期刊文献+

分布式协作频谱感知的信誉模型 被引量:1

Reputation Model for Distributed Collaborate Spectrum Sensing
原文传递
导出
摘要 协作感知技术能大大提高认知无线电网络中的频谱感知效果,但也会产生一些安全隐患,如频谱感知数据伪造攻击.针对单个恶意次用户发起的连续性频谱感知数据伪造攻击和若干个恶意次用户发起的非连续性频谱感知数据伪造攻击,设计并实现了一种分布式协作频谱感知的信誉模型.仿真实验表明,该模型能有效地识别恶意次用户和抵御频谱感知数据伪造攻击.同时,该模型还具有较小的虚警率、丢失率和较好的容错能力. Collaborative spectrum sensing can greatly improve the effect of the spectrum sensing in cognitive radio network. However,it also brings some security risks such as spectrum sensing data falsification( SSDF) attack. To against the successional and discontinuous SSDF attacks launched by the single malicious secondary user and some malicious secondary users,respectively,a reputation model for distributed collaborate spectrum sensing was proposed. Simulation shows that the proposed model can effectively identify the malicious secondary users and resist the SSDF attack. Moreover,it also has lower probability of false alarm detection,lower probability of loss detection,and better fault-tolerant ability.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2015年第4期53-57,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61363068 61405255) 福建省自然科学基金项目(2013J01222 2014J01223) 福州市科技局项目(2013-G-84)
关键词 认知无线电网络 分布式协作 频谱感知 频谱感知数据伪造 信誉模型 cognitive radio network distributed collaborative spectrum sensing spectrum sensing data falsification reputation model
作者简介 许力(1970-),男,教授,博士生导师; 黄毅杰(1990-),男,研究生,E-mail:y.j.huang@foxmail.com.
  • 相关文献

参考文献10

  • 1Mitola J,Maguire J G Q.Cognitive radio: making software radios more personal[J].Personal Communications,IEEE,1999,6(4): 13-18.
  • 2申滨,王舒,黄琼,陈前斌.认知无线电最优用户选择协作频谱感知[J].北京邮电大学学报,2014,37(2):32-37. 被引量:8
  • 3Feng Jingyu,Zhang Yuqing,Lu Guangyue,et al.Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment[C] //Trust,Security and Privacy in Computing and Communications (TrustCom),2013 12th IEEE International Conference on.IEEE Computer Society,2013: 1656-1661.
  • 4Attar A,Tang Helen,Vasilakos A V,et al.A survey of security challenges in cognitive radio networks: solutions and future research directions[J].Proceedings of the IEEE,2012,100(12): 3172-3186.
  • 5Abdelhakim M,Lightfoot L E,Ren Jian,et al.Distributed detection in mobile access wireless sensor networks under byzantine attacks[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(4): 950-959.
  • 6Fragkiadakis A G,Tragos E Z,Askoxylakis I G.A survey on security threats and detection techniques in cognitive radio networks[J].Communications Surveys and Tutorials,IEEE,2013(1): 428-445.
  • 7Lu Jianqi,Wei Ping,Chen Zhe.A scheme to counter SSDF attacks based on hard decision in cognitive radio networks[J].Wseas Transactions on Communications,2014,13(1): 242-248.
  • 8Lin Hui,Hu Jia,Ma Jianfeng,et al.A role based privacy-aware secure routing protocol for wireless mesh networks[J].Wireless Personal Communications,2014,75(3): 1611-1633.
  • 9Parvin S,Hussain F K,Hussain O K.Conjoint trust assessment for secure communication in cognitive radio networks[J].Mathematical and Computer Modelling,2013,58(5): 1340-1350.
  • 10Letaief K,Zhang Wei.Cooperative communications for cognitive radio networks[J].Proceedings of the IEEE,2009,97(5): 878-893.

二级参考文献8

  • 1Hoyhtya M, Hekkala A, Katz M D. Cognitive wireless networks[M]. Chapter 18, Spectrum Awareness: Techniques and Challenges for Active Spectrum Sensing. Springer Netherlands, 2007.
  • 2Quan Zhi, Cui Shuguang, Sayed A H. Optimal linear cooperation for spectrum sensing in cognitive radio networks[J]. IEEE Journal of Selected Topics in Signal Processing, 2008, 2(1): 28-40.
  • 3Ma Jun, Zhao Guodong, Li Ye. Soft combination and detection for cooperative spectrum sensing in cognitive radio networks [J]. IEEE Transactions on Wireless Communications, 2008, 7(11): 4502-4507.
  • 4Wu Hsien-Tsai, Yang Jar-Ferr, Chen Fwu-Kuen. Source number estimators using transformed Gerschgorin radii [J]. IEEE Transactions on Signal Processing, 1995, 43(6): 1325-1333.
  • 5Schmidt R. Multiple emitter location and signal parameter estimation [J]. IEEE Transactions on Antennas and Propagation, 1986, 34(3): 276-280.
  • 6Wang Rui, Tao Meixia. Blind spectrum sensing by information theoretic criteria for cognitive radios[J]. IEEE Transactions on Vehicular Technology, 2010, 59(8): 3806-3817.
  • 7Wax M, Kailath T. Detection of signals by information theoretic criteria [J]. IEEE Transactions on Acoustics, Speech and Signal Processing, 1985, 33(2): 387-392.
  • 8彭涛,郭晨,王文博.认知无线电网络高能效协作频谱感知技术[J].北京邮电大学学报,2010,33(4):93-96. 被引量:14

共引文献7

同被引文献6

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部