A Method to Mitigate the Impact of Primary User Emulation Attacks

A technology for simulating attacks and main users, applied in electrical components, wireless communications, security devices, etc., can solve problems such as the inability to improve cooperative spectrum performance, and the energy detection method is not optimal, so as to reduce communication overhead, reduce impact, and reduce detection performance. the effect of

Active Publication Date: 2011-12-21
ZHEJIANG UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the sensing results of these cognitive radio users who may be attacked by the missed primary user emulation attacker cannot improve the performance of the entire cooperative spectrum sensing
[0006] In addition, in most practical application scenarios, the received sampling signals of a single cognitive radio user have relatively strong autocorrelation; at the same time, due to the location correlation of shadow fading, the received sampling signals of multiple cognitive radio users have relatively strong autocorrelation. Strong cross-correlation, therefore, the energy detection method is not optimal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method to Mitigate the Impact of Primary User Emulation Attacks
  • A Method to Mitigate the Impact of Primary User Emulation Attacks
  • A Method to Mitigate the Impact of Primary User Emulation Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific implementation process of the method for mitigating the impact of the missed detection primary user simulation attack on the cooperative spectrum sensing performance of the present invention will be further described below in conjunction with the accompanying drawings.

[0044] Such as figure 1 , the cognitive radio network consists of a data fusion center, a master user simulated attacker and J cognitive radio users. The primary user transmitter transmits the relevant signal. In addition, due to occlusions such as the same obstacle, the signals received by cognitive radio users have location correlation. While the primary user emulation attack attacks as many cognitive radio users as possible with the smallest energy, so that the energy obtained by cognitive radio users from the primary user emulation attacker is equal to the energy obtained from the primary user. Master user impersonation attacks can also imitate other characteristics of the master us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for reducing influence of master user simulation attack. According to the invention, in the method, cognitive radio users relatively disperse in space are selected to participate in cooperation spectrum sensing, and the detection method of MME (mobility management entity) is used to reduce influence of the undetected master user simulation attack on the cooperation spectrum sensing. The method comprises the following concrete steps: establishing a location correlation matrix among the cognitive radio users according to a shadow fading correlation model; selecting the cognitive radio users with relatively low location correlation to participate in the cooperation sensing; and finally making an overall decision by a fusion center through a detection method based on the maximum and minimum characteristic values of a sampled signal covariance matrix. The method has the advantages that the prior information of the master user does not need to be obtained and the background noise power is unnecessary to know, and has relatively high robustness on the uncertainty of noise.

Description

technical field [0001] The patent of the present invention belongs to the field of cognitive radio security, and relates to a method for alleviating the impact of missed primary user simulation attacks on cooperative spectrum sensing performance under correlated shadow fading and primary user related transmission signals. Background technique [0002] Cognitive Radio (Cognitive Radio) technology can effectively use spectrum resources and alleviate the current situation of scarce spectrum resources and low spectrum utilization. It enables radio users with cognitive functions to intelligently perceive the use of spectrum resources in the surrounding environment, and Discover "spectrum holes" that are not used by the primary user (Primary User), and access these "spectrum holes" in an opportunistic manner to complete the communication without affecting the communication of the primary user. [0003] While cognitive radio technology strives to achieve efficient use of spectrum r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/00H04W12/122
Inventor 陈惠芳谢磊刘发宇王匡吴伟
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products