期刊文献+

认知网络中一种基于频谱安全态势感知的路由方案 被引量:1

Spectrum Security Situational Awareness for Routing in Cognitive Radio Networks
下载PDF
导出
摘要 从构建准确的频谱态势图,实现频率资源充分利用的角度出发,针对目前在构建频谱态势图时没有考虑恶意用户(Malicious User,MU)存在的情况,结合克里金(Kriging)插值法估计空域内频谱干扰态势,通过地理位置检测方案识别MU,从而构建更准确、更安全的频谱态势图,并将其用于端到端的路由协议中。仿真结果表明,该方案能构建完整的频谱态势图,平均误差仅为0.106 dBm,能准确识别恶意用户,识别率高于80%;并且通过识别MU,在基于频谱态势图的路由过程中,可以减少路由跳数,增加可用频谱空间。 This paper concerns the construction of accurate spectral situation map, which can help to a- chieve frequency resource reuse. The traditional methods of constructing spectrum space situation map do not take the influence of malicious users(MUs) into consideration, but the scheme proposed in this paper makes use of Kriging interpolation to estimate the interference situation over a finite geographical area, and identifies malicious user by location detection method, then constructs a more accurate and more secure spectrum situation map. Finally, the spectrum situation map is applied in the end-to-end route protocols. Simulation results demonstrate that the proposed scheme can construct a complete spectrum situation map and the average error is only O. 106 dBm;it can accurately identify malicious users and the detection rate is higher than 80% ;it can reduce the routing hops and increase the available spectrum space in the process of routing based on spectrum situation map after identifying MUs.
出处 《电讯技术》 北大核心 2014年第9期1292-1297,共6页 Telecommunication Engineering
基金 国家自然科学基金资助项目(61271260)~~
关键词 认知无线电 频谱态势感知 干扰态势 恶意用户 KRIGING插值 路由 cognitive radio spectrum situational awareness interference situation malicious users Kriging interpolation route
  • 相关文献

参考文献11

  • 1Jayawiekrama B A, Dutkiewiez E,Oppermann I,et al. Im- proved performance of spectrum cartography based on com- pressive sensing in cognitive radio networks [C]// Pro- ceeding of 2013 IEEE International Conference on Commu- nications. Budapest, Hungary : IEEE ,2013:5657-5661.
  • 2Boecolini G, Hemandez-Penaloza G, Beferull-Lozano B. Wireless Sensor Network for Spectrum Cartography based on Kriging Interpolation [ C ]// Proceeding of 2012 IEEE 23rd International Symposium on Personal Indoor and Mo- bile Radio Communic.ations. Sydney, Australia: IEEE, 2012 : 1565-1570.
  • 3Dall'Anese E,Kim S J,Giannakis G B,et al. Power con- trol for cognitive radio networks under channel uncertainty [ J ]. IEEE Transactions on Wireless Communications, 2011,10(10) :3541-3551.
  • 4Mabapatra R, Strinati E C. Interference-aware dynamic: spectrum access in cognitive radio network [C]// Pro- ceeding of IEEE 22nd International Symposium on Per- son'al Indoor and Mobile Radio Communications. Toronto, Canada: IEEE ,2011:396-400.
  • 5Shih S Y,Chen K C. Compressed sensing construclion of spectrum map for routing in cognitive radio networks [ J ]. Wireless Communications and Mobile Computing, 2012, 12( 18 ) : 1592-1607.
  • 6Chen Z,Cooklev T,Chen C, et al. Modeling primary user emulation attacks and defenses in cognitive radio networks [ C ]// Proceeding of IEEE 28th International Perform- ance Computing and Communications Conference. Arizo- na, USA : 1EEE,2009:205-215.
  • 7冯文江,李俊.认知无线电中基于Kriging方法的干扰温度空域分布估计[J].重庆大学学报(自然科学版),2011,34(2):58-63. 被引量:2
  • 8Chen R, Park J M, Reed J H. Defense against primary us- er emulation attacks in cognitive radio networks [ J ]. IEEE Journal on Selected Areas in Communications, 2008,26( 1 ) :25-37.
  • 9逄德明,胡罡,徐明.基于能量指纹匹配的无线认知网络仿冒主用户攻击检测[J].计算机科学,2011,38(3):28-33. 被引量:11
  • 10张鹏明,李洪烈,林成浴.基于地理定位信息的移动自组网路由协议综述[J].电讯技术,2012,52(9):1552-1560. 被引量:4

