Supercharge Your Innovation With Domain-Expert AI Agents!

Scheme for simulating master user attack in mobile scene based on cognitive radio network

A technology for cognitive radio and mobile scenarios, applied in the field of imitating the main user attack scheme, it can solve problems such as the fixed value of the transmission power of malicious users, and achieve the effects of intelligent stability, strong attack performance, and large attack range.

Inactive Publication Date: 2016-08-31
YUNNAN MINZU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the traditional method of detecting PUEA, there are deficiencies: the positions of primary users, secondary users, and malicious users are all fixed, and at the same time, it is basically a one-to-one attack and defense between secondary users and malicious users, and malicious The transmit power of the user is a fixed value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheme for simulating master user attack in mobile scene based on cognitive radio network
  • Scheme for simulating master user attack in mobile scene based on cognitive radio network
  • Scheme for simulating master user attack in mobile scene based on cognitive radio network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] like figure 1 , 2 , 3, the present invention discloses a cognitive radio network-based imitation master user attack scheme in a mobile scenario, and the attack strategy includes the following specific steps:

[0036] 1) Mechanism hypothesis:

[0037] It assumes the relative distance between PU, MU and SU and the moving range of MU and SU, and at the same time stipulates the relevant parameters of the wireless channel, the transmission power of PU and MU, where, in the circular area with radius R, MU and SU1 , the relative distance between SU2 is Ds 1 , Ds 2 , the position of the TV signal transmitter is fixed, and the distance from the circular area with radius R is d 0 , and d 0 >>R. The power of the PU signal is P t , the preset power of MU is P m , SU receives the energy P of the signal from PU rp , SU perceives the shadow fading variable experienced by the signal of PU where a=ln10 / 10, β p Satisfy the normal distribution β p ~N(0,σ p 2 ), the shadow f...

Embodiment 2

[0053] like Figure 4 , 5 As shown in , 6 and 7, an attack scheme based on cognitive radio network imitating the primary user in a mobile scenario is disclosed. The attack strategy includes the following specific steps:

[0054] 1) Mechanism hypothesis:

[0055] It assumes the relative distance between PU, MU and SU and the moving range of MU and SU, and at the same time stipulates the relevant parameters of the wireless channel, the transmission power of PU and MU, where, in the circular area with radius R, MU and SU1 , the relative distance between SU2 is Ds 1 , Ds 2 , the position of the TV signal transmitter is fixed, and the distance from the circular area with radius R is d 0 , and d 0 >>R. The power of the PU signal is P t , the preset power of MU is P m , SU receives the energy P of the signal from PU rp , SU perceives the shadow fading variable experienced by the signal of PU where a=ln10 / 10, β p Satisfy the normal distribution β p ~N(0,σ p 2 ), the sha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical fields of cognitive radio spectrum detection, network safety and wireless communication, and discloses a strategy for simulating master user attack in a mobile scene based on a cognitive radio network. The strategy comprises the steps: 1), mechanism assumption; 2), the proposing of a PUEA attack scheme; 3), the verifying of the attack effect of the proposed PUEA; and 4), the adjustment of parameters. According to the invention, an MU can attack an SU in a moving process, and the transmission power can be adjusted in real time, thereby improving the attack effect, and achieving a tracking effect to some extent. In the strategy, the MU takes a whole cooperative network composed of an SU1 and an SU2 as an attack object, and the attack distribution is carried out according to different fusion rules, thereby causing the misjudgment of a final fusion result of the whole network, and improving the difficulty in defense to great extent.

Description

technical field [0001] The invention relates to the technical fields of cognitive radio spectrum detection, network security and wireless communication, in particular to an attack scheme based on a cognitive radio network imitating a primary user in a mobile scene. Background technique [0002] Today, cognitive radio networks are used as a cutting-edge technology to resolve the conflict between the limited spectrum supply and the increasing spectrum demand for radio applications and services. The cognitive radio network works in an open and randomly accessible network environment. Using spectrum sensing technology, when the primary user PU does not use the channel, unauthorized secondary users SUs can enter the channel for communication. Cognitive users (generally referring to secondary users and other cognitive users unless otherwise specified) have a flexible and simple access mode, which can greatly improve the utilization of spectrum resources and effectively solve the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B17/382H04B17/391H04W12/12H04W12/122
CPCH04B17/382H04B17/3912H04W12/12
Inventor 陈跃斌刘开元金云霞丰继华赵明玺陈建培施鸿珍
Owner YUNNAN MINZU UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More