Anti-eavesdropping method for IoV based on intermittent cooperative jamming
11196507 · 2021-12-07
Assignee
Inventors
Cpc classification
Y02D30/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H04K3/86
ELECTRICITY
H04W12/02
ELECTRICITY
H04K3/41
ELECTRICITY
H04L27/0008
ELECTRICITY
International classification
H04L1/00
ELECTRICITY
Abstract
Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.
Claims
1. An anti-eavesdropping method for the Internet of Vehicles (boy) based on intermittent cooperative jamming, comprising the following steps: step 1): on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j:
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I≤P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D+J.sub.I≤T.sub.min.sup.PHY (4)
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I≤P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D+J.sub.I≤T.sub.min.sup.PHY (4) wherein the expression (1) is an optimization objective, and the expressions (2), (3), and (4) are all constraint conditions; in these expressions, J.sub.D is duration of a jamming time slot, and J.sub.I is duration of a jamming interval; V.sub.j sends a jamming signal at power P.sub.j for J.sub.D and then stops sending the jamming signal for J.sub.I; J.sub.D+J.sub.I constitutes a jamming cycle which repeats in a period of data transmission between legitimate users; P.sub.e.sup.C is an error-correcting capability of the illegitimate user V.sub.e;
2. The anti-eavesdropping method for the IoV based on intermittent cooperative jamming according to claim 1, wherein in step 1), calculation formulas of P.sub.e.sup.D and P.sub.e.sup.I are relevant to a modulation manner used by a legitimate sender; a Q function is let to be
3. The anti-eavesdropping method for the IoV based on intermittent cooperative jamming according to claim 2, wherein in step 2), T.sub.min.sup.PHY is relevant to the modulation manner used by the legitimate user and a coding rate: when the modulation manner used by the legitimate sender is BPSK and the coding rate is 1/2, T.sub.min.sup.PHY=76 μs; when the modulation manner used by the legitimate sender is BPSK and the coding rate is 3/4, T.sub.min.sup.PHY=60 μs; when the modulation manner used by the legitimate sender is QPSK and the coding rate is 1/2, T.sub.min.sup.PHY=48 μs; when the modulation manner used by the legitimate sender is QPSK and the coding rate is 3/4, T.sub.min.sup.PHY=40 μs; when the modulation manner used by the legitimate sender is 16-QAM and the coding rate is 1/2, T.sub.min.sup.PHY=36 μs; when the modulation manner used by the legitimate sender is 16-QAM and the coding rate is 3/4, T.sub.min.sup.PHY=32 μs; when the modulation manner used by the legitimate sender is 64-QAM and the coding rate is 1/2, T.sub.min.sup.PHY=28 μs; and when the modulation manner used by the legitimate sender is 64-QAM and the coding rate is 3/4, T.sub.min.sup.PHY=28 μs.
4. The anti-eavesdropping method for the IoV based on intermittent cooperative jamming according to claim 3, wherein in step 3), when the modulation manner used by the legitimate sender is BPSK, calculation formulas of P*.sub.j, J*.sub.I, and J*.sub.D are as follows:
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
DESCRIPTION OF THE EMBODIMENTS
(4) The technical method of the present invention is further described in detail below with reference to the accompanying drawings.
(5) The present invention can be implemented in different forms, and should not be construed as being limited to the embodiments illustrated herein. On the contrary, these provided embodiments make the disclosure thorough and complete, and fully convey the scope of the present invention to those skilled in the art. In the accompanying drawings, the components are enlarged for clarity.
(6) The present invention discloses an anti-eavesdropping method for the IoV based on intermittent cooperative jamming, including the following steps.
(7) Step 1) Optimization problems are established for a cooperative jamming user V.sub.j.
(8) On the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, optimization problems are established for the purpose of minimizing an energy consumption of V.sub.j.
(9)
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I≤P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D±J.sub.I≤T.sub.min.sup.PHY (4)
(10)
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I≤P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D+J.sub.I≤T.sub.min.sup.PHY (4)
(11) In an optimization objective (1), J.sub.D is duration of a jamming time slot, and J.sub.I is duration of a jamming interval. V.sub.j sends a jamming signal at power P.sub.j for J.sub.D and then stops sending the jamming signal for J.sub.I. J.sub.D+J.sub.I constitutes a jamming cycle which repeats in a period of data transmission between legitimate users, as shown in
(12) A constraint condition (2) means that V.sub.j must ensure that V.sub.e cannot eavesdrop on the information. In the expression, P.sub.e.sup.C is an error-correcting capability of the illegitimate user V.sub.e. When a bit error probability P.sub.e of the information received by V.sub.e exceeds the error-correcting capability thereof, V.sub.e cannot correctly decode and eavesdrop on the information. An expression of P.sub.e is as follows:
(13)
(14) P.sub.e.sup.D is a bit error probability of V.sub.e during J.sub.D, and P.sub.e.sup.I is a bit error probability of V.sub.e during J.sub.I. The calculation of the bit error probability is relevant to a modulation manner used by a legitimate sender, and four modulation manners used by a sender in the IoV and their corresponding calculation formulas of P.sub.e.sup.D and P.sub.e.sup.I are shown in table 1. In the formulas,
(15)
is a Q function; E.sub.b is energy spent by V.sub.e in receiving each hit of information; N.sub.0 is a noise power spectral density; and
(16)
is a power spectral density of a jamming signal received by V.sub.e, where |h.sub.je|.sup.2 is a channel gain between V.sub.j and V.sub.e, and B is a channel bandwidth. Table 1 shows calculation formulas of P.sub.e.sup.D and P.sub.e.sup.I.
