Skip to main content

Signal processing of Internet of Vehicles based on intelligent interference

Abstract

With the rapid development of in-vehicle electronic technology and artificial intelligence, Internet of Vehicles (IoV) technology, as an effective integration of the two, greatly reduces the probability of road traffic accidents. However, the current IoV system is not perfect for the control process of abnormal vehicles. Therefore, to strengthen the management and control of abnormal vehicles in the IoV, it is extremely necessary to propose a method for interfering with IoV signals. Among the current popular intelligent interference methods, most of them rely on the prior knowledge of the signal. However, prior knowledge is difficult to obtain in practical applications. Therefore, in view of the shortcomings of the current communication interference technology, this study introduces intelligent interference into the signal processing technology of the IoV. When the service provider identifies abnormal signals, the intelligent interference method can be used to achieve precise interference for a single target and then realize the control of the IoV signals. This study proposes an interference waveform generation technology based on convolutional autoencoders. The convolutional autoencoder was used to change the features on the fully connected layer to generate an interference waveform that is very similar to the received signal waveform. The simulation results show that the interference waveform generation technology proposed in this study can make the bit error rate (BER) reach 38.4% within the signal-to-interference ratio (SIR) from − 10 to − 15 dB.

1 Introduction

With the development of artificial intelligence technology, in the future 6G era, various network models of deep learning will be ubiquitous. One of the most critical scenarios is that service providers need to interact and make decisions on vehicle information in real time [1, 2].

IoV is based on the Internet of Things [3, 4] technology and is more oriented to transportation applications. The Internet of Things (IoT) has a wide range of applications in the current 5G era, especially in improving the data transmission rate. IoT is facing the shortage of spectrum resources due to the rapid growth of IoT terminals and big data services. Fifth-generation (5G) network owns sufficient spectrum resources and supplies large data volume business, which can help to expand the communication resources of the IoT by combing IoT with 5G network [5, 6].

IoV can obtain environmental information around the vehicle through the image sensor on the vehicle [7, 8]. This information processing technology has greatly improved traffic safety. However, the current signal processing technology of the IoV is not perfect. When the owner deliberately violates the rules or the vehicle sensing system fails, it is difficult to avoid traffic accidents only by relying on the subjective initiative of the owner. Therefore, safe, effective and intelligent interference to illegal driving behavior is an important field of IoV signal control. At present, most of the communication methods of the IoV rely on digital radio communication. According to the characteristics of the communication technology of the Internet of Vehicles, this study introduces the intelligent interference technology of digital communication into the processing technology of the IoV signals, uses the model in deep learning to transform the high-order characteristics of the original communication signal and finally achieves the purpose of intelligent interference.

At present, interference methods for digital communication are still dominated by traditional interference methods, which hinder the target receiver from receiving information through high-power suppression. However, the number of vehicles with abnormal conditions is often small. High-power barrage jamming cannot distinguish specific interference targets, which means that traditional interference methods are not suitable for IoV signal processing. Therefore, the introduction of intelligent communication interference into IoV signal processing has become a major trend in the development of the current IoV field.

Research on intelligent interference has been carried out for several years at home and abroad. Traditional methods are generally based on optimization theory, information theory, game theory [9] and other technologies. They rely on prior knowledge and combine signal analysis optimization and game theory to obtain optimal interference strategies and optimal interference waveforms under specific constraints. References [10,11,12] analyze the capacity of wireless channels in the presence of correlated interference and prove that Gaussian signaling and Gaussian interference form a saddle-point solution. In 2016, Scholars such as Amuru deduced the theoretical optimal interference waveforms for several classical digital modulations and proved that it is not optimal to match the jammer’s signal with the disturbed signal to obtain the maximum BER probability. These interference methods based on optimization theory need to have certain prior knowledge of the modulation method of the disturbed signal and the communication network environment, so that the corresponding optimal interference waveform can be accurately analyzed. When the environment changes, the algorithm often cannot adapt quickly according to the parameter changes of the target. Li et al. address the joint interference pricing and power allocation problem for multi-beam satellite systems (MSS) through the Stackelberg model [13].

