INFORMATION SECURITY PROTECTION METHOD AND APPARATUS

Information

  • Patent Application
  • 20250126577
  • Publication Number
    20250126577
  • Date Filed
    December 26, 2024
    4 months ago
  • Date Published
    April 17, 2025
    a month ago
Abstract
A first node obtains first power control information (PCI) based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the first and second nodes. The first PCI is a piece of PCI that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met. The received signal includes a signal from the second node. In addition, the first node sends the first PCI to the second node, where the first PCI is used by the second node to generate a first signal. The first node then receives the first signal from the second node, where the first signal includes data information and security protection information, and the security protection information is used to protect information security of the data information.
Description
TECHNICAL FIELD

This disclosure relates to the communication field, and more specifically, to an information security protection method and apparatus.


BACKGROUND

Currently, wireless communication technologies are widely applied to manufacturing and everyday life, for example, applications in vertical industries with extreme high reliability requirements, such as industrial control, telemedicine, and self-driving, and applications in massive machine-type communications scenarios, such as a smart city, a smart home, and environment monitoring. Further, the wireless communication technology may also be combined with an artificial intelligence (AI) technology, to implement AI tasks such as training and inference of an artificial intelligence model, to meet more diversified requirements.


With the ever widening application of the wireless communication technology, improving information security in wireless communication and reducing the risks of information leakage have become the focus of current research.


SUMMARY

Embodiments of this disclosure provide an information security protection method and apparatus, to improve communication security and reliability of wireless communication. According to a first aspect, an information security protection method is provided. The method may be performed by a communication device or a module (for example, a chip or a chip system) configured in (or used in) a communication device.


The method includes: A first node obtains first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and the first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node; the first node sends the first power control information to the second node, where the first power control information is used by the second node to generate a first signal; and the first node receives the first signal from the second node, where the first signal includes data information and security protection information, and the security protection information is used to protect information security of the data information.


According to the foregoing solution, the security of the data information transmitted over a wireless channel can be improved, the probability of information leakage can be reduced, and the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving the transmission reliability of the data information.


In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.


According to the foregoing solution, the first power control information may separately include the power control information used to control the data information in the first signal and the power control information used to control the security protection information, so that power control is separately performed on the data information and the security protection information, to maximize the signal-to-noise ratio of the received signal when the security protection requirement of the data information is met, improving the transmission reliability of the data information.


In some embodiments, there are a plurality of second nodes, and that a first node obtains first power control information corresponding to the second node based on an information security budget, a maximum transmit power of a second node, and channel information between the second node and the first node includes: The first node obtains power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; and that the first node receives the first signal from the second node includes: The first node receives a superimposed signal of first signals from the plurality of second nodes.


According to the foregoing solution, when the first node needs to receive the superimposed signal of the first signals from the plurality of second nodes, the first node obtains the power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node. In this way, when the superimposed signal of the first signals is received by the first node from the plurality of second nodes, the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving transmission reliability of the data information.


In some embodiments, the method further includes: the first node sends first information to the second node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information includes the node feature information that is output by the kth layer of the first machine learning model from the second node; and the method further includes: The first node determines, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.


According to the foregoing solution, when a graph neural network (GNN) is applied to a wireless communication network, node feature information obtained through each layer iteration needs to be transmitted over a wireless channel, and two consecutive communications are highly correlated. Therefore, information transmission security and reliability can be improved by using the foregoing information security protection method.


In some embodiments, the first information includes the first power control information.


In some embodiments, the method further includes: the first node inputs first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, where k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.


According to the foregoing solution, the GNN is applied to a wireless communication network, so that each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented.


In some embodiments, the method further includes: The first node inputs the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model; the first node receives second power control information from the second node; and the first node sends a second signal to the second node, where the second signal includes the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.


According to the foregoing solution, in addition to obtaining the status feature of the first node by receiving the feature information from each adjacent node, the first node further generates, based on the power control information, the second signal including the node feature information that is output by the (k+1)th layer of the first machine learning model on the first node, so that an adjacent node of the first node can also obtain its own status feature.


According to a second aspect, an information security protection method is provided. The method may be performed by a communication device or a module (for example, a chip or a chip system) configured in (or used in) a communication device.


The method includes: A second node receives first power control information from a first node, where the first power control information is used by the second node to generate a first signal; and the second node sends the first signal to the first node, where the first signal includes data information and security protection information, and the security protection signal is used to protect information security of the data information.


In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.


In some embodiments, the method further includes: The second node receives first information from the first node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, the data information includes the node feature information that is output by the kth layer of the first machine learning model on the second node, and k is a positive integer.


In some embodiments, the first information includes the first power control information.


In some embodiments, the method further includes: The second node inputs second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model, where k=1, and the second feature information is node feature information of the second node; or k is an integer greater than 1, the second feature information is first node feature information corresponding to a (k−1)th layer of the first machine learning model, and the first node feature information is determined based on the node feature information that is output by the kth layer of the first machine learning model and that is from at least one first node.


According to a third aspect, a communication apparatus is provided. In a design, the apparatus may include a one-to-one corresponding module for performing the method/operation/step/action described in the first aspect. The module may be a hardware circuit, or may be software, or may be implemented by a hardware circuit in combination with software. In a design, the apparatus includes: a processing unit, configured to obtain first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and a first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node; and a transceiver unit, configured to send the first power control information to the second node, where the first power control information is used by the second node to generate a first signal, where the transceiver unit is further configured to receive the first signal from the second node, where the first signal includes data information and security protection information, and the security protection information is used to protect information security of the data information.


In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.


In some embodiments, there are a plurality of second nodes, the processing unit is configured to obtain power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; and the transceiver unit is configured to receive a superimposed signal of first signals from the plurality of second nodes.


In some embodiments, the transceiver unit is further configured to send first information to the second node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information includes the node feature information that is output by the kth layer of the first machine learning model and that is from the second node.


The processing unit is further configured to determine, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.


In some embodiments, the first information includes the first power control information.


In some embodiments, the processing unit is further configured to input first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, where k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.


In some embodiments, the processing unit is further configured to input the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model; the transceiver unit is further configured to receive second power control information from the second node; and the transceiver unit is further configured to send a second signal to the second node, where the second signal includes the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.


According to a fourth aspect, a communication apparatus is provided. In a design, the apparatus may include a one-to-one corresponding module for performing the method/operation/step/action described in the second aspect. The module may be a hardware circuit, or may be software, or may be implemented by a hardware circuit in combination with software. In a design, the apparatus includes: a transceiver unit, configured to receive first power control information from a first node; and a processing unit, configured to generate a first signal based on the first power control information, where the transceiver unit is further configured to send the first signal to the first node, where the first signal includes data information and security protection information, and the security protection signal is used to protect information security of the data information.


In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.


In some embodiments, the transceiver unit is further configured to receive first information from the first node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, the data information includes the node feature information that is output by the kth layer of the first machine learning model on the second node, and k is a positive integer.


In some embodiments, the first information includes the first power control information.


In some embodiments, the processing unit is further configured to input second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model, where k=1, and the second feature information is node feature information of the second node; or k is an integer greater than 1, the second feature information is first node feature information corresponding to a (k−1)th layer of the first machine learning model, and the first node feature information is determined based on the node feature information that is output by the kth layer of the first machine learning model and that is from at least one first node.


According to a fifth aspect, a communication apparatus is provided, including a processor. The processor may implement the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect. Optionally, the communication apparatus further includes a memory. The processor is coupled to the memory, and may be configured to execute instructions in the memory, to implement the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect. Optionally, the communication apparatus further includes a communication interface, and the processor is coupled to the communication interface. In embodiments of this disclosure, the communication interface may be a transceiver, a pin, a circuit, a bus, a module, or another type of communication interface. This is not limited.


In some embodiments, the communication apparatus is a communication device. When the communication apparatus is the communication device, the communication interface may be a transceiver or an input/output interface.


In some embodiments, the communication apparatus is a chip or a chip system configured in a communication device. When the communication apparatus is the chip or the chip system configured in the communication device, the communication interface may be an input/output interface.


Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.


According to a sixth aspect, a processor is provided. The processor includes an input circuit, an output circuit, and a processing circuit. The processing circuit is configured to: receive a signal through the input circuit, and transmit a signal through the output circuit, to enable the processor to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.


