期刊文献+

认知无线电PUE攻击下次用户性能分析 被引量:8

Performance Analysis of Secondary Users in Cognitive Radio Network Under PUE Attack
原文传递
导出
摘要 随着认知无线电网络(CRN)技术的不断发展,安全问题日益受到重视。模仿主用户(PUE)是一种典型的易于实现且对CRN影响巨大的攻击行为,根据产生原因、目的和过程的差异,可以分为恶意不端次用户PUE和自私不端次用户PUE两类攻击。已有文献大多针对前者进行了分析,而对后者分析极少。这里重点对两者进行了区分,提出了四维连续时间马尔科夫链分析模型,详细分析了自私不端次用户PUE攻击对正常次用户通信性能的影响,并对比了几类典型的PUE攻击检测技术。通过仿真结果可以看出:PUE攻击检测技术引入自私不端次用户检测机制极为必要,可以有效改进检测效果。 CRN (Cognitive Radio Network), as an effective technology and a hot research topic, could solve the problem of resource deficiency and improve resource utilization. And its security technology attracts more and more attention from the researchers. PUE (Primary user emulation) is a typical attack of easy implementation and significant influence to CRN. PUE attack could be classified as MMU (malicious misbehavior secondary users) attack and SMU (selfish misbehavior secondary users) attack, and more study is focused on the former while less on the latter. This paper discusses in detail the distinction of MMU and SMU, and proposes an analysis model of 4D continuous time Markov chain for analyzing the communication performance of normal secondary users under PUE attack by SMUs. In addition, several PUE detection technologies are also compared. Simulation results indicate that the SMU detection mechanism is essential for the PUE attack detection technology, and this mechanism could greatly improve the detection effectiveness.
作者 肖天梅
机构地区 [
出处 《通信技术》 2013年第4期22-27,共6页 Communications Technology
关键词 认知无线电网络 频谱感知 通信性能 次用户 仿冒主用户 CRN (Cognition Radio Networks) spectrum sensing communication performance secondary user primary user emulation
  • 相关文献

参考文献14

  • 1MITOLA J, MAGUIRE G Q. Cognitive Radio: MakingSoftware Radios More Personal[J]. IEEE PersonalCommun.,1999,6(04):13-18.
  • 2Federal Communications Commission. Notice ofProposed Rule Making and Order: FacilitatingOpportunities for Flexible, Efficient, and Re-liable Spectrum Use Employing Cognitive RadioTechnologies[R]. ET Docket No. 03-108,USA: FCC,2005.
  • 3邓韦,朱琦.认知无线电系统中频谱感知方法的研究[J].通信技术,2007,40(11):76-77. 被引量:11
  • 4孙竞超,曹慧.一种分阶段频谱感知算法的研究[J].信息安全与通信保密,2011,9(6):48-50. 被引量:4
  • 5JIN Z, ANAND S, SUBBALAKSHMI K. Detecting PrimaryUser Emulation Attacks in Dynamic Spectrum AccessNetworks[C]//International Conference Communi-cation. Dresden, Germany: IEEE, 2009:1-5.
  • 6LIU Yao,NING Peng,DAI Huaiyu.AuthenticatingPrimary Users, Signals in Cognitive Radio Net-works via Integrated Cryptographic and WirelessLink Signatures[C]//Symposium on Security andPrivacy. Oakland, California: IEEE, 2010: 286-301.
  • 7JIN Z, ANAND S, SUBBALAKSHMI K P. PerformanceAnalysis of Dynamic Spectrum Access Networks underPrimary User Emulation Attacks[C]//Global Com-munications Conference, Exhibition & IndustryForum. Miami, Folrida, USA: IEEE, 2010: 1-5.
  • 8BALDINI G, STURMAN T, BISWAS A,et al. SecurityAspects in Software Defined Radio and CognitiveRadio Networks: A Survey and A Way Ahead[J]. IEEECommunications Surveys & Tutorials, 2011(03):1-25.
  • 9梁燕芬,殷瑞祥.认知无线电技术[J].信息安全与通信保密,2007,29(3):55-57. 被引量:11
  • 10ANAND S, JIN Z,SUBBALAKSHMI K P. An Analytical Modelfor Primary User Emulation Attacks in CognitiveRadio Networks[C]//International Symposium onDynamic Spectrum Access Networks. Chicago, USA:IEEE, 2008: 1-6.

