期刊文献+

基于最短时延的认知无线电网络安全路由算法 被引量:2

Security Routing Algorithm Based on Shortest Delay for Cognitive Radio Networks
下载PDF
导出
摘要 针对认知无线电网络可用频谱动态变化和路由过程中出现的安全问题,提出将最短数据传输时延和高安全等级路由作为选路标准,设计了一种跨层路由选择算法。算法通过优化转发节点个数和各转发节点接收、发送数据信道来减少数据传输时延。通过选择具有高安全级别的转发节点来保证路由的安全性。理论分析表明算法是高效和可行的。它的时间复杂度是O(N2),其中N是拓扑图中节点的个数。 The paper proposed a cross-layer routing selection algorithm, which considers the shortest delay and highest security as routing selection standard. The routing algorithm aims to solve the problem of both the dynamic spectrum and security problem in cognitive radio networks. The Algorithm reduces the data transfer delay by optimizing the number of forwarding nodes and selecting channel for transmitting and receiving, and ensures routing security by choosing a forwarding node of high level security. The results of theory analysis show that the algorithm is efficient and feasible. The computing complexity of the algorithm is O(N^2 ) ,where N is the number of nodes in the network topology graph.
出处 《计算机科学》 CSCD 北大核心 2010年第1期68-71,共4页 Computer Science
基金 国家自然科学基金项目(No.60773074)认知无线电安全关键技术研究资助
关键词 认知无线电网络 跨层路由选择算法 安全路由 最短时延 Cognitive radio networks,Cross-layer routing selection algorithm, Secure routing,Shortest delay
  • 相关文献

参考文献14

  • 1Mitola J, Maquire G J. Cognitive radios:making software radios more personal[J]. IEEE Personal Communications, 1999,6 (4) : 13-18.
  • 2Haykin S. Cognitive radio: brain-empowered wireless communications[J]. IEEE Journal on Selected Area in Communication, 2005,23(2) :201-220.
  • 3Ghasemi A,Sousa E S. Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs[J]. IEEE Communications Magazine, 2008,46 (4): 32-39.
  • 4Gong M X, Midkiff S E, Shiwen M. Design principles for distributed channel assignment in wireless ad hoe networks [C]// 2005 IEEE International Conference on Communications. Seoul, South Korea, 2005 : 3401-3406.
  • 5Kyasanur P, Vaidya N H. Protocol design challenges for multihop dynamic spectrum access networks[C]//2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. Baltimore, MD, USA, 2005 : 645-648.
  • 6Miao M,Tsang D H K. Joint spectrum sharing and fair routing in cognitive radio networks[C]//2008 5th IEEE Consumer Communications and Networking Conference. Las Vegas, NV, USA, 2007: 978-982.
  • 7Krishnamurthy S, Thoppian M, Venkatesan S, et al. Control channel based MAC-layer configuration, routing and situation awareness for cognitive radio networks[C]//MILCOM 2005. 2006 IEEE Military Communications Conference. Atlantic City, NJ, USA, 2005 : 455-460.
  • 8Yang Z K, Cheng G, Liu W, et al. Local coordination based routing and spectrum assignment in multi-hop cognitive radio networks[J]. Mobile Networks and Applications, 2008,13 (1) :67-81.
  • 9Burbank J L. Security in Cognitive Radio Networks : The Re - quired Evolution in Approaches to Wireless Network Security[C]//3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008 Singapore. Singapore, 2008:1-7.
  • 10Wang Q W. Route and Spectrum Selection in Dynamic Spectrum Network[C] // 2006 3rd IEEE Consumer Communications and Networking Conference. Las Vegas, NV, USA, 2006 : 625-629.