(17) TABLE-US-00001 Modulation Calculation Calculation manners formulas of P.sub.e.sup.D formulas of P.sub.e.sup.I BPSK
(18) A constraint condition (3) has a twofold meaning. First, the method provided by the present invention is applicable to a scenario where the bit error probability P.sub.e.sup.I of V.sub.e during J.sub.I is lower than the error-correcting capability P.sub.e.sup.C thereof; otherwise, cooperative jamming is not required because the illegitimate user cannot eavesdrop on the information. Secondly, V.sub.j must ensure that the bit error probability P.sub.e.sup.D of V.sub.e during J.sub.D is higher than the error-correcting capability P.sub.e.sup.C thereof when selecting J.sub.D, J.sub.I, and P.sub.j; otherwise, the illegitimate user cannot be prevented from information eavesdropping.
(19) In the constraint condition (4), T.sub.min.sup.PHY is the shortest physical-layer data packet duration in the IoV. This constraint condition means that a cooperative jamming period must be shorter than the shortest physical-layer data packet duration, such that transmission of any physical-layer data packet can be protected by the cooperative jamming user.
(20) Step 2): Unique communication characteristics of the IoV are analyzed based on the WAVE protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and then T.sub.min.sup.PHY in the constraint condition (4) is calculated. T.sub.min.sup.PHY is relevant to a modulation manner used by the legitimate user and a coding rate, and corresponding results are specifically shown in table 2.
(21) Table 2 shows T.sub.min.sup.PHY in different modulation manners and at different coding rates.
(22) TABLE-US-00002 Modulation Coding T.sub.min.sup.PHY Modulation Coding T.sub.min.sup.PHY manners rates (μs) manners rates (μs) BPSK 1/2 76 16-QAM 1/2 36 3/4 60 3/4 32 QPSK 1/2 48 64-QAM 1/2 28 3/4 40 3/4 28
(23) Step 3): For any available power range P.sub.j∈[P.sub.j.sup.min,P.sub.j.sup.max] for V.sub.j, the optimal P*.sub.j, J*.sub.I, and J*.sub.D are calculated and selected to minimize the energy consumption of V.sub.j. For example, in the BPSK modulation manner, the optimal, J*.sub.I, and J*.sub.D may be calculated by using the formulas (5) to (8); and the optimal results in other modulation manners may also be obtained by calculation.
(24)
(25) Step 4): According to the calculation results in step 3), V.sub.j sends a jamming signal at the power of P*.sub.j for the duration of J*.sub.D in the period of data transmission between legitimate users, and then stops sending the jamming signal for the duration of J*.sub.I. This procedure is repeated periodically until transmission between the legitimate users ends.
(26) Example 1 describes study on optimal intermittent cooperative jamming methods in different network scenarios.
(27) Parameters for describing network scenarios mainly include a noise power spectral density N.sub.0, a channel gain |h.sub.je|.sup.2 between V.sub.j and V.sub.e, a channel bandwidth B, energy E.sub.b consumed by V.sub.e in receiving each bit of information, a receiving signal-to-noise ratio E.sub.b/N.sub.0 of V.sub.e, and an error-correcting capability P.sub.e.sup.C of V.sub.e. |h.sub.je|.sup.2 is determined mainly by environmental factors, and B is stipulated to be 10 MHz in the IEEE 1609 standard. In this example, a legitimate sender uses a BPSK modulation manner and a coding rate of 1/2; |h.sub.je|.sup.2 is set to a classical value of 0.685; and the maximum transmit power of V.sub.j is 760 mW according to the IEEE 802.11 standard. Based on the foregoing set values, the optimal intermittent cooperative jamming methods in the case of different values of P.sub.e.sup.C, E.sub.b, and E.sub.b/N.sub.0 are studied, and corresponding results are shown in table 3.
(28) Table 3 shows optimal intermittent cooperative jamming methods in different network scenarios.
