Multi-user spectrum allocation method capable of realizing defense of various attacks in cognitive radio network

A cognitive wireless network and spectrum allocation technology, applied in the fields of cognitive wireless network security and multi-user spectrum allocation, can solve the problems of increasing the complexity of cognitive networks, improve spectrum utilization, reduce attack power, and reduce destructive capabilities. small effect

Active Publication Date: 2014-03-19
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these methods have analyzed well and proposed technologies for security threats, they have not solved the relevant content of security issues from the perspective of spectrum allocation methods. These methods will not only introduce the shortcomings brought by traditional encryption techniques, but also lead to an increase in the complexity of the entire cognitive network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user spectrum allocation method capable of realizing defense of various attacks in cognitive radio network
  • Multi-user spectrum allocation method capable of realizing defense of various attacks in cognitive radio network
  • Multi-user spectrum allocation method capable of realizing defense of various attacks in cognitive radio network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention is suitable for figure 1 The central network shown in the scene includes the secondary user SU and the secondary user base station CBS; the secondary user SU and the secondary user base station CBS are connected wirelessly, and the secondary user base station CBS allocates spectrum to the secondary user; the secondary user SU and the secondary user base station CBS The information transmission between user base stations CBS is carried out on the control channel, and the information between the secondary users SU is transmitted through the data channel; the traditional single control channel is converted into multiple control channels by using segmentation technology, because the bandwidth required for control information is relatively small , according to the actual situation, the traditional single control channel can be divided into control channels and some data channels that meet the needs. The secondary user base station CBS dynamically adju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user spectrum allocation method capable of realizing defense of various attacks in a cognitive radio network. The multi-user spectrum allocation method mainly solves the problems that the spectrum utilization ratio is low and the bandwidth demands of secondary users cannot be met when the existing spectrum allocation method is adopted. The multi-user spectrum allocation method comprises the following realization steps that: 1) according to perceptive information, a secondary user base station utilizes a graph theory to build a spectrum allocation model; 2) the secondary users are selected; 3) the secondary user base station allocates frequency ranges to the selected secondary users; 4) the allocated frequency ranges are compared with the magnitude of bandwidth required by the secondary users, if the bandwidth demands of the secondary users can be met, the allocation process is ended, and otherwise, the frequency ranges are continuously allocated to the secondary users; and 5) the secondary users to which the frequency ranges are allocated are deleted from a graph, if secondary users still exist in the graph, the allocation process is continuously conducted, and otherwise, the allocation process is ended. The multi-user spectrum allocation method capable of realizing the defense of various attacks in the cognitive radio network has the advantages that the allocation and the use of the spectrum resources of the cognitive radio network are enabled to be more compliant with the demands of the users, the cognitive radio network can be ensured to be safer and more effective and the method can be used for defending center-based cognitive radio networks against various attacks.

Description

technical field [0001] The invention belongs to the field of communication technology, relates to cognitive wireless network security, and specifically refers to a multi-user spectrum allocation method for realizing defense against various attacks in a cognitive wireless network, which can be used for the allocation and use of cognitive wireless network spectrum resources . Background technique [0002] With the rapid development of wireless communication, the demand for spectrum resources is constantly increasing. Cognitive radio technology can perceive and utilize spectrum holes, which provides an effective way to improve spectrum utilization efficiency. In a cognitive wireless network, a very important issue is how to efficiently allocate available spectrum resources while taking into account the needs of users, that is, to serve as many secondary users as possible. [0003] As a research hotspot, many spectrum allocation methods have been proposed. WangWei and LiuXin....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W16/14H04W16/22
Inventor 裴庆祺张璐李红宁
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products