In some embodiments, the processor may be one or more chips, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a trigger, any logic circuit, or the like. An input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, a signal output by the output circuit may be output to, for example, but not limited to, a transmitter and transmitted by the transmitter, and the input circuit and the output circuit may be a same circuit, where the circuit is used as the input circuit and the output circuit at different moments. Specific implementations of the processor and the various circuits are not limited in embodiments of this disclosure.


According to a seventh aspect, a computer program product is provided. The computer program product includes a computer program (which may also be referred to as code or instructions). When the computer program is run, a computer is enabled to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.


According to an eighth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores a computer program (which may also be referred to as code or instructions). When the computer program is run on a computer, the computer is enabled to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.


According to a ninth aspect, a communication system is provided, including the foregoing at least one first node and at least one second node.


It should be noted that, the first node or the second node may be a communication device, or may be a module (such as a chip or a chip system) configured in (or used in) a communication device.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1 is a diagram of a communication system according to an embodiment of this disclosure;



FIG. 2 is a schematic flowchart of graph neural network inference according to an embodiment of this disclosure;



FIG. 3 is a schematic flowchart of an information security protection method according to an embodiment of this disclosure;



FIG. 4 is another schematic flowchart of an information security protection method according to an embodiment of this disclosure;



FIG. 5 is a diagram of a structure of a communication apparatus according to an embodiment of this disclosure; and



FIG. 6 is another diagram of a structure of a communication apparatus according to an embodiment of this disclosure.





DESCRIPTION OF EMBODIMENTS

The following describes technical solutions of this disclosure with reference to accompanying drawings.


In embodiments of this application, “/” may indicate an “or” relationship between associated objects, for example, A/B may indicate A or B; and “and/or” may indicate that three relationships exist between the associated objects, for example, A and/or B may indicate the following three cases: A exists alone, both A and B exist, and B exists alone, where A and B may be singular or plural. For ease of describing the technical solutions in embodiments of this application, terms such as “first” and “second” may be used for differentiation in embodiments of this application. The words such as “first” and “second” do not limit a quantity and an execution sequence, and the words such as “first” and “second” do not limit a definite difference. In embodiments of this application, the word such as “example” or “for example” is used to represent an example, evidence, or descriptions. Any embodiment or design solution described as “example” or “for example” should not be explained as being better or having more advantages than another embodiment or design solution. The word such as “example” or “for example” is used to present a related concept in a specific manner for ease of understanding. In embodiments of this application, “at least one (type)” may alternatively be described as “one (type) or more (types)”, and “a plurality of (types)” may be two (types), three (types), four (types), or more (types). This is not limited in this application.


The technical solutions in embodiments of this application may be applied to various communication systems, for example, a long-term evolution (LTE) system, an LTE frequency division duplex (FDD) system, an LTE time division duplex (TDD) system, a 5th generation (5G) communication system, and a wireless fidelity (Wi-Fi) system. In addition, a communication method provided in this application may be further applied to a communication system evolved after 5G, for example, a 6th generation (6G) communication system, a future communication system, another communication system, or the like. This is not limited in this application.



FIG. 1 is a diagram of an architecture of a communication system 1000 to which this application is applicable. As shown in FIG. 1, the communication system includes a radio access network (RAN) 100. The radio access network 100 may include at least one access network device (for example, 110a and 110b in FIG. 1), and may further include at least one terminal (for example, 120a to 120j in FIG. 1). The terminal and the access network device, and the terminal and the terminal may be connected to each other in a wireless manner. FIG. 1 is merely a diagram. The communication system may further include another communication device.


The communication node in embodiments of this application, for example, a first node and/or a second node, may be an access network device. For example, the access network device may be a base station, a NodeB, an evolved NodeB (eNodeB or eNB), a transmission reception point (TRP), a next generation NodeB (gNB) in a 5th generation (5G) mobile communication system, an access network device in an open radio access network (O-RAN or open RAN), a next generation base station in a 6th generation (6G) mobile communication system, a base station in a future mobile communication system, an access node in a wireless fidelity (Wi-Fi) system, or the like. The access network device may be a macro base station (for example, 110a in FIG. 1), or may be a micro base station or an indoor base station (for example, 110b in FIG. 1), or may be a relay node, a donor node, or the like. A specific technology and a specific device form that are used by the access network device are not limited in this application.


The communication node in embodiments of this application, for example, a first node and/or a second node, may be a terminal device, and the terminal device may also be referred to as a terminal, user equipment (UE), a mobile station, a mobile terminal, or the like. The terminal may be widely used in various scenarios for communication. For example, the scenario includes but is not limited to at least one of the following scenarios: enhanced mobile broadband (eMBB), ultra-reliable low-latency communication (URLLC), massive machine-type communication (mMTC), device-to-device (D2D) communication, vehicle to everything (V2X) communication, machine-type communication (MTC), an internet of things (IoT), virtual reality, augmented reality, industrial control, self-driving, telemedicine, a smart grid, smart furniture, smart office, smart wearable, smart transportation, a smart city, or the like. The terminal may be a mobile phone, a tablet computer, a computer with a wireless transceiver function, a wearable device, a vehicle, an uncrewed aerial vehicle, a helicopter, an airplane, a ship, a robot, a robotic arm, a smart home device, or the like.


A specific technology and a specific device form that are used by the communication node provided in embodiments are not limited in this application.


The following describes related technologies and terms in embodiments of this application.


1. Graph Neural Network GNN

A conventional AI technology has superior performance in extracting features of Euclidean spatial data. However, in actual application scenarios, a lot of data does not belong to Euclidean space. Therefore, a graph neural network for processing graph data emerges. A graph data structure includes nodes and edges. The GNN is a connection model. A dependency relationship in a graph is obtained by transmitting information between nodes in the network. High-dimensional graph data can be mapped to low-dimensional vector space. The GNN updates a status of a node by using an adjacent node of any depth from the node. If two nodes are communicatively reachable, the two nodes may be referred to as adjacent nodes. For example, if a node A may receive a signal from a node B, and the node B may receive the signal sent by the node A, the node A and the node B are communicatively reachable, and the node A and the node B are adjacent nodes. The GNN still retains a hierarchical structure, and an operation at a kth layer of the GNN may be represented as follows:








q
v

(
k
)


=




u


N

(
v
)





f
t

(
k
)


(

{


q
u

(

k
-
1

)


,

e

uv




}

)



,





and







o
v

(
k
)


=


f
o

(
k
)


(


q
v

(

k
-
1

)


,

q
v

(
k
)



)


,




where

    • k is an integer greater than or equal to 1, qv(k) is an intermediate result of a node v at the kth layer of the GNN, euv is a feature of an edge of the node v and a node u, N(v) is a set of identifiers of adjacent nodes of the node v, and ov(k) is an output result of the node v at the kth layer of the GNN. ƒt(k) and ƒo(k) may be functions that are commonly used to implement a neural network by using a multi-layer perceptron (MLP), but this application is not limited thereto. When k=1, that is, k−1=0, qv(0) is a node feature xv of the node v, and qu(0) is a node feature xu of the node u. In other words, in an operation at a first layer of the GNN, qu(0) is a node feature xu of the node u, and an intermediate result qv(1) of the first layer may be represented as:








q
v

(
1
)


=





u


N

(
v
)





f
t

(
1
)


(

{


q
u

(
0
)


,

e

uv




}

)


=




u


N

(
v
)





f
t

(
1
)


(

{


x
u

,

e
uv


}

)




,




and

    • qv(0) is a node feature xv of the node v, and an output result ov(1) of the first layer may be represented as:







o
v

(
1
)


=



f
o

(
1
)


(


q
v

(
0
)


,

q
v

(
1
)



)

=



f
o

(
1
)


(


x
v

,

q
v

(
1
)



)

.






When k is greater than 1, that is, in operations at a second layer and a subsequent layer of the GNN, an intermediate result qu(k-1) of a (k−1)th layer of each adjacent node and a feature euv of an edge of the node u and the node v are used as an input of ƒt(k), to obtain a sum of outputs of ƒt(k) corresponding to each adjacent node, that is, the intermediate result qv(k) of the kth layer of the node v. Then, the intermediate result qv(k) and the intermediate, result qv(k-1) obtained at the previous layer (that is, the (k−1)th layer) are used as an input of ƒo(k), to obtain an output result ou(k) that is of the kth layer of the node v and that is output by ƒo(k). By using a multi-layer convolution operation, a node can continuously aggregate information of adjacent nodes based on a topology structure, and update a status of the node.