(29) TABLE-US-00003 Optimal intermittent cooperative jamming Network scenarios methods P.sub.e.sup.C E.sub.b
(30) The following results can be found by observing this example.
(31) (1) The error-correcting capability P.sub.e.sup.C of the illegitimate user V.sub.e mainly influences the duration J*.sub.D of a jamming time slot and the duration J*.sub.I of a jamming interval in the intermittent cooperative jamming method. As P.sub.e.sup.C increases, the intermittent cooperative jamming method provided by the present invention sets a longer jamming time slot J*.sub.D and a shorter jamming interval J*.sub.I.
(32) (2) The energy E.sub.b consumed by V.sub.e in receiving each bit of information first influences the transmit power P*.sub.j of the cooperative jamming user. When the transmit power of the cooperative jamming user does not reach the maximum value, the intermittent cooperative jamming method provided by the present invention maintains J*.sub.D and J*.sub.I; unchanged as E.sub.b increases, to first increase the transmit power P*.sub.j of the cooperative jamming user. Once the transmit power of the cooperative jamming user reaches the maximum value, the intermittent cooperative jamming method provided by the present invention sets a longer jamming time slot J*.sub.D and a shorter jamming interval J*.sub.I, so as to guarantee anti-eavesdropping performance in the case where E.sub.b increases.
(33) (3) The signal-to-noise ratio E.sub.b/N.sub.0 of the signals received by V.sub.e has influence on all of P*.sub.j; J*.sub.D, and J*.sub.I. As E.sub.b/N.sub.0 increases, the intermittent cooperative jamming method provided by the present invention sets a higher transmit power P*.sub.j longer J*.sub.D, and shorter J*.sub.I.
(34) Example 2 describes that observation of the anti-eavesdropping performance of the intermittent cooperative jamming method designed by the present invention and energy consumption of the cooperative jamming user in any physical-layer data packet duration.
(35) This example uses a WLAN toolkit in MATLAB 2018b, which provides relevant functions for simulation of a physical layer in the IoV. In this example, the “wlanNonHTConfig” function is used to generate a non-HT data packet transmitted in the IoV, BPSK is set as the modulation manner, and coding rates of 1/2 and 3/4 are adopted. The “V2VChannel” function is used to generate an IoV channel of which the bandwidth is 10 MHz. A baseband sampling rate for a 10 MHz channel is used and a channel delay model is set to “UrbanNLOS”. The channel gain |h.sub.je|.sup.2 between V.sub.j and V.sub.e is set to 0.685, the energy spent by V.sub.e in receiving each bit of information is E.sub.b=6×10.sup.−8, the receiving signal-to-noise ratio E.sub.b/N.sub.0 of V.sub.e is 9.68 dB, and the error-correcting capability P.sub.e.sup.C of V.sub.e is 0.046. Based on the foregoing settings, two experiments are carried out in the following.
(36) In the first experiment, BPSK is used as the modulation manner and a coding rate is 1/2. Duration of physical-layer data packets sent by a legitimate sender V.sub.t progressively increases from 76 μs to 608 μs. In each duration time, the legitimate sender sends 2500 data packets. The cooperative jamming user V.sub.j uses the intermittent cooperative jamming method designed by the present invention to interfere with the illegitimate user V.sub.e, and to observe a PER (that is, a ratio of the number of data packets V.sub.e cannot correctly decodes to a total number of data packets sent by V.sub.t) of the illegitimate user V.sub.e and the energy consumption of the cooperative jamming user.
(37) In the second experiment, BPSK is used as the modulation manner and a coding rate is 3/4. Duration of physical-layer data packets sent by a legitimate sender V.sub.t progressively increases from 60 μs to 412 μs. In each duration time, the legitimate sender sends 2500 data packets. The cooperative jamming user V.sub.j uses the intermittent cooperative jamming method designed by the present invention to interfere with the illegitimate user V.sub.e, and to observe a PER (that is, a ratio of the number of data packets V.sub.e cannot correctly decodes to a total number of data packets sent by V.sub.t) of the illegitimate user V.sub.e and the energy consumption of the cooperative jamming user.
(38) In the two experiments, the cooperative jamming user acquires the optimal intermittent cooperative jamming methods by the following four steps, and interferes with the illegitimate user.
(39) Step 1: Optimization problems are established for the cooperative jamming user V.sub.j.
(40)
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I<P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D+J.sub.I≤T.sub.min.sup.PHY (4)
s.t.
P.sub.e≥P.sub.e.sup.C (2)
P.sub.e.sup.I≤P.sub.e.sup.C≤P.sub.e.sup.D (3)
J.sub.D+J.sub.I≤T.sub.min.sup.PHY (4)
(41) where
(42)
(43) Step 2: Analysis is performed based on the WAVE protocol, to obtain values of T.sub.min.sup.PHY at coding rates of 1/2 and 3/4 respectively in the BPSK modulation manner.
