计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2014年
2期
123-127,139
,共6页
曹龙%赵杭生%鲍丽娜%张建照%赵小龙
曹龍%趙杭生%鮑麗娜%張建照%趙小龍
조룡%조항생%포려나%장건조%조소룡
认知无线电网络%协作频谱感知%主用户仿冒攻击%辅助节点%链路特征%检测性能
認知無線電網絡%協作頻譜感知%主用戶倣冒攻擊%輔助節點%鏈路特徵%檢測性能
인지무선전망락%협작빈보감지%주용호방모공격%보조절점%련로특정%검측성능
Cognitive Radio Network(CRN)%cooperative spectrum sensing%Primary User Emulation(PUE) attack%helper nodes%link characteristic%detection performance
在认知无线电网络中,恶意用户会占用授权频段,模仿主用户的信号特征发送信号,导致其他认知用户误认为主用户存在。针对该问题,提出一种基于辅助节点的安全感知机制,在网络中部署若干辅助节点,利用链路特征和加密机制对主用户的活动情况进行识别。设计适用于该机制的融合判决算法,不对授权网络做任何形式的改动即能有效识别恶意用户,并在融合时采用信任节点的感知数据,从而提高融合结果的鲁棒性。仿真结果表明,与 K 秩、And 和 Or 算法相比,在恶意环境下该算法具有较好的检测性能。
在認知無線電網絡中,噁意用戶會佔用授權頻段,模倣主用戶的信號特徵髮送信號,導緻其他認知用戶誤認為主用戶存在。針對該問題,提齣一種基于輔助節點的安全感知機製,在網絡中部署若榦輔助節點,利用鏈路特徵和加密機製對主用戶的活動情況進行識彆。設計適用于該機製的融閤判決算法,不對授權網絡做任何形式的改動即能有效識彆噁意用戶,併在融閤時採用信任節點的感知數據,從而提高融閤結果的魯棒性。倣真結果錶明,與 K 秩、And 和 Or 算法相比,在噁意環境下該算法具有較好的檢測性能。
재인지무선전망락중,악의용호회점용수권빈단,모방주용호적신호특정발송신호,도치기타인지용호오인위주용호존재。침대해문제,제출일충기우보조절점적안전감지궤제,재망락중부서약간보조절점,이용련로특정화가밀궤제대주용호적활동정황진행식별。설계괄용우해궤제적융합판결산법,불대수권망락주임하형식적개동즉능유효식별악의용호,병재융합시채용신임절점적감지수거,종이제고융합결과적로봉성。방진결과표명,여 K 질、And 화 Or 산법상비,재악의배경하해산법구유교호적검측성능。
In Cognitive Radio Network(CRN), it exists the secure problem that adversaries emulate the characteristics of Primary User(PU) transmissions in order to occupy the authentic spectrum, and other Cognitive User(CU) mislead the existence of PU. Aiming at this problem, a secure sensing mechanism based on helper nodes is proposed. This mechanism relies on link signatures and cryptographic mechanisms to identify the PU activity. The corresponding fusion algorithm for this scheme is also proposed. The proposed algorithm can identify such adversaries efficiently without any modification to Primary Network(PN), and acquire robust results by utilizing sensing data of trust nodes. The simulation results show that this algorithm can achieve better detection performance in hostile environment than K rank, And and Or algorithm.