Dynamic bidirectional spectrum allocation method for resisting Sybil attack of primary user and intelligent terminal

A two-way spectrum and allocation method technology, which is applied in the field of intelligent terminal and dynamic two-way spectrum allocation, can solve the problems of unable to prevent the main user Sybil attack, no spectrum allocation mechanism, and no consideration of time factors, etc., to achieve individual rationality and authenticity, Achieve spectrum reallocation performance and prevent bidders from manipulating the auction

Active Publication Date: 2020-02-14
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the two-way spectrum auction, the main user also needs to bid, and it is very likely to attack
[0005] (2) Most of the existing auction-based spectrum allocation mechanisms are static allocation, that is, spectrum resources and user applications are regarded as static existence, regardless of the time factor, which is not realistic
[0006] (3) There is currently no spectrum allocation mechanism that can solve the above problems
That is, the existing algorithm cannot prevent the primary user Sybil attack and consider the flexibility of the time dimension of the spectrum

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic bidirectional spectrum allocation method for resisting Sybil attack of primary user and intelligent terminal
  • Dynamic bidirectional spectrum allocation method for resisting Sybil attack of primary user and intelligent terminal
  • Dynamic bidirectional spectrum allocation method for resisting Sybil attack of primary user and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] Aiming at the problems existing in the prior art, the present invention provides a dynamic two-way spectrum allocation method and an intelligent terminal against the Sybil attack of the primary user. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] Such as figure 1 As shown, the dynamic two-way spectrum allocation method against the primary user Sybil attack provided by the embodiment of the present invention includes the following steps:

[0041] S101: Establish a two-way spectrum auction model, the primary user submits idle spectrum and auction criteria ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication, and discloses a dynamic bidirectional spectrum allocation method for resisting Sybil attack of a primary user and an intelligentterminal, and aims to defend against innovative Sybil attack of the primary user so as to dynamically correspond to a bidirectional anti-strategy control spectrum auction model for quoting accordingto a flexible and real estimation value and determine a bidding relationship between the primary user and a secondary user in the model. Spectrum auction is carried out through a specific bidding strategy; an auction theory and an auction mechanism are adopted to prevent Sybil attacks of a primary user, and spectrum auction is carried out on line through a bidding strategy. According to the method, auction models in economics are integrated, and an online dynamic spectrum auction mechanism capable of meeting the flexible requirements of secondary users for channels and resisting Sybil attacksof bidding is designed; through the mechanism, the primary user and the secondary user can bid the spectrum by submitting different requirements of the users for the spectrum and corresponding estimation functions, Sybil attacks of illegal primary users are prevented, and a better spectrum sharing mechanism is realized.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a dynamic two-way frequency spectrum allocation method and an intelligent terminal against a Sybil attack of a primary user. Background technique [0002] Currently, the closest existing technology: The radio spectrum is a critical but scarce resource for wireless communications. With the emergence of software-defined radios (SDR, software-definedradios) and wireless devices, the problem of spectrum shortage is becoming more and more serious, and has become a bottleneck for the rapid development of the wireless communication industry. In traditional static spectrum allocation mechanisms, long-term spectrum licenses are issued to wireless devices, resulting in low spectrum utilization due to traffic fluctuations. To improve spectrum utility, dynamic spectrum access mechanisms have been proposed to reallocate spectrum resources, where spectrum owners are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W16/10H04W72/04H04W12/126
CPCH04W16/10H04W72/0453H04W12/122
Inventor 董学文康乔游志超武峰刘启航谷鑫雨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products