With the rapid development of computer equipment, scholars have begun to research the interference algorithm of artificial intelligence. The work done at home and abroad mainly focuses on artificial intelligence algorithms, makes autonomous decisions in terms of interference strategies, and finds the best interference pattern under the existing interference waveform pattern library. Amuru et al. [14] proposed to use a multi-armed bandit machine to model the interference waveform decision problem and studied the interference strategies for one-to-one and many-to-many scenarios in the absence of prior information. At the same time, continuous and discrete action state spaces are established, which provides a reference for subsequent modeling and exploration based on reinforcement learning methods. Yang et al. applied the reinforcement learning algorithm to the selection of the interference channel and explored the action space based on the power and signal modulation method through the reinforcement learning network, so as to achieve the purpose of tracking the dynamic interference of the enemy target. Zhang searched the entire strategy combination space by means of Gaussian perturbation exploration, generates the optimal interference strategy, and improved the selection speed of the optimal interference strategy. Wu et al. proposed reinforcement learning methods based on state-action-reward-state-action (SARSA) and Q-learning, optimized the design of interference waveforms, and verified the feasibility of the fill collaborative forecast and replenishment (Fill-CFAR) method of interference design. Zhang et al. established a Markov chain dynamic interference model and used reinforcement learning to design interference waveforms with various exploration strategies.

However, these methods above rely too much on prior information, and in practical application scenarios, it is very difficult to obtain prior information of the disturbed signal.

Therefore, for the case of unknown prior information, this study proposes a method based on convolutional autoencoder to parse the received signal and generate an interference waveform with similar characteristics to the original signal. In this study, we choose to interfere with the communication signals of three modulation methods: binary phase shift keying (BPSK), quaternary phase shift keying (QPSK) and octal phase shift keying (8PSK). After denoising, the signal sent by the transmitter is input into the convolutional autoencoder to extract signal features, and the interference waveform is generated by changing the parameters of the fully connected layer, and the interference effect is evaluated at the receiver. This study makes the following three contributions to the problem of signal management and control of the IoV:

  1. (1)

    The method used in this paper is to design the best interference signal for the disturbed signal, which does not require high-power noise transmitting equipment, and can achieve precise interference.

  2. (2)

    The convolutional autoencoder used in this study can automatically design the optimal interference waveform according to the received signal, which means that the method used in this study does not rely on prior knowledge.

  3. (3)

    The shape of the interference waveform generated by the method used in this study is very similar to the shape of the disturbed signal waveform, so that the receiver cannot judge whether the interference is applied or not.

  4. (4)

    The interference effect of the method adopted in this study is superior to Gaussian noise interference and amplitude modulation (AM) noise interference under any SIR. When the signal-to-noise ratio(SNR) is 15 dB, and the SIR is within − 10 dB to − 15 dB, the interference waveform generation technology proposed in this study can make the bit error rate reach 38.4%.

This study is organized as follows: Sect. 2 presents the method used in this study and describes the model and algorithm network structure of the optimal interference waveform generation based on convolutional autoencoders proposed in this study. Section 3 presents the simulation results of the experimental simulation. Section 4 draws conclusions and summarizes future research directions.

2 Methods

2.1 System model

Traditional interference generally selects the interference waveform that best matches the characteristics of the received signal from the strategy library. However, for the signal of the unknown system, it is impossible to find a suitable interference method, and generally barrage interference is used to interfere with the other party. However, the barrage interference has the problem that the required power is too large and cannot be accurately interfered. Therefore, this study proposes a method based on the convolutional autoencoder to extract features from the signal and adds perturbations to the features of the fully connected layer to generate interference signals with similar high-level abstract features to the target signal.

2.1.1 Model of interference waveform generation based on convolutional autoencoder

When the modulation mode adopted by the communication signal is known, the probability density function of its efficient interference can be derived by mathematical formula, and the interference signal can be generated according to the distribution characteristics. However, in the absence of prior knowledge of communication signals, signals with similar characteristics in time domain, frequency domain, information domain, energy domain and feature domain can still be considered as efficient interference. Therefore, this proposes a feature extraction method based on convolutional autoencoders. Autoencoders are generally used for image reconstruction, denoising, data dimensionality reduction and feature extraction. In this study, the convolutional autoencoder is used to extract signal features, combining both classification effect and minimum mean square error (MMSE) [15, 16] to design error function to improve the performance of feature extraction and signal reconstruction. After training the model, according to the characteristic parameter distribution of the fully connected layer, the signal of the fully connected layer is changed by occlusion and replacement to generate an interference waveform, and the BER is calculated by the receiver, the BER is used as the evaluation of the interference effect. The system model is shown in Fig. 1.

