402 ~ 409
Yuksel M , Liu X , Erkip E . A secure communication game with a relay helping the eavesdropper . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 818 ~ 830
Mukherjee A , Swindlehurst A L . Jamming games in the MIMO wiretap channel with an active eavesdropper . IEEE Transactions on Signal Processing , 2013 , 61 ( 1 ): 82 ~ 91
Han Z , Marina N , Debbah M , et al . Physical layer security game: interaction between source, eavesdropper, and friendly jammer . Eurasip Journal on Wireless Communications and Networking , 2009 : 1 ~ 10
Saad W , Han Z , Baar T , et al . Distributed coalition formation games for secure wireless transmission . Mobile Networks and Applications , 2011 , 16 ( 2 ): 231 ~ 245
Fakoorian S A A , Swindlehurst A L . MIMO interference channel with confidential messages: achievable secrecy rates and precoder design . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 3 ): 640 ~ 649
Fudenberg D , Levine D K . The Theory of Learning in Games . Cambridge : MIT Press , 1998
Weibull J W . Evolutionary Game Theory . Cambridge : MIT Press , 1995
0
浏览量
415
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构