期刊文献+

基于二维特征的认知无线电仿冒授权用户检测

Detection of Primary User Emulation in Cognitive Radio Based on Two-dimensional Features
下载PDF
导出
摘要 针对认知无线电网络中传统方法信号特征检测性能较弱的问题,提出一种基于二维特征的信号检测方法,并将其用于仿冒授权用户检测。在传统决策理论的基础上,给出一种新的决策参数:零中心归一化瞬时能量绝对值的平均值,将其与盒维数构成一个二维特征参数矢量,作为支持向量机分类器的输入进行信号识别,判断仿冒授权用户攻击是否存在。仿真结果表明,在信噪比达到5 dB时,该算法能完全判别仿冒授权用户攻击是否存在。即使在信噪比为0的环境中,也能在保证对合法授权用户干扰很小的前提下,以较高的概率检测出仿冒授权用户攻击,具有较强的抗噪性能。 To overcome the shortage of traditional signal feature detection algorithms in Cognitive Radio(CR) networks, a novel detection algorithm for primary user emulation based on two-dimensional features is proposed. It puts forward a new instantaneous characteristics parameter, which is called the average value of the zero-centered and normalized instantaneous energy's absolute value, based on traditional decision theory. A two-dimensional vector, which is composed of the new parameter and box dimension, is constructed. This two-dimensional vector is used to judge whether the Primary User Emulation(PUE) attack is present or not, by using classifier based on Support Vector Machine(SVM). Simulation result shows that, the proposed algorithm can effectively identify primary user attacker while the signal-to-noise ratio is 5 dB, and even in 0 dB environment, it has a high detection probability of PUE attack, in guarantee to have little interference to primary user. Namely, the proposed algorithm has a strong anti-noise performance.
出处 《计算机工程》 CAS CSCD 2014年第6期20-24,共5页 Computer Engineering
基金 国家自然科学基金青年基金资助项目(61101141) 中央高校基本科研业务费专项基金资助项目(HEUCF120807)
关键词 认知无线电 仿冒授权用户 二维特征 盒维数 瞬时特征 支持向量机 Cognitive Radio(CR) Primary User Emulation(PUE) two-dimensional features box dimension instantaneous characteristic Support Vector Machine(SVM)
  • 相关文献

参考文献12

  • 1Wang Shaowei, Zhou Zhihua, Ge Mengyao, et al.Resource Allocation for Heterogeneous Cognitive Radio Networks with Imperfect Spectrum Sensing[J].IEEE Journal on Selected Areas in Communications, 2013, 31(3): 464-475.
  • 2李一兵,杨蕊,高振国.基于着色理论的认知无线电频谱分配算法[J].系统工程与电子技术,2010,32(6):1109-1112. 被引量:17
  • 3Fragkiadakis A G, Tragos E Z, Askoxylakis I G.A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks[J].IEEE Communications Surveys & Tutorials, 2013, 15(1): 428-445.
  • 4Kaligineedi P, Khabbazian M, Bhargava V K.Secure Coo- perative Sensing Techniques for Cognitive Radio systems[C]// Proc.of IEEE International Conference on Communications.[S.1.]: IEEE Press, 2008: 3406-3410.
  • 5Tan Yi, Sengupta S, Subbalakshmi K P.Analysis of Coor- dinated Denial-of-service Attacks in IEEE 802.22 Networks[J].IEEE Journal on Selected Areas in Communications, 2011, 29(4): 890-902.
  • 6薛楠,周贤伟,辛晓瑜,李丹,杨桢.一种解决认知无线电网络模仿主用户攻击问题的方案[J].计算机科学,2009,36(8):45-48. 被引量:11
  • 7Federal Communication Commission.NPRM03-322-2003 Facilitating Opportunities for Flexible Efficient, and Reliable Spectrum Use Employing Cognitive Radio Technologies[S].2003.
  • 8李建东,冯祥.基于支持矢量机和循环累积量的调制识别算法[J].系统工程与电子技术,2007,29(4):520-523. 被引量:9
  • 9刘佳,马惠珠.基于二阶循环统计量的频谱感知方法[J].应用科技,2009,36(1):60-63. 被引量:2
  • 10Azzouz E E, Nandi A K.Automatic Identification of Digital Modulations Types[J].Signal Processing, 1995, 47(1): 55-69.

二级参考文献59

  • 1MITOLA J, MAGUIRE G. Cognitive radio: making software radios more personal [ J ]. IEEE Personal Communications Magazine, 1996,6(4) : 13-18.
  • 2CABRIC D,MISHRA S M, BRODERSEN R W. Implementation issues in spectrum sensing for cognitive radio [ C ]// Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Pacific grove. Sacramento, USA, 2004 : 772-776.
  • 3DIGHAM F,ALOUINI M, SIMON M. On the energy detection for unknown signal over fading channels [ J ]. IEEE Transaction Communications ,2007,55 ( 1 ) :21-24.
  • 4张先达,保铮.非平稳信号分析与处理[M].北京:国防工业出版社,1998.
  • 5FEHSKE A,GAEDDERT J D,REED J H. A new approach to signal classification using spectral correlation and neural networks [ C ]//New Frontiers in Dynamic Spectrum Access Networks,2005 First IEEE International Symposium. Baltimore, USA, 2005 : 144 - 150.
  • 6TANG H. Some physical layer issues of wide-band cognitive radio system [ C ]//New Frontiers in Dynamic Spectrum Access Networks, 2005 First IEEE International Symposium, 2005 : 144-150. : 151-159.
  • 7DANDAWATE A V. Statistical test for presence of cyclostationarity[ J ]. IEEE transactions on Signal Processing, 1994, 42(9) :2355-2369.
  • 8HURD H L, GERR N L. Graphical methods for determining the presence of periodic correlation [J].Time Series Anal, 1991,12(4) :337-350.
  • 9Prasad R. Special issue on" cognitive radio technologies" [J]. Wireless Personal Communications, 2008,45 ( 3 ) : 277-279.
  • 10Mitola J, Maquire G J. Cognitive radios., making software radios more personal[J]. IEEE Personal Communications, 1999,6 (4): 13-18.

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部