A primary user emulation attack detection method based on i/q imbalance
A technology for simulating attack and detection methods, applied in user identity/authority verification, baseband system components, electrical components, etc. The effect of low overhead and high detection probability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The present invention will be further described in detail below with reference to the drawings and embodiments.
[0033] This example works in a CRN in a mobile scenario, such as figure 1 As shown, the environment meets the following conditions:
[0034] (1) There is one PU, multiple SUs and multiple PUEs in the network.
[0035] (2) PU, SU and PUE all have mobility.
[0036] Such as figure 2 , The example is implemented through the following steps:
[0037] Step 1. When SU is working in PU, pass such as image 3 The shown I / Q imbalance blind estimation method estimates the I / Q imbalance of the PU signal transmitter, repeats the estimation N times and takes the average as the PU I / Q imbalance prior information, and then according to the false alarm probability P FP The decision threshold value λ is required to be set, and the specific process is as follows:
[0038] (1) Construct the reorganization vector
[0039]
[0040] Where L DFFT =64, L CP = 16.
[0041] (2) Use And r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