For example, as shown in FIG. 2, after graph data is input into a GNN, the GNN performs a first-layer graph convolution. For each node, a node feature qu(0)=xu of each adjacent node u and a feature euv of an edge of a node v and a node u, where u∈N(v), are input into a function ƒt(1), to obtain an intermediate result qv(1) of the node v at a first layer of the GNN, and then the intermediate result qv(1) and a node feature qv(0)=xv of the node v are input into a function ƒo(1), to obtain an output result ov(1) of the node v at the first layer of the GNN. A first-layer result is mapped to a second-layer graph convolution by using an activation function, and the second-layer graph convolution of the GNN is performed. In the second-layer graph convolution, an intermediate result qv(2) at the second layer is obtained based on the intermediate result qu(1) obtained at the first layer of each adjacent node u and the feature euv of the edge of the node v and the node u, and then the output result ov(2) of the node v at the first layer of the GNN is obtained based on the intermediate result qv(2) at the second layer and the intermediate result qv(1) of the node v obtained at the first layer. After K times of iterations are performed in this manner, an output result of the GNN is obtained through inference, so that aggregation information of adjacent nodes based on the topology structure can be obtained, and a status of each node can be determined. The output result includes an output vector of each node, and each output vector includes an output result of a Kth layer corresponding to one node. In the embodiment shown in FIG. 4 of this application, the GNN is applied to a wireless communication network. To improve security and reliability of transmitting each layer iteration result of the GNN over a wireless channel, reference may be made to an information security protection method provided in this application. For details, refer to descriptions in the following embodiment shown in FIG. 4.


2. Local Differential Privacy (LDP) Technology

The LDP technology protects security of data information by adding noise to the data information, to reduce correlation of the data information. Even if an attacker obtains a piece of data information, the attacker cannot infer other data information.


It is assumed that an information security budget is ε, M is a random function that uses a data set as an input, and S is a set of outputs of the random function M, any two adjacent data sets Q and Q′ are used as inputs of the random function M, and probabilities that the outputs are in the set S are respectively Pr(M(Q)∈S) and Pr(M(Q′)∈S). If the following inequality is met:







Pr


(


M

(
Q
)


S

)






e
ε


Pr


(


M

(

Q


)


S

)


+

δ
.






M satisfies (ε,δ)−LDP. ε and δ are positive real numbers, and the information security budget ε is used to control a similarity between the foregoing two probabilities. A smaller value of & indicates better information security protection performance, that is, a lower probability that the attacker determines whether the input is Q or Q′ based on the outputs of the random function M. δ is used to describe a probability of violating the foregoing information security protection requirement. A smaller value of δ indicates a lower probability of allowing violation of the information security protection requirement and better information security protection performance. A manner of adding Gaussian noise to the data information is an important means of implementing (ε,δ)−LDP, and this manner may alternatively be referred to as a Gaussian mechanism.


To improve information security in wireless communication and reduce a risk of information leakage, embodiments of this application proposes that information security protection is implemented by adding Gaussian noise to data information at a transmit end. However, during wireless communication, a channel has channel fading impact on a transmitted signal and noise exists on the channel. To avoid a problem that a signal cannot be correctly received by a receive end due to noise increased by data information security improvement, this application further proposes that power control information of a signal may be determined based on an information security requirement, a maximum transmit power of a transmit end, and channel information, so that the signal sent by the transmit end can be accurately received by the receive end when the security protection requirement of the data information is met. In this way, transmission reliability of the data information can be improved.



FIG. 3 is a schematic flowchart of an information security protection method according to an embodiment of this application.


S301: A first node obtains first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and the first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio (SNR) of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node.


The first node may obtain the maximum transmit power of the second node from the second node. In addition, the first node may perform channel measurement to obtain the channel information between the second node and the first node.


The information security protection requirement may be referred to as an information security budget, and is a requirement of a communication node for an information security degree during information transmission. The first node may determine, by using an information security threshold corresponding to the security protection requirement, whether the information security degree of the received signal meets the information security protection requirement. For example, the first node obtains, through prediction based on the information security threshold that meets the information security protection requirement, the maximum transmit power of the second node, and the channel information, the first power control information that maximizes the SNR of the received signal of the first node when the information security protection requirement is met.


The following describes how the first node obtains the first power control information through prediction.


To improve information security, the second node needs to superimpose security protection information muv on data information wuv to be sent to the first node, where u is an identifier of the second node, v is an identifier of the first node, and the security protection information muv may be white Gaussian noise. However, this is not limited in this application. The first node may determine a power control parameter based on the channel information, so that a transmit power of a to-be-sent signal (where the signal includes data information and security protection information) generated by the second node based on the power control parameter falls within a maximum transmit power range of the second node, and the power control parameter can maximize the SNR of the received signal received by the first node after the signal is transmitted through a channel.


In Implementation 1, the received signal is a signal from the second node.


In an example, pre-equalization processing may be performed on a signal at the second node (that is, a signal transmit end). The pre-equalization processing may alternatively be referred to as precoding, to equalize channel interference on the signal. For example, the to-be-sent signal {tilde over (w)}uv of the second node may be represented as:








w
~

uv

=


?




(






α
uv



P
u



L



w
uv


+




β
uv



P
u





m
uv



)

.









?

indicates text missing or illegible when filed




L is a norm upper limit ∥{tilde over (w)}uv2≤L of the data information. To be specific, after the second node processes the data information and the security protection information based on the power control parameter, a power coefficient of the data information wuv in the generated signal is √{square root over (αuvPu)}, where αuv is a power control parameter of the data information, and Pu is the maximum transmit power of the second node; and a power coefficient of the security protection information muv is βuvPu, where βuv is a power control parameter of the security protection information. In addition, the second node may pre-equalize the signal by using an equalization coefficient e−jϕuv.


In another example, equalization processing may be performed on a signal after the signal is received by the first node (that is, a signal receive end). For example, the to-be-sent signal {tilde over (w)}uv of the second node may be represented as:








w
~

uv

=







α
uv



P
u



L



w
uv


+




β
uv



P
u






m
uv

.







In this implementation, for example, the received signal received by the first node from the second node may be represented as:







R
uv

=



h
uv




w
~

uv


+


n
uv

.






huv represents a weighting coefficient of a channel between the first node and the second node, and nuv represents channel noise.


To enable the first node to obtain wuv through unbiased estimation from Ruv, and the signal obtained by superimposing the security protection information muv meets the information security protection requirement of the first node, the power control parameters αuv and βuv need to meet the following constraint conditions:






{






0
<

?


1

,

0


β
uv



1
-

α
uv












2




"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"






?


P
u











"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv



P
u


+

σ
v
2







2

ln


1.25
δ






ε
v





.








?

indicates text missing or illegible when filed




εv is the information security threshold corresponding to the information security protection requirement of the first node, δ is a probability that the information security protection requirement is not met, and σv2 is a channel noise power.


To maximize the SNR of the received signal Ruv, it may be obtained that the power control parameter αuv that meets the foregoing constraint condition meets the following formula:










α
uv

=

{






ε
v
2

(


σ
v

2



+





"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



)






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2





P
u

(


8

ln

1.25
δ


+

ε
v
2


)






,


ε
v



ε
uv

th

1








1



,


ε
v

>

ε
uv

th

1












Formula



(
1
)














ε
uv

th

1


=



8

ln

1.25
δ





"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



σ
v
2




,




and εuvth1 is a threshold of a value range of εv. As shown in Formula (1), if








ε
v



ε
uv

th

1



,








α
uv

=



ε
v
2

(


σ
v
2

+





"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



)






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2




P
u

(


8

ln




1
.
2


5

δ


+

ε
v
2


)




;






or


if








ε
v

>

ε
uv

th

1



,







α
uv

=
1.




In addition, it may be obtained that the power control parameter βuv that meets the foregoing constraint condition meets the following formula:










β
uv

=

1
-

α
uv






Formula



(
2
)








Therefore, the first node may obtain the power control parameter a, and the power control parameter βuv based on the information security threshold εv, the maximum transmit power Pu of the second node, and the channel information between the first node and the second node (for example, including the channel weighting coefficient huv and/or the channel noise power σv2 that are/is between the first node and the second node and that are/is obtained by the first node by performing channel measurement). The first node may send the first power control information to the second node, where the first power control information indicates the power control parameter αuv and the power control parameter βuv. It may be understood that, the “indication” in this application includes a direct indication, an indirect indication, an explicit indication, and an implicit indication.