Fig. 1
figure 1

Interference waveform generation model

2.1.2 Interference waveform generation strategy

According to the network structure of the convolutional autoencoder, the communication signal can be approximately reconstructed under the constraint of ensuring the classification accuracy. Therefore, it is considered that the high-dimensional features extracted by the network structure in the fully connected layer can represent the signal. In addition, literature [14, 17] has deduced the interference probability distribution functions of signals such as multiple phase shift keying (MPSK) and multiple quadrature amplitude modulation (MQAM) under specific constraints. We generate interference waveforms by destroying the characteristics of specific signals. In order to test the interference effect of interference waveforms generated by different feature perturbations, this study formulates rules for testing the significant scores of two types of signal features, which are the inter-class variance and the total mean.

For the linear combination, the larger the mean of the signal features, the greater the impact on the follow-up. The relationship between the two can be expressed as:

$$\begin{aligned} {S_{{{\rm ifeature }}}} = {\bar{x}_{iM}} \end{aligned}$$
(1)

where,m = 1,2, ..., M and \({\bar{x}_{iM}}\) represents the variance of the ith feature in the feature layer extracted from the Mth signal.

If the connection between the fully connected layer and the classifier does not go through any activation function, the two are considered to be a linear combination, so the larger change in the eigenvalue is the result that obviously affects the classification. Therefore, the scoring rule using the between-class variance can be expressed as:

$$\begin{aligned} {S_{i{{\rm feature }}}} = D\left( {{{\bar{x}}_{i1}},{{\bar{x}}_{i2}}, \ldots ,{{\bar{x}}_{iM}}} \right) \end{aligned}$$
(2)

where \(D( \bullet )\) is expressed as a variance function.

2.2 Convolutional autoencoder

In the field of deep learning, convolutional neural network (CNN) [18] is an algorithm model widely used by scholars. At present, various new algorithm models developed by most scholars are based on convolutional neural network. In the ideal case of not considering other problems such as fitting, the deeper the CNN layer, the more abstract the features it extracts, and the autoencoder is designed with this idea. Autoencoder (AE) [19, 20] is a neural network that copies input to output. AE converts the input information into a high-dimensional representation of the hidden space by compressing the input information and reconstructs the representation of the hidden space into the output.

AE is a neural network that copies input to output. AE converts the input information into a high-dimensional representation of the hidden space by compressing the input information and reconstructs the representation of the hidden space into the output. The running process of the autoencoder is shown in Fig. 2.

Fig. 2
figure 2

Running process of the autoencoder

The basic structure of AE is generally composed of three parts: input layer, hidden layer and output layer, and its structure is shown in Fig. 3.

Fig. 3
figure 3

Autoencoder structure

Assuming that the input dataset is \(X = \left\{ {{x_1},{x_2} \ldots ,{x_N}} \right\}\) and \(x \in \left\{ {{x_1},{x_2} \ldots ,{x_N}} \right\}\). The process of inputting the dataset into the encoding network can be expressed as:

$$\begin{aligned} {h_{W,b}}(x) = f\left( {{\mathbf{W }_{{{\rm Encoder }}}}x + {\mathbf{b }_{{{\rm Encoder }}}}} \right) \end{aligned}$$
(3)

where \({\mathbf{W }_{{{\rm Encoder }}}}\) and \({\mathbf{b }_{{{\rm Encoder }}}}\) are the weight parameter matrix and bias matrix in the encoding network, and \(f( \bullet )\) is the encoding activation function.

According to the structural symmetry of AE, the output of the hidden layer is reconstructed as \(Y = \left\{ {{y_1},{y_2} \ldots ,{y_N}} \right\}\), The process of decoding and reconstruction can be expressed as:

$$\begin{aligned} {y_{W,b}}(x) = g\left( {{\mathbf{W }_{{{\rm Decoder }}}}h + {\mathbf{ b }_{{{\rm Decoder }}}}} \right) \end{aligned}$$
(4)

where \(y \in \left\{ {{y_1},{y_2} \ldots ,{y_N}} \right\}\) is the output dataset and \(g( \bullet )\) is the decoding activation function. It is known from the above that the most critical step to improve the performance of AE is to reduce the reconstruction error of AE, so the reconstruction error \({J_{{\rm AE}}}(\theta )\) is expressed as:

$$\begin{aligned} {J_{{\rm AE}}}(\theta ) = \sum \limits _{x \in \mathbf{X }} L (x,y) \end{aligned}$$
(5)

where \(\theta\) is the loss entropy, and L(x, y) is the sample loss function:

$$\begin{aligned} L(x,y) = \left\{ {\begin{array}{ll} {{||x - y||}{^2}}&{\quad}{{{\rm g}}( \cdot ){{\rm \ is\ the \ identity\ map }}}\\ { - \left[ {\sum \limits _{i = 1}^{{{\rm Decoder }}} {{x_j}} \log \left( {{y_i}} \right) + \left( {1 - {x_i}} \right) \log \left( {1 - {y_i}} \right) } \right] }&{\quad}{{{\rm g}}( \cdot ){{\rm \ is\ the\ sigmoid \ activation\ function }}} \end{array}} \right. \end{aligned}$$
(6)

