Check patentability & draft patents in minutes with Patsnap Eureka AI!

A primary user emulation attack detection method based on i/q imbalance

A technology for simulating attack and detection methods, applied in user identity/authority verification, baseband system components, electrical components, etc. The effect of low overhead and high detection probability

Active Publication Date: 2019-09-20
ZHEJIANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are few research results on PUEA detection in mobile scenarios, and there are problems such as high system overhead and limited application in actual scenarios. Therefore, it is necessary to find a new detection method to identify PUEA in mobile scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A primary user emulation attack detection method based on i/q imbalance
  • A primary user emulation attack detection method based on i/q imbalance
  • A primary user emulation attack detection method based on i/q imbalance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below with reference to the drawings and embodiments.

[0033] This example works in a CRN in a mobile scenario, such as figure 1 As shown, the environment meets the following conditions:

[0034] (1) There is one PU, multiple SUs and multiple PUEs in the network.

[0035] (2) PU, SU and PUE all have mobility.

[0036] Such as figure 2 , The example is implemented through the following steps:

[0037] Step 1. When SU ​​is working in PU, pass such as image 3 The shown I / Q imbalance blind estimation method estimates the I / Q imbalance of the PU signal transmitter, repeats the estimation N times and takes the average as the PU I / Q imbalance prior information, and then according to the false alarm probability P FP The decision threshold value λ is required to be set, and the specific process is as follows:

[0038] (1) Construct the reorganization vector

[0039]

[0040] Where L DFFT =64, L CP = 16.

[0041] (2) Use And r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a master user emulation attack detection method based on I / Q imbalance. In view of PUEA detection problem, most of the existing researches focus on the scenes with fixed user location, the research results in mobile scenes are few, and the problems such as large system overhead and limited application in real scene are existed in practice. According to the invention, the I / Q imbalance of the signal transmitter obtained, and the master user emulation attack detection is realized by means of the two element hypothesis detection method according to the feature. The master user emulation attack detection method based on the I / Q imbalance comprises the following steps: constructing a recombinant vector by means of a receiving vector in the mobile scene by a cognitive radio user; calculating and obtaining the I / Q imbalance of the signal transmitter; constructing the two element hypothesis detection to perform judgment. According to the master user emulation attack detection method based on I / Q imbalance provided by the invention, the operation cost is low, the recognition time is short, the selected features are difficult to emulate by the emulation master user, and the master user emulation attack detection method based on I / Q imbalance can work normally when the master user, the subordinate user and the emulation master user all move.

Description

Technical field [0001] The invention belongs to the field of cognitive radio security, and relates to a method for detecting a master user simulation attack through the I / Q imbalance feature of a zero-IF architecture in a scenario where a master user, a slave user and a simulated master user all have mobility. Background technique [0002] In order to meet the ever-increasing demand for spectrum resources, cognitive radio technology has been proposed to improve the utilization of licensed spectrum. By searching for spectrum holes, the secondary user (SU) in the cognitive radio network (Cognitive Radio Network, CRN) can intelligently access spectrum resources without interfering with the normal communication of the primary user (PU) network . However, the cognitive features of CRN introduce new security issues, and Primary User Emulation Attack (PUEA) is one of the typical attacks. In PUEA, the attacker imitates the PU to send a signal, so that the SU incorrectly judges that the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04L25/02H04L9/32
Inventor 谢磊陈惠芳韩长东
Owner ZHEJIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More