CN101420758B - Method for resisting simulated main customer attack in cognitive radio - Google Patents

Method for resisting simulated main customer attack in cognitive radio Download PDF

Info

Publication number
CN101420758B
CN101420758B CN2008102274316A CN200810227431A CN101420758B CN 101420758 B CN101420758 B CN 101420758B CN 2008102274316 A CN2008102274316 A CN 2008102274316A CN 200810227431 A CN200810227431 A CN 200810227431A CN 101420758 B CN101420758 B CN 101420758B
Authority
CN
China
Prior art keywords
signal
log
cognitive
identification
transient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008102274316A
Other languages
Chinese (zh)
Other versions
CN101420758A (en
Inventor
周贤伟
杜利平
王建萍
李丹
杨桢
王超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN2008102274316A priority Critical patent/CN101420758B/en
Publication of CN101420758A publication Critical patent/CN101420758A/en
Application granted granted Critical
Publication of CN101420758B publication Critical patent/CN101420758B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A method for resisting primary user impersonation attacks in cognitive radio belongs to the technical field of radio communication, particularly relates to sensing and processing of the signals in the cognitive radio system and identification of a signal source. The method comprises the following steps: reducing noise of a composite signal which is received during a spectrum sensing process, estimating number of the signal sources in the composite signal, and reconstructing various signals by a Capon beamformer; separating the signals of different radios, focusing the signals of different radios to separate out a transient signal and a modulation signal, analyzing the transient signal by wavelet transformation; extracting characteristic parameters and realizing identification of the signal source. The method for resisting the primary user impersonation attacks helps realize effective identification of the signal source and effectively resist the primary user impersonation attacks; and the method has a wide application scope, does not change a working mode of the existing primary user network, and satisfies operation requirements of FCC for a cognitive network.