In an example, the first power control information may indicate the power control parameter αuv and the power control parameter βuv. Alternatively, the first power control information may indicate one of the two power control parameters, and the second node may determine the other power control parameter based on the one power control parameter and a relationship between αuv and βuv (that is, a sum of the two power control parameters is 1).


In another example, the first power control information may indicate a ratio of αuv to βuv, and the second node may determine two power control parameters based on a relationship between αuv and βuv.


In still another example, the first power control information indicates an identifier of a power control parameter. For example, the first node determines, based on the power control parameter, an identifier corresponding to the power control parameter in a predefined power control parameter set. For example, the predefined power control parameter set includes a plurality of power control parameters and an identifier of each power control parameter. The first node sends, to the second node, the first power control information that indicates the identifier corresponding to the power control parameter, and the second node determines, based on the identifier of the power control parameter indicated by the first power control information, the power control parameter corresponding to the identifier in the predefined power control parameter set. The first power control information may indicate an identifier corresponding to one power control parameter in αuv and βuv, and the second node determines the other power control parameter based on the relationship between αuv and βuv. Alternatively, the first power control information may indicate identifiers of the two power control parameters, and the second node determines the two power control parameters based on the identifiers.


In Implementation 2, there are a plurality of second nodes, and a received signal of the first node is a superimposed signal of signals from the plurality of second nodes. The first node obtains power control information corresponding to each second node based on the information security threshold, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node.


In other words, the plurality of second nodes may send the signals to the first node, and the signals of the plurality of second nodes are superimposed on the channel, and the received signal of the first node is a superimposed signal of the signals from the plurality of second nodes.


The plurality of second nodes may perform pre-equalization processing on a signal, so that the first node may restore data information based on the superimposed signal. A to-be-sent signal of each second node may be represented as {tilde over (w)}uv obtained through the pre-equalization processing. For example, there are N second nodes, identifiers of the N second nodes are respectively 1 to N, and N is an integer greater than 1. A to-be-sent signal of the second node (denoted as a second node 1) whose identifier is 1 may be represented as:







?

-




?


L


?


+



?





?

.









?

indicates text missing or illegible when filed




P1 is a maximum transmit power of the second node 1, w1v represents data information of the second node 1, m1v represents security protection information of the second node 1, α1v represents a power control parameter of the data information of the second node 1, and βuv is a power control parameter of the data information of the second node 1. For a to-be-sent signal of a second node with another identifier, refer to the foregoing representation manner of the to-be-sent signal of the second node 1. For brevity, details are not described herein again.


The plurality of second nodes send the to-be-sent signals of the plurality of second nodes to the first node, and the to-be-sent signals of the plurality of second nodes are superimposed on a channel, so that a received signal received by the first node is Rv, that is, a superimposed signal of the signals from the plurality of second nodes, which may be represented as follows:







R
v

=



?


(



h
uv


?


+

n
uv


)


=



?




"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L


?


+


?




"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"






β
uv



P
u




?


+


n
v

.










?

indicates text missing or illegible when filed










n
v

=




u


N

(
v
)




n
uv



,




and N(v) is a set of identifiers of the second nodes. For example, there are N second nodes, and a set of identifiers of the second nodes includes N identifiers corresponding to the N second nodes. For example, if the identifiers of the N second nodes are respectively 1 to N, the received signal may be represented as:








R
v

=



?


(



h
uv


?


+

n
uv


)


=



(



h

1

v



?


+

n

1

v



)

+

(



h

2

v



?


+

n

2

v



)

+

+

(



h
Nv


?


+

n
Nv


)


=



?




"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L



w
uv


+


?




"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"






β
uv



P
u





m
uv


+

n
v





,





where






?

indicates text missing or illegible when filed




h1v is channel information between the second node whose identifier is 1 and the first node, h2v is channel information between the second node whose identifier is 2 and the first node, and hNv is channel information between the second node whose identifier is N and the first node.


The SNR of the received signal Rv may be represented as follows:







ρ
v

=






u


N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



α
uv



P
u








u


N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv



P
u



+

σ
v
2



.





To enable the first node to obtain wv through unbiased estimation from Rv, the data information







w
v

=




u


N

(
v
)




w
uv






or average value information







w
v

=

E



(




u


N

(
v
)




w

uv




)






of the data information of the plurality of second nodes is superimposed, and Rv meets the information security protection requirement of the first node, and αuv and βuv need to meet the following constraint condition:






{






0
<

α
uv


1

,

0
<

β
uv



1
-

α
uv













"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L



=
^


C
v










2


C
v


L







u



N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv



P
u



+

σ
2







2

ln


1.25
δ






ε
v





,
where













"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L



=
^


C
v





represents that









"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L





is defined as Cv, or in other words, represents that









"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"







α
uv



P
u



L





is represented by Cv, and Cv in an expression including Cv may be replaced with









"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"








α
uv



P
u



L

.





εv is an information security threshold corresponding to the information security protection requirement of the first node, and σv2 is a channel noise power.


To maximize the SNR of the received signal Ruv, it may be obtained that the power control parameter αuv that meets the foregoing constraint condition meets the following formula:










α
uv

=

{







ε
v
2

(


σ
v
2

+







u


N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



)






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2




P
u

(


8

ln

1.25
δ


+




"\[LeftBracketingBar]"

N


"\[RightBracketingBar]"




ε
v
2



)



,





ε
v



ε
uv

th

2











min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



,





ε
v

>

ε
uv

th

2











Formula



(
3
)








N is a quantity of second nodes in a set N(v), εuvth2 is another threshold in a value range of εv, and εuvth2 may be expressed as follows:







ε
uv

th

2


=




8

ln

1.25
δ


min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u










u


N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u


+

σ
v
2

-




"\[LeftBracketingBar]"

N


"\[RightBracketingBar]"



min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u





.





In addition, it may be obtained that the power control parameter βuv that meets the foregoing constraint condition meets the following formula:










β
uv

=

{





1
-

α
uv


,





ε
v



ε
uv

th

2









β
uv


,





ε
uv

th

2


<

ε
v



ε
uv

th

1








0
,





ε
v

>

ε
uv

th

1











Formula



(
4
)














ε
uv

th

1


=



8

ln

1.25
δ


min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



σ
v
2




,




and βuv′ is obtained by solving a problem by using a quasi-water-filling method, and the problem solved by using the quasi-water-filling method may be represented as:






{






1
-



min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u





=



β
uv
U







0


β
uv



β
uv
U











u


N

(
v
)








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv



P
u



=



8

ln

1.25
δ


min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



ε
v
2


-

σ
v
2






,



where


1

-



min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u





=



β
uv
U







represents that






1
-



min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







is defined as βuvU, or in other words,






1
-



min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







is represented by βuvU, and βuvU in an expression including βuvU may be replaced with






1
-




min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



.





For the foregoing to-be-solved problem, the first node may perform a step of solving by using the quasi-water injection method, to obtain a value βuv′ of βuv corresponding to εuvth2v≤εuvth1.


1. Initialize





D
=



8

ln

1.25
δ


min

u


N

(
v
)







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u



ε
v
2


-

σ
v
2






and initialize a set 1=N(v)


2. When D>0, calculate a water injection line








D
_

=

D

N
I



,




where NI represents a quantity of elements in a set I, and determine a water injection policy:


If |huv|2βuvUD, ∀u∈I, set








β
uv

=


D
_






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



P
u




,



u

I






and update D=0, where ∀u∈I represents that any u belongs to the set I;

    • otherwise, set








β
uv

=


β
uv
U



𝕀






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_





,



u

I


,




where



custom-character
A is an indication function, indicating that if A is true, custom-characterA=1; or if A is false, custom-characterA=0.






𝕀






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_






in the foregoing formula represents that:








when






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_


,









"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_



=
1

;


or


when






"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u


>

D
_



,









"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_



=
0.





In addition, update:







D
=

D
-




u

I







"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u








"\[LeftBracketingBar]"


h
uv



"\[RightBracketingBar]"


2



β
uv
U



P
u




D
_







,




and

    • remove u that meets |huv|2βuvUPuD from the set I.


The first node may obtain the channel information huv between the first node and each second node through channel measurement. For example, there are N second nodes, and identifiers of the N second nodes are respectively 1 to N. The first node may measure a channel between the first node and a second node whose identifier is u=1 to obtain the channel information h1v. The first node may measure channel information h2v between the first node and a second node whose identifier is u=2, and measure channel information between the first node and another second node, for example, the first node may measure channel information hNv between the first node and a second node whose identifier is u=N. It should be noted that, a sequence in which the first node measures the channel information between the first node and the plurality of second nodes is not limited in embodiments of this application.