The operation process and basic structure of AE have been introduced above. The network structure of each layer of AE mainly updates and propagates parameters through the fully connected layer. CNN is mainly a neural network composed of convolutional layers and pooling layers, in which the convolutional layer acts as a filter, and the pooling layer is responsible for extracting invariant features. The convolutional autoencoder (CAE) [21,22,23] replaces the fully connected layers in AE with convolutional layers and pooling layers according to the unsupervised feature extraction characteristics of CNN. The principle block diagram of CAE is shown in Fig. 4.

Fig. 4
figure 4

CAE principle block diagram

  1. (1)

    Convolution layer convolution: Assuming that there are k convolution kernels in CAE, each convolution kernel consists of parameters \({\omega ^k}\) and \({b^k}\), firstly initialize k convolution kernels, and match each convolution kernel with a bias b, generate k features after convolving with the input, and its operation can be expressed as:

    $$\begin{aligned} {h^k} = \sigma (x*{\omega ^k} + {b^k}) \end{aligned}$$
    (7)

    where \({h^k}\) is the feature map.

  2. (2)

    Pooling layer-pooling operation: Perform a pooling operation on the feature map \({h^k}\) generated above. The purpose of pooling is to retain the matrix of the positional relationship during pooling, which is convenient for subsequent de-pooling operations.

  3. (3)

    Pooling layer—self-encoding (de-pooling operation): Perform de-pooling operation on the feature map \({h^k}\) generated above, use the matrix that retains the positional relationship during pooling, and restore the data to the corresponding position of the matrix of the original size.

  4. (4)

    Convolutional layer—self-encoding (deconvolution operation): Each feature map h and the transposition \(\hat{w}\) of its corresponding convolution kernel perform a convolution operation and sum the results, and then add the bias c to obtain the activation function y:

    $$\begin{aligned} y = \sigma \left( {\sum \limits _k {{h^k}*{{\hat{w}}^k} + c} } \right) \end{aligned}$$
    (8)
  5. (5)

    Convolutional Layer—Update Weights: To update the weights, first determine the loss function. The MMSE function used here, that is, the target value minus the square sum of the actual value and then the mean value, where 2n is to simplify the derivation.

    $$\begin{aligned} E = \frac{1}{{2n}}\sum_{i = 1}^n {{({x_i} - {y_i})}^2} \end{aligned}$$
    (9)

2.3 Loss function

In the encoder-based algorithm, it is generally believed that the smaller the reconstruction error, the higher the performance of the algorithm, and the error approaches zero under ideal conditions. However, Yu Z. of Southwest Jiaotong University gave the lower bound of the reconstruction error of the input data, and gave a necessary condition for the reconstruction error of the input layer to reach an ideal state. When the input data are corrupted or noise is added, the reconstruction error of corrupted or noisy input data also has a lower bound. For the loss function of the autoencoder structure, such as formula (6), the pure data input by the autoencoder network can be expressed as x, the input pure data can be expressed as \(x_c^*\), and the abstract parameters in the implicit part of the structure can be expressed as \(h_c\). Formula (10) can be obtained through the encoder:

$$\begin{aligned} f\left( x \right) = h_c \end{aligned}$$
(10)

Similarly, according to its symmetric structure, the reconstructed parameters can be encoded to obtain formula (11):

$$\begin{aligned} h_c^* = f\left( {x_c^*} \right) \end{aligned}$$
(11)

The Taylor expansion of the Lagrangian remainder for the above formula can be obtained:

$$\begin{aligned} f\left( {x_c^*} \right) = f(x) + {\left( {x_c^* - x} \right) ^{\rm T}}\nabla f\left[ {x + \rho \left( {x_c^* - x} \right) } \right] \end{aligned}$$
(12)

where \(\nabla f\left[ {x + \rho \left( {x_c^* - x} \right) } \right]\) is the first derivative of the coding part, where \(\rho \in (0,1)\). The loss function is represented by \(h_c\) and \(h_c^*\) as:

$$\begin{aligned} \begin{array}{ll} L\left( {{h_c},h_c^*} \right) &= L\left( {{h_c},f\left( {g\left( {{h_c}} \right) } \right) } \right) \\ &= \left\| {h_c^* - {h_c}} \right\| = {\left\| {f\left( {x_c^*} \right) - f(x)} \right\| ^2} \end{array} \end{aligned}$$
(13)