二级参考文献12

  • 1Sergio Marti,T J Giuli,Kevin Lai,Mary Baker.Mitigating routing misbehavor in mobile ad hoc networks[A].In Proceedings of MOBICOM 2000[C].Boston,2000.255-265.
  • 2Levente Buttyan,Jean-Pierre Hubaux.Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks[R].Technical Report DSC/2001/046,EPFL-DI-ICA,August 2001.
  • 3S Buchegger,JL Boudec.Performance analysis of the CONFIDANT protocol:cooperation of nodes-fairness In dynamic ad-hoc networks[A].In Proceeding of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Lausanne,2002.226-236.
  • 4S Buchegger,JL Boudec.Nodes bearing grudges:towards routing security,fairness,and robustness in mobile ad hoc networks[A].In Proceedings of the Tenth Euromicro Workshop on Parallel,Distributed and Network-based Processing[C].Canary Islands,Spain,2002.403-410.
  • 5David B Johnson,David A Maltz,Yih-Chun Hu,Jorjeta G Jetcheva.The Dynamic Source Routing Protocol for Mobile Ad Hoc Network[S].draft-ietf-manet-dsr-07.txt,2002.
  • 6Pietro Michiardi,Refik Molva.CORE:A collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks[A].The Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002)[C].Portoroz,Slovenia,2002.107-121.
  • 7Hao Yang,Xiaoqiao Meng,Songwu Lu.Self-organized network-layer security in mobile ad hoc networks[A].Proceedings of the ACM Workshop on Wireless Security[C].Atlanta,GA,USA,2002.11-20.
  • 8C Perkins,E Royer,S Das.Ad Hoc on-Demand Distance Vector Routing[S].Internet Draft,draft-ietf-manet-aodv-10.txt,2002.
  • 9S Yi,P Naldurg,R Kravets.Security-Aware Ad-Hoc Routing for Wireless Networks[R].UIUCDCS-R-2001-2241 Technical Report,2001.
  • 10P Resnick,K Kuwabara,R Zeckhauser,E Friedman.Reputation systems[J].Communications of the ACM,2000,43(12):45-48.

共引文献18

同被引文献50

  • 1Chen R, Park J M. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]. Proceedings of IEEE Workshop of Networking Technologies for Software Defined Radio Networks, Washington: IEEE Computer Society, 2006, 110-119.
  • 2Chen R, Park J M. Toward secure distributed spectrum sensing in cognitive radio networks[J]. IEEE Communications Magazine, 2008, 46 (4): 50-55.
  • 3Huahui Wang, Lightfoot L, Tongtong Li. On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks [C]. Proceedings of 2010 44th Annual Conference on Information Sciences and Systems (CISS), Washington: IEEE Computer Society, 2010, 1-6.
  • 4Noon, E, Hnsheng Li. Defending against Hit-and-Run Attackers in Collaborative Spectrum Sensing of Cognitive Radio Networks: A Point System[C]. Proceedings of 2010 IEEE 71st Vehicular Technology Conference (VTC 2010-Spring), Washington: IEEE Computer Society, 2010, 11-15.
  • 5Husheng Li, Zhu Han. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks[J]. IEEE Transactions on Wireless .Communications, 2010, 9 (11): 3554-3565.
  • 6Zhu Q, Han Z, Basar T. No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes[C]. Proceedings of 2010 IEEE International Conference on Communications (ICC), Washington: IEEE Computer Society, 2010, 1-6.
  • 7Fatemieh O, Chandra R, Gunter C A. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks[C]. Proceedings of 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, Washington: IEEE Computer Society, 2010, 1-12.
  • 8Ankit Singh Rawat, Priyank Anand, Hao Chen, et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks[J]. IEEE Transactions on Signal Processing, 2011, 59 (2): 774-786.
  • 9Rawat A S, Anand P, Hao Chen, et al. Countering byzantine attacks in cognitive radio networks[C]. Proceedings of 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), Washington: IEEE Computer Society, 2010, 3098-3101.
  • 10Chen l:k, Park J M, Reed J H. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications Special Issue on Cognitive Radio Theory and Applications, 2008, 26(l): 25-37.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部