期刊文献+

传感网络信道奇异类信号检测研究 被引量:3

Singular Signal Detection Research on Wireless Sensor Network Channel
下载PDF
导出
摘要 由于传统的无线传感网络信道中奇异类信号检测方法,受到码间串扰致使信道传输性能下降,通信信号波形难以保持原状,造成奇异类信号特征失真,检测准确率下降,误检率和漏检率升高。提出信道采样信号局部特征压缩和最小二乘法理论相结合奇异类信号检测方法。利用多普勒频移补偿奇异类信号局部特征的预测值避免信号传播的延时性,达到码间串扰下检测准确率的目的,通过最小二乘法对预测值进行局部特征压缩和修正,对特征信号进行提取,实现对码间串扰下无线传感网络信道中奇异类信号的检测。仿真结果表明,所提方法检测性能较于传统方法有了明显提高,并降低了奇异类信号检测的误检率和漏检率,在一定程度上提高了无线传感网络的安全性能。 The paper proposed a singular signal detection method which combines partial feature compression of channel sampling signal with least squares theory. Doppler frequency shift was used to compensate the forecast value of the singular class local signal characteristics, to avoid signal propagation delay and reach the purpose of detection accuracy under the intersymbol interferenee. Least square method was used to forecast the local characteristics of compression and correction, to extract characteristic signal and realize the intersymbol interference in the wireless sensor network channel under the singular signal detection. Detection performance simulation results show that the proposed method has been obviously improved, which reduces the singular signal error detection rate of class and miss rate, and improves the performance of wireless sensor network security to a certain extent.
作者 任鹏
出处 《计算机仿真》 CSCD 北大核心 2016年第4期344-347,共4页 Computer Simulation
关键词 码间串扰 无线传感网络 奇异类信号 Intersymbol interference Wireless sensor network (WSN) Singnlar signal
  • 相关文献

参考文献11

二级参考文献60

  • 1赵道利,梁武科,罗兴锜,张彦宁.水电机组振动信号的子带能量特征提取方法研究[J].水力发电学报,2004,23(6):116-119. 被引量:27
  • 2HANJW KAMBERM 范明 孟小峰 译.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 3ALLEN J, CHRISTIE A. State of Practice of Intrusion Detection Technologies [R]. Technical Report CMU/SEI-99-TR-028, 1999.
  • 4FAYYAD U, HAUSSLER D, STOLORZ P. Mining scientific data [J]. Communications of the ACM, 1996, 39(11): 51-57.
  • 5STOLFO S J, HERSHKOP S, WANG K. A behavior-based approach to securing email systems[A]. MMM-ACNS[C]. Petersburg, Russia,2003. 57-81.
  • 6LEE W, STOLFO S J, MOK K E. A data mining framework for building intrusion detection models[A]. IEEE Security and Privacy[C]. New York, 1999. 120-132.
  • 7CHAN P, FAN W, PRODROMIDIS A. Distributed data mining in credit card fraud detection[J]. IEEE Intelligent Systems, 1999,14(6):67-74.
  • 8BOWEN T, CHEE D, SEGAL M. Building survivable systems: an integrated approach based on intrusion detection and damage containment[A]. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition[C]. 2000.
  • 9CHEN M S, LEE C H. Sliding-window filtering: an efficient algorithm for incremental mining[A]. CIKM[C]. New York, USA,2001. 263-270.
  • 10AGRAWAL R, IMIELINSKI T, SWAMI A. Mining association rules between sets of items in large databases[A]. Proc of ACM SIGMOD[C]. 1993. 207-216.

共引文献132

同被引文献32

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部