Description

The method of antagonism simulated main customer attack in a kind of cognitive radio
Technical field
A kind of method of resisting simulated main customer attack belongs to wireless communication technology field in the cognitive radio, the particularly perception of signal and processing in the cognitive radio system, and to the identification of signal source identity.
Background technology
Cognitive radio networks is as a kind of intelligent radio communication system, and it can perception, the study surrounding environment, and the messaging parameter of adjusting oneself adapts to environmental change on every side.Cognitive user is dynamically utilized idle mandate frequency range with " chance mode " on the basis that does not influence the authorized user proper communication, can well solve present frequency spectrum resource problem of shortage.
Cognitive user has the ability of transmitting on each frequency of most of frequency bands, can use many communication channels in the consolidated network, and this makes it more complicated more than the physical layer of conventional wireless network, also is faced with more attack.Wherein mainly be simulated main customer and forge the frequency spectrum perception data and attack at what dynamic spectrum inserted.Simulated main customer attack can have a strong impact on the frequency spectrum perception process in the cognition network, and can obviously reduce legal understanding user's available channel resources.For fear of disturbing or make cognitive user miss the access chance because of the frequency spectrum perception mistake produces main user, thereby cognitive user must have the ability antagonism simulated main customer attack of the main user identity of identification.One of major technique challenge that is frequency spectrum perception is exactly how to distinguish main subscriber signal and cognitive user signal accurately.
The method that detects main user's transmission at present mainly contains non-cooperative detection, cooperative detection and Interference Detection.Wherein non-cooperative detection (also claiming emission source to detect) comprises: detect (waveform-based sensing) based on energy measuring (Energy Detection) or based on signal characteristic.Wherein using filter match detection (Matched Filter Detection) or cyclic stationary process to detect (Cyclostationary Feature Detection) technology based on the signal characteristic detection technique realizes signal essence Feature Recognition.Energy measuring belongs to blind Detecting, and detection signal be need not any priori.But it can only detect the signal appearance, can not distinguish the type of signal, and promptly it can not distinguish modulated signal noise and interference.When perception is easy to be subjected to selfish or during the invasion of the cognitive user of malice, can not discerns main user identity.Present a kind of improved plan is to introduce " quiet period ", and its prerequisite is that all cognitive user all are cooperations, if exist this scheme of malice cognitive user to collapse fully.Matched filtering detection and cyclic stationary process detect the substantive characteristics that can detect signal, the identification source identity, but need have priori and at different main user's matched filtering detections independent matched filter will be arranged the cognitive user signal.In addition feature detection is combined with analysis of spectrum, and in conjunction with improving the performance and the efficient of detection based on the pattern recognition of neural net.
At the influence of multipath fading in the wireless transmission and shadow effect, especially overcome " concealed terminal " problem that shadow fading causes, introduce the cooperative detection technology, its structure can be centralized, also can be distributed.Introduce the cooperation diversity technique cooperative detection can produce perceptual performance more accurately, but can have a negative impact, and study under the main customer location known case of its hypothesis for resource-constrained network.Propose " local oscillator leakage " for main customer location condition of unknown and detect, utilize the local oscillator leakage power that detects to come positioning main user, the while can utilize the cooperation between CR to improve the detection probability of weak signal.Consideration is by the interference of cognitive user to main custom system, and FCC proposes the interferometry model---and the interference temperature detection model mainly is to consider the interference of restriction to main subscriber signal.
For the cognitive radio networks that uses the TV frequency range,, therefore can utilize sender's position and signal power level to distinguish main subscriber signal and cognitive user signal because main user is the TV television tower.Can determine sender's identity by the power level of uniting the positional information of using the sender and received signal.How accurately to obtain sender's positional information at the problem difficult point at present two kinds of technology are arranged: distance is than verification and range difference verification (Distance Ratio Test (DRT) and Distance Difference Test (DDT)).The former determines that according to the intensity of the signal source that location confirmation person receives sender position, its scope of application are large scale decline models, and will priori be arranged to main customer location; The dependent phase difference that the same signal of The latter produces through different paths (distance) in-position affirmant is determined sender's position.At main when being the littler portable terminal of transmitted power, a kind of scheme of effective antagonism simulated main customer attack is to utilize " Radio Environment Map " notion (REM) at present, REM is a database that comprises main location of user equipment and action message, can utilize these information to discern main user, its concrete enforcement schemes also need further be studied.
