Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network

A cognitive wireless network and sensing data technology, which is applied in the field of distributed cognitive wireless network against tampering sensing data attacks, can solve problems such as iterative process disorder, difficulty in resisting SSDF attacks, and too harsh assumption conditions, and achieve the effect of improving security

Active Publication Date: 2015-05-13
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Random attack refers to malicious users who do not participate in spectrum sensing and randomly send a state value to neighbor nodes in the process of information interaction, which makes the iterative process disorder, so that the network state cannot be consistent
[0007] However, Li Hongning and others pointed out in the paper "Security Detection of Convergent Sensing Algorithms in Cognitive Wireless Networks" in the "Journal of Xidian University" No. 3, 2014 that the above-mentioned scheme is too harsh for the attacker's assumptions, preventing normal nodes from It is difficult to resist various forms of SSDF attacks, but no corresponding improvement measures are given

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network
  • Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network
  • Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0149] As a preferred implementation manner, the consistency iteration based on trust degree weighting in the present invention includes:

[0150] The energy state value of neighbor nodes received by secondary user i Perform weighted iterative operations:

[0151] X i t = X i t - 1 + λ Σ j ∈ Ne i Tr i , j t ( X j t - X i t )

[0152] in, and Respectively represent the state value of the i-th secondary user at time t and time t-1, λ i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cognitive radio safety and discloses a method and a device for resisting spectrum sensing data falsification through a distributed cognitive radio network, wherein the method comprises the following steps: a secondary user perceives signal energy of a primary user; the secondary user interacts local perceptual information with a neighbor node and calculates comprehensive credibility of the neighbor node according to a cognitive state value of the neighbor node; the secondary user performs iteration on the cognitive state value according to a comprehensive credibility weighting consistence scheme of the neighbor node until state values of all nodes are converged; the secondary user compares the converged state value with a detection threshold and judges whether an existing channel is occupied or not by the primary user. The method can be used for resisting spectrum sensing data falsification launched by a malicious user, improving spectrum sensing safety in the cognitive network and resisting SSDFs of various forms very well on the condition of not having priority knowledge of number of intruders, a falsification strategy, and the like.

Description

technical field [0001] The present invention relates to the technical field of cognitive radio security, in particular to a method and a device for a distributed cognitive wireless network to resist tampering perception data attacks. Background technique [0002] In order to solve the problem of low utilization of spectrum resources in the communication system, cognitive radio (Cognitive Radio, CR for short) technology is proposed. Unauthorized users (also called secondary users, Secondary User, SU for short) perceive idle After the frequency band, wait for an opportunity to access the channel to make full use of the spectrum resources without affecting the communication of the authorized user (also called the primary user, Primary User, PU for short). [0003] Perceptual spectrum hole is the basis of cognitive wireless network work. Its purpose is to quickly and reliably obtain the surrounding spectrum usage, so that secondary users can access channels opportunistically wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04L29/06H04W12/122
CPCH04L63/1441H04W12/12
Inventor 李方伟刘帆聂益芳袁迎慧郑波邓武
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products