The first node may separately obtain, based on a value interval to which a value of the information security threshold εv belongs, the maximum transmit power Pu of each second node, and the channel information between the first node and each second node (for example, including a channel weighting coefficient huv and a channel noise power σv2), a power control parameter αuv and a power control parameter βuv that correspond to each second node. The first node sends the power control information to each second node, to notify each second node of the power control parameter corresponding to the second node.


S302: The first node sends the first power control information to the second node, where the first power control information is used by the second node to generate a first signal.


Correspondingly, the second node receives the first power control information from the first node. The second node determines, based on the first power control information, a power control parameter for generating the first signal, where the first signal is a signal sent by the second node to the first node.


The following provides an example of an indication manner in which the first power control information indicates the power control parameter αuv and the power control parameter βuv. It should be understood that, the indication manner of the first power control information is not limited in this application. It may be understood that, the “indication” in this application includes a direct indication, an indirect indication, an explicit indication, and an implicit indication.


In an example, the first power control information may indicate the power control parameter αuv and the power control parameter βuv. Alternatively, the first power control information may indicate one of the two power control parameters, and the second node may determine the other power control parameter based on the one power control parameter and a relationship between αuv and βuv (that is, a sum of the two power control parameters is 1).


In another example, the first power control information may indicate a ratio of αuv to βuv, and the second node may determine the two power control parameters based on a relationship between αuv and βuv.


In still another example, the first power control information indicates an identifier of a power control parameter. For example, the first node determines, based on the power control parameter, the identifier corresponding to the power control parameter in a predefined power control parameter set, and notifies the second node by using the first power control information. The second node determines, based on the identifier of the power control parameter indicated by the first power control information, the power control parameter corresponding to the identifier in the predefined power control parameter set. The first power control information may indicate an identifier corresponding to one power control parameter in αuv and βuv, and the second node determines the other power control parameter based on the relationship between αuv and βuv. Alternatively, the first power control information may indicate identifiers of the two power control parameters, and the second node determines the two power control parameters based on the identifiers.


S303: The second node sends the first signal to the first node, where the first signal includes data information and first security protection information, and the first security protection information is used to protect information security of the data information.


After determining the power control parameters αuv and βuv based on the first power control information, the second node may generate the first signal {tilde over (w)}uv, where the first signal includes the data information wuv and the security protection information muv. The first signal {tilde over (w)}uv may be represented as follows:








w


uv

=






α
uv



P
u



L



w
uv


+




β
uv



P
u






m
uv

.







Alternatively, the second node may perform pre-equalization processing on the signal, and the first signal {tilde over (w)}uv may be represented as follows:








w


uv

=



e


-
j



ϕ
uv



(






α
uv



P
u



L



w
uv


+




β
uv



P
u





m
uv



)

.





An equalization coefficient e−jϕin may be indicated by the first node to the second node. Alternatively, the equalization coefficient e−jϕin may be determined after the second node performs channel estimation. For example, if channels in different transmission directions between the first node and the second node are reciprocal, the second node may obtain the equalization coefficient after performing channel estimation. However, this application is not limited thereto.


Correspondingly, the first node receives the first signal from the second node.


In an implementation, the first node receives a first signal from the second node, the first node receives the first signal to obtain a received signal Ruv, and the first node may obtain wuv in the received signal Ruv through decoding.


In another implementation, there are a plurality of second nodes. The first node receives a superimposed signal of first signals from the plurality of second nodes, to obtain a received signal Rv, and obtains wv in the received signal through decoding, where wv is superimposed data information







w
v

=




u


N

(
v
)




w

u

v







or wv is average value information







w
v

=

E



(




u


N

(
v
)




w

u

v



)






of data information of the plurality of second nodes.


According to the foregoing solution, security of the data information transmitted over a wireless channel can be improved, a probability of information leakage can be reduced, and the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving the transmission reliability of the data information.


The foregoing describes the graph neural network GNN. In this application, the GNN may be applied to a wireless communication network. By using the GNN, each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented.


Each of the plurality of communication nodes that participate in GNN inference may be used as an adjacent node (denoted as a node u) of another node (denoted as a node v), the intermediate result qu(k-1) obtained at the previous layer (for example, a (k−1)th layer) and the feature euv of the edge of the node and the node v are input into the kth layer of the first machine learning model, to obtain the node feature information ƒt(k)({qu(k-1),euv} output by the kth layer, and send the node feature information to the node v. In addition, each node further serves as the node v to receive the node feature information ƒt(k){qu(k-1),euv} sent by each adjacent node of the node v, to obtain the intermediate result corresponding to the kth layer of the model, that is, the aggregation feature information







q
v

(
k
)


=




u


N

(
v
)





f
t

(
k
)


(

{


q
u

(

k
-
1

)


,

e

u

v



}

)






of the adjacent node. Then, the node v inputs the intermediate results qu(k-1) and qv(k) obtained at the (k−1)th layer into the kth layer of the second machine learning model, to obtain the output result ov(k)o(k)(qv(k-1),qv(k)) of the kth layer. It can be learned that the node feature information obtained by the node u through each layer iteration needs to be transmitted over a wireless channel, and two consecutive communications are highly correlated. The information security protection method shown in FIG. 3 may be used to improve information transmission security and reliability.



FIG. 4 is a schematic flowchart of a communication method 400 according to an embodiment of this application. It should be noted that, for a part that is in the embodiment shown in FIG. 4 and that is the same as that in the embodiment shown in FIG. 3, refer to the descriptions in FIG. 3. For brevity, details are not described herein again. In the embodiment shown in FIG. 4, a node u (that is, an example of a second node) is an adjacent node of a node v (that is, an example of a first node). The node v may have one or more adjacent nodes, that is, one or more nodes u. The communication method includes but is not limited to the following steps.


S401: The node u broadcasts a maximum transmit power Pu.


In an initialization process, each node broadcasts a maximum transmit power, and receives a maximum transmit power broadcast by an adjacent node. The node v receives the maximum transmit power Pu of each node u, where u∈N(v), and N(v) is a set of identifiers of adjacent nodes of the node. After obtaining the maximum transmit power of the adjacent node in the initialization process, each node performs inference at each layer of a machine learning model. The following S402 to S409 show an inference process at a kth layer.


S402: The node v obtains channel information from each node u to the node v.


For inference at the kth layer, the node v may obtain channel information huv(k) between the node v and each node u through channel measurement. For example, there are N nodes u, and identifiers of the N nodes u are respectively 1 to N. The node y may measure a channel between the node v and a node u whose identifier is u=1, to obtain channel information h1v(k) corresponding to inference at the kth layer. The node v may measure a channel between the node v and a node u whose identifier is u=2, to obtain channel information h2v(k) corresponding to inference at the kth layer, and measures channel information between the node v and another node u. For example, the node v may measure a channel between the node v and a node u whose identifier is u=N, to obtain channel information hNv(k) corresponding to inference at the kth layer. It should be noted that, a sequence in which the node v measures the channel information between the node v and the plurality of nodes u is not limited in embodiments of this application. The channel information corresponding to inference at the kth layer of the node v and each node u may be represented as








h
uv

(
k
)


=




"\[LeftBracketingBar]"


h
uv

(
k
)




"\[RightBracketingBar]"




e

j


ϕ
uv

(
k
)






,




where |huv(k)| represents an amplitude of the channel information huv(k), and ϕuv(k) represents a phase of the channel information huv(k).


S403: The node v obtains power control information corresponding to the node u based on an information security threshold, a maximum transmit power of the node u, and channel information between the node u and the node v.


The power control information corresponding to the node u is used by the node u to generate a first signal.


In an implementation, there is one or more nodes u, and the node v separately receives a first signal from the node u in S407. In this case, the node v may obtain the power control information corresponding to the node u based on the information security threshold εv, the maximum transmit power Pu of one node, and the channel information between the node u and the node v.


The power control information may be used to indicate a power control parameter αuv(k) and/or a power control parameter Buv(k), where αuv(k) is a power control parameter of the data information of the node u, and βuv(k) is a power control parameter of the security protection information of the node u. For a manner in which the node v obtains the power control parameter αuv(k) and/or the power control parameter βuv(k) that correspond to the node u, refer to Implementation 1 in the embodiment shown in FIG. 3. For example, the node v determines, based on Pu, the information security threshold εv, and huv(k), the power control parameter αuv(k) according to Formula (1) and determines the power control parameter βuv(k) according to Formula (2). Therefore, the node v may determine power control information that corresponds to the node u and that indicates the power control parameters αuv(k) and/or βuv(k) The node y may determine, in this manner, the power control parameters αuv(k) and/or βuv(k) that correspond to each node u and corresponding power control information.