二级参考文献61

  • 1杨志伟,杨家玮.认知无线电中的一种干扰温度估计算法[J].电子技术应用,2006,32(12):128-130. 被引量:8
  • 2张晓,邓建国.干扰温度机制的研究进展[J].中兴通讯技术,2007,13(3):19-23. 被引量:5
  • 3MITOI.A J, MAGUIRE G O. Cognitive radio: making soft-ware radios more personal [J].IEEE Personal Communications Magazine,1999,6(4) :13-18.
  • 4MITOI.A J . Cognitive radio for flexible mobile multimedia communications [C/OL ]//IEEE International Workshop on Mobile Multimedia Communications, San Diego, CA, USA, November 15-17, 1999 [2002-08-06]. http://ieeexplore, ieee. org/xpls/abs_all, jsp? ar number= 819467.
  • 5Spectrum Policy Task Force, ETDocket No. 02-135 [R]. Washington, D. C... FCC, 2002.
  • 6HAYKIN S. Cognitive radio: brain empowered wireless communications[J]. Selected Areas in Communications, IEEEJournal,2005, 23(2) :201 -220.
  • 7BRONEZ T P. On the performance advantage of Multitaper spectral analysis[J]. IEEE Transactions on Signal Processing,1992, 40(12): 2941-2946.
  • 8CLANCY T C. Formalizing the interference temperature model[J]. Wireless Communication and Mobile Computing, 2007,7(9) :1077-1086.
  • 9RIIHIJARVI J, MAHONEN P, WELLENS M, et al. Characterization and modelling of spectrum for dynamic spectrum access with spatial statistics and random fields [C/OL]// IEEE 19th International Symposium on Per sonal Indoor and Mobile Radio Communications, Cannes, September 15-18, 2008[2008-12-08]. http://ieeexplore, ieee. org/xpls/abs_all, jsp? arnumber= 4699912&tag=1.
  • 10WEISS T A, JONDRAL F K. Spectrum pooling: an innovation strategy for the enhancement of spectrum ef ficiency[J]. IEEE Communications Magazine, 2004, 12 (3) : 8-14.

共引文献14

同被引文献32

  • 1Prasad R, Mohr W, Konhauser W. Third generation moble communication system: London, Boston: Artech House, 2000.
  • 2Mitola J, Maquire GJ. Cognitive radios: making software radios more personal. IEEE Personal Communications, 1999, 6 (4): 13 -18.
  • 3Haykin S. Cognitive radio: brain-empowered wireless communications. IEEE JSAC, 2005,23 (2):201-220.
  • 4Clancy TC, Goergen N. Security in cognitive radio networks: threats and mitigation. Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on, Singapore, 15-17 May 2008: 1-8.
  • 5Ruiliang C, Jung-Min P, Reed JH. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 2008, 26(1): 25-37.
  • 6Kyasanur P, Vaidya DN. Selfish MAC layer misbehavior in wireless networks. IEEE Trans. on Mobile Computing, 2005, 4(5):502-516.
  • 7Ma LP, Han XF, Shen CC. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks. Proc. DySPAN, 2005:203- 213.
  • 8Pawelczak P, Prasad RV, Liang X, Niemegeers IGMM.Cognitive radio emergency networks - requirements and design. Proc. DySPAN, 2005: 601- 606.
  • 9Jakobsson M, Wetzel S, Yener B. Stealth attacks on ad hoc wireless networks. Proc. of the VTC. 2003.
  • 10Aad I, Hubaux JP, Knightly EW. Denial of service resilience in ad hoc networks. Proc. of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom'04). 2004: 202-217.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部