期刊文献+

一种认知无线电仿冒主用户攻击的防御方案 被引量:1

A Defense Scheme of Primary User Emulation Attack in Cognitive Radio
下载PDF
导出
摘要 针对认知无线电网络中存在的仿冒主用户攻击问题,提出一种采用Hash链的防御方案。在主用户-主用户基站的通信阶段,通过自主更新Hash密钥对接收信号进行验证。而在主用户基站-认知用户的通信阶段,采用Hash链逆序发放的方法验证接收信号。利用Hash函数不可逆、防伪造的特点,提高方案的安全性,同时由于Hash链自主更新Hash值,无需在本地数据库预存大量数据,简化验证过程,减少系统开销,保证方案的高效性。分析结果表明,该方案能够有效防御认知用户网络中出现的仿冒主用户攻击。 In order to avoid the adverse effects of the Primary User Emulation Attack(PUEA) in Cognitive Radio(CR)network,an authentication scheme based on Hash chain is proposed.Two occasions are considered in this scheme pne is PUEA between primary users and primary user base station,the other is between primary user base station and secondary users.In the view of the former,the paper adopts the self-updating Hash values to realize the signal verification,while dealing with the latter by issuing the Hash chain in a reversed way.This scheme makes the best of Hash characteristics of the irreversible and the forgery prevention to ensure the security,while the properties of self-updating reduce the storage content and simplify the validation process,so that the overhead of system can be reduced and the efficiency of the scheme can be guaranteed.Analysis shows that this scheme can solve the PUEA in CR network effectively.
作者 马圣泓 龙敏
出处 《计算机工程》 CAS CSCD 北大核心 2016年第1期121-127,共7页 Computer Engineering
基金 湖南省自然科学基金资助项目(15JJ2007) 湖南省研究生科研创新基金资助项目(CX2013B376)
关键词 无线网络安全 仿冒主用户攻击 HASH链 认知无线电 频谱感知 wireless network security Primary User Emulation Attack(PUEA) Hash chain Cognitive Radio(CR) spectrum sensing
  • 相关文献

参考文献16

  • 1Fcc E T.Notice of Proposed Rule Making and Order[Z].2003.
  • 2Mitola J,Maguire G J.Cognitive Radio:Making Software Radios More Personal[J].IEEE Personal Communications,1999,6(4):13-18.
  • 3Chen Z,Cooklev T,Chen C,et al.Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks[C]//Proceedings of IPCCC’09.Phoenix,USA:IEEE Press,2009:208-215.
  • 4Prasad R.Special Issue on Cognitive Radio Techno-logies[J].Wireless Personal Communications,2008,45(3):277-279.
  • 5Anand S,Jin Z,Subbalakshmi K P.An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks[C]//Proceedings of NFDSAN’08.Chicago,USA:IEEE Press,2008:1-6.
  • 6肖天梅.认知无线电PUE攻击下次用户性能分析[J].通信技术,2013,46(4):22-27. 被引量:8
  • 7Chen Ruiliang,Park J M,Reed J H.Defense Against Primary User Emulation Attacks in Cognitive Radio Networks[J].IEEE Journal on Selected Areas in Communications,2008,26(1):25-37.
  • 8Zhao Caidan,Wang Wumei,Huang Lianfen,et al.Anti-PUE Attack Based on the Transmitter Fingerprint IdenTification in Cognitive Radio[C]//Proceedings of the 5th International Conference on Wireless Com-munications,Networking and Mobile Computing.Beijing,China:[s.n.],2009:1-5.
  • 9Chen Ruiliang,Park J M.Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]//Proceedings of the 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.Reston,USA:IEEE Press,2006:110-119.
  • 10逄德明,胡罡,徐明.基于能量指纹匹配的无线认知网络仿冒主用户攻击检测[J].计算机科学,2011,38(3):28-33. 被引量:11

二级参考文献48

  • 1刘元,彭端,陈楚.认知无线电的关键技术和应用研究[J].通信技术,2007,40(7):50-52. 被引量:20
  • 2梁燕芬,殷瑞祥.认知无线电技术[J].信息安全与通信保密,2007,29(3):55-57. 被引量:11
  • 3施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 4Prasad R. Special issue on" cognitive radio technologies" [J]. Wireless Personal Communications, 2008,45 ( 3 ) : 277-279.
  • 5Mitola J, Maquire G J. Cognitive radios., making software radios more personal[J]. IEEE Personal Communications, 1999,6 (4): 13-18.
  • 6Chen R, Park J M. Ensuring trustworthy spectrum sensing in cognitive radio networks[C] // IEEE Workshop on Networking Technologies for Software Defined Radio Networks. Reston, VA, USA, 2006 : 110-119.
  • 7Challapali K,Mangold S, Zhong Z. Spectrum agile radio: Deteering spectrum opportunities[C]//6th Annual International Symposium on Advanced Radio Technologies. Colorado. USA, 2004:23-27.
  • 8Olivieri M P,Barnett G A,Lackpour A,et al. A scalable dynamic spectrum allocation system with interference mitigation for teams of spectrally agile software defined radios [C] // First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway, NJ, USA, 2005.. 170- 179.
  • 9Cabric D,Mishra S M,Brodersen R W. Implementation issues in spectrum sensing for cognitive radios[C]//Thirty-Eighth Asilomar Conference on Signals, Systems and Computers. Piscataway, NJ, USA , 2004: 772-776.
  • 10DAVID R,IGNAS G N.Ad Hoc networking in future wireless communications[J].Computer Communications,2003,26(1):36-40.

共引文献22

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部