In another implementation, there are a plurality of nodes u, and the node v receives a superimposed signal of first signals from the plurality of nodes u in S407. In this case, the node v obtains, based on an information security threshold εv, a maximum transmit power of the plurality of nodes u, and channel information between the plurality of nodes u and the node v, power control information corresponding to each node u.


For a manner in which the node v obtains the power control parameters αuv(k) and αuv(k) corresponding to the node u, refer to Implementation 2 in the embodiment shown in FIG. 3. For example, the node v determines, based on εv, Pu of one node u, and channel information huv(k) between the plurality of u and the node v, a power control parameter αuv(k) corresponding to the node u according to Formula (3) and a power control parameter βuv(k) according to Formula (4). Therefore, the node v may determine αuv(k) and βuv(k) that indicate the power control parameter and corresponding power control information.


S404: The node v sends the power control information to each node u.


The node y notifies, by using the power control information, the power control parameter corresponding to each node u. For a specific implementation in which the power control information indicates the power control parameter, refer to the foregoing descriptions. For brevity, details are not described herein again.


Optionally, the node y may send first information to each node u, and the first information is used to request node feature information output by a kth layer of a first machine learning model. In this way, after receiving the first information, each node u sends, to the node v, the node feature information that is output by the kth layer of the first machine learning model and that is obtained by each node u.


The node y may separately send the power control information and the first information to each node. Alternatively, the first information may include the power control information. Alternatively, the power control information may be used as the first information to request the node feature information output by the kth layer of the first machine learning model. After receiving the power control information, the node u sends corresponding node feature information to the node v.


S405: The node u inputs second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model.


The second feature information is denoted as qu(k-1). If k=1, the second feature information qu(k-1) is node feature information xu of the node u, that is, qu(0)=xu, and the node feature information output by the kth layer of the first machine learning model is ƒt(1)({xu,euv}).


If k is an integer greater than 1, the second feature information qu(k-1) is adjacent node feature information that corresponds to a (k−1)th layer of the first machine learning model and that is obtained by the node u. For the adjacent node feature information qu(k-1) that corresponds to the (k−1)th layer of the first machine learning model, refer to the following implementation of qv(k) determined by the node v in S408.


For example, the kth layer of the first machine learning model may be represented as a function ƒt(k), and the second feature information qu(k-1) is input into the kth layer of the first machine learning model, to obtain the node feature information ƒt(k){qu(k-1),euv} output by the kth layer of the first machine learning model, where euv is feature information of an edge of the node u and the node v.


S406: The node u generates the first signal based on the power control information, where the first signal includes the node feature information output by the kth layer of the first machine learning model and security protection information.


The node u may need to superimpose the security protection information muv on the node feature information ƒt(k)({qu(k-1),euv}. The security protection information muv may be white Gaussian noise. However, this is not limited in this application. The node u may determine the power control parameters αuv(k) and βuv(k) based on the power control information, to generate the first signal based on the power control parameters αuv(k) and βuv(k), the node feature information ƒt(k)({qu(k-1),euv}, and the security protection information muv.


In an example, the first signal may be represented as:








w
~

uv

(
k
)


=


e


-
j



ϕ
uv



(





α
uv



P
u



L





f
t

(
k
)


(


{


q
u

(

k
-
1

)


,

e

u

v



}

+




β
uv



P
u





m
uv



)

.







L is an upper limit of a norm ∥{tilde over (w)}uv(k)2 of the data information {tilde over (w)}uv(k), that is, ∥{tilde over (w)}uv(k)2≤L, and e−jϕuv is an equalization coefficient. The equalization coefficient may be sent by the node v to the node u. For example, the first information may include the equalization coefficient, or when channels are reciprocal, the node u may obtain the equalization coefficient after performing channel estimation. This is not limited in this application.


In another example, if the node v receives the first signal from each node u in S407, the node u may not perform pre-equalization processing, and the first signal may be represented as:








w
~

uv

(
k
)


=





α
uv



P
u



L




f
t

(
k
)


(


{


q
u

(

k
-
1

)


,

e

u

v



}

+




β
uv



P
u






m
uv

.









According to the foregoing solution, the node u performs power control on the to-be-sent node feature information and the security protection information based on the power control information, so that security of the data information transmitted over a wireless channel can be improved, a probability of information leakage can be reduced, and a signal-to-noise ratio of a received signal can be maximized when the security protection requirement of data information is met, improving the transmission reliability of the data information.


S407: Each node u sends the first signal to the node v.


The node v receives the first signal from each node u.


In an implementation, there are a plurality of nodes u, and the node v receives a superimposed signal of first signals from the plurality of nodes u, to obtain a received signal Rv(k).


For example, the plurality of nodes u simultaneously send respective first signals, so that the first signals of the plurality of nodes u are superimposed on a channel, and the node v receives and obtains the received signal Rv(k). For example, the received signal Rv(k) may be represented as:







R
v

(
k
)


=





u


N

(
v
)




(



h
uv




w
~

uv

(
k
)



+

n
uv

(
k
)



)


=





u


N

(
v
)







"\[LeftBracketingBar]"


h
uv

(
k
)




"\[RightBracketingBar]"







α
uv

(
k
)




P
u



L




f
t

(
k
)


(

{


q
u

(

k
-
1

)


,

e

u

v



}

)



+




u


N

(
v
)







"\[LeftBracketingBar]"


h
uv

(
k
)




"\[RightBracketingBar]"






β
uv

(
k
)




P
u





m
uv

(
k
)




+


n
v

(
k
)


.







nv(k) includes channel noise of a channel between the plurality of nodes u and the node v,








n
v

(
k
)


=




u


N

(
v
)




n

u

v


(
k
)




,




and nuv(k) is channel noise of a channel between the node u and the node v.


For example, there are N second nodes, and a set of identifiers of the second nodes includes N identifiers corresponding to the N second nodes. For example, if the identifiers of the N second nodes are respectively 1 to N, the first node receives a superimposed signal of first signals of the N second nodes, and an obtained received signal Rv(k) may be represented as:







R
v

(
k
)


=





u


N

(
v
)




(



h
uv

(
k
)





w
~

uv

(
k
)



+

n
uv

(
k
)



)


=



(



h

1

v


(
k
)





w
~


1

v


(
k
)



+

n

1

v


(
k
)



)

+

(



h

2

v


(
k
)





w
~


2

v


(
k
)



+

n

2

v


(
k
)



)

+

+

(



h
Nv

(
k
)





w
~

Nv

(
k
)



+

n
Nv

(
k
)



)


=





u


N

(
v
)







"\[LeftBracketingBar]"


h
uv

(
k
)




"\[RightBracketingBar]"







α
uv

(
k
)




P
u



L




f
t

(
k
)


(

{


q
u

(

k
-
1

)


,

e
uv


}

)



+




u


N

(
v
)







"\[LeftBracketingBar]"


h
uv

(
k
)




"\[RightBracketingBar]"






β
uv

(
k
)




P
u





m
uv

(
k
)




+


n
v

(
k
)


.








h1v(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is 1 and the first node, h2v(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is 2 and the first node, and hNv(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is N and the first node.


In another implementation, the node v separately receives a first signal of each node u, to obtain a received signal Ruv corresponding to each node u. For example, the received signal Ruv may be represented as:








R
uv

(
k
)


=



h
uv

(
k
)





w
~

uv

(
k
)



+

n
uv

(
k
)




,




where,


nuv(k) is channel noise of a channel between the node u and the node v.


S408: The node v estimates, based on the received signal obtained by receiving the first signal, adjacent node feature information corresponding to the kth layer of the first machine learning model.


For example, the received signal is a superimposed signal Rv received by the first node after the first signals of the plurality of nodes u are superimposed on the channel, or if the plurality of nodes u are included, the node v separately receives first information of each node u, and after obtaining a received signal Ruv corresponding to each node u, the node v performs superimposition processing on the received signal Ruv corresponding to the plurality of nodes u, to obtain the superimposed signal Rv, that is,







R
v

(
k
)


=




u


N

(
v
)





(



h
uv

(
k
)





w
~

uv

(
k
)



+

n
uv

(
k
)



)

.






