期刊文献+

一种SSDF攻击检测的证据理论合作频谱感知算法 被引量:1

A D-S Theory Cooperative Spectrum Sensing Algorithm with SSDF Attack Detection
下载PDF
导出
摘要 现有的基于证据理论的合作频谱感知认为所有认知用户都是诚实的,没有考虑恶意用户的存在。当恶意用户篡改本地感知的结果,发送错误的数据到数据融合中心,将会降低合作频谱感知的性能,这种攻击称为频谱感知数据篡改(spectrum sensing data falsification,SSDF)攻击。由于恶意用户发送的证据与其它认知用户的证据存在差别,本文使用Jousselme距离来衡量证据的可信度,提出一种SSDF攻击检测算法。数据融合中心接收所有认知用户的证据,让可信度低的证据不参与融合判决,可信度高的证据根据可信度进行加权融合。仿真结果表明,所提出的SSDF攻击检测算法在恶意用户发起SSDF攻击时可以很好的改善频谱感知性能。 The current cooperative spectrum sensing based theory of evidence think all cognitive users are honest and doesn't consider malicious users existing.When malicious user falsifies the local sensing result and sends error evidence to the data fusion center, it will reduce the cooperative spectrum sensing performance,which is called spectrum sensing data falsification(SSDF)attack.Due to the difference between the malicious user's evidence and other cognitive users',we use the Jousselme distance to calculate the credibility of evidence and proposes an SSDF attack detection algorithm.When the data fusion center receives all cognitive users' evidence, it excludes the evidence with lower credibility and combines higher credible evidence weighted according to credibility.As simulation results shown,the SSDF attack detection algorithm can improve the performance of cooperative spectrum sensing with malicious users existing.
出处 《信号处理》 CSCD 北大核心 2011年第7期1082-1087,共6页 Journal of Signal Processing
基金 国防预研(06081 1001050101) 国家973资助项目(2009CB320403)
关键词 合作频谱感知 证据理论 SSDF攻击 Jousselme距离 cooperative spectrum sensing evidence theory SSDF attack Jousselme distance
  • 相关文献

参考文献19

  • 1Haykin S. Cognitive radio:brain-empowered wireless communications[ J ]. IEEE J. Select Areas Commun, 2005, vol. 23(2) : 201-220.
  • 2Yucek T, Arslan H. A survey of spectrum sensing algorithms for cognitive radio applications [ J ]. IEEE Communications Surveys & Tutorials, 2009, 11(1) :116-130.
  • 3Ghasemi A, Sousa E S. Collaborative spectrum sensing for opportunistic access in fading environments [ C ] //DyS- PAN 2005, Baltimore :IEEE,2005,131-136.
  • 4Zhang Wei. Mallik R K, Ben Letaief K. Cooperative Spectrum Sensing Optimization in Cognitive radio Networks [ C ] //ICC'08, Beijing: IEEE, 2008, 3411-3415.
  • 5Zhi Quan, Shuguang Cui, Sayed A H. An Optimal Strategy for Cooperative Spectrum Sensing in Cognitive Radio Networks [ C ] // GlobeCom ' 07. Washington : IEEE, 2007, 2947-2951.
  • 6Sun Chunhua, Zhang Wei, Letaief K B. Cluster-Based Cooperative Spectrum Sensing in Cognitive Radio Systems[ C ] // IC C'07. Glasgow: I EEE, 2007,2511-2515.
  • 7Shen Bin, Cui Taiping, Kwak K, et al. An Optimal Soft Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Network [ C ] //WCNC 2009. Budapest : IEEE, 2009,1-5.
  • 8Ganesan G, Li Ye. Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks[J]. IEEE transactions on wireless communications, 2007, vol. 6 ( 6 ) : 2204-2213.
  • 9Ganesan G, Li Ye. Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks [ J ]. IEEE transactions on wireless communications, vol. 6( 6):2214- 2222.
  • 10Peng Qihang, Zeng Kun, Wang Jun, ect al. A Distributed Spectrum Sensing Scheme Based On Credibility and Evidence Theory in Cognitive Radio Context[ C ] //PIMC' 06, Helsinki : IEEE, 2006, 1-5.