(44) TABLE-US-00004 Modulation manner Coding rates T.sub.min.sup.PHY (μs) BPSK 1/2 76 3/4 60
(45) Step 3: The cooperative jamming user V.sub.3 finds the optimal intermittent cooperative jamming methods by calculation.
(46) Step 3.1: P.sub.e.sup.I≤P.sub.e.sup.C is met in the constraint condition (3). It can be learned from
(47)
that P.sub.e.sup.D is an increasing function with respect to P.sub.j. To meet the constraint condition P.sub.e.sup.D≥P.sub.e.sup.C=0.046, it can be obtained that P.sub.j≥521.3 mW. Therefore, an available power range for V.sub.j is P.sub.j∈[521.3, 760] mW.
(48) Step 3.2:
(49)
in the constraint condition (2); and partial derivatives of P.sub.e with respect to J.sub.D and P.sub.e.sup.D are calculated as follows:
(50)
(51) It can be learned that P.sub.e is an increasing function with respect to J.sub.D and P.sub.e.sup.D, and P.sub.e.sup.D is an increasing function with respect to P.sub.j. Therefore, P.sub.e is an increasing function with respect to J.sub.D and P.sub.j. J.sub.D or P.sub.j needs to be increased to obtain a larger P.sub.e. However, the increase of J.sub.D or P.sub.j causes a larger objective function E. In order to minimize the objective function, the constraint condition P.sub.e≥P.sub.e.sup.C is adjusted to P.sub.e=P.sub.e.sup.C, and this equation is solved to obtain:
(52)
(53) Step 3.3:
(54)
is substituted into the constraint condition (4) to obtain
(55)
Because the objective function is a decreasing function with respect to J.sub.I, a maximum value of J.sub.I is taken so as to minimize the objective function. Therefore,
(56)
and
(57)
can be obtained, which are substituted into the objective function E to obtain:
(58)
(59)
are substituted into E to
learn that E is a convex function with respect to P.sub.j. Let
(60)
to obtain P.sub.j=1007 mW. Therefore, within the available power range [521.3 mW, 760 mW] for V.sub.j, E is a decreasing function with respect to P.sub.j. In order to minimize the objective function E, an optimal transmit power P*.sub.j=760 mW is taken.
(61) Step 3.4: When the modulation manner is BPSK and the coding rate is 1/2, T.sub.min.sup.PHY=76 μs. When the modulation manner is BPSK and the coding rate is 3/4, T.sub.min.sup.PHY=60 μs. P*.sub.j=760 mW is substituted into
(62)
to obtain the following results.
(63) TABLE-US-00005 Optimal intermittent Modulation cooperative jamming methods manner Coding rates P.sub.j* J.sub.D* J.sub.I* BPSK 1/2 760 mW 47.12 μs 28.88 μs 3/4 760 mW 37.2 μs 22.8 μs
(64) Step 4: According to the calculation results in step 3, V.sub.j sends a jamming signal at the power of P*.sub.j for the duration of J.sub.D* in the period of data transmission between legitimate users, and then stops sending the jamming signal for the duration of J*.sub.I; and this procedure is repeated periodically until transmission between the legitimate users ends.
(65) Experimental results of the two experiments are shown in
(66) It can be found by observing
(67) When no interference is made with V.sub.e (WOJ) or the LT method is used to interfere with V.sub.e, the PER of V.sub.e increases as the physical-layer data packet duration increases. The reason is that the number of information bits included in a physical-layer data packet increases as the physical-layer data packet duration increases, and the probability in which some information bits in the data packets received by V.sub.e cannot be correctly decoded increases, thus enhancing the PER of V.sub.e. When the CJ method is used to interfere with V.sub.e, because the cooperative jamming user continuously sends a jamming signal, the signal-to-noise ratio of V.sub.e is low all the time and thus the PER of V.sub.e is known to be close to 100%. By using the same jamming method, the PER of the illegitimate user at the coding rate of 3/4 is higher than that at the coding rate of 1/2. The reason is that in different coding manners, more information bits are included in a physical-layer data packet at the coding rate of 3/4, easily resulting in packet errors.
(68) As shown in
(69) Those skilled in the art should understand that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art to which the present invention belongs. It should be further understood that, terms such as those defined in a general dictionary should be construed as having meanings consistent with the meanings in the context of the prior art. Unless defined as herein, these terms will not be interpreted in an ideal or overly formal way.
(70) The specific implementation manners described above further describe the purpose, technical methods, and beneficial effects of the present invention in further detail. It should be understood that the above descriptions are only specific embodiments of the present invention and are not intended to limit the present invention. Any modifications, equivalent replacements or improvements made within the spirit and principle of the present application shall fall within the protection scope of the present invention.