The node v obtains, through estimation based on the superimposed signal Rv, the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model, where qv(k) is an average value of a superimposed signal of node feature information ƒt(k)({qu(k-1),euv} that is output by the kth layer of the first machine learning model and that is from each node u, that is:








q
v

(
k
)


=

E
[




u


N

(
v
)





f
t

(
k
)


(

{


q
u

(

k
-
1

)


,

e
uv


}

)


]


,




where

    • E[x] represents an average value of x.


For another example, the node v separately receives a first signal of each node, to obtain a received signal Ruv corresponding to each node u. The node v may obtain, through estimation based on each received signal Ruv, node feature information that ƒt(k)({qu(k-1),euv} that is output by the kth layer of the first machine learning model on a corresponding node u. The node v obtains an average value qv(k) of a superimposed signal of all node feature information ƒt(k)({qu(k-1),euv}. For details, refer to the foregoing expression.


S409: The node v inputs the first feature information and the adjacent node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model.


For example, the kth layer of the second machine learning model may be represented as a function ƒo(k), and the node v inputs the first feature information qv(k-1) and the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model into the kth layer of the second machine learning model, to obtain the aggregation node feature information ov(k) output by the kth layer of the second machine learning model, that is:







o
v

(
k
)


=



f
o

(
k
)


(


q
v

(

k
-
1

)


,

q
v

(
k
)



)

.







    • If k=1, qv(k-1) is the node feature information xv of the node v, that is, qv(0)=xv, and the aggregation node feature information is ov(k)o(k)(xv,qv(k)).





If k is an integer greater than 1, qu(k-1) is aggregation node feature information that is output by a (k−1)th layer of the second machine learning model and that is obtained by the node v.


Each of a plurality of communication nodes that participate in GNN inference is used as the node u in inference at the kth layer, to infer ƒt(k)({qu(k-1),euv}, the first signal is generated based on the power control information from each adjacent node (that is, the node v), and the first signal is sent to a corresponding adjacent node. In addition, each communication node further serves as the node v to obtain the power control information of each adjacent node (that is, the node) through prediction and notify each adjacent node, and then receives the first signal that is obtained through processing on the power control information from each adjacent node and that includes the security protection information, to obtain the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model, input the adjacent node feature information into the kth layer of the second machine learning model, and obtain the output result of the kth layer of the GNN through inference. Each node then performs inference at a (k+1)th layer of the GNN. For details, refer to the procedures of S402 to S409. For brevity, details are not described herein again. Each communication node may complete an inference process through inference at K layers of the GNN, and each communication node obtains a GNN inference result including an output result of each of the K layers. K is a positive integer, and may be determined based on a specific implementation. This is not limited in this application.


It should be noted that, each node may exchange, based on an information security protection requirement, power control information at a GNN inference layer at which information security protection needs to be performed, and generate, based on the power control information, a signal including security protection information. At a GNN inference layer at which information security protection does not need to be performed, the power control information may not need to be exchanged, and a to-be-sent signal including node feature information may not include the security protection information. This may be implemented based on a specific implementation requirement. This is not limited in this application.


The GNN is applied to a wireless communication network, so that each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented. In a GNN inference process, information security protection is performed and transmit power control is performed by adding noise at a transmit end, so that information security and information transmission reliability in the inference process can be improved.


To implement GNN inference in the wireless network, and obtain expected inference performance, the first machine learning model and the second machine learning model need to match a wireless network environment in a training process. A data processing node in a network may train data to perform model training. The data processing node may be a core network node, a server, an OAM, or the like. However, this application is not limited thereto. The training data may be obtained by collecting data of a communication node in a wireless network. The training data includes node feature information (that is, node data), association data between adjacent nodes (that is, edge data, for example, channel information between adjacent nodes), channel information used for security protection, a maximum transmit power of a node, and security requirement data. The communication node may include but is not limited to a terminal and/or a wireless access network node.


After the training data is collected, the data processing node may perform data preprocessing, and perform a training process of the GNN model (including the first machine learning model and the second machine learning model) based on the preprocessed training data. In this process, each model training includes iterative forward propagation and backward gradient updates. In a forward propagation process, a wireless channel environment, information security protection, and power control need to be simulated. Specifically, for the forward propagation process, refer to the inference process in the embodiment shown in FIG. 4. After each forward propagation, a gradient is updated, a model parameter is adjusted, and then next model training is performed until a GNN model parameter converges to a value less than a preset threshold, to obtain a trained GNN model, that is, the first machine learning model and the second machine learning model. In this way, the GNN model can be applied to a wireless network, and the expected inference performance is obtained.


The foregoing describes in detail the method provided in this application with reference to the accompanying drawings. The following accompanying drawings describe a communication apparatus and a communication device provided this application. To implement functions in the methods provided in this application, network elements may include a hardware structure and/or a software module, and implement the foregoing functions in a form of the hardware structure, the software module, or a combination of the hardware structure and the software module. Whether a function in the foregoing functions is performed by using the hardware structure, the software module, or the combination of the hardware structure and the software module depends on particular applications and design constraints of the technical solutions.



FIG. 5 is a block diagram of a communication apparatus according to this application. As shown in FIG. 5, the communication apparatus 500 may include a transceiver unit 520.


In a possible design, the communication apparatus 500 may correspond to the first node in the foregoing method. When the communication apparatus 500 corresponds to the first node, the communication apparatus 500 may be a communication device, or the communication apparatus 500 may be a chip configured in (or used in) a communication device, or another apparatus, module, circuit, unit, or the like that can implement a method of the first node.


It should be understood that, the communication apparatus 500 may include units configured to perform the method performed by the first node in the foregoing method embodiments. In addition, the units in the communication apparatus 500 and the foregoing other operations and/or functions are separately used to implement corresponding procedures in the foregoing method embodiments.


Optionally, the communication apparatus 500 may further include a processing unit 510. The processing unit 510 may be configured to process instructions or data, to implement a corresponding operation.


It should be further understood that, when the communication apparatus 500 is a chip configured in (or used in) the first node, the transceiver unit 520 in the communication apparatus 500 may be an input/output interface or a circuit of the chip, and the processing unit 510 in the communication apparatus 500 may be a processor in the chip.


Optionally, the communication apparatus 500 may further include a storage unit 530. The storage unit 530 may be configured to store instructions or data. The processing unit 510 may execute the instructions or the data stored in the storage unit, so that the communication apparatus is enabled to implement a corresponding operation.


It should be further understood that, a specific process in which each unit performs the foregoing corresponding steps has been described in detail in the foregoing methods. For brevity, details are not described herein again.


In another possible design, the communication apparatus 500 may correspond to the second node in the foregoing method. When the communication apparatus 500 corresponds to the second node, the communication apparatus 500 may be a communication device, or the communication apparatus 500 may be a chip configured in (or used in) a communication device, or another apparatus, module, circuit, unit, or the like that can implement a method of the second node.


It should be understood that, the communication apparatus 500 may include units configured to perform the method performed by the second node in the foregoing method embodiments. In addition, the units in the communication apparatus 500 and the foregoing other operations and/or functions are separately used to implement corresponding procedures in the foregoing method embodiments.


Optionally, the communication apparatus 500 may further include a processing unit 510. The processing unit 510 may be configured to process instructions or data, to implement a corresponding operation.


It should be further understood that, when the communication apparatus 500 is a chip configured in (or used in) the second node, the transceiver unit 520 in the communication apparatus 500 may be an input/output interface or a circuit of the chip, and the processing unit 510 in the communication apparatus 500 may be a processor in the chip.


Optionally, the communication apparatus 500 may further include a storage unit 530. The storage unit 530 may be configured to store instructions or data. The processing unit 510 may execute the instructions or the data stored in the storage unit, so that the communication apparatus is enabled to implement a corresponding operation.


It should be understood that, the transceiver unit 520 in the communication apparatus 500 may be implemented by using a communication interface (for example, a transceiver, a transceiver circuit, an input/output interface, a pin, or the like), for example, may correspond to a transceiver 620 in a communication apparatus 600 shown in FIG. 6. The processing unit 510 in the communication apparatus 500 may be implemented by using at least one processor, for example, may correspond to a processor 610 in the communication apparatus 600 shown in FIG. 6. The processing unit 510 in the communication apparatus 500 may be further implemented by using at least one logic circuit. The storage unit 530 in the communication apparatus 500 may correspond to a memory 630 in the communication apparatus 600 shown in FIG. 6.



