期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
基于Duffing振子的DSSS信号率线检测 被引量:1
1
作者 金虎 《电讯技术》 北大核心 2011年第7期42-46,共5页
为了提高DSSS信号率线检测器性能,将Duffing振子用于DSSS信号的率线检测。阐述了基于Duffing振子的检测方法,给出了扩频信号和Duffing振子策动力的相差与最低可检测信噪比之间的关系曲线及方程。仿真表明,该方法能检测到信噪比为-29.01... 为了提高DSSS信号率线检测器性能,将Duffing振子用于DSSS信号的率线检测。阐述了基于Duffing振子的检测方法,给出了扩频信号和Duffing振子策动力的相差与最低可检测信噪比之间的关系曲线及方程。仿真表明,该方法能检测到信噪比为-29.01 dB的DSSS/BPSK信号。 展开更多
关键词 直接序列扩频信号 率线检测 DUFFING振子 混沌微弱信号检测
下载PDF
Adaptive double-threshold energy detection algorithm for cognitive radio 被引量:1
2
作者 苏倩 宋铁成 +1 位作者 胡静 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期351-356,共6页
Due to the fact that the conventional spectrum sensing algorithm is susceptible to noise, an adaptive double-threshold energy detection algorithm for a cognitive radio is proposed. Based on double-threshold energy det... Due to the fact that the conventional spectrum sensing algorithm is susceptible to noise, an adaptive double-threshold energy detection algorithm for a cognitive radio is proposed. Based on double-threshold energy detection, the algorithm can adaptively switch between one-round sensing and two-round sensing by comparing the observations with the pre-fixed thresholds. Mathematical expressions for the probability of detection, the probability of false alarm, and the sensing time are derived. The relationships including signal to noise ratio (SNR) vs. the probability of detection and SNR vs. the sensing time are plotted using Monte Carlo simulation and the algorithm is verified in a real cognitive system based on GNU Radio and universal software radio peripheral (USRP). Simulation and experimental results show that, compared with the existing spectrum sensing method, the proposed algorithm can achieve a higher probability of detection within a reasonable sensing time. 展开更多
关键词 energy detection software radio probability of detection sensing time
下载PDF
Joint Optimal Sensing Threshold and Subcarrier Power Allocation in Wideband Cognitive Radio for Minimising Interference to Primary User 被引量:3
3
作者 刘鑫 贾敏 顾学迈 《China Communications》 SCIE CSCD 2013年第11期70-80,共11页
Cognitive Radio (CR) can use the fre- quency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wid... Cognitive Radio (CR) can use the fre- quency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wideband CR system where the Secondary User (SU) mini- raises its interference to the PU by jointly al- locating the optimal sensing threshold and sub- carrier power. A multi-parameter optimization problem is formulated to obtain the joint opt- imal allocation by alternating direction opti- mization, which minimises the total interfer- ence to the PU over all of the subcarriers sub- ject to the constraints on the throughput, Bit Error Rate (BER) and maximal total power of the SU, the subcarrier rate and interference power of the PU, and the false alarm and mis- detection probabilities of each subcarrier. The simulation results show that the proposed joint allocation algorithm can achieve the desired mitigation on the interference to the PU at the different subcarrier gains. 展开更多
关键词 cognitive radio energy detection power allocation INTERFERENCE
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
4
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
BLIND DETECTION FOR MULTI-RATE DS-CDMA SYSTEM WITH ANTENNA ARRAY AT THE BASE STATION
5
作者 Zhang Yiwen Yin Qinye +1 位作者 Sun Ronghai Ding Le 《Journal of Electronics(China)》 2006年第6期820-824,共5页
In this paper, we propose the blind space-time high rate multi-user detector for synchronous uplink multi-rate Direct Sequence Code Division Multiple Access (DS-CDMA) systems with antenna array at the base station. ... In this paper, we propose the blind space-time high rate multi-user detector for synchronous uplink multi-rate Direct Sequence Code Division Multiple Access (DS-CDMA) systems with antenna array at the base station. By employing antenna array at the base stations, the spatial dimension is used efficiently to suppress co-channel interference and increase the capacity for multi-rate CDMA system. After low rate physical users in the system are modeled as corresponding high rate virtual users, we construct the space-time signature vectors of virtual users. And subspace projection algorithm is employed to estimate space-time signature vectors blindly. Then a soft-decision high rate lnultiuser detector is proposed based on the estimated signature vectors, which avoids estimating the ambiguous complex factors which are necessary in traditional blind detector. Numerical simulation results evaluate the performance in terms of Bit Error Rate (BER) for the proposed scheme. Simultaneously, it demonstrates that the system capability increases two times when using twoelement antenna array. 展开更多
关键词 MULTI-RATE Multiuser detection Antenna array Subspace projection
下载PDF
Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm
6
作者 刘春凤 舒炎泰 +1 位作者 YANG Oliver 李明远 《Transactions of Tianjin University》 EI CAS 2010年第2期104-108,共5页
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ... The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy. 展开更多
关键词 ad hoc networks selfish behavior DETECTION CUSUM
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部