Summary of the invention
The purpose of this invention is to provide in a kind of cognitive radio and can discern user identity, effectively resist the method for simulated main customer attack simultaneously variety of network types is general---utilize the method for signal " transient state fingerprint characteristic " identification user identity.So-called transient signal is meant the non-stationary signal that is full of the radio station fine feature of the non-modulated that the radio station powered on moment produces.The present invention is by utilizing the transient signal in wavelet transformation analysis radio station, and the binding pattern recognition technology is judged the identity of signal sender then.Utilize the present invention can in various forms of cognitive radio networks, realize differentiation, thereby immediately vacate the frequency range effectively attack of antagonism simulated main customer simultaneously for the main user who occurs to the signal sender identity.
Technical solution of the present invention:
A kind of method of resisting simulated main customer attack in the cognitive radio networks, form by following step:
Step 1: the mixed signal that the frequency spectrum perception process receives is carried out noise reduction process.
Consider that a cognitive radio system is made up of M main user and N cognitive user, each cognitive user can both independently be carried out frequency spectrum perception, and the mixed signal that perceives in a certain cognitive user of synchronization comprises main subscriber signal and the tentative q of being of non-main subscriber signal number (because the uncertain q that main user occurs is a random number).Only consider the white noise in the signal, utilize the soft-threshold method of wavelet analysis that mixed signal is carried out noise reduction, can be good at keeping the former characteristic spikes point that makes signal, and computational speed is fast.Because the waveform of small echo has important value to the signal noise silencing effect, therefore to select suitable small echo according to the original mixed signal waveform, thereby reach good de-noising effect choosing of small echo.
Step 2: the number to information source in the mixed signal is estimated.
Correct estimation information source number is the basis of subsequent analysis and processing, the signal that contains what radio station in the mixed signal is estimated the accuracy of its estimation directly influences subsequent analysis and processing.Each signal in the mixed signal that the consideration cognitive user receives is incoherent, and noise is white Gaussian noise (AWGN), noise and signal independence and noise power the unknown.Estimate the information source number in this employing based on information-theoretical method (MDL criterion and AIC criterion).If antenna has p array element, receive signal s from q information source i(t) (i=1,2..., q).The ergodic Gaussian random process of steadily answering of signal.N snap X (t) is:
x ( t ) = Σ i = 1 q A ( Φ i ) s i ( t ) + n ( t ) - - - ( 1 )
S wherein i(t) be t i signal constantly, p * 1 complex vector A (Φ i) be the incident angle of i signal to each array element.P * 1 complex vector n (t) represents t additive white noise constantly, is the ergodic Gaussian random process of answering stably, and average is zero, and covariance is σ 2I (σ 2The unknown, I is a unit matrix).Signal and noise are separate.The number q in requirement estimated signal source from the N sample.
Consider X={x (1) ..., x (N) } and be independent identically distributed situation, wherein each value all is the multiple Gaussian random vector of zero-mean.Each covariance matrix: R (k)(k)+ σ 2I
Ψ wherein (k)Represent order be k ∈ 0,1 ..., the positive semidefinite matrix of p-1}, σ 2Represent unknown noise power.Ψ=ASA H, A HThe clothes conjugation of expression A, the covariance matrix of S representation signal has
Figure G2008102274316D00032
A is the matrix of p * q: Suppose that A is a full rank, S is nonsingular, and then the order of Ψ is q, and p-q the minimal eigenvalue that Ψ is described is zero.The list of feature values of R is shown λ 1〉=λ 2〉=... 〉=λ p, its minimum p-q characteristic value equals σ 2AIC criterion is:
AIC ( k ) = - 2 log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 2 k ( 2 p - k ) - - - ( 2 )
The MDL criterion is:
MDL ( k ) = - log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 1 2 k ( 2 p - k ) log N - - - ( 3 )
The information source number equals to make the k value of AIC or MDL criterion minimum, k ∈ 0,1 ..., p-1}.
Step 3: adopt each signal of Capon Beam-former reconstruct, with the Signal Separation in different radio station.
