全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

分布式协作频谱感知的信誉模型

DOI: 10.13190/j.jbupt.2015.04.012, PP. 55-59

Keywords: 认知无线电网络,分布式协作,频谱感知,频谱感知数据伪造,信誉模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

协作感知技术能大大提高认知无线电网络中的频谱感知效果,但也会产生一些安全隐患,如频谱感知数据伪造攻击.针对单个恶意次用户发起的连续性频谱感知数据伪造攻击和若干个恶意次用户发起的非连续性频谱感知数据伪造攻击,设计并实现了一种分布式协作频谱感知的信誉模型.仿真实验表明,该模型能有效地识别恶意次用户和抵御频谱感知数据伪造攻击.同时,该模型还具有较小的虚警率、丢失率和较好的容错能力.

References

[1]  Mitola J, Maguire J G Q. Cognitive radio: making software radios more personal[J]. Personal Communications, IEEE, 1999, 6(4): 13-18.
[2]  周小飞, 张宏纲. 认知无线电原理及应用[M]. 北京: 北京邮电大学出版社, 2007.
[3]  申滨, 王舒, 黄琼, 等. 认知无线电最优用户选择协作频谱感知[J]. 北京邮电大学学报, 2014, 37(2): 32-37. Shen Bin, Wang Shu, Huang Qiong, et al. Cognitive radio users to choose the optimal cooperative spectrum sensing[J]. Journal of Beijing University of Posts and Telecommunications, 2014, 37(2): 32-37.
[4]  Feng Jingyu, Zhang Yuqing, Lu Guangyue, et al. Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment[C] //Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. IEEE Computer Society, 2013: 1656-1661.
[5]  Attar A, Tang Helen, Vasilakos A V, et al. A survey of security challenges in cognitive radio networks: solutions and future research directions[J]. Proceedings of the IEEE, 2012, 100(12): 3172-3186.
[6]  Abdelhakim M, Lightfoot L E, Ren Jian, et al. Distributed detection in mobile access wireless sensor networks under byzantine attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(4): 950-959.
[7]  Fragkiadakis A G, Tragos E Z, Askoxylakis I G. A survey on security threats and detection techniques in cognitive radio networks[J]. Communications Surveys and Tutorials, IEEE, 2013(1): 428-445.
[8]  Lu Jianqi, Wei Ping, Chen Zhe. A scheme to counter SSDF attacks based on hard decision in cognitive radio networks[J]. Wseas Transactions on Communications, 2014, 13(1): 242-248.
[9]  Lin Hui, Hu Jia, Ma Jianfeng, et al. A role based privacy-aware secure routing protocol for wireless mesh networks[J]. Wireless Personal Communications, 2014, 75(3): 1611-1633.
[10]  Parvin S, Hussain F K, Hussain O K. Conjoint trust assessment for secure communication in cognitive radio networks[J]. Mathematical and Computer Modelling, 2013, 58(5): 1340-1350.
[11]  Letaief K, Zhang Wei. Cooperative communications for cognitive radio networks[J]. Proceedings of the IEEE, 2009, 97(5): 878-893.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133