Hybrid resource configuration method for fog computing Internet-of-Things physical layer security

A technology for physical layer security and resource allocation, applied in the field of mixed resource allocation, which can solve problems such as discussion, less failure to allocate mixed security resources, and complex implementation of high-level fog computing security policies.

Active Publication Date: 2021-05-11
HARBIN ENG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the implementation process of the high-level fog computing security strategy proposed above is relatively complicated, and specific protocols and mechanisms need to be redesigned for different network structures
Compared with high-level security, physical layer security is also an important aspect of protecting the privacy of information transmission in fog computing systems. However, the existing research on the physical layer security of fog computing Internet of Things is very little and fails to address the issue of hybrid security resource allocation. discuss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid resource configuration method for fog computing Internet-of-Things physical layer security
  • Hybrid resource configuration method for fog computing Internet-of-Things physical layer security
  • Hybrid resource configuration method for fog computing Internet-of-Things physical layer security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in conjunction with accompanying drawing, as figure 1 As shown, the hybrid resource configuration method designed by the present invention for the security of the fog computing Internet of Things physical layer includes the following steps:

[0043] Step 1: Establish a secure fog computing IoT system model

[0044] Consider a fog computing IoT system with K fog nodes, D IoT users, and L passive bugs. use Represents the data task of each IoT user with time-delay requirements, where S d Indicates the size of the data task, C d Indicates the CPU cycles required to process data tasks, is the maximum allowable delay threshold. There are W spectrum resource blocks orthogonal to each other in the network, each IoT user occupies a spectrum resource block and transmits the data task to the corresponding fog node allocated by the cloud service provider, using χ d,k ∈{0,1} indicates whether the data task of the dth IoT ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hybrid resource configuration method for fog computing Internet-of-Things physical layer security. The method comprises the following steps: establishing a secure fog computing Internet-of-Things system model; initializing a quantum galaxy group and parameters; according to a designed quantum galaxy group evolution rule, evolving all quantum galaxes; measuring the quantum states of the updated quantum galaces to obtain the measurement states of all the updated quantum galaces, calculating the fitness of the measurement states, and updating the measurement states of all the quantum galaces and the global optimal measurement state of the quantum galaces according to the fitness value; and judging whether a termination condition is met. If the algebra of the current evolution is smaller than the set maximum number of iterations, i is made to be equal to i+1, and the third step is executed; otherwise, the evolution is terminated, and the global optimal measurement state of the quantum galaxy group is output, thereby obtaining a corresponding hybrid resource configuration scheme. According to the invention, the uplink secrecy capacity of the whole Internet-of-Things system is greatly improved, network data leakage is reduced, and the Internet-of-Things user is prevented from eavesdropping useful information by a malicious eavesdropper.

Description

technical field [0001] The invention relates to a hybrid resource configuration method aiming at the security of the physical layer of the fog computing Internet of Things, and belongs to the field of information security of the Internet of Things. Background technique [0002] With the rapid increase in the demand for wireless communication and network information interaction, the information industry is promoting social development in an unprecedented way, and the Internet of Things, as a key technology, has received extensive attention. Compared with traditional networks, various networks in the Internet of Things coexist with each other, and things connected to the network are no longer limited to equipment or objects, but can also be information, human behavior, etc. Through radio frequency identification technology, intelligent perception technology and a variety of embedded devices, the Internet of Things can provide smart devices with more information exchange opport...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L12/24
CPCH04L9/0852H04L63/16H04L41/0803
Inventor 张世铂高洪元苏雨萌孙贺麟马静雅刘亚鹏张禹泽郭瑞晨
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products