期刊文献+

基于SVDD的认知无线电网络仿冒主用户检测技术 被引量:6

Detecting the Primary User Emulation Based on SVDD in Cognitive Radio Networks
下载PDF
导出
摘要 为了解决传统主用户感知技术无法检测认知无线电网络中的仿冒主用户(PUE)攻击问题,提出了一种基于支持向量数据描述(SVDD)的PUE检测方法。该方法将PUE攻击检测建模为一个数据不平衡的单类分类问题,采用高效的SVDD算法,在对PUE攻击一无所知的情况下,仅利用认知无线电网络中的合法用户数据训练单类分类器。将待测样本输入训练后的分类器即可实现PUE攻击检测。理论分析和仿真结果表明,利用该方法进行PUE攻击检测,可以获得较低的虚警率和漏检率。 To resolve the problem that traditional primary user sensing technique cannot detect PUE (Primary User Emulation) attack in cognitive radio networks,a novel detecting technique is put forward that based on SVDD (Support Vector Date Description). Detecting PUE is modeled as a one-class imbalanced classified problem in this technique. Without PUE attack parameters,a one-class classifier is trained with legal users’ parameters by SVDD algorithm. Input the pending samples to the trained classifier,PUE will be detected. Analysis and simulation results show that,a lower false alarm probability and miss detection probability can be obtained.
出处 《信号处理》 CSCD 北大核心 2010年第7期974-979,共6页 Journal of Signal Processing
基金 中国博士后科学基金资助(No.20080441320) 江苏省博士后科研资助计划(No.0802075C)
关键词 认知无线电网络 仿冒主用户 支持向量数据描述 cognitive radio networks primary user emulation SVDD
  • 相关文献

参考文献15

  • 1MITOLA J, MAQUIRE G Q JR. Cognitive radio: making software radios more personal [ J ]. IEEE Personal Communications, 1999, 6(4) :13-18.
  • 2MITOLA J. Cognitive radio: an integrated agent architecture for software defined radio [ D ]. KTH Royal Institute of Technology, Stockholm, Sweden, 2000.
  • 3Simon H. Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 2005, 23(2): 201-220.
  • 4Chen R, Park J. Ensuring trustworthy spectrum sensing in cognitive radio networks. In:IEEE Workshop on Networking Technologies for Software Defined Radio Networks, 2006.
  • 5Chen R, Park J and Reed J. Defense against primary user emulation attacks in cognitive radio networks [ J ], IEEE Journal on Selected Areas in Communications, 2007.
  • 6Bian K G, Park J M. MAC-layer misbehaviors in multi-hop cognitive radio networks [ C ]. In: US-Korea Conference on Science, Technology, and Entrepreneurship ( UKC2006), 2006.
  • 7Sahai A, Hoven N and Tandra R. Some Fundamental Limits on Cognitive Radio[ C]. In: 42nd Allerton conf. on Communication, Control and Computing 2004, Illinois USA, October 2004.
  • 8Challapali K, Mangold S and Zhong Z. Spectrum agile radio: Detecting spectrum opportunities [ C ], 6th Annual International Symposium on Advanced Radio Technologies, March 2004.
  • 9Cabric D, Mishra S M and Brodersen R W, Implementation issues in spectrum sensing for cognitive radios [ C ], Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, Nov. 2004, pp. 772-776.
  • 10Oner M, Jondral F. Cyclostationarity-Based Methods for the Extraction of the Channel Allocation Information in a Spectrum Pooling System [ C ]. IEEE Radio and Wireless Conference 2004. Karlsruhe Univ. , Germany. 2004.

二级参考文献6

  • 1Prasad R. Special issue on" cognitive radio technologies" [J]. Wireless Personal Communications, 2008,45 ( 3 ) : 277-279.
  • 2Mitola J, Maquire G J. Cognitive radios., making software radios more personal[J]. IEEE Personal Communications, 1999,6 (4): 13-18.
  • 3Chen R, Park J M. Ensuring trustworthy spectrum sensing in cognitive radio networks[C] // IEEE Workshop on Networking Technologies for Software Defined Radio Networks. Reston, VA, USA, 2006 : 110-119.
  • 4Challapali K,Mangold S, Zhong Z. Spectrum agile radio: Deteering spectrum opportunities[C]//6th Annual International Symposium on Advanced Radio Technologies. Colorado. USA, 2004:23-27.
  • 5Olivieri M P,Barnett G A,Lackpour A,et al. A scalable dynamic spectrum allocation system with interference mitigation for teams of spectrally agile software defined radios [C] // First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway, NJ, USA, 2005.. 170- 179.
  • 6Cabric D,Mishra S M,Brodersen R W. Implementation issues in spectrum sensing for cognitive radios[C]//Thirty-Eighth Asilomar Conference on Signals, Systems and Computers. Piscataway, NJ, USA , 2004: 772-776.

共引文献10

同被引文献54

  • 1杨敏,张焕国,傅建明,罗敏.基于支持向量数据描述的异常检测方法[J].计算机工程,2005,31(3):39-42. 被引量:17
  • 2钟佑明,金涛,秦树人.希尔伯特-黄变换中的一种新包络线算法[J].数据采集与处理,2005,20(1):13-17. 被引量:43
  • 3张国柱,黄可生,姜文利,周一宇.基于信号包络的辐射源细微特征提取方法[J].系统工程与电子技术,2006,28(6):795-797. 被引量:48
  • 4Chen R, Park J M. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]. Proceedings of IEEE Workshop of Networking Technologies for Software Defined Radio Networks, Washington: IEEE Computer Society, 2006, 110-119.
  • 5Chen R, Park J M. Toward secure distributed spectrum sensing in cognitive radio networks[J]. IEEE Communications Magazine, 2008, 46 (4): 50-55.
  • 6Huahui Wang, Lightfoot L, Tongtong Li. On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks [C]. Proceedings of 2010 44th Annual Conference on Information Sciences and Systems (CISS), Washington: IEEE Computer Society, 2010, 1-6.
  • 7Noon, E, Hnsheng Li. Defending against Hit-and-Run Attackers in Collaborative Spectrum Sensing of Cognitive Radio Networks: A Point System[C]. Proceedings of 2010 IEEE 71st Vehicular Technology Conference (VTC 2010-Spring), Washington: IEEE Computer Society, 2010, 11-15.
  • 8Husheng Li, Zhu Han. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks[J]. IEEE Transactions on Wireless .Communications, 2010, 9 (11): 3554-3565.
  • 9Zhu Q, Han Z, Basar T. No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes[C]. Proceedings of 2010 IEEE International Conference on Communications (ICC), Washington: IEEE Computer Society, 2010, 1-6.
  • 10Fatemieh O, Chandra R, Gunter C A. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks[C]. Proceedings of 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, Washington: IEEE Computer Society, 2010, 1-12.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部