Wave beam forms and is divided into two classes: classical wave beam is formed on and carries out the information source recovery under the condition of knowing expectation information source direction of arrival in advance; Blind wave beam forms the recovery that then requires to carry out information source under the situation of the unknown expectation information source direction of arrival.When adopting the Capon Beam-former to recover source signal, the direction of supposing a certain signal source is a desired orientation, and the direction of other signal sources is an interference radiating way.Calculate the optimum right vector of this direction, and finally recover the source signal of this direction.
Restoring signal output: y ( n ) = w H x ( n ) = Σ m = 1 M w m * x m ( n ) - - - ( 4 )
W=[w wherein 1..., w M] TBe weight vector, x (n) is each array element received signal vector.Adopt different weight vector following formulas that the different directions electric wave is had different responses, thereby form the spatial beams of different directions.
Step 4: the signal in each radio station is focused on separation transient signal and modulation signal.
Thereby the singular point that utilizes wavelet transformation to find out between transient signal and the modulation signal separates both.The Lipschitz index can be used for describing singularity of signal, metric signal on one point regularity or in the consistent regularity of a time period.Generally, Signal Singularity in two kinds of situation: signal is carved at a time and is undergone mutation, and makes signal waveform discontinuous, this Lipschitz index α=0; Signal waveform is continuous, and amplitude is sudden change not, but the single order differential of signal is discontinuous at certain point, this Lipsehitz index 0<α<1.Function certain point continuously, can be little, be 1 then at the Lipschitz of this some index α.Lipschitz index 0<α<1 of transient signal; Modulation signal is a continuously smooth, its Lipschitz index α 〉=1.Therefore can separate transient signal and modulation signal by the Lipschitz index that calculates singular point.
If function f in certain neighborhood that v is ordered be consistent Lipschitz α's and α>m, then f in this neighborhood must be m time continuously differentiable.Lipschitz index α is big more, and function is smooth more.Utilize small echo then can provide function in an interval even the regularity of a bit.At this, employed small echo must have the vanishing moment of corresponding exponent number.
The Taylor expansion form of function: f (t)=p v(t)+ε v(t) (| ε v(t) |≤K|t-v| α).p vBe the m order polynomial,
Figure G2008102274316D00051
Carry out wavelet transformation, have the small echo Ψ (t) and the multinomial quadrature that is less than or equal to the n-1 rank of n rank square, then:
Wf(u,s)=Wp v(u,s)+Wε v(u,s)=Wε v(u,s) (5)
ε v(t) be the amount of weighing Lipschitz.Therefore, can pass through | and Wf (u, s) | approach Lipschitz α.
Log 2| Wf (u, s) |≤log 2A+ (α+1/2) log 2S wherein A is greater than zero constant.(6)
The Lipschitz regularity of point v equals log 2| Wf (u, s) | as log 2The function of s deducts 1/2 along the greatest gradient of the very big curve that converges on v, thereby obtains the Lipschitz index of signal.
Step 5: utilize wavelet transformation that transient signal is analyzed, extract characteristic parameter.
The transient signal that separation is obtained carries out wavelet analysis, obtains wavelet coefficient, therefrom chooses a certain proportion of wavelet coefficient as characteristic vector, draws eigenvectors matrix.Continuous wavelet transform (CWT) is:
X a , b = 1 | a | ∫ x ( t ) Ψ * ( t - b a ) dt - - - ( 7 )
Wherein Ψ (t) is female small echo.A, b are called scale factor and shift factor.
Wavelet transform (DWT) is:
X m , n = Σ k x ( k ) Ψ m , n ( k ) - - - ( 8 )
Wherein
Figure G2008102274316D00054
Usually select a 0=2, b 0=1.
Step 6: realize identification to the signal source identity.
The structure of cognitive radio networks can be divided into centralized and distributed, hypothesis cognitive user end equipment (CPE) can obtain main user's signal characteristic from management of base station (BS) in the centralized network framework, be that cognitive user end equipment has priori to main subscriber signal, the identity that adopts this moment template matching method that the step 5 extraction signal characteristic parameter and the template that prestores are mated to come identification source.In the distributed network framework, it between the cognitive user stand-alone terminal of self-organizing, do not provide the base station of main subscriber signal feature to them, be that the cognitive user terminal does not have priori to main subscriber signal, need this moment to adopt and cut apart the blind identification that clustering algorithm is realized transient signal, after extracting characteristic parameter, will carry out the class number and estimate, determine that Initialization Center carries out Classification and Identification then.
Core innovation of the present invention is to introduce " transient signal fingerprint " notion, on this basis wavelet transformation and two kinds of technology of pattern recognition is combined, thereby reaches the purpose of resisting simulated main customer attack.Concretism is: cognitive user is by putting radio environment around the perception, utilize wavelet transformation to carry out noise reduction, separation, extraction transient signal characteristic parameter to the received signal, according to different network models signal source is discerned then, the first kind (base station is arranged) adopts template matching method to discern main user, and second class (no base station) adopts comprehensive cluster to carry out blind identification.