二级参考文献39

  • 1田峰,程世伦,杨震.无线区域网和认知无线电技术(1)[J].中兴通讯技术,2006,12(4):61-64. 被引量:10
  • 2谭学治,姜靖,孙洪剑.认知无线电的频谱感知技术研究[J].信息安全与通信保密,2007,29(3):61-63. 被引量:25
  • 3[1]Mitola J.Cognitive Radio-An Integrated Agent Architecture for Software Defined Radio.PhDDissertation,Royal Inst.Technol.(KTH),Stockholm,Sweden,2000.
  • 4[2]Mitola J.Cognitive Radios:Making Software Radios more Personal.IEEE Personal Communications,August 1999,6(4):13-181
  • 5[3]Thomas Charles Clancy.Dynamic spectrum access in cognitive radio networks.http://hdl.handle.net/1903/3511,27-Apr-2006.
  • 6[4]Mitola J.Cognitive radio-making software radios more personal.IEEE Personal Communications,1999,6(4):13~181.
  • 7[1]ET Docket No.03-222-2003,Notice of proposed rule making and order[S].
  • 8[2]Digham F,Alouini M,Simon M.On the energy detection of unknown signals over fading channels[A].Proc.IEEE ICC[C].Baltimore,USA:IEEE,2005:3 575~579.
  • 9[3]Sahai A,Hoven N,Tanda R.Some fundamental limits in cognitive radio[C].Allerton Conf.on Commun,Control and Computing,2004:122~132.
  • 10[4]Ganesan G,Li T G.Cooperative spectrum sensing in cognitive radio networks[A].Proc.IEEE DySPAN[C].Baltimore,USA:IEEE,2005:137~143.

共引文献39

同被引文献38

  • 1钟佑明,金涛,秦树人.希尔伯特-黄变换中的一种新包络线算法[J].数据采集与处理,2005,20(1):13-17. 被引量:43
  • 2孙吉贵,刘杰,赵连宇.聚类算法研究[J].软件学报,2008(1):48-61. 被引量:1079
  • 3Fcc E T.Notice of Proposed Rule Making and Order[Z].2003.
  • 4Mitola J,Maguire G J.Cognitive Radio:Making Software Radios More Personal[J].IEEE Personal Communications,1999,6(4):13-18.
  • 5Chen Z,Cooklev T,Chen C,et al.Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks[C]//Proceedings of IPCCC’09.Phoenix,USA:IEEE Press,2009:208-215.
  • 6Prasad R.Special Issue on Cognitive Radio Techno-logies[J].Wireless Personal Communications,2008,45(3):277-279.
  • 7Anand S,Jin Z,Subbalakshmi K P.An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks[C]//Proceedings of NFDSAN’08.Chicago,USA:IEEE Press,2008:1-6.
  • 8Chen Ruiliang,Park J M,Reed J H.Defense Against Primary User Emulation Attacks in Cognitive Radio Networks[J].IEEE Journal on Selected Areas in Communications,2008,26(1):25-37.
  • 9Zhao Caidan,Wang Wumei,Huang Lianfen,et al.Anti-PUE Attack Based on the Transmitter Fingerprint IdenTification in Cognitive Radio[C]//Proceedings of the 5th International Conference on Wireless Com-munications,Networking and Mobile Computing.Beijing,China:[s.n.],2009:1-5.
  • 10Chen Ruiliang,Park J M.Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]//Proceedings of the 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.Reston,USA:IEEE Press,2006:110-119.

引证文献8

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部