Unlock instant, AI-driven research and patent intelligence for your innovation.

Interference Estimation Method for Cognitive Radio Networks Based on Imitation of Primary User Attack

A technology of cognitive radio and interference estimation, which is applied in the field of cognitive radio network interference estimation based on imitating primary user attacks, interference situation of malicious users, and can solve problems such as reducing system capacity, inability to distinguish primary users, and loss of dominance

Active Publication Date: 2016-08-31
CHONGQING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, how to systematically and reliably dig out the available spectrum holes in the network is one of the keys to the realization of cognitive radio technology. The spectrum situation map refers to the "spectrum map" that visually and intuitively presents the spectrum holes in cognitive radio. , some existing literatures study the spectrum situation map without attack, so when there is an attack imitating the main user, this kind of situation map cannot distinguish the energy of the main user and the malicious user, so that the system loses the right to control the channel of the counterfeit attack , reducing the system capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interference Estimation Method for Cognitive Radio Networks Based on Imitation of Primary User Attack
  • Interference Estimation Method for Cognitive Radio Networks Based on Imitation of Primary User Attack
  • Interference Estimation Method for Cognitive Radio Networks Based on Imitation of Primary User Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] Assume that the research area is a cognitive radio network consisting of L primary users (each primary user occupies 1 channel), M trusted secondary users, N malicious users, and a pair of array antennas, such as figure 1 shown. The cognitive network adopts a cooperative spectrum sensing model, that is, trusted sub-users in a certain area are automatically combined into clusters, and a cluster head is elected through an election algorithm. Each SU sends...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cognitive radio spectrum management and safety, in particular to a primary user emulation attack-based interference estimation method for a cognitive radio network. The method comprises the steps that a secondary user receives channel power, the channel power is utilized to detect whether any channel in the cognitive radio network is occupied, and the channel occupation state and the channel power are sent to a cluster head; the cluster head is used for judging whether the occupied channel is attacked; the interference energy distribution of the attacked channel is estimated. According to the method disclosed by the invention, the secondary user detects whether a malicious user exists in a channel and estimates the interference energy distribution of the malicious user by perceiving the surrounding radio environment, an interference situation graph is built further, the energy of the primary user and the energy of the malicious user is separated, the interference energy distribution of the malicious user can be obtained, and also an accurate spectrum situation graph can be obtained by combining with a spectrum hole detection means.

Description

technical field [0001] The present invention relates to the field of cognitive radio spectrum management and security technologies, in particular to an interference estimation method based on imitating primary user attacks in a cognitive radio network, and constructs an interference situation of malicious users by identifying information source identities and estimating interference energy. Background technique [0002] With the development of science and technology, spectrum resources are increasingly tight, but the current spectrum management method is that even if authorized users (also called primary users, Primary User, PU for short) do not use the licensed frequency band, unlicensed users (also called trusted secondary users, Secondary User, referred to as SU) cannot use this frequency band, which greatly reduces the utilization rate of the spectrum. In order to solve this contradiction, people have proposed Cognitive Radio (CR) technology—unlicensed users perceive idl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B17/345H04B17/382H04L29/06
Inventor 李方伟冯德俊朱江李立余航马安君
Owner CHONGQING UNIV OF POSTS & TELECOMM