Beneficial effect of the present invention:
1, the signal source identification of adopting the inventive method to realize can be discerned the identity of Any user, overcome based on the accurate identification source identity and be subjected to restriction of energy measuring main user's priori, introduce " transient signal fingerprint " notion, can avoid interference immediately for the main user that may occur vacates frequency range by the identification transient signal to main user's proper communication.And the method all can be suitable for for centralized and distributed cognition radio network, also all is suitable for for non-cooperation formula and cooperative frequency spectrum perception, and just the precision of discerning when cognitive user is cooperated the formula frequency spectrum perception can be higher.
2, adopt the inventive method not change the mode of operation of existing transmitter, noting be used in increases extra content in transmitting, increase burden for main user, meets the requirement of FCC to cognitive user in the cognitive radio.The method does not have both provisioning requests to main user's priori, and cognitive user only need know that the feature of main user's transient signal gets final product.For main user's transmission mode, coded system does not require, and does not influence main user's communications signal, and the scope of application is wider.
3, adopt the realization signal source identification of the inventive method not only can avoid but also can effectively resist simulated main customer attack the interference of main user's proper communication, thereby and the method can make the precision of identification higher in conjunction with present existing technology.Can effective recognition go out main subscriber signal, effectively reduce the threat of simulation main customer attack.
Description of drawings
Fig. 1 is the whole realization flow figure of the inventive method.
Provided among the figure from receiving mixed signal to signal being carried out preliminary treatment at last to the differentiation that realizes the signal source identity.
Fig. 2 is centralized cognition network flow diagram of portions.
Provided the centralized network structure main user has been had identification process under the situation of priori from obtaining part after the transient signal among the figure.
Fig. 3 is a distributed cognition network flow diagram of portions.
Provided the distributed network structure main user has not been had identification process under the situation of priori from obtaining part after the transient signal among the figure.
Embodiment
The realization of antagonism simulated main customer attack of the present invention, as shown in Figure 1, consider that a cognitive radio system is familiar with the user by M main user and N and forms, each cognitive user can both independently be carried out frequency spectrum perception, consider the perception radio environment on every side that the cognitive user terminal can both be continuous, can receive the transient signal that each radio station powered on moment produces.It is the array antenna of p that cognitive user adopts array number, and the mixed signal that at a time a certain cognitive user perceives comprises main subscriber signal and the tentative q of being of non-main subscriber signal number (because the uncertain q that main user occurs is a random number).The signal source personal identification method that the present invention realizes divides following step:
Step 1: the mixed signal that the frequency spectrum perception process receives is carried out noise reduction process.
Only consider the white noise in the signal, utilize the soft-threshold method of wavelet analysis that mixed signal is carried out noise reduction, can be good at keeping the former characteristic spikes point that makes signal, and computational speed is fast.Because the waveform of small echo has important value to the signal noise silencing effect, therefore to select small echo according to the original mixed signal waveform, thereby reach good de-noising effect choosing of small echo.
Step 2: the number to information source in the mixed signal is estimated.
Correct estimation information source number is the basis of subsequent analysis and processing, the signal that contains what radio station in the mixed signal is estimated the accuracy of its estimation directly influences subsequent analysis and processing.Each signal in the mixed signal that the consideration cognitive user receives is incoherent, and noise is white Gaussian noise (AWGN), noise and signal independence and noise power the unknown.Estimate the information source number in this employing based on information-theoretical method (MDL criterion and AIC criterion).If antenna has p array element, receive signal s from q information source i(t) (i=1,2..., q).The ergodic Gaussian random process of steadily answering of signal.N snap X (t) is:
x ( t ) = Σ i = 1 q A ( Φ i ) s i ( t ) + n ( t ) - - - ( 1 )
S wherein i(t) be t i signal constantly, p * 1 complex vector A (Φ i) be the incident angle of i signal to each array element.P * 1 complex vector n (t) represents t additive white noise constantly, is the ergodic Gaussian random process of answering stably, and average is zero, and covariance is σ 2I (σ 2The unknown, I is a unit matrix).Signal and noise are separate.The number q in requirement estimated signal source from the N sample.