Combining (12) can get:

$$\begin{aligned} L\left( {{h_c},h_c^*} \right) = {\left\| {{{\left( {x_c^* - x} \right) }^{\rm T}}\nabla f\left[ {x + \rho \left( {x_c^* - x} \right) } \right] } \right\| ^2} \end{aligned}$$
(14)

Let \(x_c^* - x = {\left| {{\xi _1},{\xi _2}, \ldots ,{\xi _m}} \right| ^T}\), while denoting \(\nabla f\left[ {x + \rho \left( {x_c^* - x} \right) } \right]\) as a real matrix A. Then formula (14) can be expressed as:

$$\begin{aligned} L\left( {{h_c},{h_c}^*} \right) &= {\left\| {{\xi _1},{\xi _2}, \ldots ,{{\left. {{\xi _m}} \right| }^{\rm T}} \cdot A} \right\| ^2} = \sum \limits _{j = 1}^n {{{\left( {\sum \limits _{i = 1}^m {{a_{ij}}} {\xi _i}} \right) }^2}} \\ &\le \sum \limits _{j = 1}^n {\left[ {\left( {{{\sum \limits _{i = 1}^m {{a_{ij}}} }^2}} \right) \left( {{{\sum \limits _{i = 1}^m {{\xi _i}} }^2}} \right) } \right] } = \xi {^2} \cdot \;\;A{^2} \end{aligned}$$
(15)

Ideally, it is hoped that the reconstructed data and the produced data are as identical as possible, which can be expressed as:

$$\begin{aligned} \mathop {\lim }\limits _{x_c^* \rightarrow x} \nabla f\left[ {x + \rho \left( {x_c^* - x} \right) } \right] _F^2 = {J_f}(x)_F^2 \end{aligned}$$
(16)

Formula (17) can be obtained from the above formula:

$$\begin{aligned} L\left( {x_c^*,x} \right) \ge L\left( {x_c^*,{h_c}} \right) /\left\| {{J_f}(x)} \right\| _F^2 \end{aligned}$$
(17)

Through the network structure of the convolutional autoencoder in Sect. 2.4, the 1*1000-dimensional features of the signal are connected to the classifier through the encoded information of the fully connected layer. The confidence loss for classification represented by the Softmax [24, 25] function is shown in formula (18):

$$\begin{aligned} {L_{{{\rm cross }}}} = {L_{{\rm Soft}}} - \frac{1}{N}\sum \limits _N^{i = 1} {\log } \left( {\frac{{{e^{{h_{{y_i}}}}}}}{{\sum \limits _C {{e^{{h_j}}}} }}} \right) \end{aligned}$$
(18)

The classification accuracy of the signal is evaluated by the normal cross-entropy loss. When this part of the network can complete the classification of the signal, it can be considered that the network has extracted significant information in each category, so the deconvolution network can be used to reconstruct the signal on this basis. In the previous coding structure, the position of the reserved value in each operation in the pooling layer is recorded, and the deconvolutional signal is expanded to the same dimension as the original according to the above position during deconvolution. The data format of the final structure output is 2*1024. According to the above derivation, the sum of the reconstruction error and the classification error is guaranteed to be the smallest, so the error formula is obtained as follows:

$$\begin{aligned} {L_{{{\rm mypaper }}}} = \alpha {L_{{{\rm classify }}}} + {||x - y||}{^2} - L\left( {x_c^*,{h_c}} \right) /\left\| {{J_f}(x)} \right\| _F^2 \end{aligned}$$
(19)

where \({L_{{{\rm classify }}}}\) is the Softmax cross-entropy loss above, and \(\alpha\) is a hyperparameter. To balance the magnitude relationship between the two and accelerate the training convergence, this study sets this parameter to 0.1.

2.4 Network structure

According to the characteristics of the interference signal, it is considered that the interference signal needs to overlap with the communication signal in the time-frequency domain and should have similar characteristics in the communication signal. Therefore, a convolutional encoder and a classification loss structure are proposed in this to generate interference signals, and the structure box is shown in Fig. 5.

