A Cooperative Spectrum Sensing Method Against Masquerade SSDF Malicious Attacks
A cooperative spectrum and malicious attack technology, applied in security devices, advanced technology, climate sustainability, etc., can solve problems such as low utilization of spectrum resources
Active Publication Date: 2019-03-26
XIDIAN UNIV
View PDF4 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
[0019] The purpose of the present invention is to provide a method of cooperative spectrum sensing against malicious attacks by camouflaged SSDF, aiming to solve the problem of low utilization of limited spectrum resources in current cognitive radio networks
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0116] see figure 2 , the present invention implements the cooperative spectrum sensing method considering the malicious node with quasi-capability provided, comprising the following steps:
[0117] Step 1, the nodes participating in the cooperative sensing start to carry out a period of τ s The frequency spectrum detection process obtains the characteristics of the primary user spectrum resource;
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention discloses a cooperative spectrum sensing method against malicious attacks by camouflaged SSDF. By comparing the energy division intervals, the position of the initial sensing value is determined, and the trust value of each sensing node is adjusted according to the trust value update mechanism, and the DFC feeds back and stores the new value. The trust value table; the secondary user shares the spectrum resources with the primary user, if it is detected that the primary user is idle, it will transmit the signal with high power, otherwise it will transmit the signal with low power; build an optimization model to determine the relevant transmission power and Constraints of sensing time; solve the established optimization problem, and select the sensing cycle of cooperative sensing that maximizes the throughput of the secondary network and the signal transmission power of the secondary user as the sensing parameters of the spectrum sensing model. The invention has the advantages of low time complexity, strong pertinence, simple operation and good stability.
Description
technical field [0001] The invention belongs to the technical field of cognitive radio networks, and in particular relates to a cooperative spectrum sensing method for resisting malicious attacks by camouflage SSDF. Background technique [0002] With the rapid development of semiconductor, microelectronics and computer technology, especially the development of wireless local area network (Wireless Local Area Network) technology, wireless personal area network (Wireless Personal Area Network) technology and wireless metropolitan area network (Wireless Metropolitan Area Network) technology, people The application of wireless communication technology puts forward higher requirements, and the shortage of spectrum resources is becoming more and more serious. [0003] The traditional wireless spectrum adopts a fixed static spectrum allocation policy (that is, the planning and use of wireless spectrum resources are formulated by government departments, and transceivers need to be l...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W24/10H04W12/122
CPCH04W12/12H04W24/10Y02D30/70
Inventor 齐小刚秦凤娟刘立芳郑耿忠杨国平张丽敏
Owner XIDIAN UNIV