Consider X={x (1) ..., x (N) } and be independent identically distributed situation, wherein each value all is the multiple Gaussian random vector of zero-mean.Each covariance matrix: R (k)(k)+ σ 2I
Ψ wherein (k)Represent order be k ∈ 0,1 ..., the positive semidefinite matrix of p-1}, σ 2Represent unknown noise power.Ψ=ASA H, A HThe clothes conjugation of expression A, the covariance matrix of S representation signal has
Figure G2008102274316D00081
A is the matrix of p * q:
Figure G2008102274316D00082
Suppose that A is a full rank, S is nonsingular, and then the order of Ψ is q, and p-q the minimal eigenvalue that Ψ is described is zero.The list of feature values of R is shown λ 1〉=λ 2〉=... 〉=λ p, its minimum p-q characteristic value equals σ 2AIC criterion is:
AIC ( k ) = - 2 log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 2 k ( 2 p - k )
The MDL criterion is:
MDL ( k ) = - log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 1 2 k ( 2 p - k ) log N
The information source number equals to make the k value of AIC or MDL criterion minimum, k ∈ 0,1 ..., p-1}.
Step 3: adopt each signal of Capon Beam-former reconstruct, with the Signal Separation in different radio station.
Wave beam forms and is divided into two classes: classical wave beam is formed on and carries out the information source recovery under the condition of knowing expectation information source direction of arrival in advance; Blind wave beam forms the recovery that then requires to carry out information source under the situation of the unknown expectation information source direction of arrival.When adopting the Capon Beam-former to recover source signal, the direction of supposing a certain signal source is a desired orientation, and the direction of other signal sources is an interference radiating way.Calculate the optimum right vector of this direction, and finally recover the source signal of this direction.
Restoring signal output: y ( n ) = w H x ( n ) = Σ m = 1 M w m * x m ( n )
W=[w wherein 1..., w M] TBe weight vector, x (n) is each array element received signal vector.Adopt different weight vector following formulas that the different directions electric wave is had different responses, thereby form the spatial beams of different directions.
Step 4: the signal in each radio station is focused on separation transient signal and modulation signal.
The singular point that utilizes wavelet transformation to find out between transient signal and the modulation signal separates both.Lipschitz index 0<α<1 according to transient signal; Modulation signal is a continuously smooth, its Lipschitz index α 〉=1; Separate transient signal and modulation signal by the Lipschitz index that calculates singular point.
The small echo that utilization has a m rank vanishing moment is given in the regularity of ordering at v of m continuously differentiable function f in v point one neighborhood.Wherein the Taylor expansion form of function is: f (t)=p v(t)+ε v(t) (| ε v(t) |≤K|t-v| α).p vBe the m order polynomial,
Figure G2008102274316D00091
Carry out wavelet transformation, have the small echo Ψ (t) and the multinomial quadrature that is less than or equal to the n-1 rank of n rank square, then:
Wf(u,s)=Wp v(u,s)+Wε v(u,s)=Wε v(u,s)
Can pass through | and Wf (u, s) | approach Lipschitz α.
Log 2| Wf (u, s) |≤log 2A+ (α+1/2) log 2S wherein A is greater than zero constant.
The Lipschitz regularity of point v equals log 2| Wf (u, s) | as log 2The function of s deducts 1/2 along the greatest gradient of the very big curve that converges on v, thereby obtains the approximation of the Lipschitz index of signal | Wf (u, s) |.
Step 5: utilize wavelet transformation that transient signal is analyzed, extract characteristic parameter.
The transient signal that separation is obtained carries out wavelet analysis, obtains wavelet coefficient, therefrom chooses a certain proportion of wavelet coefficient (as maximum and standard deviation etc.) as characteristic vector, draws eigenvectors matrix.Continuous wavelet transform (CWT) is:
X a , b = 1 | a | ∫ x ( t ) Ψ * ( t - b a ) dt
Wherein Ψ (t) is female small echo.A, b are called scale factor and shift factor.Wavelet transform (DWT) is:
X m , n = Σ k x ( k ) Ψ m , n ( k )
Wherein
Figure G2008102274316D00094
Usually select a 0=2, b 0=1.
Step 6: realize signal source is carried out identification.
The structure of cognitive radio networks can be divided into centralized and distributed, as shown in Figure 2, hypothesis cognitive user end equipment (CPE) can obtain main user's signal characteristic from management of base station (BS) in the centralized network framework, be that cognitive user end equipment has priori to main subscriber signal, the identity that adopts this moment template matching method that the step 5 extraction signal characteristic parameter and the template that prestores are mated to come identification source.As shown in Figure 3, in the distributed network framework, it between the cognitive user stand-alone terminal of self-organizing, do not provide the base station of main subscriber signal feature to them, be that the cognitive user terminal does not have priori to main subscriber signal, need this moment to adopt to cut apart the blind identification that clustering algorithm is realized transient signal, after extracting characteristic parameter, will carry out the class number and estimate, determine that Initialization Center carries out Classification and Identification then.
By above step, just can realize in the cognitive radio system identification to the signal source identity, promptly realize the antagonism simulated main customer attack.