Fig. 5
figure 5

Algorithm block diagram

Through the convolutional neural network in the Table 1, the signal is converted into features of dimension 1*1000. For a signal with a length of 2*1024, only a fully connected layer with a smaller dimension is required to describe the features. The purpose of using a longer dimension in this study is to provide a larger policy dimension space for subsequent generation of interference waveforms. The classifier is connected through the encoded information of the fully connected layer, and the upper part of the encoder is connected to the Softmax classifier, so that the neural network can extract the salient features of the communication signal in this way. At the same time, the fully connected layer is connected to the deconvolution network for decoding the communication signal. According to the symmetry of the structure of the autoencoder and Table 1, the structure of the decoder can be reversely restored.

Table 1 Encoding part of the network structure

3 Results and discussion

To test the feasibility of the interference waveform generation technology proposed in this study, we divide the experiment into pattern analysis of generated signal and interference effect comparison experiment. Section 3.1 verifies the waveform similarity between the interference signal and the communication signal through the performance of the algorithm reconstruction. Section 3.2 proves the interference effect of this method through the BER curve.

3.1 Analysis of algorithm reconstruction results

Compared with the traditional interference method, the intelligent interference can design the interference signal according to the high-order characteristics of the communication signal waveform, so that the waveform of the interference signal is very similar to the waveform of the communication signal, which saves the interference resources. To verify the subsequent interference effect, the reconstruction performance of the convolutional autoencoder needs to be tested first. In this experiment, the features with significant scores are kept unchanged while other non-salient features are changed. The 1*1000-dimensional features are distributed in a ratio of 10:990, and the non-salient features or salient features are replaced with Gaussian random noise with the same energy to reconstruct the signal. The experimental results are illustrated in Figs. 6 and 7.

Fig. 6
figure 6

Randomly generated interference waveform

Fig. 7
figure 7

Constellation diagram of the generated interference waveform

To detect the similarity between the interference signal and the communication signal more intuitively, the above figures illustrate the time domain I/Q waveform and constellation diagram of the generated interference.

It can be seen from Fig. 6 that the time-domain curves of the communication signals of the I and Q channels of the interference signal are smooth. In Fig. 7, the BSPK, QPSK and 8PSK signals can be clearly distinguished from the constellation diagram, and the time-domain curve of the communication signal is smooth, which proves that the reconstructed interference waveform has a strong similarity with the communication waveform. However, there is a large gap between the constellation diagram of the BPSK signal and the original signal constellation diagram. This is because the unified mean square error is used in the training process, and the amplitude difference between the Q-channel signal of the BPSK signal and the other two types is too large.

3.2 Analysis of the interference results of the algorithm

This experiment adds perturbation and occlusion to the features in the fully connected layer and verifies the interference performance of the waveform generated by the deconvolution. In order to compare and test the interference effect, the SNR is selected as 15 dB, the communication mode is BPSK, QPSK, 8PSK, the SIR is − 15 to 10 dB, the step is 2 dB, and a random string with a length of 1200 is used. The ASCII source code is used as a test sequence, and 100 tests are performed and the average value of the BER is taken. Select BPSK, QPSK and 8PSK three kinds of communication signal itself, noise amplitude modulation, Gaussian noise and other interference for comparison, and the interference effect curve is shown in Fig. 8.

Fig. 8
figure 8

BER curve under the generated interference waveform (SNR = 15 dB)

In this experiment, the maximum weight of 1% of the fully connected layer is selected to apply Gaussian perturbation according to the two standards of mean and standard deviation, and the mean value of the fully connected layer is kept unchanged. The output interference signals are deconvolution interference waveform 1 and deconvolution interference waveform 2, respectively. The low interference performance in BPSK communication is because a certain amount of energy is allocated to the Q-channel signal in the waveform reconstruction, resulting in the degradation of the interference performance. The BER of QPSK and 8PSK communication waveforms is both higher than noise amplitude modulation and Gaussian noise interference. It can be seen from Fig. 8 that, under the BPSK communication system, when the SIR is less than − 4 dB, the highest BER can reach 0.486. Under the QPSK communication system, when the SIR is less than − 5 dB, the highest BER can reach 0.40. Under the 8PSK communication system, when the SIR is less than − 8 dB, the highest BER can reach 0.387.

In summary, the method proposed in this study can generate an interference waveform that approximates the communication signal, and is better than the interference performance of Gaussian noise and noise amplitude modulation under different SIRs.