FIG. 6 is a diagram of a structure of a communication apparatus 600 according to an embodiment of this application. As shown in FIG. 6, the communication apparatus 600 includes one or more processors 610. The processor 610 may be configured to perform internal processing of the apparatus, to implement a specific control processing function. Optionally, the processor 610 includes instructions 611. Optionally, the processor 610 may store data.


Optionally, the communication apparatus 600 includes one or more memories 630, configured to store instructions 631. Optionally, the memory 630 may further store data. The processor and the memory may be separately disposed, or may be integrated together.


Optionally, the communication apparatus 600 may further include a transceiver 620 and/or an antenna 640. The transceiver 620 may be configured to send information to another apparatus or receive information from another apparatus. The transceiver 620 may be referred to as a transceiver, a transceiver circuit, an input/output interface, or the like, and is configured to implement a transceiver function of the communication apparatus 600 by using the antenna 640. Optionally, the transceiver 620 includes a transmitter and a receiver.


The communication apparatus 600 may be used in the communication device in the system shown in FIG. 1. The communication apparatus 600 may correspond to the first node or the second node. The communication apparatus 600 may be a communication device. Alternatively, the communication apparatus 600 is configured in a communication device. For example, the communication apparatus 600 may be a chip or a module configured in the communication device. The communication apparatus 600 may perform operations of the first node or the second node in the foregoing method embodiments.


In this application, the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or another programmable logic device, a discrete gate or a transistor logic device, or a discrete hardware component, and may implement or perform the methods, steps, and logical block diagrams in this application. The general-purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods with reference to this application may be directly performed and completed by a hardware processor, or may be performed and completed by a combination of hardware and software modules in the processor.


In this application, the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), or may be a volatile memory, such as a random access memory (RAM). The memory is any other medium that can carry or store expected program code in a form of instructions or a data structure and that can be accessed by a computer, but is not limited thereto. The memory in this application may alternatively be a circuit or any other apparatus that can implement a storage function, and is configured to store program instructions and/or data.


This application further provides a processing apparatus, including a processor and a (communication) interface. The processor is configured to perform the method provided in the foregoing method embodiments.


It should be understood that, the processing apparatus may be one or more chips. For example, the processing apparatus may be a field programmable gate array (FPGA), an application-specific integrated circuit (ASIC), a system on chip (SoC), a central processing unit (CPU), a network processor (NP), a digital signal processing circuit (e.g. a digital signal processor (DSP)), a microcontroller (MCU), a programmable controller (PLD), or another integrated chip.


This application further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program or instructions. When the computer program or the instructions are run, the method performed by the second node or the first node device in the foregoing method embodiments is implemented. In this way, the functions described in the foregoing embodiments may be implemented in a form of a software functional unit and sold or used as an independent product. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or some of the technical solutions may be implemented in a form of a software product. The computer software product is stored in a storage medium, and includes several instructions for instructing a computer device (which may be a personal computer, a server, a second node, or the like) to perform all or some of the steps of the methods described in embodiments of this application. The storage medium includes: any medium that can store program code, such as a USB flash drive, a removable hard disk drive, a read-only memory (ROM), a random access memory RAM, a magnetic disk, or an optical disc.


According to the method provided in this application, this application further provides a computer program product. The computer program product includes computer program code. When the computer program code is executed by one or more processors, an apparatus including the processor is enabled to perform the methods shown in FIG. 3 and FIG. 4.


All or some of the technical solutions provided in this application may be implemented by using software, hardware, firmware, or any combination thereof. When software is used to implement embodiments, all or some of embodiments may be implemented in a form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedure or functions according to this application are all or partially generated. The foregoing computer instructions may be stored in a computer-readable storage medium, or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. The computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk drive, or a magnetic tape), an optical medium (for example, a digital video disc (DVD)), a semiconductor medium, or the like.


According to the method provided in this application, this application further provides a system, including the foregoing one or more first node devices. The system may further include the foregoing plurality of second nodes.


In the several embodiments provided in this application, it should be understood that, the disclosed system, apparatus, and method may be implemented in another manner. For example, the described apparatus is merely an example. For example, division into the units is merely logical function division and may be other division during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented by using some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.


The foregoing descriptions are merely specific implementations of this application, but are not intended to limit the protection scope of this application. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in this application shall fall within the protection scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims
  • 1. A method, wherein the method is applied to a first node and the method comprises: obtaining first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and the first node, wherein the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal comprises a signal from the second node;sending the first power control information to the second node; andreceiving a first signal from the second node, wherein the first signal is associated with the first power control information, the first signal comprises data information and security protection information, and the security protection information is used to protect information security of the data information.
  • 2. The method according to claim 1, wherein the first power control information comprises power control information corresponding to the data information and power control information corresponding to the security protection information.
  • 3. The method according to claim 1, wherein there are a plurality of second nodes, and wherein the obtaining of the first power control information corresponding to the second node based on the information security budget, the maximum transmit power of the second node, and the channel information between the second node and the first node comprises: obtaining power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; and wherein the receiving of the first signal from the second node comprises:receiving a superimposed signal of first signals from the plurality of second nodes.
  • 4. The method according to claim 1, further comprising: sending first information to the second node, wherein the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information comprises the node feature information from the second node; anddetermining, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.
  • 5. The method according to claim 4, wherein the first information comprises the first power control information.
  • 6. The method according to claim 4, further comprising: inputting first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, wherein k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.
  • 7. The method according to claim 4, further comprising: inputting the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model;receiving second power control information from the second node; andsending a second signal to the second node, wherein the second signal comprises the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.
  • 8. A method, wherein the method is applied to a second node and the method comprises: receiving first power control information from a first node; andsending a first signal to the first node, wherein the first signal is associated with the first power control information, the first signal comprises data information and security protection information, and the security protection information is used to protect information security of the data information.
  • 9. The method according to claim 8, wherein the first power control information comprises power control information corresponding to the data information and power control information corresponding to the security protection information.
  • 10. The method according to claim 8, further comprising: receiving first information from the first node, wherein the first information is used to request node feature information output by a kth layer of a first machine learning model, the data information comprises the node feature information of the second node, and k is a positive integer.
  • 11. The method according to claim 10, wherein the first information comprises the first power control information.
  • 12. The method according to claim 10, further comprising: inputting second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model, wherein k=1, and the second feature information is node feature information of the second node; or k is an integer greater than 1, the second feature information is first node feature information corresponding to a (k−1)th layer of the first machine learning model, and the first node feature information is associated with the node feature information from at least one first node.
  • 13. A communication apparatus, comprising a processor, wherein the processor is coupled to a memory, the memory is configured to store a computer program, and the processor is configured to execute the computer program stored in the memory, to cause the communication apparatus to: obtain first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and a first node, wherein the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal comprises a signal from the second node; andsend the first power control information to the second node,receive the first signal from the second node, wherein the first signal is associated with the first power control information, and the first signal comprises data information and security protection information, and the security protection information is used to protect information security of the data information.
  • 14. The communication apparatus according to claim 13, wherein the first power control information comprises power control information corresponding to the data information and power control information corresponding to the security protection information.
  • 15. The communication apparatus according to claim 13, wherein there are a plurality of second nodes, and wherein the computer program is executed to further cause the communication apparatus to: obtain power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; andreceive a superimposed signal of first signals from the plurality of second nodes.
  • 16. The communication apparatus according to claim 13, wherein the computer program is executed to further cause the communication apparatus to: send first information to the second node, wherein the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information comprises the node feature information from the second node; anddetermine, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.
  • 17. The communication apparatus according to claim 16, wherein the first information comprises the first power control information.
  • 18. The communication apparatus according to claim 16, wherein the computer program is executed to further cause the communication apparatus to: input first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, wherein k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.
  • 19. The communication apparatus according to claim 16, wherein the computer program is executed to further cause the communication apparatus to: input the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model;receive second power control information from the second node; andsend a second signal to the second node, wherein the second signal comprises the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.
  • 20. The communication apparatus according to claim 16, wherein one or more of the first machine learning model and the second machine learning model is associated with a graph neural network (GNN).
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of International Application No. PCT/CN2022/103176, filed on Jun. 30, 2022, the disclosure of which is hereby incorporated by reference in its entirety.

Continuations (1)
Number Date Country
Parent PCT/CN2022/103176 Jun 2022 WO
Child 19001879 US