Claims (1)

1. the method for antagonism simulated main customer attack in the cognitive radio, suppose that a cognitive radio system is made up of M main user and N cognitive user, the mixed signal number that the frequency spectrum perception process receives is random number q, it is characterized in that, is realized by following step:
Step 1: the mixed signal that the frequency spectrum perception process receives is carried out noise reduction process
Only consider the white noise in the signal, utilize the soft-threshold method of wavelet analysis that mixed signal is carried out noise reduction,, reach de-noising effect choosing of small echo according to the selected small echo of original mixed signal waveform;
Step 2: the number to information source in the mixed signal is estimated
If antenna has p array element, receive signal s from q information source i(t) (i=1,2..., q), and the ergodic Gaussian random process of steadily answering of signal, N snap x (t) is:
x ( t ) = Σ i = 1 q A ( Φ i ) s i ( t ) + n ( t )
S wherein i(t) be t i signal constantly, p * 1 complex vector A (Φ i) be the incident angle of i signal to each array element; P * 1 complex vector n (t) represents t additive white noise constantly, is the ergodic Gaussian random process of answering stably, and average is zero, and covariance is σ 2I (σ 2The unknown, I is a unit matrix), signal and noise are separate, require the number q in estimated signal source from the N sample, consider X={x (1) ..., x (N) } be independent identically distributed situation, wherein each value all is the multiple Gaussian random vector of zero-mean, each covariance matrix:
R (k)=Ψ (k)2I
Ψ wherein (k)Represent order be k ∈ 0,1 ..., the positive semidefinite matrix of p-1}, σ 2Represent unknown noise power; Ψ=ASA H, A HThe clothes conjugation of expression A, the covariance matrix of S representation signal has
Figure F2008102274316C00012
A is the matrix of p * q:
Figure F2008102274316C00013
, supposing that A is a full rank, S is nonsingular, and then the order of Ψ is q, and p-q the minimal eigenvalue that Ψ is described is zero, and the list of feature values of R is shown λ 1〉=λ 2〉=... 〉=λ p, its minimum p-q characteristic value equals σ 2, AIC criterion is:
AIC ( k ) = - 2 log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 2 k ( 2 p - k )
The MDL criterion is:
MDL ( k ) = - log [ Π i = k + 1 p l i 1 / ( p - k ) Σ i = k + 1 p l i / ( p - k ) ] N ( p - k ) + 1 2 k ( 2 p - k ) log N
The information source number equals to make the k value of AIC or MDL criterion minimum, k ∈ 0,1 ..., p-1};
Step 3: adopt each signal of Capon Beam-former reconstruct, with the Signal Separation in different radio station
y ( n ) = w H x ( n ) = Σ m = 1 M w m * x m ( n )
W=[w wherein 1..., w M] TBe weight vector, x (n) is each array element received signal vector, adopts different weight vector following formulas that the different directions electric wave is had different responses, forms the spatial beams of different directions;
Step 4: the signal in each radio station is focused on separation transient signal and modulation signal
Thereby the singular point that utilizes wavelet transformation to find out between transient signal and the modulation signal separates both, because the Lipschitz index can be used for describing singularity of signal, in order to metric signal on one point regularity or in consistent regularity---Lipschitz index 0<α<1 of transient signal of a time period, modulation signal is a continuously smooth, its Lipschitz index α 〉=1; So separate transient signal and modulation signal by the Lipschitz index that calculates singular point;
The Taylor expansion form of function: f (t)=p v(t)+ε v(t) (| ε v(t) |≤K|t-v| α), p vBe the m order polynomial, Carry out wavelet transformation, have the small echo Ψ (t) and the multinomial quadrature that is less than or equal to the n-1 rank of n rank square, then:
Wf(u,s)=Wp v(u,s)+Wε v(u,s)=Wε v(u,s)
By | Wf (u, s) | approach Lipschitz α, log 2| Wf (u, s) |≤log 2A+ (α+1/2) log 2S, wherein A is the constant greater than zero, the Lipschitz regularity log of some v 2| Wf (u, s) | as log 2The function of s deducts 1/2 along the greatest gradient of the very big curve that converges on v, obtains the Lipschitz index of signal;
Step 5: utilize wavelet transformation that transient signal is analyzed, extract characteristic parameter
The transient signal that separation is obtained carries out wavelet analysis, obtains wavelet coefficient, therefrom chooses a certain proportion of wavelet coefficient as characteristic vector, draws eigenvectors matrix, and continuous wavelet transform CWT is:
X a , b = 1 | a | ∫ x ( t ) Ψ * ( t - b a ) dt
Wherein Ψ (t) is female small echo, and a, b are called scale factor and shift factor,
Wavelet transform DWT is:
X m , n = Σ k x ( k ) Ψ m , n ( k )
Ψ wherein M, n(t)=a 0 -1/2Ψ M, n(a 0 -mT-nb 0), select a usually 0=2, b 0=1;
Step 6: realize signal source is carried out identification
The structure of cognitive radio networks is divided into centralized and distributed, cognitive user end equipment CPE can obtain main user's signal characteristic from management of base station BS in the centralized network framework, the identity that adopts this moment template matching method that the step 5 extraction signal characteristic parameter and the template that prestores are mated to come identification source, in the distributed network framework, it between the cognitive user stand-alone terminal of self-organizing, do not provide the base station of main subscriber signal feature to them, adopt this moment and cut apart the blind identification that clustering algorithm is realized transient signal, after extracting characteristic parameter, carry out the class number and estimate, determine that Initialization Center carries out Classification and Identification then.
CN2008102274316A 2008-11-26 2008-11-26 Method for resisting simulated main customer attack in cognitive radio Expired - Fee Related CN101420758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102274316A CN101420758B (en) 2008-11-26 2008-11-26 Method for resisting simulated main customer attack in cognitive radio