4 Conclusion

To ensure the applicability and validity of the experimental results, a complete vehicle network communication system is simulated and built in this study, and three communication signals of BPSK, QPSK and 8PSK are used for communication. In this study, a method based on convolutional autoencoder is proposed to extract high-order features of communication signals, and the required intelligent interference waveform is obtained by occluding and replacing the features on the fully connected layer.

This study introduces intelligent interference into the signal processing technology of IoV communication. This study can design interference signals that use the least interference resources and have the best interference effect under the premise of lacking prior information. It solves the serious waste of interference resources of suppressive interference and the limitation of signal prior information in traditional intelligent interference.

It can be seen from the simulated constellation diagram that the reconstructed interference waveform has a strong similarity with the communication waveform, which proves the similarity between the generated interference waveform and the original signal waveform. In addition, the BER curve obtained by simulation can prove that the interference performance of the interference waveform generated in this study is better than that of Gaussian noise and noise amplitude modulation under different SIRs.

The modulation methods applied to the IoV signals are complex and diverse, and this study only focuses on three phase shift keying signals for communication system construction and intelligent interference. Therefore, in future research, the types of modulation methods included should be expanded, so as to achieve comprehensive control of IoV signals.

Availability of data and materials

Please contact author for data requests.

Abbreviations

IoV:

Internet of Vehicles

BER:

Bit error rate

SIR:

Signal-to-interference ratio

SARSA:

State–action–reward–state–action

Fill-CFAR:

Fill collaborative forecast and replenishment

MMS:

Multi-beam satellite systems

BPSK:

Binary phase shift keying

QPSK:

Quaternary phase shift keying

8PSK:

Octal phase shift keying

SNR:

Signal-to-noise ratio

Am:

Amplitude modulation

MMSE:

Minimum mean square error

MPSK:

Multiple phase shift keying

MQAM:

Multiple quadrature amplitude modulation

CNN:

Convolutional neural network

AE:

Autoencoder

CAE:

Convolutional autoencoder

References

  1. E. Fu, X. Li, Z. Yao, Y. Ren, Y. Wu, Q. Fan, Personnel emotion recognition model for internet of vehicles security monitoring in community public space. EURASIP J. Adv. Signal Process. 2021(1), 1–19 (2021)

    Article  Google Scholar 

  2. H.S. Yazdi, M. Lotfizad, E. Kabir, M. Fathy, Clipped input RLS applied to vehicle tracking. EURASIP J. Adv. Signal Process. 2005(8), 1–8 (2005)

    Article  Google Scholar 

  3. X. Liu, X. Zhang, Noma-based resource allocation for cluster-based cognitive industrial internet of things. IEEE Trans. Ind. Inf. 16(8), 5379–5388 (2019)

    Article  Google Scholar 

  4. X. Liu, X.B. Zhai, W. Lu, C. Wu, QoS-guarantee resource allocation for multibeam satellite industrial internet of things with NOMA. IEEE Trans. Ind. Inf. 17(3), 2052–2061 (2019)

    Article  Google Scholar 

  5. X. Liu, X. Zhang, Rate and energy efficiency improvements for 5G-based IoT with simultaneous transfer. IEEE Internet Things J. 6(4), 5971–5980 (2018)

    Article  Google Scholar 

  6. X. Liu, X. Zhang, M. Jia, L. Fan, W. Lu, X. Zhai, 5G-based green broadband communication system design with simultaneous wireless information and power transfer. Phys. Commun. 28, 130–137 (2018)

    Article  Google Scholar 

  7. B. Wei, L. Zhang, K. Wang, Q. Kong, Z. Wang, Dynamic scene deblurring and image de-raining based on generative adversarial networks and transfer learning for internet of vehicle. EURASIP J. Adv. Signal Process. 2021(1), 1–19 (2021)

    Article  Google Scholar 

  8. J. Arróspide, L. Salgado, M. Nieto, Video analysis-based vehicle detection and tracking using an MCMC sampling framework. EURASIP J. Adv. Signal Process. 2012(1), 1–20 (2012)

    Article  Google Scholar 

  9. X. Xu, Y. Wang, J. Liu, X. Zhang, Analysis on the achievement milestones and limitations of game theory. In 2008 Chinese Control and Decision Conference (IEEE, 2008), pp. 1214–1219

  10. S. Shafiee, S. Ulukus, Capacity of multiple access channels with correlated jamming. In MILCOM 2005-2005 IEEE Military Communications Conference (IEEE, 2005), pp. 218–224

