Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network

A technology for cognitive wireless network and data perception, applied in the field of cognitive wireless network anti-cooperative tamper-sensing data attack, it can solve the problems of high probability of misjudgment, trusted user error, sensitive number of malicious users, etc., to improve system detection. probability, reduce the probability of false alarms in the system, and achieve the effect of effective defense

Inactive Publication Date: 2014-04-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has a high misidentification rate, that is, trustworthy users are mistakenly regarded as attacking users.
At the same time, with the increase of the number of malicious users, this method cannot solve the malicious attack from the cooperative type well, and there is a high probability of misjudgment
In 2011, Zeng Kun’s doctoral thesis "Research on Cognitive Radio Cooperative Spectrum Sensing Technology" aimed at the problem that the performance of existing security cooperative sensing algorithms is sensitive to the number of malicious users in the initial state, and proposed a reputation-based method assisted by trusted users
However, this method has a high misidentification rate, that is, trustworthy users are mistakenly regarded as attacking users.
[0008] 2. It can improve the robustness in many malicious user network scenarios, but lacks the ability to resist coordinated SSDF attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
  • Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
  • Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0028] figure 1 As a typical cognitive wireless network, it has a centralized cooperative spectrum sensing network composed of a single authorized user (also called the main user) and N sensing users (including malicious users and trusted users), among which there are M malicious users who can send to The fusion center launches an SSDF attack. At the end of each sensing moment, each sensing user sends the local sensing results to the fusion center. The perception results of different perception users at different times are independent of each other. After the fusion center makes a judgment based on these results, it notifies each sensing user of the use of the authorized frequency band in the form of broadcast. These information exchanges ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of wireless communication, in particular to a method and device for resisting cooperative type sensing data falsification attack through a cognitive wireless network. The method includes the steps of clustering sensing results and judging the sensing results within clusters, dividing sensing users with similar sensing result reports into the same clusters, recognizing and isolating malicious users, and then judging the real channel occupancy state of main users according to the judgment result of each cluster. According to the method, the malicious users are recognized and isolated by means of the self-adaption clustering technology by fully using sensing report historical data of the sensing users under the condition that prior knowledge such as the number of attackers and the attack strategies does not exist; all aspects of sensing performance of the system is improved, the aims of lowering system false alarm probability and improving system detection probability are achieved, and therefore the cooperative type sensing data falsification attack is effectively defended.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a method and device for a cognitive wireless network to resist cooperative tampering perception data attacks. Background technique [0002] Cognitive Radio (CR) technology has become one of the most popular research fields in wireless communication, and is widely recognized as the "next big event" in the field of future wireless communication research. Cognitive radio, as an intelligent wireless communication system, uses Dynamic Spectrum Access (DSA) to realize the "secondary utilization" of spectrum holes by secondary users (unauthorized users), which can effectively improve spectrum utilization efficiency , fundamentally alleviate the tension of spectrum resources. [0003] Coordinated spectrum sensing technology has successfully solved the problems of hidden terminals and harsh sensitivity requirements in single-user sensing, and obtained a large sensi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/02H04W12/122
Inventor 李方伟李立朱江余航冯德俊马安君
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products