二级参考文献34

  • 1Mitola III J, Maguire G Q. Cognitive radio: making soft- ware radios more personal [ J ]. IEEE Personal Communi- cations, 1999, vol. 6(4):3-18.
  • 2Haykin S. Cognitive radio:brain-empowered wireless com- munications [ J ]. IEEE Journal on Selected Areas in Com- munications, 2005, vol. 23 (2) : 201- 220.
  • 3Yueek T, Arslan H. A survey of spectrum sensing algorithms for cognitive radio applications [ J ]. IEEE Communications Surveys & Tutorials, 2009, 11(1) :116-130.
  • 4Ghasemi A, Sousa E S. Collaborative spectrum sensing for opportunistic access in fading environments [ C ] //J DyS- PAN 2005, Baltimore : IEEE,2005,131-136.
  • 5Zhang Wei. Mallik R K,Letaief K B. Cooperative Spectrum Sensing Optimization in Cognitive radio Networks [ C ]//ICC' 08, Beijing: IEEE, 2008, 3411-3415.
  • 6Quan Zhi, Cui Shuguang, Sayed A H. Optimal Linear Co- operative for Spectrum Sensing in Cognitive Radio Net- works[ J]. IEEE Journal of Selected Topics in Signal Pro- cessing, 2008, vol. 2( 1 ) :28-40.
  • 7Peng Qihang, Zeng Kun, Wang Jun, ect al. A Distribu- ted Spectrum Sensing Scheme Based On Credibility and Evidence Theory in Cognitive Radio Context [ C ]//J PIM- RC' 06, Helsinki:IEEE, 2006, 1-5.
  • 8Nhan Nguyen-Thanh, Insoo Koo. An Enhanced Coopera- tive Spectrum Sensing Scheme Based on Evidence Theory and Reliability Source Evaluation in Cognitive Radio Con- text [ J ]. IEEE Communications Letters, 2009, 13 (7) : 492-493.
  • 9Digham F F, Alouini M S, Simon M K. On the Energy Detection of Unknown Signals Over Fading channels [ J ]. IEEE Transactions on Communications, 2007, 55 (1) :21- 24.
  • 10WANG Yang, ZHENG Qin-Bo, ZHANG Jun-Ping, Target classification of the data fusion in multichannel using Dempster-Shafer method[J]. Journal of Infrared Millimeter Waves(汪洋,郑亲波,张钧屏.用证据理论方法进行多波段数据融合

共引文献263

同被引文献15

  • 1Zhao Q. , Sadler B. M.. A survey of dynamic spectrum access[J]. IEEE Signal Processing Magazine, 2007, 24 (3) : 79-89.
  • 2Pal R. , Idris D. , Pasari K. , Prasad N.. Characterizing reliability in cognitive radio networks[ C ]// ISABEL'08. Aalborg: IEEE, 2008: 1-6.
  • 3FalTag M., E1-Khamy M., EI-Sharkawy M.. C44. se- cure cooperative blindly-optimized compressive spectrmn sensing for cognitive radio [ C ] // NRSC 2012. Cairo: IEEE, 2012: 533-540.
  • 4Shen J, Liu S, Zeng L, Xie G, Gao J, Liu Y. Optimisa- tion of cooperative spectrum sensing in cognitive radio network [ J ]. lET Communieations, 2009, 3 ( 7 ) : 1170-1178.
  • 5Chen R. L. , Park J M, Bian K.G.. Robust distributed spectrum sensing in cognitive radio networks [ C ]// IN- FOCOM 2008. Phoenix: IEEE, 2008: 1876-1884.
  • 6Akbari M. , Falahati A.. SSDF protection in cooperative spectrum sensing employing a eomputati.nal trust evalua- tion algorithm[ C] // 1ST 2010. Tehran: IEEE, 2010: 23 -28.
  • 7Fannani F. , Jannat-Abad M. A. , Berangi R. l)etection of SSDF attack using SVDD "algorithm in cognitive radio net- works[ C]// CICSyN 2011. Bali: IEEE, 2011 : 201-204.
  • 8Tang H. , Yu F. R. , Huang M. , Li Z.. Distributed con- sensus-based security mechanisms in cognitive radio mo-bile ad hoc networks[J ]. lET Communications, 2012, 6 (8) : 974-983.
  • 9冯景瑜,卢光跃,包志强.认知无线电安全研究综述[J].曲安邮电学院学报,2012,17(2):47-52.
  • 10Xu S, Shang Y, Wang H. Double thresholds based coop- erative spectrum sensing against untrusted secondary users in cognitive radio networks [ C ]// VTC 2009-Spring. Bar- celona: IEEE, 2009 : 1-5.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部