  11. A. Kashyap, T. Basar, R. Srikant, Correlated jamming on MIMO gaussian fading channels. IEEE Trans. Inf. Theory 50(9), 2119–2123 (2004)

    Article  MathSciNet  Google Scholar 

  12. L.F. Chang, An information-theoretic study of ratio-threshold antijam techniques. Ph.D. thesis, University of Illinois at Urbana-Champaign (1985)

  13. F. Li, K.-Y. Lam, X. Liu, J. Wang, K. Zhao, L. Wang, Joint pricing and power allocation for multibeam satellite systems with dynamic game model. IEEE Trans. Veh. Technol. 67(3), 2398–2408 (2017)

    Article  Google Scholar 

  14. S. Amuru, R.M. Buehrer, Optimal jamming against digital modulation. IEEE Trans. Inf. Forensics Secur. 10(10), 2212–2224 (2015)

    Article  Google Scholar 

  15. A. Farzamnia, N.W. Hlaing, M.K. Haldar, J. Rahebi, Channel estimation for sparse channel OFDM systems using least square and minimum mean square error techniques. In 2017 International Conference on Engineering and Technology (ICET) (IEEE, 2017), pp. 1–5

  16. C. Yang, F. Yang, Z. Wang, Iterative minimum mean square error equalization for optical fiber communication systems. IEEE Photonics Technol. Lett. 19(19), 1571–1573 (2007)

    Article  Google Scholar 

  17. L. Huang, M.J. Neely, The optimality of two prices: maximizing revenue in a stochastic communication system. IEEE/ACM Trans. Netw. 18(2), 406–419 (2009)

    Article  Google Scholar 

  18. F.A. Uçkun, H. Özer, E. Nurbaş, E. Onat, Direction finding using convolutional neural networks and convolutional recurrent neural networks. In 2020 28th Signal Processing and Communications Applications Conference (SIU) (IEEE, 2020), pp. 1–4

  19. Y. Zhou, A. Amimeur, C. Jiang, D. Dou, R. Jin, P. Wang, Density-aware local siamese autoencoder network embedding with autoencoder graph clustering. In 2018 IEEE International Conference on Big Data (Big Data) (IEEE, 2018), pp. 1162–1167

  20. Q. Xu, Z. Wu, Y. Yang, L. Zhang, The difference learning of hidden layer between autoencoder and variational autoencoder. In 2017 29th Chinese Control And Decision Conference (CCDC) (IEEE, 2017), pp. 4801–4804

  21. X. Zhao, X. Han, W. Su, Z. Yan, Time series prediction method based on convolutional autoencoder and LSTM. In 2019 Chinese Automation Congress (CAC) (IEEE, 2019), pp. 5790–5793

  22. C. Chun, K.M. Jeon, T. Kim, W. Choi, Drone noise reduction using deep convolutional autoencoder for uav acoustic sensor networks. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW) (IEEE, 2019), pp. 168–169

  23. H. Lee, J. Kim, B. Kim, S. Kim, Convolutional autoencoder based feature extraction in radar data analysis. In 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS) (IEEE, 2018), pp. 81–84

  24. Q. Rao, B. Yu, K. He, B. Feng, Regularization and iterative initialization of softmax for fast training of convolutional neural networks. In 2019 International Joint Conference on Neural Networks (IJCNN) (IEEE, 2019), pp. 1–8

  25. M.A. Hussain, T.-H. Tsai, An efficient and fast softmax hardware architecture (efsha) for deep neural networks. In 2021 IEEE 3rd International Conference on Artificial Intelligence Circuits and Systems (AICAS) (IEEE, 2021), pp. 1–4

Download references

Acknowledgements

Not applicable.

Funding

This work is supported by the National Natural Science Foundation of China (62001137); the Natural Science Foundation of Heilongjiang Province (JJ2019LH2398); the Fundamental Research Funds for the Central Universities (3072021CF0805).

Author information

Authors and Affiliations

Authors

Contributions

CY proposed the framework of the whole algorithm; XY performed the simulations, analysis and interpretation of the results. CB and ZA have participated in the conception and design of this research and revised the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Zhian Deng.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

The picture materials quoted in this article have no copyright requirements, and the source has been indicated.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, X., Hou, C., Deng, Z. et al. Signal processing of Internet of Vehicles based on intelligent interference. EURASIP J. Adv. Signal Process. 2022, 31 (2022). https://doi.org/10.1186/s13634-022-00864-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-022-00864-5

Keywords