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102274316A CN101420758B (en) 2008-11-26 2008-11-26 Method for resisting simulated main customer attack in cognitive radio

Publications (2)

Publication Number Publication Date
CN101420758A CN101420758A (en) 2009-04-29
CN101420758B true CN101420758B (en) 2010-04-21

Family

ID=40631285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102274316A Expired - Fee Related CN101420758B (en) 2008-11-26 2008-11-26 Method for resisting simulated main customer attack in cognitive radio

Country Status (1)

Country Link
CN (1) CN101420758B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808336A (en) * 2009-04-30 2010-08-18 清华大学 Method and system for positioning primary user in cognitive radio network
CN101990211B (en) * 2009-07-31 2016-08-24 华为技术有限公司 Method for network access, device and system
CN101730214B (en) * 2009-12-07 2011-11-16 浙江大学 Power spectrum profile generation and step-type power control method in multiple carrier wireless cognitive link
CN101959191B (en) * 2010-09-25 2012-12-26 华中科技大学 Safety authentication method and system for wireless network
CN102546059B (en) * 2012-01-04 2014-07-02 中国人民解放军理工大学 Non-supervision clustering-based distributed cooperative spectrum sensing method for cognitive self-organizing network
CN103117821B (en) * 2013-01-25 2014-09-17 北京科技大学 Weighing cooperation spectrum sensing method based on rayleigh quotient
CN103346849B (en) * 2013-06-28 2015-03-11 宁波大学 Spectrum sensing method resisting hostile attack simulating master user signals
CN103795479B (en) * 2014-01-28 2016-03-09 南京邮电大学 A kind of cooperative frequency spectrum sensing method of feature based value
CN105743594B (en) * 2016-04-18 2018-01-05 西安交通大学 Primary user's bogus attack detection method based on cooperation among users in a kind of cognitive radio system
CN106162620B (en) * 2016-08-12 2019-05-03 浙江大学 A kind of primary user's emulation attack detection method based on channel Doppler effect
CN107105431A (en) * 2017-04-01 2017-08-29 中国人民解放军国防科学技术大学 Illegal invasion recognition methods and system based on wireless network signal CO complexities
CN107517089B (en) * 2017-09-06 2020-09-01 南京邮电大学 Broadband spectrum sensing method based on spectrum characteristics
CN112534864A (en) * 2018-07-19 2021-03-19 诺基亚技术有限公司 Environmental modeling and abstraction of network states for cognitive functions
CN109379153B (en) * 2018-12-17 2020-01-17 电子科技大学 Spectrum sensing method
CN110866287B (en) * 2019-10-31 2021-12-17 大连理工大学 Point attack method for generating countercheck sample based on weight spectrum
CN111709435B (en) * 2020-05-18 2023-06-20 杭州电子科技大学 Discrete wavelet transform-based countermeasure sample generation method
CN113378643B (en) * 2021-05-14 2024-03-22 浙江工业大学 Signal countermeasure sample detection method based on random transformation and wavelet reconstruction
CN115051834B (en) * 2022-05-11 2023-05-16 华北电力大学 Novel power system APT attack detection method based on STSA-transformer algorithm

Also Published As

Publication number Publication date
CN101420758A (en) 2009-04-29

Similar Documents

Publication Publication Date Title
CN101420758B (en) Method for resisting simulated main customer attack in cognitive radio
Ureten et al. Wireless security through RF fingerprinting
CN107483091B (en) Channel information feedback algorithm under FDD large-scale MIMO-OFDM system
Li et al. Convolutional neural networks based indoor Wi-Fi localization with a novel kind of CSI images
CN102291186B (en) Frequency spectrum perceiving method based on estimation of signal arrival direction
CN106899968A (en) A kind of active noncontact identity identifying method based on WiFi channel condition informations
CN102324959B (en) Frequency spectrum sensing method based on multi-aerial system covariance matrix
CN103220052A (en) Method for detecting frequency spectrum hole in cognitive radio
CN104703216A (en) Energy-efficient-based detecting method of multi-task Bayes compressed sensing broadband spectrum
CN110601738A (en) Frequency spectrum sharing-based rate analysis method for environment backscatter array communication system
CN102932047A (en) Detection method for multitape spectrum of cognitive radio (CR) suitable for multiaerial system
CN109617590A (en) The safety of physical layer communication means for portable communications system that multiple input single output is wireless
CN111027614B (en) Noise enhanced radio frequency fingerprint identification method and device
Wilson et al. Integration of matched filtering within the RF-DNA fingerprinting process
CN103888201B (en) A kind of cooperative frequency spectrum sensing method utilizing space diversity
CN114757224A (en) Specific radiation source identification method based on continuous learning and combined feature extraction
Fan et al. Single-site indoor fingerprint localization based on MIMO-CSI
Pu et al. Novel three-hierarchy multiple-tag-recognition technique for next generation RFID systems
CN109274444B (en) Space-time-frequency three-dimensional spectrum sensing method
CN102238123A (en) Ranging code detection method and device
CN103152790B (en) Two-graded fusion Modulation Identification method based on dependency sub-clustering
CN101860387B (en) DOA estimation method and system thereof
CN115334524B (en) Communication and radar target detection method based on omnidirectional intelligent super surface
CN102651661A (en) Interference alignment method in time division-long term evolution (TD-LTE) system
CN115015860A (en) Transmitting signal optimization method and system for improving radar detection performance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100421

Termination date: 20131126